Issue

Dagstuhl Reports, Volume 2, Issue 9



Thumbnail PDF

Publication Details


Access Numbers

Documents

No documents found matching your filter selection.
Document
Complete Issue
Dagstuhl Reports, Volume 2, Issue 9, September 2012, Complete Issue

Abstract
Dagstuhl Reports, Volume 2, Issue 9, September 2012, Complete Issue

Cite as

Dagstuhl Reports, Volume 2, Issue 9, September 2012, Complete Issue. In Dagstuhl Reports, Volume 2, Issue 9, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{DagRep.2.9,
  title =	{{Dagstuhl Reports, Volume 2, Issue 9, September 2012, Complete Issue}},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{9},
  editor =	{},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.9},
  URN =		{urn:nbn:de:0030-drops-39752},
  doi =		{10.4230/DagRep.2.9},
  annote =	{Keywords: Dagstuhl Reports, Volume 2, Issue 9, September 2012, Complete Issue}
}
Document
Front Matter
Dagstuhl Reports, Table of Contents, Volume 2, Issue 9, 2012

Abstract
Table of Contents, Frontmatter

Cite as

Dagstuhl Reports, Table of Contents, Volume 2, Issue 9, 2012. In Dagstuhl Reports, Volume 2, Issue 9, pp. i-ii, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{DagRep.2.9.i,
  title =	{{Dagstuhl Reports, Table of Contents, Volume 2, Issue 9, 2012}},
  pages =	{i--ii},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{9},
  editor =	{},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.9.i},
  URN =		{urn:nbn:de:0030-drops-39745},
  doi =		{10.4230/DagRep.2.9.i},
  annote =	{Keywords: Dagstuhl Reports, Table of Contents, Volume 2, Issue 9, 2012}
}
Document
Information-centric networking -- Ready for the real world? (Dagstuhl Seminar 12361)

Authors: Ali Ghodsi, Börje Ohlman, Jörg Ott, Ignacio Solis, and Matthias Wählisch


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 12361 ``Information-centric networking -- Ready for the real world?''. The outcome of this seminar is based on individual talks, group work, and significant discussions among all participants. The topics range from application and performance aspects up to business, legal, and deployment questions. Even though significant progress is visible from the last Dagstuhl Seminar about ICN, there are still thrilling open research questions in all topic areas.

Cite as

Ali Ghodsi, Börje Ohlman, Jörg Ott, Ignacio Solis, and Matthias Wählisch. Information-centric networking -- Ready for the real world? (Dagstuhl Seminar 12361). In Dagstuhl Reports, Volume 2, Issue 9, pp. 1-14, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{ghodsi_et_al:DagRep.2.9.1,
  author =	{Ghodsi, Ali and Ohlman, B\"{o}rje and Ott, J\"{o}rg and Solis, Ignacio and W\"{a}hlisch, Matthias},
  title =	{{Information-centric networking -- Ready for the real world? (Dagstuhl Seminar 12361)}},
  pages =	{1--14},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{9},
  editor =	{Ghodsi, Ali and Ohlman, B\"{o}rje and Ott, J\"{o}rg and Solis, Ignacio and W\"{a}hlisch, Matthias},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.9.1},
  URN =		{urn:nbn:de:0030-drops-37877},
  doi =		{10.4230/DagRep.2.9.1},
  annote =	{Keywords: Information-centric, Network architecture, Application structure, Internet business models}
}
Document
The Multilingual Semantic Web (Dagstuhl Seminar 12362)

Authors: Paul Buitelaar, Key-Sun Choi, Philipp Cimiano, and Eduard H. Hovy


Abstract
This document constitutes a brief report from the Dagstuhl Seminar on the "Multilingual Semantic Web" which took place at Schloss Dagstuhl between September 3rd and 7th, 2012. The document states the motivation for the workshop as well as the main thematic focus. It describes the organization and structure of the seminar and briefly reports on the main topics of discussion and the main outcomes of the workshop.

