Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Bødker, S. & Andersen, P. B. (2005). Complex Mediation. Journal of Human Computer Interaction, 20(4), 353-402.
Christiansen, C., Mailund, Pedersen, C. N. S. & Randers, M. (2005). Computing the Quartet Distance between Trees of Arbitrary Degree. I Proceedings of the 5th International Workshop on Algorithms in Bioinformatics (WABI) (s. 77-88)
Damgård, I. B. & Ishai, Y. (2005). Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. I V. Shoup (red.), Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings (s. 378-394). Springer. https://doi.org/10.1007/11535218_23
Gudmundsson, J., Haverkort, H. J. & van Krefeld, M. (2005). Constrained Higher-Order Delaunay Triangulations. Computational Geometry, 30(3), 271-277.
Benkert, M., Gudmundsson, J. & Haverkort, H. J. (2005). Constructing Interference-Minimal Networks. I Proc. 21th European Workshop on Computational Geometry (s. 203-206). Technische Universiteit Eindhoven.
Danvy, O. & Nielsen, L. (2005). CPS Transformation of Beta-Redexes. Information Processing Letters, 94(5), 217-224. https://doi.org/10.1016/j.ipl.2005.02.002
Bertelsen, O. W. & Kyng, M. (2005). Critical Computing - Between Sense and Sensibility - Proceedings of the 4th Decennial Aarhus Conference: Foreword. Critical Computing - Between Sense and Sensibility - Proceedings of the 4th Decennial Aarhus Conference.
Hirt, M., Nielsen, J. B. & Przydatek, B. (2005). Cryptographic Asynchronous Multi-party Computation with Optimal Resilience: Extended abstract. I R. Cramer (red.), Advances in Cryptology – EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings (s. 322-340). Springer LNCS. https://doi.org/10.1007/11426639_19
Damgård, I. B., Salvail, L., Schaffner, C. & Fehr, S. (2005). Cryptography In The Bounded Quantum-Storage Model. I Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (s. 449-458). IEEE. https://doi.org/10.1109/SFCS.2005.30
Zhang, W. & Ding, P. (2005). Debugging Environment for a Meta-programming Language. Mini-Micro Systems, 26(4), 707-709.
Filinski, A. & Rohde, H. K. (2005). Denotational Aspects of Untyped Normalization by Evaluation. BRICS Report Series, (RS-05-4).
Miltersen, P. B. & Vinodchandran, N. V. (2005). Derandomizing Arthur-Merlin Games using Hitting Sets. Computational Complexity, 14(3), 256-279. https://doi.org/10.1007/s00037-005-0197-7
Andersen, J. R., Bak, L., Grarup, S., Lund, K. V., Hansen, K. M. & Torgersen, M. (2005). Design, implementation, and evaluation of the Resilient Smalltalk embedded platform. Computer Languages, Systems and Structures, 31(3-4), 127-141. https://doi.org/10.1016/j.cl.2005.02.003
Bardram, J. E., Bossen, C. & Thomsen, A. B. (2005). Designing for Transformations in Collaboration: A Study of the Deployment of Homecare Technology. I GROUP´05: Proceedings of teh 2005 International ACM SIGGROUP Conference on Supporting Group Work (s. 294-303). Association for Computing Machinery.
Bardram, J. E., Bossen, C. & Thomsen, A. (2005). Designing for transformations in collaboration: a study of the deployment of homecare technology. I GROUP 05 (s. 294-303). Association for Computing Machinery.
Lindholm, M. (2005). Development of Object-understanding Among Students in the Humanities. Poster-session præsenteret på ITiCSE 2005, Monte de Caparica, Portugal.
Hansen, K. M. & Damm, C. H. (2005). Distributed Knight. Softwareprogram
Christensen, B. G. (2005). Do Social Computing Make You Happy? A Case Study of Nomadic Children in Mixed Environments. I O. W. Bertelsen, P. Marti & D. Shapiro (red.), The 4th decennial conference on Critical computing: between sense and sensibility 2005, Aarhus, Denmark
Brabrand, C., Møller, A. & Schwartzbach, M. I. (2005). Dual Syntax for XML Languages. I Database Programming Languages: 10th International Workshop, DBPL 2005, Trondheim, Norway, August 28-29, 2005, Revised Selected Papers (s. 27-41). Springer. https://doi.org/10.1007/11601524_2
Fritsch, J., Fogtmann, M. H. & Lassen, T. M. (2005). Dunning the Data: Towards Para-functional Qualities of Product Design. I J. Buur & B. Mathews (red.), Proceedings of Student Interaction Design Conference SIDER05 (s. 116-121).
