Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Branzei, S. & Miltersen, P. B. (2013). Equilibrium Analysis in Cake Cutting. I M. Gini & O. Shehory (red.), Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems , AAMAS '13 (s. 327-334 ). Association for Computing Machinery. http://dl.acm.org/citation.cfm?id=2484920.2484974&coll=DL&dl=ACM&CFID=340403434&CFTOKEN=84711969
Korn, M., Polli, A. M. & Klokmose, C. N. (2013). Experiences from a Real-Time Mobile Collaborative Writing System in an Art Gallery. Afhandling præsenteret på International Workshop on Designing Mobile Face-to-Face Group Interactions , Paphos, Cypern. http://groupinteractions.wordpress.com/
Micenková, B., Ng, R. T., Dang, X.-H. & Assent, I. (2013). Explaining outliers by subspace separability. I H. Xiong, G. Karypis, B. Thuraisingham, D. Cook & X. Wu (red.), Proceedings, IEEE 13th International Conference on Data Mining (ICDM 2013) (s. 518 - 527 ). IEEE Press. http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6724379
Nielsen, M., Kjærgaard, M. B. & Grønbæk, K. (2013). Exploring Interaction Techniques and Task Types for Direct-Touch as Input Modality. Poster-session præsenteret på VAST Infovis Scivis, Atlanta, Georgia, USA.
Sonne, T. & Grønbæk, K. (2013). Exploring New Potentials in Preventing Unhealthy Computer Habits. I W. E. Mackay, S. Brewster & S. Bødker (red.), CHI '13 Extended Abstracts on Human Factors in Computing Systems, CHI EA '13 (s. 487-492 ). Association for Computing Machinery. https://doi.org/10.1145/2468356.2468442
Jensen, M. M., Rasmussen, M. & Grønbæk, K. (2013). Exploring Opponent Formats: Game Mechanics for Computer-Supported Physical Games. I J. C. Anacleto, E. W. G. Clua, F. S. Correa da Silva, S. Fels & H. S. Yang (red.), Entertainment Computing - ICEC 2013: 12th International Conference, ICEC 2013, São Paulo, Brazil, October 16-18, 2013. Proceedings (Bind 8215, s. 48-60). Springer VS. https://doi.org/10.1007/978-3-642-41106-9_6
Nørgaard, M., Merritt, T. R., Rasmussen, M. & Petersen, M. G. (2013). Exploring the design space of shape-changing objects: imagined physics. I Proceedings of the 6th International Conference on Designing Pleasurable Products and Interfaces (s. 251-260 ). Association for Computing Machinery. https://doi.org/10.1145/2513506.2513533
Chen, S., Scheder, D. A., Talebanfard, N. & Tang, B. (2013). Exponential Lower Bounds for the PPSZ k-SAT Algorithm. I Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '13 (s. 1253-1263). Society for Industrial and Applied Mathematics. http://knowledgecenter.siam.org/0236-000027/0236-000027/1
Branzei, S., Procaccia, A. & Zhang, J. (2013). Externalities in Cake Cutting. Proceedings of the International Joint Conference on Artificial Intelligence, 13.