Cite as

Paul Buitelaar, Key-Sun Choi, Philipp Cimiano, and Eduard H. Hovy. The Multilingual Semantic Web (Dagstuhl Seminar 12362). In Dagstuhl Reports, Volume 2, Issue 9, pp. 15-94, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{buitelaar_et_al:DagRep.2.9.15,
  author =	{Buitelaar, Paul and Choi, Key-Sun and Cimiano, Philipp and Hovy, Eduard H.},
  title =	{{The Multilingual Semantic Web (Dagstuhl Seminar 12362)}},
  pages =	{15--94},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{9},
  editor =	{Buitelaar, Paul and Choi, Key-Sun and Cimiano, Philipp and Hovy, Eduard H.},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.9.15},
  URN =		{urn:nbn:de:0030-drops-37883},
  doi =		{10.4230/DagRep.2.9.15},
  annote =	{Keywords: Semantic Web, Multilinguality, Natural Language Processing}
}
Document
Software Defined Networking (Dagstuhl Seminar 12363)

Authors: Pan Hui and Teemu Koponen


Abstract
This report documents the talks and discussions of Dagstuhl Seminar 12363 "Software Defined Networking". The presented talks represent a spectrum of industrial and academic work as well as both technical and organizational developments surrounding Software Defined Networking (SDN). The topic of SDN has garnered significant attention over the past few years in the networking community and beyond, and indeed the term "Software Defined Networking" itself carries different meaning among different circles. A key focus of the talks and discussions presented here is to capture the essence of SDN through concrete network applications, operational experience reports, and open research problems.

Cite as

Pan Hui and Teemu Koponen. Software Defined Networking (Dagstuhl Seminar 12363). In Dagstuhl Reports, Volume 2, Issue 9, pp. 95-108, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{hui_et_al:DagRep.2.9.95,
  author =	{Hui, Pan and Koponen, Teemu},
  title =	{{Software Defined Networking (Dagstuhl Seminar 12363)}},
  pages =	{95--108},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{9},
  editor =	{Hui, Pan and Koponen, Teemu},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.9.95},
  URN =		{urn:nbn:de:0030-drops-37895},
  doi =		{10.4230/DagRep.2.9.95},
  annote =	{Keywords: Software Defined Networking, Routing, Data centers, Network Abstractions}
}
Document
Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371)

Authors: Anthony D. Joseph, Pavel Laskov, Fabio Roli, J. Doug Tygar, and Blaine Nelson


Abstract
The study of learning in adversarial environments is an emerging discipline at the juncture between machine learning and computer security that raises new questions within both fields. The interest in learning-based methods for security and system design applications comes from the high degree of complexity of phenomena underlying the security and reliability of computer systems. As it becomes increasingly difficult to reach the desired properties by design alone, learning methods are being used to obtain a better understanding of various data collected from these complex systems. However, learning approaches can be co-opted or evaded by adversaries, who change to counter them. To-date, there has been limited research into learning techniques that are resilient to attacks with provable robustness guarantees making the task of designing secure learning-based systems a lucrative open research area with many challenges. The Perspectives Workshop, ``Machine Learning Methods for Computer Security'' was convened to bring together interested researchers from both the computer security and machine learning communities to discuss techniques, challenges, and future research directions for secure learning and learning-based security applications. This workshop featured twenty-two invited talks from leading researchers within the secure learning community covering topics in adversarial learning, game-theoretic learning, collective classification, privacy-preserving learning, security evaluation metrics, digital forensics, authorship identification, adversarial advertisement detection, learning for offensive security, and data sanitization. The workshop also featured workgroup sessions organized into three topic: machine learning for computer security, secure learning, and future applications of secure learning.

