Academic literature on the topic 'Mining pools'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mining pools.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mining pools"

1

Fujita, Kentaro, Yuanyu Zhang, Masahiro Sasabe, and Shoji Kasahara. "Mining Pool Selection under Block WithHolding Attack." Applied Sciences 11, no. 4 (2021): 1617. http://dx.doi.org/10.3390/app11041617.

Full text
Abstract:
In current Proof-of-Work (PoW) blockchain systems, miners usually form mining pools to compete with other pools/miners in the mining competition. Forming pools can give miners steady revenues but will introduce two critical issues. One is mining pool selection, where miners select the pools to join in order to maximize their revenues. The other is a Block WithHolding (BWH) attack, where pools can inject part of their hash/mining power into other pools to obtain additional revenues without contributing to the mining process of the attacked pools. Reasoning that the BWH attack will have signific
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Xiao, Zhao Huang, Quan Wang, Yin Chen, and Yuan Cao. "A Repeated Game-Based Distributed Denial of Service Attacks Mitigation Method for Mining Pools." Electronics 13, no. 2 (2024): 398. http://dx.doi.org/10.3390/electronics13020398.

Full text
Abstract:
A Distributed Denial of Service (DDoS) attack is a prevalent issue in the blockchain network layer, causing significant revenue loss for honest mining pools. This paper introduces a novel method, the Repeated Game-based DDoS attack mitigation (RGD), to address this problem. Unlike traditional methods such as game theory and machine learning-based detection, the RGD method can effectively reflect the changes in mining revenue and strategies under different network-strength environments. In particular, we abstract the problem of DDoS mining pool revenue loss into a game revenue model and propose
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Yang, Yourong Chen, Kelei Miao, Tiaojuan Ren, Changchun Yang, and Meng Han. "A Novel Data-Driven Evaluation Framework for Fork after Withholding Attack in Blockchain Systems." Sensors 22, no. 23 (2022): 9125. http://dx.doi.org/10.3390/s22239125.

Full text
Abstract:
In the blockchain system, mining pools are popular for miners to work collectively and obtain more revenue. Nowadays, there are consensus attacks that threaten the efficiency and security of mining pools. As a new type of consensus attack, the Fork After Withholding (FAW) attack can cause huge economic losses to mining pools. Currently, there are a few evaluation tools for FAW attacks, but it is still difficult to evaluate the FAW attack protection capability of target mining pools. To address the above problem, this paper proposes a novel evaluation framework for FAW attack protection of the
APA, Harvard, Vancouver, ISO, and other styles
4

Kusin, Faradiella Mohd, Mohd Syakirin Md Zahar, Siti Nurjaliah Muhammad, Zafira Md Zin, and Sharifah Mohd Sharif. "Assessing the potential use of abandoned mining pools as an alternative resource of raw water supply." Water Supply 16, no. 2 (2015): 410–17. http://dx.doi.org/10.2166/ws.2015.150.

Full text
Abstract:
The water crisis in the state of Selangor has prompted the state water authority to use water from abandoned mining pools as an alternative resource of raw water supply. In this study, the potential use of the mining pool water has been assessed to evaluate its safe use for potable water consumption, which is the source of raw water to be supplied to water treatment plants. Assessments were made between sampling sites that include abandoned mining pools, active sand mining pools, and the receiving streams (two tributaries and the main river, Selangor River) within Bestari Jaya catchment, Selan
APA, Harvard, Vancouver, ISO, and other styles
5

Ren, Min, Hongfeng Guo, and Zhihao Wang. "Mitigation of block withholding attack based on zero-determinant strategy." PeerJ Computer Science 8 (July 21, 2022): e997. http://dx.doi.org/10.7717/peerj-cs.997.

