2015
DOI: 10.21821/2309-5180-2015-7-3-175-186
|View full text |Cite
|
Sign up to set email alerts
|

Improving the Efficiency of Energy Supply Shipbuilding and Ship-Repairing Enterprises

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…Lighting [1], Raidon [2] Flare [6], Sprites (FC '19) [7] REVIVE (CCS '17) [8] Spider (NSDI '20) [9] Flash (CoNEXT '19) [10] TumbleBit (NDSS '17) [3] A 2 L (S&P '21) [4] Perun (S&P '19) [11] Commit-Chains [12] Splicer (This work) Improving throughput Support large transactions Payment channel balance Deadlock-free routing Transaction unlinkability Optimal hub placement other requests can easily cause deadlocks. Existing PCHs (e.g., [3], [4], [11], [12]) inherit the above source routing flaw and design complex cryptographic primitives to provide unlinkability [3], [4] for off-chain payments to obfuscate the relationship between transaction parties, with limited scalability improvements [11], [12], which is the second flaw.…”
Section: Literaturesmentioning
confidence: 99%
See 2 more Smart Citations
“…Lighting [1], Raidon [2] Flare [6], Sprites (FC '19) [7] REVIVE (CCS '17) [8] Spider (NSDI '20) [9] Flash (CoNEXT '19) [10] TumbleBit (NDSS '17) [3] A 2 L (S&P '21) [4] Perun (S&P '19) [11] Commit-Chains [12] Splicer (This work) Improving throughput Support large transactions Payment channel balance Deadlock-free routing Transaction unlinkability Optimal hub placement other requests can easily cause deadlocks. Existing PCHs (e.g., [3], [4], [11], [12]) inherit the above source routing flaw and design complex cryptographic primitives to provide unlinkability [3], [4] for off-chain payments to obfuscate the relationship between transaction parties, with limited scalability improvements [11], [12], which is the second flaw.…”
Section: Literaturesmentioning
confidence: 99%
“…Flash [10] is also based on source routing, using a modified max-flow algorithm to find paths for large payments, and routing small payments randomly through precomputed paths. Landmark routing is adopted in many prior PCN routing schemes [6], [29], [30]. Each sender computes the shortest path to the wellconnected landmark nodes, and then the landmark nodes route to the destination in k distinct shortest paths.…”
Section: B Performance Of Splicermentioning
confidence: 99%
See 1 more Smart Citation
“…We use standard linearization techniques to achieve this conversion process. First, we introduce two vectors ϑ and ϕ as the additional optimization variables ϑ = (ϑ nl ∈ {0, 1} : n, l ∈ VSNC), (6) ϕ = (ϕ nlm ∈ {0, 1} : n, l ∈ VSNC, m ∈ VCLI). (7) Second, the linear constraints for ϑ and ϕ are as follows…”
Section: Optimization Placement Problem Solutionsmentioning
confidence: 99%
“…Solutions to find routes through a payment network in a scalable and decentralized way have been proposed, based on central hubs [ 26 ], rotating global beacons [ 27 ], personal beacons, where overlaps between sender and receiver provide paths [ 28 ], or combinations of multiple schemes [ 29 ].…”
Section: Related Workmentioning
confidence: 99%