Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Polli, A. M., Korn, M. & Klokmose, C. N. (2013). Local Area Artworks: Collaborative Art Interpretation On-Site. I F. Mattern & S. Santini (red.), Proceedings of The 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '13 Adjunct (s. 79-82). Association for Computing Machinery. https://doi.org/10.1145/2494091.2494114
Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013). Local Outlier Detection with Interpretation. I H. Blockeel, K. Kersting , S. Nijssen & F. Železný (red.), Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2013, Prague, Czech Republic, September 23-27, 2013, Proceedings, Part III (s. 304-320 ). Springer VS. https://doi.org/10.1007/978-3-642-40994-3_20
Rasmussen, M. (2013). Magical Realities in Interaction Design. I Proceedings of the 7th International Conference on Tangible, Embedded and Embodied Interaction, TEL '13 (s. 125-128 ). Association for Computing Machinery. https://doi.org/10.1145/2460625.2460644
Johnson, P. M., Xu, Y., Brewer, R. S., Moore, C. A., Lee, G. E. & Connell, A. (2013). Makahiki+WattDepot: An open source software stack for next generation energy research and education. I L. M. Hilty, B. Aebischer, G. Andersson & W. Lohmann (red.), Proceedings of the First Interntional Conference on Information and Communication Technologies for Sustainability (ICT4S) Akademia.edu. http://www.academia.edu/2911805/ICT4S_2013_Proceedings_of_the_First_International_Conference_on_Information_and_Communication_Technologies_for_Sustainability_ETH_Zurich_February_14-16_2013
Branzei, S., Michalak, T., Rahwan, T., Larson, K. & Jennings, N. (2013). Matchings with Externalities and Attitudes. I M. Gina & O. Shehory (red.), International Conference on Autonomous Agents and Multi-agent Systems, AAMAS '13 (s. 295-302 ). Association for Computing Machinery. http://dl.acm.org/citation.cfm?id=2484969&CFID=340403434&CFTOKEN=84711969
Dalgaard, L. G., Grönvall, E. & Verdezoto, N. (2013). MediFrame: A Tablet Application to Plan, Inform, Remind and Sustain Older Adults Medication Intake. I IEEE International Conference on Healthcare Informatics, IEEE ICHI 2013 (s. 36-45). IEEE. https://doi.org/10.1109/ICHI.2013.12
Agarwal , P. K., Graham , G., Huang, Z., Phillips, J., Wei, Z. & Yi, K. (2013). Mergeable summaries. A C M Transactions on Database Systems, 38(4), Artikel 26 . https://doi.org/10.1145/2500128
Jensen, C. S. (red.), Jermaine, C., Zhou, X. (red.), Kotagiri, R. (red.) & Ooi, B. C. (red.) (2013). Message from the ICDE 2013 Program Committee and General. I 2013 IEEE 29th International Conference on Data Engineering (ICDE), : Australia, April 8–11, 2013 (s. i-ii). IEEE Communications Society. http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6530811
Hu, H. (red.), Jensen, C. S. & Dingming , D. (red.) (2013). Message from the LBS n.0 Workshop Organizers. I IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:2 ) (s. xiii). IEEE. http://mdm2013.dico.unimi.it/
Wölfel, C. & Merritt, T. (2013). Method card design dimensions: A survey of card-based design tools. I P. Kotzé et al. (red.), Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part I (s. 479-486). Springer VS. https://doi.org/10.1007/978-3-642-40483-2_34
Frederiksen, T. K., Jakobsen, T. P., Nielsen, J. B., Nordholt, P. S. & Orlandi, C. (2013). MiniLEGO: Efficient secure two-party computation from general assumptions. I T. Johansson & P. Q. Nguyen (red.), Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (s. 537-556). Springer VS. https://doi.org/10.1007/978-3-642-38348-9_32
Larsen, K. G. (2013). Models and Techniques for Proving Data Structure Lower Bounds. Department of Computer Science, Aarhus University.
Liu, K., Yang, B., Shang, S., Li, Y. & Ding, Z. (2013). MOIR/UOTS: Trip recommendation with user oriented trajectory search. I IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1 ) (s. 335-337). IEEE. https://doi.org/10.1109/MDM.2013.49
Sergey, I., Devriese, D., Might, M., Midtgaard, J., Darais, D., Clarke, D. & Piessens, F. (2013). Monadic abstract interpreters. I H.-J. Boehm (red.), Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '13 (s. 399-410). Association for Computing Machinery. https://doi.org/10.1145/2491956.2491979
Frederiksen, S. K. S. & Miltersen, P. B. (2013). Monomial strategies for concurrent reachability games and other stochastic games. I P. A. Abdulla & I. Potapov (red.), Reachability Problems: 7th International Workshop, RP 2013, Uppsala, Sweden, September 24-26, 2013 Proceedings (s. 122-134 ). Springer VS. https://doi.org/10.1007/978-3-642-41036-9_12
Alamdari, S., Angelini, P., Chan, T. M., Di Battista, G., Frati, F., Lubiw, A., Patrignani, M., Roselli, V., Singla, S. & Wilkinson, B. T. (2013). Morphing Planar Graph Drawings with a Polynomial Number of Steps. The Annual A C M - S I A M Symposium on Discrete Algorithms. Proceedings, 24, 1656-1667. http://knowledgecenter.siam.org/0236-000137/0236-000137/1
Wu, D., Yiu, M. L. & Jensen, C. S. (2013). Moving Spatial Keyword Queries: Formulation, Methods, and Analysis. A C M Transactions on Database Systems, 38(1), Artikel 7. https://doi.org/10.1145/2445583.2445590
Hoggan, E., Nacenta, M., Kristensson, P. O., Williamson, J., Oulasvirta, A. & Lehtiö, A. (2013). Multi-touch pinch gestures: Performance and ergonomics. I Proceedings of the 2013 ACM international conference on Interactive tabletops and surfaces (s. 219-222)
Hoggan, E., Williamson, J., Oulasvirta, A., Nacenta, M., Kristensson, P. O. & Lehtiö, A. (2013). Multi-touch rotation gestures: Performance and ergonomics. I Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (s. 3047-3050)
Arge, L., Walderveen, F. V. & Zeh, N. (2013). Multiway simple cycle separators and I/O-efficient algorithms for planar graphs. I Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms (s. 901-918). Society for Industrial and Applied Mathematics. http://knowledgecenter.siam.org/soda/
Larsen, K. G. & Walderveen, F. V. (2013). Near-Optimal Range Reporting Structures for Categorical. I Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2013 (s. 265-276). Association for Computing Machinery. http://knowledgecenter.siam.org/0236-000081/~~PdfSource/0
Nordholt, P. S. (2013). New Approaches to Practical Secure Two-Party Computation. Institut for Datalogi, Aarhus Universitet.
Arge, L., Fischer, J., Sanders, P. & Sitchinava, N. (2013). On (dynamic) range minimum queries in external memory. I F. Dehne, R. Solis-Oba & J.-R. Sack (red.), Algorithms and Data Structures: 13th International Symposium, WADS 2013, London, ON, Canada, August 12-14, 2013. Proceedings (s. 37-48). Springer VS. https://doi.org/10.1007/978-3-642-40104-6_4
Blunck, H., Bouvin, N. O., Franke, T., Grønbæk, K., Kjærgaard, M. B., Lukowicz, P. & Wüstenberg, M. (2013). On Heterogeneity in Mobile Sensing Applications Aiming at Representative Data Collection. I F. Mattern & S. Santini (red.), Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication, UbiComp '13 Adjunct (s. 1087-1098 ). Association for Computing Machinery. https://doi.org/10.1145/2494091.2499576
Müller-Lennert, M., Dupont-Dupuis, F., Szehr, O., Fehr, S. & Tomamichel, M. (2013). On quantum Rényi entropies: A new generalization and some properties. Journal of Mathematical Physics, 54(12), Artikel 122203. https://doi.org/10.1063/1.4838856