Full text
Abstract:
This article focuses on the mining dilemma of block withholding attack between the mining pools in the bitcoin system. In order to obtain the higher revenue, the rational mining pool usually chooses an infiltration attack, that is, the pool will falls into the mining dilemma of the PoW consensus algorithm. Thus the article proposes to apply zero-determinant strategies for optimizing the behavior selection of the mining pool under PoW consensus mechanism to increase the total revenues of the system, so as to solve the mining dilemma. After theoretically studying the set and extortionate strateg
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Xiao, Zhao Huang, Quan Wang, and Bo Wan. "An Evolutionary Game Theory-Based Method to Mitigate Block Withholding Attack in Blockchain System." Electronics 12, no. 13 (2023): 2808. http://dx.doi.org/10.3390/electronics12132808.

Full text
Abstract:
Consensus algorithms are the essential components of blockchain systems. They guarantee the blockchain’s fault tolerance and security. The Proof of Work (PoW) consensus algorithm is one of the most widely used consensus algorithms in blockchain systems, using computational puzzles to enable mining pools to compete for block rewards. However, this excessive competition for computational power will bring security threats to blockchain systems. A block withholding (BWH) attack is one of the most critical security threats blockchain systems face. A BWH attack obtains the reward of illegal block ex
APA, Harvard, Vancouver, ISO, and other styles
7

Alkalay-Houlihan, Colleen, and Nisarg Shah. "The Pure Price of Anarchy of Pool Block Withholding Attacks in Bitcoin Mining." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1724–31. http://dx.doi.org/10.1609/aaai.v33i01.33011724.

Full text
Abstract:
Bitcoin, a cryptocurrency built on the blockchain data structure, has generated significant academic and commercial interest. Contrary to prior expectations, recent research has shown that participants of the protocol (the so-called “miners”) are not always incentivized to follow the protocol. We study the game induced by one such attack – the pool block withholding attack – in which mining pools (groups of miners) attack other mining pools. We focus on the case of two pools attacking each other, with potentially other mining power in the system.We show that this game always admits a pure Nash
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Yuming, Jing Tang, Qianhao Cong, Richard T. B. Ma, Lei Chen, and Yeow Meng Chee. "The Last Survivor of PoS Pools: Staker's Dilemma." Proceedings of the ACM on Measurement and Analysis of Computing Systems 9, no. 1 (2025): 1–29. https://doi.org/10.1145/3711704.

Full text
Abstract:
In blockchains using the Proof-of-Work (PoW) consensus mechanism, a mining pool is a joint group of miners who combine their computational resources and share the generated revenue. Similarly, when the Proof-of-Stake (PoS) consensus mechanism is adopted, the staking pool imitates the design of the mining pool by aggregating the stakes. However, in PoW blockchains, the pooling approach has been criticized to be vulnerable to the block withholding (BWH) attack. BWH attackers may steal the dividends from victims by pretending to work but making invalid contributions to the victim pools. It is wel
APA, Harvard, Vancouver, ISO, and other styles
9

Çulha, Davut. "Maximizing proof-of-work decentralization." Ingenieria Solidaria 20, no. 1 (2023): 1–16. http://dx.doi.org/10.16925/2357-6014.2024.01.04.

Full text
Abstract:
Introduction: Blockchain technology is one of the emerging technologies that implements the concept of decentralization. The first application of this technology was with Bitcoin, which is a decentralized application. However, the decentralization of Bitcoin has become problematic due to the formation of mining pools. In this work, decentralization is intended to be maximized. Problem: Decentralization is the main concept of blockchain technologies. However, decentralization suffers mainly from mining pools in the Bitcoin network. Objective: In this work, the proposed solution to maximize upon
APA, Harvard, Vancouver, ISO, and other styles
10

Toroghi Haghighat, Alireza, and Mehdi Shajari. "Block withholding game among bitcoin mining pools." Future Generation Computer Systems 97 (August 2019): 482–91. http://dx.doi.org/10.1016/j.future.2019.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Mining pools"

1

Giles, Peter James. "Microarray-based expression profiling : improving data mining and the links to biological knowledge pools." Thesis, Cardiff University, 2005. http://orca.cf.ac.uk/54074/.

