Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Nielsen, J. & Grønbæk, K. (2006). MultiLightTracker: Vision based simultaneous multi object tracking on semi-transparent surfaces. I Proceedings of the Conference on Computer Vision Theory and Applications Institute for Systems and Technologies of Information, Control and Communication.
Damgård, I. B., Nicolosi, A. & Fazio, N. (2006). Non-interactive Zero-Knowledge from Homomorphic Encryption. I S. Halevi & T. Rabin (red.), Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings (s. 41-59). Springer. https://doi.org/10.1007/11681878_3
Damgård, I. B., Fehr, S., Salvail, L. & Schaffner, C. (2006). Oblivious Transfer and Linear Functions. I C. Dwork (red.), Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedings (s. 427-444). Springer. https://doi.org/10.1007/11818175_26
Palen, L. A. & Ballegaard, S. A. (2006). Of Pill Boxes and Piano Benches: "Home-made" Methods for Managing Medication. Afhandling præsenteret på CSCW '06, Banff, Alberta, Canada.
Katriel, I. & Bodlaender, H. L. (2006). Online Topological Ordering. A C M Transactions on Algorithms, 2(3), 364-379.
Hansen, K. A. (2006). On Modular Counting with Polynomials. I 21st Annual IEEE Conference on Computational Complexity (CCC'06) (s. 202-212). IEEE Computer Society Press. https://doi.org/10.1109/CCC.2006.29
Miltersen, P. B., Kjeldgaard-Pedersen, J., Burgisser, P. & Allender, E. (2006). On the Complexity of Numerical Analysis. I Proceedings of the 21st Annual IEEE Conference on Computational Complexity (s. 331-339). IEEE Computer Society Press.
Fitzi, M., Wolf, S. & Wullschleger, J. (2006). On the Power of Imperfect Broadcast. I Ikke angivet (s. 504-505). IEEE Press.
Biernacki, D. P., Danvy, O. & Shan, C. (2006). On the Static and Dynamic Extents of Delimited Continuations. Science of Computer Programming, 60(3), 274-297.
Fitzi, M. & Hirt, M. (2006). Optimally Efficient Multi-valued (Byzantine) Agreement. I Proceedings of the 25th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (s. 163-168). Society for Industrial and Applied Mathematics.
Thomsen, J. (2006). OSGi-based Gateway Replication. I N. Guimarães, P. Isaías & A. Goikoetxea (red.), Proceedings of the IADIS Applied Computing Conference 2006 (s. 123-129). International Association for Development, IADIS.
Aracic, I., Gasiunas, V., Mezini, M. & Ostermann, K. (2006). Overview of CaesarJ . Lecture Notes in Computer Science, 3880, 135.
Kristensen, M., Kyng, M. & Palen, L. A. (2006). Participatory Design in Emergency Medical Service: Designing for Future Practice. I Proceedings of the ACM Conference on Human Factors in Computing Systems CHI 2006 (s. 161-170). Association for Computing Machinery. https://doi.org/10.1145/1124772.1124798
Wells, L. M. (2006). Performance Analysis using CPN Tools. I Valuetools '06: Proceedings of the 1st International Conference On Performance Evaluation Methodolgies And Tools Association for Computing Machinery.
Hansen, T. R. (2006). Pervasive Mashups. I Proceedings of the Sixth Danish Human-Computer Interaction Research Symposium.: DHRS 2006 (DAIMI PB-580 udg., s. 25-26). Department of Computer Science, University of Aarhus.
Kjærgaard, M. B. (2006). "Pervasive" trends 2006. (Forskningsformidlende rapport udg.) Komialt - Vidennetværk for Pervasive Communication - Pixibog.
Danvy, O. (red.), O’Hearn, P. & Wadler, P. (2006). Preface, Festschrift for John C. Reynolds's 70th birthday. I Theoretical Computer Science, Volume 375, Issues 1–3, (s. 1-2). Elsevier.
Carroll, J. M., Bødker, S. & Coughlin, J. (red.) (2006). Proceedings of the Conference on Designing Interactive Systems, University Park, PA, USA, June 26-28, 2006. Society for Industrial and Applied Mathematics.
Zhang, W. & Kunz, T. (2006). Product line based ontology development for semantic web service. I C. Chi-Hung, F. B. Bastani & X. Xiangyang (red.), Proceedings of the IEEE International Symposium on Service-Oriented System Engineering (SOSE 2006): Session 7: Service Discovery (s. 183-188). IEEE Computer Society Press. https://doi.org/10.1109/SOSE.2006.25
Zhang, W. & Kunz, T. (2006). Product line based ontology reuse in context-aware e-business environment. I Proceedings of the IEEE International Conference on e-Business Engineering: ICEBE 2006 (s. 138-145). IEEE Computer Society Press.
