SMART CONTRACTS ARE NEITHER
|
|
- Leslie Barrett
- 6 years ago
- Views:
Transcription
1 SMART S ARE NEITHER SMART NOR S FRITZ HENGLEIN UNIVERSITY OF COPENHAGEN Cyber Security, Privacy and Blockchain High Tech Summit, DTU
2 FRITZ HENGLEIN Professor of programming languages and systems Foundations, techniques, algorithmics, language design Enterprise systems, healthcare, finance, blockchain, contract management Director, Research center for high-performance computing for finance (HIPERFIT.dk) Steering committee chair, Innovation network for Finance IT (CFIR.dk) Mostly academic, some industrial lab/start-up experience Technische Universität München, Rutgers University; New York University, Utrecht University, University of Copenhagen, IT University of Copenhagen; IBM Research, Cornell University, University of New South Wales, University of Oxford; Hafnium Research ApS, Deon Digital AG/Deon Digital Denmark A/S,
3 A CRASH SLIDE ON BLOCKCHAIN AND SMART S SMART TERM WHAT IT ACTUALLY MEANS BLOCKCHAIN SMART (CODE) SMART (EXECUTING) DISTRIBUTED APPEND-ONLY TRANSACTION LOG (LEDGER) CLASS (IN JAVA-LIKE LANGUAGE) PROCESS (OBJECT [= CLASS INSTANCE]) OBJECT MESSAGES ORDINARY MESSAGES LINEAR RESOURCE TRANSFERS
4 A CRASH SLIDE ON BLOCKCHAIN AND SMART S SMART TERM WHAT IT ACTUALLY MEANS BLOCKCHAIN SMART (CODE) SMART (EXECUTING) DISTRIBUTED APPEND-ONLY LINEAR RESOURCE TRANSFER LOG CLASS (IN JAVA-LIKE LANGUAGE) PROCESS (OBJECT [= CLASS INSTANCE]) OBJECT MESSAGES ORDINARY MESSAGES LINEAR RESOURCE TRANSFERS
5 BLOCKCHAIN SYSTEM ARCHITECTURE
6 VERSUS SMART Contract: Obligations and permissions (rules) Strategy: Particular way to satisfy a contract (actions) Smart contract: Rules and all parties actions
7 VERSUS SMART SMART ALICE S BOB S CHARLIE S Contract: Obligations and permissions (rules) DORIT S CONT RACT EDDIE S Strategy: A single party s actions (actions) FRED S GEORGE S HENRY S Smart contract: Rules and all parties codified actions intermixed
8 VERSUS SMART SMART ALICE S BOB S Actually Contract checking and actions (strategy) mixed together in the source code CHARLIE S EDDIE S HENRY S ALICE S HENRY S
9 VERSUS SMART SMART ALICE S BOB S CHARLIE S Actually Contract checking and actions (strategy) mixed together in the source code and one cannot even see which is which EDDIE S HENRY S ALICE S HENRY S
10 VERSUS SMART SMART ALICE S BOB S What is the contract and what is strategy? CHARLIE S EDDIE S How do you compose contracts (by themselves)? HENRY S ALICE S HENRY S How do you analyze contracts?
11 VERSUS SMART CODIFIED PART OF CHARLIE S ALICE S BOB S CHARLIE S CHARLIE AT HIS TERMINAL DORIT S CONT RACT EDDIE S FRED S GEORGE S HENRY S
12 VERSUS SMART ALICE S BOB S CHARLIE S CHARLIE AUTOMATES HIMSELF DORIT S CONT RACT EDDIE S FRED S GEORGE S HENRY S
13 VERSUS SMART ALICE S BOB S CHARLIE S NEW, FULLY AUTOMATED DORIT S CONT RACT EDDIE S FRED S GEORGE S HENRY S
14 VERSUS SMART ALICE S BOB S CHARLIE S NEW, FULLY AUTOMATED DORIT S NEW SEMI-AUTOMATED CONT RACT EDDIE S FRED S GEORGE S HENRY S DORIT AUTOMATES PARTS OF HER TERMINAL INTERACTIONS
15 VERSUS SMART IS UNCHANGED! ALICE S BOB S CHARLIE S NEW, FULLY AUTOMATED DORIT S NEW SEMI-AUTOMATED CONT RACT EDDIE S FRED S GEORGE S HENRY S
16 VERSUS SMART IS UNCHANGED! SMART ALICE S BOB S CHARLIE S NEW, FULLY AUTOMATED DORIT S NEW SEMI-AUTOMATED CONT RACT EDDIE S FRED S GEORGE S HENRY S BUT SMART SHOULD BE CHANGED!?
17 THE PRICE OF EXPRESSIVENESS: RICE S THEOREM Rice (1953) Smart contract: usually program, written in Turing-complete programming language (Ethereum, Corda, Fabric, ) + : Expressive - : Undecidable properties even with full access to the source code Smart contracts are ultimately unanalyzable
18 ETHEREUM VULNERABILITIES Transaction-order dependence: Messages may have different effect depending on their order of arrival Who controls the process scheduler (= message sequencer)? Some miner: Front-running Time-stamp dependence: Smart contracts may have different executions depending on the time stamp on a transaction block Who controls the time stamping of transaction blocks? Some miner: Clock manipulation Exception handling, gas management fragility: Subtle differences in exception semantics, limited run-time stack Provoking out-of-stack and gas exhaustion exceptions: Any user Programming language subtleties: Exception handling subtleties (send vs. call) Reentrancy vulnerability (DAO hack) Implicit method forwarding (multi-sig exploit) LUU, CHU, OLICKEL, SAXENA, HOBOR, MAKING SMART S SMARTER (2016)
19 REENTRANCY VULNERABILITY LUU, CHU, OLICKEL, SAXENA, HOBOR, MAKING SMART S SMARTER (2016)
20 OTHER BLOCKCHAIN SYSTEM ASPECTS Performance Availability Partition tolerance Security Privacy (Trade-offs between above, some inherent, some not)
21 SUMMARY Smart contracts = self-executing contracts (programs) in complex Turing-complete programming language Rules and actions intermixed: Not contracts Hard to analyze, low-level programs: Not smart
22 MORE INFORMATION hiperfit.dk: Functional high-performance computing for finance Domain-specific languages for compositional and verifiable contracts GOING LIVE ANY TIME NOW plan-x.org: Functional programming language technology for high-performance blockchain systems FUNCTIONAL PROGRAMMING = PROGRAMMING WITH IMMUTABLE TAMPER-PROOF DATA
23 Thank you!
Bitcoin and Blockchain for Pythoneers
Bitcoin and Blockchain for Pythoneers EuroPython 2017 Benno Luthiger 10.07.2017 1 Why Bitcoin? Crypto currency fast reliable without central authority The Blockchain is a distributed ledger (peer to peer).
More informationTransforming a Digital Generation: How the Economic and Legal Implications of Blockchain Will Reshape Society
Transforming a Digital Generation: How the Economic and Legal Implications of Blockchain Will Reshape Society State of the Art Agenda Technological Potential & Legal Implications Looking Ahead: Key Policy
More informationBLOCKCHAIN FOR SOCIAL GOOD. November 9, 2017 Dr. Cara LaPointe
BLOCKCHAIN FOR SOCIAL GOOD November 9, 2017 Dr. Cara LaPointe What is the Blockchain for Social Good project? 3 Building a Framework Around Privacy & Ethics 4 Approach Build Community Understand the Challenges
More informationThe Blockchain Ethical Design Framework
The Blockchain Ethical Design Framework September 19, 2018 Dr. Cara LaPointe Senior Fellow Georgetown University Beeck Center for Social Impact + Innovation The Blockchain Ethical Design Framework Driving
More informationBeyond Buzzwords: Emerging Technologies That Matter
Norm Rose President Beyond Buzzwords: Emerging Technologies That Matter Demystifying Emerging Technologies for the Global Travel Industry April 26, 2018 Overview otechnology Evolution and Hype oemerging
More informationInnovative Gambling Platform On The Ethereum Blockchain
Innovative Gambling Platform On The Ethereum Blockchain Today s gaming market suffers from the crisis of trust between the players and the game organizers. As you are aware of, the organizers of casino
More informationTOKEN SALE AGREEMENT
TOKEN SALE AGREEMENT SwiftDemand Last Updated: March 30, 2018 This Token Sale Agreement is a legally binding contract between you and SwiftDemand Inc. (hereinafter Company ) regarding your rights and responsibilities
More informationCrypto Art, Law and Blockchain
Crypto Art, Law and Blockchain Professor Tonya M. Evans Chair, IP & Technology Online Programs Franklin Pierce Center for Intellectual Property, University of New Hampshire School of Law @IPProfEvans #EvansOnTheBlock
More informationSmart Waste Management: An IOT and Blockchains based approach
Smart Waste Management: An IOT and Blockchains based approach Author 1 Manish Lamichhane Master's Thesis student Erasmus Mundus PERCCOM Author 2 Oleg Sadov Supervisor, Senior Engineer, ITMO University,
More informationBitRs Coins WHITEPAPER
BitRs Coins WHITEPAPER 02 www. bitrscoin.com INDEX BitRs Coin Introduction3 Coin & Token Details 4 Business Plan 5 Future Plan 6 Contact Details 6 Technical Details 7 ERC20 Tokens 8 03 www. bitrscoin.com
More informationSWIFT on distributed ledger technologies
SWIFT on distributed ledger technologies Damien Vanderveken, Head of R&D, SWIFTLab and UX October 2016 Intro & Session Objectives How Blockchain and distributed ledger technologies (DLTs) could be deployed
More informationArtificial Intelligence and Law. Latifa Al-Abdulkarim Assistant Professor of Artificial Intelligence, KSU
Artificial Intelligence and Law Latifa Al-Abdulkarim Assistant Professor of Artificial Intelligence, KSU AI is Multidisciplinary Since 1956 Artificial Intelligence Cognitive Science SLC PAGE: 2 What is
More informationMSc(CompSc) List of courses offered in
Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The
More informationDigital Transformation. A Game Changer. How Does the Digital Transformation Affect Informatics as a Scientific Discipline?
Digital Transformation A Game Changer How Does the Digital Transformation Affect Informatics as a Scientific Discipline? Manfred Broy Technische Universität München Institut for Informatics ... the change
More informationStanford Blockchain Protocol Analysis and Security Engineering 2018 Introduction & Overview
Stanford Blockchain Protocol Analysis and Security Engineering 2018 Introduction & Overview Byron Gibson https://cyber.stanford.edu/bpase18 1 of 5 Contents Contents 2 I. Introduction & Overview 3 What
More informationDecentralized Protocol for Self-Sovereign Identities with Embedded Compliance
Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance A self-sovereign identity portal for regulated industries and the Internet of Everything guy.davies@blockpass.org www.blockpass.org
More informationCOMP219: Artificial Intelligence. Lecture 2: AI Problems and Applications
COMP219: Artificial Intelligence Lecture 2: AI Problems and Applications 1 Introduction Last time General module information Characterisation of AI and what it is about Today Overview of some common AI
More informationBone Crusher 2.0. James Grimmelmann. Fourth Annual Greg Lastowka Memorial Lecture November 15, 2018
Bone Crusher 2.0 James Grimmelmann Fourth Annual Greg Lastowka Memorial Lecture November 15, 2018 Bone Crusher 1.0 When virtual-world lawsuits arise, as they inevitably will, it will not be a sufficient
More informationFormal Accountability for Biometric Surveillance: A Case Study
Vinh Thong Ta University of Central Lancashire, UK vtta@uclan.ac.uk Joint work with Denis Butin Technische Universität Darmstadt, Germany Daniel Le Métayer INRIA, France APF 2015, October 7-8, Luxembourg
More informationBIM+Blockchain: A Solution to the "Trust" problem in Collaboration?
