Skip to main content

Showing 1–9 of 9 results for author: Keller, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.03111  [pdf, other

    cs.CR cs.DC

    Parallel Proof-of-Work with DAG-Style Voting and Targeted Reward Discounting

    Authors: Patrik Keller

    Abstract: We present parallel proof-of-work with DAG-style voting, a novel proof-of-work cryptocurrency protocol that, compared to Bitcoin, provides better consistency guarantees, higher transaction throughput, lower transaction confirmation latency, and higher resilience against incentive attacks. The superior consistency guarantees follow from implementing parallel proof-of-work, a recent consensus scheme… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

  2. arXiv:2309.11924  [pdf, other

    cs.CR cs.DC

    Generic Selfish Mining MDP for DAG Protocols

    Authors: Patrik Keller

    Abstract: Selfish Mining is strategic rule-breaking to maximize rewards in proof-of-work protocols [3] and Markov Decision Processes (MDPs) are the preferred tool for finding optimal strategies in Bitcoin [4, 10] and similar linear chain protocols [12]. Protocols increasingly adopt non-sequential chain structures [11], for which MDP analysis is more involved [2]. To date, researchers have tailored specific… ▽ More

    Submitted 30 April, 2024; v1 submitted 21 September, 2023; originally announced September 2023.

    Comments: v2: update authors, fix my implementation of Roi's model

  3. arXiv:2306.12206  [pdf, other

    cs.CR cs.DC

    Tailstorm: A Secure and Fair Blockchain for Cash Transactions

    Authors: Patrik Keller, Ben Glickenhaus, George Bissias, Gregory Griffith

    Abstract: Proof-of-work (PoW) cryptocurrencies rely on a balance of security and fairness in order to maintain a sustainable ecosystem of miners and users. Users demand fast and consistent transaction confirmation, and in exchange drive the adoption and valuation of the cryptocurrency. Miners provide the confirmations, however, they primarily seek rewards. In unfair systems, miners can amplify their rewards… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

  4. arXiv:2301.09624  [pdf, other

    eess.IV cs.CV cs.LG

    Maximum Mean Discrepancy Kernels for Predictive and Prognostic Modeling of Whole Slide Images

    Authors: Piotr Keller, Muhammad Dawood, Fayyaz ul Amir Afsar Minhas

    Abstract: How similar are two images? In computational pathology, where Whole Slide Images (WSIs) of digitally scanned tissue samples from patients can be multi-gigapixels in size, determination of degree of similarity between two WSIs is a challenging task with a number of practical applications. In this work, we explore a novel strategy based on kernelized Maximum Mean Discrepancy (MMD) analysis for deter… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

    Comments: * Joint first authorship Accepted: IEEE - ISBI 2023 International Symposium on Biomedical Imaging

  5. arXiv:2204.00034  [pdf, other

    cs.CR

    Parallel Proof-of-Work with Concrete Bounds

    Authors: Patrik Keller, Rainer Böhme

    Abstract: Authorization is challenging in distributed systems that cannot rely on the identification of nodes. Proof-of-work offers an alternative gate-kee** mechanism, but its probabilistic nature is incompatible with conventional security definitions. Recent related work establishes concrete bounds for the failure probability of Bitcoin's sequential proof-of-work mechanism. We propose a family of state… ▽ More

    Submitted 19 September, 2022; v1 submitted 31 March, 2022; originally announced April 2022.

  6. arXiv:2005.03535  [pdf, ps, other

    cs.CR cs.CY

    Collaborative Deanonymization

    Authors: Patrik Keller, Martin Florian, Rainer Böhme

    Abstract: Privacy-seeking cryptocurrency users rely on anonymization techniques like CoinJoin and ring transactions. By using such technologies benign users potentially provide anonymity to bad actors. We propose overlay protocols to resolve the tension between anonymity and accountability in a peer-to-peer manner. Cryptocurrencies can adopt this approach to enable prosecution of publicly recognized crimes.… ▽ More

    Submitted 26 February, 2021; v1 submitted 7 May, 2020; originally announced May 2020.

  7. arXiv:2002.02650  [pdf, other

    cs.SE

    What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning

    Authors: Patrick Keller, Laura Plein, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon

    Abstract: Recent successes in training word embeddings for NLP tasks have encouraged a wave of research on representation learning for source code, which builds on similar NLP methods. The overall objective is then to produce code embeddings that capture the maximum of program semantics. State-of-the-art approaches invariably rely on a syntactic representation (i.e., raw lexical tokens, abstract syntax tree… ▽ More

    Submitted 7 February, 2020; originally announced February 2020.

  8. arXiv:1907.13531  [pdf, other

    cs.CR cs.DC

    HotPoW: Finality from Proof-of-Work Quorums

    Authors: Patrik Keller, Rainer Böhme

    Abstract: A fundamental conflict of many proof-of-work systems is that they want to achieve inclusiveness and security at the same time. We analyze and resolve this conflict with a theory of proof-of-work quorums, which enables a new bridge between Byzantine and Nakamoto consensus. The theory yields stochastic uniqueness of quorums as a function of a security parameter. We employ the theory in HotPoW, a sca… ▽ More

    Submitted 21 February, 2020; v1 submitted 31 July, 2019; originally announced July 2019.

  9. arXiv:1705.09335  [pdf, other

    cs.DS

    Overcommitment in Cloud Services -- Bin packing with Chance Constraints

    Authors: Maxime C. Cohen, Philipp W. Keller, Vahab Mirrokni, Morteza Zadimoghaddam

    Abstract: This paper considers a traditional problem of resource allocation, scheduling jobs on machines. One such recent application is cloud computing, where jobs arrive in an online fashion with capacity requirements and need to be immediately scheduled on physical machines in data centers. It is often observed that the requested capacities are not fully utilized, hence offering an opportunity to employ… ▽ More

    Submitted 25 May, 2017; originally announced May 2017.