Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Ferragina, P. & Satti, S. R. (2008). Tree Compression and Indexing. I Encyclopedia of Algorithms (s. 1-99). Springer.
Nielsen, M., Krukow, K. & Sassone, V. (2008). Trust Models in Ubiquitous Computing. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 366(1881), 3781-3793. https://doi.org/10.1098/rsta.2008.0134
Boudol, G., Castellani, I., Hennessy, M., Nielsen, M. & Winskel, G. (2008). Twenty Years on: Reflections on the CEDISYS Project: Combining True Concurrency with Process Algebra. Lecture Notes in Computer Science, 5065, 757-777. https://doi.org/10.1007/978-3-540-68679-8_47
Westergaard, M. & Kristensen, L. M. (2008). Two Interfaces to the CPN Tools Simulator. I Ninth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (s. 83-102). Department of Computer Science.
Bødker, S. & Sundblad, Y. (2008). Usability and Interaction Design - New Challenges for the Scandinavian Tradition. Behaviour and Information Technology, 27(4), 293-300.
Bouvin, N. O. & Albertsen, J. (2008). User Defined Structural Searches in MediaWiki. I Proceedings of the nineteenth ACM conference on Hypertext and hypermedia. (s. 15-20). Association for Computing Machinery. https://doi.org/10.1145/1379092.1379099
Schulz, H.-J., John, M., Unger, A. & Schumann, H. (2008). Visual Analysis of Bipartite Biological Networks. I C. P. Botha, G. Kindlmann, W. Niessen & B. Preim (red.), Proceedings of the Eurographics Workshop on Visual Computing for Biomedicine VCBM 2008 (s. 135-142). Eurographics Association. https://doi.org/10.2312/VCBM/VCBM08/135-142
Caspersen, M. E., Cassel, L. N., Davies, G., Pears, A., Seidman, S. & Topi, H. (2008). What is Masters Level Education in Informatics. I Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2008 (s. 341). Association for Computing Machinery. https://doi.org/10.1145/1384271.1384383
Büscher, M., Mogensen, P. H. & Kristensen, M. (2008). When and How (Not) to Support IT? Supporting virtual emergency teamwork. I F. Fiedrich & B. Van de Walle (red.), ISCRAM 2008,: Technology Showcase - Communication Systems and Technologies for Crisis and Disaster Responses (Bind Session 2, Track 2, s. 167-176)
Boubertakh, R., Batchelor, P., Uribe, S., Sørensen, T. S., Hansen, M. S., Razavi, R. & Schaeffter, T. (2008). Whole-Heart Imaging Using Undersampled Radial Phase Encoding and a 32-Channel Cardiac Coil. I Proceedings of the 16th Meeting and Exhibition of the International Society for Magnetic Resonance in Medicine (s. 6). ISMRM.
Caspersen, M. E., Börstler, J., Decker, A. & Alphonce, C. (2008). Worked Examples for Sound Object-Oriented Pedagogy: The Seventh "Killer" Workshop. I Companion to the 23rd ACM SIGPLAN Conference on Object-oriented programming systems languages and applications (s. 869). Association for Computing Machinery. https://doi.org/10.1145/1449814.1449888
Nielsen, M., Krukow, K. & Sassone, V. (2007). A Bayesian Model for Event-based Trust. Electronic Notes in Theoretical Computer Science, 172, 499-521. https://doi.org/10.1016/j.entcs.2007.02.017
Lee, J. (2007). A Case for Dynamic Reverse-code Generation. BRICS Report Series, (RS-07-15).
Støvring, K. & Lassen, S. B. (2007). A Complete, Co-Inductive Syntactic Theory of Sequential Control and State. I Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (Bind 42, Issue1, s. 161-172). Society for Industrial and Applied Mathematics.
Biernacka, M. & Danvy, O. (2007). A Concrete Framework for Environment Machines. A C M Transactions on Computational Logic, 9(1), 1-30.
Brynskov, M. (2007). Activity-Based Design as a Way to Bridge Artifacts, Professions, and Theories. I C. Brodersen, S. Bødker & C. N. Klokmose (red.), Multiple and Ubiquitous Interaction, 28. - 30. March 2007: Book of Abstracts (s. 21-24)
Wang, H., Schwefel, H.-P. & Toftegaard, T. S. (2007). Adaptive Modulation for a Downlink Multicast Channel in OFDMA Systems. I IEEE Wireless Communications and Networking Conference. WCNC 2007. (s. 650-655). IEEE Computer Society Press. https://doi.org/10.1109/WCNC.2007.125
Nielsen, J. D. & Schwartzbach, M. I. (2007). A Domain-Specific Programming Language for Secure Multiparty Computation. I Preceedings of the 2007 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (s. 21-31). Society for Industrial and Applied Mathematics. https://doi.org/10.1145/1255329.1255333
Aagaard, L., Amarzguioui, M., Sun, G., Santos, L. C., Ehsani, A., Prydz, H. & Rossi, J. J. (2007). A Facile Lentiviral Vector System for Expression of Doxycycline-Inducible shRNAs: Knockdown of the Pre-miRNA Processing Enzyme Drosha. Molecular Therapy, 15(5), 938-945. https://doi.org/10.1038/sj.mt.6300118
Westergaard, M. (2007). A Game-theoretic View on Behavioural Visualisation. I A. Cerone & P. Curzon (red.), Electronic Notes in Theoretical Computer Science: Proceedings of the 2nd International Workshop on Formal Methods for Interactive Systems (FMIS 2007) (Bind 208, s. 113-129). Pergamon Press.
