The Merge changes Ethereum from Proof-of-Work (PoW) to the more secure and less energy-intensive Proof-of-Stake (PoS) mechanism. However, the existence of malicious valida tors still threatens the security of Ethereum...
详细信息
ISBN:
(数字)9798350377842
ISBN:
(纸本)9798350377859
The Merge changes Ethereum from Proof-of-Work (PoW) to the more secure and less energy-intensive Proof-of-Stake (PoS) mechanism. However, the existence of malicious valida tors still threatens the security of Ethereum, primarily through a discouragement attack. How can we redesign the incentive mech-anism in PoS Ethereum for a more secure blockchain? For this quest, we, for the first time, apply the cutting-edge reinforcement mechanism design method-an interdisciplinary approach at the intersection of reinforcement learning (RL) and mechanism design-to staking mechanism designs. We abstract a generalized staking mechanism as a game environment and implement an RL method for the blockchain as a mechanism designer to explore the optimal incentive design. Our reinforcement mechanism design outperforms the status quo in cultivating honest validators. Furthermore, we identify Advantage Actor-Critic (A2C) as the most efficient RL algorithm among the three alternatives, which intuitively performs better when the initial proportion of honest validator is larger. Our interdisciplinary approach of generalized abstraction could be adapted to analyze the incentive design in any PoS blockchain and beyond.
Young children are at an increased risk of contracting contagious diseases such as COVID-19 due to improper hand hygiene. An autonomous social agent that observes children while handwashing and encourages good hand wa...
详细信息
Aircraft engines are critical, therefore any move to make them safer, more reliable, and fuel-efficient is highly encouraged. To solve the challenges of flight safety and maintenance expense during aircraft engine ope...
详细信息
The emergence of non-volatile memory(NVM)has introduced new opportunities for performance optimizations in existing storage *** better utilize its byte-addressability and near-DRAM performance,NVM can be attached on t...
详细信息
The emergence of non-volatile memory(NVM)has introduced new opportunities for performance optimizations in existing storage *** better utilize its byte-addressability and near-DRAM performance,NVM can be attached on the memory bus and accessed via load/store memory instructions rather than the conventional block *** this scenario,a cache line(usually 64 bytes)becomes the data transfer unit between volatile and non-volatile ***,the failure-atomicity of write on NVM is the memory bit width(usually 8 bytes).This mismatch between the data transfer unit and the atomicity unit may introduce write amplification and compromise data consistency of node-based data structures such as B+-*** this paper,we propose WOBTree,a Write-Optimized B+-Tree for NVM to address the mismatch problem without expensive *** minimizes the update granularity from a tree node to a much smaller subnode and carefully arranges the write operations in it to ensure crash consistency and reduce write *** results show that compared with previous persistent B+-tree solutions,WOBTree reduces the write amplification by up to 86× and improves write performance by up to 61× while maintaining similar search performance.
The liver is one of the most vital organs of the human body. There are various disorders of liver that need early treatment by doctors. Early diagnosis and treating the patients are significant to reduce the risk. Hea...
详细信息
This article presents a free and open source toolkit that supports the semi-automated checking of research outputs (SACRO) for privacy disclosure within secure data environments. SACRO is a framework that applies best...
详细信息
Recent digital rights frameworks give users the right to delete their data from systems that store and process their personal information (e.g., the "right to be forgotten" in the GDPR). How should deletion ...
This paper presents a new conformal method for generating simultaneous forecasting bands guaranteed to cover the entire path of a new random trajectory with sufficiently high probability. Prompted by the need for depe...
This paper presents a new conformal method for generating simultaneous forecasting bands guaranteed to cover the entire path of a new random trajectory with sufficiently high probability. Prompted by the need for dependable uncertainty estimates in motion planning applications where the behavior of diverse objects may be more or less unpredictable, we blend different techniques from online conformal prediction of single and multiple time series, as well as ideas for addressing heteroscedasticity in regression. This solution is both principled, providing precise finite-sample guarantees, and effective, often leading to more informative predictions than prior methods.
Today, you can see how children are increasingly spending their free time playing desktop or mobile video games. The question then becomes whether a simple hobby can be turned into a rewarding learning pastime? In the...
Today, you can see how children are increasingly spending their free time playing desktop or mobile video games. The question then becomes whether a simple hobby can be turned into a rewarding learning pastime? In the introduction of the article, the current situation and the problem that video games can create and the direction in which it can be solved using video games will be considered. The literature review considers some interesting aspects and conclusions of earlier similar studies. The methodology will present plans for quantitative and qualitative surveys of the population and a proposal for the development of a gaming product for educational purposes. The results will show what the situation is and what people's opinion about the use of video games in education. All the data obtained will help in the development of an educational project. Summing up, we will talk about the meaning and significance of the project and similar ideas in the modern world.
We use and adapt the Borsuk-Ulam Theorem from topology to derive limitations on list-replicable and globally stable learning algorithms. We further demonstrate the applicability of our methods in combinatorics and top...
详细信息
暂无评论