Aarhus University Seal / Aarhus Universitets segl

PhDs produced

The following list provides an overview of all PhD's produced at the Department of Computer Science

NumberPhD-studentSupervisorDateDissertation title
1Sven SkyumArto Salomaa19-03-1975Parallelisme i definitioner af sprog
2Mogens NielsenArto Salomaa14-06-1976Some results on context-free Lindenmayer systems
3Kurt JensenErik Meineche Schmidt13-10-1980Net theory - adequacy and applications in language theory
4Ole LehrmannPeter Kornerup13-10-1980Anvendelse af attribut-oversættelsesskemaer i realisation af sprogdefinitioner i alternative formalismer
5Leo Mark ChristensenBrian H. Mayoh24-06-1985Self Describing Database Systems
6Gudmund FrandsenMogens Nielsen18-08-1986Semantik af logikprogrammering
7Jørgen Lindskov KnudsenOle Lehrmann Madsen15-12-1986Understøttelse af undtagelseshåndtering i programmeringssprog
8Kristine Stougaard ThomsenOle Lehrmann Madsen07-09-1987Understøttelse af nedarvning i programmeringssprog
9Kurt NørmarkOle Lehrmann Madsen07-09-1987Transformationer og abstrakte præsentationer i en sprogudviklingsomgivelse
10Andreas Munk-MadsenMorten Kyng12-10-1987Vurdering af systemudviklingsprojekter
11Susanne BødkerMorten Kyng14-12-1987Brugergrænseflader - hvordan skal vi forstå dem og deres brug, og hvordan skal vi designe dem
12Kim Halskov MadsenKurt Jensen25-04-1988Sprogbrug og design
13Ivan Bjerre DamgårdPeter Landrock30-05-1988Ubetinget beskyttelse i kryptografiske protokoller
14Pål SørgaardMorten Kyng23-01-1989A framework for computer supported cooperative work, and its application to system development
15Per HasleBrian H. Mayoh19-06-1989Logic grammar + computer science = natural language understanding
16Uffe Henrik EngbergMogens Nielsen19-03-1990Interleaving versus noninterleaving in the theory of concurrency
17Kaj GrønbækMorten Kyng09-09-1991Edb-baserede værktøjer - muligheder og begrænsninger for aktiv brugerdeltagelse
18Torben Pryds PedersenIvan Bjerre Damgård10-02-1992Distributed Provers and Verifiable Secret Sharing Based on the Discrete Logarithm Problem
19Jens PalsbergPeter D. Mosses24-08-1992Provably correct compiler generation
20Madhavan MukundMogens Nielsen24-08-1992Models and logics in concurrency - achievements and major open problems
21Anders GammelgaardErik Meineche Schmidt21-09-1992From Bisimulation to Chunk-by-Chunk Simulation
22Søren ChristensenKurt Jensen26-10-1992Farvede Petri Net: teori, værktøjer og praktisk anvendelse
23Elmer Sørensen SandvadOle Lehrmann Madsen08-03-1993Værktøj til dokumenthåndtering i en programmeringsomgivelse
24Kim Skak LarsenErik Meineche Schmidt08-03-1993High Level Efficiency in Database Languages
25Henrik Reif AndersenGlynn Winskel07-06-1993Verification of Temporal Properties in Concurrent Systems
26Torben AmtoftBrian H. Mayoh21-06-1993Sharing of Computations
27Peter Bro MiltersenSven Skyum28-06-1993Bitkompleksiteten af endelige datatyper
28Jawahar MalhotraOle Lehrmann Madsen01-03-1994Techniques and tools for building tailorable systems using strongly typed object-oriented languages
29Lars Ramkilde KnudsenIvan Bjerre Damgård24-10-1994Block ciphers - analysis, design and applications
30Henrik EsbensenPeter Møller-Nielsen24-10-1994Genetic algorithms for global routing of VLSI macro-cell layout
31Preben Holst MogensenMorten Kyng24-10-1994Challenging practice - an approach to cooperative analysis
32Sten AgerholmGlynn Winskel20-02-1995Prioritized and independent actions in distributed computer systems
33Martin MøllerBrian H. Mayoh20-12-1994Efficient training of feed-forward neural Networks
34Claus Torp JensenGlynn Winskel20-02-1995Prioritized and independent actions in distributed computer systems
35Jan DepenauBrian H. Mayoh18-10-1995Automated Design of neural network architectures for classification
36Holger OrupPeter Møller-Nielsen27-11-1995Fast VLSI implementation of modular exponentiation
37Urban EngbergGlynn Winskel05-01-1996Reasoning in the temporal logic of actions
38Allan ChengMogens Nielsen24-05-1996Reasoning about concurrency
39Lars ArgeErik Meineche Schmidt07-06-1996Efficient external memory data structures and applications
40Ole VillumsenMorten Kyng26-09-1996Tools for stored interactive multimedia
41Torben BraünerGlynn Winskel08-11-1996An Axiomatic Approach to Adequacy
42Peter ØbækPeter D. Mosses14-03-1997Trust and Dependence Analysis
43Alexandre Valente Da Conceicao SousaOle Lehrmann Madsen20-03-1997Engineering a Reliable Object Storage System
44Gerth Stølting BrodalErik Meineche Schmidt18-04-1997Worst Case Efficient Data Structures
