2019 International Conference on Information and Communication Technology Convergence (ICTC) 2019
DOI: 10.1109/ictc46691.2019.8939746
|View full text |Cite
|
Sign up to set email alerts
|

Techniques and Applications for Crawling, Ingesting and Analyzing Blockchain Data

Abstract: As the public Ethereum network surpasses half a billion transactions and enterprise Blockchain systems becoming highly capable of meeting the demands of global deployments, production Blockchain applications are fast becoming commonplace across a diverse range of business and scientific verticals. In this paper, we reflect on work we have been conducting recently surrounding the ingestion, retrieval and analysis of Blockchain data. We describe the scaling and semantic challenges when extracting Blockchain data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…This type of work often first needs to analyse the original data and then cluster, train the model through supervised learning or unsupervised learning, or a combination of the two, and then perform subsequent prediction work. Another example is the literature [59]. After describing the process of gaining and retrieving data, it discussed how to use two unsupervised machine learning algorithms to analyse the gained public chain data, found some outliers and smart contracts, and then compared the two machine learning methods cross-linked with public websites to illustrate the effectiveness of this method.…”
Section: Comparison and Discussionmentioning
confidence: 99%
“…This type of work often first needs to analyse the original data and then cluster, train the model through supervised learning or unsupervised learning, or a combination of the two, and then perform subsequent prediction work. Another example is the literature [59]. After describing the process of gaining and retrieving data, it discussed how to use two unsupervised machine learning algorithms to analyse the gained public chain data, found some outliers and smart contracts, and then compared the two machine learning methods cross-linked with public websites to illustrate the effectiveness of this method.…”
Section: Comparison and Discussionmentioning
confidence: 99%
“…For instance, in Ref. [68], after the process of obtaining and retrieving data is described, how to use two unsupervised machine learning algorithms to analyze the acquired common chain data was discussed, and some outliers and intelligent contracts were found. Then, they compared the effectiveness of this method by comparing the two machine learning methods and cross-linking them with public websites.…”
Section: Various Cryptocurrenciesmentioning
confidence: 99%
“…Similarly the approach in [28] tackles the problem by controlling how the logs are created and stored into the blockchain. Their focus is on science processes, similar to business processes in that they can be modeled as self-contained tasks with specific data dependency and execution logic.…”
Section: External Bpmss Datamentioning
confidence: 99%