63,067 results
Search Results
2. Hostile Blockchain Takeovers (Short Paper)
- Author
-
Joseph Bonneau
- Subjects
Blockchain ,Computer science ,Process (engineering) ,05 social sciences ,Short paper ,Face (sociological concept) ,02 engineering and technology ,Adversary ,Computer security ,computer.software_genre ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer ,Protocol (object-oriented programming) ,050203 business & management - Abstract
Most research modelling Bitcoin-style decentralised consensus protocols has assumed profit-motivated participants. Complementary to this analysis, we revisit the notion of attackers with an extrinsic motivation to disrupt the consensus process (Goldfinger attacks). We outline several routes for obtaining a majority of decision-making power in the consensus protocol (a hostile takeover). Our analysis suggests several fundamental differences between proof-of-work and proof-of-stake systems in the face of such an adversary.
- Published
- 2019
3. An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature
- Author
-
Pramote Kuacharoen, Puchong Subpratatsavee, Kasetsart University (KU), National Institute of Development Administration |Bangkok] (NIDA), Khalid Saeed, Václav Snášel, and TC 8
- Subjects
Government ,Authentication ,Computer science ,business.industry ,[SHS.INFO]Humanities and Social Sciences/Library and information sciences ,Paper based ,Computer security ,computer.software_genre ,Barcode ,law.invention ,Software ,Digital signature ,paper-based document ,digital signature ,law ,Loan ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,authentication ,[INFO]Computer Science [cs] ,HC2D barcode ,Communication source ,business ,computer - Abstract
Part 8: Pattern Recognition and Image Processing; International audience; Paper-based documents are important and still widely used in government agencies and private entities as some documents cannot be replaced by electronic documents. These include loan agreements, dispatch or contracts, household registrations and passports. They must be paper-based. Paper-based documents can be easily forged with a printer and a scanner, and imaging software can easily edit them. This paper presents a paper-based document authentication by applying a digital signature and HC2D barcode to verify the integrity of the text message and the sender of the document. This is useful both for a quick inspection of documents with large quantities and monitoring that may help prevent fraud and forgery which may have occurred.
- Published
- 2014
4. A Short Paper on the Incentives to Share Private Information for Population Estimates
- Author
-
Jens Grossklags, Patrick Loiseau, and Michela Chessa
- Subjects
Population estimate ,Incentive ,Analytics ,business.industry ,Computer science ,Internet privacy ,Short paper ,Data analysis ,business ,Computer security ,computer.software_genre ,Private information retrieval ,computer - Abstract
Consumers are often willing to contribute their personal data for analytics projects that may create new insights into societal problems. However, consumers also have justified privacy concerns about the release of their data.
- Published
- 2015
5. Item Differential in Computer Based and Paper Based Versions of a High Stakes Tertiary Entrance Test: Diagrams and the Problem of Annotation
- Author
-
Brad Jackel
- Subjects
Diagrammatic reasoning ,Annotation ,Multimedia ,business.industry ,Computer science ,Computer based ,Standardized test ,Paper based ,Artificial intelligence ,business ,computer.software_genre ,computer ,Natural language processing - Abstract
This paper presents the results from a tertiary entrance test that was delivered to two groups of candidates, one as a paper based test and the other as a computer based test. Item level differential reveals a pattern that appears related to item type: questions based on diagrammatic stimulus show a pattern of increased difficulty when delivered on computer. Differential in performance was not present in other sections of the test and it would appear unlikely to be explained by demographic differences between the groups. It is suggested this differential is due to the inability of the candidates to freely annotate on the stimulus when delivered on computer screen. More work needs to be done on considering the role of annotation as a problem solving strategy in high-stakes testing, in particular with certain kinds of stimulus, such as diagrams.
- Published
- 2014
6. Survey of Pen-and-Paper Computing
- Author
-
Jürgen Steimle
- Subjects
Engineering ,Paper document ,Work (electrical) ,business.industry ,Interface (computing) ,Perspective (graphical) ,Optical character recognition ,Paper computing ,computer.software_genre ,business ,Data science ,computer ,Field (computer science) - Abstract
Over several decades, a large body of research has been established that focuses on Pen-and-Paper Computing. This chapter reviews previous work of the field – both from a technological and interface perspective – and discusses future directions of research and development.
