The Bitcoin whitepaper states that security of the system is guaranteed as long as honest miners control more than half of the current total computational power. The whitepaper assumes a static difficulty, thus it is equally hard to solve a cryptographic proof-of-work puzzle for any given moment of the system history. However, the real Bitcoin network is using an adaptive difficulty adjustment mechanism. In this paper we introduce and analyze a new kind of attack on a mining difficulty retargeting function used in Bitcoin. A malicious miner is increasing his mining profits from the attack, named coin-hopping attack, and, as a side effect, an average delay between blocks is increasing. We propose an alternative difficulty adjustment algorithm in order to reduce an incentive to perform coin-hopping, and also to improve stability of inter-block delays. Finally, we evaluate the presented approach and show that the novel algorithm performs better than the original algorithm of Bitcoin.
In this paper we present an approach for contextual big data analytics in social networks, particularly in Twitter. The combination of a Rich Context Model (RCM) with machine learning is used in order to improve the quality of the data mining techniques. We propose the algorithm and architecture of our approach for real-time contextual analysis of tweets. The proposed approach can be used to enrich and empower the predictive analytics or to provide relevant context-aware recommendations.
Der Einsatz von virtuellen Servern im LDS NRW erfolgte bisher unter dem Blickwinkel der Konsolidierung von einfachen und sehr einfachen Systemen, die keine dedizierte Serversystemtechnik benötigten.
Mittlerweile bietet VMware Funktionalitäten, die neben dem Konsolidierungsgedanken hoch interessante Möglichkeiten für vielfältigste, individuelle Kundenanforderungen bieten. Dies reicht von flexiblen, preiswerten und einfachen
Systemen bis hin zu Serverplattformen mit hohen Ansprüchen an Performance und Verfügbarkeit.
In recent years, the number of reasonable powerful mobile devices increased. In 2011, the number of smartphones(e.g.)increased to more than 300 million units. A lot of research has already been conducted with respect of mobile devices acting as Cloud Service consumers, but
still not much effort is put on mobile devices in the role of Cloud Service providers. Therefore, this paper presents an approach that allows to utilize mobile devices like smart phones or tablets as Cloud Service providers. In order to make this a reasonable approach, some of the occurring problems are discussed and it is shown how the presented architecture is able to overcome these problems. Last
but not least, this paper
describes some performance
tests of the chosen implementa
tion for mobile Web Services.
Background:
Detection of influential actors in social media such as Twitter or Facebook plays an important role for improving the quality and efficiency of work and services in many fields such as education and marketing.
Methods:
The work described here aims to introduce a new approach that characterizes the influence of actors by the strength of attracting new active members into a networked community. We present a model of influence of an actor that is based on the attractiveness of the actor in terms of the number of other new actors with which he or she has established relations over time.
Results:
We have used this concept and measure of influence to determine optimal seeds in a simulation of influence maximization using two empirically collected social networks for the underlying graphs.
Conclusions:
Our empirical results on the datasets demonstrate that our measure stands out as a useful measure to define the attractors comparing to the other influence measures.