For a class of sparse optimization problems with the penalty function of (·)+0, we first characterize its local minimizers and then propose an extrapolated hard thresholding algorithm to solve such problems. We s...
详细信息
We study memory-bounded algorithms for the k-secretary problem. The algorithm of Kleinberg [Kle05] achieves an optimal competitive ratio of 1 − O(1/√k), yet a straightforward implementation requires Ω(k) memory. Our ...
详细信息
The potential of blockchain technology is very high in terms of transforming healthcare management systems, especially in safety, interoperability, and the integrity of health data. This revolutionary ability comes fr...
详细信息
ISBN:
(数字)9798331515683
ISBN:
(纸本)9798331515690
The potential of blockchain technology is very high in terms of transforming healthcare management systems, especially in safety, interoperability, and the integrity of health data. This revolutionary ability comes from the decentralized and immutable nature of blockchain architecture that enhances secure transactions. The implementation of SHA-256 algorithm greatly strengthens data against malicious attacks. This ensures that it cannot be hacked into unauthorized hands for sensitive information of patients. The use of smart contracts along with existing health data formats improves interoperability among various healthcare systems. Such level of interoperability increases both the communication and the swapping of health information across different platforms. However, the introduction of blockchain in healthcare faces several challenges about acceptance by users, scalability to ensure workability, and compliance with regulatory standards. A good insight related to the emerging landscape in which healthcare data management takes place can be derived from the present study. This can be achieved by studying the potential benefits blockchain technology would bring along with its integration into health management systems and the challenges that may come up in the process.
The Web of Things (WoT) represents an interconnected network of sensors and smart devices. It faces significant security and privacy challenges, including potential data breaches, unauthorized access issues, and conce...
详细信息
ISBN:
(数字)9798331523657
ISBN:
(纸本)9798331523664
The Web of Things (WoT) represents an interconnected network of sensors and smart devices. It faces significant security and privacy challenges, including potential data breaches, unauthorized access issues, and concerning scalability problems. This paper introduces a blockchain-based solution that aims to enhance the security and reliability of the WoT. Taking advantage of the inherent transparency of blockchain's distributed ledger, the elimination of single points of failure through consensus algorithms, the enforcement of access control and privacy through smart contracts, and the assurance of data confidentiality through encryption, I propose an innovative design for the WoT that could guarantee enhanced security and trust. I also incorporate the use of a homomorphic hash function to further boost data privacy and integrity. This paper presents a comprehensive framework that employs blockchain technology to transform the current WoT into a more secure and trusted network, which I term the “Web of Trust”.
The compact genetic algorithm (cGA) is one of the simplest estimation-of-distribution algorithms (EDAs). Next to the univariate marginal distribution algorithm (UMDA)—another simple EDA—, the cGA has been subject to...
详细信息
The proximal algorithm is a powerful tool to minimize nonlinear and nonsmooth functionals in a general metric space. Motivated by the recent progress in studying the training dynamics of the noisy gradient descent alg...
详细信息
In this work, we initiate the systemic study of decision-theoretic metrics in the design and analysis of algorithms with machine-learned predictions. We introduce approaches based on both deterministic measures such a...
详细信息
Many organizations use algorithms that have a disparate impact, i.e., the benefits or harms of the algorithm fall disproportionately on certain social groups. Addressing an algorithm’s disparate impact can be challen...
详细信息
We study the fixed-confidence best-arm identification problem in unimodal bandits, in which the means of the arms increase with the index of the arm up to their maximum, then decrease. We derive two lower bounds on th...
详细信息
We provide a simple and flexible framework for designing differentially private algorithms to find approximate stationary points of non-convex loss functions. Our framework is based on using a private approximate risk...
详细信息
暂无评论