@Article{DagRep.2.1, title = {{Dagstuhl Reports, Volume 2, Issue 1, January 2012, Complete Issue}}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {1}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.1}, URN = {urn:nbn:de:0030-drops-35056}, doi = {10.4230/DagRep.2.1}, annote = {Keywords: Dagstuhl Reports, Volume 2, Issue 1, January 2012, Complete Issue} } @Article{DagRep.2.1.i, title = {{Dagstuhl Reports, Table of Contents, Volume 2, Issue 1, 2012}}, pages = {i--ii}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {1}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.1.i}, URN = {urn:nbn:de:0030-drops-35041}, doi = {10.4230/DagRep.2.1.i}, annote = {Keywords: Table of Contents, Frontmatter} } @Article{hirschfeld_et_al:DagRep.2.1.1, author = {Hirschfeld, Robert and Krishnamurthi, Shriram and Vitek, Jan}, title = {{Foundations for Scripting Languages (Dagstuhl Seminar 12011)}}, pages = {1--18}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {1}, editor = {Hirschfeld, Robert and Krishnamurthi, Shriram and Vitek, Jan}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.1.1}, URN = {urn:nbn:de:0030-drops-34545}, doi = {10.4230/DagRep.2.1.1}, annote = {Keywords: scripting languages, programming languages semantics, type systems, verification techniques, security analyses, scalability, rapid software} } @Article{becher_et_al:DagRep.2.1.19, author = {Becher, Veronica and Bienvenu, Laurent and Downey, Rodney and Mayordomo, Elvira}, title = {{Computability, Complexity and Randomness (Dagstuhl Seminar 12021)}}, pages = {19--38}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {1}, editor = {Becher, Veronica and Bienvenu, Laurent and Downey, Rodney and Mayordomo, Elvira}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.1.19}, URN = {urn:nbn:de:0030-drops-34555}, doi = {10.4230/DagRep.2.1.19}, annote = {Keywords: algorithmic randomness, computability theory, computationl complexity, Kolmogorov complexity, algorithmic information theory} } @Article{armknecht_et_al:DagRep.2.1.39, author = {Armknecht, Frederik and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, title = {{Symmetric Cryptography (Dagstuhl Seminar 12031)}}, pages = {39--49}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {1}, editor = {Armknecht, Frederik and Lucks, Stefan and Preneel, Bart and Rogaway, Phillip}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.1.39}, URN = {urn:nbn:de:0030-drops-34569}, doi = {10.4230/DagRep.2.1.39}, annote = {Keywords: Hash functions, Feistel networks, BLAKE, KLEIN, Keccak, IDEA, GCM, EAXprime, TLS, KISS} } @Article{greco_et_al:DagRep.2.1.50, author = {Greco, Salvatore and Knowles, Joshua D. and Miettinen, Kaisa and Zitzler, Eckart}, title = {{Learning in Multiobjective Optimization (Dagstuhl Seminar 12041)}}, pages = {50--99}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {1}, editor = {Greco, Salvatore and Knowles, Joshua D. and Miettinen, Kaisa and Zitzler, Eckart}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.1.50}, URN = {urn:nbn:de:0030-drops-34575}, doi = {10.4230/DagRep.2.1.50}, annote = {Keywords: multiple criteria decision making, evolutionary multiobjective optimization} } @Article{king_et_al:DagRep.2.1.100, author = {King, Andy M. and Mycroft, Alan and Reps, Thomas W. and Simon, Axel}, title = {{Analysis of Executables: Benefits and Challenges (Dagstuhl Seminar 12051)}}, pages = {100--116}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {1}, editor = {King, Andy M. and Mycroft, Alan and Reps, Thomas W. and Simon, Axel}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.1.100}, URN = {urn:nbn:de:0030-drops-34585}, doi = {10.4230/DagRep.2.1.100}, annote = {Keywords: Executable analysis, reverse engineering, malware detection, control flow reconstruction, emulators, binary instrumentation} }
The metadata provided by Dagstuhl Publishing on its webpages, as well as their export formats (such as XML or BibTeX) available at our website, is released under the CC0 1.0 Public Domain Dedication license. That is, you are free to copy, distribute, use, modify, transform, build upon, and produce derived works from our data, even for commercial purposes, all without asking permission. Of course, we are always happy if you provide a link to us as the source of the data.
Read the full CC0 1.0 legal code for the exact terms that apply: https://creativecommons.org/publicdomain/zero/1.0/legalcode
Feedback for Dagstuhl Publishing