Full text
Abstract:
Having identified differentially regulated genes, the final and most labour intensive part of the analysis process is drawing biological conclusions and hypothesises about the data. A novel solution is presented which combines experimental data with a curated annotation sources along with analysis tools to assist the researcher in exploring the information contained within their dataset.
APA, Harvard, Vancouver, ISO, and other styles
2

Tovanich, Natkamon. "Visual Analytics for Monitoring and Exploration of Bitcoin Blockchain Data." Electronic Thesis or Diss., université Paris-Saclay, 2022. http://www.theses.fr/2022UPASG010.

Full text
Abstract:
Bitcoin est une crypto-monnaie pionnière qui enregistre les transactions dans un registre public et distribué appelé blockchain. Il est utilisé comme support pour les paiements, les investissements et plus largement la gestion d’un portefeuille numérique qui n’est pas administré par un gouvernement ou une institution financière. Au cours de ces dix dernières années, l’activité transactionnelle de Bitcoin a rapidement et largement augmenté. La volumétrie ainsi que la nature évolutive de ces données posent des défis pour l’analyse et l'exploration des usages ainsi que des activités sur la blockc
APA, Harvard, Vancouver, ISO, and other styles
3

Steinberg, Rebecca M. "Predicting Post-Mining Hydrologic Effects of Underground Coal Mines in Ohio throughMultivariate Statistical Analyses and GIS Tool Building." Ohio University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1555429886192267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chehade, Imad. "Essais sur l'économie des technologies blockchain et des crypto-monnaies." Electronic Thesis or Diss., Normandie, 2023. http://www.theses.fr/2023NORMR057.

Full text
Abstract:
Cette thèse propose trois essais contribuant à déterminer les opportunités et les défis des technologies blockchain et des crypto-monnaies, afin de comprendre leur possibilité d’adoption dans le système bancaire et l’économie en général. Tout d’abord, nous avons montré, à travers une revue de littérature, des expérimentations pratiques, et une analyse comparative des différentes plateformes de DLT existantes, que les DLT alternative de consortium sont les prototypes qui devraient prédominer dans le système bancaire à l’avenir. Ensuite, nous avons mis en évidence la résistance et la résilience
APA, Harvard, Vancouver, ISO, and other styles
5

Zini, Alberto. "Analisi e progettazione di una mining pool sostenibile per TurtleCoin." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19620/.

Full text
Abstract:
La nostra epoca è caratterizzata da forti innovazioni tecnologiche, alcune delle quali rappresentano delle vere e proprie sfide a sistemi esistenti e consolidati. Degno di nota è l'avvento della tecnologia blockchain e, di conseguenza, l'introduzione del concetto di criptovaluta. Una criptovaluta è una moneta digitale che può essere scambiata come quella cartacea ma con modalità differenti, basate sulla crittografia. La crittografia serve a rendere sicure le transazioni e a controllare la creazione di nuove valute. Diversamente da tutte le monete non digitali, le criptovalute sfuggono a
APA, Harvard, Vancouver, ISO, and other styles
6

Schafer, Lindsey A. "Statistical Analysis of Mining Parameters to Create Empirical Models to Predict Mine Pool Formation in Underground Coal Mines." Ohio University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1525947021230552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moore, David Gerald. "AspectAssay: A Technique for Expanding the Pool of Available Aspect Mining Test Data Using Concern Seeding." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/254.

Full text
Abstract:
Aspect-oriented software design (AOSD) enables better and more complete separation of concerns in software-intensive systems. By extracting aspect code and relegating crosscutting functionality to aspects, software engineers can improve the maintainability of their code by reducing code tangling and coupling of code concerns. Further, the number of software defects has been shown to correlate with the number of non- encapsulated nonfunctional crosscutting concerns in a system. Aspect-mining is a technique that uses data mining techniques to identify existing aspects in legacy code. Unfortunate
APA, Harvard, Vancouver, ISO, and other styles
8

Kelečéni, Jakub. "Forenzní analýza těžebních serverů kryptoměn." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385930.

