{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:15:52Z","timestamp":1730200552511,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/bloc.2019.8751387","type":"proceedings-article","created":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T23:44:06Z","timestamp":1562024646000},"page":"277-284","source":"Crossref","is-referenced-by-count":4,"title":["A Scalable Blockchain Approach for Trusted Computation and Verifiable Simulation in Multi-Party Collaborations"],"prefix":"10.1109","author":[{"given":"Ravi Kiran","family":"Raman","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Roman","family":"Vaculin","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Michael","family":"Hind","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Sekou L.","family":"Remy","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Eleftheria K.","family":"Pissadaki","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Nelson Kibichii","family":"Bore","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Roozbeh","family":"Daneshvar","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Biplav","family":"Srivastava","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Kush R.","family":"Varshney","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.806235"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/18.75242"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.1999.755649"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9892.1980.tb00297.x"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177705673"},{"key":"ref10","article-title":"Deep reinforcement learning that matters","author":"henderson","year":"2017","journal-title":"arXiv 1709 06560v2 [cs LG]"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2458-14-1144"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45547-7"},{"journal-title":"Formalising trust as a computational concept","year":"1994","author":"marsh","key":"ref13"},{"key":"ref14","first-page":"49","article-title":"Trust as a commodity","volume":"4","author":"dasgupta","year":"2000","journal-title":"Trust Making and Breaking Cooperative Relations"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888904000116"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1467247.1467267"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/BF00195207"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2641562"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-1460-5","author":"parno","year":"2011","journal-title":"Bootstrapping Trust in Modern Computers"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437335"},{"key":"ref4","article-title":"Novel exploration techniques (NETs) for malaria policy interventions","author":"bent","year":"2018","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2018.8503089"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2196\/resprot.4995"},{"key":"ref6","article-title":"The operation of non-governmental organizations (ngos) in a world of corporate and other codes of conduct","author":"nelson","year":"2007","journal-title":"Corporate Social Responsibility Initiative"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3055518.3055526"},{"key":"ref5","article-title":"Reshaping the use of digital tools to fight malaria","author":"remy","year":"2018","journal-title":"arXiv 1805 05418 [cs CY]"},{"key":"ref8","article-title":"Distributed AI and security issues in federated environments","author":"verma","year":"2018","journal-title":"Proc Workshop Program 19th Int Conf Distrib Comput Netw ser Workshops ICDCN &#x2019;18"},{"key":"ref7","article-title":"Decision provenance: Capturing data flow for accountable systems","author":"singh","year":"2018","journal-title":"arXiv 1804 05741 [cs CY]"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/S0031182008000371"},{"key":"ref9","article-title":"State of the art: Reproducibility in artificial intelligence","author":"gundersen","year":"2018","journal-title":"Proc 32nd AAAI Conf Artif Intell"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/12460125.2016.1171610"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/978-3-662-53357-4_8","article-title":"On scaling decentralized blockchains","volume":"9604","author":"croman","year":"2016","journal-title":"Financial Cryptography and Data Security Ser Lecture Notes in Computer Science"},{"journal-title":"Blockchain Revolution How The Technology Behind Bitcoin Is Changing Money Business And The World","year":"2016","author":"tapscott","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref24","article-title":"Transform blockchain into distributed parallel computing architecture for precision medicine","author":"tsai","year":"2018","journal-title":"2018 IEEE 38th Int Conf Distrib Comput Systems (ICDCS)"},{"key":"ref23","first-page":"118","article-title":"The truth about blockchain","volume":"95","author":"iansiti","year":"2017","journal-title":"Harvard Bus Rev"},{"journal-title":"2018 Blockchain scaling > all else","year":"2018","author":"koticha","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1101\/gr.207464.116"}],"event":{"name":"2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","start":{"date-parts":[[2019,5,14]]},"location":"Seoul, Korea (South)","end":{"date-parts":[[2019,5,17]]}},"container-title":["2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8744142\/8751228\/08751387.pdf?arnumber=8751387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T17:46:06Z","timestamp":1724953566000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8751387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/bloc.2019.8751387","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}