PhDs produced

The following list provides an overview of all PhD dissertations produced at the Department of Computer Science. Links are included for those dissertations that are available online.

NumberDateDissertation title
1 19-03-1975 Parallelisme i definitioner af sprog
2 14-06-1976 Some results on context-free Lindenmayer systems
3 13-10-1980 Net theory - adequacy and applications in language theory
4 13-10-1980 Anvendelse af attribut-oversættelsesskemaer i realisation af sprogdefinitioner i alternative formalismer
5 24-06-1985 Self Describing Database Systems
6 18-08-1986 Semantik af logikprogrammering
7 15-12-1986 Understøttelse af undtagelseshåndtering i programmeringssprog
8 07-09-1987 Understøttelse af nedarvning i programmeringssprog
9 07-09-1987 Transformationer og abstrakte præsentationer i en sprogudviklingsomgivelse
10 12-10-1987 Vurdering af systemudviklingsprojekter
11 14-12-1987 Brugergrænseflader - hvordan skal vi forstå dem og deres brug, og hvordan skal vi designe dem
12 25-04-1988 Sprogbrug og design
13 30-05-1988 Ubetinget beskyttelse i kryptografiske protokoller
14 23-01-1989 A framework for computer supported cooperative work, and its application to system development
15 19-06-1989 Logic grammar + computer science = natural language understanding
16 19-03-1990 Interleaving versus noninterleaving in the theory of concurrency
17 09-09-1991 Edb-baserede værktøjer - muligheder og begrænsninger for aktiv brugerdeltagelse
18 10-02-1992 Distributed Provers and Verifiable Secret Sharing Based on the Discrete Logarithm Problem
19 24-08-1992 Provably correct compiler generation
20 24-08-1992 Models and logics in concurrency - achievements and major open problems
21 21-09-1992 From Bisimulation to Chunk-by-Chunk Simulation
22 26-10-1992 Farvede Petri Net: teori, værktøjer og praktisk anvendelse
23 08-03-1993 Værktøj til dokumenthåndtering i en programmeringsomgivelse
24 08-03-1993 High Level Efficiency in Database Languages
25 07-06-1993 Verification of Temporal Properties in Concurrent Systems
26 21-06-1993 Sharing of Computations
27 28-06-1993 Bitkompleksiteten af endelige datatyper
28 01-03-1994 Techniques and tools for building tailorable systems using strongly typed object-oriented languages
29 24-10-1994 Block ciphers - analysis, design and applications
30 24-10-1994 Genetic algorithms for global routing of VLSI macro-cell layout
31 24-10-1994 Challenging practice - an approach to cooperative analysis
32 20-02-1995 Prioritized and independent actions in distributed computer systems
33 20-12-1994 Efficient training of feed-forward neural Networks
34 20-02-1995 Prioritized and independent actions in distributed computer systems
35 18-10-1995 Automated Design of neural network architectures for classification
36 27-11-1995 Fast VLSI implementation of modular exponentiation
37 05-01-1996 Reasoning in the temporal logic of actions
38 24-05-1996 Reasoning about concurrency
39 07-06-1996 Efficient external memory data structures and applications
40 26-09-1996 Tools for stored interactive multimedia
41 08-11-1996 An Axiomatic Approach to Adequacy
42 14-03-1997 Trust and Dependence Analysis
43 20-03-1997 Engineering a Reliable Object Storage System
44 18-04-1997 Worst Case Efficient Data Structures
45 02-05-1997 Dynamic Computation
46 14-05-1997 Towards Orthogonal Persistence as a Basic Technology
47 15-05-1997 Analysing Coloured Petri Nets by the Occurrence Graph Method
48 15-05-1997 Coloured Petri Nets - A Pragmatic Formal Method for Designing and Analysing Distributed Systems
49 12-12-1997 Relational Reasoning about Functions and Nondeterminism
50 20-05-1998 Tractable Type Inference made Easy
51 11-06-1998 Reasoning about Reactive Systems
52 29-10-1998 An Activity Theoretical Approach to the Design of Computer Supported Cooperative Work
