BibTeX Export for Dagstuhl Reports, Volume 2, Issue 2

Copy to Clipboard Download

@Article{DagRep.2.2,
  title =	{{Dagstuhl Reports, Volume 2, Issue 2, February 2012, Complete Issue}},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{2},
  number =	{2},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.2},
  URN =		{urn:nbn:de:0030-drops-35347},
  doi =		{10.4230/DagRep.2.2},
  annote =	{Keywords: Dagstuhl Reports, Volume 2, Issue 2, February 2012, Complete Issue}
}
@Article{DagRep.2.2.i,
  title =	{{Dagstuhl Reports, Table of Contents, Volume 2, Issue 2, 2012}},
  pages =	{i--ii},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{2},
  number =	{2},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.2.i},
  URN =		{urn:nbn:de:0030-drops-35335},
  doi =		{10.4230/DagRep.2.2.i},
  annote =	{Keywords: Table of Contents, Frontmatter}
}
@Article{carle_et_al:DagRep.2.2.1,
  author =	{Carle, Georg and Debar, Herv\'{e} and Dressler, Falko and K\"{o}nig, Hartmut},
  title =	{{Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061)}},
  pages =	{1--20},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{2},
  number =	{2},
  editor =	{Carle, Georg and Debar, Herv\'{e} and Dressler, Falko and K\"{o}nig, Hartmut},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.2.1},
  URN =		{urn:nbn:de:0030-drops-34761},
  doi =		{10.4230/DagRep.2.2.1},
  annote =	{Keywords: early warning systems, critical infrastructure protection, botnets, intrusion detection, malware assessment, vulnerability analysis, network monitoring, flow analysis, denial-of-service detection and response, event correlation, attack response and countermeasures}
}
@Article{koschke_et_al:DagRep.2.2.21,
  author =	{Koschke, Rainer and Baxter, Ira D. and Conradt, Michael and Cordy, James R.},
  title =	{{Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071)}},
  pages =	{21--57},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{2},
  number =	{2},
  editor =	{Koschke, Rainer and Baxter, Ira D. and Conradt, Michael and Cordy, James R.},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.2.21},
  URN =		{urn:nbn:de:0030-drops-34775},
  doi =		{10.4230/DagRep.2.2.21},
  annote =	{Keywords: Software clones, code redundancy, clone detection, redundancy removal, software refactoring, software reengineering, plagiarism detection, copyright infringement, source differencing}
}
@Article{keim_et_al:DagRep.2.2.58,
  author =	{Keim, Daniel A. and Rossi, Fabrice and Seidl, Thomas and Verleysen, Michel and Wrobel, Stefan},
  title =	{{Information Visualization, Visual Data Mining and Machine Learning (Dagstuhl Seminar 12081)}},
  pages =	{58--83},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{2},
  number =	{2},
  editor =	{Keim, Daniel A. and Rossi, Fabrice and Seidl, Thomas and Verleysen, Michel and Wrobel, Stefan},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.2.58},
  URN =		{urn:nbn:de:0030-drops-35064},
  doi =		{10.4230/DagRep.2.2.58},
  annote =	{Keywords: Information visualization, visual data mining, machine learning, nonlinear dimensionality reduction, exploratory data analysis}
}
@Article{cheney_et_al:DagRep.2.2.84,
  author =	{Cheney, James and Finkelstein, Anthony and Ludaescher, Bertram and Vansummeren, Stijn},
  title =	{{Principles of Provenance (Dagstuhl Seminar 12091)}},
  pages =	{84--113},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{2},
  number =	{2},
  editor =	{Cheney, James and Finkelstein, Anthony and Ludaescher, Bertram and Vansummeren, Stijn},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.2.84},
  URN =		{urn:nbn:de:0030-drops-35073},
  doi =		{10.4230/DagRep.2.2.84},
  annote =	{Keywords: Provenance, Lineage, Metadata, Trust, Repeatability, Accountability}
}

The metadata provided by Dagstuhl Publishing on its webpages, as well as their export formats (such as XML or BibTeX) available at our website, is released under the CC0 1.0 Public Domain Dedication license. That is, you are free to copy, distribute, use, modify, transform, build upon, and produce derived works from our data, even for commercial purposes, all without asking permission. Of course, we are always happy if you provide a link to us as the source of the data.

Read the full CC0 1.0 legal code for the exact terms that apply: https://creativecommons.org/publicdomain/zero/1.0/legalcode

Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail