SMART CONTRACTS ARE NEITHER

Size: px
Start display at page:

Download "SMART CONTRACTS ARE NEITHER"

Transcription

1 SMART S ARE NEITHER SMART NOR S FRITZ HENGLEIN UNIVERSITY OF COPENHAGEN Cyber Security, Privacy and Blockchain High Tech Summit, DTU

2 FRITZ HENGLEIN Professor of programming languages and systems Foundations, techniques, algorithmics, language design Enterprise systems, healthcare, finance, blockchain, contract management Director, Research center for high-performance computing for finance (HIPERFIT.dk) Steering committee chair, Innovation network for Finance IT (CFIR.dk) Mostly academic, some industrial lab/start-up experience Technische Universität München, Rutgers University; New York University, Utrecht University, University of Copenhagen, IT University of Copenhagen; IBM Research, Cornell University, University of New South Wales, University of Oxford; Hafnium Research ApS, Deon Digital AG/Deon Digital Denmark A/S,

3 A CRASH SLIDE ON BLOCKCHAIN AND SMART S SMART TERM WHAT IT ACTUALLY MEANS BLOCKCHAIN SMART (CODE) SMART (EXECUTING) DISTRIBUTED APPEND-ONLY TRANSACTION LOG (LEDGER) CLASS (IN JAVA-LIKE LANGUAGE) PROCESS (OBJECT [= CLASS INSTANCE]) OBJECT MESSAGES ORDINARY MESSAGES LINEAR RESOURCE TRANSFERS

4 A CRASH SLIDE ON BLOCKCHAIN AND SMART S SMART TERM WHAT IT ACTUALLY MEANS BLOCKCHAIN SMART (CODE) SMART (EXECUTING) DISTRIBUTED APPEND-ONLY LINEAR RESOURCE TRANSFER LOG CLASS (IN JAVA-LIKE LANGUAGE) PROCESS (OBJECT [= CLASS INSTANCE]) OBJECT MESSAGES ORDINARY MESSAGES LINEAR RESOURCE TRANSFERS

5 BLOCKCHAIN SYSTEM ARCHITECTURE

6 VERSUS SMART Contract: Obligations and permissions (rules) Strategy: Particular way to satisfy a contract (actions) Smart contract: Rules and all parties actions

7 VERSUS SMART SMART ALICE S BOB S CHARLIE S Contract: Obligations and permissions (rules) DORIT S CONT RACT EDDIE S Strategy: A single party s actions (actions) FRED S GEORGE S HENRY S Smart contract: Rules and all parties codified actions intermixed

8 VERSUS SMART SMART ALICE S BOB S Actually Contract checking and actions (strategy) mixed together in the source code CHARLIE S EDDIE S HENRY S ALICE S HENRY S

9 VERSUS SMART SMART ALICE S BOB S CHARLIE S Actually Contract checking and actions (strategy) mixed together in the source code and one cannot even see which is which EDDIE S HENRY S ALICE S HENRY S

10 VERSUS SMART SMART ALICE S BOB S What is the contract and what is strategy? CHARLIE S EDDIE S How do you compose contracts (by themselves)? HENRY S ALICE S HENRY S How do you analyze contracts?

11 VERSUS SMART CODIFIED PART OF CHARLIE S ALICE S BOB S CHARLIE S CHARLIE AT HIS TERMINAL DORIT S CONT RACT EDDIE S FRED S GEORGE S HENRY S

12 VERSUS SMART ALICE S BOB S CHARLIE S CHARLIE AUTOMATES HIMSELF DORIT S CONT RACT EDDIE S FRED S GEORGE S HENRY S

13 VERSUS SMART ALICE S BOB S CHARLIE S NEW, FULLY AUTOMATED DORIT S CONT RACT EDDIE S FRED S GEORGE S HENRY S

14 VERSUS SMART ALICE S BOB S CHARLIE S NEW, FULLY AUTOMATED DORIT S NEW SEMI-AUTOMATED CONT RACT EDDIE S FRED S GEORGE S HENRY S DORIT AUTOMATES PARTS OF HER TERMINAL INTERACTIONS

15 VERSUS SMART IS UNCHANGED! ALICE S BOB S CHARLIE S NEW, FULLY AUTOMATED DORIT S NEW SEMI-AUTOMATED CONT RACT EDDIE S FRED S GEORGE S HENRY S

16 VERSUS SMART IS UNCHANGED! SMART ALICE S BOB S CHARLIE S NEW, FULLY AUTOMATED DORIT S NEW SEMI-AUTOMATED CONT RACT EDDIE S FRED S GEORGE S HENRY S BUT SMART SHOULD BE CHANGED!?

