نتایج جستجو برای: standards of proof

تعداد نتایج: 21173630  

Journal: :IACR Cryptology ePrint Archive 2016
Aggelos Kiayias Ioannis Konstantinou Alexander Russell Bernardo Machado David Roman Oliynykov

We present a provably-secure blockchain protocol based on “proof of stake.” As far as we are aware, this is the first proof of stake blockchain protocol which provides rigorous security guarantees. The security properties of the system are analyzed in the model of [9] and are comparable to the ones possessed by the bitcoin blockchain protocol which utilizes proof of work. Furthermore, an incent...

ژورنال: مطالعات تفسیری 2012

Regardless of the view of those philosophers like Plantinga who see no need in any proof for the existence of God, scholars have presented four views on Quranic way of proving the existence of God including demonstration, awakening, implication and clear demonstration. Describing and criticizing the views in detail, the author has viewed differently. God has regarded the level of the addressee`...

2010
Wassila Ouerdane Nicolas Maudet Alexis Tsoukiàs

Usually, in argumentation, the proof-standards that are used are fixed a priori by the procedure. However (multicriteria) decision-aiding is a context where it may be modified dynamically during the process, depending on the responses of the decisionmaker. The expert indeed needs to adapt and refine its choice of an appropriate method of aggregating arguments pros and cons, so that it fits the ...

Quadrature-axis reactance for various reasons comes into account as one of the most important parameters of salient pole synchronous machine. There are several common standard methods for measuring this parameter that also have been explained with some details in the standards, scientific papers and text books. One of these methods is the maximum lagging current test that is done simply at no-l...

Journal: :bulletin of the iranian mathematical society 2013
a. mahdipour shirayeh h. eshraghi

to demonstrate more visibly the close relation between thecontinuity and integrability, a new proof for the banach-zareckitheorem is presented on the basis of the radon-nikodym theoremwhich emphasizes on measure-type properties of the lebesgueintegral. the banach-zarecki theorem says that a real-valuedfunction $f$ is absolutely continuous on a finite closed intervalif and only if it is continuo...

2016
Iddo Bentov Ariel Gabizon Alex Mizrahi

We study cryptocurrency protocols that do not make use of Proof of Work. Such protocols commonly rely on Proof of Stake, i.e. on mechanisms that extend voting power to the stakeholders of the system. We offer analysis of existing protocols that have a substantial amount of popularity. We then present our novel pure Proof of Stake protocols, and argue that the they help in mitigating problems th...

Journal: :The American Mathematical Monthly 2006
Lluiotas Bibiloni Pelegriota Viader Jaume Paradiotas

Theorem 1 of Euler’s paper of 1737 “Variae Observationes Circa Series Infinitas,” states the astonishing result that the series of all unit fractions whose denominators are perfect powers of integers minus unity has sum one. Euler attributes the Theorem to Goldbach. The proof is one of those examples of misuse of divergent series to obtain correct results so frequent during the seventeenth and ...

Maryam Rabii, Monireh Akbari,

The aim of this paper is to present a proof of the hyperbolicity of the family $f_c(x)=c(x-frac{x^3}{3}), |c|>3$, on an its invariant subset of $mathbb{R}$.

2011
Bas van Gijzel Henry Prakken

The basic idea of argumentation is to construct arguments in favour of and against a certain statement, selecting the acceptable arguments, and in the end determining which statements hold. To explain how arguments defend their position, they can be structured by their used knowledge and rules. Several approaches to structured argumentation have been developed and subsequently related through a...

A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید