国产 无码 综合区,色欲AV无码国产永久播放,无码天堂亚洲国产AV,国产日韩欧美女同一区二区

A Novel Proof-of-Reputation Consensus for Storage Allocation in Edge Blockchain Systems 精讀筆記(四)

這篇具有很好參考價(jià)值的文章主要介紹了A Novel Proof-of-Reputation Consensus for Storage Allocation in Edge Blockchain Systems 精讀筆記(四)。希望對大家有所幫助。如果存在錯(cuò)誤或未考慮完全的地方,請大家不吝賜教,您也可以點(diǎn)擊"舉報(bào)違法"按鈕提交疑問。

PERFORMANCE EVALUATION

A. Simulation Process and Settings
Since global reputation is standardized, nodes can use a variety of reputation mechanisms. In our simulations, all nodes use a simple personal reputation mechanism. We describe the mechanism in the perspective of an honest node i evaluates personal reputation pij of a node j.

  • Node i records the number of good evaluations goodij and total evaluations of node totij . If node i receives a piece of data from node j, then totij = totij + 1. If the data is complete, goodij = goodij + 1.
  • If node i gives a piece of data to j, totij = totij + 1. If node j increases pij after receives the data from i, then goodij = goodij + 1.
  • pij = goodij/totij .

We generate an operation list, representing the operations of the nodes in the network arranged in chronological order. From the perspective of node i, we introduce the following two operations.

  • Node i generates a new piece of data. Node i provides the data size, queries the latest block generator for storage locations, and stores the data in the corresponding locations.
  • Node i accesses a piece of existing data. Node i accesses the data from node j that owns the data to minimize rij/pij .

A. 模擬過程和設(shè)置
由于全局信譽(yù)是標(biāo)準(zhǔn)化的,節(jié)點(diǎn)可以使用多種信譽(yù)機(jī)制。在我們的模擬中,所有節(jié)點(diǎn)都使用簡單的個(gè)人聲譽(yù)機(jī)制。我們從誠實(shí)節(jié)點(diǎn) i 評估節(jié)點(diǎn) j 的個(gè)人聲譽(yù) pij 的角度來描述該機(jī)制。

  • 節(jié)點(diǎn) i 記錄良好評價(jià)的數(shù)量 goodij節(jié)點(diǎn) totij 的總評價(jià)。如果節(jié)點(diǎn) i 從節(jié)點(diǎn) j 接收到一條數(shù)據(jù),則 totij = totij + 1。如果數(shù)據(jù)完整,goodij = goodij + 1。

  • 如果節(jié)點(diǎn) i 給 j 一條數(shù)據(jù),totij = totij + 1。如果節(jié)點(diǎn) j 收到 i 的數(shù)據(jù)后增加 pij,則 goodij = goodij + 1。

  • pij = goodij/totij。

我們生成一個(gè)操作列表,表示按時(shí)間順序排列的網(wǎng)絡(luò)中節(jié)點(diǎn)的操作。從節(jié)點(diǎn) i 的角度,我們介紹以下兩個(gè)操作。

  • 節(jié)點(diǎn) i 生成一條新數(shù)據(jù)。節(jié)點(diǎn) i 提供數(shù)據(jù)大小,查詢最新的塊生成器的存儲(chǔ)位置,并將數(shù)據(jù)存儲(chǔ)在相應(yīng)的位置。
  • 節(jié)點(diǎn) i 訪問一條現(xiàn)有數(shù)據(jù)。節(jié)點(diǎn) i 從擁有數(shù)據(jù)的節(jié)點(diǎn) j 訪問數(shù)據(jù)以最小化 rij/pij 。

After each access, nodes related to the access update the personal reputation of each other. When the number of operations reaches a threshold, the node with the highest global reputation becomes a new block generator. It generates a new block and updates the global reputation.

We generate the total storage resource Wtol(i) for each node i by a normal distribution, N(1000000; 100000) KB. We generate the size of each piece of data by N(100; 30) KB. Each piece of data will be accessed by a uniformly random node multiple times, which are generated by N(10; 2). We generate an operation list, and the simulation runs according to that list. The number of generating operations divided by the number of access operations is approximately 0.1, and they appear evenly in the list. When the number of operations not on the blockchain reaches 110, the node that satisfies condition (13) generates a new block that records these operations. We terminate simulations when the number of blocks reaches 1000. We generate the test network G = (V, E) by the Watts-
Strogatz model [29]. This model generates networks that reveal properties of some real communication networks.

