计算机技术、通信技术 |
|
|
|
|
营商环境评估的企业级复合区块链构建方法 |
李素( ),陈泽,宋宝燕,张浩林*( ) |
辽宁大学 信息学院,辽宁 沈阳 110036 |
|
Enterprise composite blockchain construction method for business environment evaluation |
Su LI( ),Ze CHEN,Baoyan SONG,Haolin ZHANG*( ) |
School of Information, Liaoning University, Shenyang 110036, China |
引用本文:
李素,陈泽,宋宝燕,张浩林. 营商环境评估的企业级复合区块链构建方法[J]. 浙江大学学报(工学版), 2024, 58(5): 891-899.
Su LI,Ze CHEN,Baoyan SONG,Haolin ZHANG. Enterprise composite blockchain construction method for business environment evaluation. Journal of ZheJiang University (Engineering Science), 2024, 58(5): 891-899.
链接本文:
https://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2024.05.002
或
https://www.zjujournals.com/eng/CN/Y2024/V58/I5/891
|
1 |
ZHAO X Y, YI C J, ZHAN Y, et al Business environment distance and innovation performance of EMNEs: the mediating effect of R&D internationalization[J]. Journal of Innovation and Knowledge, 2022, 7 (4): 100241- 100252
doi: 10.1016/j.jik.2022.100241
|
2 |
HASCHKA R E, HERWARTZ H, STRUTHMANN P, et al The joint effects of financial development and the business environment on firm growth: evidence from Vietnam[J]. Journal of Comparative Economics, 2022, 50 (2): 486- 506
doi: 10.1016/j.jce.2021.11.002
|
3 |
BONDELI J V, HAVENVID M I Bouncing back in turbulent business environments: exploring resilience in business networks[J]. Industrial Marketing Management, 2022, 107: 383- 395
doi: 10.1016/j.indmarman.2022.10.022
|
4 |
LIU H J, LOVE P E D, MA L, et al Predicting production-output performance within a complex business environment: from singular to multi-dimensional observations in evaluation[J]. International Journal of Production Research, 2021, 59 (24): 7390- 7399
doi: 10.1080/00207543.2020.1841316
|
5 |
HASSAN M U, REHMANI M H, CHEN J Anomaly detection in blockchain networks: a comprehensive survey[J]. IEEE Communications Surveys and Tutorials, 2022, 25 (1): 289- 318
|
6 |
HUANG J, HE D, OBAIDAT M S, et al The application of the blockchain technology in voting systems: a review[J]. ACM Computing Surveys, 2021, 54 (3): 1- 28
|
7 |
WEN Z, LIAO H, EMROUZNEJAD A Information representation of blockchain technology: risk evaluation of investment by personalized quantifier with cubic spline interpolation[J]. Information Processing and Management, 2021, 58 (4): 102571- 102584
doi: 10.1016/j.ipm.2021.102571
|
8 |
QURESHI J N, FAROOQ M S, ABID A, et al Blockchain applications for the internet of things: systematic review and challenges[J]. Microprocessors and Microsystems, 2022, 94: 104632- 104671
doi: 10.1016/j.micpro.2022.104632
|
9 |
BERDIK D, OTOUM S, SCHMIDT N, et al A survey on blockchain for information systems management and security[J]. Information Processing and Management, 2021, 58 (1): 102397- 102425
doi: 10.1016/j.ipm.2020.102397
|
10 |
LU Q, BINH T A, WEBER I, et al Integrated model-driven engineering of blockchain applications for business processes and asset management[J]. Software: Practice and Experience, 2021, 51 (5): 1059- 1079
doi: 10.1002/spe.2931
|
11 |
ALI M S, VECCHIO M, PINCHEIRA M, et al Applications of blockchains in the internet of things: a comprehensive survey[J]. IEEE Communications Surveys and Tutorials, 2018, 21 (2): 1676- 1717
|
12 |
DORFLEITNER G, MUCK F, SCHECKENBACH I Blockchain applications for climate protection: a global empirical investigation[J]. Renewable and Sustainable Energy Reviews, 2021, 149: 111378- 111400
doi: 10.1016/j.rser.2021.111378
|
13 |
BENSALEM H, BLAQUIERE Y, SAVARIA Y. Acceleration of the secure hash algorithm-256 (SHA-256) on an FPGA-CPU cluster using OpenCL [C]// IEEE International Symposium on Circuits and Systems . Daegu: IEEE, 2021: 1-5.
|
14 |
马文龙, 朱妤晴, 蒋德钧, 等 Key-Value型NoSQL本地存储系统研究[J]. 计算机学报, 2018, 41 (8): 1722- 1751 MA Wenlong, ZHU Yuqing, JIANG Dejun, et al A survey on local key-value store of NoSQL system[J]. Chinese Journal of Computers, 2018, 41 (8): 1722- 1751
|
15 |
高政风, 郑继来, 汤舒扬, 等 基于DAG的分布式账本共识机制研究[J]. 软件学报, 2020, 31 (4): 1124- 1142 GAO Zhengfeng, ZHENG Jilai, TANG Shuyang, et al State-of-the-art survey of consensus mecha-nisms on DAG-based distributed ledger[J]. Journal of Software, 2020, 31 (4): 1124- 1142
|
16 |
LU L, PILLAI T S, GOPALAKRISHNAN H, et al Wisckey: separating keys from values in SSD-conscious storage[J]. ACM Transactions on Storage, 2017, 13 (1): 1- 28
|
17 |
LEPERS B, BALMAU O, GUPTA K, et al. Kvell: the design and implementation of a fast persistent key-value store [C]// Proceedings of the 27th ACM Symposium on Operating Systems Principles . Huntsville: ACM, 2019: 447-461.
|
18 |
KAIYRAKHMET O, LEE S, NAM B, et al. SLM-DB: single-level key-value store with persistent memory [C]// 17th USENIX Conference on File and Storage Technologies . Boston: USENIX, 2019: 191-205.
|
19 |
KANNAN S, BHAT N, GAVRILOVSKA A, et al. Redesigning LSMs for nonvolatile memory with NoveLSM [C]// USENIX Annual Technical Conference . Boston: USENIX, 2018: 993-1005.
|
20 |
LEWENBERG Y, SOMPOLINSKY Y, ZOHAR A. Inclusive blockchain protocols [C]// International Conference on Financial Cryptography and Data Security . San Juan: Springer, 2015: 528-547.
|
21 |
LEONOV D, KODENKO M, LEICHENCO D, et al Design and validation of a phantom for transcranial ultrasonography[J]. International Journal of Computer Assisted Radiology and Surgery, 2022, 17 (9): 1579- 1588
doi: 10.1007/s11548-022-02614-2
|
22 |
EYAL I, GENCER A E, SIRER E G, et al. Bitcoin-NG: a scalable blockchain protocol [C]// 13th USENIX Symposium on Networked Systems Design and Implementation . Santa Clara: USENIX, 2016: 45-59.
|
23 |
DEREK L, ADAM S, YOSSI G, et al Vault: fast bootstrapping for cryptocurrencies[J]. IACR Cryptology ePrint Archive, 2018, 21 (15): 269- 281
|
24 |
何润民 单向Hash函数SHA256的研究与改进[J]. 信息技术, 2013, 37 (8): 22- 25 HE Runmin One-way Hash function research and improved SHA-256[J]. Information Technology, 2013, 37 (8): 22- 25
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|