• Aucun résultat trouvé

Utility maximisation in the Coordinator-less IOTA Tangle

N/A
N/A
Protected

Academic year: 2021

Partager "Utility maximisation in the Coordinator-less IOTA Tangle"

Copied!
13
0
0

Texte intégral

Loading

Figure

Fig. 1: Experimental results for the different network performance metrics and scenarios
Fig. 2: Convergence of proposed scheme. Parameters are set to w i = i, c 1 = 1, c 2 = 1 and λ = 10

Références

Documents relatifs

characteristics, technology transfer and innovation, and financing. It describes the characteristics of the sample of high-tech companies, the technological transfers and

Our process includes three steps: (A) we obtain the mining reward for each block and attribute it to a known mining pool; (B–C) for each coinbase transaction, we extract the

We define the assiduous honest majority assumption as the fact that the hashing power of honest nodes is constantly used to generate sites and that it is strictly greater than

• It constructs a metric profile for every major type of vulnerabilities for both considered systems. This profile includes the location of the vulnerability, its criticality, its

Furthermore, analyzing the number of lane changes (per kilometer per hour) as function of the density in the origin lane and in the target lane, we find, as

• acteur de l’accompagnement des étudiants présentant des besoins spécifiques (étudiants étrangers, étudiants handicapés, sportifs tout particulièrement de

Nevertheless, it implies the dependant axiom of choice AC D (and in fact the non extensional axiom of choice AC N E ) and we will give and study the behaviour of the program

Vallas (2001), Jong (2005), and others insist on the influence that research contracts and partnerships with business have on the diffusion of codes and culture from the industrial