53 03-12-1998 Efficient Algorithms for Helioseismic Inversion
54 08-02-1999 Presheaf Models for Concurrency
55 10-06-1999 RAGNAROK: An architecture Based Software Development Environment
56 12-10-1999 gbeta - A Language with Virtual Attributes, Block Structure, and Propagating, Dynamic Inheritance
57 16-11-1999 Categorical Models for Concurrency: Independence, Fairness and Dataflow
58 18-02-2000 Programming Languages: Design, Analysis, and Semantics
59 06-03-2000 Complexity of Data Structures
60 09-03-2000 Computational Biology
61 09-03-2000 Algorithms in Computational Biology
62 29-03-2000 State Space Methods for Coloured Petri Nets
63 18-04-2000 Combining Predictors - Meta Machine Learning Methods and Bias/Variance & Ambiguity Decompositions
64 26-05-2000 Logics and Automata for Verification: Expressiveness and Decidability Issues
65 10-11-2000 Discourse on Genericity in Object-Oriented Programming Languages
66 18-12-2000 Games for Verification: Algorithmic Issues
67 19-01-2001 Multiparty Computations - Information-Theoretically Secure against an Adaptive Adversary
68 26-02-2001 Augmenting the Web through Open Hypermedia - The Development of the Arakne Environment, a Collaborative Open Hypermedia System for Web Augmentation
69 27-03-2001 Time-Space Trade Offs
70 27-03-2001 Analyzing Real-Time Systems: Theory and Tools
71 18-05-2001 On Static and Dynamic Control-Flow Information in Program Analysis and Transformation
72 17-08-2001 Higher-Order Program Generation
73 31-08-2001 Topics in Semantics-based Program Manipulation
74 31-08-2001 A Study of Defunctionalization and Continuation-Passing Style
75 14-09-2001 Unifying Abstractions
76 01-10-2001 Using Theory to Make Better Tools
77 01-11-2001 Patterns in Software Development
78 16-11-2001 Compression With Fast Random Access
79 23-11-2001 Robust and Flexible Scheduling with Evolutionary Computation
80 18-01-2002 Designing to support Mobile Work with Mobile Devices
81 19-04-2002 Structure and Hierarchy in Real-Time Systems
82 10-05-2002 On Resolution Complexity of Matching Principles
83 31-05-2002 Experimental Object-Oriented Modelling
84 31-05-2002 Dynamic Planar Convex Hull
85 19-06-2002 Simplicity Applied in Projects Involving Embodied, Autonomous Robots
86 28-08-2002 Performance Analysis Using Coloured Petri Nets
87 29-08-2002 Facilitating the Practical Use of Coloured Petri Nets
88 30-08-2002 The Symmetry Method for Coloured Petri Nets
89 30-09-2002 Program Verification with Monadic Second-Order Logic & Languages for Web Service Development
90 11-10-2002 Hashing, Randomness and Dictionaries
91 29-10-2002 Malleable Software Development - Supporting Collaboration and Iteration in Object-Oriented Software Development
92 24-01-2003 Domain Specific Languages for Interactive Web Services
93 29-01-2003 Designing for Learning in Use of Everyday Artefacts
94 05-02-2003 Temporal Concurrent Constraint Programming
95 19-03-2003 Collaborative Software Development - Design and Implementation of Tools for Object-Oriented Modelling
96 14-04-2003 Decidability and Complexity Issues for Infinite-State Processes
97 28-04-2003 Sweeping the State Space - A Sweep-Line State Space Exploration Method
98 15-05-2003 Language, Semantics, and Methods for Security Protocols
99 16-06-2003 Applying Formal Methods to Programming Language Design and Implementation
100 20-06-2003 Models for Evolutionary Algorithms and Their Applications in System Identification and Control Optimization
101 23-06-2003 A Formal Calculus for Categories
102 07-08-2003 On Protocol Security in the Cryptographic Model
103 07-08-2003 Extensions to the Paillier Cryptosystem with Applications to Cryptological Protocols
104 08-08-2003 Cryptographic Protocols Based on Root Extracting
105 08-08-2003 Secure Multi-Player Protocols: Fundamentals, Generality, and Efficiency
106 26-09-2003 Proof Mining in Subsystems of Analysis