17 THE PRICE OF EXPRESSIVENESS: RICE S THEOREM Rice (1953) Smart contract: usually program, written in Turing-complete programming language (Ethereum, Corda, Fabric, ) + : Expressive - : Undecidable properties even with full access to the source code Smart contracts are ultimately unanalyzable

18 ETHEREUM VULNERABILITIES Transaction-order dependence: Messages may have different effect depending on their order of arrival Who controls the process scheduler (= message sequencer)? Some miner: Front-running Time-stamp dependence: Smart contracts may have different executions depending on the time stamp on a transaction block Who controls the time stamping of transaction blocks? Some miner: Clock manipulation Exception handling, gas management fragility: Subtle differences in exception semantics, limited run-time stack Provoking out-of-stack and gas exhaustion exceptions: Any user Programming language subtleties: Exception handling subtleties (send vs. call) Reentrancy vulnerability (DAO hack) Implicit method forwarding (multi-sig exploit) LUU, CHU, OLICKEL, SAXENA, HOBOR, MAKING SMART S SMARTER (2016)

19 REENTRANCY VULNERABILITY LUU, CHU, OLICKEL, SAXENA, HOBOR, MAKING SMART S SMARTER (2016)

20 OTHER BLOCKCHAIN SYSTEM ASPECTS Performance Availability Partition tolerance Security Privacy (Trade-offs between above, some inherent, some not)

21 SUMMARY Smart contracts = self-executing contracts (programs) in complex Turing-complete programming language Rules and actions intermixed: Not contracts Hard to analyze, low-level programs: Not smart

22 MORE INFORMATION hiperfit.dk: Functional high-performance computing for finance Domain-specific languages for compositional and verifiable contracts GOING LIVE ANY TIME NOW plan-x.org: Functional programming language technology for high-performance blockchain systems FUNCTIONAL PROGRAMMING = PROGRAMMING WITH IMMUTABLE TAMPER-PROOF DATA

23 Thank you!

Bitcoin and Blockchain for Pythoneers

Bitcoin and Blockchain for Pythoneers Bitcoin and Blockchain for Pythoneers EuroPython 2017 Benno Luthiger 10.07.2017 1 Why Bitcoin? Crypto currency fast reliable without central authority The Blockchain is a distributed ledger (peer to peer).

More information

Transforming a Digital Generation: How the Economic and Legal Implications of Blockchain Will Reshape Society

Transforming a Digital Generation: How the Economic and Legal Implications of Blockchain Will Reshape Society Transforming a Digital Generation: How the Economic and Legal Implications of Blockchain Will Reshape Society State of the Art Agenda Technological Potential & Legal Implications Looking Ahead: Key Policy

More information

BLOCKCHAIN FOR SOCIAL GOOD. November 9, 2017 Dr. Cara LaPointe

BLOCKCHAIN FOR SOCIAL GOOD. November 9, 2017 Dr. Cara LaPointe BLOCKCHAIN FOR SOCIAL GOOD November 9, 2017 Dr. Cara LaPointe What is the Blockchain for Social Good project? 3 Building a Framework Around Privacy & Ethics 4 Approach Build Community Understand the Challenges

More information

The Blockchain Ethical Design Framework

The Blockchain Ethical Design Framework The Blockchain Ethical Design Framework September 19, 2018 Dr. Cara LaPointe Senior Fellow Georgetown University Beeck Center for Social Impact + Innovation The Blockchain Ethical Design Framework Driving

More information

Beyond Buzzwords: Emerging Technologies That Matter

Beyond Buzzwords: Emerging Technologies That Matter Norm Rose President Beyond Buzzwords: Emerging Technologies That Matter Demystifying Emerging Technologies for the Global Travel Industry April 26, 2018 Overview otechnology Evolution and Hype oemerging

More information

Innovative Gambling Platform On The Ethereum Blockchain

Innovative Gambling Platform On The Ethereum Blockchain Innovative Gambling Platform On The Ethereum Blockchain Today s gaming market suffers from the crisis of trust between the players and the game organizers. As you are aware of, the organizers of casino

More information

TOKEN SALE AGREEMENT

TOKEN SALE AGREEMENT TOKEN SALE AGREEMENT SwiftDemand Last Updated: March 30, 2018 This Token Sale Agreement is a legally binding contract between you and SwiftDemand Inc. (hereinafter Company ) regarding your rights and responsibilities

More information

Crypto Art, Law and Blockchain

Crypto Art, Law and Blockchain Crypto Art, Law and Blockchain Professor Tonya M. Evans Chair, IP & Technology Online Programs Franklin Pierce Center for Intellectual Property, University of New Hampshire School of Law @IPProfEvans #EvansOnTheBlock

More information

Smart Waste Management: An IOT and Blockchains based approach

Smart Waste Management: An IOT and Blockchains based approach Smart Waste Management: An IOT and Blockchains based approach Author 1 Manish Lamichhane Master's Thesis student Erasmus Mundus PERCCOM Author 2 Oleg Sadov Supervisor, Senior Engineer, ITMO University,

More information

BitRs Coins WHITEPAPER

BitRs Coins WHITEPAPER BitRs Coins WHITEPAPER 02 www. bitrscoin.com INDEX BitRs Coin Introduction3 Coin & Token Details 4 Business Plan 5 Future Plan 6 Contact Details 6 Technical Details 7 ERC20 Tokens 8 03 www. bitrscoin.com

