Blockchain has seen significant growth in recent years, and although it is still related by many to Bitcoin, the growth of companies and other digital currencies is visible, which has led some countries to initiate a ...
详细信息
ISBN:
(纸本)9783031692307;9783031692314
Blockchain has seen significant growth in recent years, and although it is still related by many to Bitcoin, the growth of companies and other digital currencies is visible, which has led some countries to initiate a legislative approach in order to protect companies and consumers. Thus, some countries such as Switzerland have included cryptocurrencies within existing legislation with some adaptations, others such as Estonia have used blockchain in almost all of their public services, or already accept Bitcoin as a payment currency, such as El Salvador and Germany. However, little is discussed about the situation of emerging countries, such as Brazil, which has a vast territory and its particularities, mainly because it is still a developing country. The general objective of the work is to discuss the advances and challenges in regulating blockchain technology in general, focusing on Brazil, which, as it is still a developing country, has an even more uncertain scenario for the adoption of new and disruptive technologies., which can greatly help the country's growth and combat corruption.
Motivated by proof-of-stake (PoS) blockchains such as Ethereum, two key desiderata have recently been studied for Byzantine-fault tolerant (BFT) state-machine replication (SMR) consensus protocols: Finality means that...
详细信息
ISBN:
(纸本)9783031786754;9783031786761
Motivated by proof-of-stake (PoS) blockchains such as Ethereum, two key desiderata have recently been studied for Byzantine-fault tolerant (BFT) state-machine replication (SMR) consensus protocols: Finality means that the protocol retains consistency, as long as less than a certain fraction of validators are malicious, even in partially-synchronous environments that allow for temporary violations of assumed network delay bounds. Accountable safety means that in any case of inconsistency, a certain fraction of validators can be identified to have provably violated the protocol. Earlier works have developed impossibility results and protocol constructions for these properties separately. We show that accountable safety implies finality, thereby unifying earlier results.
Agent-Based Modelling (ABM) has emerged as an essential tool for simulating social networks, encompassing diverse phenomena such as information dissemination, influence dynamics, and community formation. However, manu...
详细信息
ISBN:
(纸本)9783031785405;9783031785412
Agent-Based Modelling (ABM) has emerged as an essential tool for simulating social networks, encompassing diverse phenomena such as information dissemination, influence dynamics, and community formation. However, manually configuring varied agent interactions and information flow dynamics poses challenges, often resulting in oversimplified models that lack real-world generalizability. Integrating modern Large Language Models (LLMs) with ABM presents a promising avenue to address these challenges and enhance simulation fidelity, leveraging LLMs' human-like capabilities in sensing, reasoning, and behavior. In this paper, we propose a novel framework utilizing LLM-empowered agents to simulate social network users based on their interests and personality traits. The framework allows for customizable agent interactions resembling various social network platforms, including mechanisms for content resharing and personalized recommendations. We validate our framework using a comprehensive Twitter dataset from the 2020 US election, demonstrating that LLM-agents accurately replicate real users' behaviors, including linguistic patterns and political inclinations. These agents form homogeneous ideological clusters and retain the main themes of their community. Notably, preference-based recommendations significantly influence agent behavior, promoting increased engagement, network homophily and the formation of echo chambers. Overall, our findings underscore the potential of LLM-agents in advancing social media simulations and unraveling intricate online dynamics.
When enough people leave a project, the project might stall due to lack of knowledgeable personnel. The minimum number of people who are required to disappear in order for a project to stall is referred to as bus-fact...
详细信息
ISBN:
(纸本)9783031785405;9783031785412
When enough people leave a project, the project might stall due to lack of knowledgeable personnel. The minimum number of people who are required to disappear in order for a project to stall is referred to as bus-factor. The bus-factor has been found to be real and tangible and many approaches to measure it have been developed. These approaches are problematic: some of them do not scale to large projects, others rely on ad-hoc notions of primary and secondary developers, and others use arbitrary thresholds. None of them proposes a normalized measure of the bus-factor. Therefore, in this paper we propose a framework that, by modelling a project with a bipartite graph linking people to tasks, allows us to 1) quantify the bus-factor of a project with a normalized measure which does not rely on thresholds;and 2) increase the bus-factor of a project by reassigning people to tasks. We demonstrate our approach on a real case, discuss the advantages of our framework, and outline possibilities for future research.
We present a new verifiable voting scheme based on the Hyperion scheme but providing everlasting privacy and receipt-freeness. As with Selene and Hyperion, it provides a direct form of E2E verifiability: voters verify...
详细信息
ISBN:
(纸本)9783031722431;9783031722448
We present a new verifiable voting scheme based on the Hyperion scheme but providing everlasting privacy and receipt-freeness. As with Selene and Hyperion, it provides a direct form of E2E verifiability: voters verify the presence of their votes in plaintext in the tally. However, in contrast to Selene or Hyperion, the privacy of this protocol is everlasting. In addition, our protocol offers the novel feature of everlasting receipt-freeness and coercion mitigation.
This paper introduces the concept of an 'Accountable Wallet' to establish trust in decentralized finance. Our methodology reverses the traditional approaches, which primarily focus on preventing and penalizing...
