Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Zerny, I. & Danvy, O. (2013). A synthetic operational account of call-by-need evaluation. I R. Peña & T. Schrijvers (red.), Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming, PPDP '13 (s. 97-108). Association for Computing Machinery. https://doi.org/10.1145/2505879.2505898
Jensen, C. S., Prasad, M. R. & Møller, A. (2013). Automated Testing with Targeted Event Sequence Generation. I M. Pezzè & M. Harman (red.), International Symposium on Software Testing and Analysis (ISSTA), 2013: Proceedings (s. 67-77). Association for Computing Machinery. https://doi.org/10.1145/2483760.2483777
Schulz, H.-J., Hadlak, S. & Schumann, H. (2013). A Visualization Approach for Cross-level Exploration of Spatiotemporal Data. I S. Lindstaedt & M. Granitzer (red.), Proceedings of the International Conference on Knowledge Management and Knowledge Technologies (i-Know'13) Artikel 2 Association for Computing Machinery. https://doi.org/10.1145/2494188.2494199
Madsen, O. L. (2013). Back to the future: SIMULA style concurrent objects. I AGERE! 2013 - Proceedings of the 2013 ACM Workshop on Programming Based on Actors, Agents, and Decentralized Control (s. 145-146). Association for Computing Machinery. https://doi.org/10.1145/10.1145/2541329.2541347
Grönvall, E. & Verdezoto, N. (2013). Beyond Self-Monitoring: Understanding Non-functional Aspects of Home-based Healthcare Technology. I F. Mattern & S. Santini (red.), Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing, UbiComp '13 (s. 587-596 ). Association for Computing Machinery. https://doi.org/10.1145/2493432.2493495
Bødker, S. (2013). Boundaries, work and the rest. Afhandling præsenteret på Workshop at CSCW at the Boundary of Work and Life , Paphos, Cypern. http://cscwworkandlife.wordpress.com/
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2013). Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier. I K. Sako & P. Sarkar (red.), Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (s. 140-160 ). Springer VS. https://doi.org/10.1007/978-3-642-42045-0_8
Kaul, M., Yang, B. & Jensen, C. S. (2013). Building Accurate 3D Spatial Networks to Enable Next Generation Intelligent Transportation Systems. I IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1 ) (s. 137 - 146 ). IEEE. https://doi.org/10.1109/MDM.2013.24
Bødker, S. & Grönvall, E. (2013). Calendars: Time coordination and overview in families and beyond. I O. W. Bertelsen, L. Ciolfi, M. A. Grasso & G. A. Papadopoulos (red.), ECSCW 2013 : Proceedings of the 13th European Conference on Computer Supported Cooperative Work, 2013 (s. 63-81). Springer VS. https://doi.org/10.1007/978-1-4471-5346-7_4
Vitanov, A., Dupont-Dupuis, F., Tomamichel, M. & Renner, R. (2013). Chain rules for smooth min-and max-entropies. I E E E Transactions on Information Theory, 59(5), 2603-2612. https://doi.org/10.1109/TIT.2013.2238656
Sükösd, Z., Knudsen, B., Anderson, J. WJ., Novák, A., Kjems, J. & Pedersen, C. N. S. (2013). Characterising RNA secondary structure space using information entropy. BMC Bioinformatics, 14 (Suppl 2), 1-9. Artikel S22. https://doi.org/10.1186/1471-2105-14-S2-S22
Arge, L., Goodrich, M. T. & Walderveen, F. V. (2013). Computing betweenness centrality in external memory. I Proceedings, 2013 IEEE International Conference on Big Data (s. 368 - 375 ). IEEE. https://doi.org/10.1109/BigData.2013.6691597
Tsirogiannis, C. & Sandel, B. S. (2013). Computing the Skewness of the Phylogenetic Mean Pairwise Distance in Linear Time. I A. Darling & J. Stoye (red.), Algorithms in Bioinformatics: 13th International Workshop, WABI 2013, Sophia Antipolis, France, September 2-4, 2013. Proceedings (s. 170-184). Springer VS. https://doi.org/10.1007/978-3-642-40453-5_14
Rasmusson, A., Sørensen, T. S. & Ziegler, G. (2013). Connected Components Labeling on the GPU with Generalization to Voronoi Diagrams and Signed Distance Fields. I G. Bebis et al. (red.), Advances in Visual Computing: 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part I (s. 206-215). Springer VS. https://doi.org/10.1007/978-3-642-41914-0_21
Damgård, I. B. & Zakarias, S. (2013). Constant-overhead secure computation of Boolean circuits using preprocessing. I A. Sahai (red.), Theory of Cryptography: 10th TCC 2013. Proceedings (s. 621-641). Springer VS. https://doi.org/10.1007/978-3-642-36594-2_35
John, M., Schulz, H.-J., Schumann, H., Uhrmacher, A. M. & Unger, A. (2013). Constructing and visualizing chemical reaction networks from pi-calculus models. Formal Aspects of Computing, 25(5), 723-742. https://doi.org/10.1007/s00165-011-0209-0
Schmidt, K. & Bannon, L. J. (2013). Constructing CSCW: The First Quarter Century. Computer Supported Cooperative Work (CSCW): The Journal of Collaborative Computing and Work Practices, 22(4-6), 345-372. https://doi.org/10.1007/s10606-013-9193-7
Moreira, J. M. M., Jensen, C. S., Dias, P. & Mesquita, P. (2013). Creating data representations for moving objects with extent from images. I Presented at the COST MOVE Workshop at Moving Objects at Sea, Brest, France, June 28–29, 2013
Bannon, L. J. & Schmidt, K. (red.) (2013). CSCW: The First Quarter Century. Computer Supported Cooperative Work (CSCW): The Journal of Collaborative Computing and Work Practices, 22(4-6), 345-715. http://link.springer.com/journal/10606/22/4/page/1
Verbin, E. & Yu, W. (2013). Data structure lower bounds on random access to grammar-compressed strings. I J. Fischer & P. Sanders (red.), Combinatorial Pattern Matching: 24th Annual Symposium, CPM 2013, Bad Herrenalb, Germany, June 17-19, 2013. Proceedings (s. 247-258). Springer VS. https://doi.org/10.1007/978-3-642-38905-4_24
Szehr, O., Dupont-Dupuis, F., Tomamichel, M. & Renner, R. (2013). Decoupling with unitary approximate two-designs. New Journal of Physics, 15(5). https://doi.org/10.1088/1367-2630/15/5/053022
Bannon, L. J. & Ehn, P. (2013). Design: design matters in participatory design. I J. Simonsen & T. Robertson (red.), Routledge International Handbook of Participatory Design (s. 37-63). Routledge.
