Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Cao, X., Cong, G., Jensen, C. S., NG, J. J., Ooi, B. C., Phan, N.-T. & Wu, D. (2012). SWORS: a system for the efficient retrieval of relevant spatial web objects. Proceedings of the VLDB Endowment, 5(12), 1914-1917. http://dl.acm.org/citation.cfm?id=2367536
Gamberini, L., Spagnolli, A., Corradi, N., Jacucci, G., Tusa, G., Mikkola, T., Zamboni, L. & Hoggan, E. (2012). Tailoring feedback to users’ actions in a persuasive game for household electricity conservation. I International Conference on Persuasive Technology (s. 100-111)
Korn, M. & Back, J. (2012). Talking it Further: From Feelings and Memories to Civic Discussions In and About Places. I L. Malmborg & T. Pederson (red.), NordiCHI '12 Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design (s. 189-198). Association for Computing Machinery. https://doi.org/10.1145/2399016.2399046
Reetz, E., Lehmann, A., Kümper, D. & Tönjes, R. (2012). Test Driven Life Cycle Management for Internet of Things based Services: a Semantic Approach. Afhandling præsenteret på International Conference on Advances in System Testing and Validation Lifecycle, Lisbon, Portugal.
Larsen, K. G. (2012). The Cell Probe Complexity of Dynamic Range Counting. I STOC’12 : Proceedings of the 44th symposium on Theory of Computing (s. 85-94). Association for Computing Machinery. https://doi.org/10.1145/2213977.2213987
Tominski, C. & Schulz, H.-J. (2012). The Great Wall of Space-Time. I T. Grosch, B. Preim, H. Theisel & K.-D. Toennies (red.), Proceedings of the Workshop on Vision, Modeling, and Visualization (VMV) (s. 199-206). Eurographics Association. https://doi.org/10.2312/PE/VMV/VMV12/199-206
Kölker, J. (2012). The Magnets Puzzle is NP-Complete. Journal of Information Processing, 20(3), 707-708 . https://doi.org/10.2197/ipsjjip.20.707
Balasch, J., Faust, S., Gierlichs, B. & Verbauwhede, I. (2012). Theory and Practice of a Leakage Resilient Masking Scheme. Lecture Notes in Computer Science, 7658, 758-775. https://doi.org/10.1007/978-3-642-34961-4_45
Keller, M. (2012). Theory and practice of cryptographic protocols -or- cryptography: will it blend? Department of Computer Science, Aarhus University.
Afshani, P., Afrawal, M., Benjamin, D., Larsen, K. G., Mehlhorn, K. & Winzen, C. (2012). The Query Complexity of Finding a Hidden Permutation. Electronic Colloquium on Computational Complexity, (TR12-087). http://eccc.hpi-web.de/report/2012/087/
Sun, X., Wang, C. & Yu, W. (2012). The Relationship between Inner Product and Counting Cycles. Lecture Notes in Computer Science, 7256, 643-654. https://doi.org/10.1007/978-3-642-29344-3_54
Jensen, K., Kristensen, L. M. & Mailund, T. (2012). The sweep-line state space exploration method. Theoretical Computer Science, 429, 169–179. https://doi.org/10.1016/j.tcs.2011.12.036
David P., W. & Zhang, Q. (2012). Tight Bounds for Distributed Functional Monitoring. I Proceedings of the 2012 ACM Symposium on Theory of Computing, STOC’12 (s. 941-960). Association for Computing Machinery. https://doi.org/10.1145/2213977.2214063
Gál , A., Hansen, K. A., Koucký, M., Pudlák, P. & Viola, E. (2012). Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates. I H. Karloff & T. Pitassi (red.), STOC '12 Proceedings of the 44th symposium on Theory of Computing (s. 479-494). Association for Computing Machinery. https://doi.org/10.1145/2213977.2214023
Bulánek, J., Koucky, M. & Saks, M. (2012). Tight lower bounds for the online labeling problem. I Proceedings of the 2012 ACM Symposium on Theory of Computing, STOC’12 (s. 1185-1198). Association for Computing Machinery. https://doi.org/10.1145/2213977.2214083
Schmidt, E. M., Skyum, S. & Nielsen, M. (2012). To Dexter - A Tribute from Aarhus. I R. L. Constable & A. Silva (red.), Logic and Program Semantics : Essays Dedicated to Dexter Kozen on the Occasion of His 60th Birthday (s. 341). Springer. https://doi.org/10.1007/978-3-642-29485-3_30
