Dagstuhl Reports, Volume 2, Issue 2, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{DagRep.2.2, title = {{Dagstuhl Reports, Volume 2, Issue 2, February 2012, Complete Issue}}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {2}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.2}, URN = {urn:nbn:de:0030-drops-35347}, doi = {10.4230/DagRep.2.2}, annote = {Keywords: Dagstuhl Reports, Volume 2, Issue 2, February 2012, Complete Issue} }
Dagstuhl Reports, Volume 2, Issue 2, pp. i-ii, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{DagRep.2.2.i, title = {{Dagstuhl Reports, Table of Contents, Volume 2, Issue 2, 2012}}, pages = {i--ii}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {2}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.2.i}, URN = {urn:nbn:de:0030-drops-35335}, doi = {10.4230/DagRep.2.2.i}, annote = {Keywords: Table of Contents, Frontmatter} }
Georg Carle, Hervé Debar, Falko Dressler, and Hartmut König. Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061). In Dagstuhl Reports, Volume 2, Issue 2, pp. 1-20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{carle_et_al:DagRep.2.2.1, author = {Carle, Georg and Debar, Herv\'{e} and Dressler, Falko and K\"{o}nig, Hartmut}, title = {{Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061)}}, pages = {1--20}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {2}, editor = {Carle, Georg and Debar, Herv\'{e} and Dressler, Falko and K\"{o}nig, Hartmut}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.2.1}, URN = {urn:nbn:de:0030-drops-34761}, doi = {10.4230/DagRep.2.2.1}, annote = {Keywords: early warning systems, critical infrastructure protection, botnets, intrusion detection, malware assessment, vulnerability analysis, network monitoring, flow analysis, denial-of-service detection and response, event correlation, attack response and countermeasures} }
Rainer Koschke, Ira D. Baxter, Michael Conradt, and James R. Cordy. Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071). In Dagstuhl Reports, Volume 2, Issue 2, pp. 21-57, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{koschke_et_al:DagRep.2.2.21, author = {Koschke, Rainer and Baxter, Ira D. and Conradt, Michael and Cordy, James R.}, title = {{Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071)}}, pages = {21--57}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {2}, editor = {Koschke, Rainer and Baxter, Ira D. and Conradt, Michael and Cordy, James R.}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.2.21}, URN = {urn:nbn:de:0030-drops-34775}, doi = {10.4230/DagRep.2.2.21}, annote = {Keywords: Software clones, code redundancy, clone detection, redundancy removal, software refactoring, software reengineering, plagiarism detection, copyright infringement, source differencing} }
Daniel A. Keim, Fabrice Rossi, Thomas Seidl, Michel Verleysen, and Stefan Wrobel. Information Visualization, Visual Data Mining and Machine Learning (Dagstuhl Seminar 12081). In Dagstuhl Reports, Volume 2, Issue 2, pp. 58-83, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{keim_et_al:DagRep.2.2.58, author = {Keim, Daniel A. and Rossi, Fabrice and Seidl, Thomas and Verleysen, Michel and Wrobel, Stefan}, title = {{Information Visualization, Visual Data Mining and Machine Learning (Dagstuhl Seminar 12081)}}, pages = {58--83}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {2}, editor = {Keim, Daniel A. and Rossi, Fabrice and Seidl, Thomas and Verleysen, Michel and Wrobel, Stefan}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.2.58}, URN = {urn:nbn:de:0030-drops-35064}, doi = {10.4230/DagRep.2.2.58}, annote = {Keywords: Information visualization, visual data mining, machine learning, nonlinear dimensionality reduction, exploratory data analysis} }
James Cheney, Anthony Finkelstein, Bertram Ludaescher, and Stijn Vansummeren. Principles of Provenance (Dagstuhl Seminar 12091). In Dagstuhl Reports, Volume 2, Issue 2, pp. 84-113, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{cheney_et_al:DagRep.2.2.84, author = {Cheney, James and Finkelstein, Anthony and Ludaescher, Bertram and Vansummeren, Stijn}, title = {{Principles of Provenance (Dagstuhl Seminar 12091)}}, pages = {84--113}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {2}, number = {2}, editor = {Cheney, James and Finkelstein, Anthony and Ludaescher, Bertram and Vansummeren, Stijn}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.2.84}, URN = {urn:nbn:de:0030-drops-35073}, doi = {10.4230/DagRep.2.2.84}, annote = {Keywords: Provenance, Lineage, Metadata, Trust, Repeatability, Accountability} }
Feedback for Dagstuhl Publishing