Stefan Schulte

Stefan Schulte
Technische Universität Hamburg | TUHH · Institute for Data Engineering

Professor

About

206
Publications
92,151
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,975
Citations
Additional affiliations
June 2006 - June 2010
Technische Universität Darmstadt
Position
  • PhD Student
July 2010 - June 2011
Technische Universität Darmstadt
Position
  • PostDoc Position
March 2019 - August 2021
TU Wien
Position
  • Professor (Associate)
Education
February 2005 - November 2005
The University of Newcastle, Australia
Field of study
  • Information Technology
October 2001 - August 2006
Carl von Ossietzky Universität Oldenburg
Field of study
  • Computer Science
October 2000 - March 2006
Carl von Ossietzky Universität Oldenburg
Field of study
  • Economics (Major: Computer Science)

Publications

Publications (206)
Article
Business Process Management is a matter of great importance in different industries and application areas. In many cases, it involves the execution of resource-intensive tasks in terms of computing power such as CPU and RAM. Due to the emergence of Cloud computing, theoretically unlimited resources can be used for the enactment of business processe...
Article
The article is available here: http://authors.elsevier.com/a/1Qa4O_,OQCKOpe Abstract: With the advent of cloud computing, organizations are nowadays able to react rapidly to changing demands for computational resources. Not only individual applications can be hosted on virtual cloud infrastructures, but also complete business processes. This allow...
Article
With the Internet of Services, Web services from all areas of life and business will be offered to service consumers. Even though Web service technologies make it easy to consume services on arbitrary devices due to their platform-independence, service messaging is heavyweight. This may cause problems if services are invoked using devices with limi...
Conference Paper
Full-text available
Today's extensive business process landscapes make it necessary to handle the execution of a large number of workflows. Especially if workflow steps require the invocation of resource-intensive applications or a large number of applications needs to be carried out concurrently, process owners may have to allocate extensive computational resources,...
Article
Full-text available
Although virtual factories are a well-established approach to managing distributed, cross-organizational manufacturing processes, corresponding end-to-end IT support is still lacking. Service-oriented virtual factories use and extend well-known methods and technologies from service-oriented computing, the Internet of Things, and business process ma...
Preprint
Advanced AI applications have become increasingly available to a broad audience, e.g., as centrally managed large language models (LLMs). Such centralization is both a risk and a performance bottleneck - Edge AI promises to be a solution to these problems. However, its decentralized approach raises additional challenges regarding security and safet...
Article
Full-text available
The growing popularity of blockchains highlights the need to improve their scalability. While previous research has focused on scaling transaction processing, the scalability of transaction creation remains unexplored. This issue is particularly important for organizations needing to send large volumes of transactions quickly or continuously. Scali...
Article
The closed architecture of prevailing blockchain systems renders the usage of this technology mostly infeasible for a wide range of real-world problems. Most blockchains trap users and applications in their isolated space without the possibility of cooperating or switching to other blockchains. Therefore, blockchains need additional mechanisms for...
Article
Payment Channel Networks (PCNs) are a promising approach to overcome scalability issues of blockchains. To achieve efficient payments in PCNs, it is necessary to route transactions between a payer and a payee. Especially in large-scale PCNs, multi-hop routing becomes necessary, since transactions need to be relayed by nodes. For this, a scalable ro...
Article
The introduction of smart contracts has expanded the applicability of blockchains to many domains beyond finance and cryptocurrencies. Moreover, different blockchain technologies have evolved that target special requirements. As a result, in practice, often a combination of different blockchain systems is required to achieve an overall goal. Howeve...
Chapter
The increasing popularity of blockchains raises the question of how to improve their scalability. While researchers are exploring ways to scale the on-chain processing of transactions, the scalability of the off-chain creation of transactions has not been investigated yet. This is relevant for organizations wishing to send a high volume of transact...
Article
Blockchains have become increasingly important in recent years and have expanded their applicability to many domains beyond finance and cryptocurrencies. This adoption has particularly increased with the introduction of smart contracts, which are immutable, user-defined programs directly deployed on blockchain networks. However, many scenarios requ...
Preprint
Full-text available
Blockchain technology has become one of the most popular trends in IT over the last few years. Its increasing popularity and the discovery of ever more use cases raises the question of how to improve scalability. While researchers are exploring ways to scale the on-chain processing of transactions, the scalability of the off-chain creation of trans...
Article
Full-text available
Fog computing enables the execution of IoT applications on compute nodes which reside both in the cloud and at the edge of the network. To achieve this, most fog computing systems route the IoT data on a path which starts at the data source, and goes through various edge and cloud nodes. Each node on this path may accept the data if there are avail...
Article
In business process landscapes, a common challenge is to provide the necessary computational resources to enact the single process steps. One well-known approach to solve this issue in a cost-efficient way is to use the notion of elasticity, i.e., to provide cloud-based computational resources in a rapid fashion and to enact the single process step...
Preprint
Full-text available
Distributed Key Generation (DKG) is an extensively researched topic as it is fundamental to threshold cryptosystems. Emerging technologies such as blockchains benefit massively from applying threshold cryptography in consensus protocols, randomness beacons, and threshold signatures. However, blockchains and smart contracts also enable further impro...