- Published
- 2012
7. Evaluating Paper Prototype for Tabletop Collaborative Game Applications
- Author
-
Ricardo Nakamura, Mauricio Cirelli, Lucia Vilela Leite Filgueiras, and Marylia Gutierrez
- Subjects
Game design ,Multimedia ,InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI) ,Computer science ,Human–computer interaction ,Interface (Java) ,Collaborative game ,User interface ,computer.software_genre ,computer ,Gesture ,Paper prototyping - Abstract
Identifying the natural gestures for a tabletop application is one of the most challenging tasks developers must accomplish in order to achieve a good system user interface. This problem is even more difficult in a collaborative environment. Cooperative Gestures allow richer interaction and must be evaluated when designing a new multi-user tabletop interface. In this paper we present the use of paper prototyping to analyze user interaction on a tabletop collaborative game application. Our results show that it is possible to extract natural gestures for an application using this technique, regardless of some limitations.
- Published
- 2013
8. Users Can Do Better with PDAs Than Paper: A Usability Study of PDA-Based vs. Paper-Based Nursing Documentation Systems
- Author
-
Celia R. Colón-Rivera, Carlos Martinez, Néstor J. Rodríguez, José A. Borges, Aixa Ardín, Carlos Perez, and Gilberto Crespo
- Subjects
Nursing staff ,Multimedia ,business.industry ,Computer science ,Medical record ,Usability ,Paper based ,computer.software_genre ,Patient record ,Health informatics ,Nursing documentation ,business ,Mobile device ,computer - Abstract
Personal Digital Assistants (PDAs) are a viable technology for providing access to Electronic Medical Records at the point-of-care. However, acceptance of this technology by clinicians will depend on how easy they can make the transition from the system they normally use to a PDA-based system. Since many hospitals are still using paper-based patient record systems this study intends to provide some insight on the aspects that need to be considered in the transition from a paper-based system to a PDA-based system. The study compares the interaction of nurses with PDA-based and paper-based nursing documentation systems in terms of performance and subjective satisfaction. Twenty staff nurses from a metropolitan hospital performed twelve tasks on each system. The study supports the conclusion that a PDA-based nursing documentation system can be superior to a paper-based system in term of performance for tasks that don't required writing notes. Nurses were significantly more satisfied with the PDA-based system than with the paper-based system with every interaction and system aspect evaluated on the study. In general the results of the study provide hard evidence to predict an easy transition for nurses from a paper-based system to a PDA-based system nursing documentation system.
- Published
- 2009
9. An Intelligent Shopping List - Combining Digital Paper with Product Ontologies
- Author
-
Sandra Thieme, Gerrit Kahl, Andreas Dengel, and Marcus Liwicki
- Subjects
Product (business) ,World Wide Web ,Information extraction ,Parsing ,Computer science ,Order (business) ,Shopping mall ,Ontology ,Ontology (information science) ,computer.software_genre ,computer ,Shopping list ,Digital paper - Abstract
This paper proposes a novel system which automatically extracts the intended items to buy from a hand written shopping list. This intelligent shopping list relies on an ontology of the products which is provided by the shopping mall. In our scenario the shopping list is written on digital Anoto paper. After transmitting the hand written strokes to the computer, the list items are recognized by a hand writing recognition system. Next, the recognized text is parsed in order to detect the amount and the desired item. This is then matched to the underlying ontology and the intended order is recognized. Our current prototype works on an ontology of 300 products. In our real-world experiments we asked 20 persons to write shopping lists without any constrains.
- Published
- 2011
10. Towards Secure Bioinformatics Services (Short Paper)
- Author
-
Heike Schröder, Björn Deiseroth, Martin Franz, Stefan Katzenbeisser, Somesh Jha, and Kay Hamacher
- Subjects
Sequence ,Oblivious transfer ,Computer science ,Computation ,String (computer science) ,Short paper ,Forward algorithm ,Intellectual property ,Bioinformatics ,Hidden Markov model ,Computer security ,computer.software_genre ,computer - Abstract
In this paper we show how privacy of genomic sequences can be protected while they are analyzed using Hidden Markov Models (HMM), which is commonly done in bioinformatics to detect certain non-beneficial patterns in the genome. Besides offering strong privacy guarantees, our solution also allows protecting the intellectual property of the parties involved, which makes the solution viable for implementation of secure bioinformatics services. In particular, we show how two mutually mistrusting parties can obliviously run the forward algorithm in a setup where one party knows a HMM and another party knows a genomic string; while the parties learn whether the model fits the genome, they neither have to disclose the parameterization of the model nor the sequence to each other. Despite the huge number of arithmetic operations required to solve the problem, we experimentally show that HMMs with sizes of practical importance can obliviously be evaluated using computational resources typically found in medical laboratories. As a central technical contribution, we give improved protocols for secure and numerically stable computations on non-integer values.
- Published
- 2012
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.