- Interconnection Networks and Systems
- IoT and Edge/Fog Computing
- Supercapacitor Materials and Fabrication
- Advanced Optical Network Technologies
- Blockchain Technology Applications and Security
- Advancements in Battery Materials
- Cognitive Computing and Networks
- Privacy-Preserving Technologies in Data
- Cloud Computing and Resource Management
- Cooperative Communication and Network Coding
- Cryptography and Data Security
Chongqing University of Posts and Telecommunications
2023-2024
National Tsing Hua University
1991-1994
Practical Byzantine Fault Tolerance (PBFT), a classic consensus algorithm in blockchain technology, is extensively used consortium networks. However, it challenged by issues such as low efficiency, poor scalability, inability to guarantee throughput with large-scale node access, and complex communication processes. To solve these problems, this paper proposes an improved PBFT mechanism based on credit scoring aggregated signatures, i.e., the CA-PBFT algorithm. First, designs mechanism, adds...
A high-performance fault-tolerant ATM switch (B-tree) is proposed. This embeds multiple baseline networks tightly to improve the fault tolerance and throughput of conventional multistage interconnection networks. proposed retains advantages but much more robust in sense that paths are available between each input-output pair. The have properties such as very simple routing algorithms (self-routing) they can be recursively constructed a modular way. Multiple used route cells under condition...
A possible solution for the broadband ISDN is proposed. new packet switch, denoted by DPPS (double phase switch), found to be capable of performing well with low cost. consists several baseline networks [1] in parallel. modularity and can easily expanded because recursive structure networks. Along simple distributed control algorithm, implemented VLSI consequently high speed capacity. Analysis results show that able achieve good throughput-delay performance even under heavy traffic loads.
To address the issues of malicious nodes being easily selected as consensus and problem untimely processing in DPoS algorithm, we propose a Trust-authorized Delegated Proof Stake (Ta-DPoS) algorithm based on reputation authorization. The Ta-DPoS uses PowerTrust model to conduct global evaluation nodes, enhances authority credibility balances competition for bookkeeping rights while ensuring fair selection process, improves decentralization. At same time, under reward punishment mechanism...