scispace - formally typeset
D

Dominic Breuker

Researcher at University of Münster

Publications -  44
Citations -  1027

Dominic Breuker is an academic researcher from University of Münster. The author has contributed to research in topics: Business process & Business process modeling. The author has an hindex of 14, co-authored 44 publications receiving 912 citations. Previous affiliations of Dominic Breuker include European Research Center for Information Systems.

Papers
More filters
Proceedings ArticleDOI

An inquiry into money laundering tools in the Bitcoin ecosystem

TL;DR: A first systematic account of opportunities and limitations of anti-money laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the Internet, is provided and it appears unlikely that a Know-Your-Customer principle can be enforced in the Bitcoin system.
Journal ArticleDOI

Comprehensible predictive models for business processes

TL;DR: A new predictive modeling technique based on weaker biases is designed, fitting a probabilistic model to a data set of past behavior makes it possible to predict how currently running process instances will behave in the future.
Book ChapterDOI

Towards Risk Scoring of Bitcoin Transactions

TL;DR: This scenario of crime fighters joining forces with regulators and enforce blacklisting of transaction prefixes at the parties who offer real products and services in exchange for bitcoin is elaborated and Bitcoin’s ability to serve as a unit of account is critically revisited.
Posted Content

Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency

TL;DR: In this paper, the authors provide a first cut of an answer by estimating the resource requirements, in terms of operating cost and ecological footprint, of a suitably dimensioned PoW infrastructure and comparing them to three attack scenarios.
Book ChapterDOI

Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency

TL;DR: In this paper, the authors provide a first cut of an answer by estimating the resource requirements, in terms of operating cost and ecological footprint, of a suitably dimensioned PoW infrastructure and comparing them to three attack scenarios.