More information

SWIFT on distributed ledger technologies

SWIFT on distributed ledger technologies SWIFT on distributed ledger technologies Damien Vanderveken, Head of R&D, SWIFTLab and UX October 2016 Intro & Session Objectives How Blockchain and distributed ledger technologies (DLTs) could be deployed

More information

Artificial Intelligence and Law. Latifa Al-Abdulkarim Assistant Professor of Artificial Intelligence, KSU

Artificial Intelligence and Law. Latifa Al-Abdulkarim Assistant Professor of Artificial Intelligence, KSU Artificial Intelligence and Law Latifa Al-Abdulkarim Assistant Professor of Artificial Intelligence, KSU AI is Multidisciplinary Since 1956 Artificial Intelligence Cognitive Science SLC PAGE: 2 What is

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

Digital Transformation. A Game Changer. How Does the Digital Transformation Affect Informatics as a Scientific Discipline?

Digital Transformation. A Game Changer. How Does the Digital Transformation Affect Informatics as a Scientific Discipline? Digital Transformation A Game Changer How Does the Digital Transformation Affect Informatics as a Scientific Discipline? Manfred Broy Technische Universität München Institut for Informatics ... the change

More information

Stanford Blockchain Protocol Analysis and Security Engineering 2018 Introduction & Overview

Stanford Blockchain Protocol Analysis and Security Engineering 2018 Introduction & Overview Stanford Blockchain Protocol Analysis and Security Engineering 2018 Introduction & Overview Byron Gibson https://cyber.stanford.edu/bpase18 1 of 5 Contents Contents 2 I. Introduction & Overview 3 What

More information

Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance

Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance A self-sovereign identity portal for regulated industries and the Internet of Everything guy.davies@blockpass.org www.blockpass.org

More information

COMP219: Artificial Intelligence. Lecture 2: AI Problems and Applications

COMP219: Artificial Intelligence. Lecture 2: AI Problems and Applications COMP219: Artificial Intelligence Lecture 2: AI Problems and Applications 1 Introduction Last time General module information Characterisation of AI and what it is about Today Overview of some common AI

More information

Bone Crusher 2.0. James Grimmelmann. Fourth Annual Greg Lastowka Memorial Lecture November 15, 2018

Bone Crusher 2.0. James Grimmelmann. Fourth Annual Greg Lastowka Memorial Lecture November 15, 2018 Bone Crusher 2.0 James Grimmelmann Fourth Annual Greg Lastowka Memorial Lecture November 15, 2018 Bone Crusher 1.0 When virtual-world lawsuits arise, as they inevitably will, it will not be a sufficient

More information

Formal Accountability for Biometric Surveillance: A Case Study

Formal Accountability for Biometric Surveillance: A Case Study Vinh Thong Ta University of Central Lancashire, UK vtta@uclan.ac.uk Joint work with Denis Butin Technische Universität Darmstadt, Germany Daniel Le Métayer INRIA, France APF 2015, October 7-8, Luxembourg

More information

BIM+Blockchain: A Solution to the "Trust" problem in Collaboration?

BIM+Blockchain: A Solution to the Trust problem in Collaboration? BIM+Blockchain: A Solution to the "Trust" problem in Collaboration? Link to conference paper http://arrow.dit.ie/bescharcon/26/ Malachy Mathews, Senior Lecturer, School of Architecture, Dublin Institute

More information

2. The Crypto Story So Far

2. The Crypto Story So Far 0 Contents 1. Abstract 2. The crypto story so far 2.1. The problem 3. Fornix Our purpose 4. The Fornix Solution 4.1. Master-nodes 4.2. Proof-of-Stake System 5. Use Cases 6. Coin Details 7. Project Roadmap

More information

24 Challenges in Deductive Software Verification

24 Challenges in Deductive Software Verification 24 Challenges in Deductive Software Verification Reiner Hähnle 1 and Marieke Huisman 2 1 Technische Universität Darmstadt, Germany, haehnle@cs.tu-darmstadt.de 2 University of Twente, Enschede, The Netherlands,

More information

Personal. Identity. Information

Personal. Identity. Information Personal Identity Information What is it? Work Membership Student Citizen Identity Healthcare On-line Financial Military What Is Identity Information? Definition: Identity information is an assortment

More information

FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS

FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS Meriem Taibi 1 and Malika Ioualalen 1 1 LSI - USTHB - BP 32, El-Alia, Bab-Ezzouar, 16111 - Alger, Algerie taibi,ioualalen@lsi-usthb.dz

More information

Editorial for the Special Issue on Aspects and Model-Driven Engineering

Editorial for the Special Issue on Aspects and Model-Driven Engineering Editorial for the Special Issue on Aspects and Model-Driven Engineering Robert France 1 and Jean-Marc Jézéquel 2 1 Colorado State University, Fort Collins, Colorado, USA, france@cs.colostate.edu, 2 IRISA-Université