Full text
Abstract:
This thesis focuses on the mining of cryptocurrency with emphasis on analysis of communication between miner and server. It describes basic principles of cryptocurrencies, mining and employed communication protocols. The next part of thesis is about design and implement modification of existing system (catalogue). This modification will add temporality to the catalog, what increase reliability of stored metadata. Description, functionality and purpose of existing system is included in the next text.
APA, Harvard, Vancouver, ISO, and other styles
9

Kalia, Bhanu. "Mining the Aegilops tauschii gene pool: evaluation, introgression and molecular characterization of adult plant resistance to leaf rust and seedling resistance to tan spot in synthetic hexaploid wheat." Diss., Kansas State University, 2015. http://hdl.handle.net/2097/18934.

Full text
Abstract:
Doctor of Philosophy<br>Genetics Interdepartmental Program<br>Bikram S. Gill<br>Leaf rust, caused by fungus Puccinia triticina, is an important foliar disease of wheat worldwide. Breeding for race-nonspecific resistant cultivars is the best strategy to combat this disease. Aegilops tauschii, D genome donor of hexaploid wheat, has provided resistance to several pests and pathogens of wheat. To identify potentially new adult plant resistance (APR) genes, 371 geographically diverse Ae. tauschii accessions were evaluated in field with leaf rust (LR) composite culture of predominant races. Accessio
APA, Harvard, Vancouver, ISO, and other styles
10

Salén, Filip. "Visualization of Dynamic Memory in C++ Applications." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75286.

Full text
Abstract:
Optimized memory management is important for a demanding application to achieve high-performance results. But un-optimized or unwanted memory behaviors can usually be difficult to detect without an overview of how memory is structured during run-time. This thesis explores real-time visualization of dynamic memory allocation for applications using the memory pool allocation technique. In the thesis, technical and graphical challenges are described together with their solutions and the design choices that were made. The final result is a program that can visualize dynamic memory management in re
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Mining pools"

1

U.S. Fish and Wildlife Service., ed. Tiered environmental assessment and initial study/mitigated negative declaration: Andromous fish restoration program : Tuolumne River riparian zone improvements : gravel mining reach & special run pools 9/10 : restoration and mitigation projects. U.S. Fish and Game Service, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

H, Trounson John, ed. East Pool & Agar: A Cornish mining legend. Dyllansow Truran, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Stefan. Bitcoin Mining Mastery: What Is Bitcoin Mining, How Does Bitcoin Mining Work, What Are Bitcoin Mining Pools and How to Start Bitcoin Mining. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Additional papers on the Nova Scotia gold fields: (including Messrs. Poole and Campbell's reports). s.n., 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Mining pools"

1

Fisch, Ben, Rafael Pass, and Abhi Shelat. "Socially Optimal Mining Pools." In Web and Internet Economics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71924-5_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Austin, Thomas H., Paul Merrill, and Justin Rietz. "SharedWealth: Disincentivizing Mining Pools Through Burning and Minting." In Business Information Systems Workshops. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61146-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Laszka, Aron, Benjamin Johnson, and Jens Grossklags. "When Bitcoin Mining Pools Run Dry." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48051-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Holland, Jordan, R. Joseph Connor, J. Parker Diamond, Jared M. Smith, and Max Schuchard. "Not So Predictable Mining Pools: Attacking Solo Mining Pools by Bagging Blocks and Conning Competitors." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-58387-6_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tulika, Tulika, and Anne Ljungars. "Deep Mining of Complex Antibody Phage Pools." In Methods in Molecular Biology. Springer US, 2023. http://dx.doi.org/10.1007/978-1-0716-3381-6_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Velner, Yaron, Jason Teutsch, and Loi Luu. "Smart Contracts Make Bitcoin Mining Pools Vulnerable." In Financial Cryptography and Data Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70278-0_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ahmed, Mohiuddin, Jinpeng Wei, Yongge Wang, and Ehab Al-Shaer. "A Poisoning Attack Against Cryptocurrency Mining Pools." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00305-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Belotti, Marianna, and Stefano Moretti. "Bankruptcy Solutions as Reward Functions in Mining Pools." In Principles of Blockchain Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-031-01807-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Roughgarden, Tim, and Clara Shikhelman. "Ignore the Extra Zeroes: Variance-Optimal Mining Pools." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-662-64331-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wijaya, Dimaz Ankaa, Joseph K. Liu, Ron Steinfeld, and Dongxi Liu. "Transparency or Anonymity Leak: Monero Mining Pools Data Publication." In Information Security and Privacy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90567-5_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mining pools"