BIM+Blockchain: A Solution to the "Trust" problem in Collaboration? Link to conference paper http://arrow.dit.ie/bescharcon/26/ Malachy Mathews, Senior Lecturer, School of Architecture, Dublin Institute
More information2. The Crypto Story So Far
0 Contents 1. Abstract 2. The crypto story so far 2.1. The problem 3. Fornix Our purpose 4. The Fornix Solution 4.1. Master-nodes 4.2. Proof-of-Stake System 5. Use Cases 6. Coin Details 7. Project Roadmap
More information24 Challenges in Deductive Software Verification
24 Challenges in Deductive Software Verification Reiner Hähnle 1 and Marieke Huisman 2 1 Technische Universität Darmstadt, Germany, haehnle@cs.tu-darmstadt.de 2 University of Twente, Enschede, The Netherlands,
More informationPersonal. Identity. Information
Personal Identity Information What is it? Work Membership Student Citizen Identity Healthcare On-line Financial Military What Is Identity Information? Definition: Identity information is an assortment
More informationFORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS
FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS Meriem Taibi 1 and Malika Ioualalen 1 1 LSI - USTHB - BP 32, El-Alia, Bab-Ezzouar, 16111 - Alger, Algerie taibi,ioualalen@lsi-usthb.dz
More informationEditorial for the Special Issue on Aspects and Model-Driven Engineering
Editorial for the Special Issue on Aspects and Model-Driven Engineering Robert France 1 and Jean-Marc Jézéquel 2 1 Colorado State University, Fort Collins, Colorado, USA, france@cs.colostate.edu, 2 IRISA-Université
More informationSingularityNET. The pla(orm for the decentralized AI economy
SingularityNET The pla(orm for the decentralized AI economy AI Is Everywhere Trading Robo+cs Big Data Over 1,300 hedge funds use AI to trade billions in securi@es AI systems are used for surgery, manufacturing,
More informationGDPR & Teknologiske Trends
GDPR & Teknologiske Trends Are we guiding from the Front??!!!??? Hans Peter Dueholm, Nordic CTO, IBM Distinguished Engineer +45 2880 4269 Hans Peter Dueholm Nordic CTO, IBM Distinguished Engineer Cand.scient.oecon.
More informationM&S Engineering Complex Systems; Research Challenges
M&S Engineering Complex Systems; Research Challenges Randall B. Garrett, Ph.D. Chief Scientist, SimIS Inc. Vice Chair, National Modeling and Simulation Coalition Detroit, MI September 2017 Events/History
More informationService Innovation, Engineering and Management. Short Description of the Proposed Track
Service Innovation, Engineering and Management Short Description of the Proposed Track Digitization is a strong driver for service-centric value creation and the proliferation of service-centric IT infrastructure.
More informationPublic Key Encryption
Math 210 Jerry L. Kazdan Public Key Encryption The essence of this procedure is that as far as we currently know, it is difficult to factor a number that is the product of two primes each having many,
More informationKnowledge Management for Command and Control
Knowledge Management for Command and Control Dr. Marion G. Ceruti, Dwight R. Wilcox and Brenda J. Powers Space and Naval Warfare Systems Center, San Diego, CA 9 th International Command and Control Research
More informationCryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo
Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 1 Cryptography Module in Autumn Term 2016 University of Birmingham Lecturers: Mark D. Ryan and David Galindo Slides originally written
More informationDESIGN OF AN INNOVATION PLATFORM FOR MANUFACTURING SMES
Proceedings of the 11 th International Conference on Manufacturing Research (ICMR2013) DESIGN OF AN INNOVATION PLATFORM FOR MANUFACTURING SMES Martin Ziarati Centre for Factories of the Future Design Hub
More informationBit Reversal Broadcast Scheduling for Ad Hoc Systems
Bit Reversal Broadcast Scheduling for Ad Hoc Systems Marcin Kik, Maciej Gebala, Mirosław Wrocław University of Technology, Poland IDCS 2013, Hangzhou How to broadcast efficiently? Broadcasting ad hoc systems
More informationA Complete Approximation Theory for Weighted Transition Systems
A Complete Approximation Theory for Weighted Transition Systems December 1, 2015 Peter Christoffersen Mikkel Hansen Mathias R. Pedersen Radu Mardare Kim G. Larsen Department of Computer Science Aalborg
More informationIntroduction to Source Coding
