Conference Paper

The Symbiosis of Distributed Ledger and Machine Learning as a Relevance for Autonomy in the Internet of Things (approved)

Authors:
  • Ferdinand-Steinbeis-Institut
  • Ferdinand-Steinbeis-Institut
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The Internet of Things (IoT) describes the fusion of the physical and digital world which enables assets on the edge to send data to a platform where it gets analyzed. Defined actions are then triggered to influence cross-functional edge activities. Furthermore, on the platform tier functionalities and relations need to be identified and implemented to realize assets operating autonomously and ubiquitously. The exploration of this paper results in the identification of autonomous characteristics and shows functional components to implement autonomous assets on the edge. Distributed Ledger Technology (DLT) and its fusion with Machine Learning (ML) as an area of Artificial Intelligence (AI) provides an integral part to realize the described outline. Thus, the recognition of DLT’s and ML’s usage in the IoT and the evaluation of the relevance as well as the synergies build the main focus of this paper.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... For example, DLT can extract information from volumes of data generated by IoT devices such as energy meters and smart sensors. Presently, the interconnectedness between these technologies is often overlooked, and these technologies are separately adopted (Burkhardt et al., 2019). However, the convergence of AI, IoT, and DLT can improve future energy systems in LEC. ...
... The designed constructs may comprise of symbols and vocabulary, whereas the models can vary from representations and abstractions. The methods can be best practices and algorithms, and the instantiations can be various types of implementations and possible prototypes (Burkhardt et al., 2019). In this article the DSR is employed based on a user-centred design (UCD) methods to ensure the citizen-centric prosumer approach proposed is designed and developed in a user centric manner. ...
... provenance histories, enables predictive planning, fraud detection, and regulatory compliance. DLT can provide easy-to-use configurable dashboards, predictive models for energy production, provenance histories of generation and consumption of energy, and compliance checking such as GDPR, privacy and data security (Burkhardt et al., 2019). Prior studies employed DLTs such as blockchain for the management and monitoring of IoT devices as well as for energy distribution and trading in addition to improving the reliability and security of smart grid communications (Anthony Jnr, 2024;Khan et al., 2020). ...
Article
Full-text available
The role of prosumers who are consumers who produce, store, and consume energy is vital to the uptake of renewable energies in Local Energy Communities (LEC). But LEC are faced with issues of trust, privacy, security, and energy pricing determination. Also, there are fewer studies based on a citizen-centric prosumer approach. Thus, there is need to provide reliable solutions that addresses the aforementioned challenges faced by prosumers in LEC. Advancements in disruptive technologies, such as Distributed Ledger Technologies (DLT), Artificial Intelligence (AI), and the Internet of Things (IoT) have transformed a broad spectrum of intelligent systems in smart cities. Therefore, this study examines the integration of AI and IoT as AIoT and DLT towards a citizen-centric prosumer approach for decentralized energy markets trading. Additionally, this article develops an architectural model for energy prosumption in LEC using design science approach based on a user-centred design method that shows a possible implementation concept to support energy sharing and trading in LEC. The architectural model supports trust, data privacy, security, and energy pricing determination using AI and smart contracts to provides real-time energy-trading monitoring, easy access, control, and immutable logs to unearth underlying energy demand and supply patterns thereby supporting citizen-centric prosumer approach.
... Additionally, studies show that the use of Cloud Computing may result in a significant increase in band-width usage on the communication network between the IoT devices and the cloud (Burkhardt et al, 2019;Kharchenko et al., 2020;Perico & Mattioli, 2020;Wu, 2020;Zhang & Tao, 2020) and a concern about privacy and data security while IoT transfers the data to the Cloud (Magaia et al., 2020;Stracener et al., 2019). ...
Conference Paper
Full-text available
The technological advancements in Industry 4.0, specifically in the areas of Industrial Internet of Things (IIoT) and Artificial Intelligence (AI) enables a series of enhancements in production management. The development of Big Data, Fog & Cloud Computing and Neural Networks have made Predictive Maintenance (PdM) an area of interest as it has been able to effectively transform and adapt to machine conditions. This paper presents a systemic literature review of the state of the art in AI and IIoT regarding PdM to serve as a basis for future work in the area. The relevance of this subject is still high, as seen by the number of publications in the last two years, however there are still several relevant research challenges to be addressed, in particular to achieve an adaptable and homogeneous PdM model.