1

Tran, Muoi, Theo von Arx, and Laurent Vanbever. "Routing Attacks on Cryptocurrency Mining Pools." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Papathanasiou, A. M., C. D. Nassar Kyriakidou, I. Pittaras, and G. C. Polyzos. "Smart Contract-Based Decentralized Mining Pools for Proof-of- Work Blockchains." In 2024 IEEE International Conference on Blockchain (Blockchain). IEEE, 2024. http://dx.doi.org/10.1109/blockchain62396.2024.00037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Zhao, Xin Gao, Xiao Liu, Lu Fan, Junjun Wang, and Quan Wang. "A Dynamic Evolutionary Game-based Defense Method for Mining Pools against DDoS Attacks." In 2024 International Conference on Networking and Network Applications (NaNA). IEEE, 2024. http://dx.doi.org/10.1109/nana63151.2024.00056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tasdelen, Abdulkadir, Mohamed Hadi Habaebi, and Md Rafiqul Islam. "Exploring Blockchain Technologies: Insights Into Consensus Mechanisms, Mining Pool Dynamics, and Energy Consumption Patterns." In 2024 9th International Conference on Mechatronics Engineering (ICOM). IEEE, 2024. http://dx.doi.org/10.1109/icom61675.2024.10652588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Battina, Srinuvas Kumar, Ravi Kumar Suggala, Srinivasa Rao Dangeti, Meriga Kiran Kumar, Pavan Kumar Vadrevu, and Naga Sravanthi Puppala. "Secure Pool Mining Through SVM-Based Miner Classification and Computation Validation in Blockchain Networks." In 2024 OITS International Conference on Information Technology (OCIT). IEEE, 2024. https://doi.org/10.1109/ocit65031.2024.00102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Puppala, Naga Sravanthi, Mahesh Kumar Morampudi, Ravi Kumar Suggala, and AHL Swaroop. "Strategic Miner Selection for Optimizing Block Generation Time in PoW-Based Blockchain Pool Mining Using SMNST Framework." In 2024 OITS International Conference on Information Technology (OCIT). IEEE, 2024. https://doi.org/10.1109/ocit65031.2024.00125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Santos, Saulo dos, Shahin Kamali, and Ruppa K. Thulasiram. "Candidate Set Formation Policy for Mining Pools." In 2020 IEEE International Conference on Blockchain (Blockchain). IEEE, 2020. http://dx.doi.org/10.1109/blockchain50366.2020.00060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tovanich, Natkamon, Nicolas Soulie, Nicolas Heulot, and Petra Isenberg. "Interactive Demo: Visualization for Bitcoin Mining Pools Analysis." In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2021. http://dx.doi.org/10.1109/icbc51069.2021.9461124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pontiveros, Beltran Borja Fiz, Robert Norvill, and Radu State. "Monitoring the transaction selection policy of Bitcoin mining pools." In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2018. http://dx.doi.org/10.1109/noms.2018.8406328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sarker, Arijet, Simeon Wuthier, and Sang-Yoon Chang. "Anti-Withholding Reward System to Secure Blockchain Mining Pools." In 2019 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 2019. http://dx.doi.org/10.1109/cvcbt.2019.00004.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Mining pools"

1

Cong, Lin William, Zhiguo He, and Jiasun Li. Decentralized Mining in Centralized Pools. National Bureau of Economic Research, 2019. http://dx.doi.org/10.3386/w25592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!