Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Puech, M. (2013). Proofs, Upside Down. I Programming Languages and Systems: 11th Asian Symposium, APLAS 2013, Melbourne, VIC, Australia, December 9-11, 2013. Proceedings (s. 365-380 ). Springer VS. https://doi.org/10.1007/978-3-319-03542-0_26
Korsgaard, H. & Brynskov, M. (2013). Prototyping a Smart City. Afhandling præsenteret på International Workshop Digital Cities, Munich, Tyskland.
Zottarel, A. (2013). Public key cryptography from weaker assumptions. Institut for Datalogi, Aarhus Universitet.
Jensen, C. S. (2013). Querying the Web with Local Intent. Abstract fra International Conference on Mobile Data Management, Milan, Italien. https://doi.org/10.1109/MDM.2013.101
Arge, L. & Thorup, M. (2013). RAM-Efficient External Memory Sorting. I L. Cai, S.-W. Cheng & T.-W. Lam (red.), Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (s. 491-501 ). Springer VS. https://doi.org/10.1007/978-3-642-45030-3_46
Dagdelen, Ö., Mohassel, P. & Venturi, D. (2013). Rate-limited secure function evaluation: Definitions and constructions. I K. Kurosawa & G. Hanaoka (red.), Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings (Bind 7778 LNCS, s. 461-478). Springer VS. https://doi.org/10.1007/978-3-642-36362-7_28
Miltersen, P. B. (2013). Recent results on howard's algorithm. I A. Kučera (red.), Mathematical and Engineering Methods in Computer Science: 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, 2012, Revised Selected Papers (s. 53-56). Springer VS. https://doi.org/10.1007/978-3-642-36046-6_6
Brucato, M., Derczynski, L., Llorens, H., Bontcheva, K. & Jensen, C. S. (2013). Recognising and Interpreting Named Temporal Expressions. I G. Angelova, K. Bontcheva & R. Mitkov (red.), Proceedings of Recent Advances in Natural Language Processing (s. 113-122). INCOMA Ltd. http://lml.bas.bg/ranlp2013/history.php
Thomsen, J. G., Clausen, C., Andersen, K. J., Danaher, J. & Ernst, E. (2013). Reducing Lookups for Invariant Checking. I G. Castagna (red.), ECOOP 2013 – Object-Oriented Programming : 27th European Conference, Montpellier, France, July 1-5, 2013. Proceedings (s. 426-450). Springer VS. https://doi.org/10.1007/978-3-642-39038-8_18
Moon, B., Jun, J. Y., Lee, J., Kim, K., Hachisuka, T. & Yoon , S. E. (2013). Robust Image Denoising using a Virtual Flash Image for Monte Carlo Ray Tracing. Computer Graphics Forum, 32(1), 139–151. https://doi.org/10.1111/cgf.12004
Ceikute, V. & Jensen, C. S. (2013). Routing Service Quality—Local Driver Behavior Versus Routing Services. I IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1 ) (s. 97 - 106 ). IEEE. https://doi.org/10.1109/MDM.2013.20
Lipmaa, H. & Toft, T. (2013). Secure equality and greater-than tests with sublinear online complexity. I F. V. Fomin , R. Freivalds, M. Kwiatkowska & D. Peleg (red.), Automata, Languages, and Programming: Proceedings, 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Part II (s. 645-656). Springer Publishing Company. https://doi.org/10.1007/978-3-642-39212-2_56
Damgård, I. B., Jakobsen, T. P., Nielsen, J. B. & Pagter, J. I. (2013). Secure Key Management in the Cloud. I M. Stam (red.), Cryptography and Coding: 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings (s. 270-289 ). Springer VS. https://doi.org/10.1007/978-3-642-45239-0_16
Feldthaus, A. & Møller, A. (2013). Semi-Automatic Rename Refactoring for JavaScript. ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages and Applications, 323-338 . https://doi.org/10.1145/2509136.2509520
Jensen, C. S., Møller, A. & Su, Z. (2013). Server Interface Descriptions for Automated Testing of JavaScript Web Applications. I B. Meyer, L. Baresi & M. Mezini (red.), Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013 (s. 510-520 ). Association for Computing Machinery. https://doi.org/10.1145/2491411.2491421