Magnani, M., Montesi, D. & Rossi, L. (2013). Factors enabling information propagation in a Social Network Site. I T. Özyer , J. Rokne , G. Wagner & A. H. P. Reuser (red.), The Influence of Technology on Social Network Analysis and Mining (s. 411-426 ). Springer. https://doi.org/10.1007/978-3-7091-1346-2_18
Frederiksen, T. K. & Nielsen, J. B. (2013). Fast and maliciously secure two-party computation using the GPU. I Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceeding (s. 339-356). Springer VS. https://doi.org/10.1007/978-3-642-38980-1_21
Pettie, S. & Su, H.-H. (2013). Fast distributed coloring algorithms for triangle-free graphs. I F. Fomin, R. Freivalds, M. Kwiatkowska & D. Peleg (red.), Automata, Languages, and Programming: 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II (s. 681-693). Springer Publishing Company. https://doi.org/10.1007/978-3-642-39212-2_59
Schmidt, H. T., Thomas, R. D., Gatchell, M., Rosen, S., Reinhed, P., Lofgren, P., Brannholm, L., Blom, M., Bjorkhage, M., Backstrom, E., Alexander, J. D., Leontein, S., Hanstorp, D., Zettergren, H., Liljeby, L., Kallberg, A., Simonsson, A., Hellberg, F., Mannervik, S. ... Cederquist, H. (2013). First storage of ion beams in the Double Electrostatic Ion-Ring Experiment: DESIREE. Review of Scientific Instruments, 84(5), Artikel 055115. https://doi.org/10.1063/1.4807702
Magnani, M. & Rossi, L. (2013). Formation of multiple networks. I A. M. Greenberg , W. G. Kennedy & N. D. Bos (red.), Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013. Proceedings (s. 257-264). Springer Publishing Company. https://doi.org/10.1007/978-3-642-37210-0_28
Bødker, S. & Klokmose, C. N. (2013). From Persona to Techsona. I P. Kotzé, G. Marsden , G. Lindgaard, J. Wesson & M. Winckler (red.), Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part IV (s. 842-349). Springer VS. https://doi.org/10.1007/978-3-642-40498-6_26
Magnani, M. & Assent, I. (2013). From stars to galaxies: skyline queries on aggregate data. I G. Guerrini & N. W. . Paton (red.), International Conference on Extending Database Technology (s. 477-488 ). Association for Computing Machinery. https://doi.org/10.1145/2452376.2452432
Annenkov, D. V. & Cherkashin, E. A. (2013). Generation technique for Django MVC web framework using the stratego transformation language. I 2013 36th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (s. 1084-1087)
Simonsen, M., Christensen, M. H., Thomsen, R. & Pedersen, C. N. S. (2013). GPU-Accelerated High-Accuracy Molecular Docking using Guided Differential Evolution. I S. tsutsui & P. Collet (red.), Massively Parallel Evolutionary Computation on GPGPUs Springer Publishing Company.
Lindell, Y., Nissim, K. & Orlandi, C. (2013). Hiding the Input-Size in Secure Two-Party Computation. I K. Sako & P. Sarkar (red.), Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (Bind 8197, s. 421-440). Springer VS. https://doi.org/10.1007/978-3-642-41019-2_6
Verdezoto, N. (2013). Home-based Healthcare Technology: Understanding and Designing to Support the Care Management Work at Home. Abstract fra IEEE International Conference on Healthcare Informatics, Philadelphia, USA.
Branzei, S., Caragiannis, I., Morgenstern, J. & Procaccia, A. (2013). How Bad is Selfish Voting? I Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence AAAI Press. http://www.aaai.org/Library/AAAI/aaai13contents.php
Bendlin, R., Peikert, C. & Krehbiel, S. (2013). How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE. I 11th International Conference on Applied Cryptography and Network Security, ACNS 2013 (Bind 7954, s. 218-236). Springer VS. https://doi.org/10.1007/978-3-642-38980-1_14
Baniukevic, A., Jensen, C. S. & Lu, H. (2013). Hybrid Indoor Positioning with Wi-Fi and Bluetooth: Architecture and Performance . I IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1 ) (s. 207 - 216 ). IEEE. https://doi.org/10.1109/MDM.2013.30
Radaelli, L., Sabonis, D., Lu, H. & Jensen, C. S. (2013). Identifying Typical Movements Among Indoor Objects: Concepts and Empirical Study. I IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1 ) (s. 197 - 206 ). IEEE. https://doi.org/10.1109/MDM.2013.29
Kjærgaard, M. B., Krarup, M. V., Stisen, A., Prentow, T. S., Blunck, H., Grønbæk, K. & Jensen, C. S. (2013). Indoor Positioning using Wi-Fi: How Well Is the Problem Understood?. Afhandling præsenteret på International Conference on Indoor Positioning and Indoor Navigation, Montbéliard, Frankrig.
