[{"publication":"IEEE Access","external_id":{"isi":["000927831000001"]},"file":[{"content_type":"application/pdf","relation":"main_file","access_level":"open_access","creator":"dernst","success":1,"date_updated":"2023-08-22T06:37:48Z","checksum":"4b80b0ff212edf7e5842fbdd53784432","date_created":"2023-08-22T06:37:48Z","file_id":"14166","file_size":1289285,"file_name":"2023_IEEEAccess_Neiheiser.pdf"}],"title":"Practical limitations of Ethereum’s layer-2","citation":{"chicago":"Neiheiser, Ray, Gustavo Inacio, Luciana Rech, Carlos Montez, Miguel Matos, and Luis Rodrigues. “Practical Limitations of Ethereum’s Layer-2.” <i>IEEE Access</i>. Institute of Electrical and Electronics Engineers, 2023. <a href=\"https://doi.org/10.1109/access.2023.3237897\">https://doi.org/10.1109/access.2023.3237897</a>.","ieee":"R. Neiheiser, G. Inacio, L. Rech, C. Montez, M. Matos, and L. Rodrigues, “Practical limitations of Ethereum’s layer-2,” <i>IEEE Access</i>, vol. 11. Institute of Electrical and Electronics Engineers, pp. 8651–8662, 2023.","ista":"Neiheiser R, Inacio G, Rech L, Montez C, Matos M, Rodrigues L. 2023. Practical limitations of Ethereum’s layer-2. IEEE Access. 11, 8651–8662.","apa":"Neiheiser, R., Inacio, G., Rech, L., Montez, C., Matos, M., &#38; Rodrigues, L. (2023). Practical limitations of Ethereum’s layer-2. <i>IEEE Access</i>. Institute of Electrical and Electronics Engineers. <a href=\"https://doi.org/10.1109/access.2023.3237897\">https://doi.org/10.1109/access.2023.3237897</a>","short":"R. Neiheiser, G. Inacio, L. Rech, C. Montez, M. Matos, L. Rodrigues, IEEE Access 11 (2023) 8651–8662.","mla":"Neiheiser, Ray, et al. “Practical Limitations of Ethereum’s Layer-2.” <i>IEEE Access</i>, vol. 11, Institute of Electrical and Electronics Engineers, 2023, pp. 8651–62, doi:<a href=\"https://doi.org/10.1109/access.2023.3237897\">10.1109/access.2023.3237897</a>.","ama":"Neiheiser R, Inacio G, Rech L, Montez C, Matos M, Rodrigues L. Practical limitations of Ethereum’s layer-2. <i>IEEE Access</i>. 2023;11:8651-8662. doi:<a href=\"https://doi.org/10.1109/access.2023.3237897\">10.1109/access.2023.3237897</a>"},"scopus_import":"1","has_accepted_license":"1","publication_status":"published","oa_version":"Published Version","page":"8651-8662","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"day":"01","abstract":[{"lang":"eng","text":"Most permissionless blockchains inherently suffer from throughput limitations. Layer-2 systems, such as side-chains or Rollups, have been proposed as a possible strategy to overcome this limitation. Layer-2 systems interact with the main-chain in two ways. First, users can move funds from/to the main-chain to/from the layer-2. Second, layer-2 systems periodically synchronize with the main-chain to keep some form of log of their activity on the main-chain - this log is key for security. Due to this interaction with the main-chain, which is necessary and recurrent, layer-2 systems impose some load on the main-chain. The impact of such load on the main-chain has been, so far, poorly understood. In addition to that, layer-2 approaches typically sacrifice decentralization and security in favor of higher throughput. This paper presents an experimental study that analyzes the current state of Ethereum layer-2 projects. Our goal is to assess the load they impose on Ethereum and to understand their scalability potential in the long-run. Our analysis shows that the impact of any given layer-2 on the main-chain is the result of both technical aspects (how state is logged on the main-chain) and user behavior (how often users decide to transfer funds between the layer-2 and the main-chain). Based on our observations, we infer that without efficient mechanisms that allow users to transfer funds in a secure and fast manner directly from one layer-2 project to another, current layer-2 systems will not be able to scale Ethereum effectively, regardless of their technical solutions. Furthermore, from our results, we conclude that the layer-2 systems that offer similar security guarantees as Ethereum have limited scalability potential, while approaches that offer better performance, sacrifice security and lead to an increase in centralization which runs against the end-goals of permissionless blockchains."