Article
Full-text available
A comparative study across the most widely known blockchain technologies is conducted with a bottom-up approach. Blockchains are deconstructed into their building blocks. Each building block is then hierarchically classified into main and subcomponents. Then, varieties of the subcomponents are identified and compared. A taxonomy tree is used to summarise the study and provide a navigation tool across different blockchain architectural configurations.
Article
Full-text available
Internet of Things (IoT) is one of the promising technologies that has attracted a lot of attention in both industrial and academic fields these years. It aims to integrate seamlessly both physical and digital worlds in one single ecosystem that makes up a new intelligent era of Internet. This technology offers a huge business value for organizations and provides opportunities for many existing applications such as energy, healthcare and other sectors. However, as new emergent technology, IoT suffers from several security issues which are most challenging than those from other fields regarding its complex environment and resources-constrained IoT devices. A lot of researches have been initiated in order to provide efficient security solutions in IoT, particularly to address resources constraints and scalability issues. Furthermore, some technologies related to networking and cryptocurrency fields such as Software Defined Networking (SDN) and Blockchain are revolutionizing the world of the Internet of Things thanks to their efficiency and scalability. In this paper, we provide a comprehensive top down survey of the most recent proposed security and privacy solutions in IoT. We discuss particularly the benefits that new approaches such as blockchain and Software Defined Networking can bring to the security and the privacy in IoT in terms of flexibility and scalability. Finally, we give a general classification of existing solutions and comparison based on important parameters.
Article
Full-text available
Perspective https://www.sciencedirect.com/science/article/pii/S092134491830079X
Article
Full-text available
Internet of Things (IoT) has been growing rapidly due to recent advancements in communications and sensor technologies. Meanwhile, with this revolutionary transformation, researchers, implementers, deployers, and users are faced with many challenges. IoT is a complicated, crowded, and complex field; there are various types of devices, protocols, communication channels, architectures, middleware, and more. Standardization efforts are plenty, and this chaos will continue for quite some time. What is clear, on the other hand, is that IoT deployments are increasing with accelerating speed, and this trend will not stop in the near future. As the field grows in numbers and heterogeneity, “intelligence” becomes a focal point in IoT. Since data now becomes “big data”, understanding, learning, and reasoning with big data is paramount for the future success of IoT. One of the major problems in the path to intelligent IoT is understanding “context”, or making sense of the environment, situation, or status using data from sensors, and then acting accordingly in autonomous ways. This is called “context aware computing”, and it now requires both sensing and, increasingly, learning, as IoT systems get more data and better learning from this “big data”. In this survey, we review the field, first, from a historical perspective, covering ubiquitous and pervasive computing, ambient intelligence, and wireless sensor networks, and then, move to context aware computing studies. Finally, we review learning and “big data” studies related to IoT. We also identify the open issues and provide an insight for future study areas for IoT researchers. Link: http://ieeexplore.ieee.org/document/8110603/
Article
Full-text available
With the advent of smart homes, smart cities, and smart everything, the Internet of Things (IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc. predicting to have 50 billion connected devices by 2020. However, most of these IoT devices are easy to hack and compromise. Typically, these IoT devices are limited in compute, storage, and network capacity, and therefore they are more vulnerable to attacks than other endpoint devices such as smartphones, tablets, or computers. In this paper, we present and survey major security issues for IoT. We review and categorize popular security issues with regard to the IoT layered architecture, in addition to protocols used for networking, communication, and management. We outline security requirements for IoT along with the existing attacks, threats, and state-of-the-art solutions. Furthermore, we tabulate and map IoT security problems against existing solutions found in the literature. More importantly, we discuss, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems. The paper also identifies open research problems and challenges for IoT security.
Article
Full-text available
Morpheo is a transparent and secure machine learning platform collecting and analysing large datasets. It aims at building state-of-the art prediction models in various fields where data are sensitive. Indeed, it offers strong privacy of data and algorithm, by preventing anyone to read the data, apart from the owner and the chosen algorithms. Computations in Morpheo are orchestrated by a blockchain infrastructure, thus offering total traceability of operations. Morpheo aims at building an attractive economic ecosystem around data prediction by channelling crypto-money from prediction requests to useful data and algorithms providers. Morpheo is designed to handle multiple data sources in a transfer learning approach in order to mutualize knowledge acquired from large datasets for applications with smaller but similar datasets.
