D
Dominic Breuker
Researcher at University of Münster
Publications - 44
Citations - 1027
Dominic Breuker is an academic researcher from University of Münster. The author has contributed to research in topics: Business process & Business process modeling. The author has an hindex of 14, co-authored 44 publications receiving 912 citations. Previous affiliations of Dominic Breuker include European Research Center for Information Systems.
Papers
More filters
Proceedings ArticleDOI
An inquiry into money laundering tools in the Bitcoin ecosystem
TL;DR: A first systematic account of opportunities and limitations of anti-money laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the Internet, is provided and it appears unlikely that a Know-Your-Customer principle can be enforced in the Bitcoin system.
Journal ArticleDOI
Comprehensible predictive models for business processes
TL;DR: A new predictive modeling technique based on weaker biases is designed, fitting a probabilistic model to a data set of past behavior makes it possible to predict how currently running process instances will behave in the future.
Book ChapterDOI
Towards Risk Scoring of Bitcoin Transactions
TL;DR: This scenario of crime fighters joining forces with regulators and enforce blacklisting of transaction prefixes at the parties who offer real products and services in exchange for bitcoin is elaborated and Bitcoin’s ability to serve as a unit of account is critically revisited.
Posted Content
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency
TL;DR: In this paper, the authors provide a first cut of an answer by estimating the resource requirements, in terms of operating cost and ecological footprint, of a suitably dimensioned PoW infrastructure and comparing them to three attack scenarios.
Book ChapterDOI
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency
TL;DR: In this paper, the authors provide a first cut of an answer by estimating the resource requirements, in terms of operating cost and ecological footprint, of a suitably dimensioned PoW infrastructure and comparing them to three attack scenarios.