More information

SingularityNET. The pla(orm for the decentralized AI economy

SingularityNET. The pla(orm for the decentralized AI economy SingularityNET The pla(orm for the decentralized AI economy AI Is Everywhere Trading Robo+cs Big Data Over 1,300 hedge funds use AI to trade billions in securi@es AI systems are used for surgery, manufacturing,

More information

GDPR & Teknologiske Trends

GDPR & Teknologiske Trends GDPR & Teknologiske Trends Are we guiding from the Front??!!!??? Hans Peter Dueholm, Nordic CTO, IBM Distinguished Engineer +45 2880 4269 Hans Peter Dueholm Nordic CTO, IBM Distinguished Engineer Cand.scient.oecon.

More information

M&S Engineering Complex Systems; Research Challenges

M&S Engineering Complex Systems; Research Challenges M&S Engineering Complex Systems; Research Challenges Randall B. Garrett, Ph.D. Chief Scientist, SimIS Inc. Vice Chair, National Modeling and Simulation Coalition Detroit, MI September 2017 Events/History

More information

Service Innovation, Engineering and Management. Short Description of the Proposed Track

Service Innovation, Engineering and Management. Short Description of the Proposed Track Service Innovation, Engineering and Management Short Description of the Proposed Track Digitization is a strong driver for service-centric value creation and the proliferation of service-centric IT infrastructure.

More information

Public Key Encryption

Public Key Encryption Math 210 Jerry L. Kazdan Public Key Encryption The essence of this procedure is that as far as we currently know, it is difficult to factor a number that is the product of two primes each having many,

More information

Knowledge Management for Command and Control

Knowledge Management for Command and Control Knowledge Management for Command and Control Dr. Marion G. Ceruti, Dwight R. Wilcox and Brenda J. Powers Space and Naval Warfare Systems Center, San Diego, CA 9 th International Command and Control Research

More information

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 1 Cryptography Module in Autumn Term 2016 University of Birmingham Lecturers: Mark D. Ryan and David Galindo Slides originally written

More information

DESIGN OF AN INNOVATION PLATFORM FOR MANUFACTURING SMES

DESIGN OF AN INNOVATION PLATFORM FOR MANUFACTURING SMES Proceedings of the 11 th International Conference on Manufacturing Research (ICMR2013) DESIGN OF AN INNOVATION PLATFORM FOR MANUFACTURING SMES Martin Ziarati Centre for Factories of the Future Design Hub

More information

Bit Reversal Broadcast Scheduling for Ad Hoc Systems

Bit Reversal Broadcast Scheduling for Ad Hoc Systems Bit Reversal Broadcast Scheduling for Ad Hoc Systems Marcin Kik, Maciej Gebala, Mirosław Wrocław University of Technology, Poland IDCS 2013, Hangzhou How to broadcast efficiently? Broadcasting ad hoc systems

More information

A Complete Approximation Theory for Weighted Transition Systems

A Complete Approximation Theory for Weighted Transition Systems A Complete Approximation Theory for Weighted Transition Systems December 1, 2015 Peter Christoffersen Mikkel Hansen Mathias R. Pedersen Radu Mardare Kim G. Larsen Department of Computer Science Aalborg

More information

Introduction to Source Coding

Introduction to Source Coding Comm. 52: Communication Theory Lecture 7 Introduction to Source Coding - Requirements of source codes - Huffman Code Length Fixed Length Variable Length Source Code Properties Uniquely Decodable allow

More information

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Antonio Kung, CTO 25 rue du Général Foy, 75008 Paris www.trialog.com 9 May 2017 1 Introduction Speaker Engineering

More information

Introduction to FinTech and Smart Contracts

Introduction to FinTech and Smart Contracts Introduction to FinTech and Smart Contracts IIFM Seminar on Islamic Financial Markets Monday, 8 th May 2018, Kuala Lumpur Hosted by Labuan FSA and Labuan IBFC Inc. Ismail Dadabhoy Advisor, IIFM FinTech

More information

DVA325 Formal Languages, Automata and Models of Computation (FABER)

DVA325 Formal Languages, Automata and Models of Computation (FABER) DVA325 Formal Languages, Automata and Models of Computation (FABER) Lecture 1 - Introduction School of Innovation, Design and Engineering Mälardalen University 11 November 2014 Abu Naser Masud FABER November

More information

The Tech Megatrends: 2018

The Tech Megatrends: 2018 The Tech Megatrends: 2018 April 17, 2018 Cristina CK Kerley http://allthingsck.comhttp://allthingsck.com TECH MEGATRENDS 2018: Trends & Imperatives 2018 Christina CK Kerley http://allthingsck.com Apr 18,

More information

Great Minds. Internship Program IBM Research - China

Great Minds. Internship Program IBM Research - China Internship Program 2017 Internship Program 2017 Jump Start Your Future at IBM Research China Introduction invites global candidates to apply for the 2017 Great Minds internship program located in Beijing