Cite as

Anthony D. Joseph, Pavel Laskov, Fabio Roli, J. Doug Tygar, and Blaine Nelson. Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371). In Dagstuhl Reports, Volume 2, Issue 9, pp. 109-130, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{joseph_et_al:DagRep.2.9.109,
  author =	{Joseph, Anthony D. and Laskov, Pavel and Roli, Fabio and Tygar, J. Doug and Nelson, Blaine},
  title =	{{Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371)}},
  pages =	{109--130},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{9},
  editor =	{Joseph, Anthony D. and Laskov, Pavel and Roli, Fabio and Tygar, J. Doug and Nelson, Blaine},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.9.109},
  URN =		{urn:nbn:de:0030-drops-37908},
  doi =		{10.4230/DagRep.2.9.109},
  annote =	{Keywords: Adversarial Learning, Computer Security, Robust Statistical Learning, Online Learning with Experts, Game Theory, Learning Theory}
}
Document
Biological Data Visualization (Dagstuhl Seminar 12372)

Authors: Carsten Görg, Lawrence Hunter, Jessie Kennedy, Sean O'Donoghue, and Jarke J. Van Wijk


Abstract
The topic of visualizing biological data has recently seen growing interest. Visualization approaches can help researchers understand and analyze today's large and complex biological datasets. The aim of this seminar was to bring together biologists, bioinformaticians, and computer scientists to survey the current state of tools for visualizing biological data and to define a research agenda for developing the next generation of tools. During the seminar, the participants formed working groups on nine different topics, reflected on the ongoing research in those areas, and discussed how to address key challenges; six talks complemented the work in the breakout groups. This report documents the program and the outcome of Dagstuhl Seminar 12372 "Biological Data Visualization".

Cite as

Carsten Görg, Lawrence Hunter, Jessie Kennedy, Sean O'Donoghue, and Jarke J. Van Wijk. Biological Data Visualization (Dagstuhl Seminar 12372). In Dagstuhl Reports, Volume 2, Issue 9, pp. 131-164, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{gorg_et_al:DagRep.2.9.131,
  author =	{G\"{o}rg, Carsten and Hunter, Lawrence and Kennedy, Jessie and O'Donoghue, Sean and Van Wijk, Jarke J.},
  title =	{{Biological Data Visualization (Dagstuhl Seminar 12372)}},
  pages =	{131--164},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{9},
  editor =	{G\"{o}rg, Carsten and Hunter, Lawrence and Kennedy, Jessie and O'Donoghue, Sean and Van Wijk, Jarke J.},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.9.131},
  URN =		{urn:nbn:de:0030-drops-39731},
  doi =		{10.4230/DagRep.2.9.131},
  annote =	{Keywords: Information visualization, data visualization, biology, bioinformatics, user interfaces, visual analytics}
}
Document
Privacy-Oriented Cryptography (Dagstuhl Seminar 12381)

Authors: Jan Camenisch, Mark Manulis, Gene Tsudik, and Rebecca Wright


Abstract
This report documents the program of the Dagstuhl Seminar 12381 "Privacy-Oriented Cryptography", which took place at Schloss Dagstuhl in September 16-21, 2012. Being the first Dagstuhl seminar that explicitly aimed to combine cryptography and privacy research communities, it attracted a high number of participants, many of whom were new to Dagstuhl. In total, the seminar was attended by 39 international researchers, working in different areas of cryptography and privacy, from academia, industry, and governmental organizations. The seminar included many interactive talks on novel, so-far unpublished results, aiming at the design, analysis, and practical deployment of cryptographic mechanisms for protecting privacy of users and data. The seminar featured two panel discussions to address various approaches towards provable privacy and different challenges but also success stories for practical deployment of existing cryptographic privacy-oriented techniques.