45Thore HusfeldtSven Skyum02-05-1997Dynamic Computation
46Søren BrandtOle Lehrmann Madsen14-05-1997Towards Orthogonal Persistence as a Basic Technology
47Jens Bæk JørgensenKurt Jensen15-05-1997Analysing Coloured Petri Nets by the Occurrence Graph Method
48Kjeld Høyer MortensenKurt Jensen15-05-1997Coloured Petri Nets - A Pragmatic Formal Method for Designing and Analysing Distributed Systems
49Søren LassenPeter D. Mosses12-12-1997Relational Reasoning about Functions and Nondeterminism
50Ole Ildsgaard HougaardMichael I. Schwartzbach20-05-1998Tractable Type Inference made Easy
51Kim SunesenMogens Nielsen11-06-1998Reasoning about Reactive Systems
52Jakob Eyvind BardramSusanne Bødker29-10-1998An Activity Theoretical Approach to the Design of Computer Supported Cooperative Work
53Rasmus Munk LarsenJørgen Christensen-Dalsgaard03-12-1998Efficient Algorithms for Helioseismic Inversion
54Gian Luca CattaniGlynn Winskel08-02-1999Presheaf Models for Concurrency
55Henrik Bærbak ChristensenOle Lehrmann Madsen10-06-1999RAGNAROK: An architecture Based Software Development Environment
56Erik ErnstOle Lehrmann Madsen12-10-1999gbeta - A Language with Virtual Attributes, Block Structure, and Propagating, Dynamic Inheritance
57Thomas Troels HildebrandtGlynn Winskel16-11-1999Categorical Models for Concurrency: Independence, Fairness and Dataflow
58Anders Thorhauge SandholmMichael I. Schwartzbach18-02-2000Programming Languages: Design, Analysis, and Semantics
59Theis RauheSven Skyum06-03-2000Complexity of Data Structures
60Rune Bang LyngsøOle Caprani09-03-2000Computational Biology
61Christian N. Storm PedersenSven Skyum09-03-2000Algorithms in Computational Biology
62Lars Michael KristensenKurt Jensen29-03-2000State Space Methods for Coloured Petri Nets
63Jakob Vogdrup HansenBrian H. Mayoh18-04-2000Combining Predictors - Meta Machine Learning Methods and Bias/Variance & Ambiguity Decompositions
64Jesper Gulmann HenriksenMogens Nielsen26-05-2000Logics and Automata for Verification: Expressiveness and Decidability Issues
65Kresten Krab ThorupOle Lehrmann Madsen10-11-2000Discourse on Genericity in Object-Oriented Programming Languages
66Marcin JurdzinskiMogens Nielsen18-12-2000Games for Verification: Algorithmic Issues
67Stefan DziembowskiIvan Bjerre Damgård19-01-2001Multiparty Computations - Information-Theoretically Secure against an Adaptive Adversary
68Niels Olof BouvinKaj Grønbæk26-02-2001Augmenting the Web through Open Hypermedia - The Development of the Arakne Environment, a Collaborative Open Hypermedia System for Web Augmentation
69Jakob PagterErik Meineche Schmidt27-03-2001Time-Space Trade Offs
70Thomas Seidelin HuneMogens Nielsen27-03-2001Analyzing Real-Time Systems: Theory and Tools
71Daniel DamianOlivier Danvy18-05-2001On Static and Dynamic Control-Flow Information in Program Analysis and Transformation
72Morten RhigerOlivier Danvy17-08-2001Higher-Order Program Generation
73Bernd GrobauerOlivier Danvy31-08-2001Topics in Semantics-based Program Manipulation
74Lasse Reichstein NielsenOlivier Danvy31-08-2001A Study of Defunctionalization and Continuation-Passing Style
75Mads TorgersenOle Lehrmann Madsen14-09-2001Unifying Abstractions
76Niels DamgaardMichael I. Schwartzbach01-10-2001Using Theory to Make Better Tools
77Aino CornilsJørgen Lindskov Knudsen01-11-2001Patterns in Software Development
78Flemming Friche RodlerBrian H. Mayoh16-11-2001Compression With Fast Random Access
79Mikkel Thomas JensenBrian H. Mayoh23-11-2001Robust and Flexible Scheduling with Evolutionary Computation
80Ann Christina NielsenSusanne Bødker18-01-2002Designing to support Mobile Work with Mobile Devices
81M. Oliver MöllerMogens Nielsen19-04-2002Structure and Hierarchy in Real-Time Systems
82Stefan Stoyanov DantchevErik Meineche Schmidt10-05-2002On Resolution Complexity of Matching Principles
83Klaus Marius HansenOle Lehrmann Madsen31-05-2002Experimental Object-Oriented Modelling
84Riko JakobGerth Stølting Brodal31-05-2002Dynamic Planar Convex Hull
85Jakob FredslundOle Caprani19-06-2002Simplicity Applied in Projects Involving Embodied, Autonomous Robots
86Lisa Marie WellsSøren Christensen28-08-2002Performance Analysis Using Coloured Petri Nets
87Bo LindstrømSøren Christensen29-08-2002Facilitating the Practical Use of Coloured Petri Nets
88Louise ElgaardSøren Christensen30-08-2002The Symmetry Method for Coloured Petri Nets
89Anders MøllerMichael I. Schwartzbach30-09-2002Program Verification with Monadic Second-Order Logic & Languages for Web Service Development
90Rasmus PaghPeter Bro Miltersen11-10-2002Hashing, Randomness and Dictionaries
