Dagstuhl Reports, Volume 3, Issue 8



Thumbnail PDF

Publication Details


Access Numbers

Documents

No documents found matching your filter selection.
Document
Complete Issue
Dagstuhl Reports, Volume 3, Issue 08, August 2013, Complete Issue

Abstract
Dagstuhl Reports, Volume 3, Issue 08, August 2013, Complete Issue

Cite as

Dagstuhl Reports, Volume 3, Issue 8, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{DagRep.3.8,
  title =	{{Dagstuhl Reports, Volume 3, Issue 08, August 2013, Complete Issue}},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{3},
  number =	{8},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.3.8},
  URN =		{urn:nbn:de:0030-drops-44073},
  doi =		{10.4230/DagRep.3.8},
  annote =	{Keywords: Dagstuhl Reports, Volume 3, Issue 08, August 2013, Complete Issue}
}
Document
Front Matter
Dagstuhl Reports, Table of Contents, Volume 3, Issue 08, 2013

Abstract
Table of Contents, Frontmatter

Cite as

Dagstuhl Reports, Volume 3, Issue 8, pp. i-ii, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{DagRep.3.8.i,
  title =	{{Dagstuhl Reports, Table of Contents, Volume 3, Issue 08, 2013}},
  pages =	{i--ii},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{3},
  number =	{8},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.3.8.i},
  URN =		{urn:nbn:de:0030-drops-44064},
  doi =		{10.4230/DagRep.3.8.i},
  annote =	{Keywords: Table of Contents, Frontmatter}
}
Document
Reinforcement Learning (Dagstuhl Seminar 13321)

Authors: Peter Auer, Marcus Hutter, and Laurent Orseau


Abstract
This Dagstuhl Seminar also stood as the 11th European Workshop on Reinforcement Learning (EWRL11). Reinforcement learning gains more and more attention each year, as can be seen at the various conferences (ECML, ICML, IJCAI, ...). EWRL, and in particular this Dagstuhl Seminar, aimed at gathering people interested in reinforcement learning from all around the globe. This unusual format for EWRL helped viewing the field and discussing topics differently.

Cite as

Peter Auer, Marcus Hutter, and Laurent Orseau. Reinforcement Learning (Dagstuhl Seminar 13321). In Dagstuhl Reports, Volume 3, Issue 8, pp. 1-26, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{auer_et_al:DagRep.3.8.1,
  author =	{Auer, Peter and Hutter, Marcus and Orseau, Laurent},
  title =	{{Reinforcement Learning (Dagstuhl Seminar 13321)}},
  pages =	{1--26},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{3},
  number =	{8},
  editor =	{Auer, Peter and Hutter, Marcus and Orseau, Laurent},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.3.8.1},
  URN =		{urn:nbn:de:0030-drops-43409},
  doi =		{10.4230/DagRep.3.8.1},
  annote =	{Keywords: Machine Learning, Reinforcement Learning, Markov Decision Processes, Planning}
}
Document
The Critical Internet Infrastructure (Dagstuhl Seminar 13322)

Authors: Georg Carle, Jochen Schiller, Steve Uhlig, Walter Willinger, and Matthias Wählisch


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 13322 "The Critical Internet Infrastructure". The scope of the seminar includes three main topics, rethinking perspectives on the Internet backbone, methodologies to analyze the Internet structure, and paradigms overlaying IP connectivity. The results are based on fruitful discussions between people from the research and operational community.

Cite as

Georg Carle, Jochen Schiller, Steve Uhlig, Walter Willinger, and Matthias Wählisch. The Critical Internet Infrastructure (Dagstuhl Seminar 13322). In Dagstuhl Reports, Volume 3, Issue 8, pp. 27-39, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{carle_et_al:DagRep.3.8.27,
  author =	{Carle, Georg and Schiller, Jochen and Uhlig, Steve and Willinger, Walter and W\"{a}hlisch, Matthias},
  title =	{{The Critical Internet Infrastructure (Dagstuhl Seminar 13322)}},
  pages =	{27--39},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{3},
  number =	{8},
  editor =	{Carle, Georg and Schiller, Jochen and Uhlig, Steve and Willinger, Walter and W\"{a}hlisch, Matthias},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.3.8.27},
  URN =		{urn:nbn:de:0030-drops-43416},
  doi =		{10.4230/DagRep.3.8.27},
  annote =	{Keywords: Internet, Backbone, Internet Services, Critical Infrastructure}
}
Document
Exponential Algorithms: Algorithms and Complexity Beyond Polynomial Time (Dagstuhl Seminar 13331)

Authors: Thore Husfeldt, Ramamohan Paturi, Gregory B. Sorkin, and Ryan Williams


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 13331 "Exponential Algorithms: Algorithms and Complexity Beyond Polynomial Time". Problems are often solved in practice by algorithms with worst-case exponential time complexity. It is of interest to find the fastest algorithms for a given problem, be it polynomial, exponential, or something in between. The focus of the Seminar is on finer-grained notions of complexity than np-completeness and on understanding the exact complexities of problems. The report provides a rationale for the workshop and chronicles the presentations at the workshop. The report notes the progress on the open problems posed at the past workshops on the same topic. It also reports a collection of results that cite the presentations at the previous seminar. The docoument presents the collection of the abstracts of the results presented at the Seminar. It also presents a compendium of open problems.

Cite as

Thore Husfeldt, Ramamohan Paturi, Gregory B. Sorkin, and Ryan Williams. Exponential Algorithms: Algorithms and Complexity Beyond Polynomial Time (Dagstuhl Seminar 13331). In Dagstuhl Reports, Volume 3, Issue 8, pp. 40-72, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{husfeldt_et_al:DagRep.3.8.40,
  author =	{Husfeldt, Thore and Paturi, Ramamohan and Sorkin, Gregory B. and Williams, Ryan},
  title =	{{Exponential Algorithms: Algorithms and Complexity Beyond Polynomial Time (Dagstuhl Seminar 13331)}},
  pages =	{40--72},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{3},
  number =	{8},
  editor =	{Husfeldt, Thore and Paturi, Ramamohan and Sorkin, Gregory B. and Williams, Ryan},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.3.8.40},
  URN =		{urn:nbn:de:0030-drops-43422},
  doi =		{10.4230/DagRep.3.8.40},
  annote =	{Keywords: Algorithms, exponential time algorithms, exact algorithms, computational complexity, satisfiability}
}
Document
Verifiably Secure Process-Aware Information Systems (Dagstuhl Seminar 13341)

Authors: Rafael Accorsi, Jason Crampton, Michael Huth, and Stefanie Rinderle-Ma


Abstract
From August 18--23, 2013, the Dagstuhl Seminar "Verifiably Secure Process-aware Information Systems" was held in Schloss Dagstuhl -- Leibniz Center for Informatics. During this seminar, participants presented their current research and discussed open problems in the arising field of securing information systems driven by processes. The executive summary and abstracts of the talks given during the seminar are put together in this paper.

Cite as

Rafael Accorsi, Jason Crampton, Michael Huth, and Stefanie Rinderle-Ma. Verifiably Secure Process-Aware Information Systems (Dagstuhl Seminar 13341). In Dagstuhl Reports, Volume 3, Issue 8, pp. 73-86, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{accorsi_et_al:DagRep.3.8.73,
  author =	{Accorsi, Rafael and Crampton, Jason and Huth, Michael and Rinderle-Ma, Stefanie},
  title =	{{Verifiably Secure Process-Aware Information Systems (Dagstuhl Seminar 13341)}},
  pages =	{73--86},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{3},
  number =	{8},
  editor =	{Accorsi, Rafael and Crampton, Jason and Huth, Michael and Rinderle-Ma, Stefanie},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.3.8.73},
  URN =		{urn:nbn:de:0030-drops-43435},
  doi =		{10.4230/DagRep.3.8.73},
  annote =	{Keywords: Business Processes, Information Security, Compliance, Risk-Aware Processes, Service Compositions}
}
Document
ICT Strategies for Bridging Biology and Precision Medicine (Dagstuhl Perspectives Workshop 13342)

Authors: Jonas Almeida, Andreas Dress, Titus Kühne, and Laxmi Parida


Abstract
The systems paradigm of modern medicine presents both, an opportunity and a challenge, for current Information and Communication Technology (ICT). The opportunity is to understand the spatio-temporal organisation and dynamics of the human body as an integrated whole, incorporating the biochemical, physiological, and environmental interactions that sustain life. Yet, to accomplish this, one has to meet the challenge of integrating, visualising, interpreting, and utilising an unprecedented amount of in-silico, in-vitro and in-vivo data related to healthcare in a systematic, transparent, comprehensible, and reproducible fashion. This challenge is substantially compounded by the critical need to align technical solutions with the increasingly social dimension of modern ICT and the wide range of stakeholders in modern healthcare systems. Unquestionably, advancing healthcare-related ICT has the potential of fundamentally revolutionising care-delivery systems, affecting all our lives both, personally and -- in view of the enormous costs of healthcare systems in modern societies -- also financially. Accordingly, to ponder the options of ICT for delivering the promise of systems approaches to medicine and medical care, medical researchers, physicians, biologists, mathematicians, computer scientists, and information--systems experts from three continents and from both, industry and academia, met in Dagstuhl Castle for a Dagstuhl Perspectives Workshop on ICT Strategies for Bridging Biology and Medicine from August 18 to 23, 2013, to thoroughly discuss this multidisciplinary topic and to derive and compile a comprehensive list of pertinent recommendations -- rather than just to deliver a set package of sanitised powerpoint presentations on medical ICT. The recommendations in this manifesto reflect points of convergence that emerged during the intense analyses and discussions taking place at the workshop. They also reflect a particular attention given to the identification of challenges for improving the effectiveness of ICT approaches to Precision and Systems Biomedicine.

Cite as

Jonas Almeida, Andreas Dress, Titus Kühne, and Laxmi Parida. ICT Strategies for Bridging Biology and Precision Medicine (Dagstuhl Perspectives Workshop 13342). In Dagstuhl Reports, Volume 3, Issue 8, pp. 87-135, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{almeida_et_al:DagRep.3.8.87,
  author =	{Almeida, Jonas and Dress, Andreas and K\"{u}hne, Titus and Parida, Laxmi},
  title =	{{ICT Strategies for Bridging Biology and Precision Medicine (Dagstuhl Perspectives Workshop 13342)}},
  pages =	{87--135},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{3},
  number =	{8},
  editor =	{Almeida, Jonas and Dress, Andreas and K\"{u}hne, Titus and Parida, Laxmi},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.3.8.87},
  URN =		{urn:nbn:de:0030-drops-43447},
  doi =		{10.4230/DagRep.3.8.87},
  annote =	{Keywords: Systems biomedicine, precision medicine, healthcare-related information systems, biomedical workflow engines, medical cloud, patient participation, IC}
}
Document
Coding Theory (Dagstuhl Seminar 13351)

Authors: Hans-Andrea Loeliger, Emina Soljanin, and Judy L. Walker


Abstract
Coding theory has become an essential ingredient of contemporary information technology, and it remains a fascinating area of research. The seminar brought together 45 high-caliber researchers with backgrounds and interests in various different parts of coding theory. The new area of codes for cloud applications received much attention, but other key areas such as network codes, codes on graphs, algebraic coding, and polar codes, were also well represented and generated lively discussions.

Cite as

Hans-Andrea Loeliger, Emina Soljanin, and Judy L. Walker. Coding Theory (Dagstuhl Seminar 13351). In Dagstuhl Reports, Volume 3, Issue 8, pp. 136-150, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{loeliger_et_al:DagRep.3.8.136,
  author =	{Loeliger, Hans-Andrea and Soljanin, Emina and Walker, Judy L.},
  title =	{{Coding Theory (Dagstuhl Seminar 13351)}},
  pages =	{136--150},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{3},
  number =	{8},
  editor =	{Loeliger, Hans-Andrea and Soljanin, Emina and Walker, Judy L.},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.3.8.136},
  URN =		{urn:nbn:de:0030-drops-43458},
  doi =		{10.4230/DagRep.3.8.136},
  annote =	{Keywords: Coding theory, codes on graphs, polar codes, network coding, index coding, data distribution, cloud storage}
}
Document
Interaction with Information for Visual Reasoning (Dagstuhl Seminar 13352)

Authors: David S. Ebert, Brian D. Fisher, and Petra Isenberg


Abstract
From August 26--August 30, 2013 Seminar 13352 was held at Dagstuhl on the topic of "Interaction with Information for Visual Reasoning." The seminar brought together a group of cognitive scientists, psychologists, and computer scientists in the area of scientific visualization, information visualization, and visual analytics who were carefully selected for their theoretical and methodological capabilities and history of interdisciplinary collaboration. During the workshop seven discussion groups were formed during which the role of interaction for visualization was carefully reflected on. We discussed in particular the value, structure, and different types of interaction but also how to evaluate visualization and the idea of 'narrative' as applied to visual analytics. This report documents the program and short summaries of the discussion groups for the seminar.

Cite as

David S. Ebert, Brian D. Fisher, and Petra Isenberg. Interaction with Information for Visual Reasoning (Dagstuhl Seminar 13352). In Dagstuhl Reports, Volume 3, Issue 8, pp. 151-167, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{ebert_et_al:DagRep.3.8.151,
  author =	{Ebert, David S. and Fisher, Brian D. and Isenberg, Petra},
  title =	{{Interaction with Information for Visual Reasoning (Dagstuhl Seminar 13352)}},
  pages =	{151--167},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{3},
  number =	{8},
  editor =	{Ebert, David S. and Fisher, Brian D. and Isenberg, Petra},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.3.8.151},
  URN =		{urn:nbn:de:0030-drops-43463},
  doi =		{10.4230/DagRep.3.8.151},
  annote =	{Keywords: Interaction, visualization, visual analytics, cognitive science, psychology}
}

Filters


Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail