303 research outputs found

    Personal Volunteer Computing

    Full text link
    We propose personal volunteer computing, a novel paradigm to encourage technical solutions that leverage personal devices, such as smartphones and laptops, for personal applications that require significant computations, such as animation rendering and image processing. The paradigm requires no investment in additional hardware, relying instead on devices that are already owned by users and their community, and favours simple tools that can be implemented part-time by a single developer. We show that samples of personal devices of today are competitive with a top-of-the-line laptop from two years ago. We also propose new directions to extend the paradigm

    Blockchain Mining Games

    Get PDF
    We study the strategic considerations of miners participating in the bitcoin’s protocol. We formulate and study the stochastic game that underlies these strategic considerations. The miners collectively build a tree which consists of a long path and potentially short branches out of it, and they are paid when they create a node (mine a block) which will end up in the main path. Since the miners can hide newly mined nodes, they play a game with incomplete information. Here we consider two simplified forms of this game in which the miners have complete information. In the simplest game the miners release every mined block immediately, but are strategic on which blocks to mine. In the second more complicated game, when a block is mined it is announced immediately, but it may not be released so that other miners cannot continue mining from it. A miner not only decides which blocks to mine, but also when to release blocks to other miners. In both games, we show that when the computational power of each miner is relatively small, their best response matches the expected behavior of the bitcoin designer. However, when the computational power of a miner is large, he deviates from the expected behavior, and other Nash equilibria arise

    ÆGIS: Smart Shielding of Smart Contracts

    Get PDF
    In recent years, smart contracts have suffered major exploits, losing millions of dollars. Unlike traditional programs, smart contracts cannot be updated once deployed. Though various tools were pro- posed to detect vulnerable smart contracts, they all fail to protect contracts that have already been deployed on the blockchain. More- over, they focus on vulnerabilities, but do not address scams (e.g., honeypots). In this work, we introduce ÆGIS, a tool that shields smart contracts and users on the blockchain from being exploited. To this end, ÆGIS reverts transactions in real-time based on pat- tern matching. These patterns encode the detection of malicious transactions that trigger exploits or scams. New patterns are voted upon and stored via a smart contract, thus leveraging the benefits of tamper-resistance and transparency provided by blockchain. By allowing its protection to be updated, the smart contract acts as a smart shield

    Concurrent Imitative Movement During Action Observation Facilitates Accuracy of Outcome Prediction in Less-Skilled Performers

    Get PDF
    Skilled athletes can predict the outcome of actions performed by others, based on the kinematic information inherent in others’ actions, earlier and more accurately than less-skilled athletes. Activation of the motor cortex during action observation indicates motor simulation of other’s actions in one’s own motor system; this contributes to skilled outcome prediction. Thus, the present study investigated whether concurrent movements during action observation that affect motor simulation influence the accuracy of outcome prediction, namely, whether concurrent imitative movement and self-movement enhance and inhibit accuracy, respectively, based on skill level. Twelve male varsity basketball players (skilled group) and twelve male college students with no special training in basketball (less-skilled group) were required to predict the outcome of a basketball free throw by another player based on the action kinematics in the following four conditions: prediction without any action (observation), prediction with right-wrist volar flexion with maximum speed (incongruent-action), prediction with concurrent imitative movement during observation by right-wrist flexion as if imitating the model’s action (imitative-motion), or prediction with concurrent self-movement by right-wrist flexion as if shooting by oneself (self-motion). The results showed that the skilled group had degraded accuracy of outcome prediction in the self-motion condition compared to the observation condition. In contrast, accuracy in the less-skilled group was facilitated in the imitative-motion condition compared to the observation condition. The findings suggest that, at least in less-skilled participants, the appropriate motor simulation that relates to skilled prediction can be virtually induced by concurrent imitative movement during the prediction task, even if they have less experience of free throws. This effect in imitative movement is likely to occur by producing identical motor commands with observed action, thereby enabling the prediction of sensory consequences and outcome accurately via a forward model. We propose that traditional perceptual training with concurrent imitative movement is likely to be an effective way to develop visual- and motor-based hybrid outcome predictions that produce superior inferences in skilled athletes

    Continuous EEG monitoring in ICU

    Get PDF

    Towards Scaling Blockchain Systems via Sharding

    Full text link
    Existing blockchain systems scale poorly because of their distributed consensus protocols. Current attempts at improving blockchain scalability are limited to cryptocurrency. Scaling blockchain systems under general workloads (i.e., non-cryptocurrency applications) remains an open question. In this work, we take a principled approach to apply sharding, which is a well-studied and proven technique to scale out databases, to blockchain systems in order to improve their transaction throughput at scale. This is challenging, however, due to the fundamental difference in failure models between databases and blockchain. To achieve our goal, we first enhance the performance of Byzantine consensus protocols, by doing so we improve individual shards' throughput. Next, we design an efficient shard formation protocol that leverages a trusted random beacon to securely assign nodes into shards. We rely on trusted hardware, namely Intel SGX, to achieve high performance for both consensus and shard formation protocol. Third, we design a general distributed transaction protocol that ensures safety and liveness even when transaction coordinators are malicious. Finally, we conduct an extensive evaluation of our design both on a local cluster and on Google Cloud Platform. The results show that our consensus and shard formation protocols outperform state-of-the-art solutions at scale. More importantly, our sharded blockchain reaches a high throughput that can handle Visa-level workloads, and is the largest ever reported in a realistic environment.Comment: This is an updated version of the Chain of Trust: Can Trusted Hardware Help Scaling Blockchains? paper. This version is to be appeared in SIGMOD 201

    Studies on the Effect of Radio Frequency Field in a Cusp-Type Charge Separation Device for Direct Energy Conversion

    Get PDF
    In D-3He fusion power generation, an application of direct energy conversion is expected in which separation of charged particles is necessary. A cusp-type direct energy converter (CuspDEC) was proposed as a charge separation device, but its performance was degraded for a high density plasma. The goal of the present study is to establish an additional method to assist charge separation by using a nonlinear effect of a radio frequency (rf) electric field. Following to the previous study, we experimentally examine the effect of an rf field to electron motion in a CuspDEC device. Two ring electrodes were newly installed in a CuspDEC simulator and the current flowing into the electron collector located in the line cusp region was measured on an rf field application. The significant variation in the current was found, and an improvement of the charge separation can be expected by using the phenomenon appropriately

    ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging

    Get PDF
    The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand. In Autocrypt the encryption keys are attached directly to messages, and thus the encryption can be implemented by email clients without any collaboration of the providers. The decentralized nature of this in-band key distribution, however, makes it prone to man-in-the-middle attacks and can leak the social graph of users. To address this problem we introduce ClaimChain, a cryptographic construction for privacy-preserving authentication of public keys. Users store claims about their identities and keys, as well as their beliefs about others, in ClaimChains. These chains form authenticated decentralized repositories that enable users to prove the authenticity of both their keys and the keys of their contacts. ClaimChains are encrypted, and therefore protect the stored information, such as keys and contact identities, from prying eyes. At the same time, ClaimChain implements mechanisms to provide strong non-equivocation properties, discouraging malicious actors from distributing conflicting or inauthentic claims. We implemented ClaimChain and we show that it offers reasonable performance, low overhead, and authenticity guarantees.Comment: Appears in 2018 Workshop on Privacy in the Electronic Society (WPES'18
    corecore