Home |  ENGLISH |  Kontakt |  Impressum |  Datenschutz |  Anmelden |  KIT

Neuigkeit143: Unterschied zwischen den Versionen

Aus Aifbportal

Wechseln zu: Navigation, Suche
(Die Seite wurde neu angelegt: „{{Neuigkeit |Titel DE=Drei Artikel bei der HICSS 53 angenommen |Titel EN=Three Papers Accepted at HICSS 53 |Beschreibung DE=Drei unserer eingereichten Artikel…“)
(kein Unterschied)

Version vom 12. September 2019, 16:39 Uhr

Neuigkeit vom 12. September 2019


Drei Artikel bei der HICSS 53 angenommen


Drei unserer eingereichten Artikel wurden bei der Hawaii International Conference on System Sciences (HICSS 53) angenommen:

"Beyond Data Markets: Opportunities and Challenges for Distributed Ledger Technology in Genomics" von Scott Thiebes, Niclas Kannengießer, Manuel Schmidt-Kraepelin und Ali Sunyaev.

Abstract: During the past decade, distributed ledger technology (DLT) has found its way into application areas outside finance, such as supply chain management, the Internet of Things, or health care. To this end, this novel technology phenomenon has recently also caught the attention of researchers and practitioners in genomics. Although various DLT-based data markets for genome data already exist or are in development, the potential of DLT in this context is far from exhausted, whereas the possible risks related to the application of DLT in genomics are not yet sufficiently known. In this work, we investigate the potential opportunities and challenges for the application of DLT in the field of genomics. Thus, we make an important contribution to the safe and socially acceptable use of DLT in this unique and highly relevant use context.


"Bridges Between Island: Cross-Chain Technology in Distributed Ledger Technology" von Niclas Kannengießer, Michelle Pfister, Malte Greulich, Sebastian Lins und Ali Sunyaev.

Abstract: Since blockchain’s emergence in 2008, we see a kaleidoscopic variety of applications built on distributed ledger technology (DLT) today, including applications for financial services, healthcare, or the Internet of Things. Each application comes with specific requirements for DLT characteristics (e.g., high throughput, scalability). However, trade-offs between DLT characteristics restrict the development of a DLT design (e.g., Ethereum, blockchain) that fits all use cases’ requirements. Separated DLT designs emerged, each specialized to suite dedicated application requirements. To enable the development of more powerful applications on DLT, such DLT islands must be bridged. However, knowledge of cross-chain technology (CCT) is scattered across scientific and practical sources. Therefore, we examine this diverse body of knowledge and provide comprehensive insights into CCT by synthesizing its underlying characteristics, evolving patterns, and use cases. Our findings resolve contradictions in the literature and provide avenues for future research in an emerging scientific field.


"Do Not Be Fooled: Toward a Holistic Comparison of Distributed Ledger Technology Designs" von Florian Gräbe, Niclas Kannengießer, Sebastian Lins und Ali Sunyaev.

Abstract: Distributed Ledger Technology (DLT) enables a new way of inter-organizational collaboration via a shared and distributed infrastructure. There are plenty of DLT designs (e.g., Ethereum, IOTA), which differ in their capabilities to meet use case requirements. A structured comparison of DLT designs is required to support the selection of an appropriate DLT design. However, existing criteria and processes are abstract or not suitable for an in-depth comparison of DLT designs. We select and operationalize DLT characteristics relevant for a comprehensive comparison of DLT designs. Furthermore, we propose a comparison process, which enables the structured comparison of a set of DLT designs according to application requirements. The proposed process is validated with a use case analysis of three use cases. We contribute to research and practice by introducing ways to operationalize DLT characteristics and generate a process to compare different DLT designs accordingly to their suitability in a use case.



Aus der Forschungsgruppe Critical Information Infrastructures