每次訪問后,與訪問相關(guān)的節(jié)點(diǎn)都會(huì)更新彼此的個(gè)人聲譽(yù)。當(dāng)操作次數(shù)達(dá)到閾值時(shí),全局聲譽(yù)最高的節(jié)點(diǎn)成為新的區(qū)塊生成器。它生成一個(gè)新塊并更新全局聲譽(yù)。

我們通過正態(tài)分布 N(1000000, 100000) KB 為每個(gè)節(jié)點(diǎn) i 生成總存儲(chǔ)資源 Wtol(i)。我們生成每條數(shù)據(jù)的大小 N(100, 30) KB。每條數(shù)據(jù)將被一個(gè)均勻隨機(jī)的節(jié)點(diǎn)多次訪問(次數(shù)),由 N(10, 2) 生成。我們生成一個(gè)操作列表,模擬根據(jù)該列表運(yùn)行。生成操作數(shù)除以訪問操作數(shù)約為 0.1,它們均勻地出現(xiàn)在列表中。當(dāng)不在區(qū)塊鏈上的操作達(dá)到 110 次時(shí),滿足條件 (13) 的節(jié)點(diǎn)會(huì)生成一個(gè)記錄這些操作的新區(qū)塊。當(dāng)塊數(shù)達(dá)到 1000 時(shí),我們終止模擬。我們通過 Watts- Strogatz 模型[29]生成測試網(wǎng)絡(luò) G = (V,E) 。該模型生成的網(wǎng)絡(luò)揭示了一些真實(shí)通信網(wǎng)絡(luò)的屬性。

We let honest nodes constantly give factual evaluations and provide complete data. To test the security of our design, we make some nodes malicious. Malicious nodes perform badmouthing attacks by conducting malicious evaluations after operations. In addition, malicious nodes may refuse to provide
data. The attack probability is 0.5, that is, there is a probability of 50% that malicious nodes make wrong evaluations, and malicious nodes refuse to provide data with a probability of 50%. Considering the worst case, we assume that all malicious nodes always make good evaluations with each other. We run simulations under environments that include the different proportions of malicious nodes. We only show measurements of honest nodes, since our system is designed for honest nodes.

We use the algorithm in [19] as the benchmark. In the following simulation, we compare the results of the algorithm and the benchmark.

A Novel Proof-of-Reputation Consensus for Storage Allocation in Edge Blockchain Systems 精讀筆記(四),# BlockchainPaper,區(qū)塊鏈,去中心化,算法評估,PoR,信譽(yù)機(jī)制

我們讓誠實(shí)的節(jié)點(diǎn)不斷地給出事實(shí)性的評價(jià)并提供完整的數(shù)據(jù)。 為了測試我們設(shè)計(jì)的安全性,我們使一些節(jié)點(diǎn)具有惡意。 惡意節(jié)點(diǎn)通過在操作后進(jìn)行惡意評估來進(jìn)行惡意攻擊。 此外,惡意節(jié)點(diǎn)可能會(huì)拒絕提供數(shù)據(jù)。 攻擊概率為0.5,即惡意節(jié)點(diǎn)做出錯(cuò)誤評估的概率為50%,惡意節(jié)點(diǎn)拒絕提供數(shù)據(jù)的概率為50%。 考慮到最壞的情況,我們假設(shè)所有惡意節(jié)點(diǎn)總是相互做出良好的評估。 我們在包含不同比例惡意節(jié)點(diǎn)的環(huán)境下運(yùn)行模擬。 我們只顯示誠實(shí)節(jié)點(diǎn)的測量值,因?yàn)槲覀兊南到y(tǒng)是為誠實(shí)節(jié)點(diǎn)設(shè)計(jì)的。

我們使用[19]中的算法作為基準(zhǔn)。 在下面的模擬中,我們比較了算法和基準(zhǔn)的結(jié)果。

B. Decentralization Test

We count the number of blocks generated by each node, and use a histogram in Fig. 2 to show the distribution of the number under different proportions of malicious nodes. The reason for the distribution of a certain number of nodes in the range of 0 to 19 is that all malicious nodes are distributed in this range. It is worth mentioning that in all simulations, malicious nodes can generate up to 2 blocks out of 1000. Very few honest nodes generate more than 100 blocks or less than 20 blocks, and no node generates more than 120 blocks. Most honest nodes can generate 40 to 100 blocks. These phenomena show that in the PoR blockchain, most honest nodes can generate close to the average number of blocks, and very few nodes generate a small or large number of blocks. Thus, we can conclude that our PoR blockchain is decentralized, and it can ensure that the block generators are honest with a high probability.