Comm. 52: Communication Theory Lecture 7 Introduction to Source Coding - Requirements of source codes - Huffman Code Length Fixed Length Variable Length Source Code Properties Uniquely Decodable allow
More informationStandards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments
Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Antonio Kung, CTO 25 rue du Général Foy, 75008 Paris www.trialog.com 9 May 2017 1 Introduction Speaker Engineering
More informationIntroduction to FinTech and Smart Contracts
Introduction to FinTech and Smart Contracts IIFM Seminar on Islamic Financial Markets Monday, 8 th May 2018, Kuala Lumpur Hosted by Labuan FSA and Labuan IBFC Inc. Ismail Dadabhoy Advisor, IIFM FinTech
More informationDVA325 Formal Languages, Automata and Models of Computation (FABER)
DVA325 Formal Languages, Automata and Models of Computation (FABER) Lecture 1 - Introduction School of Innovation, Design and Engineering Mälardalen University 11 November 2014 Abu Naser Masud FABER November
More informationThe Tech Megatrends: 2018
The Tech Megatrends: 2018 April 17, 2018 Cristina CK Kerley http://allthingsck.comhttp://allthingsck.com TECH MEGATRENDS 2018: Trends & Imperatives 2018 Christina CK Kerley http://allthingsck.com Apr 18,
More informationGreat Minds. Internship Program IBM Research - China
Internship Program 2017 Internship Program 2017 Jump Start Your Future at IBM Research China Introduction invites global candidates to apply for the 2017 Great Minds internship program located in Beijing
More informationTopical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities
Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities Timely access to data, particularly data relevant to a patient s medical and genetic
More informationTask Allocation: Motivation-Based. Dr. Daisy Tang
Task Allocation: Motivation-Based Dr. Daisy Tang Outline Motivation-based task allocation (modeling) Formal analysis of task allocation Motivations vs. Negotiation in MRTA Motivations(ALLIANCE): Pro: Enables
More informationPanel Discussion. Dr. Dr. Norbert A. Streitz. The infinity Initiative Sophia Antipolis, 29. November Darmstadt, Germany
The infinity Initiative Sophia Antipolis, 29. November 2007 Panel Discussion Dr. Dr. Norbert A. Streitz Darmstadt, Germany www.ipsi.fraunhofer.de/~streitz streitz@ipsi.fraunhofer.de Panel Discussion Topics
More informationAction Line Cyber-Physical Systems Addressing the challenges and fostering innovation in Cyber-Physical Systems
Action Line Cyber-Physical Systems Addressing the challenges and fostering innovation in Cyber-Physical Systems Dr. Holger Pfeifer Technische Universität München EIT ICT Labs Action Line Lead Cyber-Physical
More informationVLSI Physical Design Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
VLSI Physical Design Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture- 05 VLSI Physical Design Automation (Part 1) Hello welcome
More informationTime Difference of Arrival Localization Testbed: Development, Calibration, and Automation GRCon 2017
Time Difference of Arrival Localization Testbed: Development, Calibration, and Automation GRCon 2017 Intelligent Digital Communications Georgia Tech VIP Team 1 Overview Introduction IDC Team Stadium Testbed
More informationComputer Science: Disciplines. What is Software Engineering and why does it matter? Software Disasters
Computer Science: Disciplines What is Software Engineering and why does it matter? Computer Graphics Computer Networking and Security Parallel Computing Database Systems Artificial Intelligence Software
More informationAdvances and Perspectives in Health Information Standards
Advances and Perspectives in Health Information Standards HL7 Brazil June 14, 2018 W. Ed Hammond. Ph.D., FACMI, FAIMBE, FIMIA, FHL7, FIAHSI Director, Duke Center for Health Informatics Director, Applied
More informationEnd-User Innovation in Evidence-Based Medicine: AND IMPLICATIONS FOR HEALTH CARE POLICIES AND PRACTICES
End-User Innovation in Evidence-Based Medicine: The Quadruple / Quintuple Innovation Helix Context AND IMPLICATIONS FOR HEALTH CARE POLICIES AND PRACTICES ESDY CONFERENCE INVITED LECTURE PROF. ELIAS G.
More informationThe number theory behind cryptography
The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?
More informationSituated Interaction:
Situated Interaction: Creating a partnership between people and intelligent systems Wendy E. Mackay in situ Computers are changing Cost Mainframes Mini-computers Personal computers Laptops Smart phones
More information2 Polling. Politecnico di Milano Facoltà di Ingegneria dell Informazione
Politecnico di Milano Facoltà di Ingegneria dell Informazione Polling Multiple Access in Wireless Networks: Models and echnologies Prof. Antonio Capone Assumptions and notation o In the following we drop
More informationHouse Allocation with Existing Tenants and the Stable Roommate Problem
House Allocation with Existing Tenants and the Stable Roommate Problem Christopher Ziegler Technische Universität München ziegler@in.tum.de May 8, 2014 Christopher Ziegler (TUM) House Allocation and Roommate
More informationThe Smart Contract-Based Randomized Game, Funded With a Randomized ICO
The Smart Contract-Based Randomized Game, Funded With a Randomized ICO Content Introduction to Slot! The Game for Blockchain Purists The Case for Slot How the Slot Game Works Progressive Jackpot Chances
More informationMA/CSSE 473 Day 9. The algorithm (modified) N 1
MA/CSSE 473 Day 9 Primality Testing Encryption Intro The algorithm (modified) To test N for primality Pick positive integers a 1, a 2,, a k < N at random For each a i, check for a N 1 i 1 (mod N) Use the
More informationAssignment 2. Due: Monday Oct. 15, :59pm
Introduction To Discrete Math Due: Monday Oct. 15, 2012. 11:59pm Assignment 2 Instructor: Mohamed Omar Math 6a For all problems on assignments, you are allowed to use the textbook, class notes, and other
More informationA 4b/cycle Flash-assisted SAR ADC with Comparator Speed-boosting Technique
JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.18, NO.2, APRIL, 2018 ISSN(Print) 1598-1657 https://doi.org/10.5573/jsts.2018.18.2.281 ISSN(Online) 2233-4866 A 4b/cycle Flash-assisted SAR ADC with
More informationBreakthrough to Impact
Breakthrough to Impact November 30, 2018 Palais Brongniart, Paris 8:00 9:00 Registration and Coffee 9:00 9:30 Fireside Chat: Breakthrough to Impact Elizabeth Bramson-Boudreau, CEO and Publisher, MIT Technology
More informationHow Innovation & Automation Will Change The Real Estate Industry
How Innovation & Automation Will Change The Real Estate Industry A Conversation with Mark Lesswing & Jeff Turner People worry that computers will get too smart & take over the world, but the real problem
More informationGovernance in the Age of Algorithms, Cognitive Computing, & Systems of Systems 1
Governance in the Age of Algorithms, Cognitive Computing, & Systems of Systems Prepared by Kevin C. Desouza 2 Foundation Professor, School of Public Affairs, Arizona State University Nonresident Senior
More informationYale University Department of Computer Science
LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work
More informationThe Cauchy Criterion
The Cauchy Criterion MATH 464/506, Real Analysis J. Robert Buchanan Department of Mathematics Summer 2007 Cauchy Sequences Definition A sequence X = (x n ) of real numbers is a Cauchy sequence if it satisfies
More informationPROJECT CIRCLE WHITEPAPER
Table of Contents Abstract What is Project? Introduction Market Summery Our Solution Architecture History of Project 1 2 3 Features of Circle Coin Token and Project Factsheet Provable Fairness Roadmap
More informationCOUNTING AND PROBABILITY
CHAPTER 9 COUNTING AND PROBABILITY Copyright Cengage Learning. All rights reserved. SECTION 9.2 Possibility Trees and the Multiplication Rule Copyright Cengage Learning. All rights reserved. Possibility
More informationResearch on Market Fluctuation Caused by Ethereum Hard Fork
Research on Market Fluctuation Caused by Ethereum Hard Fork Abstract Authors:Jill Chow, Colin Bao, Chloe Luo Translators: Coral Zhang, Sophie Wu Gate.io Research Ethereum has been widely concerned since
More information1. Demonstrate the ability to manipulate shutter speed, aperture, and other camera controls to correctly expose an image using the camera meter.
Syllabus / KCPH Intro to Photography Non Majors M/W, 12:30-3:20pm, Fall 2014 Instructor: Leah Gose gosel@ferris.edu Office: 301 Hours: T, 10-1 Phone: Office Phone: 616-451-1868 x 1181 Course Description
More informationEastern Bank Challenges the Status Quo in Bank Lending by Implementing the DocuSign esignature API to Digitize Processes
Eastern Bank Challenges the Status Quo in Bank Lending by Implementing the DocuSign esignature API to Digitize Processes Implementing a digital transaction strategy was a huge win for Eastern Bank. It
More informationWhat is a Sorting Function?
Department of Computer Science University of Copenhagen Email: henglein@diku.dk WG 2.8 2008, Park City, June 15-22, 2008 Outline 1 Sorting algorithms Literature definitions What is a sorting criterion?