More information

Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities

Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities Timely access to data, particularly data relevant to a patient s medical and genetic

More information

Task Allocation: Motivation-Based. Dr. Daisy Tang

Task Allocation: Motivation-Based. Dr. Daisy Tang Task Allocation: Motivation-Based Dr. Daisy Tang Outline Motivation-based task allocation (modeling) Formal analysis of task allocation Motivations vs. Negotiation in MRTA Motivations(ALLIANCE): Pro: Enables

More information

Panel Discussion. Dr. Dr. Norbert A. Streitz. The infinity Initiative Sophia Antipolis, 29. November Darmstadt, Germany

Panel Discussion. Dr. Dr. Norbert A. Streitz. The infinity Initiative Sophia Antipolis, 29. November Darmstadt, Germany The infinity Initiative Sophia Antipolis, 29. November 2007 Panel Discussion Dr. Dr. Norbert A. Streitz Darmstadt, Germany www.ipsi.fraunhofer.de/~streitz streitz@ipsi.fraunhofer.de Panel Discussion Topics

More information

Action Line Cyber-Physical Systems Addressing the challenges and fostering innovation in Cyber-Physical Systems

Action Line Cyber-Physical Systems Addressing the challenges and fostering innovation in Cyber-Physical Systems Action Line Cyber-Physical Systems Addressing the challenges and fostering innovation in Cyber-Physical Systems Dr. Holger Pfeifer Technische Universität München EIT ICT Labs Action Line Lead Cyber-Physical

More information

VLSI Physical Design Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

VLSI Physical Design Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur VLSI Physical Design Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture- 05 VLSI Physical Design Automation (Part 1) Hello welcome

More information

Time Difference of Arrival Localization Testbed: Development, Calibration, and Automation GRCon 2017

Time Difference of Arrival Localization Testbed: Development, Calibration, and Automation GRCon 2017 Time Difference of Arrival Localization Testbed: Development, Calibration, and Automation GRCon 2017 Intelligent Digital Communications Georgia Tech VIP Team 1 Overview Introduction IDC Team Stadium Testbed

More information

Computer Science: Disciplines. What is Software Engineering and why does it matter? Software Disasters

Computer Science: Disciplines. What is Software Engineering and why does it matter? Software Disasters Computer Science: Disciplines What is Software Engineering and why does it matter? Computer Graphics Computer Networking and Security Parallel Computing Database Systems Artificial Intelligence Software

More information

Advances and Perspectives in Health Information Standards

Advances and Perspectives in Health Information Standards Advances and Perspectives in Health Information Standards HL7 Brazil June 14, 2018 W. Ed Hammond. Ph.D., FACMI, FAIMBE, FIMIA, FHL7, FIAHSI Director, Duke Center for Health Informatics Director, Applied

More information

End-User Innovation in Evidence-Based Medicine: AND IMPLICATIONS FOR HEALTH CARE POLICIES AND PRACTICES

End-User Innovation in Evidence-Based Medicine: AND IMPLICATIONS FOR HEALTH CARE POLICIES AND PRACTICES End-User Innovation in Evidence-Based Medicine: The Quadruple / Quintuple Innovation Helix Context AND IMPLICATIONS FOR HEALTH CARE POLICIES AND PRACTICES ESDY CONFERENCE INVITED LECTURE PROF. ELIAS G.

More information

The number theory behind cryptography

The number theory behind cryptography The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?

More information

Situated Interaction:

Situated Interaction: Situated Interaction: Creating a partnership between people and intelligent systems Wendy E. Mackay in situ Computers are changing Cost Mainframes Mini-computers Personal computers Laptops Smart phones

More information

2 Polling. Politecnico di Milano Facoltà di Ingegneria dell Informazione

2 Polling. Politecnico di Milano Facoltà di Ingegneria dell Informazione Politecnico di Milano Facoltà di Ingegneria dell Informazione Polling Multiple Access in Wireless Networks: Models and echnologies Prof. Antonio Capone Assumptions and notation o In the following we drop

More information

House Allocation with Existing Tenants and the Stable Roommate Problem

House Allocation with Existing Tenants and the Stable Roommate Problem House Allocation with Existing Tenants and the Stable Roommate Problem Christopher Ziegler Technische Universität München ziegler@in.tum.de May 8, 2014 Christopher Ziegler (TUM) House Allocation and Roommate

More information

The Smart Contract-Based Randomized Game, Funded With a Randomized ICO

The Smart Contract-Based Randomized Game, Funded With a Randomized ICO The Smart Contract-Based Randomized Game, Funded With a Randomized ICO Content Introduction to Slot! The Game for Blockchain Purists The Case for Slot How the Slot Game Works Progressive Jackpot Chances