Conference Paper
Full-text available
Blockchain technology is expected to revolutionize the way transactions are performed, thereby affecting a vast variety of potential areas of application. While expectations are high, real world impact and benefit are still unclear. To be able to assess its impact, the first structured literature review of peer-reviewed articles is conducted. As blockchain technology is centered around a peer-to-peer network, enabling collaboration between different parties, the service system is chosen as unit analysis to examine its potential contribution. We have identified a set of characteristics that enable trust and decentralization, facilitating the formation and coordination of a service system.
Article
Full-text available
The paper motivates, presents, demonstrates in use, and evaluates a methodology for conducting design science (DS) research in information systems (IS). DS is of importance in a discipline oriented to the creation of successful artifacts. Several researchers have pioneered DS research in IS, yet over the past 15 years, little DS research has been done within the discipline. The lack of a methodology to serve as a commonly accepted framework for DS research and of a template for its presentation may have contributed to its slow adoption. The design science research methodology (DSRM) presented here incorporates principles, practices, and procedures required to carry out such research and meets three objectives: it is consistent with prior literature, it provides a nominal process model for doing DS research, and it provides a mental model for presenting and evaluating DS research in IS. The DS process includes six steps: problem identification and motivation, definition of the objectives for a solution, design and development, demonstration, evaluation, and communication. We demonstrate and evaluate the methodology by presenting four case studies in terms of the DSRM, including cases that present the design of a database to support health assessment methods, a software reuse measure, an Internet video telephony application, and an IS planning method. The designed methodology effectively satisfies the three objectives and has the potential to help aid the acceptance of DS research in the IS discipline.
Article
Full-text available
Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. To adapt to such conditions, sensor networks often adopt machine learning techniques to eliminate the need for unnecessary redesign. Machine learning also inspires many practical solutions that maximize resource utilization and prolong the lifespan of the network. In this paper, we present an extensive literature review over the period 2002-2013 of machine learning methods that were used to address common issues in wireless sensor networks (WSNs). The advantages and disadvantages of each proposed algorithm are evaluated against the corresponding problem. We also provide a comparative guide to aid WSN designers in developing suitable machine learning solutions for their specific application challenges.
Article
Full-text available
In this short text the authors claim that the challenges posed by Internet of Things cannot be managed with the current policy tools and research programs, as these are too slow and too instrumental. These challenges are: a) global cooperation and standards, b) new business models and new currencies, c) ethics, control society, surveillance, consent and data driven life, and d) technological challenges driven by the need to save energy. These lead up to the urgency to co-design decision making formats that aim at finding the perfect balance between top down planning and bottom up innovation.
Article
Full-text available
Current and future space systems will continue to grow in complexity and capabilities, creating a formidable challenge to monitor, maintain, and utilize these systems and manage their growing network of space and related ground-based assets. Integrated System Health Management (ISHM), and in particular, Condition-Based System Health Management (CBHM), is the ability to manage and maintain a system using dynamic real-time data to prioritize, optimize, maintain, and allocate resources. CBHM entails the maintenance of systems and equipment based on an assessment of current and projected conditions (situational and health related conditions). A complete, modern CBHM system comprises a number of functional capabilities: sensing and data acquisition; signal processing; conditioning and health assessment; diagnostics and prognostics; and decision reasoning. In addition, an intelligent Human System Interface (HSI) is required to provide the user/analyst with relevant context-sensitive information, the system condition, and its effect on overall situational awareness of space (and related) assets. Colorado Engineering, Inc. (CEI) and Raytheon are investigating and designing an Intelligent Information Agent Architecture that will provide a complete range of CBHM and HSI functionality from data collection through recommendations for specific actions. The research leverages CEI's expertise with provisioning management network architectures and Raytheon's extensive experience with learning agents to define a system to autonomously manage a complex network of current and future space-based assets to optimize their utilization.
Article
Full-text available
The qualitative interview is one of the most important data gathering tools in qualitative research, yet it has remained an unexamined craft in IS research. This paper discusses the potential difficulties, pitfalls and problems of the qualitative interview in IS research. Building on Goffman’s seminal work on social life, the paper proposes a dramaturgical model as a useful way of conceptualizing the qualitative interview. Based on this model the authors suggest guidelines for the conduct of qualitative interviews.