More informationFuture of Cities. Harvard GSD. Smart[er] Citizens Bergamo University
Future of Cities Harvard GSD Smart[er] Citizens Bergamo University Future of Cities Harvard GSD Smart[er] Citizens Bergamo University SMART[ER] CITIES Harvard Graduate School of Design SCI 0637100 Spring
More informationIntroduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 25 Mental Poker And Semantic Security CS 355 Fall 2005 / Lecture 25 1 Lecture Outline Review of number theory The Mental Poker Protocol Semantic security Semantic
More informationMENA-ECA-APAC NETWORK MEETINGS, 2017
MENA-ECA-APAC NETWORK MEETINGS, 2017 INNOVATION AND DISRUPTIVE TECHNOLOGY Sleem Hasan, Founder and CEO, Privity November 15, 2017 "Technology is the ONLY discipline I have identified that has the ability
More informationResearch of key technical issues based on computer forensic legal expert system
International Symposium on Computers & Informatics (ISCI 2015) Research of key technical issues based on computer forensic legal expert system Li Song 1, a 1 Liaoning province,jinzhou city, Taihe district,keji
More informationMOBY-DIC. Grant Agreement Number Model-based synthesis of digital electronic circuits for embedded control. Publishable summary
MOBY-DIC Grant Agreement Number 248858 Model-based synthesis of digital electronic circuits for embedded control Report version: 1 Due date: M24 (second periodic report) Period covered: December 1, 2010
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationAVACS Automatic Verification and Analysis of Complex Systems
AVACS Automatic Verification and Analysis of Complex s Werner Damm AVACS coordinator of Presentation The AVACS Vision Highlights of Phase II 2 Complex s Copyright Prevent Project 3 Source: Aramis Project
More informationHow to divide things fairly
MPRA Munich Personal RePEc Archive How to divide things fairly Steven Brams and D. Marc Kilgour and Christian Klamler New York University, Wilfrid Laurier University, University of Graz 6. September 2014
More informationUnlocking the blockchain
Financial institutions Energy Infrastructure, mining and commodities Transport Technology and innovation Life sciences and healthcare Unlocking the blockchain A global legal and regulatory guide Chapter
More informationGeneral Secretariat (SG)
General Secretariat (SG) Geneva, 20 February 2018 Ref: CL-18/08 TSB/AM Contact: Alessia Magliarditi Telephone: +41 22 730 5882 Telefax: E-mail: +41 22 730 5853 kaleidoscope@itu.int To: ITU Member States
More informationBNG BANK THE FOURTH INDUSTRIAL REVOLUTION QUESTIONS CONCERNING INFORMATION, COMPLEXITY AND ETHICS
Beilen, 30 November 2016 BNG BANK THE FOURTH INDUSTRIAL REVOLUTION QUESTIONS CONCERNING INFORMATION, COMPLEXITY AND ETHICS PROF. DR. BEN VAN LIER DIRECTOR STRATEGY & INNOVATION Sanderink Investments Centric
More informationBI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy
11 BI TRENDS FOR 2018 Data De-silofication: The Secret to Success in the Analytics Economy De-silofication What is it? Many successful companies today have found their own ways of connecting data, people,
More information#RSAC PGR-R01. Rise of the Machines. John ELLIS. Co-Founder/Principal Consultant
SESSION ID: PGR-R01 Rise of the Machines John ELLIS Co-Founder/Principal Consultant Andgiet Security @zenofsecurity @andgietsecurity [~]$ whoami New Zealander (aka kiwi) Started my career in the military
More informationIntroduction to Systems Engineering
p. 1/2 ENES 489P Hands-On Systems Engineering Projects Introduction to Systems Engineering Mark Austin E-mail: austin@isr.umd.edu Institute for Systems Research, University of Maryland, College Park Career
More informationDISTRIBUTED DYNAMIC CHANNEL ALLOCATION ALGORITHM FOR CELLULAR MOBILE NETWORK
DISTRIBUTED DYNAMIC CHANNEL ALLOCATION ALGORITHM FOR CELLULAR MOBILE NETWORK 1 Megha Gupta, 2 A.K. Sachan 1 Research scholar, Deptt. of computer Sc. & Engg. S.A.T.I. VIDISHA (M.P) INDIA. 2 Asst. professor,
More informationHeuristic Search with Pre-Computed Databases
Heuristic Search with Pre-Computed Databases Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Abstract Use pre-computed partial results to improve the efficiency of heuristic
