Movatterモバイル変換


[0]ホーム

URL:


PhilPapersPhilPeoplePhilArchivePhilEventsPhilJobs
Order:

1 filter applied
Disambiguations
Chao Yu [3]Chao-Liang Yu [2]Chaoqing Yu [2]Chaowen Yu [1]
Chao-P. Eng Yü [1]
  1.  31
    Hyperplane games, prize games and NTU values.Chaowen Yu -2021 -Theory and Decision 93 (2):359-370.
    The Shapley value is a well-known solution concept for TU games. The Maschler–Owen value and the NTU Shapley value are two well-known extensions of the Shapley value to NTU games. A hyperplane game is an NTU game in which the feasible set for each coalition is a hyperplane. On the domain of monotonic hyperplane games, the Maschler–Owen value is axiomatized. Although the domain of hyperplane game is a very interesting class of games to study, unfortunately, on this domain, the NTU (...) Shapley value is not well-defined, namely, it assigns an empty set to some hyperplane games. A prize game is an NTU game that can be obtained by “truncating” a hyperplane game. As such, a prize game describes essentially the same situation as the corresponding hyperplane game. It turns out that, on the domain of monotonic prize games, the NTU Shapley value is well-defined. Thus, one can define a value which is well-defined on the domain of monotonic hyperplane games as follows: given a monotonic hyperplane game, first, transform it into a prize game, and then apply the NTU Shapley value to it. We refer to the resulting value as the “generalized Shapley value” and compare the axiomatic properties of it with those of the Maschler–Owen value on the union of the class of monotonic hyperplane games and that of monotonic prize games. We also provide axiomatizations of the Maschler–Owen value and the generalized Shapley value on that domain. (shrink)
    No categories
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  2.  30
    Technology and Security Analysis of Cryptocurrency Based on Blockchain.Chao Yu,Wenke Yang,Feiyu Xie &Jianmin He -2022 -Complexity 2022:1-15.
    Blockchain technology applied to cryptocurrencies is the dominant factor in maintaining the security of cryptocurrencies. This article reviews the technological implementation of cryptocurrency and the security and stability of cryptocurrency and analyzes the security support from blockchain technology and its platforms based on empirical case studies. Our results show that the security support from blockchain technology platforms is significantly insufficient and immature. In addition, we further Zyskind and Nathan and Choi and find that the top ten platforms play critical roles (...) in security support and have significant advantages in terms of funds, duration, and human resources. Moreover, these platforms provide computational resources and benefits to the consensus algorithm selection for blockchain practitioners. Second, encryption ensures the security of cryptocurrencies. On the one hand, the digital signatures identify the identity of the signatory and the transaction. However, the principle of the hash algorithm confirms ownership. Meanwhile, SHA256 is infeasible to compute in the reverse direction and is difficult to attack. Furthermore, the records in the blockchain can be queried by every participant, making the system information transparent and open reliable. Third, compared to the study of Fu and Fang 2016, we find that the blockchain structure is composed of security components and basic components of six layers that are independent and cannot be extended completely and have a certain coupling among them. Fourth, the underlying ledger structures of Bitcoin and DAG are highly correlated to their security. Specifically, we follow Sompolinsky et al. and detect that the structure of SPECTRE ensures network security and robustness from its block production, conflict resolution, and generated trusted transaction sets. Meanwhile, the voting algorithm of SPECTRE makes resolving conflicting transactions by calculating votes and ensuring the transaction information that is virtually unable to be tampered with possible. In particular, the security calculation power of SPECTRE can reach 51% and resist “double-spend attacks” and “censorship attacks” effectively. In addition, the RDL framework of SPECTRE achieves security confirmation of transferring funds. Moreover, PHANTOM identifies evil blocks by employing block connectivity analysis and ensures its security. Eventually, we also expand the studies of and compare the basic characteristics of the protocols of Bitcoin, SPECTRE, and PHANTOM and find that protocols play imperative roles throughout the implementation process of cryptocurrency. In addition, the underlying ledger structure and consensus mechanism make up a blockchain while the confirmation time, throughput limit, and ordering are prerequisites for smart contracts. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  3.  5
    哲学相近概念比较研究.Chao Yu (ed.) -1988 - [Tsinan]: Shandong sheng xin hua shu dian fa xing.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  10
    Zhe xue xiang jin gai nian bi jiao yan jiu.Chao Yu (ed.) -1988 - [Tsinan]: Shandong sheng xin hua shu dian fa xing.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  4
    哲学原著必读书解说.Chaoqing Yu (ed.) -1992 - Shanghai: Xin hua shu dian Shanghai fa xing suo fa xing.
    选马克思、恩格斯、列宁、毛泽东等原著50部,介绍了原著的历史背景、现实意义、主要内容、基本思想等。.
    Direct download  
     
    Export citation  
     
    Bookmark  
  6. Zhe xue yuan zhu bi du shu jie shuo.Chaoqing Yu (ed.) -1992 - Shanghai: Xin hua shu dian Shanghai fa xing suo fa xing.
     
    Export citation  
     
    Bookmark  
Export
Limit to items.
Filters





Configure languageshere.Sign in to use this feature.

Viewing options


Open Category Editor
Off-campus access
Using PhilPapers from home?

Create an account to enable off-campus access through your institution's proxy server or OpenAthens.


[8]ページ先頭

©2009-2025 Movatter.jp