More information

MA/CSSE 473 Day 9. The algorithm (modified) N 1

MA/CSSE 473 Day 9. The algorithm (modified) N 1 MA/CSSE 473 Day 9 Primality Testing Encryption Intro The algorithm (modified) To test N for primality Pick positive integers a 1, a 2,, a k < N at random For each a i, check for a N 1 i 1 (mod N) Use the

More information

Assignment 2. Due: Monday Oct. 15, :59pm

Assignment 2. Due: Monday Oct. 15, :59pm Introduction To Discrete Math Due: Monday Oct. 15, 2012. 11:59pm Assignment 2 Instructor: Mohamed Omar Math 6a For all problems on assignments, you are allowed to use the textbook, class notes, and other

More information

A 4b/cycle Flash-assisted SAR ADC with Comparator Speed-boosting Technique

A 4b/cycle Flash-assisted SAR ADC with Comparator Speed-boosting Technique JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.18, NO.2, APRIL, 2018 ISSN(Print) 1598-1657 https://doi.org/10.5573/jsts.2018.18.2.281 ISSN(Online) 2233-4866 A 4b/cycle Flash-assisted SAR ADC with

More information

Breakthrough to Impact

Breakthrough to Impact Breakthrough to Impact November 30, 2018 Palais Brongniart, Paris 8:00 9:00 Registration and Coffee 9:00 9:30 Fireside Chat: Breakthrough to Impact Elizabeth Bramson-Boudreau, CEO and Publisher, MIT Technology

More information

How Innovation & Automation Will Change The Real Estate Industry

How Innovation & Automation Will Change The Real Estate Industry How Innovation & Automation Will Change The Real Estate Industry A Conversation with Mark Lesswing & Jeff Turner People worry that computers will get too smart & take over the world, but the real problem

More information

Governance in the Age of Algorithms, Cognitive Computing, & Systems of Systems 1

Governance in the Age of Algorithms, Cognitive Computing, & Systems of Systems 1 Governance in the Age of Algorithms, Cognitive Computing, & Systems of Systems Prepared by Kevin C. Desouza 2 Foundation Professor, School of Public Affairs, Arizona State University Nonresident Senior

More information

Yale University Department of Computer Science

Yale University Department of Computer Science LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work

More information

The Cauchy Criterion

The Cauchy Criterion The Cauchy Criterion MATH 464/506, Real Analysis J. Robert Buchanan Department of Mathematics Summer 2007 Cauchy Sequences Definition A sequence X = (x n ) of real numbers is a Cauchy sequence if it satisfies

More information

PROJECT CIRCLE WHITEPAPER

PROJECT CIRCLE WHITEPAPER Table of Contents Abstract What is Project? Introduction Market Summery Our Solution Architecture History of Project 1 2 3 Features of Circle Coin Token and Project Factsheet Provable Fairness Roadmap

More information

COUNTING AND PROBABILITY

COUNTING AND PROBABILITY CHAPTER 9 COUNTING AND PROBABILITY Copyright Cengage Learning. All rights reserved. SECTION 9.2 Possibility Trees and the Multiplication Rule Copyright Cengage Learning. All rights reserved. Possibility

More information

Research on Market Fluctuation Caused by Ethereum Hard Fork

Research on Market Fluctuation Caused by Ethereum Hard Fork Research on Market Fluctuation Caused by Ethereum Hard Fork Abstract Authors:Jill Chow, Colin Bao, Chloe Luo Translators: Coral Zhang, Sophie Wu Gate.io Research Ethereum has been widely concerned since

More information

1. Demonstrate the ability to manipulate shutter speed, aperture, and other camera controls to correctly expose an image using the camera meter.

1. Demonstrate the ability to manipulate shutter speed, aperture, and other camera controls to correctly expose an image using the camera meter. Syllabus / KCPH Intro to Photography Non Majors M/W, 12:30-3:20pm, Fall 2014 Instructor: Leah Gose gosel@ferris.edu Office: 301 Hours: T, 10-1 Phone: Office Phone: 616-451-1868 x 1181 Course Description

More information

Eastern Bank Challenges the Status Quo in Bank Lending by Implementing the DocuSign esignature API to Digitize Processes

Eastern Bank Challenges the Status Quo in Bank Lending by Implementing the DocuSign esignature API to Digitize Processes Eastern Bank Challenges the Status Quo in Bank Lending by Implementing the DocuSign esignature API to Digitize Processes Implementing a digital transaction strategy was a huge win for Eastern Bank. It

More information

What is a Sorting Function?

What is a Sorting Function? Department of Computer Science University of Copenhagen Email: henglein@diku.dk WG 2.8 2008, Park City, June 15-22, 2008 Outline 1 Sorting algorithms Literature definitions What is a sorting criterion?