More informationPermutation Groups. Definition and Notation
5 Permutation Groups Wigner s discovery about the electron permutation group was just the beginning. He and others found many similar applications and nowadays group theoretical methods especially those
More informationModule Role of Software in Complex Systems
Module Role of Software in Complex Systems Frogs vei 41 P.O. Box 235, NO-3603 Kongsberg Norway gaudisite@gmail.com Abstract This module addresses the role of software in complex systems Distribution This
More informationDisrupting our way to a Very Human City
Disrupting our way to a Very Human City Zagreb Forum 2017 Technology Park Zagreb 20 th November 2017 Steve Wells COO, Fast Future Publishing steve@fastfuturepublishing.com Image: http://www.bbc.com Through
More informationISSUANCE AND CIVIL REGISTRATION
IDENTITY VERIFICATION IN PASSPORT ISSUANCE AND CIVIL REGISTRATION THE IMPORTANCE OF CONTEXT AND CONTINUITY OF IDENTITY Ross Greenwood Identity Matters Consulting Australia PURPOSE To invite a claim to
More informationPrivacy Management in Smart Cities
Privacy Management in Smart Cities Antonio Kung 26/04/2017 Data management and citizens privacy in smart cities open governance 1 Introduction Speaker Antonio Kung, Trialog (www.trialog.com,fr) Engineering
More informationTiling Problems. This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane
Tiling Problems This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane The undecidable problems we saw at the start of our unit
More informationHow (Information Theoretically) Optimal Are Distributed Decisions?
How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr
More informationTowards a Reusable Unified Basis for Representing Business Domain Knowledge and Development Artifacts in Systems Engineering
Towards a Reusable Unified Basis for Representing Business Domain Knowledge and Development Artifacts in Systems Engineering Thomas Kofler and Daniel Ratiu 2010-11-03 The Third Workshop on Domain Engineering
More informationR&D Meets Production: The Dark Side
R&D Meets Production: The Dark Side J.P.Lewis zilla@computer.org Disney The Secret Lab Disney/Lewis: R&D Production The Dark Side p.1/46 R&D Production Issues R&D Production interaction is not always easy.
More informationPhilosophy. AI Slides (5e) c Lin
Philosophy 15 AI Slides (5e) c Lin Zuoquan@PKU 2003-2018 15 1 15 Philosophy 15.1 AI philosophy 15.2 Weak AI 15.3 Strong AI 15.4 Ethics 15.5 The future of AI AI Slides (5e) c Lin Zuoquan@PKU 2003-2018 15
More informationTECHNOLOGY. Our product is 100% ready and is constantly updated. Developing the game, we used technologies assuring high quality of our product:
ABOUT US Crypto Farmer is an economic online game using Blockchain technology allowing to withdraw money. It will passionate those interested in earning money, wages and finance. Our game allows each player
More informationWe would be delighted to discuss your needs and how we could support you, so please get in touch. Our contact details appear on the final page.
Fluent in Fintech Whether you are developing, procuring, or investing in financial technology we understand the opportunities and challenges your business can face and we are keen to support ambitious
More informationAutomated Software Engineering Writing Code to Help You Write Code. Gregory Gay CSCE Computing in the Modern World October 27, 2015
Automated Software Engineering Writing Code to Help You Write Code Gregory Gay CSCE 190 - Computing in the Modern World October 27, 2015 Software Engineering The development and evolution of high-quality
More informationRDA 9.2: Addition of elements for Given name and Surname
Page 1 of 10 To: From: Subject: RDA Steering Committee Gordon Dunsire, Chair, RSC Technical Working Group RDA 9.2: Addition of elements for Given name and Surname Abstract This paper proposes the addition
More informationPanel on Adaptive, Autonomous and Machine Learning: Applications, Challenges and Risks - Introduction
Panel on Adaptive, Autonomous and Machine Learning: Applications, Challenges and Risks - Introduction Prof. Dr. Andreas Rausch Februar 2018 Clausthal University of Technology Institute for Informatics
More information