Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Jespersen, S., Stounbjerg, R. B. K. & Verdezoto, N. (2015). AmBird: Mediating Intimacy for Long Distance Relationships through an Ambient Awareness System. I O. W. Bertelsen & K. Halskov (red.), Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers. Department of Computer Science, Aarhus University. https://doi.org/10.7146/aahcc.v1i1.21321
Bizjak, A. & Møgelberg, R. E. (2015). A model of guarded recursion with clock synchronisation. Electronic Notes in Theoretical Computer Science, 319, 83-101. https://doi.org/10.1016/j.entcs.2015.12.007
Paviotti, M., Møgelberg, R. E. & Birkedal, L. (2015). A model of PCF in guarded type theory. Electronic Notes in Theoretical Computer Science, 319, 333–349. https://doi.org/10.1016/j.entcs.2015.12.020
Walter, R., Bulling, A., Lindlbauer, D., Schuessler , M. & Müller, J. (2015). Analyzing visual attention during whole body interaction with public displays. I Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '15 (s. 1263-1267). Association for Computing Machinery. https://doi.org/10.1145/2750858.2804255
Caragiannis, I., Filos-Ratsikas, A. & Procaccia, A. D. (2015). An improved 2-agent kidney exchange mechanism. Theoretical Computer Science, 589, 53–60. https://doi.org/10.1016/j.tcs.2015.04.013
Goswami, M., Jørgensen, A. G., Larsen, K. G. & Pagh, R. (2015). Approximate Range Emptiness in Constant Time and Optimal Space. I Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '15 (s. 769-775). Society for Industrial and Applied Mathematics. http://dl.acm.org/citation.cfm?id=2133036&picked=prox
Durkota, K., Lisý, V., Bosansky, B. & Kiekintveld, C. (2015). Approximate solutions for attack graph games with imperfect information. I 6th International Conference on Decision and Game Theory for Security, GameSec 2015 (Bind 9406, s. 228-249). Springer. https://doi.org/10.1007/978-3-319-25594-1_13
Sieczkowski, F., Svendsen, K., Birkedal, L. & Pichon-Pharabod, J. (2015). A separation logic for fictional sequential consistency. I J. Vitek (red.), Programming Languages and Systems : 24th European Symposiumon Programming, ESOP 2015 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015 (s. 736-761). Springer. https://doi.org/10.1007/978-3-662-46669-8_30
Hadlak, S., Schumann, H. & Schulz, H.-J. (2015). A Survey of Multi-faceted Graph Visualization. I R. Borgo, F. Ganovelli & I. Viola (red.), EuroVis'15 State of the Art Reports (s. 1-20). Eurographics Association. https://doi.org/10.2312/eurovisstar.20151109
Faust, S., Mukherjee, P., Nielsen, J. B. & Venturi, D. (2015). A Tamper and Leakage Resilient von Neumann Architecture. I J. Katz (red.), Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (s. 579-603). Springer VS. https://doi.org/10.1007/978-3-662-46447-2_26
Jensen, C. S. (2015). Automated Testing of Event-Driven Applications. Department of Computer Science, Aarhus University.
Müller, J., Eberle, D. & Schmidt, C. (2015). BaseLase: An Interactive Focus + Context Laser Floor. I B. Begole & J. Kim (red.), CHI '15, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (s. 3869-3878 ). Association for Computing Machinery. http://dx.doi.org/10.1145/2702123.2702246
Entwistle, J. M., Rasmussen, M. K., Verdezoto, N., Brewer, R. S. & Andersen, M. S. (2015). Beyond the Individual: The Contextual Wheel of Practice as a Research Framework for Sustainable HCI. I B. Begole & J. Kim (red.), Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15 (s. 1125-1134 ). Association for Computing Machinery. https://doi.org/10.1145/2702123.2702232
Chandran, N., Goyal, V., Mukherjee, P., Pandey, O. & Upadhyay, J. (2015). Block-wise Non-Malleable Codes. Cryptology ePrint Archive. http://eprint.iacr.org/2015/129
Dupont-Dupuis, F. (2015). Chain rules for quantum Rényi entropies. Journal of Mathematical Physics, 56(2), Artikel 1.4907981. https://doi.org/10.1063/1.4907981
Brewer, R. S., Verdezoto, N., Rasmussen, M. K., Entwistle, J. M., Grønbæk, K., Blunck, H. & Holst, T. (2015). Challenge: Getting Residential Users to Shift Their Electricity Usage Patterns. I S. Kalyanaraman, D. P. Seetharam & R. Shorey (red.), The sixth ACM International Conference on Future Energy Systems (ACM e-Energy) (s. 83-88). Association for Computing Machinery. https://doi.org/10.1145/2768510.2770934
Rasmussen, M. K. (2015). Changing the Shape of Interaction: Shape-changing Interfaces. Department of Computer Science, Aarhus University.