Article
Full-text available
The (IoT) is growing steadily, and so is the number of data that is generated by (IoT) devices. This makes it difficult to find and leverage relevant data (and data sources) without a data marketplace. Such a marketplace provides a platform to enable different parties, e.g., sensor operators and service providers, to trade their data. Today, most d...
Article
Full-text available
Today, several solutions for cross-blockchain asset transfers exist. However, these solutions are either tailored to specific assets or neglect finality guarantees that prevent assets from getting lost in transit. In this paper, we present a cross-blockchain asset transfer protocol that supports arbitrary assets, is adaptable to different means of...
Preprint
In business process landscapes, a common challenge is to provide the necessary computational resources to enact the single process steps. One well-known approach to solve this issue in a cost-efficient way is to use the notion of elasticity, i.e., to provide cloud-based computational resources in a rapid fashion and to enact the single process step...
Preprint
Full-text available
Federated learning may be subject to both global aggregation attacks and distributed poisoning attacks. Blockchain technology along with incentive and penalty mechanisms have been suggested to counter these. In this paper, we explore verifiable off-chain computations using zero-knowledge proofs as an alternative to incentive and penalty mechanisms...
Preprint
Full-text available
Within this Technical Report, we present the full analysis of 61 routing protocols for Wireless Sensor Networks (WSNs) for the purposes of routing in Payment Channel Networks (PCNs). In addition, we present the full results of the implementation of the three algorithms E-TORA, TERP, and M-DART.
Article
Machine Learning (ML) is increasingly applied in industrial manufacturing, but often performance is limited due to insufficient training data. While ML models can benefit from collaboration, due to privacy concerns, individual manufacturers often cannot share data directly. Federated Learning (FL) enables collaborative training of ML models without...
Article
Based on the collective input of Dagstuhl Seminar (21342), this paper presents a comprehensive discussion on AI methods and capabilities in the context of edge computing, referred as Edge AI. In a nutshell, we envision Edge AI to provide adaptation for data-driven applications, enhance network and radio access, and allow the creation, optimization,...
Preprint
Full-text available
Based on the collective input of Dagstuhl Seminar (21342), this paper presents a comprehensive discussion on AI methods and capabilities in the context of edge computing, referred as Edge AI. In a nutshell, we envision Edge AI to provide adaptation for data-driven applications, enhance network and radio access, and allow the creation, optimization,...
Preprint
Today's blockchain landscape is severely fragmented as more and more heterogeneous blockchain platforms have been developed in recent years. These blockchain platforms are not able to interact with each other or with the outside world since only little emphasis is placed on the interoperability between them. Already proposed solutions for blockchai...
Chapter
Offloading of computation, e.g., to the cloud, is today a major task in distributed systems. Usually, consumers which apply offloading have to trust that a particular functionality offered by a service provider is delivering correct results. While redundancy (i.e., offloading a task to more than one service provider) or (partial) reprocessing help...
Preprint
Offloading of computation, e.g., to the cloud, is today a major task in distributed systems. Usually, consumers which apply offloading have to trust that a particular functionality offered by a service provider is delivering correct results. While redundancy (i.e., offloading a task to more than one service provider) or (partial) reprocessing help...
Article
Full-text available
Due to the proliferation of edge computing, cloud providers have started offering compute nodes at the edge of the network in addition to traditional compute nodes in data centers. So far, various systems have been proposed for processing Internet of Things (IoT) data on both edge and cloud compute nodes in order to reduce the communication latency...
Article
Full-text available
Recently, a multitude of conceptual architectures and theoretical foundations for fog computing have been proposed. Despite this, there is still a lack of concrete frameworks to setup real-world fog landscapes. In this work, we design and implement the fog computing framework FogFrame —a system able to manage and monitor edge and cloud resources in...
Article
Industry 4.0 will only become a reality through the convergence of Operational and Information Technologies (OT & IT), which use different computation and communication technologies. Cloud Computing cannot be used for OT involving industrial applications, since it cannot guarantee stringent non-functional requirements, e.g., dependability, trustwor...
Book
This book integrates the material of the lecture series “Blockchain and Robotic Process Automation”, offered at Kiel University. The lecture series sheds light on current research topics on blockchain and robotic process automation (RPA) also in combination with business process management (BPM) or process mining. In this series, leading scientists...
Article
Full-text available
Various performance benefits such as low latency and high bandwidth have turned fog computing into a well-accepted extension of the cloud computing paradigm. Many fog computing systems have been proposed so far, consisting of distributed compute nodes which are often organized hierarchically in layers. To achieve low latency, these systems commonly...
Preprint
Full-text available
In recent years, manifold blockchain protocols have been proposed by researchers and industrial companies alike. This has led to a very heterogeneous blockchain landscape. Accordingly, it would be desirable if blockchains could interact with each other. However, current blockchain technologies offer only limited support for interoperability, thus p...
Chapter
Federated Learning (FL) is a very promising approach for improving decentralized Machine Learning (ML) models by exchanging knowledge between participating clients without revealing private data. Nevertheless, FL is still not tailored to the industrial context as strong data similarity is assumed for all FL tasks. This is rarely the case in industr...
Preprint
