Results 51 to 60 of about 1,334,459 (231)

Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [PDF]

open access: yesJisuanji kexue
With the vigorous development of blockchain technology,information systems based on blockchain have been applied in many fields,including digital currency,supply chain and other fields.Driven by the dual needs of supervision and practical application ...
WANG Dong, LI Xiaoruo, ZHU Bingnan
doaj   +1 more source

An Example of Parallel Merkle Tree Traversal: Post-Quantum Leighton-Micali Signature on the GPU

open access: yesACM Transactions on Architecture and Code Optimization (TACO)
The hash-based signature (HBS) is the most conservative and time-consuming among many post-quantum cryptography (PQC) algorithms. Two HBSs, LMS and XMSS, are the only PQC algorithms standardised by the National Institute of Standards and Technology (NIST)
Ziheng Wang   +4 more
semanticscholar   +1 more source

Overcoming Data Availability Attacks in Blockchain Systems: LDPC Code Design for Coded Merkle Tree

open access: yesarXiv.org, 2021
In blockchain systems, full nodes store the entire blockchain ledger and validate all transactions in the system by operating on the entire ledger. However, for better scalability and decentralization of the system, blockchains also run light nodes that ...
Debarnab Mitra, Lev Tauz, L. Dolecek
semanticscholar   +1 more source

Blockchain for the Arts and Humanities

open access: yesFuture Humanities, Volume 4, Issue 1, May 2026.
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley   +1 more source

An Auditable and Trusted Lottery System in the Cloud

open access: yesApplied Sciences
Public blockchains offer transparency and tamper resistance, but implementing national-scale lotteries directly on-chain is impractical because each bet would require a separate transaction, incurring substantial gas costs and facing throughput ...
Gwan-Hwan Hwang   +2 more
doaj   +1 more source

BaseFs - Basically Acailable, Soft State, Eventually Consistent Filesystem for Cluster Management [PDF]

open access: yes, 2016
A peer-to-peer distributed filesystem for community cloud management.
Aymerich Gubern, Marc
core   +1 more source

The American Black Bear (Ursus americanus) as an Apex Predator: Investigating the Ecological Role of the World's Most Abundant Large Carnivore

open access: yesMammal Review, Volume 56, Issue 1, March 2026.
Black bears as apex predators. American black bears can (1) produce top‐down effects on ungulates equal to or exceeding those of typical apex predators and (2) modify the spatiotemporal behaviour of other carnivores, including pumas and coyotes. We argue that the term ‘apex predator’ is highly context dependent and not a species‐wide status.
John M. Nettles   +10 more
wiley   +1 more source

BLOSOM: BLOckchain technology for Security Of Medical records

open access: yesICT Express, 2022
Today, information security world is witnessing frequent attacks on electronic records by the naive and professional hackers and crackers. Security of Patient’s Electronic Medical Record (EMR) in Hospital Management System is of paramount importance and ...
Rahul Johari   +3 more
doaj   +1 more source

Clustering Longitudinal Data: A Review of Methods and Software Packages

open access: yesInternational Statistical Review, Volume 93, Issue 3, Page 425-458, December 2025.
Summary Clustering of longitudinal data is becoming increasingly popular in many fields such as social sciences, business, environmental science, medicine and healthcare. However, it is often challenging due to the complex nature of the data, such as dependencies between observations collected over time, missingness, sparsity and non‐linearity, making ...
Zihang Lu
wiley   +1 more source

Home - About - Disclaimer - Privacy