Schwarz, M. R. (2013). Design and Analysis of Web Application Frameworks. Datalogisk Institut, Aarhus Universitet.
Andersen, O., Jensen, C. S., Torp, K. & Yang, B. (2013). EcoTour: Reducing the Environmental Footprint of Vehicles Using Eco-Routes. I IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1) (s. 338 - 340 ). IEEE. https://doi.org/10.1109/MDM.2013.50
Korn, M., Colombino, T. & Lewkowicz, M. (red.) (2013). ECSCW 2013 Adjunct Proceedings: The 13th European Conference on Computer Supported Cooperative Work, 21-25 September 2013, Paphos, Cyprus. Department of Computer Science, Aarhus University. Daimi Report Series (DAIMI PB) Nr. 596
Li, X., Ceikute, V., Jensen, C. S. & Tan, K.-L. (2013). Effective Online Group Discovery in Trajectory Databases. I E E E Transactions on Knowledge & Data Engineering, 25(12), 2752 - 2766 . https://doi.org/10.1109/TKDE.2012.193
Feldthaus, A., Schäfer, M., Sridharan, M., Dolby, J. & Tip, F. (2013). Efficient construction of approximate call graphs for JavaScript IDE services. I D. Notkin, B. H. C. Cheng & K. Pohl (red.), Proceedings of the 2013 International Conference on Software Engineering, ICSE '13 (s. 752-761 ). IEEE Communications Society. http://dl.acm.org.ez.statsbiblioteket.dk:2048/citation.cfm?id=2486887&CFID=280253056&CFTOKEN=11487082
Agarwal, P. K., Yang, J., Arge, L., Govindarajan, S. & Yi, K. (2013). Efficient external memory structures for range-aggregate queries. Computational Geometry, 46(3), 358-370. https://doi.org/10.1016/j.comgeo.2012.10.003
Bøgh, K. S., Assent, I. & Magnani, M. (2013). Efficient GPU-based skyline computation. I R. Johnson & A. Kemper (red.), Proceedings of the Ninth International Workshop on Data Management on New Hardware , DaMoN '13 Artikel 5 Association for Computing Machinery. https://doi.org/10.1145/2485278.2485283
Cohen, G., Damgård, I. B., Ishai, Y., Kölker, J., Miltersen, P. B., Raz, R. & Rothblum, R. D. (2013). Efficient multiparty protocols via log-depth threshold formulae. I R. Canetti & J. A. Garay (red.), Advances in Cryptology – CRYPTO 2013: 33rd Annual Conference. Proceedings, Part II (s. 185-202). Springer VS. https://doi.org/10.1007/978-3-642-40084-1_11
Midtgaard, J., Ramsay, N. & Larsen, B. (2013). Engineering Definitional Interpreters. I T. Schrijvers & R. Peña (red.), Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming , PPDP '13 (s. 121-132). Association for Computing Machinery. https://doi.org/10.1145/2505879.2505894
Mottin, D., Palpanas, T. & Velegrakis, Y. (2013). Entity ranking using click-log information. Intelligent Data Analysis, 17(5), 837-856.
Branzei, S., Caragiannis, I., Kurokawa, D. & Procaccia, A. (2013). Equilibria of Generalized Cut and Choose Protocols. (1307.2225v1 udg.) arxiv.org. http://arxiv.org/abs/1307.2225
Branzei, S. & Miltersen, P. B. (2013). Equilibrium Analysis in Cake Cutting. I M. Gini & O. Shehory (red.), Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems , AAMAS '13 (s. 327-334 ). Association for Computing Machinery. http://dl.acm.org/citation.cfm?id=2484920.2484974&coll=DL&dl=ACM&CFID=340403434&CFTOKEN=84711969
Korn, M., Polli, A. M. & Klokmose, C. N. (2013). Experiences from a Real-Time Mobile Collaborative Writing System in an Art Gallery. Afhandling præsenteret på International Workshop on Designing Mobile Face-to-Face Group Interactions , Paphos, Cypern. http://groupinteractions.wordpress.com/