Branzei, S., Hosseini, H. & Miltersen, P. B. (2015). Characterization and Computation of Equilibria for Indivisible Goods. I Algorithmic Game Theory: 8th International Symposium, SAGT 2015, Saarbrücken, Germany, September 28–30, 2015, Proceedings (s. 244-255). Springer VS. https://doi.org/10.1007/978-3-662-48433-3_19
Bothorel, C., Cruz, J. D., Magnani, M. & Micenková, B. (2015). Clustering attributed graphs: models, measures and methods. Network Science , 3(03), 408-444. https://doi.org/10.1017/nws.2015.9
Bosansky, B., Xin Jiang, A., Tambe, M. & Kiekintveld, C. (2015). Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies. I Proceedings of the twenty-ninth AAAI Conference on Artificial Intelligence and the twenty-seventh Innovative Applications of Artificial Intelligence Conference (s. 812-818). AAAI Press. http://www.aaai.org/ocs/index.php/AAAI/AAAI15/paper/view/9824/9373
Bosansky, B., Xin Jiang, A., Tambe, M. & Kiekintveld, C. (2015). Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies. I AAAI'15: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (s. 812-818) http://teamcore.usc.edu/papers/2015/bosansky_1567.pdf
Huang, Z., Radunović, B., Vojnović, M. & Zhang, Q. (2015). Communication complexity of approximate matching in distributed graphs. I 32nd International Symposium on Theoretical Aspects of Computer Science: STACS’15, March 4–7, 2015, Garching, Germany (s. 460-473). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.STACS.2015.460
Branzei, S. (2015). Computational Fair Division. Department of Computer Science, Aarhus University.
Bosansky, B., Branzei, S., Hansen, K. A., Miltersen, P. B. & Sørensen , T. B. (2015). Computation of Stackelberg Equilibria of Finite Sequential Games. I E. Markakis & G. Schäfer (red.), Web and Internet Economics: 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015, Proceedings (Bind 9470, s. 201-215). Springer VS. http://arxiv.org/abs/1507.07677
Alexander, C., Arge, L., Bøcher, P. K., Revsbæik, M., Sandel, B. S., Svenning, J.-C., Tsirogiannis, C. & Yang, J. (2015). Computing River Floods Using Massive Terrain Data. I Proceedings. Workshop on Massive Data Algorithmics (MASSIVE) (s. 67-85)
Gronvall, E., Verdezoto, N., Bagalkot, N. L. & Sokoler, T. (2015). Concordance: A Critical Participatory Alternative in Healthcare IT. I O. W. Bertelsen & K. Halskov (red.), Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers. Department of Computer Science, Aarhus University. https://doi.org/10.7146/aahcc.v1i1.21315
Fender, A., Müller, J. & Lindlbauer, D. (2015). Creature Teacher: A Performance-Based Animation System for Creating Cyclic Movements. I Proceedings of the 3rd ACM Symposium on Spatial User Interaction, SUI '15 (s. 113-122). Association for Computing Machinery. https://doi.org/10.1145/2788940.2788944
Pold, S., Bertelsen, O. W., Koefoed Hansen, L., Andersen, C. U., Bardzell, S. & Bardzell, J. (2015). Criticism – for Computational Alternatives. I O. Bertelsen & K. Halskov (red.), Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers Department of Computer Science, Aarhus University. https://doi.org/10.7146/aahcc.v1i1.21621
Askarov, A., Moore, S., Dimoulas, C. & Chong, S. (2015). Cryptographic Enforcement of Language-Based Information Erasure. I L. Viganò (red.), 28th IEEE Computer Security Foundations Symposium CSF 2015 : Proceedings (s. 334-348). IEEE Computer Society Press. https://doi.org/10.1109/CSF.2015.30
Spitters, B. (2015). Cubical sets as a classifying topos. Abstract fra 21st International Conference on Types for Proofs and Programs, , Tallinn, Estland.
