<h2>Dagstuhl Reports, Volume 13, Issue 10, </h2> <ul> <li> <span class="title">Dagstuhl Reports, Volume 13, Issue 10, October 2023, Complete Issue</span> <a class="doi" href="https://doi.org/10.4230/DagRep.13.10">10.4230/DagRep.13.10</a> </li> <li> <span class="title">Dagstuhl Reports, Table of Contents, Volume 13, Issue 10, 2023</span> <a class="doi" href="https://doi.org/10.4230/DagRep.13.10.i">10.4230/DagRep.13.10.i</a> </li> <li> <span class="authors">Andrej Bauer, Katja Berčič, Florian Rabe, Nicolas Thiéry, and Jure Taslak</span> <span class="title">Automated mathematics: integrating proofs, algorithms and data (Dagstuhl Seminar 23401)</span> <a class="doi" href="https://doi.org/10.4230/DagRep.13.10.1">10.4230/DagRep.13.10.1</a> </li> <li> <span class="authors">Bettina Könighofer, Joshua A. Kroll, Ruzica Piskac, Michael Veale, and Filip Cano Córdoba</span> <span class="title">Accountable Software Systems (Dagstuhl Seminar 23411)</span> <a class="doi" href="https://doi.org/10.4230/DagRep.13.10.24">10.4230/DagRep.13.10.24</a> </li> <li> <span class="authors">Ori Lahav, Azalea Raad, Joseph Tassarotti, Viktor Vafeiadis, and Anton Podkopaev</span> <span class="title">Formal Methods for Correct Persistent Programming (Dagstuhl Seminar 23412)</span> <a class="doi" href="https://doi.org/10.4230/DagRep.13.10.50">10.4230/DagRep.13.10.50</a> </li> <li> <span class="authors">Gorjan Alagic, Maria Naya-Plasencia, Rainer Steinwandt, and Manasi Shingane</span> <span class="title">Quantum Cryptanalysis (Dagstuhl Seminar 23421)</span> <a class="doi" href="https://doi.org/10.4230/DagRep.13.10.65">10.4230/DagRep.13.10.65</a> </li> <li> <span class="authors">Jason Li, Debmalya Panigrahi, Laura Sanita, and Thatchaphol Saranurak</span> <span class="title">Graph Algorithms: Cuts, Flows, and Network Design (Dagstuhl Seminar 23422)</span> <a class="doi" href="https://doi.org/10.4230/DagRep.13.10.76">10.4230/DagRep.13.10.76</a> </li> <li> <span class="authors">Sven Dietrich, Frank Kargl, Hartmut König, Pavel Laskov, and Artur Hermann</span> <span class="title">Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431)</span> <a class="doi" href="https://doi.org/10.4230/DagRep.13.10.90">10.4230/DagRep.13.10.90</a> </li> <li> <span class="authors">Aaron Ding, Eyal de Lara, Schahram Dustdar, Ella Peltonen, and Tobias Meuser</span> <span class="title">Edge-AI: Identifying Key Enablers in Edge Intelligence (Dagstuhl Seminar 23432)</span> <a class="doi" href="https://doi.org/10.4230/DagRep.13.10.130">10.4230/DagRep.13.10.130</a> </li> <li> <span class="authors">Hannes Mühleisen, Danica Porobic, and Manuel Rigger</span> <span class="title">Ensuring the Reliability and Robustness of Database Management Systems (Dagstuhl Seminar 23441)</span> <a class="doi" href="https://doi.org/10.4230/DagRep.13.10.139">10.4230/DagRep.13.10.139</a> </li> <li> <span class="authors">Luc De Raedt, Ute Schmid, and Johannes Langer</span> <span class="title">Approaches and Applications of Inductive Programming (Dagstuhl Seminar 23442)</span> <a class="doi" href="https://doi.org/10.4230/DagRep.13.10.182">10.4230/DagRep.13.10.182</a> </li> </ul>
The metadata provided by Dagstuhl Publishing on its webpages, as well as their export formats (such as XML or BibTeX) available at our website, is released under the CC0 1.0 Public Domain Dedication license. That is, you are free to copy, distribute, use, modify, transform, build upon, and produce derived works from our data, even for commercial purposes, all without asking permission. Of course, we are always happy if you provide a link to us as the source of the data.
Read the full CC0 1.0 legal code for the exact terms that apply: https://creativecommons.org/publicdomain/zero/1.0/legalcode
Feedback for Dagstuhl Publishing