详细信息
ISBN:
(纸本)9783031692307;9783031692314
This paper introduces the concept of an 'Accountable Wallet' to establish trust in decentralized finance. Our methodology reverses the traditional approaches, which primarily focus on preventing and penalizing illicit activities;we propose a framework where legitimate wallets actively prove their legitimacy to the counterparty before the transactions. Key elements of the proposed framework include proof of the legitimacy of wallet holders, wallet conducts, and crypto asset provenances. The paper explores and summarizes the implementation of this methodology to issue these proofs. The paper outlines comprehensive methods to ensure transaction legitimacy, including Chained Credentials for crypto asset provenance and approaches for evaluating wallet trustworthiness. The methodology cultivates an economy where transactions are exclusive to wallets that can prove their legitimacy. Consequently, illicit wallets in decentralized finance will face substantially restricted liquidity compared to legitimate investors. This restriction is a realistic punitive measure for malicious actors who have eluded penalization by traditional approaches. The proposed methods transcend jurisdictional limitations, offering a comprehensive framework for legitimacy verification.
Academics increasingly acknowledge the predictive power of social media for a wide variety of events and, more specifically, for financial markets. Anecdotal and empirical findings show that cryptocurrencies are among...
详细信息
ISBN:
(纸本)9783031785405;9783031785412
Academics increasingly acknowledge the predictive power of social media for a wide variety of events and, more specifically, for financial markets. Anecdotal and empirical findings show that cryptocurrencies are among the financial assets that have been affected by news and influencers' activities on Twitter. However, the extent to which Twitter crypto influencer's posts about trading signals and their effect on market prices is mostly unexplored. In this paper, we use LLMs to uncover buy and not-buy signals from influencers and news outlets' Twitter posts and use a VAR analysis with Granger Causality tests and cross-correlation analysis to understand how these trading signals are temporally correlated with the top nine major cryptocurrencies' prices. Overall, the results show a mixed pattern across cryptocurrencies and temporal periods. However, we found that for the top three cryptocurrencies with the highest presence within news and influencer posts, their aggregated LLM-detected trading signal over the preceding 24 h granger-causes fluctuations in their market prices, exhibiting a lag of at least 6 h. In addition, the results reveal fundamental differences in how influencers and news outlets cover cryptocurrencies.
This paper explores the use of design methods to capture the tangible cultural artifacts and the intangible cultural expressions of the dance form 'Bharathanatyam' [5] in an animated narrative, by documenting ...
详细信息
ISBN:
(纸本)9783031784521;9783031784538
This paper explores the use of design methods to capture the tangible cultural artifacts and the intangible cultural expressions of the dance form 'Bharathanatyam' [5] in an animated narrative, by documenting the production process of an animated short film produced in an educational setting using motion capture technology. The paper documents the animation production process, observations, significant insights and learning outcomes for designing culturally authentic digital artifacts in real-time production processes. The paper concludes with a discussion on the opportunities of applying design research for culturalization practices in futurework using these emerging technologies in digital entertainment design. Real time animation production pipelines and advanced game development technologies are replacing traditional methods of producing computer generated content for digital entertainment. Unlike traditional production processes where the conceptualization of the content is determined in the pre-production stages, real-time processes provide the flexibility of iterating multiple versions of the content in the production phase through interactive real-time visualizations. This changing trend provides opportunities to apply design research methodologies to capture the cultural authenticity of animated narratives for improved user engagement with the content.
In recent years, the study of complex social systems has been fueled by the renewed interest in higher-order topologies, thus leading to the emergence of hypernetwork science. A critical and interesting phenomenon oft...
详细信息
ISBN:
(纸本)9783031785405;9783031785412
In recent years, the study of complex social systems has been fueled by the renewed interest in higher-order topologies, thus leading to the emergence of hypernetwork science. A critical and interesting phenomenon often characterizing social complex systems is segregation, i.e., the extent to which network entities are separated or clustered based on certain semantic attributes or features. This paper introduces a novel approach to studying segregation in hypernetworks. Firstly, we propose a general framework to extend classical segregation measures from dyadic to polyadic network structures. Then, we introduce a novel segregation measure called "Random Walk HyperSegregation" (RWHS), which exploits random walkers to estimate segregation at multiple scales. Through an extensive experimental study involving synthetic and real-world case studies, we illustrate the applicability and effectiveness of our measure. Moreover, we highlight the limits of classical segregation measures when extended to high-order topologies-conversely from RWHS, which effectively captured highly-segregated scenarios.
Trigger Warning: Profane Language, Slurs. The presence of openly non-binary gender individuals on social networks is growing. However, the relationship between gender, activity, and language in online interactions has...
详细信息
ISBN:
(纸本)9783031785375;9783031785382
Trigger Warning: Profane Language, Slurs. The presence of openly non-binary gender individuals on social networks is growing. However, the relationship between gender, activity, and language in online interactions has not been extensively explored. Lack of understanding surrounding this interaction can result in the disparate treatment of non-binary gender individuals on online platforms. We investigate patterns of gender-based behavior identity on Twitter, focusing on gender expression as represented by users' expression of pronouns from eight different pronoun groups. We find that non-binary gender groups tend to receive substantially less attention in the form of likes and followers compared to binary groups. Additionally, non-binary users send and receive tweets with higher toxicity scores than other groups. This study identifies differences in the language and online activity of users with non-binary gender identity, and highlights a need for further evaluation of potential disparate treatment by algorithms used by online platforms.
暂无评论