Article
Full-text available
The application scenarios envisioned for 'global ubiquitous computing ' have unique re- quirements that are often incompatible with traditional security paradigms. One alternative currently being investigated is to support security decision-making by explicit representa- tion of principals' trusting relationships, i.e., via systems for computational trust. We focus here on systems where trust in a computational entity is interpreted as the expectation of certain future behaviour based on behavioural patterns of the past, and concern ourselves with the foundations of such probabilistic systems. In particular, we aim at establishing formal probabilistic models for computational trust and their fundamental properties. In the paper we define a mathematical measurefor quantitatively comparing the e ectiveness of probabilistic computational trust systems in various environments. Using it, we com- pare some of the systems from the computational trust literature; the comparison is derived formally, rather than obtained via experimental simulation as traditionally done. With this foundation in place, we formalise a general notion of information about past behaviour, based on event structures. This yields a flexible trust model where the probability of com- plex protocol outcomes can be assessed.
Article
Full-text available
This paper addresses the design problem of providing IT support for emerging knowledge processes (EKPs). EKPs are organizational activity patterns that exhibit three characteristics in combination: an emergent process of deliberations with no best structure or sequence; requirements for knowledge that are complex (both general and situational), distributed across people, and evolving dynamically; and an actor set that is unpredictable in terms of job roles or prior knowledge. Examples of EKPs include basic research, new product development, strategic business planning, and organization design. EKPs differ qualitatively from semi-structured decision making processes; therefore, they have unique requirements that are not all thoroughly supported by familiar classes of systems, such as executive information systems, expert systems, electronic communication systems, organizational memory systems, or repositories. Further, the development literature on familiar classes of systems does not provide adequate guidance on how to build systems that support EKPs. Consequently, EKPs require a new IS design theory, as explicated by Walls et al. (1992). We created such a theory while designing and deploying a system for the EKP of organization design. The system was demonstrated through subsequent empirical analysis to be successful in supporting the process. Abstracting from the experience of building this system, we developed an IS design theory for EKP support systems. This new IS design theory is an important theoretical contribution, because it both provides guidance to developers and sets an agenda for academic research. EKP design theory makes the development process more tractable for developers by restricting the range of effective features (or rules for selecting features) and the range of effective development practices to a more manageable set EKP design theory also sets an agenda for academic research by articulating theory-based principles that are subject to empirical, as well as practical, validation.
Article
Full-text available
Qualitative research involves the use of qualitative data, such as interviews, documents, and participant observation, to understand and explain social phenomena As the focus of information systems research shifts from technological to managerial and organizational issues, qualitative research methods become increasingly useful. This example of ''living scholarship'' within MISQ Discovery's worldwide web archive prov,des an overview of qualitative research for the newcomer and a set of resources for those more experienced. The work discusses philosophical perspectives that can inform qualitative research, qualitative research methods, techniques, and modes of analysis. Links to citation lists, Internet resources, software tools, and calls for papers are also included.
Article
Full-text available
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.
Article
Full-text available
This paper is a survey of a large number of informal definitions of ``intelligence'' that the authors have collected over the years. Naturally, compiling a complete list would be impossible as many definitions of intelligence are buried deep inside articles and books. Nevertheless, the 70-odd definitions presented here are, to the authors' knowledge, the largest and most well referenced collection there is.
Chapter
With the emergence of platforms in the manufacturing domain new implications evolve for existing businesses and force them to find new business areas or adapt its products and services in order to create added value. Furthermore, generic platforms build up on these specified platforms to offer services across domains which creates additional disruption potential. Manufacturing companies need to decide if they develop their own platform in order to connect machines on the shopfloor to the internet or to other domains. Requirements that appear for such platforms in the Internet of Things are explained in this paper. Based on these requirements technology classifications are designed. Distributed Ledger will enable new opportunities to replace existing components on all layers of an industrial IT architecture. Therefore, platforms can be reshaped by using a different technology portfolio which stays in contrast to the defined technology classifications of platforms. The Industrial Internet Reference Architecture (IIRA) is used to illustrate the described comparison of technology portfolios.
Article
Various governments are exploring the possibility of implementing electronic service such as EGovernment and eDemocracy. Electronic services enable governments to innovate their internal processes to provide efficient and effective services. It also increases citizen's involvement in decision making by introducing electronic ways of citizens consultation and participation in decision making process. eVoting and eParticipation has been used at municipality level and European constitution referenda in France and the Netherlands, respectively. Electronic service has been used for electronic tax returns. Scientists and practitioners working in the field of eGovernment and eDemocracy can improve the quality of electronic services using Artificial Intelliegence and Law research. Electronic services provide new mechanisms for regulating society.