Industry 4.0 will only become a reality through the convergence of Operational and Information Technologies (OT & IT), which use different computation and communication technologies. Cloud Computing cannot be used for OT involving industrial applications, since it cannot guar-antee stringent non-functional requirements, e.g., dependability, trustwo...
Article
Full-text available
As data collected and provided by Internet of Things (IoT) devices power an ever-growing number of applications and services, it is crucial that this data can be trusted. Data provenance solutions combined with blockchain technology are one way to make data more trustworthy by providing tamper-proof information about the origin and history of data...
Preprint
Full-text available
Federated Learning (FL) is a very promising approach for improving decentralized Machine Learning (ML) models by exchanging knowledge between participating clients without revealing private data. Nevertheless, FL is still not tailored to the industrial context as strong data similarity is assumed for all FL tasks. This is rarely the case in industr...
Conference Paper
Full-text available
Since the proliferation of fog computing, various distributed architectures have been proposed to extend the cloud to the edge of the network. However, so far there exists no study that compares different fog computing architectures, and produces quantitative results in order to examine the efficiency of each architecture for different use cases. S...
Preprint
Full-text available
Today, solutions for cross-blockchain asset transfers are either tailored for specific assets, require certain means of cross-blockchain communication, or neglect finality guarantees that prevent assets from getting lost in transit. In this paper, we present a cross-blockchain asset transfer protocol that supports arbitrary assets, is adaptable to...
Conference Paper
Full-text available
In recent years, the Internet of Things (IoT) has gained a lot of attention due to connecting various sensor devices with the cloud, in order to enable smart applications such as: smart traffic management, smart houses, and smart grids, among others. Due to the growing popularity of the IoT, the number of Internet-connected devices has increased si...
Chapter
Distributing data in a tamper-proof and traceable way is a necessity in many Internet of Things (IoT) scenarios. Blockchain technologies are frequently named as an approach to provide such functionality. Despite this, there is a lack of concrete solutions which integrate the IoT with the blockchain for data distribution purposes.
Preprint
Full-text available
Current blockchain technologies provide very limited means of interoperability. In particular, solutions enabling blockchains to verify the existence of data on other blockchains are either very costly or are not fully decentralized. To overcome these limitations, we introduce Testimonium, a novel blockchain relay scheme that applies a validation-o...
Research
Full-text available
Blockchain relay schemes offer the ability to verify transactions across blockchains in a decentralized manner. While this enables blockchain interoperability applications like cross-blockchain token transfers, relays can become expensive since state-of-the-art relays require every single block header of the source blockchain to be stored by the de...
Research
Full-text available
Blockchain relay schemes rely on off-chain clients constantly submitting block information from a source block-chain to the relay running on a destination blockchain. As clients incur costs when submitting block headers, an incentive structure needs to be in place that compensates clients for their efforts. In this paper, we develop an incentive st...
Conference Paper
As more and more applications and services depend on data collected and provided by Internet of Things (IoT) devices, it is of importance that such data can be trusted. Data provenance solutions together with blockchain technology are one way to make data more trustworthy. However, current solutions do not address the heterogeneous nature of IoT ap...
Conference Paper
Full-text available
Edge computing describes a paradigm for combining computational resources at the edge of the network with the cloud. Even though complementing the cloud with these resources provides benefits, e.g., low latency, it also introduces new challenges to the operational staff. Such challenges can be: deciding if the applications should be placed in the c...
Conference Paper
In recent years, distributed ledger technologies like blockchains have gained much popularity both within industry and research. Today, blockchains do not only act as the underlying technology for cryptocurrencies like Bitcoin, but have also been identified as a potentially disruptive technology in many different fields, e.g., supply chain tracking...
Research
Full-text available
Interoperability between blockchains remains an open problem with current interoperability approaches providing very limited means of cross-blockchain interaction. In particular, current solutions for cross-blockchain token transfers suffer from limitations such as excessive synchronization of any balance change across blockchains. To overcome thes...
Chapter
In recent years, distributed ledger technologies like blockchains have gained much popularity both within industry and research. Today, blockchains do not only act as the underlying technology for cryptocurrencies like Bitcoin, but have also been identified as a potentially disruptive technology in many different fields, e.g., supply chain tracking...
Article
Full-text available
Current blockchain technologies provide very limited interoperability. Restrictions with regard to asset transfers and data exchange between different blockchains reduce the usability and comfort of users, and hinder novel developments within the blockchain space. As a first step towards blockchain interoperability, we propose the DeXTT cross-block...
Article
Full-text available
In volatile data streams as encountered in the Internet of Things (IoT), the data volume to be processed changes permanently. Hence, to ensure timely data processing, there is a need to reconfigure the computational resources used for processing data streams. Up to now, mostly cloud-based computational resources are utilized for this. However, clou...
Conference Paper
Full-text available
Elastic data stream processing enables applications to query and analyze streams of real time data. This is commonly facilitated by processing the flow of the data streams using a collection of stream processing operators which are placed in the cloud. However, the cloud follows a centralized approach which is prone to high latency delay. For avoid...