107 21-11-2003 Domain Theory for Concurrency
108 24-11-2003 Probability, Nondeterminism and Concurrence: Two Denotational Models for Probabilistic Computation
109 28-11-2003 An Abstract Coalgebraic Approach to Process Equivalence for Well-Behaved Operational Semantics
110 31-05-2004 Evolutionary Algorithms and their Application in Bioinformatics
111 07-07-2004 Rigidity of frameworks and connectivity of graphs
112 08-10-2004 Interaction through Negotiation - Interaction design in a pervasive computing perspective
113 15-10-2004 Honest Verifier Zero-knowledge Arguments applied
114 11-11-2004 Exact Algorithms for Graph Colouring and Exact Satisfiability
115 26-11-2004 Exact Algorithms for Variants of Satisfiability and Colouring Problems
116 03-12-2004 Deriving process congruences from reaction rules
117 10-02-2005 Perceptual Features of Music and Speech - Measured by Listening Experiments, and Computer Modelled from Signal Analysis
118 11-03-2005 On Cryptographic Primitives Based on Noisy Channels
119 12-05-2005 Formalisms and tools supporting Constructive Action Semantics
120 30-06-2005 Trust and Mobility
121 09-09-2005 Exact Algorithms and Exact Satisfiability
122 12-09-2005 A Study for Cryptologic Protocols
123 28-10-2005 GCD Algorithms for Quadratic Number Rings
124 12-12-2005 Disk Encryption, Group Identification, Byzantine Agreement, and Threshold RSA
125 15-12-2005 The Theory and Practice of Programming Languages with Delimited Continuations
126 19-12-2005 Formal Aspects of Partial Evaluation
127 23-01-2006 Quantum Encryption Minimising Key Leakage unider Known Plaintext Attacks
128 27-01-2006 A Derivational Approach to the Operational Semantics of Functional Languages
129 30-01-2006 Partial Evaluation of String Matchers & Constructions of Abstract Machines
130 20-02-2006 Participatory Design Beyond Work Practices - Designing with Children
131 10-03-2006 Heurestic Algorithms in Bioinformatics
132 31-03-2006 Topics in the Theory and Practice of Computable Analysis
133 04-05-2006 Something to do with Java
134 29-05-2006 Applications of Proof Interpretations
135 08-06-2006 Home Appliance Integration by Pervasive Computing
136 04-10-2006 Programming with XML
137 12-10-2006 Pervasive Home Care - Technological support for treatment of diabetic foot ulcers at home
138 03-11-2006 Cardiac Surgery Simulation
139 13-11-2006 Constant Width and Constant Depth Computation
140 17-11-2006 Towards a Theory of Trust for the Global Ubiquitous Computer
141 01-12-2006 Context-aware Mobile Hypermedia: Concepts, Framework, and Applications
142 05-12-2006 Efficient and High Resolution Level Set Simulations - Data Structures, Algorithms and Applications
143 15-12-2006 Towards Distributed Declarative Architectural Reflection
144 18-12-2006 Pervasive Interaction - Designing interactive pervasive systems for complex work environments
145 26-02-2007 Program Validation by Symbolic and Reverse Execution
146 27-04-2007 Cryptography in the Bounded-Quantum-Storage Model
147 01-05-2007 A Structured Approach to the Transformation, Nomalization and Execution of Computer Programs
148 31-05-2007 Educating Novices in the Skills of Programming
149 20-06-2007 Transformation, Analysis, and Interpretation of Higher-Order Procedural Programs
150 27-06-2007 Flexible Methods for Geometric Texturing - From Terrain Visualization to Geometric Texture Mapping
151 06-07-2007 Primitives and Applications for Multi-party Computation
152 25-08-2007 Hardware-Aware Algorithms and Data Structures
153 15-10-2007 Combinatorial algorithms for partially ordered sets
154 23-10-2007 Looking Good, Behaving Well - Behavioural Verification and Visualisation of Formal Models of Concurrent Systems
155 24-10-2007 On Reasoning Equationally: Lambda Calculi and Programs with Computational Effects