91Michael ThomsenOle Lehrmann Madsen29-10-2002Malleable Software Development - Supporting Collaboration and Iteration in Object-Oriented Software Development
92Claus Rasmussen BrabrandMichael I. Schwartzbach24-01-2003Domain Specific Languages for Interactive Web Services
93Marianne GravesSusanne Bødker29-01-2003Designing for Learning in Use of Everyday Artefacts
94Frank ValenciaMogens Nielsen05-02-2003Temporal Concurrent Constraint Programming
95Christian Heide DammOle Lehrmann Madsen19-03-2003Collaborative Software Development - Design and Implementation of Tools for Object-Oriented Modelling
96Jiri SrbaMogens Nielsen14-04-2003Decidability and Complexity Issues for Infinite-State Processes
97Thomas Mailund JensenSøren Christensen28-04-2003Sweeping the State Space - A Sweep-Line State Space Exploration Method
98Federico CrazzolaraGlynn Winskel15-05-2003Language, Semantics, and Methods for Security Protocols
99Giuseppe MiliciaMogens Nielsen16-06-2003Applying Formal Methods to Programming Language Design and Implementation
100Rasmus Kjær UrsemThiemo Krink20-06-2003Models for Evolutionary Algorithms and Their Applications in System Identification and Control Optimization
101Mario Jose CaccamoGlynn Winskel23-06-2003A Formal Calculus for Categories
102Jesper Buus NielsenIvan Bjerre Damgård07-08-2003On Protocol Security in the Cryptographic Model
103Mads Johan JurikIvan Bjerre Damgård07-08-2003Extensions to the Paillier Cryptosystem with Applications to Cryptological Protocols
104Maciej KoprowskiIvan Bjerre Damgård08-08-2003Cryptographic Protocols Based on Root Extracting
105Serge FehrIvan Bjerre Damgård08-08-2003Secure Multi-Player Protocols: Fundamentals, Generality, and Efficiency
106Paulo Borges OlivaUlrich Kohlenbach26-09-2003Proof Mining in Subsystems of Analysis
107Mikkel NygaardGlynn Winskel21-11-2003Domain Theory for Concurrency
108Daniele VaraccaGlynn Winskel24-11-2003Probability, Nondeterminism and Concurrence: Two Denotational Models for Probabilistic Computation
109Bartosz KlinPeter D. Mosses28-11-2003An Abstract Coalgebraic Approach to Process Equivalence for Well-Behaved Operational Semantics
110René ThomsenThiemo Krink31-05-2004Evolutionary Algorithms and their Application in Bioinformatics
111Alex Rune BergErik Meineche Schmidt07-07-2004Rigidity of frameworks and connectivity of graphs
112Jannie Friis KristensenKaj Grønbæk08-10-2004Interaction through Negotiation - Interaction design in a pervasive computing perspective
113Jens GrothIvan Bjerre Damgård15-10-2004Honest Verifier Zero-knowledge Arguments applied
114Jesper Makholm ByskovPeter Bro Miltersen11-11-2004Exact Algorithms for Graph Colouring and Exact Satisfiability
115Bjarke SkjernaaPeter Bro Miltersen26-11-2004Exact Algorithms for Variants of Satisfiability and Colouring Problems
116Pawel SobocinskiMogens Nielsen03-12-2004Deriving process congruences from reaction rules
117Esben SkovenborgOle Caprani10-02-2005Perceptual Features of Music and Speech - Measured by Listening Experiments, and Computer Modelled from Signal Analysis
118Kirill MorozovIvan Bjerre Damgård11-03-2005On Cryptographic Primitives Based on Noisy Channels
119Jørgen IversenMogens Nielsen, Peter Mosses12-05-2005Formalisms and tools supporting Constructive Action Semantics
120Marco CarboneMogens Nielsen30-06-2005Trust and Mobility
121Bolette Ammitzbøll MadsenPeter Bro Miltersen09-09-2005Exact Algorithms and Exact Satisfiability
122Jesus Fernando Almansa GuerraIvan Bjerre Damgård12-09-2005A Study for Cryptologic Protocols
123Saurabh AgarwalGudmund Frandsen28-10-2005GCD Algorithms for Quadratic Number Rings
124Kasper DupontIvan Bjerre Damgård12-12-2005Disk Encryption, Group Identification, Byzantine Agreement, and Threshold RSA
125Dariusz Piotr BiernackiOlivier Danvy15-12-2005The Theory and Practice of Programming Languages with Delimited Continuations
126Henning Korsholm RohdeOlivier Danvy, Andrzej Filinski19-12-2005Formal Aspects of Partial Evaluation
127Thomas Brochmann PedersenLouis Salvail23-01-2006Quantum Encryption Minimising Key Leakage unider Known Plaintext Attacks
128Malgorzata BiernackaOlivier Danvy27-01-2006A Derivational Approach to the Operational Semantics of Functional Languages
129Mads Sig AgerOlivier Danvy30-01-2006Partial Evaluation of String Matchers & Constructions of Abstract Machines
130Ole Sejer IversenSusanne Bødker20-02-2006Participatory Design Beyond Work Practices - Designing with Children
131Jakob Svaneborg VesterstrømChristian Nørgaard Storm Pedersen10-03-2006Heurestic Algorithms in Bioinformatics