}],"date_updated":"2023-12-13T12:14:52Z","status":"public","month":"08","quality_controlled":"1","publication_identifier":{"issn":["2169-3536"]},"isi":1,"volume":11,"article_type":"original","date_created":"2023-08-09T12:09:57Z","department":[{"_id":"ElKo"}],"acknowledgement":"This work was supported in part by the Coordenação de Aperfeiçoamento de Pessoal de Nivel Superior (CAPES)—Brazil (CAPES), in part by the Fundação para a Ciência e Tecnologia (FCT) under Project UIDB/50021/2020 and Grant 2020.05270.BD, in part by the Project COSMOS (via the Orçamento de Estado (OE) with ref. PTDC/EEI-COM/29271/2017 and via the ‘‘Programa Operacional Regional de Lisboa na sua componente Fundo Europeu de Desenvolvimento Regional (FEDER)’’ with ref. Lisboa-01-0145-FEDER-029271), and in part by the project Angainor with reference LISBOA-01-0145-FEDER-031456 as well as supported by Meta Platforms for the project key Transparency at Scale.","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","ddc":["000"],"article_processing_charge":"Yes","file_date_updated":"2023-08-22T06:37:48Z","keyword":["General Engineering","General Materials Science","General Computer Science","Electrical and Electronic Engineering"],"intvolume":"        11","author":[{"last_name":"Neiheiser","id":"f09651b9-fec0-11ec-b5d8-934aff0e52a4","orcid":"0000-0001-7227-8309","full_name":"Neiheiser, Ray","first_name":"Ray"},{"last_name":"Inacio","first_name":"Gustavo","full_name":"Inacio, Gustavo"},{"full_name":"Rech, Luciana","first_name":"Luciana","last_name":"Rech"},{"first_name":"Carlos","full_name":"Montez, Carlos","last_name":"Montez"},{"first_name":"Miguel","full_name":"Matos, Miguel","last_name":"Matos"},{"first_name":"Luis","full_name":"Rodrigues, Luis","last_name":"Rodrigues"}],"oa":1,"_id":"13988","date_published":"2023-08-01T00:00:00Z","language":[{"iso":"eng"}],"doi":"10.1109/access.2023.3237897","publisher":"Institute of Electrical and Electronics Engineers","year":"2023","type":"journal_article"},{"month":"01","quality_controlled":"1","publication_identifier":{"eissn":["1095-7111"],"issn":["0097-5397"]},"isi":1,"article_type":"original","volume":52,"date_created":"2023-02-16T07:03:52Z","acknowledgement":"Andrei Krokhin and Jakub Opršal were supported by the UK EPSRC grant EP/R034516/1. Jakub Opršal has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie Grant Agreement No 101034413. Stanislav Živný was supported by a Royal Society University Research Fellowship. This project has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No 714532). The paper re\u001eects only the authors’ views and not the views of the ERC or the European Commission. ","department":[{"_id":"UlWa"}],"article_processing_charge":"No","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","keyword":["General Mathematics","General Computer Science"],"intvolume":"        52","author":[{"last_name":"Krokhin","first_name":"Andrei","full_name":"Krokhin, Andrei"},{"orcid":"0000-0003-1245-3456","id":"ec596741-c539-11ec-b829-c79322a91242","last_name":"Opršal","first_name":"Jakub","full_name":"Opršal, Jakub"},{"full_name":"Wrochna, Marcin","first_name":"Marcin","last_name":"Wrochna"},{"last_name":"Živný","first_name":"Stanislav","full_name":"Živný, Stanislav"}],"oa":1,"_id":"12563","date_published":"2023-01-01T00:00:00Z","language":[{"iso":"eng"}],"doi":"10.1137/20m1378223","publisher":"Society for Industrial & Applied Mathematics","year":"2023","type":"journal_article","main_file_link":[{"open_access":"1","url":"https://doi.org/10.48550/arXiv.2003.11351"}],"publication":"SIAM Journal on Computing","external_id":{"arxiv":["2003.11351"],"isi":["000955000000001"]},"title":"Topology and adjunction in promise constraint satisfaction","project":[{"name":"IST-BRIDGE: International postdoctoral program","_id":"fc2ed2f7-9c52-11eb-aca3-c01059dda49c","grant_number":"101034413","call_identifier":"H2020"}],"citation":{"ieee":"A. Krokhin, J. Opršal, M. Wrochna, and S. Živný, “Topology and adjunction in promise constraint satisfaction,” <i>SIAM Journal on Computing</i>, vol. 52, no. 1. Society for Industrial &#38; Applied Mathematics, pp. 38–79, 2023.","chicago":"Krokhin, Andrei, Jakub Opršal, Marcin Wrochna, and Stanislav Živný. “Topology and Adjunction in Promise Constraint Satisfaction.” <i>SIAM Journal on Computing</i>. Society for Industrial &#38; Applied Mathematics, 2023. <a href=\"https://doi.org/10.1137/20m1378223\">https://doi.org/10.1137/20m1378223</a>.","ama":"Krokhin A, Opršal J, Wrochna M, Živný S. Topology and adjunction in promise constraint satisfaction. <i>SIAM Journal on Computing</i>. 