Andersen, M. S. & Kjærgaard, M. B. (2012). Towards a New Classification of Location Privacy Methods in Pervasive Computing. I A. Puiatti & T. Gu (red.), Mobile and Ubiquitous Systems: Computing, Networking, and Services : 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers (Bind 104, s. 150-161). Springer. https://doi.org/10.1007/978-3-642-30973-1_13
Jensen, K., Donatelli, S. & Kleijn , J. (red.) (2012). Transactions on Petri Nets and Other Models of Concurrency V: ToPNoC. Springer. Lecture Notes in Computer Science Bind 6900 https://doi.org/10.1007/978-3-642-29072-5
Jensen, K., Aalst, W. M. V. D., Marsan, M. A., Franceschinis, G., Kleijn , J. & Kristensen, L. M. (red.) (2012). Transactions on Petri Nets and Other Models of Concurrency VI: ToPNoC. Springer. Lecture Notes in Computer Science Bind 7400 https://doi.org/10.1007/978-3-642-35179-2
Brodal, G. S., Davoodi, P., Lewenstein, M., Raman, R. & Rao, S. S. (2012). Two Dimensional Range Minimum Queries and Fibonacci Lattices. Lecture Notes in Computer Science, 7501, 217-228 . https://doi.org/10.1007/978-3-642-33090-2_20
Vermeulen, J., Luyten, K. & Coninx, K. (2012). Understanding Complex Environments with the Feedforward Torch. I Ambient Intelligence - Third International Joint Conference, AmI 2012, Pisa, Italy, November 13-15, 2012. Proceedings (s. 312-319) https://doi.org/10.1007/978-3-642-34898-3_22
Kjærgaard, M. B. & Blunck, H. (2012). Unsupervised Power Profiling for Mobile Devices. I A. Puiatti & T. Gu (red.), Mobile and Ubiquitous Systems: Computing, Networking, and Services: 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers (s. 138-149). Springer. https://doi.org/10.1007/978-3-642-30973-1_12
Lu, H. & Jensen, C. S. (2012). Upgrading Uncompetitive Products Economically. I IEEE 28th International Conference on Data Engineering (ICDE) (s. 977 - 988 ). IEEE Press. https://doi.org/10.1109/ICDE.2012.92
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2012). Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks. I A. U. Schmidt, G. Russello, I. Krontiris & S. Lian (red.), Security and Privacy in Mobile Information and Communication Systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers (s. 107-118). Springer. https://doi.org/10.1007/978-3-642-33392-7_12
Holzhüter, C., Lex, A., Schmalstieg, D., Schulz, H.-J., Schumann, H. & Streit, M. (2012). Visualizing uncertainty in biological expression data. I P. C. Wong, D. L. Kao, M. C. Hao, C. Chen, R. Kosara, M. A. Livingston, J. Park & I. Roberts (red.), Proceedings of the Conference on Visualization and Data Analysis VDA 2012 SPIE - International Society for Optical Engineering. https://doi.org/10.1117/12.908516
Ackerman, M., Ben-David, S., Branzei, S. & Loker, D. (2012). Weighted Clustering. I Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence (s. 858-863). AAAI Press.
Mathiasen, N. R. (2012). While Working Around Security. Department of Computer Science, Aarhus University.
Danvy, O. & Midtgaard, J. (2011). Abstracting abstract machines: technical perspective. Association for Computing Machinery. Communications, 54(9), 100-100. https://doi.org/10.1145/1995376.1995399
Hladik, M., Daney, D. & Tsigaridas, E. (2011). A filtering method for the interval eigenvalue problem. Applied Mathematics and Computation, 217(12), 5236-5242. https://doi.org/10.1016/j.amc.2010.09.066
Artzi, S., Dolby, J., Jensen, S. H., Møller, A. & Tip, F. (2011). A Framework for Automated Testing of JavaScript Web Applications. I Proceeding of the 33rd International Conference on Software Engineering (s. 571-580). Association for Computing Machinery. https://doi.org/10.1145/1985793.1985871
Müller, E., Assent, I., Günnemann, S., Gerwert, P., Hannen, M., Jansen, T. & Seidl, T. (2011). A Framework for Evaluation and Exploration of Clustering Algorithms in Subspaces of High Dimensional Databases. I T. Härder, W. Lehner, B. Mitschang, H. Schöning & H. Schwarz (red.), Proceedings of the 14th GI Conference on Database Systems for Business, Technology, and the Web (BTW 2011) (s. 347-366). Gesellschaft für Informatik e.V..