Results 131 to 140 of about 35,271 (280)
Blockchain sharding storage scheme based on concatenated coding
Traditional blockchain faces the challenge of storage scalability. Existing research has reduced the storage overhead of blockchain based on erasure coding theory, but it brings high computational and communication spending during the decoding and ...
TIAN Youliang, HUANG Yuqing, WANG Shuai
doaj +2 more sources
HSM: A Hybrid Storage Method Based on the Heat of Data and Global Disk Space Utilization
In distributed systems, the method for data storage is crucial. Previous data storage work use the replication or Erasure Coding method to store data.
Ying Song +3 more
doaj +1 more source
The Insistence of Blackness and the Persistence of Antiblackness in Ireland
ABSTRACT This paper positions Ireland as a critical site for examining the insistence of blackness and an antiblackness created and sustained through Irish ethnonationalist imaginaries and exclusionary processes. Drawing on connected sociologies and Irish Black Studies, this enquiry argues that antiblackness in Ireland operates as a generational force,
Philomena Mullen
wiley +1 more source
ABSTRACT This paper applies Critical Race Theory (CRT) to explore how whiteness operates within Australia's anti‐racism movement as a structuring force that shapes discourse, practice and policy. Despite the anti‐racism movement offering crucial spaces for resistance and reform, it remains entangled in Australia's settler‐colonial present and systemic ...
Franka Vaughan, Aish Ravi
wiley +1 more source
ABSTRACT This paper presents a critical examination of Australia's 2021 household, individual and interviewer census forms. Using a form‐led analysis, this research scrutinises the underlying cisheteronormative logic that implicitly shapes the Census process, from data collection to distribution of findings.
Xavier Mills, Sal Clark
wiley +1 more source
Comprehensive Review of Storage Optimization Techniques in Blockchain Systems
Blockchain technology, known for its decentralization, traceability, immutability, and security, has attracted widespread attention in academia and has been extensively applied in numerous fields.
Yan Wang, Hao Wang, Yanghuang Cao
doaj +1 more source
Source Coding for Erasure Channels
The main goal of this thesis is to bound the rate-distortion performance of the aforementioned sparse-graph codes for lossy compression of a BES. As our main contributions, we first derive lower bounds on the rate-distortion performance of LDGM codes for the BES, which are valid for any LDGM code of a given rate and generator node degree distribution ...
openaire +2 more sources
ABSTRACT In 2021, a desktop review was conducted of published references to First Nations peoples' approaches to conflict and its management in Australia (Project Stage One), culminating in a report published in 2024. This article focuses on Project Stage Two, a complex, innovative research undertaking building on the findings of Stage One, and being ...
Helen Bishop +3 more
wiley +1 more source
Realising Aboriginal Community Controlled Approaches to Child Reunification
ABSTRACT Reunification rates for Aboriginal and Torres Strait Islander children in out‐of‐home care (OOHC) in Australia are critically low, even though reunification is the preferred permanency outcome for children following removal, and despite a range of mechanisms and strategies ostensibly to support effective reunification. To better understand the
B. J. Newton +4 more
wiley +1 more source
ABSTRACT Australia's Robodebt scheme, an automated debt recovery program introduced in 2016, was exposed by the Robodebt Royal Commission (RC) as a serious failure of public administration and source of significant harm for thousands of Australians. Through a critical discourse analysis (CDA) of Australian news media, this study explores whether the RC'
Rebecca Coleman‐Hicks +1 more
wiley +1 more source