B. 去中心化測試

我們統(tǒng)計(jì)每個(gè)節(jié)點(diǎn)產(chǎn)生的區(qū)塊數(shù)量,并使用圖 2 中的直方圖來展示不同比例的惡意節(jié)點(diǎn)下數(shù)量的分布情況。 之所以會(huì)在 0 到 19 范圍內(nèi)分布一定數(shù)量的節(jié)點(diǎn),是因?yàn)樗械膼阂夤?jié)點(diǎn)都分布在這個(gè)范圍內(nèi)。 值得一提的是,在所有的模擬中,惡意節(jié)點(diǎn)最多可以產(chǎn)生1000個(gè)區(qū)塊中的2個(gè)。很少有誠實(shí)節(jié)點(diǎn)產(chǎn)生超過100個(gè)區(qū)塊或少于20個(gè)區(qū)塊,并且沒有節(jié)點(diǎn)產(chǎn)生超過120個(gè)區(qū)塊。 大多數(shù)誠實(shí)節(jié)點(diǎn)可以生成 40 到 100 個(gè)塊。 這些現(xiàn)象表明,在 PoR 區(qū)塊鏈中,大多數(shù)誠實(shí)節(jié)點(diǎn)可以產(chǎn)生接近平均數(shù)量的區(qū)塊,而極少數(shù)節(jié)點(diǎn)產(chǎn)生少量或大量區(qū)塊。 因此,我們可以得出結(jié)論,我們的 PoR 區(qū)塊鏈?zhǔn)侨ブ行幕?,它可以確保區(qū)塊生成者是誠實(shí)的,并且概率很高。

A Novel Proof-of-Reputation Consensus for Storage Allocation in Edge Blockchain Systems 精讀筆記(四),# BlockchainPaper,區(qū)塊鏈,去中心化,算法評估,PoR,信譽(yù)機(jī)制

C. Fairness Test

We use the Gini coefficient1 of the used storage ratio to show the fairness of our system. Once a new block is generated, we compute the Gini coefficient of the used storage ratio for all honest nodes. In Fig. 3(b), in different proportions of malicious nodes, the Gini coefficients of all tests decrease with blocks increase. Although the Gini coefficients are unstable at the beginning, it decreases as the block is generated, and finally converges to less than 0.2. The reason for this phenomenon is similar to the reason for the phenomenon Fig. 3(a), reputation gaps in the initial stages also affect the balance of storage allocation results. As blocks increase, the used storage ratio balances. Therefore, we can conclude that our algorithm is fair in the long term.

C. 公平測試

我們使用已用存儲(chǔ)比率的基尼系數(shù)1 來顯示我們系統(tǒng)的公平性。 一旦生成了一個(gè)新塊,我們就會(huì)計(jì)算所有誠實(shí)節(jié)點(diǎn)的已用存儲(chǔ)比率的基尼系數(shù)。 在圖 3(b)中,在不同比例的惡意節(jié)點(diǎn)中,所有測試的 Gini 系數(shù)隨著塊的增加而減小。 雖然一開始基尼系數(shù)不穩(wěn)定,但隨著塊的產(chǎn)生而降低,最終收斂到小于0.2。 這種現(xiàn)象的原因與圖3(a)現(xiàn)象的原因相似,初始階段的聲譽(yù)差距也會(huì)影響存儲(chǔ)分配結(jié)果的平衡。 隨著塊的增加,使用的存儲(chǔ)比率平衡。 因此,我們可以得出結(jié)論,我們的算法從長遠(yuǎn)來看是公平的。

D. Efficiency Test

To show the efficiency of our algorithm, we count the average hop-count distance to access data. Since the benchmark is an efficient algorithm, we can conclude that our algorithm is efficient if the average hop-count distance of data request computed by these two algorithms is close. In Fig. 4(a), the average hop-count distance computed by our algorithm rapidly reaches 2, then increases slowly and stabilizes at 2.2. Fig.4(b) shows that the growth rate of the average hop-count distance computed by the benchmark algorithm is relatively slow, and the average eventually tended to around 2.2. The average access distance of our algorithm is unstable at the beginning, and after rapid stabilization, it is close to the result obtained by the benchmark.