More information

Future of Cities. Harvard GSD. Smart[er] Citizens Bergamo University

Future of Cities. Harvard GSD. Smart[er] Citizens Bergamo University Future of Cities Harvard GSD Smart[er] Citizens Bergamo University Future of Cities Harvard GSD Smart[er] Citizens Bergamo University SMART[ER] CITIES Harvard Graduate School of Design SCI 0637100 Spring

More information

Introduction to Cryptography CS 355

Introduction to Cryptography CS 355 Introduction to Cryptography CS 355 Lecture 25 Mental Poker And Semantic Security CS 355 Fall 2005 / Lecture 25 1 Lecture Outline Review of number theory The Mental Poker Protocol Semantic security Semantic

More information

MENA-ECA-APAC NETWORK MEETINGS, 2017

MENA-ECA-APAC NETWORK MEETINGS, 2017 MENA-ECA-APAC NETWORK MEETINGS, 2017 INNOVATION AND DISRUPTIVE TECHNOLOGY Sleem Hasan, Founder and CEO, Privity November 15, 2017 "Technology is the ONLY discipline I have identified that has the ability

More information

Research of key technical issues based on computer forensic legal expert system

Research of key technical issues based on computer forensic legal expert system International Symposium on Computers & Informatics (ISCI 2015) Research of key technical issues based on computer forensic legal expert system Li Song 1, a 1 Liaoning province,jinzhou city, Taihe district,keji

More information

MOBY-DIC. Grant Agreement Number Model-based synthesis of digital electronic circuits for embedded control. Publishable summary

MOBY-DIC. Grant Agreement Number Model-based synthesis of digital electronic circuits for embedded control. Publishable summary MOBY-DIC Grant Agreement Number 248858 Model-based synthesis of digital electronic circuits for embedded control Report version: 1 Due date: M24 (second periodic report) Period covered: December 1, 2010

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

AVACS Automatic Verification and Analysis of Complex Systems

AVACS Automatic Verification and Analysis of Complex Systems AVACS Automatic Verification and Analysis of Complex s Werner Damm AVACS coordinator of Presentation The AVACS Vision Highlights of Phase II 2 Complex s Copyright Prevent Project 3 Source: Aramis Project

More information

How to divide things fairly

How to divide things fairly MPRA Munich Personal RePEc Archive How to divide things fairly Steven Brams and D. Marc Kilgour and Christian Klamler New York University, Wilfrid Laurier University, University of Graz 6. September 2014

More information

Unlocking the blockchain

Unlocking the blockchain Financial institutions Energy Infrastructure, mining and commodities Transport Technology and innovation Life sciences and healthcare Unlocking the blockchain A global legal and regulatory guide Chapter

More information

General Secretariat (SG)

General Secretariat (SG) General Secretariat (SG) Geneva, 20 February 2018 Ref: CL-18/08 TSB/AM Contact: Alessia Magliarditi Telephone: +41 22 730 5882 Telefax: E-mail: +41 22 730 5853 kaleidoscope@itu.int To: ITU Member States

More information

BNG BANK THE FOURTH INDUSTRIAL REVOLUTION QUESTIONS CONCERNING INFORMATION, COMPLEXITY AND ETHICS

BNG BANK THE FOURTH INDUSTRIAL REVOLUTION QUESTIONS CONCERNING INFORMATION, COMPLEXITY AND ETHICS Beilen, 30 November 2016 BNG BANK THE FOURTH INDUSTRIAL REVOLUTION QUESTIONS CONCERNING INFORMATION, COMPLEXITY AND ETHICS PROF. DR. BEN VAN LIER DIRECTOR STRATEGY & INNOVATION Sanderink Investments Centric

More information

BI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy

BI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy 11 BI TRENDS FOR 2018 Data De-silofication: The Secret to Success in the Analytics Economy De-silofication What is it? Many successful companies today have found their own ways of connecting data, people,

More information

#RSAC PGR-R01. Rise of the Machines. John ELLIS. Co-Founder/Principal Consultant

#RSAC PGR-R01. Rise of the Machines. John ELLIS. Co-Founder/Principal Consultant SESSION ID: PGR-R01 Rise of the Machines John ELLIS Co-Founder/Principal Consultant Andgiet Security @zenofsecurity @andgietsecurity [~]$ whoami New Zealander (aka kiwi) Started my career in the military

More information

Introduction to Systems Engineering

Introduction to Systems Engineering p. 1/2 ENES 489P Hands-On Systems Engineering Projects Introduction to Systems Engineering Mark Austin E-mail: austin@isr.umd.edu Institute for Systems Research, University of Maryland, College Park Career

More information

DISTRIBUTED DYNAMIC CHANNEL ALLOCATION ALGORITHM FOR CELLULAR MOBILE NETWORK

DISTRIBUTED DYNAMIC CHANNEL ALLOCATION ALGORITHM FOR CELLULAR MOBILE NETWORK DISTRIBUTED DYNAMIC CHANNEL ALLOCATION ALGORITHM FOR CELLULAR MOBILE NETWORK 1 Megha Gupta, 2 A.K. Sachan 1 Research scholar, Deptt. of computer Sc. & Engg. S.A.T.I. VIDISHA (M.P) INDIA. 2 Asst. professor,