2023;52(1):38-79. doi:<a href=\"https://doi.org/10.1137/20m1378223\">10.1137/20m1378223</a>","short":"A. Krokhin, J. Opršal, M. Wrochna, S. Živný, SIAM Journal on Computing 52 (2023) 38–79.","mla":"Krokhin, Andrei, et al. “Topology and Adjunction in Promise Constraint Satisfaction.” <i>SIAM Journal on Computing</i>, vol. 52, no. 1, Society for Industrial &#38; Applied Mathematics, 2023, pp. 38–79, doi:<a href=\"https://doi.org/10.1137/20m1378223\">10.1137/20m1378223</a>.","ista":"Krokhin A, Opršal J, Wrochna M, Živný S. 2023. Topology and adjunction in promise constraint satisfaction. SIAM Journal on Computing. 52(1), 38–79.","apa":"Krokhin, A., Opršal, J., Wrochna, M., &#38; Živný, S. (2023). Topology and adjunction in promise constraint satisfaction. <i>SIAM Journal on Computing</i>. Society for Industrial &#38; Applied Mathematics. <a href=\"https://doi.org/10.1137/20m1378223\">https://doi.org/10.1137/20m1378223</a>"},"arxiv":1,"issue":"1","scopus_import":"1","page":"38-79","oa_version":"Preprint","publication_status":"published","day":"01","ec_funded":1,"abstract":[{"text":"he approximate graph coloring problem, whose complexity is unresolved in most cases, concerns finding a c-coloring of a graph that is promised to be k-colorable, where c≥k. This problem naturally generalizes to promise graph homomorphism problems and further to promise constraint satisfaction problems. The complexity of these problems has recently been studied through an algebraic approach. In this paper, we introduce two new techniques to analyze the complexity of promise CSPs: one is based on topology and the other on adjunction. We apply these techniques, together with the previously introduced algebraic approach, to obtain new unconditional NP-hardness results for a significant class of approximate graph coloring and promise graph homomorphism problems.","lang":"eng"}],"date_updated":"2023-08-01T13:11:30Z","status":"public"},{"status":"public","date_updated":"2023-08-02T13:31:48Z","publication_status":"published","page":"2621–2635","oa_version":"Submitted Version","day":"01","abstract":[{"text":"It is practical to collect a huge amount of movement data and environmental context information along with the health signals of individuals because there is the emergence of new generations of positioning and tracking technologies and rapid advancements of health sensors. The study of the relations between these datasets and their sequence similarity analysis is of interest to many applications such as health monitoring and recommender systems. However, entering all movement parameters and health signals can lead to the complexity of the problem and an increase in its computational load. In this situation, dimension reduction techniques can be used to avoid consideration of simultaneous dependent parameters in the process of similarity measurement of the trajectories. The present study provides a framework, named CaDRAW, to use spatial–temporal data and movement parameters along with independent context information in the process of measuring the similarity of trajectories. In this regard, the omission of dependent movement characteristic signals is conducted by using an unsupervised feature selection dimension reduction technique. To evaluate the effectiveness of the proposed framework, it was applied to a real contextualized movement and related health signal datasets of individuals. The results indicated the capability of the proposed framework in measuring the similarity and in decreasing the characteristic