A Novel Proof-of-Reputation Consensus for Storage Allocation in Edge Blockchain Systems 精讀筆記(四),# BlockchainPaper,區(qū)塊鏈,去中心化,算法評估,PoR,信譽(yù)機(jī)制

D. 效率測試

為了展示我們算法的效率,我們計(jì)算訪問數(shù)據(jù)的平均跳數(shù)距離。 由于基準(zhǔn)是一種有效的算法,如果這兩種算法計(jì)算的數(shù)據(jù)請求的平均跳數(shù)距離接近,我們可以得出結(jié)論,我們的算法是有效的。 在圖 4(a) 中,我們的算法計(jì)算的平均跳數(shù)距離迅速達(dá)到 2,然后緩慢增加并穩(wěn)定在 2.2。 圖 4(b) 表明,基準(zhǔn)算法計(jì)算的平均跳數(shù)距離的增長速度相對較慢,平均值最終趨于 2.2 左右。 我們算法的平均訪問距離一開始是不穩(wěn)定的,經(jīng)過快速穩(wěn)定后,接近基準(zhǔn)得到的結(jié)果。

E. Successful Access Rate Test

The successful access rate test reveals the reliability of our algorithm. The reliability requires the algorithm to store data to honest nodes, and it is supposed to improve the successful access rate. Once a new block is generated, we compute the successful rate of accessing data. In Fig. 5(a), the successful access rate is above 99.9% in all simulations. In Fig. 5(b), the successful access rate decreases significantly with the increase in the proportion of malicious nodes. When the network includes 40% malicious nodes, compared with the benchmark, our algorithm improves the successful access rate by 14.6%. Therefore, our algorithm greatly improves the successful access rate compared with the benchmark and meets the reliability requirements.

A Novel Proof-of-Reputation Consensus for Storage Allocation in Edge Blockchain Systems 精讀筆記(四),# BlockchainPaper,區(qū)塊鏈,去中心化,算法評估,PoR,信譽(yù)機(jī)制

E. 成功的訪問速率測試

成功的訪問率測試揭示了我們算法的可靠性可靠性要求算法將數(shù)據(jù)存儲(chǔ)到誠實(shí)節(jié)點(diǎn),并且應(yīng)該提高訪問成功率。 生成新塊后,我們計(jì)算訪問數(shù)據(jù)的成功率。 在圖 5(a) 中,所有模擬的成功訪問率都在 99.9% 以上。 在圖 5(b)中,成功訪問率隨著惡意節(jié)點(diǎn)比例的增加而顯著下降。 當(dāng)網(wǎng)絡(luò)中包含 40% 的惡意節(jié)點(diǎn)時(shí),與基準(zhǔn)相比,我們的算法提高了 14.6% 的成功訪問率。 因此,與基準(zhǔn)相比,我們的算法大大提高了訪問成功率,滿足了可靠性要求。

CONCLUSION AND FUTURE WORK

In this paper, we have proposed a reputation mechanism that consists of personal reputation and global reputation. All nodes evaluate others by personal reputations, and they obtain global reputations by aggregating the same personal reputations of all nodes. We have designed a storage allocation mechanism that satisfies fairness, efficiency, and reliability. We have constructed a PoS blockchain based on our reputation mechanism, which costs low computing power and avoids centralization. Our simulations show that our system meets our expectations from multiple measurements. The storage allocation algorithm improves the access success rate while maintaining fairness and efficiency. In the case of malicious nodes that may not provide data, our system can achieve a 99.9% success rate of accessing data. The simulations also show that the PoR blockchain prevents centralization and ensures that the block generators are honest with a high probability.
In edge networks, new devices and servers will replace old devices and servers. It requires us to manage the joining and leaving of nodes. In addition, we use a permissioned blockchain to manage access to the blockchain to prevent attacks. Based on the above two concerns, we will further improve the permissioned blockchain network protocol to manage nodes joining and leaving the network, and eliminate nodes with lower reputations.