132Branimir LambovUlrich Kohlenbach31-03-2006Topics in the Theory and Practice of Computable Analysis
133Aske Simon ChristensenMichael I. Schwartzbach04-05-2006Something to do with Java
134Philipp GerhardyUlrich Kohlenbach29-05-2006Applications of Proof Interpretations
135Jonas Martin ThomsenSøren Christensen08-06-2006Home Appliance Integration by Pervasive Computing
136Christian KirkegaardMichael I. Schwartzbach, Anders Møller04-10-2006Programming with XML
137Simon Bo LarsenOle Lehrmann Madsen12-10-2006Pervasive Home Care - Technological support for treatment of diabetic foot ulcers at home
138Jesper MosegaardPeter Møller-Nielsen03-11-2006Cardiac Surgery Simulation
139Kristoffer Arnsfelt HansenPeter Bro Miltersen13-11-2006Constant Width and Constant Depth Computation
140Karl Kristian KrukowMogens Nielsen17-11-2006Towards a Theory of Trust for the Global Ubiquitous Computer
141Frank Allan HansenKaj Grønbæk01-12-2006Context-aware Mobile Hypermedia: Concepts, Framework, and Applications
142Michael Bang NielsenKaj Grønbæk05-12-2006Efficient and High Resolution Level Set Simulations - Data Structures, Algorithms and Applications
143Mads IngstrupMorten Kyng15-12-2006Towards Distributed Declarative Architectural Reflection
144Thomas Riisgaard HansenJakob Bardram18-12-2006Pervasive Interaction - Designing interactive pervasive systems for complex work environments
145Jooyong LeeMogens Nielsen, Olivier Danvy26-02-2007Program Validation by Symbolic and Reverse Execution
146Christian SchaffnerLouis Salvail27-04-2007Cryptography in the Bounded-Quantum-Storage Model
147Kevin MillikinOlivier Danvy01-05-2007A Structured Approach to the Transformation, Nomalization and Execution of Computer Programs
148Michael Edelgaard CaspersenOle Lehrmann Madsen31-05-2007Educating Novices in the Skills of Programming
149Jan MidtgaardOlivier Danvy20-06-2007Transformation, Analysis, and Interpretation of Higher-Order Procedural Programs
150Anders Torp BrodersenKaj Grønbæk27-06-2007Flexible Methods for Geometric Texturing - From Terrain Visualization to Geometric Texture Mapping
151Tomas ToftIvan Bjerre Damgård06-07-2007Primitives and Applications for Multi-party Computation
152Gabriel MoruzGerth Stølting Brodal25-08-2007Hardware-Aware Algorithms and Data Structures
153Johan NilssonGerth Stølting Brodal15-10-2007Combinatorial algorithms for partially ordered sets
154Michael WestergaardKurt Jensen23-10-2007Looking Good, Behaving Well - Behavioural Verification and Visualisation of Formal Models of Concurrent Systems
155Kristian Støvring SørensenOlivier Danvy24-10-2007On Reasoning Equationally: Lambda Calculi and Programs with Computational Effects
156Kari Rye Schougaard NørgaardOle Lehrmann Madsen12-12-2007Programming with Location from Conceptualization to Language Design
157Troels Bjerre SørensenPeter Bro Miltersen10-03-2008Computing Equilibria of Two Player Games
158Bent Otto Guldbjerg ChristensenKaj Grønbæk11-03-2008Mobile P2P in Ad Hoc Networks: Framework and Applications
159Martin BrynskovKaj Grønbæk31-03-2008Tools for Social Construction: A Framework for Pervasive Media for Children
160Michael Østergaard PedersenIvan Bjerre Damgård30-05-2008Authentication and Privacy with Application to Pervasive Computing
161Mikkel Baun KjærgaardKlaus Marius Hansen08-09-2008Indoor Positioning with Radio Location Fingerprinting
162Jeppe Rørbæk BrønstedKlaus Marius Hansen12-09-2008Vehicle to Vehicle Services. Service oriented architecture for pervasive computing systems with emphasis on vehicle to vehicle applications
163Kristian Bisgaard LassenSøren Christensen21-10-2008Using Formal Behavioral Models in Software Development: From Real-World Problems to Software Systems
164Søren BesenbacherChristian Nørgaard Storm Pedersen31-10-2008Challenges in whole-genome association mapping
165Doina BucurMogens Nielsen21-11-2008On Context awareness in Ubiquitous Computing
166Miroslava SotakovaLouis Salvail20-03-2009On the Power of Two-Party Quantum Cryptography
167Martin MogensenJakob Bardram15-04-2009Infrastructure Support for Collaborative Pervasive Computing Systems
168Jonathan Bech Bunde-PedersenJakob Bardram16-04-2009Distributed Interaction for Activity-Based Computing
169Simon TjellSøren Christensen28-04-2009Formal Requirements Modeling
170Janus Dam NielsenMichael I. Schwartzbach28-05-2009Languages for Secure Multiparty Computation and Towards Strongly Typed Macroes
171Rune Ivan ThorbekIvan Bjerre Damgård15-09-2009Linear Integer Secret Sharing
172Karsten Østergaard NoeOle Østerby, Thomas Sangild01-10-2009Deformable Image Registration for Use in Radiotherapy, Using GPU Acceleration
