Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Damgård, I. B., David, B. M., Giacomelli, I. & Nielsen, J. B. (2014). Compact VSS and Efficient Homomorphic UC Commitments. I P. Sarkar & T. Iwata (red.), Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (s. 213-232 ). Springer VS. https://doi.org/10.1007/978-3-662-45608-8_12
Abam, M. A., Daneshpajouh, S., Deleuran, L., Ehsani, S. & Ghodsi, M. (2014). Computing homotopic line simplification. Computational Geometry, 47(7), 728-739. https://doi.org/10.1016/j.comgeo.2014.02.002
Afshani, P., Sheng, C., Tao, Y. & Wilkinson, B. T. (2014). Concurrent range reporting in two-dimensional space. I C. Chekuri (red.), Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms: SODA 2014; Portland, OR; United States; 5 January 2014 through 7 January 2014 (s. 983-994). Association for Computing Machinery. http://www.scopus.com/inward/record.url?scp=84902105500&partnerID=8YFLogxK
Faust, S., Mukherjee, P., Nielsen, J. B. & Venturi, D. (2014). Continuous Non-malleable Codes. I Y. Lindell (red.), Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings (s. 465-488). Springer. https://doi.org/10.1007/978-3-642-54242-8_20
Hubacek, P. & Park, S. (2014). Cryptographically Blinded Games: Leveraging Players' Limitations for Equilibria and Profit. I M. Babaioff (red.), 15th ACM Conference on Economics and Computation, EC '14 (s. 207-208). Association for Computing Machinery. https://doi.org/10.1145/2600057.2602903
Hansen, T. D., Kaplan, H. & Zwick, U. (2014). Dantzig's pivoting rule for shortest paths, deterministic MDPs, and minimum cost to time ratio cycles. I C. Chekuri (red.), Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms (s. 847-860). Association for Computing Machinery. http://dl.acm.org/citation.cfm?id=2634074.2634137&coll=DL&dl=ACM&CFID=595831098&CFTOKEN=20714772
Verdezoto, N., Nunes, F., Grönvall, E., Fitzpatrick, G., Storni, C. & Kyng, M. (2014). Designing self-care for everyday life. I V. Roto & J. Häkkilä (red.), NordiCHI '14, Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational (s. 821-824 ). Association for Computing Machinery. https://doi.org/10.1145/2639189.2654837
Jensen, M. M., Rasmussen, M. K. & Grønbæk, K. (2014). Design sensitivities for interactive sport-training games. I R. Wakkary & S. Harrison (red.), Proceedings of the 2014 Conference on Designing Interactive Systems, DIS '14 (s. 685-694). Association for Computing Machinery. https://doi.org/10.1145/2598510.2598560
Andreasen, E. & Møller, A. (2014). Determinacy in Static Analysis of jQuery. I A. Black & T. Millstein (red.), Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages & Applications, OOPSLA '14 (s. 17-31 ). Association for Computing Machinery. https://doi.org/10.1145/2660193.2660214
Afshani, P., Chan, T. M. & Tsakalidis, K. (2014). Deterministic Rectangle Enclosure and Offline Dominance Reporting on the RAM. I J. Esparza , P. Fraigniaud, T. Husfeldt & E. Koutsoupias (red.), Automata, Languages, and Programming: 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part I (s. 77-88 ). Springer VS. https://doi.org/10.1007/978-3-662-43948-7_7
Dang, X.-H., Assent, I., Ng, R. T., Zimek, A. & Schubert, E. (2014). Discriminative features for identifying and interpreting outliers. I Proceedings, 2014 IEEE 30th International Conference on Data Engineering (ICDE) (s. 88-99). Artikel 6816642 IEEE Computer Society Press. https://doi.org/10.1109/ICDE.2014.6816642
Wüstenberg, M., Blunck, H., Grønbæk, K. & Kjærgaard, M. B. (2014). Distinguishing Electric Vehicles from Fossil-Fueled Vehicles with Mobile Sensing. I M. Gabor & R. Zhang (red.), 15th IEEE International Conference on Mobile Data Management (MDM): Proceedings (s. 211 - 220 (vol.1)). IEEE. https://doi.org/10.1109/MDM.2014.32
Chung, K. M., Pettie, S. & Su, H. H. (2014). Distributed algorithms for the Lovász Local Lemma and graph coloring. I Proceedings of the Annual ACM Symposium on Principles of Distributed Computing (s. 134-143). Association for Computing Machinery. https://doi.org/10.1145/2611462.2611465
Xue, H., Kelmann, P., Inati, S., Sørensen, T. S. & Hansen, M. (2014). Distributed Computing on Gadgetron: A new paradigm for MRI reconstruction: no. 1579. Poster-session præsenteret på Joint Annual Meeting ISMRM-ESMRMB, Milan, Italien. http://www.ismrm.org/14/program_files/TP05.htm
Derczynski, L., Field, C. V. & Bøgh, K. S. (2014). DKIE: Open Source Information Extraction for Danish. I S. Wintner, M. Tadia & B. Babych (red.), Proceedings of the Demonstrations at the 14th Conference of the European Chapter of the Association for Computational Linguistics (s. 61-64). Association for Computational Linguistics. http://anthology.aclweb.org/E/E14/E14-2.pdf#page=75
Stølting Brodal, G., Kaporis, A. C., Papadopoulos, A. N., Sioutas, S., Tsakalidis, K. & Tsichlas, K. (2014). Dynamic 3-sided planar range queries with expected doubly-logarithmic time. Theoretical Computer Science, 526(March), 58-74. https://doi.org/10.1016/j.tcs.2014.01.014
Qu, Q. (2014). Efficient Extraction of Content from Enriched Geospatial and Networked Data. Department of Computer Science, University of Aarhus.
Faust, S., Mukherjee, P., Venturi, D. & Wichs, D. (2014). Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits. I P. Q. Nguyen & E. Oswald (red.), Advances in Cryptology – EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings (s. 111-128 ). Springer. https://doi.org/10.1007/978-3-642-55220-5_7
Qu, Q., Liu, S., Yang, B. & Jensen, C. S. (2014). Efficient Top-k Locality Search for Co-located Spatial Web Objects. I M. Gaber & R. Zhang (red.), 15th IEEE International Conference on Mobile Data Management (MDM): Proceedings (s. 269-278 (vol.1)). IEEE Computer Society Press. https://doi.org/10.1109/MDM.2014.39
Breinbjerg, M., Fritsch, J. & Bertelsen, O. W. (2014). Ekkomaten: Critical Engagement through Auditory Participation. Afhandling præsenteret på Urban Soundscapes & Critical Citizenship, Limerick, Irland.
Kaul, M. (2014). Enabling Advanced Path-Finding on Terrains and in Spatial Networks. Department of Computer Science, Aarhus University.
Radaelli, L. (2014). Enabling Indoor Location-Based Services. Department of Computer Science, Aarhus University.
Ma, M., Yang, B. & Jensen, C. S. (2014). Enabling Time-Dependent Uncertain Eco-Weights For Road Networks. I M. A. Nascimento & M. Renz (red.), Proceedings of the 1st International ACM Workshop on Managing and Mining Enriched Geo-spatial Data: GeoRich 2014 Artikel 1 Association for Computing Machinery. https://doi.org/10.1145/2619112.2619113
Kinch, S., Grönvall, E., Petersen, M. G. & Rasmussen, M. K. (2014). Encounters on a Shape-changing Bench: Exploring atmospheres and social behaviour in situ. I A. Butz & S. Greenberg (red.), Proceedings of the 8th International Conference on Tangible, Embedded and Embodied Interaction, TEI '14 (s. 233-240 ). Association for Computing Machinery. https://doi.org/10.1145/2540930.2540947
Sand, A. (2014). Engineering of Algorithms for Hidden Markov models and Tree Distances. Department of Computer Science, Aarhus University.