在本文中,我們提出了一種由個(gè)人聲譽(yù)和全局聲譽(yù)組成的聲譽(yù)機(jī)制。所有節(jié)點(diǎn)通過個(gè)人聲譽(yù)評價(jià)他人,通過聚合所有節(jié)點(diǎn)相同的個(gè)人聲譽(yù)獲得全局聲譽(yù)。我們設(shè)計(jì)了一種滿足公平、高效、可靠的存儲(chǔ)分配機(jī)制。我們基于我們的信譽(yù)機(jī)制構(gòu)建了一個(gè) PoS 區(qū)塊鏈,計(jì)算能力成本低,避免了中心化。我們的模擬表明,我們的系統(tǒng)符合我們對多次測量的期望。存儲(chǔ)分配算法在保持公平和效率的同時(shí)提高了訪問成功率。在可能不提供數(shù)據(jù)的惡意節(jié)點(diǎn)的情況下,我們的系統(tǒng)可以達(dá)到99.9%的數(shù)據(jù)訪問成功率。模擬還表明,PoR 區(qū)塊鏈可以防止中心化,并確保塊生成器很可能是誠實(shí)的。

在邊緣網(wǎng)絡(luò)中,新設(shè)備和服務(wù)器將取代舊設(shè)備和服務(wù)器。它需要我們管理節(jié)點(diǎn)的加入和離開。此外,我們使用許可的區(qū)塊鏈來管理對區(qū)塊鏈的訪問以防止攻擊?;谝陨蟽蓚€(gè)考慮,我們將進(jìn)一步完善許可區(qū)塊鏈網(wǎng)絡(luò)協(xié)議,管理節(jié)點(diǎn)加入和離開網(wǎng)絡(luò),淘汰信譽(yù)度較低的節(jié)點(diǎn)。

ACKNOWLEDGMENT

The work in this paper was supported in part by the grant from US National Science Foundation under grant numbers 1513719 and 1730291.

REFERENCES

[1] W. Yu, F. Liang, X. He, W. G. Hatcher, C. Lu, J. Lin, and X. Yang, “A survey on the edge computing for the internet of things,” IEEE access, vol. 6, pp. 6900–6919, 2017.
[2] P. Beckman, R. Sankaran, C. Catlett, N. Ferrier, R. Jacob, and M. Papka, “Waggle: An open sensor platform for edge computing,” in 2016 IEEE SENSORS. IEEE, 2016, pp. 1–3.
[3] X. Cheng, J. Liu, and C. Dale, “Understanding the characteristics of internet short video sharing: A youtube-based measurement study,” IEEE transactions on multimedia, vol. 15, no. 5, pp. 1184–1194, 2013.
[4] L. Mendiboure, M. A. Chalouf, and F. Krief, “Survey on blockchainbased applications in internet of vehicles,” Computers & Electrical Engineering, vol. 84, p. 106646, 2020.
[5] W. Sun, J. Liu, Y. Yue, and P. Wang, “Joint resource allocation and incentive design for blockchain-based mobile edge computing,” IEEE Transactions on Wireless Communications, vol. 19, no. 9, pp. 6050– 6064, 2020.
[6] Y. Yuan and F.-Y. Wang, “Towards blockchain-based intelligent transportation systems,” in 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC). IEEE, 2016, pp. 2663–2668.
[7] P. Kochovski, S. Gec, V. Stankovski, M. Bajec, and P. D. Drobintsev, “Trust management in a blockchain based fog computing platform with trustless smart oracles,” Future Generation Computer Systems, vol. 101, pp. 747–759, 2019.
[8] S. Nakamoto et al., “Bitcoin: A peer-to-peer electronic cash system,” 2008.
[9] T. Swanson, “Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems,” Report, available online, 2015.
[10] G. Wood et al., “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum project yellow paper, vol. 151, no. 2014, pp. 1–32, 2014.

[11] M. Liu, K. Wu, and J. J. Xu, “How will blockchain technology impact auditing and accounting: Permissionless versus permissionedblockchain,” Current Issues in Auditing, vol. 13, no. 2, pp. A19–A29, 2019.
[12] C. Cachin et al., “Architecture of the hyperledger blockchain fabric,” in Workshop on distributed cryptocurrencies and consensus ledgers, vol. 310, no. 4. Chicago, IL, 2016.
[13] M. Hearn, “Corda: A distributed ledger,” Corda Technical White Paper, vol. 2016, 2016.
[14] F. Gai, B. Wang, W. Deng, and W. Peng, “Proof of reputation: A reputation based consensus protocol for peer-to-peer network,” in International Conference on Database Systems for Advanced Applications. Springer, 2018, pp. 666–681.
[15] J. Yu, D. Kozhaya, J. Decouchant, and P. Esteves-Verissimo, “Repucoin: Your reputation is your power,” IEEE Transactions on Computers, vol. 68, no. 8, pp. 1225–1237, 2019.
[16] M. T. de Oliveira, L. H. Reis, D. S. Medeiros, R. C. Carrano, S. D. Olabarriaga, and D. M. Mattos, “Blockchain reputation-based consensus: A scalable and resilient mechanism for distributed mistrusting applications,” Computer Networks, vol. 179, p. 107367, 2020.
[17] E. K. Wang, Z. Liang, C.-M. Chen, S. Kumari, and M. K. Khan, “Porx: A reputation incentive scheme for blockchain consensus of iiot,” Future Generation Computer Systems, vol. 102, pp. 140–151, 2020.

