?
IECC 2020: Proceedings of the 2020 2nd International Electronics Communication Conference
The proceeding of ICBTA 2020 includes papers submitted to the conference from universities, research institutes and the industry. A major goal and feature of the conference was to bring together academic scientists, engineers, and industry researchers to share their experiences and research results on Blockchain Technology, and discuss the practical challenges encountered and the solutions adopted
Chistiakov I., Yanovich Y., , in : IECC 2020: Proceedings of the 2020 2nd International Electronics Communication Conference. : Association for Computing Machinery (ACM), 2020. P. 67-72.
Decentralized voting and self-funding allow cryptocurrencies to make joint decisions and finance their development. Dash cryptocurrency has a working self-funding and decision-making system for supporting event and improvement proposals---the Dash Governance System. While it is fully operational, as currently designed, it does not incentivize voting efficiency. The Dash Governance System struggles to scale, with the ...
Added: April 19, 2021
Davydov V., Yanovich Y., , in : IECC 2020: Proceedings of the 2020 2nd International Electronics Communication Conference. : Association for Computing Machinery (ACM), 2020. P. 129-136.
Financial institutions own balanced portfolios with many assets and hence a small risk. But they are not able to split them into smaller parts with comparable risk for resale due to regulators' restrictions caused by a lack of auditability. Blockchain and smart contracts allow overcoming this problem via tokenizing assets into a commodity. The paper ...
Added: April 19, 2021
Keywords: blockchain
ACM, 2020
The proceeding of ICBTA 2020 includes papers submitted to the conference from universities, research institutes and the industry. A major goal and feature of the conference was to bring together academic scientists, engineers, and industry researchers to share their experiences and research results on Blockchain Technology, and discuss the practical challenges encountered and the solutions ...
Added: April 19, 2021
Meshcheryakov Y., Мельман А. С., Evsyutin O. et al., IEEE Access 2021 Vol. 9 P. 80559-80570
Cyber-physical systems and the Internet of things (IoT) are becoming an integral part of the digital society. The use of IoT services improves human life in many ways. Protection against cyber threats is an utmost important prospect of IoT devices operation. Malicious activities lead to confidential data leakage and incorrect performance of devices becomes critical. ...
Added: June 2, 2021
Антонопулос А. М., Вуд Г., М. : Бомбора, 2021
This publication is the result of a joint work of Andreas M. Antonopoulos and Dr. Gavin Wood. These two writers were brought together by a chain of happy accidents, and in the best spirit of open source projects and Creative Commons culture, together with hundreds of other participants, they created this book.
Gavin Wood has long ...
Added: July 20, 2021
Switzerland : Springer, 2021
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 33rd International Conference on Advanced Information Systems Engineering, CAiSE 2021, which was held during June 28-July 2, 2021. The conference was planned to take place in Melbourne, Australia, but changed to an online format due to the COVID-19 pandemic.
The workshops included ...
Added: June 16, 2021
Evsyutin O., Meshcheryakov Y., Sensors 2020 Vol. 20 No. 12 P. 1-20
Prompt development of information technology has made an essential impact on many industries. There appeared a concept “Industry 4.0” symbolizing the fourth industrial revolution. The given concept is closely connected with such promising technologies as the Internet of Things, blockchain, fog computing, Big Data. In the present research, the sphere of the mining industry is ...
Added: June 18, 2020
Мещеряков Р. В., Iskhakov A., Evsyutin O., Информатика и автоматизация (Труды СПИИРАН) 2020 Т. 19 № 5 С. 1089-1122
At present, the problem of creating methodological security of cyberphysical systems, in particular, the design and implementation of information security subsystems is acute. At the same time, the landscape of threats and vulnerabilities typical for a wide range of hardware and software technologies used in cyberphysical systems is extremely wide and complex. In this context, ...
Added: November 13, 2020
Smetanin S., Ometov A., Komarov M. M. et al., Sensors 2020 No. 12 P. 3358
The present increase of attention toward blockchain-based systems is currently reaching a tipping point with the corporate focus shifting from exploring the technology potential to creating Distributed Ledger Technology (DLT)-based systems. In light of a significant number of already existing blockchain applications driven by the Internet of Things (IoT) evolution, the developers are still facing ...
Added: June 15, 2020
С.М. Авдошин, Д.Д. Цветков, Информационные технологии 2019 Т. 25 № 10 С. 615-628
Initial Coin Offering (ICO) is a new method of funds attraction by IT-projects that became especially popular in 2017—2018. Despite the decrease in the number of projects by 2019, the interest to ICO method is still high. Since, currently, methodological principles of initial coin offering are still insufficiently presented in scientific literature, the aim of ...
Added: October 21, 2019
Kasperskaya N., Безопасность информационных технологий 2019 Т. 26 № 2 С. 95-108
Currently, under the current international sanctions, the task of building a system of distributed registries with high transactional speed and using symmetric cryptographic algorithms, as well as providing minimal or controlled disclosure of data about the architecture of the system and the transactions carried out in it, is very important. To solve this problem, the ...
Added: September 25, 2019
IEEE, 2019
XVI International Symposium "Problems of Redundancy in Information and Control Systems" is the conference that covers a wide area of aspects of information and communication systems. The main goal of the Symposium foundation is the reinforcement of cooperation between the representatives of various scientific schools, a possibility for the participants to get awareness of the ...