Article
Recent developments in "cryptocurrencies" and "smart contracts" are creating new opportunities for applying AI techniques. These economic technologies would benefit from greater real world knowledge and reasoning as they become integrated with everyday commerce. Cryptocurrencies and smart contracts may also provide an infrastructure for ensuring that AI systems follow specified legal and safety regulations as they become more integrated into human society.
Data
Two paradigms characterize much of the research in the Information Systems discipline: behavioral science and design science. The behavioral-science paradigm seeks to develop and verify theories that explain or predict human or organizational behavior. The design-science paradigm seeks to extend the boundaries of human and organizational capabilities by creating new and innovative artifacts. Both paradigms are foundational to the IS discipline, positioned as it is at the confluence of people, organizations, and technology. Our objective is to describe the performance of design-science research in Information Systems via a concise conceptual framework and clear guidelines for understanding, executing, and evaluating the research. In the design-science paradigm, knowledge and understanding of a problem domain and its solution are achieved in the building and application of the designed artifact. Three recent exemplars in the research literature are used to demonstrate the application of these guidelines. We conclude with an analysis of the challenges of performing high-quality design-science research in the context of the broader IS community.
Conference Paper
In this paper we introduce an approach to solving a coordination problem involving multiple heterogenous autonomous systems operating in a multi-objective mission domain. The distributed coordination mechanism presented applies an information theoretic political science voting model to the dynamic weighted aggregation method, thereby allowing the decision makers (the autonomous systems), to influence the weights assigned to each mission objective. Results from a simulated instantiation of a multiple objective mission are presented, demonstrating the use of the voting mechanism to coordinate actions undertaken by the autonomous systems. The results show a level of overall mission success comparable to that obtained in an 'ideal' centralised mechanism
Article
Research in IT must address the design tasks faced by practitioners. Real problems must be properly conceptualized and represented, appropriate techniques for their solution must be constructed, and solutions must be implemented and evaluated using appropriate criteria. If significant progress is to be made, IT research must also develop an understanding of how and why IT systems work or do not work. Such an understanding must tie together natural laws governing IT systems with natural laws governing the environments in which they operate. This paper presents a two dimensional framework for research in information technology. The first dimension is based on broad types of design and natural science research activities: build, evaluate, theorize, and justify. The second dimension is based on broad types of outputs produced by design research: representational constructs, models, methods, and instantiations. We argue that both design science and natural science activities are needed to insure that IT research is both relevant and effective.
Article
This paper discusses some of the measures used by a research team to overcome threats to validity and reliability of a semi-structured interview exploring the perceptions and needs of continuing professional education among nurses in practice in two district health authorities.
Article
Today's distributed database systems adhere to the principle of ubiquity such that all the information is everywhere available in an equitable fashion. This transparent data distribution leads to at least two severe problems. First, the complexity becomes unmanageable if one tries to impose a centralized control upon the computer model of the "real" world, that is naturally distributed. Second, if at all possible, the centralized control of ubiquity would be prohibitively expensive in terms of performance. We argue that the paradigm of ubiquity should be replaced by object autonomy in a distributed, persistent environment. The objects have built-in control over many important aspects that were previously controlled centrally: the life cycle, the cooperation control, and the distribution control. We describe the functionality of such an autonomous object model in metaphorical terms, concentrating on internal object aspects, inter-object communication and distributed infrastructure. We ...
The deciding factor: Big data & decision making
  • Capgemini
Capgemini, "The deciding factor: Big data & decision making," 2012.
Why un-silo-ing your data will boost your company's efficiency and productivity
  • A Rassa
A. Rassa, "Why un-silo-ing your data will boost your company's efficiency and productivity," 2017.
  • S Schrecker
  • H Soroush
  • J Molina
  • J Caldwell
  • D Meltzer
  • F Hirsch
  • J P Leblanc
  • M Buchheit
  • A Ginter
  • R Martin
  • H Banavara
  • S Eswarahally
  • K Raman
  • A King
  • Q Zhang
  • P Mackay
  • B Witten
S. Schrecker, H. Soroush, J. Molina, J. Caldwell, D. Meltzer, F. Hirsch, J. P. Leblanc, M. Buchheit, A. Ginter, R. Martin, H. Banavara, S. Eswarahally, K. Raman, A. King, Q. Zhang, P. MacKay, and B. Witten, "Industrial internet of things volume g4: Security framework: Iic:pub:g4:v1.0:pb:20160926," 2016.