[18] G. Qiao, S. Leng, H. Chai, A. Asadi, and Y. Zhang, “Blockchain empowered resource trading in mobile edge computing and networks,” in ICC 2019-2019 IEEE International Conference on Communications (ICC). IEEE, 2019, pp. 1–6.
[19] Y. Huang, J. Zhang, J. Duan, B. Xiao, F. Ye, and Y. Yang, “Resource allocation and consensus on edge blockchain in pervasive edge computing environments,” in 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2019, pp. 1476–1486.
[20] X. Lin, J. Wu, S. Mumtaz, S. Garg, J. Li, and M. Guizani, “Blockchainbased on-demand computing resource trading in iov-assisted smart city,” IEEE Transactions on Emerging Topics in Computing, 2020.
[21] F. Ayaz, Z. Sheng, D. Tian, and Y. L. Guan, “A proof-of-quality-factor (poqf) based blockchain and edge computing for vehicular message dissemination,” IEEE Internet of Things Journal, 2020.
[22] X. Huang, R. Yu, J. Kang, and Y. Zhang, “Distributed reputation management for secure and efficient vehicular edge computing and networks,” IEEE Access, vol. 5, pp. 25 408–25 420, 2017.
[23] M. Liu, F. R. Yu, Y. Teng, V. C. Leung, and M. Song, “Distributed resource allocation in blockchain-based video streaming systems with mobile edge computing,” IEEE Transactions on Wireless Communications, vol. 18, no. 1, pp. 695–708, 2018.
[24] L. Xiao, Y. Ding, D. Jiang, J. Huang, D. Wang, J. Li, and H. V. Poor, “A reinforcement learning and blockchain-based trust mechanism for edge networks,” IEEE Transactions on Communications, 2020.
[25] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The eigentrust algorithm for reputation management in p2p networks,” in Proceedings of the 12th international conference on World Wide Web, 2003, pp. 640– 651.
[26] T. Haveliwala and S. Kamvar, “The second eigenvalue of the google matrix,” Stanford, Tech. Rep., 2003.
[27] G. Cornu′ejols, G. Nemhauser, and L. Wolsey, “The uncapicitated facility location problem,” Cornell University Operations Research and Industrial Engineering, Tech. Rep., 1983.
[28] S. Li, “A 1.488 approximation algorithm for the uncapacitated facility location problem,” Information and Computation, vol. 222, pp. 45–58, 2013.
[29] D. J. Watts and S. H. Strogatz, “Collective dynamics of ‘smallworld’networks,” nature, vol. 393, no. 6684, pp. 440–442, 1998.
[30] Y. Huang, X. Song, F. Ye, Y. Yang, and X. Li, “Fair caching algorithms for peer data sharing in pervasive edge computing environments,” in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017, pp. 605–614.
[31] D. Wei, K. Zhu, and X. Wang, “Fairness-aware cooperative caching scheme for mobile social networks,” in 2014 IEEE international conference on communications (ICC). IEEE, 2014, pp. 2484–2489.


  1. The Gini coefficient is widely used to measure the statistical disparities, and previous work [30], [31] used it to measure the fairness properties in edge environments.基尼系數(shù)被廣泛用于衡量統(tǒng)計(jì)差異,之前的工作[30]、[31]用它來衡量邊緣環(huán)境中的公平性。 ?? ??文章來源地址http://www.zghlxwxcb.cn/news/detail-698992.html

到了這里,關(guān)于A Novel Proof-of-Reputation Consensus for Storage Allocation in Edge Blockchain Systems 精讀筆記(四)的文章就介紹完了。如果您還想了解更多內(nèi)容,請?jiān)谟疑辖撬阉鱐OY模板網(wǎng)以前的文章或繼續(xù)瀏覽下面的相關(guān)文章,希望大家以后多多支持TOY模板網(wǎng)!