Added: November 13, 2019
Erahtina O. S., Kondrateva K., Кукаркин И. А. et al., Информационное общество 2019 № 4-5 С. 61-71
A number of processes automated by various information technologies in law are growing dramatically. The article deals with the elaboration of the information system, which automates share purchase and sale of the close corporation using Blockchain 2.0. The study gives the analysis of Blockchain application in various spheres. Requirements to the information system are formalized. ...
Added: November 28, 2019
Karpov V. E., Karpova I. P., Procedia Engineering 2015 Vol. 100 P. 1459-1468
Work solutions are proposed for problems of leader definition and role distribution in homogeneous groups of robots. It is shown that transition from a swarm to a collective of robots with hierarchical organization is possible using exclusively local interaction. The local revoting algorithm is central to the procedure for choice of leader while redistribution of roles can ...
Added: March 14, 2015
Chernyshev S. V., Cherepanov E. A., Pankratiev E. V. et al., Journal of Mathematical Sciences 2005 Vol. 128 No. 6 P. 3487-3495
Added: January 27, 2014
М. : Издательский центр «Российский государственный гуманитарный университет», 2019
Сборник включает 27 докладов международной конференции по компьютерной лингвистике и интеллектуальным технологиям «Диалог 2019», не вошедшие в ежегодник «Компьютерная лингвистика и интеллектуальные технологии», но рекомендованные Программным Комитетом к представлению на конференции. Для специалистов в области теоретической и прикладной лингвистики и интеллектуальных технологий. ...
Added: December 10, 2019
Chuprikov P., Nikolenko S. I., Davydow A. et al., IEEE Transactions on Networking 2018 Vol. 26 No. 1 P. 342-355
Modern network elements are increasingly required to deal with heterogeneous traffic. Recent works consider processing policies for buffers that hold packets with different processing requirements (number of processing cycles needed before a packet can be transmitted out) but uniform value, aiming to maximize the throughput, i.e., the number of transmitted packets. Other developments deal with ...
Added: March 14, 2018
Sotnikova S., Динамика сложных систем 2012 № 3 С. 84-87
In article is described designed programme complex of the physical processes modeling, which also allows to conduct the identification printed node parameters (the physical model). On printed node designed the on-board secondary power supply source is realized. For it are designed relationship interfaces of controlling program with the known program of modeling and optimization. ...
Added: December 5, 2014
Skoptsov K. A., Sheshenin S., Galatenko V. V. et al., International Journal of Applied Mechanics 2016 Vol. 8 No. 2 P. 1650016-01-1650016-18
We present a method for evaluating elastic properties of a composite material produced by molding a resin filled with short elastic fibers. A flow of the filled resin is simulated numerically using a mesh-free method. After that, assuming that spatial distribution and orientation of fibers are not significantly changed during polymerization, effective elastic moduli of ...
Added: May 22, 2016
Malyshev D., Discrete Mathematics 2015 Vol. 338 No. 11 P. 1860-1865
We completely determine the complexity status of the 3-colorability problem for hereditary graph classes defined by two forbidden induced subgraphs with at most five vertices. ...
Added: April 7, 2014
Borchmann D., Hanika T., Obiedkov S., Discrete Applied Mathematics 2020 Vol. 273 P. 30-42
We propose an algorithm for learning the Horn envelope of an arbitrary domain using an expert, or an oracle, capable of answering certain types of queries about this domain. Attribute exploration from formal concept analysis is a procedure that solves this problem, but the number of queries it may ask is exponential in the size ...
Added: October 29, 2019
Springer, 2012
Added: January 29, 2013
Gostev I. M., М. : Юрайт, 2016
В настоящее время компьютерные науки стремительно развиваются. Новые версии операционных систем появляются каждые полтора-два года, поэтому было принято решение о включении в данную книгу такого материала, который не будет устаревать. Содержание учебника представляет собой некоторые наиболее общие принципы построения операционных систем, которые были разработаны более 50 лет назад и практически не изменились за прошедшее время. ...
Added: October 13, 2009
Каз. : Издательство «Фэн» Академии наук Республики Татарстан, 2013
Материалы и доклады Шестой Всероссийской научно-практической конференции по имитацонному моделированию и его применению в науке и промышленности. ...
Added: December 14, 2013
Goncharov R., Сапанов П. М., Яшунский А. Д., Социология власти 2013 № 3 С. 57-72
В статье представлена технология, позволяющая собирать в полевых исследованиях пространственно локализованные данные об объектах городской среды. Технология основана на автоматической привязке фотографий к пространственным координатам. Приведен план полевых и камеральных мероприятий, предложены варианты ГИС-обработки собираемых таким образом данных. В качестве примера приведены данные об использовании белорусского языка в общественном пространстве городов Белоруссии. ...
Added: April 12, 2015
Shuranov E., / Cornell University. Series Computer Science "arxiv.org". 2021.
Text encodings from automatic speech recognition (ASR) transcripts and audio representations have shown promise in speech emotion recognition (SER) ever since. Yet, it is challenging to explain the effect of each information stream on the SER systems. Further, more clarification is required for analysing the impact of ASR's word error rate (WER) on linguistic emotion ...
Added: February 14, 2023