173Thomas MølhaveLars Arge21-10-2009Handling Massive Terrains and Unreliable Memory
174Clemens Nylandsted KlokmoseSusanne Bødker22-10-2009On Human-Computer Interaction in Complex Artefact Ecologies
175Klas Olof Daniel AnderssonPeter Bro Miltersen31-10-2009Perfect-Information Games with Cycles
176Martin OlsenGerth Stølting Brodal09-11-2009Link Building
177Kristian Ellebæk KjærKlaus Marius Hansen17-12-2009Participatory Middleware Design
178Jacob AndersenLars Michael Kristensen02-03-2010Medical Sensor Network Infrastructures
179Allan Grønlund JørgensenGerth Stølting Brodal29-04-2010Data Structures: Sequence Problems, Range Queries, and Fault Tolerance
180Martin Joakim Bittel GeislerIvan Bjerre Damgård11-05-2010Cryptographic Protocols: Theory and Implementation
181Brian Bunch ChristensenSusanne Bødker25-05-2010Efficient Algorithms for Controllable Fluid Simulations and High-Resolution Level Set Deformaties
182Mikkel KrøigaardIvan Bjerre Damgård21-06-2010On the Computational Overhead of Secure Multiparty Computation
183Bjarke Hammersholt RounePeter Bro Miltersen17-08-2010Monomial Ideal Algorithms: Connections to Numerical Semigroups and Scarf's Theory of Bodies
184Karl Bernhard KloseOlivier Danvy02-09-2010On the expressiveness of Declarative Meta-Languages
185Peter Dueholm JustesenChristian Nørgaard Storm Pedersen27-09-2010Distinct Candidates Optimization: A Novel Approach to Applied Evolutionary Multi-and Many-Objective Optimization
186Mads Darø KristensenKaj Grønbæk30-09-2010Empowering Mobile Devices Through Cyper Foraging: The Development of Scavenger, and Open Mobile Cyber Foraging System
187Michael AchenbachOlivier Danvy07-10-2010An Engineering Approach to Dynamic Program Analysis by Layering Language Abstraction
188Christian Martin HoferOlivier Danvy07-10-2010Embedded programming Languages and Their Representation
189Rocio Santillan RodriguezPeter Bro Miltersen12-10-2010Existence and computation of Equilibria in Auction Games
190Anders Bach NielsenErik Ernst26-10-2010Initializing and Evaluation of Nested Class Structures
191Carolin Gabriele LunemannLouis Salvail12-11-2010Cryptographic Protocols under Quantum Attacks
192Jesper Wolff OlsenPreben Mogensen27-01-2011Material Dispositions: a hybrid and interwoven design perspective
193Claudio OrlandiIvan Damgaard07-04-2011Secure Computation in Untrusted Environments
194Thomas Greve KristensenChristian Storm Pedersen16-06-2011Virtual Screening Algorithms
195Karen Johanne KortbekKaj Grønbæk27-06-2011Staging as a Holistic Perspective on Interaction Design for Public Enviroments
196Pooya DavoodiGerth Stølting Brodal04-07-2011Data Structures: Range Queries and Space Efficiency
197Gert Læssøe MikkelsenIvan Damgaard08-08-2011On the protection of digital identities through threshold cryptography
198Konstantinos TsakalidisGerth Stølting Brodal23-09-2011Dynamic data structures: Orthogonal range queries and update efficiency
199Nikolaj Gandrup BorchorstSusanne Bødker28-09-2011Participatory citizenship - supporting citizen empowerment in digitally mediated public service provision
200Jesper NielsenChristian Storm Pedersen28-10-2011Engineering algorithms for finding patterns in biological data
201Morten BohøjSusanne Bødker, Niels Olof Bouvin11-11-2011Engaging the citizens through collaborative, mobile and web-based public services
202Martin SimonsenChristian Storm Pedersen09-12-2011Efficient algorithms for tree reconstruction and prediction of molecular interactions
203Torben GodskKaj Grønbæk14-12-2011Methods and software architecture for activity recognition from position data - applied to cow activity recognition
204Jakob Løvstad FunderIvan Damgaard09-01-2012Cryptography with quantum mechanics
205Thomas ToftkjærKaj Grønbæk10-01-2012Accurate positioning of pedestrains in mixed indoor/outdoor settings - A particle filter approach to sensor and map fusion
206Jakob Langdal JensenKaj Grønbæk12-01-2012Supporting seamful development of positioning applications through model based translucent middleware
207Marcel Karl Sven KellerIvan Damgaard16-01-2012Theory and practice of cryptographic protocols -or- cryptography: will it blend?
208Morten Tranberg HansenNiels Olof Bouvin23-01-2012Low-power wireless sensor network infrastructures
209Johnni WintherMichael Schwartzbach22-03-2012Improving precision of types
210Niels Raabjerg MathiasenSusanne Bødker26-03-2012While working around security
211Allan RasmussonPeter Møller-Nielsen16-04-2012Contributions to computational stereology and parallel programming