More information

Heuristic Search with Pre-Computed Databases

Heuristic Search with Pre-Computed Databases Heuristic Search with Pre-Computed Databases Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Abstract Use pre-computed partial results to improve the efficiency of heuristic

More information

Permutation Groups. Definition and Notation

Permutation Groups. Definition and Notation 5 Permutation Groups Wigner s discovery about the electron permutation group was just the beginning. He and others found many similar applications and nowadays group theoretical methods especially those

More information

Module Role of Software in Complex Systems

Module Role of Software in Complex Systems Module Role of Software in Complex Systems Frogs vei 41 P.O. Box 235, NO-3603 Kongsberg Norway gaudisite@gmail.com Abstract This module addresses the role of software in complex systems Distribution This

More information

Disrupting our way to a Very Human City

Disrupting our way to a Very Human City Disrupting our way to a Very Human City Zagreb Forum 2017 Technology Park Zagreb 20 th November 2017 Steve Wells COO, Fast Future Publishing steve@fastfuturepublishing.com Image: http://www.bbc.com Through

More information

ISSUANCE AND CIVIL REGISTRATION

ISSUANCE AND CIVIL REGISTRATION IDENTITY VERIFICATION IN PASSPORT ISSUANCE AND CIVIL REGISTRATION THE IMPORTANCE OF CONTEXT AND CONTINUITY OF IDENTITY Ross Greenwood Identity Matters Consulting Australia PURPOSE To invite a claim to

More information

Privacy Management in Smart Cities

Privacy Management in Smart Cities Privacy Management in Smart Cities Antonio Kung 26/04/2017 Data management and citizens privacy in smart cities open governance 1 Introduction Speaker Antonio Kung, Trialog (www.trialog.com,fr) Engineering

More information

Tiling Problems. This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane

Tiling Problems. This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane Tiling Problems This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane The undecidable problems we saw at the start of our unit

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Towards a Reusable Unified Basis for Representing Business Domain Knowledge and Development Artifacts in Systems Engineering

Towards a Reusable Unified Basis for Representing Business Domain Knowledge and Development Artifacts in Systems Engineering Towards a Reusable Unified Basis for Representing Business Domain Knowledge and Development Artifacts in Systems Engineering Thomas Kofler and Daniel Ratiu 2010-11-03 The Third Workshop on Domain Engineering

More information

R&D Meets Production: The Dark Side

R&D Meets Production: The Dark Side R&D Meets Production: The Dark Side J.P.Lewis zilla@computer.org Disney The Secret Lab Disney/Lewis: R&D Production The Dark Side p.1/46 R&D Production Issues R&D Production interaction is not always easy.

More information

Philosophy. AI Slides (5e) c Lin

Philosophy. AI Slides (5e) c Lin Philosophy 15 AI Slides (5e) c Lin Zuoquan@PKU 2003-2018 15 1 15 Philosophy 15.1 AI philosophy 15.2 Weak AI 15.3 Strong AI 15.4 Ethics 15.5 The future of AI AI Slides (5e) c Lin Zuoquan@PKU 2003-2018 15

More information

TECHNOLOGY. Our product is 100% ready and is constantly updated. Developing the game, we used technologies assuring high quality of our product:

TECHNOLOGY. Our product is 100% ready and is constantly updated. Developing the game, we used technologies assuring high quality of our product: ABOUT US Crypto Farmer is an economic online game using Blockchain technology allowing to withdraw money. It will passionate those interested in earning money, wages and finance. Our game allows each player

More information

We would be delighted to discuss your needs and how we could support you, so please get in touch. Our contact details appear on the final page.

We would be delighted to discuss your needs and how we could support you, so please get in touch. Our contact details appear on the final page. Fluent in Fintech Whether you are developing, procuring, or investing in financial technology we understand the opportunities and challenges your business can face and we are keen to support ambitious

More information

Automated Software Engineering Writing Code to Help You Write Code. Gregory Gay CSCE Computing in the Modern World October 27, 2015

Automated Software Engineering Writing Code to Help You Write Code. Gregory Gay CSCE Computing in the Modern World October 27, 2015 Automated Software Engineering Writing Code to Help You Write Code Gregory Gay CSCE 190 - Computing in the Modern World October 27, 2015 Software Engineering The development and evolution of high-quality

More information

RDA 9.2: Addition of elements for Given name and Surname

RDA 9.2: Addition of elements for Given name and Surname Page 1 of 10 To: From: Subject: RDA Steering Committee Gordon Dunsire, Chair, RSC Technical Working Group RDA 9.2: Addition of elements for Given name and Surname Abstract This paper proposes the addition

More information

Panel on Adaptive, Autonomous and Machine Learning: Applications, Challenges and Risks - Introduction

Panel on Adaptive, Autonomous and Machine Learning: Applications, Challenges and Risks - Introduction Panel on Adaptive, Autonomous and Machine Learning: Applications, Challenges and Risks - Introduction Prof. Dr. Andreas Rausch Februar 2018 Clausthal University of Technology Institute for Informatics

More information