Match!
IT Professional
IF
2.42
Papers
1407
Papers 1405
1 page of 141 pages (1,405 results)
Newest
#1Wen Hu (Harbin University of Commerce)
#2Zhipeng Fan (Harbin University of Commerce)
Last.Ye Gao (Harbin University of Commerce)
view all 3 authors...
The smart contract on the blockchain allows credible transactions without a third party. These transactions are traceable and irreversible. The deployment and implementation of smart contracts in Ethernet will consume some gas, which will directly affect the cost of smart contracts. In order to reduce the consumption of gas during the execution of smart contracts, this article proposes an optimization algorithm for generating business process smart contracts. First, business process modeling not...
Source
#1Lijun Wei (SJTU: Shanghai Jiao Tong University)
#2Jing Wu (SJTU: Shanghai Jiao Tong University)H-Index: 6
Last.Yi-Bing Lin (NCTU: National Chiao Tung University)H-Index: 45
view all 4 authors...
To build a large-scale distributed Internet of Things (IoT), a feasible prototype for Internet of Everything, blockchain can provide strong support with its excellent characteristics such as traceability and openness. Despite that the blockchain technology ideally enhances the reliability and security of IoT systems, emerging new security challenges remain to be resolved. This article details the security vulnerabilities in the convergence of blockchain and IoT as well as corresponding feasible ...
Source
Source
#1George Strawn (NAS: National Academy of Sciences)
Source
#1Mohamed El Kholy (Pharos University in Alexandria)
#2Ahmed El Fatatry (Alexandria University)H-Index: 1
Migrating from monolithic applications to Microservices architecture brings about a number of challenges. Splitting and sharing databases among Microservices is a case in point. In this article, we present a framework for managing the splitting of databases among Micorservices. The proposed solution maintains data consistency and independent deployment of Microservices while enhancing the solution to latency problems. The evaluation results show enhancement in performance as a result of using th...
Source
#1Sorel Reisman (CSUF: California State University, Fullerton)H-Index: 5
Source
#1Tengyue Li (UM: University of Macau)H-Index: 1
#2Simon Fong (UM: University of Macau)H-Index: 23
Last.Sabah Mohammed (Lakehead University)H-Index: 10
view all 7 authors...
Source
#1Stephen J. Andriole (Villanova University)H-Index: 9
Source
#1Diana Rojas-Torres (Universidad de La Sabana)H-Index: 1
#2Nir Kshetri (UNCG: University of North Carolina at Greensboro)H-Index: 29
Source
Source
12345678910
Top fields of study
The Internet
Information technology
Computer security
Computer science
Knowledge management