Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Wei, Z. & Yi, K. (2013). The Space Complexity of 2-Dimensional Approximate Range Counting. I S. Sanjeev Khanna (red.), Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA (s. 252-264). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611973105.19
Brewer, R. S., Xu, Y., Lee, G. E., Katchuck, M., Moore, C. A. & Johnson, P. M. (2013). Three Principles for the Design of Energy Feedback Visualizations. International Journal On Advances in Intelligent Systems, 6(3 & 4), 188-198. http://csdl.ics.hawaii.edu/techreports/2013/13-05/13-05.pdf
Danvy, O. & Zerny, I. (2013). Three Syntactic Theories for Combinatory Graph Reduction. A C M Transactions on Computational Logic, 14(4), Artikel 29. https://doi.org/10.1145/2528932
Kjærgaard, M. B., Blunck, H., Wüstenberg, M., Grønbæk, K., Wirz, M., Roggen, D. & Tröster, G. (2013). Time-lag Method for Detecting Following and Leadership Behavior of Pedestrians from Mobile Sensing Data. I IEEE International Conference on Pervasive Computing and Communications (PerCom), 2013 (s. 56 - 64 ). IEEE. https://doi.org/10.1109/PerCom.2013.6526714
Aehnelt, M., Schulz, H.-J. & Urban, B. (2013). Towards a Contextualized Visual Analysis of Heterogeneous Manufacturing Data. I Advances in Visual Computing : 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part II (s. 76-85). Springer. https://doi.org/10.1007/978-3-642-41939-3_8
Derczynski, L., Yang, B. & Jensen, C. S. (2013). Towards Context-Aware Search and Analysis on Social Media Data. I G. Guerrini & N. W. Paton (red.), Proceedings of The 16th International Conference on Extending Database Technology: EDBT 2013 (s. 137-142 ). Association for Computing Machinery. https://doi.org/10.1145/2452376.2452393
Radaelli, L. & Jensen, C. S. (2013). Towards Fully Organic Indoor Positioning. I Proceedings of the Fifth ACM SIGSPATIAL International Workshop on Indoor Spatial Awareness (s. 16-20). Association for Computing Machinery.
Picozzi, M., Verdezoto, N., Pouke, M., Vatjus-Anttila, J. & Quigley, A. (2013). Traffic Visualization: Applying Information Visualization Techniques to Enhance Traffic Planning. I GRAPP 2013 IVAPP 2013 : Proceedings of the 8thInternational Conference on Computer Graphics Theory and Applications (s. 554-557). SCITEPRESS Digital Library. https://doi.org/10.5220/0004291605540557
Li, X., Ceikute, V., Jensen, C. S. & Tan, K.-L. (2013). Trajectory Based Optimal Segment Computation in Road Network Databases. I C. Knoblock & M. Schneider (red.), Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL'13 (s. 396-399 ). Association for Computing Machinery. https://doi.org/10.1145/2525314.2525444
Jensen, K., Aalst, W. M. V. D., Balbo, G., Koutny, M. & Wolf, K. (red.) (2013). Transactions on Petri Nets and Other Models of Concurrency VII: ToPNoC. Springer VS. Lecture Notes in Computer Science Bind 7480 https://doi.org/10.1007/978-3-642-38143-0
Scheder, D. (2013). Trivial, tractable, hard. A not so sudden complexity jump in neighborhood restricted CNF formulas. I L. Cai, S.-W. Cheng & A.-W. Lam (red.), Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (s. 251-261). Springer VS. https://doi.org/10.1007/978-3-642-45030-3_24
Damgård, I. B. & Scafuro, A. (2013). Unconditionally Secure and Universally Composable Commitments from Physical Assumptions. I K. Sako & P. Sarkar (red.), Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (s. 100-119 ). Springer VS. https://doi.org/10.1007/978-3-642-42045-0_6
Meldgaard, S. T. (2013). Unconditionally Secure Protocols. Institut for Datalogi, Aarhus Universitet.
Grönvall, E. & Verdezoto, N. (2013). Understanding Challenges and Opportunities of Preventive Blood Pressure Self-Monitoring at Home. I P. Palanque , F. Détienne & A. Tricot (red.), Proceedings of the 31st European Conference on Cognitive Ergonomics (ACM ECCE 2013) Association for Computing Machinery. https://doi.org/10.1145/2501907.2501962
Turon, A., Dreyer , D. & Birkedal, L. (2013). Unifying refinement and hoare-style reasoning in a logic for higher-order concurrency. I G. Morrisett & T. Uustalu (red.), Proceedings of the 18th ACM SIGPLAN International Conference on Functional Programming, ICFP '13 (s. 377-390 ). Association for Computing Machinery. https://doi.org/10.1145/2500365.2500600
Scheder, D. (2013). Unsatisfiable CNF formulas contain many conflicts. I L. Cai, S.-W. Cheng & T.-W. Lam (red.), Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (s. 273-283). Springer VS. https://doi.org/10.1007/978-3-642-45030-3_26
Brewster, S. & Bødker, S. (2013). Welcome to CHI 2013! Conference on Human Factors in Computing Systems - Proceedings, 2013-April, vii.