It vs. ot für das industrielle internet -zwei seiten einer medaille?
  • L Lachance
L. Lachance, "It vs. ot für das industrielle internet -zwei seiten einer medaille?," 2016.
The data of things: How edge analytics and iot go hand in hand
  • G Lenz
G. Lenz, "The data of things: How edge analytics and iot go hand in hand," 2015.
Edge analytics -the pros and cons of immediate, local insight
  • Z Javeed
Z. Javeed, "Edge analytics -the pros and cons of immediate, local insight," 2018.
Autonomy and foreign language learning: Prepared for the Council of Europe. Council of Europe Modern Languages Project
  • H Holec
H. Holec, Autonomy and foreign language learning: Prepared for the Council of Europe. Council of Europe Modern Languages Project, Oxford: Pergamon Press, 1981.
Glossary of key information security terms: NISTIR 7298 Revision 2. National Institute of Standards and Technology
  • R Kissel
R. Kissel, Glossary of key information security terms: NISTIR 7298 Revision 2. National Institute of Standards and Technology, 2013.
Distributed ledger definition & demarcation
  • D Burkhardt
  • M Werling
  • H Lasi
D. Burkhardt, M. Werling, and H. Lasi, "Distributed ledger definition & demarcation," IEEE (submitted: Feb. 2018), 2018.
Understanding the blockchain using enterprise ontology
  • J Kruijff
  • H Weigand
J. Kruijff and H. Weigand, "Understanding the blockchain using enterprise ontology," in Advanced Information Systems Engineering (E. Dubois and K. Pohl, eds.), vol. 10253 of Lecture Notes in Computer Science, pp. 29-43, Cham: Springer-Verlag New York Inc, 2017.
Einführung in das reinforcement learning
  • P Dammann
P. Dammann, "Einführung in das reinforcement learning,"
Machine learning: Validation techniques
  • K Ajitesh
K. Ajitesh, "Machine learning: Validation techniques," 2018.
of Frontiers in artificial intelligence and applications
  • I Maglogiannis
  • K Karpouzis
  • M Wallace
I. Maglogiannis, K. Karpouzis, and M. Wallace, eds., Emerging artificial intelligence applications in computer engineering: Real word AI systems with applications in eHealth, HCI, information retrieval and pervasive technologies, vol. 160 of Frontiers in artificial intelligence and applications. Amsterdam: IOS Press, 2007.
Blockchain for business: Next-generation enterprise artificial intelligence systems
  • M Swan
M. Swan, "Blockchain for business: Next-generation enterprise artificial intelligence systems," Advances in Computers, Elsevier, 2018.
Decentralized artificial intelligence and autonomous bots (auto-bots) in distributed ledger/blockchain networks: Towards decentralized and localized operations using software agents (bots) in distributed ledgers/ blockchain
  • M G Ribeiro
M. G. Ribeiro, "Decentralized artificial intelligence and autonomous bots (auto-bots) in distributed ledger/blockchain networks: Towards decentralized and localized operations using software agents (bots) in distributed ledgers/ blockchain," 2018.
Blockchain potential to transform artificial intelligence
  • R Van Loon
R. van Loon, "Blockchain potential to transform artificial intelligence," 2018.
Artificial intelligence and blockchain: 3 major benefits of combining these two mega-trends
  • B Marr
B. Marr, "Artificial intelligence and blockchain: 3 major benefits of combining these two mega-trends," 2018.
Xain: Practical proof of kernel work & distributed adaptiveness a resilient & scalable blockchain platform for dynamic low-energy networks
  • L N Lundbaek
  • D J Beutel
  • M Huth
  • S Jackson
  • L Kirk
  • S Schwerin
L. N. Lundbaek, D. J. Beutel, M. Huth, S. Jackson, L. Kirk, and S. Schwerin, "Xain: Practical proof of kernel work & distributed adaptiveness a resilient & scalable blockchain platform for dynamic low-energy networks," no. v 1.2, 2017.