Brodal, G. S., Makris, C. & Tsichlas, K. (2006). Purely Functional Worst Case Constant Time Catenable Sorted Lists. I Y. Azar & T. Erlebach (red.), Algorithms – ESA 2006: 14th Annual European Symposium, Zurich, Switzerland, September 11-13, 2006. Proceedings (s. 172-183). Springer. https://doi.org/10.1007/11841036_18
Kristensen, L. M., Valmari, A. & Schmidt, K. (2006). Question-Guided Stubborn Set Methods for State Properties. Formal Methods in System Design, 29(3), 215-251.
Alphonce, C., Caspersen, M. E., Decker, A. & Trask, B. (2006). "Killer examples" for design patterns: the fifth annual OOPSLA "Killer Examples" workshop. I P. L. Tarr & W. R. Cook (red.), OOPSLA '06: Companion to the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (s. 625-626). Society for Industrial and Applied Mathematics. https://doi.org/10.1145/1176617.1176640
Alphonce, C., Caspersen, M. E., Decker, A. & Trask, B. (2006). "Killer examples" for design patterns: a poster reporting results of the workshop. Poster-session præsenteret på "Killer examples" for design patterns, Portland, Oregon, USA. https://doi.org/10.1145/1176617.1176648
Ernst, E. (2006). Reconciling Virtual Classes with Genericity. I Modular Programming Languages: 7th Joint Modular Languages Conference, JMLC 2006, Oxford, UK, September 2006, Proceedings (s. 57-72). Springer. https://doi.org/10.1007/11860990_5
Mailund, Brodal, G. S., Fagerberg, R., Pedersen, C. N. S. & Phillips, D. (2006). Recrafting the Neighbor-Joining Method. BMC Bioinformatics, 7(29).
Frandsen, J., Hobolth, A., Østergaard, L., Vestergaard-Poulsen, P. & Vedel, E. B. (2006). Regularization of Diffusion Tensor Fields in Axonal Fibre Tracking. Poster-session præsenteret på PhD Day 2006, The Faculty of Health Sciences, Aarhus, Danmark.
Jørgensen, J. B. & Lassen, K. B. (2006). Requirements Engineering for the Adviser Portal Bank System. International Conference on Engineering Computer Based Systems.
Bucur, D. & Bardram, J. (2006). Resource Discovery in Activity-Based Sensor Networks. Afhandling præsenteret på International Conference on Pervasive Computing Technologies for Healthcare, Østrig. https://doi.org/10.1109/PCTHEALTH.2006.361663
Hirt, M. & Nielsen, J. B. (2006). Robust Multiparty Computation with Linear Communication Complexity. I C. Dwork (red.), Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference (s. 463-482) https://doi.org/10.1007/11818175_28
Møller-Nielsen, P. & Gejl, J. (2006). Room #2 (Den gyldne, Charlottenborg Udstillingsbygning). Poster-session præsenteret på Room #2 (Den gyldne, Charlottenborg Udstillingsbygning), København, Danmark.
Møller-Nielsen, P. & Gejl, J. (2006). Room #2 (Kunsthallen Brænderigården). Poster-session præsenteret på Room #2 (Kunsthallen Brænderigården), Viborg, Danmark.
Fitzi, M., Garay, J. A., Gollakota, S., Rangan, C. P. & Srinathan, K. (2006). Round-optimal and Efficient Verifiable Secret Sharing. I S. Halevi & T. Rabin (red.), Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006 Proceedings (s. 329-342). Springer. https://doi.org/10.1007/11681878_17
Damgård, I. B. & Ishai, Y. (2006). Scalable Secure Multiparty Computation. I C. Dwork (red.), Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedings (s. 501-520). Springer. https://doi.org/10.1007/11818175_30
Arge, L. & Zeh, N. (2006). Simple and Semi-Dynamic Structures for Cache-Oblivious Planar Orthogonal Range Searching. I Proceedings of the twenty-second annual symposium on Computational geometry (s. 158-166). Association for Computing Machinery. https://doi.org/10.1145/1137856.1137883
Almansa Guerra, J. F., Damgård, I. B. & Nielsen, J. B. (2006). Simplified Threshold RSA with Adaptive and Proactive Security. I S. Vaudenay (red.), Advances in Cryptology - Eurocrypt 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006. Proceedings (s. 593-611). Springer. https://doi.org/10.1007/11761679_35
Brodal, G. S. & Moruz, G. (2006). Skewed Binary Search Trees. I Y. Azar & T. Erlebach (red.), Algorithms – ESA 2006: 14th Annual European Symposium, Zurich, Switzerland, September 11-13, 2006. Proceedings (s. 708-719). Springer. https://doi.org/10.1007/11841036_63
Lämmel, R. & Ostermann, K. (2006). Software extension and integration with type classes: A tutorial for functional and OO programmers. I S. Jarzabek, D. C. Schmidt & T. L. Veldhuizen (red.), Generative Programming and Component Engineering '06: Proceedings of the 5th international conference on Generative programming and component engineering (s. 161-170). Association for Computing Machinery.