212Thomas Dueholm HansenPeter Bro Miltersen07-09-2012Worst-case analysis of strategy iteration and the simplex method
213Lasse Kosetski DeleuranLars Arge17-09-2012Homotopic polygonal line simplification
214Jonas KölkerIvan Damgaard26-10-2012I/O-efficient multiparty computation, formulaic secret sharing and np-complete puzzles
215Freek Hendrik Van WalderveenLars Arge30-10-2012External memory graph algorithms and range searching data structures
216Peter S. NordholtIvan Damgård, Jesper Buus Nielsen08-04-2013New Approaches to Practical Secure Two-Party Computation
217Mathias Romme SchwarzAnders Møller23-04-2013Design and Analysis of Web Application Frameworks
218Simon Holm JensenAnders Møller23-04-2013Static Analysis for JavaScript
219Sigurd Torkel MeldgaardIvan Damgård23-04-2013Unconditionally Secure Protocols
220Matthias KornSusanne Bødker07-05-2013Situating Engagement: Ubiquitous Infrastructures for In-Situ Civic Engagement
221Kasper Green LarsenLars Arge17-05-2013Models and Techniques for Proving Data Structure Lower Bounds
222Morten Dahl JørgensenIvan Damgård19-06-2013Symbolic Analysis of Cryptographic Protocols: Models, Methods, and Soundness
223Mads Schaarup AndersenKaj Grønbæk03-09-2013Multi-dimensional Location Privacy - Concepts, Architecture, and User Interface
224Jakob Grauenkjær ThomsenErik Ernst27-09-2013Consistency in the World Wide Web: Specification, Verification, and Evaluation
225Valerio PastroIvan Bjerre Damgaard10-10-2013Zero-Knowledge Protocols and Multiparty Computation
226Rikke BendlinIvan Bjerre Damgaard11-10-2013Lattice-based Cryptography - Threshold Protocols and Multiparty Computation
227Rasmus Ibsen-JensenPeter Bro Miltersen04-11-2013Strategy complexity of two player, zero-sum games
228Casper Kejlberg-RasmussenGerth Stølting Brodal18-11-2013Dynamic Data Structures: The Interplay of Invariants and Algorithm Design
229Ian Steven ZernyOlivier Danvy09-12-2013The Interpretation and Inter-derivation of Small-step and Big-step Specifications
230Vaida CeikuteChristian S. Jensen10-12-2013Inferring Groups of Objects, Preferred Routes, and Facility Locations from Trajectories
231Angela ZottarelJesper Buus Nielsen14-01-2014Public-key Cryptography from Weaker Assumption
232Nervo Xavier Verdezoto DiasMorten Kyng24-02-2014Home-based Self-Care – Understanding and Designing Pervasive Technology to Support Care Management Work at Home
233Sarah ZakariasIvan Damgaard29-04-2014Secure Computation in the Preprocessing Model
234Manohar KaulChristian S. Jensen19-08-2014Enabling Advanced Path-Finding on Terrains and in Spatial Networks
235Pavel HubacekJesper Buus Nielsen08-09-2014Rationality in the Cryptographic Model
236Anders SkovsgaardChristian S. Jensen16-09-2014Indexing, Query Processing, and Clustering of Spatio-Temporal Text Objects
237Andreas Sand PedersenChristian N. S. Pedersen18-09-2014Engineering of Algorithms for Hidden Markov Models and Tree Distances
238Laura RadaelliChristian S. Jensen10-10-2014Enabling indoor location-based services
239Vikas GuptaChristian N. S. Pedersen24-10-2014Applied bioinformatics: Genome annotation and transcriptome analysis
240Morten RevsbækLars Arge14-11-2014Handling Massive and Dynamic Terrain Data
241Navid TalebanfardPeter Bro Miltersen17-11-2014On the Combinatorics of SAT and the Complexity of Planar Problems
242Qiang QuChristian S. Jensen03-12-2014Efficient Extraction of Content from Enriched Geospatial and Networked Data
243Asger FelthausAnders Møller09-01-2015Pointer Analysis for JavaScript Programming Tools
244Paula TataruChristian N. S. Pedersen23-01-2015Inference of population history and patterns from molecular data
245Casper Svenning JensenAnders Møller09-03-2015Automated Testing of Event-Driven Applications
246Jacob JohannsenOlivier Danvy13-03-2015On Computational Small Steps and Big Steps: Refocusing for Outermost Reduction
247Jakob TruelsenGerth S. Brodal17-04-2015Space Efficient Data Structures and External Terrain Algorithms
248Simina BranzeiPeter Bro Miltersen29-04-2015Computational Fair Division
249
Jungwoo Yang 
Lars Arge13-05-2015Efficient Algorithms for HandlingMassive Terrains
250Magnus MadsenAnders Møller19-05-215Static Analysis of Dynamic Languages
251
Barbora Micenkova 
Ira Assent22-05-2015Outlier Detection and Explanation for Domain Experts
252Aris Filos-RatsikasPeter Bro Miltersen05-08-2015Social Welfare in Algorithmic Mechanism Design Without Money
253Majken RasmussenMarianne Graves Petersen02-09-2015Changing the Shape of Interaction: Shape-changing Interfaces
254Thomas P JakobsenJesper Buus Nielsen22-09-2015