Brodersen, A. C., Christensen, B. G., Grønbæk, K., Dindler, C. & Sundararajah, B. (2005). eBag: a Ubiquitous Web Infrastructure for Nomadic Learning. I Proceedings of the 14th International World Wide Web Conference (s. 298-306). Association for Computing Machinery. https://doi.org/10.1145/1060745.1060791
Brodersen, A. C. & Iversen, O. S. (2005). eCell: Spatial IT Design for Group Collaboration in School Environments. I GROUP 05 (s. 227-235). Society for Industrial and Applied Mathematics.
Damgård, I. B. & Dupont, K. (2005). Efficient Threshold RSA Signatures with General Moduli and no Extra Assumptions. I S. Vaudenay (red.), Public Key Cryptography - PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings (s. 346-361). Springer. https://doi.org/10.1007/978-3-540-30580-4_24
Allan, C., Avgustinov, P., Christensen, A. S., Hendren, L. J., Kuzins, S., Lhoták, J., Lhoták, O., de Moor, O., Sereni, D., Sittampalam, G. & Tibble, J. (2005). abc: The AspectBench Compiler for AspectJ. I R. Glück & M. R. Lowry (red.), Generative Programming and Component Engineering, 4th International Conference, GPCE 2005 Proceedings (Tallinn, Estonia, September 29 - October 1, 2005) (s. 10-16)
Brodal, G. S. & Leonardi, S. (red.) (2005). ESA 2005: 13th Annual European Symposium: Springer LNCS.
Hansen, K. M., Antolin Rafael, P., Camara, J., Carro, S., Metha, G., Rosengren, P., Pagter, J. I. & Pedersen, M. Ø. (2005). eu-DOMAIN D3.1 + D4.1 Software Architecture Specification.
Machado, R. J., Lassen, K. B., Oliveira, S., Couto, M. & Pinto, P. (2005). Execution of UML Models with CPN Tools for Workflow Requirements Validation. I Proceedings of Sixth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, volume PB-576 of DAIMI (s. 231-250). DAIMI PB-576.
Foster, J. N., Greenwald, M. B., Kirkegaard, C., Pierce, B. C. & Schmitt, A. (2005). Exploiting Schemas in Data Synchronization. I DBPL 2005 (s. 42-57). Springer LNCS.
Bardram, J. E., Christensen, H. B., Corry, A. V., Hansen, K. M. & Ingstrup, M. (2005). Exploring Quality Attributes using Architectural Prototyping. I R. Reussner, J. Mayer, J. A. Stafford, S. Overhage, S. Becker & P. J. Schroeder (red.), Quality of Software Architectures and Software Quality: First International Conference on the Quality of Software Architectures, QoSA 2005, and Second International Workshop on Software Quality, SOQUA 2005, Erfurt, Germany, September 20-22, 2005. Proceedings (s. 155-170). Springer. https://doi.org/10.1007/11558569_12
Jelling Kristoffersen, K., Kjærgaard, M. B., Chen, J., Sheridan, J., Rønning, R. & Aa. Sørensen, J. (2005). Extending Wireless Broadband Network Architectures with Home Gateways, Localization, and Physical Environment Surveillance. I Proceedings of the Second International CICT Conference: Next Generation Broadband -Content and User Perspectives Center for Information and Communication Technologies.
Arge, L. & Toma, L. (2005). External Data Structures for Shortest Path Queries on Planar Digraphs. I X. Deng & D. Du (red.), Algorithms and Computation: 16th International Symposium, ISAAC 2005, Sanya, Hainan, China, December 19-21, 2005. Proceedings (s. 328-338). Springer. https://doi.org/10.1007/11602613_34
Biernacka, M., Danvy, O. & Sørensen, K. S. (2005). Extracting Evaluators from Proofs of Weak Head Normalization. I Electronic Notes in Theoretical Computer Science Elsevier Science Publishers.
Gerhardy, P. (2005). Extracting Herbrand Disjunctions by Functional Interpretation. Archive for Mathematical Logic, 44, 633-644.
Brodal, G. S., Demaine, E. D. & Munro, J. I. (2005). Fast Allocation and Deallocation with an Improved Buddy System. Acta Informatica, 41(4-5), 273-291. https://doi.org/10.1007/s00236-004-0159-6
Brodal, G. S., Kaligosi, K., Katriel, I. & Kutz, M. (2005). Faster Algorithms for Computing Longest Common Increasing Subsequences. BRICS Report Series, (RS-05-37).
Brodal, G. S. (2005). Finger Search Trees. I D. Mehta & S. Sahni (red.), Handbook of Data Structures and Applications CRC Press.
Petersen, M. G., Krogh, P., Ludvigsen, M. & Lykke-Olesen, A. (2005). Floor interaction: HCI reaching new ground. I CHI '05 extended abstracts on Human factors in computing systems (s. 1717-1720). Association for Computing Machinery. https://doi.org/10.1145/1056808.1057005
Danvy, O. (2005). From Reduction-based to Reduction-free Normalization. Electronic Notes in Theoretical Computer Science, 124(2), 79-100.