Athukorala, K., Hoggan, E., Lehtiö, A., Ruotsalo, T. & Jacucci, G. (2013). Information-seeking behaviors of computer scientists: Challenges for electronic literature search tools. Proceedings of the Association for Information Science and Technology, 50(1), 1-11.
Ernst, E. (2013). Inheritance versus parameterization. I M. Markku (red.), Proceedings of the 5th Workshop on MechAnisms for SPEcialization, Generalization and inHerItance, MASPEGHI '13 (s. 26-29 ). Association for Computing Machinery. https://doi.org/10.1145/2489828.2489832
Jensen, M. M., Grønbæk, K., Rasmussen, M. K., Thomassen, N., Andersen, J. & Nielsen, J. (2013). Interactive football training based on rebounders with hit position sensing and audio/light feedback. Abstract fra International Symposium on Computer Science in Sports, Istanbul, Tyrkiet.
Brabrand, C., Ribeiro, M., Tolêdo, T., Winther, J. & Borba, P. (2013). Intraprocedural dataflow analysis for software product lines. I G. T. Leavens , S. Chiba & É. Tanter (red.), Transactions on Aspect-Oriented Software Development X (s. 73-108). Springer VS. https://doi.org/10.1007/978-3-642-36964-3_3
Pierce, J., Strengers, Y., Sengers, P. & Bødker, S. (2013). Introduction to the Special Issue on Practice-Oriented Approaches to Sustainable HCI. ACM Transactions on Computer-Human Interaction, 20(4), Artikel 20. https://doi.org/10.1145/2494260
Kejlberg-Rasmussen, C., Tao, Y., Tsakalidis, K., Tsichlas, K. & Yoon, J. (2013). I/O-Efficient Planar Range Skyline and Attrition Priority Queues. I R. Hull & W. Fan (red.), Proceedings of the 32nd symposium on Principles of database systems , PODS '13 (s. 103-114 ). Association for Computing Machinery. https://doi.org/10.1145/2463664.2465225
Yang, B., Fantini, E. N. & Jensen, C. S. (2013). iPark: Identifying Parking Spaces from Trajectories. I G. Guerrini & N. W. Paton (red.), Proceedings of The 16th International Conference on Extending Database Technology: EDBT 2013 (s. 705-708 ). Association for Computing Machinery. https://doi.org/10.1145/2452376.2452459
Rasmussen, M. K., Grönvall, E., Kinch, S. & Petersen, M. G. (2013). It’s alive, it’s magic, it’s in love with you: Opportunities, Challenges and Open Questions for Actuated Interfaces. I H. Shen, R. Smith, J. Paay, P. Calder & T. Wyeld (red.), Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration. OzCHI '13 (s. 63-72). Association for Computing Machinery. https://doi.org/10.1145/2541016.2541033
Georgiev, I., Křivánek, J., Hachisuka, T., Nowrouzezahrai , D. & Jarosz, W. (2013). Joint importance sampling of low-order volumetric scattering. A C M Transactions on Graphics, (6), Artikel 164 . https://doi.org/10.1145/2508363.2508411
Dalsgaard, P. & Eriksson, E. (2013). Large-scale participation: A case study of a participatory approach to developing a new public library. I CHI 2013: Changing Perspectives, Conference Proceedings - The 31st Annual CHI Conference on Human Factors in Computing Systems (s. 399-408) https://doi.org/10.1145/2470654.2470713
Bendlin, R. (2013). Lattice-based Cryptography: Threshold Protocols and Multiparty Computation. Department of Computer Science, Aarhus University.
Hazay, C., López-Alt, A., Wee, H. & Wichs, D. (2013). Leakage-resilient cryptography from minimal assumptions. I T. Johansson & P. Nguyen (red.), Leakage-Resilient Cryptography from Minimal Assumptions: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (s. 160-176). Springer VS. https://doi.org/10.1007/978-3-642-38348-9_10
Hubacek, P., Nielsen, J. B. & Rosen, A. (2013). Limits on the Power of Cryptographic Cheap Talk. I R. Canetti & J. A. Garay (red.), Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I (s. 277-297 ). Springer VS. https://doi.org/10.1007/978-3-642-40041-4_16