Brodal, G. S. & Jørgensen, A. G. (2007). A Linear Time Algorithm for the k Maximal Sums Problem. I L. Kucera & A. Kucera (red.), Mathematical Foundations of Computer Science 2007: 32nd International Symposium, MFCS 2007 Ceský Krumlov, Czech Republic, August 26-31, 2007 Proceedings (s. 442-453). Springer. https://doi.org/10.1007/978-3-540-74456-6_40
Kjeldbjerg, A. L., Villesen, P., Aagaard, L. & Pedersen, F. S. (2007). An active 70 million year old viral infection in humans. Poster-session præsenteret på High Throughput Biology: Genomics, Fluxomics, Proteomics, and Interactomics, Danmark.
Brabrand, C., Giegerich, R. & Møller, A. (2007). Analyzing Ambiguity of Context-Free Grammars. I Proc. 12th International Conference on Implementation and Application of Automata
Miltersen, P. B. & Sørensen, T. B. (2007). A Near-Optimal Strategy for a Heads-Up No-Limit Texas Hold'em Poker Tournament. I Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (s. 1168-1175) http://www.daimi.au.dk/~bromille/Papers/aamaspoker.pdf
Klokmose, C. N. (2007). An Instrumental Paradigm for Ubiquitous Interaction. I Conference Proceedings of ECCE 2007 Association for Computing Machinery.
McCauley, S., de Groot, S., Mailund, T. & Hein, J. (2007). Annotation of selection strengths in viral genomes. Bioinformatics, 23(22), 2978-2986. https://doi.org/10.1093/bioinformatics/btm472
Zhang, W. (2007). An Overview of Product Line Enabled Intelligent Mobile Middleware. I 31st Annual International Computer Software and Applications Conference IEEE Computer Society Press.
Brønsted, J. (2007). Anvendelser af Pervasive Communication. (2 udg.) Komialt - Vidennetværk for Pervasive Communication.
Hansen, T. R. & Bardram, J. (2007). Applying Mobile and Pervasive Computer Technology to Enhance Coordination of Work in a Surgical Ward. I Studies in Health Technology and Informatics: MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics - Building Sustainable Health Systems (Bind 129, s. 107-111). IOS Press. http://www.ncbi.nlm.nih.gov/sites/entrez?db=pubmed&uid=17911688&cmd=showdetailview&indexed=google
Damgård, I. B. (2007). A "proof-reading" of Some Issues in Cryptography. I Automata, Languages and Programming: 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007. Proceedings (s. 2-11). Springer. https://doi.org/10.1007/978-3-540-73420-8_2
Danvy, O. & Millikin, K. (2007). A Rational Deconstruction of Landin's J Operator. Lecture Notes in Computer Science, 4015, 55-73.
Petersen, M. G. & Pagter, J. I. (2007).  A Sense of Security in Pervasive Computing - is the light on when the refrigerator door is closed? I R. Dhamija & S. Dietrich (red.), Financial and Cryptography and Data Security: 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 2007, Revised Selecgted Papers (Bind LNCS 4886, s. 383-388). Springer.
Kjær, K. E. (2007). A survey of context-aware middleware. I SE'07: Proceedings of the 25th IASTED Conference on Software Engineering (Bind ProfileID:81343494583, s. 148-155). ACTA Press.
Kjærgaard, M. B. (2007). A Taxonomy for Radio Location Fingerprinting. I Proceedings of the Third International Symposium on Location and Context Awareness (LoCA 2007) (Bind 4718, s. 139-156). Springer. https://doi.org/10.1007/978-3-540-75160-1_9
Damgård, I. B., Salvail, L., Fehr, S., Schaffner, C. & Renner, R. (2007). A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. I A. Menezes (red.), Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings (s. 360-378). Springer. https://doi.org/10.1007/978-3-540-74143-5_20
Damgård, I. B., Cramer, R. & de Haan, R. (2007). Atomic Secure Multi-party Multiplication with Low Communication. I M. Naor (red.), Advances in Cryptology - EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings (s. 329-346). Springer. https://doi.org/10.1007/978-3-540-72540-4_19