Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Askarov, A., Chong, S. & Mantel, H. A. (2015). Hybrid Monitors for Concurrent Noninterference. I L. Viganò (red.), 28th IEEE Computer Security Foundations Symposium CSF 2015 : Proceedings (s. 137 - 151). IEEE Computer Society Press. https://doi.org/10.1109/CSF.2015.17
Thomas, V., Brueggemann, M. J., Feldman, D. & C02K31YADRVG (2015). I am more than the sum of my parts: an e-waste design fiction. Afhandling præsenteret på Joint Conference on 29th International Conference on Informatics for Environmental Protection / 3rd International Conference on ICT for Sustainability (EnviroInfo and ICT4S), Copenhagen, Danmark.
Merritt, T. R., Nørgaard, M., Laursen, C., Rasmussen, M. K. & Petersen, M. G. (2015). Imagined Physics: Exploring Examples of Shape-changing Interfaces. I H. Samani (red.), Cognitive Robotics (s. 89-111). CRC Press.
Nielsen, J. A. S. (2015). Implicit Data Structures, Sorting, and Text Indexing. Department of Computer Science, Aarhus University.
Hansen, T. D. & Zwick, U. (2015). Improved Version of the Random-Facet Pivoting Rule for the Simplex Algorithm. I Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC '15 (s. 209-218 ). Association for Computing Machinery. https://doi.org/10.1145/2746539.2746557
Livshits, B., Sridharan, M., Smaragdakis, Y., Lhoták, O., Amaral, J. N., Chang, B.-Y. E., Guyer, S. Z., Khedker, U. P., Møller, A. & Vardoulakis, D. (2015). In Defense of Soundiness: A Manifesto. Communications of the A C M, 58(2). https://doi.org/10.1145/2644805
Tataru, P. (2015). Inference of population history and patterns from molecular data. Department of Computer Science, Aarhus University.
Eichner, C., Nocke, T., Schulz, H.-J. & Schumann, H. (2015). Interactive Presentation of Geo-Spatial Climate Data in Multi-Display Environments. ISPRS International Journal of Geo-Information, 4(2), 493-514. https://doi.org/10.3390/ijgi4020493
Jung, R., Swasey, D., Sieczkowski, F., Svendsen, K., Turon, A., Birkedal, L. & Dreyer, D. (2015). Iris: Monoids and invariants as an orthogonal basis for concurrent reasoning. I S. Rajamani (red.), Conference Record of the Annual ACM Symposium on Principles of Programming Languages (s. 637-650). Association for Computing Machinery. https://doi.org/10.1145/2676726.2676980
Jensen, M. M., Rasmussen, M. K., Mueller, F. F. & Grønbæk, K. (2015). Keepin' it Real: Challenges when Designing Sports-Training Games. I B. Begole & J. Kim (red.), Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems: CHI '15 (s. 2003-2012). Association for Computing Machinery. https://doi.org/10.1145/2702123.2702243
Cramer, R., Damgård, I. B., Döttling, N. M., Fehr, S. & Spini, G. (2015). Linear secret sharing schemes from error correcting codes and universal hash functions. I E. Oswald & M. F. Fischlin (red.), Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (s. 313-336). Springer VS. https://doi.org/10.1007/978-3-662-46803-6_11
Döttling, N. M. (2015). Low noise LPN: KDM secure public key encryption and sample amplification. I J. Katz (red.), Public-Key Cryptography -- PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (Bind 9020, s. 604-626). Springer VS. https://doi.org/10.1007/978-3-662-46447-2_27
Agarwal, P. K., Mølhave, T., Revsbæk, M., Safa, I., Wang, Y. & Yang, J. (2015). Maintaining Contour Trees of Dynamic Terrains. I L. Arge & J. Pach (red.), 31st International Symposium on Computational Geometry (SoCG 2015) (s. 796-811) https://doi.org/10.4230/LIPIcs.SOCG.2015.796
Prentow, T. S., Thom, A., Blunck, H. & Vahrenhold, J. (2015). Making Sense of Trajectory Data in Indoor Spaces. I Proceedings of the 16th IEEE International Conference on Mobile Data Management, vol.1 (s. 116-121). IEEE. https://doi.org/10.1109/MDM.2015.44
Bødker, S., Bertelsen, O. W., Bannon, L. J., De Souza, C., Barbosa, S. & Prates, R. (2015). Mediation and Meaning in HCI. I Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part IV (s. 667-668). Springer. https://doi.org/10.1007/978-3-319-22723-8_93
Koester, T., Jakobsen, J., Brøsted, J. E., Bach, K., Petersen, O. B., Kyng, M. & Rasch, S. M. (2015). Mental Models and Deliberate Manipulation of Data. I Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 2015 (1 udg., Bind 4, s. 62-69) https://doi.org/10.1177/2327857915041021