Eagan, J. R., Lecolinet, E. & Klokmose, C. N. (2013). What are Applications in Multi-Surface Environments. Afhandling præsenteret på POWERWALL, Paris, Frankrig. http://www.powerwall.mdx.ac.uk/papers/POWERWALL-Eagan.pdf
Gao, X. A. G., Zhang, J. & Chen, Y. (2013). What you jointly know determines how you act: Strategic interactions in prediction markets. I Proceedings of of the fourteenth ACM Conference on Electronic Commerce, EC '13 (s. 489-506). Association for Computing Machinery. https://doi.org/10.1145/2482540.2482592
Pastro, V. (2013). Zero-Knowledge Protocols and Multiparty Computation. Department of Computer Science, Aarhus University.
Jawurek, M., Kerschbaum, F. & Orlandi, C. (2013). Zero-knowledge using garbled circuits: Or how to prove non-algebraic statements efficiently. I A.-R. Sadeghi , V. Gligor & M. Yung (red.), Proceedings of the ACM Conference on Computer and Communications Security, CCS '13 (s. 955-966). Association for Computing Machinery. https://doi.org/10.1145/2508859.2516662
Urazimbetova, S. (2012). A Case Study - On Patient Empowerment and Integration of Telemedicine to National Healthcare Services. Afhandling præsenteret på International Conference on Health Informatics, Vilamoura, Algarve, Portugal. https://doi.org/10.5220/0003870902630269
Šidlauskas, D., Jensen, C. S. & Šaltenis , S. (2012). A comparison of the use of virtual versus physical snapshots for supporting update-intensive workloads. I Proceedings of the Eighth International Workshop on Data Management on New Hardware: DaMoN '12 (s. 1-8). Association for Computing Machinery. https://doi.org/10.1145/2236584.2236585
Dupuis, F., Nielsen, J. B. & Salvail, L. (2012). Actively Secure Two-Party Evaluation of Any Quantum Operation. Lecture Notes in Computer Science, 7417, 794-811. https://doi.org/10.1007/978-3-642-32009-5_46
Backes, M., Goldberg, I., Kate, A. & Toft, T. (2012). Adding query privacy to robust DHTs. I ASIACCS '12 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (s. 30-31 ). Association for Computing Machinery. https://doi.org/10.1145/2414456.2414473
Bitsch, J. E. & Bouvin, N. O. (2012). Ad-hoc Symbiotic Interactive Displays through DLNA. I IEEE International Conference on Pervasive Computing and Communications (PerCom), 2012 (s. 57-65). IEEE Computer Society Press. https://doi.org/10.1109/PerCom.2012.6199849
Alrøe, T. F., Grann, J., Grönvall, E., Petersen, M. G. & L. Rasmussen, J. (2012). Aerial Tunes : Exploring Interaction Qualities of Mid-air Displays. I Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making sense through design (NordiCHI 2012), (s. 514-523). Association for Computing Machinery. https://doi.org/10.1145/2399016.2399095
Lu, H., Cao, X. & Jensen, C. S. (2012). A Foundation for Efficient Indoor Distance-Aware Query Processing. I IEEE 28th International Conference on Data Engineering (ICDE) (s. 438 -449). IEEE Press. https://doi.org/10.1109/ICDE.2012.44
Dang, X.-H., Ong, K.-L. & Lee, V. (2012). An Adaptive Algorithm for Finding Frequent Sets in Landmark Windows. Lecture Notes in Computer Science, 7520, 590-597 . https://doi.org/10.1007/978-3-642-33362-0_47
Nielsen, J. B., Nordholt, P. S., Orlandi, C. & Burra, S. S. (2012). A New Approach to Practical Active-Secure Two-Party Computation. Lecture Notes in Computer Science, 7417, 681-700 . https://doi.org/10.1007/978-3-642-32009-5_40
Stewart, C., Hoggan, E., Haverinen, L., Salamin, H. & Jacucci, G. (2012). An exploration of inadvertent variations in mobile pressure input. I Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services (s. 35-38)