• Publications
  • Influence
Inequality between genders in the executive suite in corporate America: moral and ethical issues
We examined the role gender plays in managerial stereotypes and changes that have occurred in the US for executive women in the workforce. We also investigated factors and personality traits thatExpand
  • 29
  • 4
Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin
TLDR
This paper proposes a backward-compatible defense mechanism which outperforms the previous best defense. Expand
  • 52
  • 3
  • PDF
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol
TLDR
We systematically evaluate BU's security with three incentive models via testing the two major arguments of BU supporters: the block validity consensus is not necessary forBU's security; such consensus would emerge in BU out of economic incentives. Expand
  • 14
  • 3
  • PDF
Making eclipse attacks computationally infeasible in large-scale DHTs
TLDR
The security aspect of Distributed Hash Tables (DHT-s), the principal model for structured P2P networks, has received considerable attention from research community, and the eclipse attack is one of the most severe threats. Expand
  • 11
  • 1
Cloud Classification Based on Self-Organizing Feature Map and Probabilistic Neural Network
TLDR
For overcoming the shortcoming of single ANN classifier being difficult used to identify and classify complex clouds, based on multi-spectrum samples of stationary meteorology satellite cloud pictures, by computing and analysing the gray-grads and texture characters of satellite cloud picture samples, a synthetic optimization SOM-PNN cloud classifier was designed and established. Expand
  • 5
  • 1
Enriched composition and inference in the argument structure of Chinese
Chapter 1: Introduction: Variation in Argument Expression Chapter 2: Constructions, Conceptual Structures and Compositionality Chapter 3: The Eat Restaurant Construction: Licensing UnselectedExpand
  • 6
  • 1
Hesitant Cloud Model and Its Application in the Risk Assessment of “The Twenty-First Century Maritime Silk Road”
The evaluation of human environment risk is lacking quantitative data, while the qualitative knowledge cannot be easily quantified and synthesized. Furthermore, sometimes the experts are not wellExpand
  • 9
  • PDF
A new nonlinear risk assessment model based on an improved projection pursuit
TLDR
We propose a nonlinear risk assessment model based on an improved projection pursuit model (IPPM) for use in situations where insufficient data are available. Expand
  • 5
Censorship-resistant and privacy-preserving distributed web search
TLDR
The vast majority of Internet users are relying on centralized search engine providers to conduct their web searches. Expand
  • 7
  • PDF
[History and current state of moxibustion].
  • Ren Zhang
  • Medicine
  • Zhong xi yi jie he xue bao = Journal of Chinese…
  • 1 November 2004
Moxibustion is an important invention of the Chinese nation, which originated as early as in the clan commune period of the primitive society. The literature records on moxibustion can be traced backExpand
  • 9