Cite as

Jan Camenisch, Mark Manulis, Gene Tsudik, and Rebecca Wright. Privacy-Oriented Cryptography (Dagstuhl Seminar 12381). In Dagstuhl Reports, Volume 2, Issue 9, pp. 165-183, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{camenisch_et_al:DagRep.2.9.165,
  author =	{Camenisch, Jan and Manulis, Mark and Tsudik, Gene and Wright, Rebecca},
  title =	{{Privacy-Oriented Cryptography (Dagstuhl Seminar 12381)}},
  pages =	{165--183},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{9},
  editor =	{Camenisch, Jan and Manulis, Mark and Tsudik, Gene and Wright, Rebecca},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.9.165},
  URN =		{urn:nbn:de:0030-drops-37556},
  doi =		{10.4230/DagRep.2.9.165},
  annote =	{Keywords: Privacy, Cryptography, Anonymity, Confidentiality}
}
Document
Computation and Palaeography: Potentials and Limits (Dagstuhl Perspectives Workshop 12382)

Authors: Tal Hassner, Malte Rehbein, Peter A. Stokes, and Lior Wolf


Abstract
This report documents the program and outcomes of Dagstuhl Seminar 12382 `Perspectives Workshop: Computation and Palaeography: Potentials and Limits'. The workshop focused on the interaction of palaeography, the study of ancient and medieval documents, with computerized tools, particularly those developed for analysis of digital images and text mining. The goal of this marriage of disciplines is to provide efficient solutions to time and labor consuming palaeographic tasks. It furthermore attempts to provide scholars with quantitative evidence to palaeographical arguments, consequently facilitating a better understanding of our cultural heritage through the unique perspective of ancient and medieval documents. The workshop provided a vital opportunity for palaeographers to interact and discuss the potential of digital methods with computer scientists specializing in machine vision and statistical data analysis. This was essential not only in suggesting new directions and ideas for improving palaeographic research, but also in identifying questions which scholars working individually, in their respective fields, would not have asked without directly communicating with colleagues from outside their research community.

Cite as

Tal Hassner, Malte Rehbein, Peter A. Stokes, and Lior Wolf. Computation and Palaeography: Potentials and Limits (Dagstuhl Perspectives Workshop 12382). In Dagstuhl Reports, Volume 2, Issue 9, pp. 184-199, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{hassner_et_al:DagRep.2.9.184,
  author =	{Hassner, Tal and Rehbein, Malte and Stokes, Peter A. and Wolf, Lior},
  title =	{{Computation and Palaeography: Potentials and Limits (Dagstuhl Perspectives Workshop 12382)}},
  pages =	{184--199},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{9},
  editor =	{Hassner, Tal and Rehbein, Malte and Stokes, Peter A. and Wolf, Lior},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.9.184},
  URN =		{urn:nbn:de:0030-drops-38900},
  doi =		{10.4230/DagRep.2.9.184},
  annote =	{Keywords: Digital Palaeography, Document Analysis}
}
Document
Algorithms and Complexity for Continuous Problems (Dagstuhl Seminar 12391)

Authors: Alexander Keller, Frances Kuo, Andreas Neuenkirch, and Joseph F. Traub


Abstract
From 23.09.12 to 28.09.12, the Dagstuhl Seminar 12391 Algorithms and Complexity for Continuous Problems was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar can be found in this report. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available.

Cite as

Alexander Keller, Frances Kuo, Andreas Neuenkirch, and Joseph F. Traub. Algorithms and Complexity for Continuous Problems (Dagstuhl Seminar 12391). In Dagstuhl Reports, Volume 2, Issue 9, pp. 200-225, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{keller_et_al:DagRep.2.9.200,
  author =	{Keller, Alexander and Kuo, Frances and Neuenkirch, Andreas and Traub, Joseph F.},
  title =	{{Algorithms and Complexity for Continuous Problems (Dagstuhl Seminar 12391)}},
  pages =	{200--225},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{9},
  editor =	{Keller, Alexander and Kuo, Frances and Neuenkirch, Andreas and Traub, Joseph F.},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.9.200},
  URN =		{urn:nbn:de:0030-drops-38920},
  doi =		{10.4230/DagRep.2.9.200},
  annote =	{Keywords: Computational complexity of continuous problems, Partial information, Biomedical learning problems, Random media, Computational finance, Noisy data, Tractability, Quantum computation, Computational stochastic processes, High-dimensional problems}
}

Filters


Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail