Showing 541 - 560 results of 812 for search '"decentralization"', query time: 0.07s Refine Results
  1. 541

    Blockchain-based computing and wireless communication resource joint management double auction model by Yan SUN, Ao XIONG, Chengling JIANG, Wei WANG, Dongxiao YU, Shaoyong GUO

    Published 2022-11-01
    “…In wireless communication networks, the stock of spectrum, computing, storage and other resources at the edge was limited.The traditional decentralized and exclusive resource allocation resulted in weak resource reuse capability and low utilization rate.At the same time, it was difficult to ensure the fairness of resource sharing in the traditional resource scheduling process due to the lack of trust between the owners.First, a double auction model of computing and wireless communication resource joint management based on blockchain was proposed.In the model, a resource market was established, in which resource buyers and sellers allocated resources through double auctions.Secondly, blockchain was used to store the resource information of buyers and sellers to solve the mutual trust problem of all parties in the network.Finally, the experimental simulation was carried out to verify that the proposed model effectively improved the system performance and resource utilization efficiency.…”
    Get full text
    Article
  2. 542

    Autogobierno y modernización de Galicia durante las cuatro últimas décadas by Xoaquín Fernández Leiceaga, Santiago Lago Peñas

    Published 2024-06-01
    “…In this period, Spain became democratized, decentralized, entered the European Union and built a comparable welfare state. …”
    Get full text
    Article
  3. 543

    IT Governance Modes Choice: An Institutional Theory Perspective by Karim Ben Boubaker, Saida Harguem, Mari Nyrhinen

    Published 2021-04-01
    “…The results show that the three different IT Governance modes - centralized, decentralized, and federal - meet the requirements of process and property variables and can thus be considered legitimized institutions. …”
    Get full text
    Article
  4. 544

    Advancing diagnosis and treatment for human African trypanosomiasis in Nigeria: challenges and future directions by Kelly Zongo, Rolayo Toyin Emmanuel

    Published 2025-01-01
    “…The focus is on improving the current diagnostic framework, decentralizing the validation process, and streamlining drug distribution to effectively halt the transmission of HAT. …”
    Get full text
    Article
  5. 545

    A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography by Haibao Zhang, Wenbao Jiang, Jin Ding

    Published 2024-12-01
    “…This paper proposes a novel admission control mechanism based on identity-based cryptography, utilizing multi-level anonymous identifiers and decentralized private key generation to enhance user authentication and privacy. …”
    Get full text
    Article
  6. 546

    Optimizing power system trading processes using smart contract algorithms by Chong Shao, Xumin Liu, Ding Li, Xiaoting Chen

    Published 2024-12-01
    “…Three trading models are analyzed: centralized trading, blockchain-based decentralized trading, and smart contract-driven automated trading. …”
    Get full text
    Article
  7. 547

    The New Method of Sensor Data Privacy Protection for IoT by Yue Wu, Liangtu Song, Lei Liu

    Published 2021-01-01
    “…On the basis of smart contracts, attribute-based data access control allows decentralized applications to finely control data access. …”
    Get full text
    Article
  8. 548

    A novel approach of Consensus-based Finite-time Distributed Sliding Mode Control for Stewart platform manipulators motion tracking by Duc Cuong Vu, Tung Lam Nguyen, Danh Huy Nguyen

    Published 2025-03-01
    “…Simulations are used to validate the efficacy of the proposed control scheme by comparing it to typical decentralized PD control methods. The results simulated based on the Quasi-Physical Model show that consensus-based control outperforms the counterpart control approaches in terms of accuracy and stability.…”
    Get full text
    Article
  9. 549

    Optimal Decisions for a Fuzzy Two-Echelon Supply Chain by Qingfeng Song, Kai Shi, Sheng Lin, Guangping Xu

    Published 2014-01-01
    “…In order to maximize the α-optimistic value of the profits, based on different market structures, one centralized decision model and three decentralized decision models are developed, and the corresponding analytical equilibrium solutions are obtained using the game-theoretical approach. …”
    Get full text
    Article
  10. 550

    Increasing the cyber resilience of SMEs through open-source solutions and international collaboration by Ionica ȘERBAN, Florentina-Mihaela CURCĂ, Robert-Ștefan ȘANDRU

    Published 2025-01-01
    “…Open-source solutions offer financial accessibility, flexibility, and increased security, supported by global communities that contribute to their continuous improvement. Moreover, decentralized sharing of threat information, combined with artificial intelligence, enables more efficient detection and prevention of cyberattacks. …”
    Get full text
    Article
  11. 551

    Le numérique au secours des monnaies locales et complémentaires by Bénédicte Martin

    Published 2018-12-01
    “…However, these two types of alternative currencies are based on different society projects and radically different values. While Decentralized virtual currencies are speculative and rely on an anonymous community, Local and Complementary currencies which aim to enhance citizens community participation through transactions purposes take root in their territories. …”
    Get full text
    Article
  12. 552

    Causal estimation of FTX collapse on cryptocurrency: a counterfactual prediction analysis by Khalid Khan, Adnan Khurshid, Javier Cifuentes-Faura

    Published 2025-01-01
    “…The industry is still mostly unregulated, and regulators must act quickly, highlighting the need for outstanding innovation and decentralized and trustless technology adoption.…”
    Get full text
    Article
  13. 553

    Research on a new network covert channel model in blockchain environment by Yanfeng LI, Liping DING, Jingzheng WU, Qiang CUI, Xuehua LIU, Bei GUAN

    Published 2019-05-01
    “…Blockchain is a decentralized architecture emerging with cryptocurrencies,which is credible and robust.A network covert channel model in blockchain environment was proposed for the first time,which was anti-interference,anti-tamper modification,multi-line communication,receiver anonymity and line independence.The shortcomings of network covert channel in existing network environment could be tackled by the new type of network covert channel,such as characteristic defect.etc.Firstly,A network covert channel model in blockchain environment was presented by formal method,its anti-interference and anti-tamper modification was proved.Then,a blockchain network covert channel scenario using service operation interval time was presented.Finally,the undetectability,robustness and rate of the blockchain network covert channel evaluation vectors was proposed.A theoretical foundation was laid for the practicality of the new type of network covert channel in blockchain.…”
    Get full text
    Article
  14. 554

    Market-Based Approach to Mobile Surveillance Systems by Ahmed M. Elmogy, Alaa M. Khamis, Fakhri O. Karray

    Published 2012-01-01
    “…The realization of the potential of mobile surveillance requires the solution of different challenging problems such as task allocation, mobile sensor deployment, multisensor management, cooperative object detection and tracking, decentralized data fusion, and interoperability and accessibility of system nodes. …”
    Get full text
    Article
  15. 555

    MODELING A NEGOTIATION PROCESS BETWEEN AIRCRAFT USING PETRI NETS by Daria ŻUCHOWSKA, Anna STELMACH

    Published 2023-12-01
    “…Many studies point out the delegation of the responsibility for ensuring separation from air traffic controllers to the aircraft crews, but it should be assumed that the transition from centralized to decentralized air traffic control will occur in stages. …”
    Get full text
    Article
  16. 556

    La crisis del modelo de Estado en España y la reforma federal by Jorge Cagiao y Conde

    Published 2016-01-01
    “…First, he deals with some of the juridical vices of its decentralized system. Secondly, he comments on the problems generated by the passive attitude of Spanish governments to adapt the constitutional system to its conflictual context (multinational in public law and multi-level into the UE system), and he also explains why the federal logic is probably the answer to the internal and external factors of State crisis. …”
    Get full text
    Article
  17. 557

    Leveraging edge learning and game theory for intrusion detection in Internet of things by Haoran LIANG, Jun WU, Chengcheng ZHAO, Jianhua LI

    Published 2021-06-01
    “…With the commercialization of 5G and the development of 6G, more and more Internet of things (IoT) devices are linked to the novel cyber-physical system (CPS) to support intelligent decision making.However, the highly decentralized and heterogeneous IoT devices face potential threats that may mislead the CPS.Traditional intrusion detection solutions cannot protect the privacy of IoT devices, and they have to deal with the single point of failure, which prevents these solutions from being deploying in IoT scenarios.The edge learning and game theory based intrusion detection for IoT was proposed.Firstly, an edge learning based intrusion detection framework was proposed to detect potential threats in IoT.Moreover, a multi-leader multi-follower game was employed to motivate trusted parameter servers and edge devices to participate in the edge learning process.Experiments and evaluations show the security and effectiveness of the proposed intrusion detection framework.…”
    Get full text
    Article
  18. 558

    Application of blockchain technology in the demand response management of power grid by Haowen REN, Yaqi YANG

    Published 2019-05-01
    “…The theory of decentralized blockchain mechanism was studied,and a method of applying distributed block chain technology to manage demand response planning in smart grid environment was proposed.This method was based on the blockchain distributed ledger accounting tamper-proof technology,which stored the energy consumption information collected from the intelligent metering devices of the IoT,and defined the self-executing intelligent contract at each consumer level in a programmatic way to ensure the flexibility of transactions.Blockchain distributed technologies provided incentives or penalties to balance energy demand with grid energy production rules.Consensus-based validation would be used to validate demand response plans and provide appropriate financial settlement for flexible suppliers.The results show that the power demand side management based on blockchain distributed technology can be used to match energy demand and production under the condition of smart grid,with high accuracy of demand response signal,but less flexibility required for convergence.…”
    Get full text
    Article
  19. 559

    Block-based fair payment scheme under delegation computation by Ta LI, Youliang TIAN, Kang XIANG, Hongfeng GAO

    Published 2020-03-01
    “…In the traditional delegation computation,due to the self-interested behavior of both participants,there were some problems such as the denial of the principal and the dishonest calculation by the computing party.In the payment phase,a third party was required to ensure the fairness of the payment,which led to extra costs and risks of disclosure of participants' privacy.Game theory was used to analyze the Nash equilibrium solution between the two parties in the payment process,and a fair payment protocol based on time commitment of bitcoin was proposed.Firstly,the bitcoin time commitment technology was used to ensure the fairness of payment.Secondly,the decentralized feature of block chain was used to replace the third-party service to protect the privacy of all parties and realize the source of responsibility.Finally,the scheme was analyzed from the perspective of security and correctness,which proved that the participants choose behavioral strategies honestly in the payment process.The scheme proposed in this paper not only solved the problem of fair payment in traditional delegation computation,but also protected the privacy of participants.…”
    Get full text
    Article
  20. 560

    Être ethnologue au Yunnan by Aurélie Névot

    Published 2023-06-01
    “…I also reflect on the “meaning” that emerges from observation in light of social changes: its understanding and the decentring it imposes.…”
    Get full text
    Article