Practical Aspects of Secure Multiparty Computation

256

Jesper Asbjørn Sindahl Nielsen

Gerth Stølting Brodal

25-09-2015

Implicit Data Structures, Sorting, and Text Indexing

257

Yu Ma

Christian S. Jensen

13-10-2015

Enabling Time-Dependent Uncertain Edge Weights and Stochastic Routing in Road Networks

258

Pratyay Mukherjee

Jesper Buus Nielsen

19-10-2015

Protecting Cryptographic Memory against Tampering Attack

259

Bryan Wilkinson

Lars Arge

29-10-2015

Exploring the Problem Space of Orthogonal Range Searching

260

Søren Stiil Frederiksen

Peter Bro Miltersen

29-10-2015

Semi-algebraic Geometry for Stochastic Games

261

Tore Kasper Frederiksen

Jesper Buus Nielsen

29-10-2015

The Hitchhiker’s Guide to Garbled Circuits: Garbled Circuits and their Applications to Maliciously Secure Two-Party Protocols 

262

Thor Siiger Prentow

Mikkel Baun Kjærgaard, Kaj Grønbæk, and Henrik Blunck

16-11-2015

Spatio-Temporal Analysis of Human Activities in Indoor Environments through Mobile Sensing

263

Michael Lind Mortensen

Ira Assent

29-01-2016

Multi-Criteria Decision Support Queries in Exploratory & Open World Settings

264Rasmus W. ZakariasIvan Damgård22-03-2016Practical Secure Computation with Pre-Processing
265Aleš BizjakLars Birkedal15-05-2016On semantics and applications of guarded recursion
266Matthias NielsenKaj Grønbæk20-04-2016 

Interactive Visual Analytics of Big Data - a Web-Based Approach

267Esben AndreasenAnders Møller24-08-2016Designing abstractions for JavaScript program analysis
268Fabio StroccoAnders Møller08-09-2016Type Soundness in the Dart Programming Language
269Allan StisenKaj Grønbæk01-11-2016Mobile Sensing and Recognition of Human Activities to Support Work Coordination
270Mads Møller JensenKaj Grønbæk02-11-2016Game Mechanics and Bodily Interactions: Designing Interactive Technologies for Sports Training
271Carsten BaumIvan Damgård07-11-2016Towards More Efficient Secure Multiparty Computation in the Preprocessing Model
272Hans Bugge GrathwohlLars Birkedal06-12-2016Guarded Recursive Type Theory
273Tobias SonneKaj Grønbæk20-12-2016
Assistive Technologies to Empower Children with ADHD: Conceptual Framework and Technological Solutions
274Irene GiacomelliIvan Damgård04-01-2017New Applications of Secret-Sharing in Cryptography
275Kenneth S. BøghIra Assent01-02-2017Parallel Algorithms for Skyline and Skycube Computation on Multicore CPUs and GPUs
276Henrik KorsgaardSusanne Bødker20-02-2017Toward Place-Centric Computing : Making Place With Technology Together
277Antigoni PolychroniadouIvan Damgård07-03-2017On the Communication and Round Complexity of Secure Computation
278Bernardo M. DavidIvan Damgård05-05-2017A Framework For Efficient Homomorphic Universally Composable Commitments
279Ingo van DuijnPeyman Afshani12-09-2017Algorithmic Aspects of Arrangements and Incidences
280Roberto TrifilettiJesper Buus29-09-2017Amortizing Maliciously Secure Two-party Computation
281Anders LehmanNiels Olof Bouvin29-10-2017Modelling Emission of Pollutants from transportation using mobile sensing data: Advancing modelling of street level pollution and climate forcing gas emissions
282Edvin BerglinGerth Stølting Brodal29-11-2017Geometric covers, graph orientations, counter games
283Matúš TomleinKaj Grønbæk03-04-2018Context-Aware Integrability and Maintainability of Cyber-Physical Ecosystems: Tactics and Tools
284Christoffer Quist AdamsenAnders Møller23-05-2018