Wei, Z. & Yi, K. (2014). Equivalence between priority queues and sorting in external memory. I A. S. Schulz & D. Wagner (red.), Algorithms - ESA 2014: 22th Annual European Symposium, Wroclaw, Poland, September 8-10, 2014. Proceedings (Bind 8737 , s. 830-841). Springer. https://doi.org/10.1007/978-3-662-44777-2_68
Prentow, T. S., Blunck, H., Grønbæk, K. & Kjærgaard, M. B. (2014). Estimating Common Pedestrian Routes through Indoor Path Networks using Position Traces. I M. Gaber & R. Zhang (red.), 15th IEEE International Conference on Mobile Data Management: Proceedings (s. 43-48 (vol.1)). IEEE Press. https://doi.org/10.1109/MDM.2014.11
Belazzougui, D., Brodal, G. S. & Nielsen, J. A. S. (2014). Expected linear time sorting for word size Ω(log2 n log log n). I R. Ravi & I. L. Gørtz (red.), Algorithm Theory – SWAT 2014: 14th Scandinavian Symposium and Workshops, Copenhagen, Denmark, July 2-4, 2014. Proceedings (s. 26-37). Springer VS. https://doi.org/10.1007/978-3-319-08404-6_3
Afshani, P. (2014). Fast Computation of Output-Sensitive Maxima in a Word RAM. I C. Chekuri (red.), Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms: SODA 2014; Portland, OR; United States; 5 January 2014 through 7 January 2014 (s. 1414-1423). Association for Computing Machinery. http://www.scopus.com/inward/record.url?scp=84902105500&partnerID=8YFLogxK
Frederiksen, T. K., Jakobsen, T. P. & Nielsen, J. B. (2014). Faster Maliciously Secure Two-Party Computation Using the GPU. I M. Abdalla & R. D. Prisco (red.), Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 358-379 ). Springer. https://doi.org/10.1007/978-3-319-10879-7_21
Jakobsen, T. P., Nielsen, J. B. & Orlandi, C. (2014). Framework for Outsourcing of Secure Computation. I G.-J. Ahn , A. Oprea & R. Safavi-Naini (red.), Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14 (s. 81-92 ). Association for Computing Machinery. https://doi.org/10.1145/2664168.2664170
Zimek, A., Assent, I. & Vreeken , J. (2014). Frequent Pattern Mining Algorithms for Data Clustering. I C. C. Aggarwal & J. Han (red.), Frequent Pattern Mining (s. 403-423). Springer. https://doi.org/10.1007/978-3-319-07821-2_16
Dawson, J. E., Clouston, R., Goré, R. & Tiu, A. (2014). From display calculi to deep nested sequent calculi: Formalised for full intuitionistic linear logic. I J. Diaz, I. L. Lanese & D. Sangiorgi (red.), Theoretical Computer Science: 8th IFIP TC 1/WG 2.2 International Conference, TCS 2014, Rome, Italy, September 1-3, 2014. Proceedings (Bind 8705 , s. 250-264). Springer VS. https://doi.org/10.1007/978-3-662-44602-7_20
Danvy, O. & Johannsen, J. (2014). From Outermost Reduction Semantics to Abstract Machine. I G. Gupta & R. Ricardo Peña (red.), 23rd International Symposium on Logic-Based Program Synthesis and Transformation, LOPSTR 2013: Revised Selected Papers (s. 91-98). Springer VS. https://doi.org/10.1007/978-3-319-14125-1
Sørensen, J. L., Knudsen, M., Hansen, F. T., Olesen, C., Romans Fuertes, P., Lee, T. V., Søndergaard, T. E., Pedersen, C. N. S., Brodersen, D. E. & Giese, H. (2014). Fungal NRPS-dependent siderophores: From function to prediction. I J.-F. Martin, C. Garcia-Estrada & S. Zeilinger (red.), Biosynthesis and Molecular Genetics of Fungal Secondary Metabolites (s. 317-339). Springer. https://doi.org/10.1007/978-1-4939-1191-2_15
Bjørn, P., Bardram, J., Avram, G., Bannon, L., Boden, A., Redmiles, D., De Souza, C. R. B. & Wulf, V. (2014). Global software development in a CSCW perspective. I Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW (s. 301-304). Association for Computing Machinery. https://doi.org/10.1145/2556420.2558863
Manikas, K., Hansen, K. M. & Kyng, M. (2014). Governance mechanisms for healthcare apps. I U. Zdun (red.), Proceedings of the 2014 European Conference on Software Architecture Workshops, ECSAW '14 Artikel 10 Association for Computing Machinery. https://doi.org/10.1145/2642803.2642813
Silvestri, C., Lettich, F., Orlando, S. & Jensen, C. S. (2014). GPU-based computing of repeated range queries over moving objects. I Proceedings - 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014 (s. 640-647). Artikel 6787342 IEEE Computer Society Press. https://doi.org/10.1109/PDP.2014.27