Blockchain systems, technologies, and applications: A methodology perspective
In the past decade, blockchain has shown a promising vision to build trust without any
powerful third party in a secure, decentralized and scalable manner. However, due to the …
powerful third party in a secure, decentralized and scalable manner. However, due to the …
A sharding scheme-based many-objective optimization algorithm for enhancing security in blockchain-enabled industrial internet of things
X Cai, S Geng, J Zhang, D Wu, Z Cui… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
While the industrial Internet of Things (IIoT) can support efficient control of the physical world
through large amounts of industrial data, data security has been a challenge due to various …
through large amounts of industrial data, data security has been a challenge due to various …
Multi-transmitter coded caching networks with transmitter-side knowledge of file popularity
This work presents a new way of exploiting non-uniform file popularity in coded caching
networks. Focusing on a fully-connected fully-interfering wireless setting with multiple cache …
networks. Focusing on a fully-connected fully-interfering wireless setting with multiple cache …
Multi-Transmitter Coded Caching Networks with Transmitter-side Knowledge of File Popularity
This work presents a new way of exploiting non-uniform file popularity in coded caching
networks. Focusing on a fully-connected fully-interfering wireless setting with multiple cache …
networks. Focusing on a fully-connected fully-interfering wireless setting with multiple cache …