本文來自互聯(lián)網(wǎng)用戶投稿,該文觀點(diǎn)僅代表作者本人,不代表本站立場。本站僅提供信息存儲(chǔ)空間服務(wù),不擁有所有權(quán),不承擔(dān)相關(guān)法律責(zé)任。如若轉(zhuǎn)載,請注明出處: 如若內(nèi)容造成侵權(quán)/違法違規(guī)/事實(shí)不符,請點(diǎn)擊違法舉報(bào)進(jìn)行投訴反饋,一經(jīng)查實(shí),立即刪除!

領(lǐng)支付寶紅包贊助服務(wù)器費(fèi)用

相關(guān)文章

  • 挑戰(zhàn)杯 python區(qū)塊鏈實(shí)現(xiàn) - proof of work工作量證明共識(shí)算法

    挑戰(zhàn)杯 python區(qū)塊鏈實(shí)現(xiàn) - proof of work工作量證明共識(shí)算法

    ?? 優(yōu)質(zhì)競賽項(xiàng)目系列,今天要分享的是 python區(qū)塊鏈實(shí)現(xiàn) - proof of work工作量證明共識(shí)算法 該項(xiàng)目較為新穎,適合作為競賽課題方向,學(xué)長非常推薦! ?? 更多資料, 項(xiàng)目分享: https://gitee.com/dancheng-senior/postgraduate 學(xué)長以比特幣的結(jié)構(gòu)向大家詳解區(qū)塊鏈的組成部分 previous hash

    2024年02月21日
    瀏覽(25)
  • 【畢設(shè)教程】python區(qū)塊鏈實(shí)現(xiàn) - proof of work工作量證明共識(shí)算法

    【畢設(shè)教程】python區(qū)塊鏈實(shí)現(xiàn) - proof of work工作量證明共識(shí)算法

    Hi,大家好,這里是丹成學(xué)長,今天向同學(xué)們介紹如何構(gòu)建一個(gè)區(qū)塊鏈系統(tǒng)作為畢設(shè),區(qū)塊鏈的原理 ?? 選題指導(dǎo), 項(xiàng)目分享: https://gitee.com/dancheng-senior/project-sharing-1/blob/master/%E6%AF%95%E8%AE%BE%E6%8C%87%E5%AF%BC/README.md 學(xué)長以比特幣的結(jié)構(gòu)向大家詳解區(qū)塊鏈的組成部分 previous hash(前

    2024年01月21日
    瀏覽(21)
  • 計(jì)算機(jī)競賽python區(qū)塊鏈實(shí)現(xiàn) - proof of work工作量證明共識(shí)算法

    計(jì)算機(jī)競賽python區(qū)塊鏈實(shí)現(xiàn) - proof of work工作量證明共識(shí)算法

    ?? 優(yōu)質(zhì)競賽項(xiàng)目系列,今天要分享的是 python區(qū)塊鏈實(shí)現(xiàn) - proof of work工作量證明共識(shí)算法 該項(xiàng)目較為新穎,適合作為競賽課題方向,學(xué)長非常推薦! ?? 更多資料, 項(xiàng)目分享: https://gitee.com/dancheng-senior/postgraduate 學(xué)長以比特幣的結(jié)構(gòu)向大家詳解區(qū)塊鏈的組成部分 previous hash

    2024年02月05日
    瀏覽(27)
  • 互聯(lián)網(wǎng)加競賽 python區(qū)塊鏈實(shí)現(xiàn) - proof of work工作量證明共識(shí)算法

    互聯(lián)網(wǎng)加競賽 python區(qū)塊鏈實(shí)現(xiàn) - proof of work工作量證明共識(shí)算法

    ?? 優(yōu)質(zhì)競賽項(xiàng)目系列,今天要分享的是 python區(qū)塊鏈實(shí)現(xiàn) - proof of work工作量證明共識(shí)算法 該項(xiàng)目較為新穎,適合作為競賽課題方向,學(xué)長非常推薦! ?? 更多資料, 項(xiàng)目分享: https://gitee.com/dancheng-senior/postgraduate 學(xué)長以比特幣的結(jié)構(gòu)向大家詳解區(qū)塊鏈的組成部分 previous hash

    2024年02月04日
    瀏覽(25)
  • [論文筆記] In Search of an Understandable Consensus Algorithm (Extended Version)