Faonio, A., Nielsen, J. B. & Venturi, D. (2015). Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. I M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (red.), Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Bind Part 1, s. 456-468). Springer VS. https://doi.org/10.1007/978-3-662-47672-7_37
Sieczkowski, F., Bizjak, A. & Birkedal, L. (2015). ModuRes: A Coq Library for Modular Reasoning About Concurrent Higher-Order Imperative Programming Languages. I C. Urban & X. Zhang (red.), Interactive Theorem Proving: 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings (s. 375-390). Springer. https://doi.org/10.1007/978-3-319-22102-1_25
Antoy, S., Johannsen, J. & Libby, S. (2015). Needed computations shortcutting needed steps. I Electronic Proceedings in Theoretical Computer Science, EPTCS (Bind 183, s. 18-32). Open Publishing Association. https://doi.org/10.4204/EPTCS.183.2
Clifford, R., Jørgensen, A. G. & Larsen, K. G. (2015). New Unconditional Hardness Results for Dynamic and Online Problems. I 56th IEEE Symposium on Foundations of Computer Science (FOCS) Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS IEEE Computer Society Press. http://arxiv.org/pdf/1504.01836v1.pdf
Bhattacharyya, R. & Mukherjee, P. (2015). Non-adaptive programmability of random oracle. Theoretical Computer Science, 592, 97-114. https://doi.org/10.1016/j.tcs.2015.05.026
Østerby, O. (2015). Numerical Solution of Parabolic Equations. Department of Computer Science, Aarhus University. https://doi.org/10.7146/aul.5.5
Kyng, M. (2015). On Creating and Sustaining Alternatives: The case of Danish Telehealth. I O. Bertelsen & K. Halskov (red.), Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers Department of Computer Science, Aarhus University. https://doi.org/10.7146/aahcc.v1i1.21297
Larsen, K. G., Munro, J. I., Nielsen, J. S. & Thankachan, S. V. (2015). On hardness of several string indexing problems. Theoretical Computer Science, 582, 74-82. https://doi.org/10.1016/j.tcs.2015.03.026
Verdezoto, N. & Grönvall, E. (2015). On preventive blood pressure self-monitoring at home. Cognition, Technology and Work, 18(2), 267-285. https://doi.org/10.1007/s10111-015-0358-7
Cascudo Pueyo, I., Cramer, R., Mirandola, D., Padró, C. & Xing, C. (2015). On Secret Sharing with Nonlinear Product Reconstruction. S I A M Journal on Discrete Mathematics, 29(2), 1114-1131. https://doi.org/10.1137/130931886
Hubacek, P. & Wichs, D. (2015). On the Communication Complexity of Secure Function Evaluation with Long Output. I T. Roughgarden (red.), Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS '15 (s. 163-172 ). Association for Computing Machinery. https://doi.org/10.1145/2688073.2688105
Damgård, I. B., Dupont-Dupuis, F. & Nielsen, J. B. (2015). On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation. I Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (s. 87-104). Springer VS. https://doi.org/10.1007/978-3-319-17470-9_6
Durkota, K., Lisý, W., Kiekintveld, C. & Bosansky, B. (2015). Optimal Network Security Hardening Using Attack Graph Games. I N. Criado, M. Rehak, J. M. Such & L. Vercouter (red.), 2nd International Workshop on Agents and Cybersecurity, ACySE 2015: Workshop Notes at AAMAS 2015 (s. 7-14). Lancaster University. http://www.lancaster.ac.uk/staff/suchj/acyse2015-proceedings/ACySE2015_proceedings.pdf#page=14
Micenková, B. (2015). Outlier Detection and Explanation for Domain Experts. Department of Computer Science, University of Aarhus.
Bødker, S. & Zander, P.-O. (2015). Participation in design between public sector and local communities. I B. Begole & J. Kim (red.), Proceedings of the 7th International Conference on Communities and Technologies, C&T '15 Association for Computing Machinery. https://doi.org/10.1145/2768545.2768546
Nielsen, M. & Grønbæk, K. (2015). PivotViz: Interactive Visual Analysis of Multidimensional Library Transaction Data. I Proceedings of the 15th ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL '15 : Large, Dynamic and Ubiquitous –The Era of the Digital Library (s. 139-142). Association for Computing Machinery. https://doi.org/10.1145/2756406.2756937
Feldthaus, A. (2015). Pointer Analysis for JavaScript Programming Tools. Department of Computer Science, Aarhus University.