{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:25:09Z","timestamp":1743096309326,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030366902"},{"type":"electronic","value":"9783030366919"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36691-9_21","type":"book-chapter","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T22:02:52Z","timestamp":1576533772000},"page":"243-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing Transaction Fees with\u00a0Probabilistic Logic Programming"],"prefix":"10.1007","author":[{"given":"Damiano","family":"Azzolini","sequence":"first","affiliation":[]},{"given":"Fabrizio","family":"Riguzzi","sequence":"additional","affiliation":[]},{"given":"Evelina","family":"Lamma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,17]]},"reference":[{"issue":"1","key":"21_CR1","doi-asserted-by":"publisher","first-page":"47","DOI":"10.3233\/IA-170105","volume":"11","author":"M Alberti","year":"2017","unstructured":"Alberti, M., Bellodi, E., Cota, G., Riguzzi, F., Zese, R.: cplint on SWISH: probabilistic logical inference with a web browser. Intell. Artif. 11(1), 47\u201364 (2017). https:\/\/doi.org\/10.3233\/IA-170105","journal-title":"Intell. Artif."},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-319-49130-1_26","volume-title":"AI*IA 2016 Advances in Artificial Intelligence","author":"M Alberti","year":"2016","unstructured":"Alberti, M., Cota, G., Riguzzi, F., Zese, R.: Probabilistic logical inference on the web. In: Adorni, G., Cagnoni, S., Gori, M., Maratea, M. (eds.) AI*IA 2016. LNCS (LNAI), vol. 10037, pp. 351\u2013363. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49130-1_26"},{"key":"21_CR3","unstructured":"Azzolini, D., Riguzzi, F., Lamma, E., Bellodi, E., Zese, R.: Modeling bitcoin protocols with probabilistic logic programming. In: Bellodi, E., Schrijvers, T. (eds.) Proceedings of the 5th International Workshop on Probabilistic Logic Programming, PLP 2018, Co-located with the 28th International Conference on Inductive Logic Programming (ILP 2018), Ferrara, Italy, 1 September 2018, CEUR Workshop Proceedings, vol. 2219, pp. 49\u201361. CEUR-WS.org (2018). http:\/\/ceur-ws.org\/Vol-2219\/paper6.pdf"},{"key":"21_CR4","unstructured":"Basu, S., Easley, D., O\u2019Hara, M., Sirer, E.G.: Towards a functional fee market for cryptocurrencies. CoRR abs\/1901.06830 (2019). http:\/\/arxiv.org\/abs\/1901.06830"},{"key":"21_CR5","unstructured":"Bowden, R., Keeler, H.P., Krzesinski, A.E., Taylor, P.G.: Block arrivals in the bitcoin blockchain. CoRR abs\/1801.07447 (2018). http:\/\/arxiv.org\/abs\/1801.07447"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-642-21295-6_7","volume-title":"Inductive Logic Programming","author":"S Bragaglia","year":"2011","unstructured":"Bragaglia, S., Riguzzi, F.: Approximate inference for logic programs with annotated disjunctions. In: Frasconi, P., Lisi, F.A. (eds.) ILP 2010. LNCS (LNAI), vol. 6489, pp. 30\u201337. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21295-6_7"},{"key":"21_CR7","unstructured":"Buterin, V.: A next-generation smart contract and decentralized application platform (2014). https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper . Accessed 14 Feb 2019"},{"key":"21_CR8","unstructured":"Cardano. https:\/\/whycardano.com\/"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Carlsten, M., Kalodner, H., Weinberg, S.M., Narayanan, A.: On the instability of bitcoin without the block reward. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 154\u2013167. ACM (2016)","DOI":"10.1145\/2976749.2978408"},{"issue":"1","key":"21_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10994-015-5494-z","volume":"100","author":"L Raedt De","year":"2015","unstructured":"De Raedt, L., Kimmig, A.: Probabilistic (logic) programming concepts. Mach. Learn. 100(1), 5\u201347 (2015)","journal-title":"Mach. Learn."},{"key":"21_CR11","unstructured":"Eosio - an introduction by ian grigg. https:\/\/eos.io\/introduction"},{"key":"21_CR12","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning, vol. 1. MIT Press, Cambridge (2016)"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/3-540-38424-3_32","volume-title":"Advances in Cryptology-CRYPT0 1990","author":"S Haber","year":"1991","unstructured":"Haber, S., Stornetta, W.S.: How to time-stamp a digital document. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 437\u2013455. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-38424-3_32"},{"key":"21_CR14","unstructured":"Hyperledger. https:\/\/www.hyperledger.org\/"},{"key":"21_CR15","unstructured":"Kasahara, S., Kawahara, J.: Priority mechanism of bitcoin and its effect on transaction-confirmation process. CoRR abs\/1604.00103 (2016). http:\/\/arxiv.org\/abs\/1604.00103"},{"key":"21_CR16","series-title":"Adaptive Computation and Machine Learning","volume-title":"Probabilistic Graphical Models: Principles and Techniques","author":"D Koller","year":"2009","unstructured":"Koller, D., Friedman, N.: Probabilistic Graphical Models: Principles and Techniques. Adaptive Computation and Machine Learning. MIT Press, Cambridge (2009)"},{"key":"21_CR17","unstructured":"Koops, D.T.: Predicting the confirmation time of bitcoin transactions. CoRR abs\/1809.10596 (2018). http:\/\/arxiv.org\/abs\/1809.10596"},{"key":"21_CR18","unstructured":"Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of bitcoin mining, or bitcoin in the presence of adversaries. In: Proceedings of WEIS, vol. 2013, p. 11 (2013)"},{"key":"21_CR19","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"key":"21_CR20","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-319-69775-8_5","volume-title":"Towards Integrative Machine Learning and Knowledge Extraction","author":"AN Fadja","year":"2017","unstructured":"Fadja, A.N., Riguzzi, F.: Probabilistic logic programming in action. In: Holzinger, A., Goebel, R., Ferri, M., Palade, V. (eds.) Towards Integrative Machine Learning and Knowledge Extraction. LNCS (LNAI), vol. 10344, pp. 89\u2013116. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69775-8_5"},{"key":"21_CR21","unstructured":"Nitti, D.: Hybrid Probabilistic Logic Programming. Ph.D. thesis, KU Leuven (2106)"},{"key":"21_CR22","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.entcs.2016.12.006","volume":"329","author":"C Pinz\u00f3n","year":"2016","unstructured":"Pinz\u00f3n, C., Rocha, C.: Double-spend attack models with time advantange for bitcoin. Electr. Notes Theor. Comput. Sci. 329, 79\u2013103 (2016). https:\/\/doi.org\/10.1016\/j.entcs.2016.12.006","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"21_CR23","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network: Scalable off-chain instant payments (2016). https:\/\/lightning.network\/lightning-network-paper.pdf"},{"issue":"4","key":"21_CR24","doi-asserted-by":"publisher","first-page":"521","DOI":"10.3233\/FI-2013-847","volume":"124","author":"F Riguzzi","year":"2013","unstructured":"Riguzzi, F.: MCINTYRE: a Monte Carlo system for probabilistic logic programming. Fund. Inform. 124(4), 521\u2013541 (2013). https:\/\/doi.org\/10.3233\/FI-2013-847","journal-title":"Fund. Inform."},{"key":"21_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijar.2016.05.005","volume":"77","author":"F Riguzzi","year":"2016","unstructured":"Riguzzi, F.: The distribution semantics for normal programs with function symbols. Int. J. Approx. Reason. 77, 1\u201319 (2016). https:\/\/doi.org\/10.1016\/j.ijar.2016.05.005","journal-title":"Int. J. Approx. Reason."},{"key":"21_CR26","unstructured":"Riguzzi, F.: Foundations of Probabilistic Logic Programming. River Publishers, Gistrup (2018). http:\/\/www.riverpublishers.com\/book_details.php?book_id=660"},{"issue":"10","key":"21_CR27","doi-asserted-by":"publisher","first-page":"1381","DOI":"10.1002\/spe.2386","volume":"46","author":"F Riguzzi","year":"2016","unstructured":"Riguzzi, F., Bellodi, E., Lamma, E., Zese, R., Cota, G.: Probabilistic logic programming on the web. Softw.-Pract. Exp. 46(10), 1381\u20131396 (2016). https:\/\/doi.org\/10.1002\/spe.2386","journal-title":"Softw.-Pract. Exp."},{"key":"21_CR28","doi-asserted-by":"publisher","unstructured":"Riguzzi, F., Swift, T.: Tabling and answer subsumption for reasoning on logic programs with annotated disjunctions. In: ICLP TC 2010. LIPIcs, vol. 7, pp. 162\u2013171. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik (2010). https:\/\/doi.org\/10.4230\/LIPIcs.ICLP.2010.162","DOI":"10.4230\/LIPIcs.ICLP.2010.162"},{"issue":"4\u20135","key":"21_CR29","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1017\/S147106841100010X","volume":"11","author":"F Riguzzi","year":"2011","unstructured":"Riguzzi, F., Swift, T.: The PITA system: tabling and answer subsumption for reasoning under uncertainty. Theor. Pract. Log. Prog. 11(4\u20135), 433\u2013449 (2011). https:\/\/doi.org\/10.1017\/S147106841100010X","journal-title":"Theor. Pract. Log. Prog."},{"key":"21_CR30","unstructured":"Rosenfeld, M.: Analysis of hashrate-based double spending. CoRR abs\/1402.2009 (2014). http:\/\/arxiv.org\/abs\/1402.2009"},{"key":"21_CR31","doi-asserted-by":"crossref","unstructured":"Sato, T.: A statistical learning method for logic programs with distribution semantics. In: Sterling, L. (ed.) ICLP 1995, pp. 715\u2013729. MIT Press (1995)","DOI":"10.7551\/mitpress\/4298.003.0069"},{"key":"21_CR32","volume-title":"Blockchain: Blueprint for a New Economy","author":"M Swan","year":"2015","unstructured":"Swan, M.: Blockchain: Blueprint for a New Economy. O\u2019Reilly Media Inc., Newton (2015)"},{"key":"21_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-540-27775-0_30","volume-title":"Logic Programming","author":"J Vennekens","year":"2004","unstructured":"Vennekens, J., Verbaeten, S., Bruynooghe, M.: Logic programs with annotated disjunctions. In: Demoen, B., Lifschitz, V. (eds.) ICLP 2004. LNCS, vol. 3132, pp. 431\u2013445. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-27775-0_30"},{"key":"21_CR34","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Pap."}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36691-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,28]],"date-time":"2024-07-28T18:47:18Z","timestamp":1722192438000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36691-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030366902","9783030366919"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36691-9_21","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"17 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seville","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bis.ue.poznan.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"223","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"From the BIS workshops 57 papers were accepted from 139 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}