@Article{DagRep.1.9, title = {{Dagstuhl Reports, Volume 1, Issue 9, September 2011, Complete Issue}}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {1}, number = {9}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.9}, URN = {urn:nbn:de:0030-drops-33710}, doi = {10.4230/DagRep.1.9}, annote = {Keywords: Dagstuhl Reports, Volume 1, Issue 9, September 2011, Complete Issue} } @Article{DagRep.1.9.i, title = {{Dagstuhl Reports, Table of Contents, Volume 1, Issue 9, 2011}}, pages = {i--ii}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {1}, number = {9}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.9.i}, URN = {urn:nbn:de:0030-drops-33707}, doi = {10.4230/DagRep.1.9.i}, annote = {Keywords: Table of Contents, Frontmatter} } @Article{schneider_et_al:DagRep.1.9.1, author = {Schneider, Markus and Vossen, Gottfried and Zim\'{a}nyi, Esteban}, title = {{Data Warehousing: from Occasional OLAP to Real-time Business Intelligence (Dagstuhl Seminar 11361)}}, pages = {1--25}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2011}, volume = {1}, number = {9}, editor = {Schneider, Markus and Vossen, Gottfried and Zim\'{a}nyi, Esteban}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.9.1}, URN = {urn:nbn:de:0030-drops-33178}, doi = {10.4230/DagRep.1.9.1}, annote = {Keywords: Business Intelligence, Data Warehouses, OLAP, Spatio-temporal information, ETL, Service Orientation, Query optimization} } @Article{elishakoff_et_al:DagRep.1.9.26, author = {Elishakoff, Isaac E. and Kreinovich, Vladik and Luther, Wolfram and Popova, Evgenija D.}, title = {{Uncertainty modeling and analysis with intervals: Foundations, tools, applications (Dagstuhl Seminar 11371)}}, pages = {26--57}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2011}, volume = {1}, number = {9}, editor = {Elishakoff, Isaac E. and Kreinovich, Vladik and Luther, Wolfram and Popova, Evgenija D.}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.9.26}, URN = {urn:nbn:de:0030-drops-33181}, doi = {10.4230/DagRep.1.9.26}, annote = {Keywords: Uncertainty modeling, Interval arithmetic, Imprecise probabilities, Sensitivity analysis, mechatronics, bioinformatics and finance} } @Article{fehr_et_al:DagRep.1.9.58, author = {Fehr, Serge and Mosca, Michele and R\"{o}tteler, Martin and Steinwandt, Rainer}, title = {{Quantum Cryptanalysis (Dagstuhl Seminar 11381)}}, pages = {58--75}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2011}, volume = {1}, number = {9}, editor = {Fehr, Serge and Mosca, Michele and R\"{o}tteler, Martin and Steinwandt, Rainer}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.9.58}, URN = {urn:nbn:de:0030-drops-33675}, doi = {10.4230/DagRep.1.9.58}, annote = {Keywords: Security of cryptographic schemes, quantum algorithms, computational hardness assumptions} } @Article{fischlin_et_al:DagRep.1.9.76, author = {Fischlin, Marc and Lysyanskaya, Anna and Maurer, Ueli and May, Alexander}, title = {{Public-Key Cryptography (Dagstuhl Seminar 11391)}}, pages = {76--94}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {1}, number = {9}, editor = {Fischlin, Marc and Lysyanskaya, Anna and Maurer, Ueli and May, Alexander}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.9.76}, URN = {urn:nbn:de:0030-drops-33685}, doi = {10.4230/DagRep.1.9.76}, annote = {Keywords: Fully-Homomorphic Encryption, Leakage-Resilience, Constructive Cryptography} }