signals in such a way that the similarity results -before and after reduction of dependent characteristic signals- have small differences. The mean differences between the obtained results before and after reducing the dimension were 0.029 and 0.023 for the round path, respectively.","lang":"eng"}],"scopus_import":"1","has_accepted_license":"1","project":[{"_id":"268116B8-B435-11E9-9278-68D0E5697425","name":"The Wittgenstein Prize","call_identifier":"FWF","grant_number":"Z00342"}],"citation":{"apa":"Goudarzi, S., Sharif, M., &#38; Karimipour, F. (2022). A context-aware dimension reduction framework for trajectory and health signal analyses. <i>Journal of Ambient Intelligence and Humanized Computing</i>. Springer Nature. <a href=\"https://doi.org/10.1007/s12652-021-03569-z\">https://doi.org/10.1007/s12652-021-03569-z</a>","mla":"Goudarzi, Samira, et al. “A Context-Aware Dimension Reduction Framework for Trajectory and Health Signal Analyses.” <i>Journal of Ambient Intelligence and Humanized Computing</i>, vol. 13, Springer Nature, 2022, pp. 2621–2635, doi:<a href=\"https://doi.org/10.1007/s12652-021-03569-z\">10.1007/s12652-021-03569-z</a>.","short":"S. Goudarzi, M. Sharif, F. Karimipour, Journal of Ambient Intelligence and Humanized Computing 13 (2022) 2621–2635.","ista":"Goudarzi S, Sharif M, Karimipour F. 2022. A context-aware dimension reduction framework for trajectory and health signal analyses. Journal of Ambient Intelligence and Humanized Computing. 13, 2621–2635.","ama":"Goudarzi S, Sharif M, Karimipour F. A context-aware dimension reduction framework for trajectory and health signal analyses. <i>Journal of Ambient Intelligence and Humanized Computing</i>. 2022;13:2621–2635. doi:<a href=\"https://doi.org/10.1007/s12652-021-03569-z\">10.1007/s12652-021-03569-z</a>","chicago":"Goudarzi, Samira, Mohammad Sharif, and Farid Karimipour. “A Context-Aware Dimension Reduction Framework for Trajectory and Health Signal Analyses.” <i>Journal of Ambient Intelligence and Humanized Computing</i>. Springer Nature, 2022. <a href=\"https://doi.org/10.1007/s12652-021-03569-z\">https://doi.org/10.1007/s12652-021-03569-z</a>.","ieee":"S. Goudarzi, M. Sharif, and F. Karimipour, “A context-aware dimension reduction framework for trajectory and health signal analyses,” <i>Journal of Ambient Intelligence and Humanized Computing</i>, vol. 13. Springer Nature, pp. 2621–2635, 2022."},"publication":"Journal of Ambient Intelligence and Humanized Computing","external_id":{"isi":["000712198000001"]},"file":[{"content_type":"application/pdf","relation":"main_file","access_level":"open_access","creator":"fkarimip","embargo":"2022-11-12","date_updated":"2022-12-20T23:30:08Z","date_created":"2021-11-12T19:38:05Z","file_id":"10279","checksum":"0a8961416a9bb2be5a1cebda65468bcf","file_size":1634958,"file_name":"A Context‑aware Dimension Reduction Framework - Journal of Ambient Intelligence 2021 (Preprint version).pdf"}],"title":"A context-aware dimension reduction framework for trajectory and health signal analyses","type":"journal_article","language":[{"iso":"eng"}],"doi":"10.1007/s12652-021-03569-z","publisher":"Springer Nature","year":"2022","date_published":"2022-05-01T00:00:00Z","author":[{"last_name":"Goudarzi","first_name":"Samira","full_name":"Goudarzi, Samira"},{"last_name":"Sharif","first_name":"Mohammad","full_name":"Sharif, Mohammad"},{"first_name":"Farid","full_name":"Karimipour, Farid","last_name":"Karimipour","id":"2A2BCDC4-CF62-11E9-BE5E-3B1EE6697425","orcid":"0000-0001-6746-4174"}],"oa":1,"_id":"10208","ddc":["000"],"article_processing_charge":"No","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","file_date_updated":"2022-12-20T23:30:08Z","keyword":["general computer science"],"intvolume":"        13","date_created":"2021-11-02T09:28:55Z","department":[{"_id":"HeEd"}],"acknowledgement":"The third author acknowledges the funding received from the Wittgenstein Prize, Austrian Science Fund (FWF), grant no. Z 342-N31.","isi":1,"article_type":"original","volume":13,"month":"05","quality_controlled":"1","publication_identifier":{"issn":["1868-5137"],"eissn":["1868-5145"]}}]