Brodal, G. S., Sioutas, S., Pantazos, K. & Zaroliagis, C. D. (2015). D2-tree: A new overlay with deterministic bounds. Algorithmica, 72(3), 860-883. https://doi.org/10.1007/s00453-014-9878-4
Sonne, T. & Grønbæk, K. (2015). Designing Assistive Technologies for the ADHD Domain. Afhandling præsenteret på 5th EAI International Symposium on Pervasive Computing Paradigms for Mental Health, Milan, Italien.
Sonne, T., Obel, C. & Grønbæk, K. (2015). Designing Real Time Assistive Technologies: A Study of Children with ADHD. I OzCHI '15: Proceedings of the Annual Meeting of the Australian Special Interest Group for Computer Human Interaction (s. 34-38). Association for Computing Machinery. https://doi.org/10.1145/2838739.2838815
Xue, H., Inati, S., Sangild, T., Kellman, P. & Hansen, M. (2015). Distributed MRI Reconstruction using Gadgetron based Cloud Computing. Magnetic Resonance in Medicine, 73(3), 1015–1025. https://doi.org/10.1002/mrm.25213
Skovgaard, C., Thomsen, J. R., Verdezoto, N. & Vestergaard, D. (2015). DogPulse: Augmenting the Coordination of Dog Walking through an Ambient Awareness System at Home. I S. Nanayakkara & E. Y.-L. Do (red.), AH '15, Proceedings of the 6th Augmented Human International Conference: SIGCHI ACM. (s. 41-44). Association for Computing Machinery. https://doi.org/10.1145/2735711.2735825
Nielsen, N., Pedersen, S. B., Sørensen, J. A., Verdezoto, N. & Øllegaard, N. (2015). EcoBears: Augmenting Everyday Appliances with Symbolic and Peripheral Feedback. I S. Nanayakkara & E. Y.-L. Do (red.), AH '15 Proceedings of the 6th Augmented Human International Conference. SIGCHI ACM. (s. 155-156). Association for Computing Machinery. https://doi.org/10.1145/2735711.2735817
Blevis, E., Bødker, S., Flach, J., Forlizzi, J., Jung , H., Kaptelinin, V., Nardi, B. & Rizzo, A. (2015). Ecological Perspectives in HCI: Promise, Problems, and Potential. Abstract fra CHI Workshop on Ecological Perspectives in HCI, Sydkorea. https://doi.org/10.1145/2702613.2702634
Yang, J. (2015). Efficient Algorithms for HandlingMassive Terrains. Department of Computer Science, University of Aarhus.
Mortensen, M. L., Chester, S., Assent, I. & Magnani, M. (2015). Efficient caching for constrained skyline queries. I International Conference on Extending Database Technology (EDBT 2015) (s. 337-348). openproceedings.org. https://doi.org/10.5441/002/edbt.2015.30
Andrychowicz, M., Damgård, I. B., Dziembowski, S., Faust, S. & Polychroniadou, A. (2015). Efficient leakage resilient circuit compilers. I K. Nyberg (red.), Topics in Cryptology - CT-RSA 2015: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (s. 311-329). Springer VS. https://doi.org/10.1007/978-3-319-16715-2_17
Genkin, D., Ishai , Y. & Polychroniadou, A. (2015). Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits. I R. Gennaro & M. Robshaw (red.), Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II (s. 721-741). Springer VS. https://doi.org/10.1007/978-3-662-48000-7_35
Döttling, N. M. & Schröder, D. (2015). Efficient Pseudorandom Functions via On-the-Fly Adaptation. I R. Gennaro & M. Robshaw (red.), Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I (s. 329-350). Springer VS. https://doi.org/10.1007/978-3-662-47989-6_16
David, B., Dowsley, R., Katti, R. & Nascimento, A. C. A. (2015). Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols. I M.-H. Au & A. Miyaji (red.), Provable Security: 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings (Bind 9451, s. 354-367). Springer VS. https://doi.org/10.1007/978-3-319-26059-4_20