Trial history biases in decision-making tasks are thought to reflect
sys...
A Sybil attack occurs when an adversary pretends to be multiple identiti...
Proof-of-work puzzles and CAPTCHAS consume enormous amounts of energy an...
Proof-of-work (PoW) is one of the most common techniques to defend again...
We present a foraging algorithm, GoldenFA, in which search direction is
...
Proof-of-work(PoW) is an algorithmic tool used to secure networks by imp...