    [論文筆記] In Search of an Understandable Consensus Algorithm (Extended Version)

    尋找可理解的共識(shí)算法 (擴(kuò)展版) [Extended Paper] [Original Paper] ATC’14 (Original) Raft 是一個(gè)用于 管理復(fù)制日志的共識(shí)算法 . Raft 更 易于理解 , 且為構(gòu)建實(shí)際的系統(tǒng)提供了更好的基礎(chǔ). Raft 分離了共識(shí)的關(guān)鍵要素, 如領(lǐng)導(dǎo)者選舉、日志復(fù)制、安全性 ; 并通過更強(qiáng)的一致性來減少狀態(tài)數(shù)量

    2024年02月02日
    瀏覽(18)
  • 論文閱讀:FoundationPose: Unified 6D Pose Estimation and Tracking of Novel Objects-6DoF位姿估計(jì)

    論文閱讀:FoundationPose: Unified 6D Pose Estimation and Tracking of Novel Objects-6DoF位姿估計(jì)

    CVPR2024滿分文章,英偉達(dá)團(tuán)隊(duì)工作。 文章地址:https://arxiv.org/pdf/2312.08344.pdf 代碼地址:https://github.com/NVlabs/FoundationPose 提出FoundationPose,能用于6D位姿估計(jì)與跟蹤,無論模型是否可用都支持。只需要CAD模型或少量參考圖像就能進(jìn)行zero-shot測試,泛化能力依靠大規(guī)模訓(xùn)練, LLM 和

    2024年04月29日
    瀏覽(17)
  • A Survey of IoT Applications in Blockchain Systems Architecture,Consensus,and Traffic Modeling 論文學(xué)習(xí)

    A Survey of IoT Applications in Blockchain Systems Architecture,Consensus,and Traffic Modeling 論文學(xué)習(xí)

    A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling ACM Computing Surveys, 2020 LAPHOU LAO, ZECHENG LI, SONGLIN HOU, and BIN XIAO, The Hong Kong Polytechnic University, China SONGTAO GUO, Chongqing University, China YUANYUAN YANG, Stony Brook University, America 本文介紹了使 用區(qū)塊鏈技術(shù)的物聯(lián)網(wǎng)應(yīng)用

    2023年04月12日
    瀏覽(34)
  • 圖像融合論文閱讀:LRRNet: A Novel Representation Learning Guided Fusion Network for Infrared and Visible Imag

    圖像融合論文閱讀:LRRNet: A Novel Representation Learning Guided Fusion Network for Infrared and Visible Imag

    @ARTICLE{10105495, author={Li, Hui and Xu, Tianyang and Wu, Xiao-Jun and Lu, Jiwen and Kittler, Josef}, journal={IEEE Transactions on Pattern Analysis and Machine Intelligence}, title={LRRNet: A Novel Representation Learning Guided Fusion Network for Infrared and Visible Images}, year={2023}, volume={45}, number={9}, pages={11040-11052}, doi={10.1109/TPAMI.2

    2024年01月21日
    瀏覽(24)
  • GPS-Gaussian:Generalizable Pixel-wise 3D Gaussian Splatting for Real-time Human Novel View Synthesis

    GPS-Gaussian:Generalizable Pixel-wise 3D Gaussian Splatting for Real-time Human Novel View Synthesis

    1)仿射變換 quad 所謂仿射變換,就是向量經(jīng)過一次線性變換加一次平移變換,用公式可以表示為: quad 其中,p為變換前原始向量,q為變換后目標(biāo)向量,A為線性變換矩陣,b為平移變換向量。 quad 對于二維圖像而言,p和q分別是某個(gè)像素點(diǎn)在原圖和仿射變換后的圖中的未知(

    2024年02月03日
    瀏覽(13)
  • Thread-local storage is not supported for the current target

    Thread-local storage is not supported for the current target

    xcode編譯時(shí)遇到上述報(bào)錯(cuò),解決辦法:調(diào)整最低系統(tǒng)版本配置 ? ?

    2024年02月16日
    瀏覽(21)

覺得文章有用就打賞一下文章作者

支付寶掃一掃打賞

博客贊助

微信掃一掃打賞

請作者喝杯咖啡吧~博客贊助

支付寶掃一掃領(lǐng)取紅包,優(yōu)惠每天領(lǐng)

二維碼1

領(lǐng)取紅包

二維碼2

領(lǐng)紅包