Scheder, D. & Tan, L. Y. (2013). On the average sensitivity and density of k-CNF formulas. I P. Prasad , S. Raskhodnikova, K. Jansen & J. D. P. Rolim (red.), Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques: 16th International Workshop, APPROX 2013, and 17th International Workshop, RANDOM 2013, Berkeley, CA, USA, August 21-23, 2013. Proceedings (s. 683-698). Springer VS. https://doi.org/10.1007/978-3-642-40328-6_47
Nielsen, J. B., Venturi, D. & Zottarel, A. (2013). On the Connection between Leakage Tolerance and Adaptive Security. I K. Kurosawa & G. Hanaoka (red.), Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings (s. 497-515 ). Springer VS. https://doi.org/10.1007/978-3-642-36362-7_30
Ishai, Y., Kushilevitz, E., Meldgaard, S. T., Orlandi, C. & Paskin-Cherniavsky, A. (2013). On the Power of Correlated Randomness in Secure Computation. I A. Sahai (red.), Theory of Cryptography: 10th TCC 2013. Proceedings (s. 600-620 ). Springer VS. https://doi.org/10.1007/978-3-642-36594-2_34
Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013). Outlier Detection with Space Transformation and Spectral Analysis. I C. Kamath, J. Dy, Z. Obradovic, J. Ghosh, S. Parthasarathy & Z.-H. Zhou (red.), Proceedings of the 2013 SIAM International Conference on Data Mining, SDM (s. 225-233). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611972832.25
Faust, S., Hazay, C. & Venturi, D. (2013). Outsourced pattern matching. I F. V. Fomin (red.), Automata, Languages, and Programming: 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II (s. 545-556). Springer VS. https://doi.org/10.1007/978-3-642-39212-2_48
Anderson, J. W. J., Haas, P. A., Mathieson, L.-A., Volynkin, V., Lyngsø, R., Tataru, P. & Hein, J. (2013). Oxfold: Kinetic Folding of RNA using Stochastic Context-Free Grammars and Evolutionary Information. Bioinformatics, 29(6), 704-710. https://doi.org/10.1093/bioinformatics/btt050
Magnani, M. & Rossi, L. (2013). Pareto distance for multi-layer network analysis. I A. M. Greenberg, W. G. Kennedy & N. D. Bos (red.), Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013. Proceedings (s. 249-256). Springer VS. https://doi.org/10.1007/978-3-642-37210-0_27
Johansen, S. L. & Eriksson, E. (2013). Playful Technology: Design of Children’s Library Services. I Proceedings of the 10th European academy of design conference University of Gothenburg.
Hansen, K. A. & Podolskii, V. V. (2013). Polynomial threshold functions and Boolean threshold circuits. Electronic Colloquium on Computational Complexity, (TR13-021). http://eccc.hpi-web.de/report/2013/021/
Hansen, K. A. & Podolskii, V. V. (2013). Polynomial threshold functions and Boolean threshold circuits. I K. Chatterjee & J. Sgall (red.), Mathematical Foundations of Computer Science 2013: 38th International Symposium, MFCS 2013, Klosterneuburg, Austria, August 26-30, 2013. Proceedings (s. 516-527 ). Springer VS. https://doi.org/10.1007/978-3-642-40313-2_46
Damgård, I. B., Keller, M., Larraia , E., Pastro, V., Scholl, P. & Smart, N. P. (2013). Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits. I J. Crampton , S. Jajodia & K. Mayes (red.), Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings (s. 1-18 ). Springer VS. https://doi.org/10.1007/978-3-642-40203-6_1
Madsen, M., Livshits, B. & Fanning, M. (2013). Practical static analysis of JavaScript applications in the presence of frameworks and libraries. I B. Meyer, L. Baresi & M. Mezini (red.), Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering , ESEC/FSE 2013 (s. 499-509). Association for Computing Machinery. https://doi.org/10.1145/2491411.2491417
Erkin, Z., Veugen, T., Toft, T. & Lagendijk, R. L. (2013). Privacy-preserving distributed clustering. Eurasip Journal on Information Security, 1, Artikel 4. https://doi.org/10.1186/1687-417X-2013-4