Search
Search Results
-
Blockchain Technology Accelerating Industry 4.0
Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related... -
Blockchain Technology for E-Governance Applications
Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer... -
Decentralized Identity Management and Blockchains: Design Patterns and Architectures
Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The... -
Quantum Computers, Computing, and Machine Learning: A Review
Quantum theory has perhaps had the greatest effect over logical advancement during the last 100 years. It introduced another line of logical ideas,... -
COBRA: Comparison-Optimal Betting for Risk-Limiting Audits
Risk-limiting audits (RLAs) can provide routine, affirmative evidence that reported election outcomes are correct by checking a random sample of cast... -
Consolidation of Ground Truth Sets for Weakness Detection in Smart Contracts
Smart contracts are small programs on the blockchain that often handle valuable assets. Vulnerabilities in smart contracts can be costly, as time has... -
Publicly Verifiable Auctions with Privacy
Online auctions have a steadily growing market size, creating billions of US dollars in sales value every year. To ensure fairness and auditability... -
Uniswap Liquidity Provision: An Online Learning Approach
Uniswap v3 is a decentralized exchange (DEX) that allows liquidity providers to allocate funds more efficiently by specifying an active price... -
The Hidden Shortcomings of (D)AOs – An Empirical Study of On-Chain Governance
Decentralized autonomous organizations (DAOs) are a recent innovation in organizational structures, which are already widely used in the blockchain... -
The Principal–Agent Problem in Liquid Staking
Proof-of-stake systems require stakers to lock up their funds in order to participate in consensus validation. This leads to capital inefficiency, as... -
Equilibrium Analysis of Customer Attraction Games
We introduce a game model called “customer attraction game” to demonstrate the competition among online content providers. In this model, customers... -
The Good, the Bad and the Submodular: Fairly Allocating Mixed Manna Under Order-Neutral Submodular Preferences
We study the problem of fairly allocating indivisible goods (positively valued items) and chores (negatively valued items) among agents with... -
The Importance of Knowing the Arrival Order in Combinatorial Bayesian Settings
We study the measure of order-competitive ratio introduced by Ezra et al. [16] for online algorithms in Bayesian combinatorial settings. In our... -
Online Nash Welfare Maximization Without Predictions
The maximization of Nash welfare, which equals the geometric mean of agents’ utilities, is widely studied because it balances efficiency and fairness... -
Reallocation Mechanisms Under Distributional Constraints in the Full Preference Domain
We study the problem of reallocating indivisible goods among a set of agents in one-sided matching market, where the feasible set for each good is... -
Nash Stability in Fractional Hedonic Games with Bounded Size Coalitions
We consider fractional hedonic games, a natural and succinct subclass of hedonic games able to model many real-world settings in which agents have to... -
Deterministic Impartial Selection with Weights
In the impartial selection problem, a subset of agents up to a fixed size k among a group of n is to be chosen based on votes cast by the agents... -
High-Welfare Matching Markets via Descending Price
We consider the design of monetary mechanisms for two-sided matching. Mechanisms in the tradition of the deferred acceptance algorithm, even in... -
Enforcing the GDPR
Violations of data protection laws such as the General Data Protection Regulation (GDPR) are ubiquitous. Currently, building IT support to implement... -
FSmell: Recognizing Inline Function in Binary Code
Function recognition is one of the most critical tasks in binary analysis and reverse engineering. However, the recognition of inline functions still...