Published in: Dagstuhl Reports, Volume 8, Issue 11 (2019)
Rainer Böhme, Joseph Bonneau, and Ittay Eyal. Blockchain Security at Scale (Dagstuhl Seminar 18461). In Dagstuhl Reports, Volume 8, Issue 11, pp. 21-34, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2019)
@Article{bohme_et_al:DagRep.8.11.21, author = {B\"{o}hme, Rainer and Bonneau, Joseph and Eyal, Ittay}, title = {{Blockchain Security at Scale (Dagstuhl Seminar 18461)}}, pages = {21--34}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2019}, volume = {8}, number = {11}, editor = {B\"{o}hme, Rainer and Bonneau, Joseph and Eyal, Ittay}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.8.11.21}, URN = {urn:nbn:de:0030-drops-103542}, doi = {10.4230/DagRep.8.11.21}, annote = {Keywords: Blockchain, Consensus, Cryptography, Distributed Systems, Game Theory, Scaling} }
Published in: Dagstuhl Seminar Proceedings, Volume 9091, Formal Methods in Molecular Biology (2009)
Federica Ciocchetta, Andrea Degasperi, John Heath, and Jane Hillston. Modelling and analysis of the NF-$kappa$B pathway in Bio-PEPA. In Formal Methods in Molecular Biology. Dagstuhl Seminar Proceedings, Volume 9091, pp. 1-18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{ciocchetta_et_al:DagSemProc.09091.5, author = {Ciocchetta, Federica and Degasperi, Andrea and Heath, John and Hillston, Jane}, title = {{Modelling and analysis of the NF-\$kappa\$B pathway in Bio-PEPA}}, booktitle = {Formal Methods in Molecular Biology}, pages = {1--18}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9091}, editor = {Rainer Breitling and David Roger Gilbert and Monika Heiner and Corrado Priami}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.09091.5}, URN = {urn:nbn:de:0030-drops-19911}, doi = {10.4230/DagSemProc.09091.5}, annote = {Keywords: Process algebras, NF-\$kappa\$B pathway, modelling, analysis} }
Published in: Dagstuhl Seminar Proceedings, Volume 6301, Duplication, Redundancy, and Similarity in Software (2007)
Andrew Walenstein, James R. Cordy, William S. Evans, Ahmed Hassan, Toshihiro Kamiya, Cory Kapser, and Ettore Merlo. 06301 Working Session Summary: Presentation and Visualization of Redundant Code. In Duplication, Redundancy, and Similarity in Software. Dagstuhl Seminar Proceedings, Volume 6301, pp. 1-5, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{walenstein_et_al:DagSemProc.06301.3, author = {Walenstein, Andrew and Cordy, James R. and Evans, William S. and Hassan, Ahmed and Kamiya, Toshihiro and Kapser, Cory and Merlo, Ettore}, title = {{06301 Working Session Summary: Presentation and Visualization of Redundant Code}}, booktitle = {Duplication, Redundancy, and Similarity in Software}, pages = {1--5}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {6301}, editor = {Rainer Koschke and Ettore Merlo and Andrew Walenstein}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.06301.3}, URN = {urn:nbn:de:0030-drops-9661}, doi = {10.4230/DagSemProc.06301.3}, annote = {Keywords: Code clone, clone visualization, presentation, software visualization} }
Feedback for Dagstuhl Publishing