156 12-12-2007 Programming with Location from Conceptualization to Language Design
157 10-03-2008 Computing Equilibria of Two Player Games
158 11-03-2008 Mobile P2P in Ad Hoc Networks: Framework and Applications
159 31-03-2008 Tools for Social Construction: A Framework for Pervasive Media for Children
160 30-05-2008 Authentication and Privacy with Application to Pervasive Computing
161 08-09-2008 Indoor Positioning with Radio Location Fingerprinting
162 12-09-2008 Vehicle to Vehicle Services. Service oriented architecture for pervasive computing systems with emphasis on vehicle to vehicle applications
163 21-10-2008 Using Formal Behavioral Models in Software Development: From Real-World Problems to Software Systems
164 31-10-2008 Challenges in whole-genome association mapping
165 21-11-2008 On Context awareness in Ubiquitous Computing
166 20-03-2009 On the Power of Two-Party Quantum Cryptography
167 15-04-2009 Infrastructure Support for Collaborative Pervasive Computing Systems
168 16-04-2009 Distributed Interaction for Activity-Based Computing
169 28-04-2009 Formal Requirements Modeling
170 28-05-2009 Languages for Secure Multiparty Computation and Towards Strongly Typed Macroes
171 15-09-2009 Linear Integer Secret Sharing
172 01-10-2009 Deformable Image Registration for Use in Radiotherapy, Using GPU Acceleration
173 21-10-2009 Handling Massive Terrains and Unreliable Memory
174 22-10-2009 On Human-Computer Interaction in Complex Artefact Ecologies
175 31-10-2009 Perfect-Information Games with Cycles
176 09-11-2009 Link Building
177 17-12-2009 Participatory Middleware Design
178 02-03-2010 Medical Sensor Network Infrastructures
179 29-04-2010 Data Structures: Sequence Problems, Range Queries, and Fault Tolerance
180 11-05-2010 Cryptographic Protocols: Theory and Implementation
181 25-05-2010 Efficient Algorithms for Controllable Fluid Simulations and High-Resolution Level Set Deformaties
182 21-06-2010 On the Computational Overhead of Secure Multiparty Computation
183 17-08-2010 Monomial Ideal Algorithms: Connections to Numerical Semigroups and Scarf's Theory of Bodies
184 02-09-2010 On the expressiveness of Declarative Meta-Languages
185 27-09-2010 Distinct Candidates Optimization: A Novel Approach to Applied Evolutionary Multi-and Many-Objective Optimization
186 30-09-2010 Empowering Mobile Devices Through Cyper Foraging: The Development of Scavenger, and Open Mobile Cyber Foraging System
187 07-10-2010 An Engineering Approach to Dynamic Program Analysis by Layering Language Abstraction
188 07-10-2010 Embedded programming Languages and Their Representation
189 12-10-2010 Existence and computation of Equilibria in Auction Games
190 26-10-2010 Initializing and Evaluation of Nested Class Structures
191 12-11-2010 Cryptographic Protocols under Quantum Attacks
192 27-01-2011 Material Dispositions: a hybrid and interwoven design perspective
193 07-04-2011 Secure Computation in Untrusted Environments
194 16-06-2011 Virtual Screening Algorithms
195 27-06-2011 Staging as a Holistic Perspective on Interaction Design for Public Enviroments
196 04-07-2011 Data Structures: Range Queries and Space Efficiency
197 08-08-2011 On the protection of digital identities through threshold cryptography
198 23-09-2011 Dynamic data structures: Orthogonal range queries and update efficiency
199 28-09-2011 Participatory citizenship - supporting citizen empowerment in digitally mediated public service provision
200 28-10-2011 Engineering algorithms for finding patterns in biological data
201 11-11-2011 Engaging the citizens through collaborative, mobile and web-based public services
202 09-12-2011 Efficient algorithms for tree reconstruction and prediction of molecular interactions
203 14-12-2011 Methods and software architecture for activity recognition from position data - applied to cow activity recognition
