We present mining-based techniques to reduce the size of various cryptographic outputs without loss of security. Our approach can be generalized for multiple primitives, such as cryptographic key generation, signing, ...
详细信息
ISBN:
(纸本)9783031786785;9783031786792
We present mining-based techniques to reduce the size of various cryptographic outputs without loss of security. Our approach can be generalized for multiple primitives, such as cryptographic key generation, signing, hashing and encryption schemes, by introducing a brute-forcing step to provers/senders aiming at compressing submitted cryptographic material. Interestingly, mining can result in record-size cryptographic outputs, and we show that 5%-12% shorter hash digests and signatures are practically feasible even with commodity hardware. As a result, our techniques make compressing addresses and transaction signatures possible in order to pay less fees in blockchain applications while decreasing the demand for blockchain space, a major bottleneck for initial syncing, communication and storage. Also, the effects of "compressing once - then reuse" at mass scale can be economically profitable in the long run for both the Web2 and Web3 ecosystems. Our paradigm relies on a brute-force search operation in order to craft the primitive's output such that it fits into fewer bytes, while the "missing" fixed bytes are implied by the system parameters and omitted from the actual communication. While such compression requires computational effort depending on the level of compression, this cost is only paid at the source (i.e., in blockchains, senders are rewarded by lowered transaction fees), and the benefits of the compression are enjoyed by the whole ecosystem. As a starting point, we show how our paradigm applies to some basic primitives commonly used in blockchain applications but also traditional Web2 transactions (such as shorter digital certificates), and show how security is preserved using a bit security framework. Surprisingly, we also identified cases where wise mining strategies require proportionally less effort than naive brute-forcing, shorter hash-based signatures being one of the best examples. We also evaluate our approach for several primitives based on dif
Where do generative AI (GenAI) tools like ChatGPT or Claude stand when it comes to the design of Interactive Digital Narratives (IDNs)? Can they be used to create an IDN from scratch? Or complete typical tasks in narr...
详细信息
ISBN:
(纸本)9783031784521;9783031784538
Where do generative AI (GenAI) tools like ChatGPT or Claude stand when it comes to the design of Interactive Digital Narratives (IDNs)? Can they be used to create an IDN from scratch? Or complete typical tasks in narrative design? To answer these questions we first develop a benchmarking framework in collaboration with a group of experts before applying it to create and evaluate the output of GenAI tools. We describe the development of the benchmarking framework, discuss results and consider limitations. The results show that while GenAI tools can be a great asset in IDN design, they are not yet able to replace a human narrative designer. The strength of the current generation of GenAI tools lays in delivering output that can be used for ideation and training, and in some occasions also for production in the hands of an experienced designer. Finally, we consider ethical aspects, future developments, and the wider impact on IDN design.
On December 13, 2021, YouTube made a major policy change with respect to the visibility of video dislikes. Citing the need to protect the well-being of individual content creators, YouTube stated that dislike informat...
详细信息
ISBN:
(纸本)9783031785474;9783031785481
On December 13, 2021, YouTube made a major policy change with respect to the visibility of video dislikes. Citing the need to protect the well-being of individual content creators, YouTube stated that dislike information will only be visible to the video owners thus abolishing a decade-long tradition of publicly visible, anonymous outlet for user dissent. This paper makes two key contributions. First, it releases a valuable dataset of dislike information from 8.3 million videos gleaned from 159 popular news and debate outlets to characterize and chronicle the dislike behavior on YouTube. Second, it quantifies and investigates the information gap that this policy change leaves us with.
The exponential growth of academic literature presents significant challenges for researchers attempting to find relevant information. Traditional keyword-based retrieval systems often fail to address issues such as s...
详细信息
ISBN:
(纸本)9783031785535;9783031785542
The exponential growth of academic literature presents significant challenges for researchers attempting to find relevant information. Traditional keyword-based retrieval systems often fail to address issues such as synonyms, homonyms, and semantic nuances, leading to suboptimal search results. This paper introduces a novel system called IntelliSMART (Intelligent Semantic Machine-Assisted Research Tool), which leverages large language models (LLMs) and advanced semantic processing techniques to improve the retrieval of academic literature. Our approach integrates query rewriting, embedding generation, efficient indexing, and complex article retrieval mechanisms to provide highly accurate and contextually relevant results that align with the user's intent. The IntelliSMART system features a user-friendly front end that facilitates intuitive query input, along with a robust back end for handling user queries, generating embeddings, indexing extensive collections of academic papers, and efficiently retrieving the most relevant documents. The proposed system shows significant improvements over conventional methods, highlighting its potential to transform the search experience in academic research.
In today's digital age, categorizing social media data, particularly from platforms like X, can be an effective strategy for identifying key first responders during emergencies, thereby improving overall emergency...
详细信息
ISBN:
(纸本)9783031785405;9783031785412
In today's digital age, categorizing social media data, particularly from platforms like X, can be an effective strategy for identifying key first responders during emergencies, thereby improving overall emergency response efforts. In this study, we introduce a First Responder Classification System (FReCS), a framework that annotates and classifies disaster tweets from 26 crisis events. Our annotations cater for first reponders and their sub-layers. Furthermore, we proposed a classifier called RoBERTa-CAFE that integrates pre-trained RoBERTa with Cross-Attention and Focused-Entanglement components, improving the precision and reliability of classification tasks. The model is rigorously tested across publicly available disaster datasets. The RoBERTa-CAFE model outperformed state-of-the-art models in identifying relevant emergency communications, displaying its generalization, robustness, and adaptability. Our FReCS approach offers a pioneering technique for classifying first responders and enhances emergency management systems' operational capabilities, leading to more efficient and effective disaster responses. FReCS annotated dataset and code are available on GitHub (https://***/abdul0366/FReCS).
Information about the ideological orientation of social media users is crucial to analyse a large number of social issues. However, the lack of structured data about users' beliefs is a common issue in social scie...
详细信息
ISBN:
(纸本)9783031785474;9783031785481
Information about the ideological orientation of social media users is crucial to analyse a large number of social issues. However, the lack of structured data about users' beliefs is a common issue in social science. To address this gap, after a review of the state-of-the-art approaches for automated ideology detection, this research focuses on the use of a text-based methodology for this goal, using word embeddings. Specifically, the study contributes to the existing literature by focusing on ideology detection in the specific case of the polarized climate debate, and by testing the less-utilized OpenAI "ada" model for this task. Moreover, this research compares the accuracy of posts, representing users' public rhetoric, and page descriptions, thought to reveal their self-presentation, to predict users' ideological orientation. Our findings suggest that post-based methods hold the highest accuracy, but clustering-based approaches using page descriptions also yield respectable results while allowing a reduced use of computational resources. Overall, embedding-based methodology is shown to be a valuable tool for analyzing the ideological leanings of users in polarized debates.
This article focuses on methodologies necessary to create effective knowledge graphs during IDN authoring, which can be used to support narrative engineers during the creation and maintenance of IDNs in a dynamic and ...
详细信息
ISBN:
(纸本)9783031784491;9783031784507
This article focuses on methodologies necessary to create effective knowledge graphs during IDN authoring, which can be used to support narrative engineers during the creation and maintenance of IDNs in a dynamic and scalable manner. Two different open-source knowledge graph technologies have been used, Apache Jena (an RDF triple store) and Neo4j Community Edition (a property model graph) for implementing two versions of an open source authoring environment. The findings show that Neo4j in general performs more preferable.
Scalable Transparent ARguments of Knowledge (STARKs) are a kind of succinct zero-knowledge proof which do NOT require trusting any party to generate a Common Reference String (CRS). In this work, we examine the applic...
详细信息
ISBN:
(纸本)9783031692307;9783031692314
Scalable Transparent ARguments of Knowledge (STARKs) are a kind of succinct zero-knowledge proof which do NOT require trusting any party to generate a Common Reference String (CRS). In this work, we examine the applicability of STARKs to improving Counted-as-Collected verification in the homomorphically tallied elections. In particular we are interested in using STARKs to allow very efficient tally verification while providing everlasting privacy to the information made available for public verification. This work provides a useful reference for the computational and verifiability trade-offs of using STARKs.
In this paper we provide a critical historical review of emergent narrative (EN) as an academic technical research program from its origins in the late 90's to the present. We characterize the assumptions that EN ...
详细信息
ISBN:
(纸本)9783031784521;9783031784538
In this paper we provide a critical historical review of emergent narrative (EN) as an academic technical research program from its origins in the late 90's to the present. We characterize the assumptions that EN research has often relied on but has left largely unexamined, such as realism and social believability. We describe the mobile but central binary problematic that continues to spawn new research problems and approaches in EN: the simultaneous possibility of bottom-up narrative alongside the apparent necessity of some form of top-down story management. By using unnatural narratological theory to critique the dominant assumption of realism in EN, we distill alternative design principles for EN. By emphasizing the exploration of an alternative design space, we propose a form of EN research that goes beyond the binary problematic.
Due to a recent increase in conflicts, natural disasters, and economic crises, a growing wave of migrant populations has been searching for asylum in Europe. For this population of asylum seekers, the migration proces...
详细信息
ISBN:
(纸本)9783031784521;9783031784538
Due to a recent increase in conflicts, natural disasters, and economic crises, a growing wave of migrant populations has been searching for asylum in Europe. For this population of asylum seekers, the migration process, like currents and rapids, can be dangerous, uneven, and violent, and the integration into their host communities can add to the preexisting trauma. Extending on HCI increasing attention to the caring understanding of human life values, this paper presents initial research focused on refugees' storytelling activities to support their well-being. Here, we describe and discuss the results from a set of studies with the Portuguese Center for Refugees to design and refine a bespoke interactive digital storytelling authoring tool. This study aims to promote social cohesion and equal participation in European society by using Digital Storytelling to allow migrant communities to share and connect their stories and experiences. The authors contribute with a novel digital storytelling prototype tool and the discussion and reflections stemming from the user-centered design approach. The insights gained from this work are relevant for interaction designers and researchers seeking to support vulnerable populations through Interactive Digital Storytelling.
暂无评论