Automated Testing Techniques for Event-Driven and Dynamically Typed Software Applications

285Yujin ShinLars Arge28-09-2018External Memory Algorithms for Massive Terrains and Polygons
286Andreas FenderKaj Grønbæk23-10-2018Optimal Placement of Virtual Content in Physical Space
287Tiare FeuchnterKaj Grønbæk24-10-2018Designing for Hand Ownership in Interaction with Virtual and Augmented Reality
288Morten Krogh-JespersenLars Birkedal12-12-2018

Towards Modular Reasoning for Stateful and Concurrent Programs

289Mathias RavLars Arge18-01-2019

Event-Based Flood Risk Assessment on Massive Terrains

290Satrajit GhoshJesper Buus Nielsen15-03-2019Secure Computation Based on Oblivious Function Evaluation (not available online) 
291Sabine OechsnerIvan Bjerre Damgård28-03-2019Constructions and Proof Techniques for Secure Computation (not available online)
292Michael NielsenIvan Bjerre Damgård15-04-2019Correlated randomness in cryptographic protocols (not available online)
293Helene HaaghClaudio Orlandi13-08-2019Fine-grained Access and Secure Computation on Encrypted Data (not available online)
294Andreas MathisenKaj Grønbæk14-08-2019Collaborative Visual Analytics: Leveraging Mixed Expertise in Data Analysis 
295Kasper Buhl JakobsenMarianne Graves Petersen03-10-2019Graphene-based Interaction Design for Constructive Play: Tangible Music-making Technologies for Children
296Manuel Rafael CiosiciIra Assent08-10-2019Characterizing Word Representations For Natural Language Processing 
297Mark SimkinIvan Damgård22-10-2019Alice, Bits, and Bob
298Mathias PedersenAslan Askarov23-10-2019Enforcement of Timing-Sensitive Security Policies in Runtime Systems
299Konstantinos MampentzidisGerth Stølting Brodal24-10-2019Comparison and Construction of Phylogenetic Trees and Networks 
300Erik Krogh KristensenAnders Møller31-10-2019Automated Techniques for Creation and Maintenance of TypeScript Declaration Files
301Kristoffer Just Arndal AndersenLars Birkedal13-11-2019Automatic Program Verification (not available online)
302Lau SkorstengaardLars Birkedal14-11-2019

Formal Reasoning about Capability Machines 

303Alvis LoginsPanagiotis Karras30-03-2020Resource Allocation in Networks
304Jens Emil GrønbækMarianne Graves Petersen06-05-2020Rethinking Proxemics - Designing Interactive Technologies for Co-located Collaboration
305Jan NeerbekIra Assent01-09-2020Sensitive Information Detection: Recursive Neural Networks for Encoding Context
306Ida Larsen-LedetSusanne Bødker06-10-2020More Than Writing Text: Multiplicity in Collaborative Academic Writing
307Casper Benjamin FreksenKasper Green Larsen09-11-2020A song of Johnson and Lindenstrauss
308Anders Peter Kragh DalskovClaudio Orlandi16-11-2020Cats or Croissants? Techniques for Secure Inference
309Benjamin Barslev NielsenAnders Møller29-01-2021Static Analysis for Node.js
310Anke van OosterhoutSusanne Bødker23-02-2021A Design Perspective on Force Feedback
311Mirzel AvdicSusanne Bødker20-04-2021Physical Actuation as an Alternative Approach to the Intelligibility of Smart Speakers
312Nathalie Alexandra BressaSusanne Bødker03-08-2021

Data In Situ: a Design Approach for Situated Visualization

313Troels RasmussenKaj Grønbæk04-08-2021

Supporting Tailorability and Awareness for Remote Assistance in Large Industrial Task Spaces

314Simon Aagaard EnniIra Assent12-08-2021

Deliberation and Dissemination in Machine Learning