Skip to main content

Showing 1–6 of 6 results for author: Slaats, T

Searching in archive cs. Search in all archives.
.
  1. A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance

    Authors: Yibin Xu, **gyi Zheng, Boris Düdder, Tijs Slaats, Yongluan Zhou

    Abstract: Sharding is essential for improving blockchain scalability. Existing protocols overlook diverse adversarial attacks, limiting transaction throughput. This paper presents Reticulum, a groundbreaking sharding protocol addressing this issue, boosting blockchain scalability. Reticulum employs a two-phase approach, adapting transaction throughput based on runtime adversarial attacks. It comprises "co… ▽ More

    Submitted 30 June, 2024; v1 submitted 17 October, 2023; originally announced October 2023.

    Comments: The paper has been accepted to Network and Distributed System Security (NDSS) Symposium 2024

    Journal ref: Network and Distributed System Security (NDSS) Symposium 2024

  2. arXiv:2211.08695  [pdf, other

    cs.SE

    Distributed and Adversarial Resistant Workflow Execution on the Algorand Blockchain

    Authors: Yibin Xu, Tijs Slaats, Boris Düdder, Søren Debois, Haiqin Wu

    Abstract: We provide a practical translation from the Dynamic Condition Response (DCR) process modelling language to the Transaction Execution Approval Language (TEAL) used by the Algorand blockchain. Compared to earlier implementations of business process notations on blockchains, particularly Ethereum, the present implementation is four orders of magnitude cheaper. This translation has the following immed… ▽ More

    Submitted 16 November, 2022; originally announced November 2022.

    Journal ref: 6th Workshop on Trusted Smart Contracts, 2022

  3. arXiv:2005.10085  [pdf, other

    cs.LG cs.FL cs.SE stat.ML

    DisCoveR: Accurate & Efficient Discovery of Declarative Process Models

    Authors: Christoffer Olling Back, Tijs Slaats, Thomas Troels Hildebrandt, Morten Marquard

    Abstract: Declarative process modeling formalisms - which capture high-level process constraints - have seen growing interest, especially for modeling flexible processes. This paper presents DisCoveR, an extremely efficient and accurate declarative miner for learning Dynamic Condition Response (DCR) Graphs from event logs. We precisely formalize the algorithm, describe a highly efficient bit vector implemen… ▽ More

    Submitted 20 May, 2020; originally announced May 2020.

    Comments: Author's original version

  4. arXiv:2004.04798   

    cs.DC cs.CR

    A $p/2$ Adversary Power Resistant Blockchain Sharding Approach

    Authors: Yibin Xu, Jianhua Shao, Yangyu Huang, Tijs Slaats, Boris Düdder

    Abstract: Blockchain Sharding is a blockchain performance enhancement approach. By splitting a blockchain into several parallel-run committees (shards), it helps increase transaction throughput, reduce computational resources required, and increase reward expectation for participants. Recently, several flexible sharding methods that can tolerate up to $n/2$ Byzantine nodes ($n/2$ security level) have been p… ▽ More

    Submitted 2 February, 2023; v1 submitted 9 April, 2020; originally announced April 2020.

    Comments: Uncompleted work and contain errors

  5. arXiv:1704.03610  [pdf, other

    cs.SE

    Blockchains for Business Process Management - Challenges and Opportunities

    Authors: Jan Mendling, Ingo Weber, Wil van der Aalst, Jan vom Brocke, Cristina Cabanillas, Florian Daniel, Soren Debois, Claudio Di Ciccio, Marlon Dumas, Schahram Dustdar, Avigdor Gal, Luciano Garcia-Banuelos, Guido Governatori, Richard Hull, Marcello La Rosa, Henrik Leopold, Frank Leymann, Jan Recker, Manfred Reichert, Hajo A. Reijers, Stefanie Rinderle-Ma, Andreas Rogge-Solti, Michael Rosemann, Stefan Schulte, Munindar P. Singh , et al. (7 additional authors not shown)

    Abstract: Blockchain technology promises a sizable potential for executing inter-organizational business processes without requiring a central party serving as a single point of trust (and failure). This paper analyzes its impact on business process management (BPM). We structure the discussion using two BPM frameworks, namely the six BPM core capabilities and the BPM lifecycle. This paper provides research… ▽ More

    Submitted 31 January, 2018; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: Preprint for ACM TMIS

  6. Type-checking Liveness for Collaborative Processes with Bounded and Unbounded Recursion

    Authors: Søren Debois, Thomas Hildebrandt, Tijs Slaats, Nobuko Yoshida

    Abstract: We present the first session ty** system guaranteeing request-response liveness properties for possibly non-terminating communicating processes. The types augment the branch and select types of the standard binary session types with a set of required responses, indicating that whenever a particular label is selected, a set of other labels, its responses, must eventually also be selected. We pro… ▽ More

    Submitted 5 January, 2016; v1 submitted 22 October, 2015; originally announced October 2015.

    Comments: Accepted for publication in Logical Methods in Computer Science

    Journal ref: Logical Methods in Computer Science, Volume 12, Issue 1 (January 6, 2016) lmcs:1624