204 09-01-2012 Cryptography with quantum mechanics
205 10-01-2012 Accurate positioning of pedestrains in mixed indoor/outdoor settings - A particle filter approach to sensor and map fusion
206 12-01-2012 Supporting seamful development of positioning applications through model based translucent middleware
207 16-01-2012 Theory and practice of cryptographic protocols -or- cryptography: will it blend?
208 23-01-2012 Low-power wireless sensor network infrastructures
209 22-03-2012 Improving precision of types
210 26-03-2012 While working around security
211 16-04-2012 Contributions to computational stereology and parallel programming
212 07-09-2012 Worst-case analysis of strategy iteration and the simplex method
213 17-09-2012 Homotopic polygonal line simplification
214 26-10-2012 I/O-efficient multiparty computation, formulaic secret sharing and np-complete puzzles
215 30-10-2012 External memory graph algorithms and range searching data structures
216 08-04-2013 New Approaches to Practical Secure Two-Party Computation
217 23-04-2013 Design and Analysis of Web Application Frameworks
218 23-04-2013 Static Analysis for JavaScript
219 23-04-2013 Unconditionally Secure Protocols
220 07-05-2013 Situating Engagement: Ubiquitous Infrastructures for In-Situ Civic Engagement
221 17-05-2013 Models and Techniques for Proving Data Structure Lower Bounds
222 19-06-2013 Symbolic Analysis of Cryptographic Protocols: Models, Methods, and Soundness
223 03-09-2013 Multi-dimensional Location Privacy - Concepts, Architecture, and User Interface
224 27-09-2013 Consistency in the World Wide Web: Specification, Verification, and Evaluation
225 10-10-2013 Zero-Knowledge Protocols and Multiparty Computation
226 11-10-2013 Lattice-based Cryptography - Threshold Protocols and Multiparty Computation
227 04-11-2013 Strategy complexity of two player, zero-sum games
228 18-11-2013 Dynamic Data Structures: The Interplay of Invariants and Algorithm Design
229 09-12-2013 The Interpretation and Inter-derivation of Small-step and Big-step Specifications
230 10-12-2013 Inferring Groups of Objects, Preferred Routes, and Facility Locations from Trajectories
231 14-01-2014 Public-key Cryptography from Weaker Assumption
232 24-02-2014 Home-based Self-Care – Understanding and Designing Pervasive Technology to Support Care Management Work at Home
233 29-04-2014 Secure Computation in the Preprocessing Model
234 19-08-2014 Enabling Advanced Path-Finding on Terrains and in Spatial Networks
235 08-09-2014 Rationality in the Cryptographic Model
236 16-09-2014 Indexing, Query Processing, and Clustering of Spatio-Temporal Text Objects
237 18-09-2014 Engineering of Algorithms for Hidden Markov Models and Tree Distances
238 10-10-2014 Enabling indoor location-based services
239 24-10-2014 Applied bioinformatics: Genome annotation and transcriptome analysis
240 14-11-2014 Handling Massive and Dynamic Terrain Data
241 17-11-2014 On the Combinatorics of SAT and the Complexity of Planar Problems
242 03-12-2014 Efficient Extraction of Content from Enriched Geospatial and Networked Data
243 09-01-2015 Pointer Analysis for JavaScript Programming Tools
244 23-01-2015 Inference of population history and patterns from molecular data
245 09-03-2015 Automated Testing of Event-Driven Applications
246 13-03-2015 On Computational Small Steps and Big Steps: Refocusing for Outermost Reduction
247 17-04-2015 Space Efficient Data Structures and External Terrain Algorithms
248 29-04-2015 Computational Fair Division
249 13-05-2015 Efficient Algorithms for HandlingMassive Terrains
250 19-05-215 Static Analysis of Dynamic Languages
251 22-05-2015 Outlier Detection and Explanation for Domain Experts
252 05-08-2015 Social Welfare in Algorithmic Mechanism Design Without Money
253 02-09-2015 Changing the Shape of Interaction: Shape-changing Interfaces
254 22-09-2015

Practical Aspects of Secure Multiparty Computation

256 25-09-2015

Implicit Data Structures, Sorting, and Text Indexing

257 13-10-2015

Enabling Time-Dependent Uncertain Edge Weights and Stochastic Routing in Road Networks

258 19-10-2015

Protecting Cryptographic Memory against Tampering Attack

259 29-10-2015

Exploring the Problem Space of Orthogonal Range Searching

260 29-10-2015

Semi-algebraic Geometry for Stochastic Games

261 29-10-2015

The Hitchhiker’s Guide to Garbled Circuits: Garbled Circuits and their Applications to Maliciously Secure Two-Party Protocols 

262 16-11-2015

Spatio-Temporal Analysis of Human Activities in Indoor Environments through Mobile Sensing

263 29-01-2016

Multi-Criteria Decision Support Queries in Exploratory & Open World Settings

264 22-03-2016 Practical Secure Computation with Pre-Processing
265 15-05-2016 On semantics and applications of guarded recursion
266 20-04-2016 

Interactive Visual Analytics of Big Data - a Web-Based Approach

267 24-08-2016 Designing abstractions for JavaScript program analysis
268 08-09-2016 Type Soundness in the Dart Programming Language
269 01-11-2016 Mobile Sensing and Recognition of Human Activities to Support Work Coordination
270 02-11-2016 Game Mechanics and Bodily Interactions: Designing Interactive Technologies for Sports Training
271 07-11-2016 Towards More Efficient Secure Multiparty Computation in the Preprocessing Model
272 06-12-2016 Guarded Recursive Type Theory
273 20-12-2016
Assistive Technologies to Empower Children with ADHD: Conceptual Framework and Technological Solutions
274 04-01-2017 New Applications of Secret-Sharing in Cryptography
275 01-02-2017 Parallel Algorithms for Skyline and Skycube Computation on Multicore CPUs and GPUs
276 20-02-2017 Toward Place-Centric Computing : Making Place With Technology Together
277 07-03-2017 On the Communication and Round Complexity of Secure Computation
278 05-05-2017 A Framework For Efficient Homomorphic Universally Composable Commitments
279 12-09-2017 Algorithmic Aspects of Arrangements and Incidences
280 29-09-2017 Amortizing Maliciously Secure Two-party Computation
281 29-10-2017 Modelling Emission of Pollutants from transportation using mobile sensing data: Advancing modelling of street level pollution and climate forcing gas emissions
282 29-11-2017 Geometric covers, graph orientations, counter games
283 03-04-2018 Context-Aware Integrability and Maintainability of Cyber-Physical Ecosystems: Tactics and Tools
284 23-05-2018

Automated Testing Techniques for Event-Driven and Dynamically Typed Software Applications

285 28-09-2018 External Memory Algorithms for Massive Terrains and Polygons
286 23-10-2018 Optimal Placement of Virtual Content in Physical Space
287 24-10-2018 Designing for Hand Ownership in Interaction with Virtual and Augmented Reality