Xu, Y., Johnson, P. M., Moore, C. A., Brewer, R. S. & Takayama, J. (2013). SGSEAM: Assessing serious game frameworks from a stakeholder experience perspective. I Gamification 2013: Proceedings of the First International Conference on Gameful Design, Research, and Applications Enterprice Gamification Consultancy. http://csdl.ics.hawaii.edu/techreports/2013/13-03/13-03.pdf
Magnani, M., Assent, I., Hornbæk, K., Jakobsen, M. R. & Larsen, K. F. (2013). SkyView: a user evaluation of the skyline operator. I Q. He & A. Iyengar (red.), Proceedings of the 22nd ACM International Conference on Information & Knowledge Management, CIKM '13 (s. 2249-2254 ). Association for Computing Machinery. https://doi.org/10.1145/2505515.2505739
Brody, J. E., Chen, S., Papakonstantinou , P. A., Song, H. & Sun, X. (2013). Space-bounded communication complexity. I Proceedings of the 4th conference on Innovations in Theoretical Computer Science , ITCS '13 (s. 159-172 ). Association for Computing Machinery. https://doi.org/10.1145/2422436.2422456
Cozza, V., Messina, A., Montesi, D., Arietta, L. & Magnani, M. (2013). Spatio-temporal keyword queries in social networks. I B. Catania, G. Guerrini & J. Pokorný (red.), Advances in Databases and Information Systems: 17th East European Conference, ADBIS 2013, Genoa, Italy, September 1-4, 2013. Proceedings (s. 70-83). Springer Publishing Company. https://doi.org/10.1007/978-3-642-40683-6_6
Hachisuka, T., Jarosz, W., Georgiev, I., Kaplanyan, A., Nowrouzezahrai, D. & Spencer, B. (2013). State of the Art in Photon-Density Estimation: Course notes. I Proceeding, SA '13 SIGGRAPH Asia 2013 Courses Association for Computing Machinery. https://doi.org/10.1145/2542266.2542281
Jensen, S. H. (2013). Static Analysis for JavaScript. Datalogisk Institut, Aarhus Universitet.
Birkedal, L., Bizjak, A. & Schwinghamme, J. (2013). Step-Indexed Relational Reasoning for Countable Nondeterminism. Logical Methods in Computer Science, 9(4), Artikel 4. https://doi.org/10.2168/LMCS-9(4:4)2013
Ibsen-Jensen, R. & Chatterjee , K. (2013). Strategy Complexity of Finite-Horizon Markov Decision Processes and Simple Stochastic Games. I A. Kučera , T. A. Henzinger, J. Nešetřil, T. Vojnar & D. Antoš (red.), Mathematical and Engineering Methods in Computer Science: 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, 2012, Revised Selected Papers (s. 106-117). Springer VS. https://doi.org/10.1007/978-3-642-36046-6_11
Ibsen-Jensen, R. (2013). Strategy complexity of two-player, zero-sum games. Department of Computer Science, University of Aarhus.
Bringmann, K. & Larsen, K. G. (2013). Succinct Sampling from Discrete Distributions. I Proceedings of the 45th annual ACM Symposium on Theory of Computing, STOC '13 (s. 775-782 ). Association for Computing Machinery. https://doi.org/10.1145/2488608.2488707
Dahl, M. (2013). Symbolic Analysis of Cryptographic Protocols: Models, Methods, and Soundness. Department of Computer Science, Aarhus University.
Nielsen, M. B., Söderström , A. & Bridson, R. (2013). Synthesizing Waves from Animated Height Fields. A C M Transactions on Graphics, 32(1), Artikel Article 2. https://doi.org/10.1145/2421636.2421638
Pakanen, M., Polli, A. M., Lee, S., Lindley, J. & Goncalves, J. (2013). Tending a Virtual Garden: Exploring Connectivity between Cities. I UbiComp '13 Adjunct Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication (s. 761-764 ). Association for Computing Machinery. https://doi.org/10.1145/2494091.2496004
Jensen, C. S., Jerma, C., Lu, J., Tanin, E. & Zhou, X. (red.) (2013). The 2013 IEEE 29th International Conference on Data Engineering. IEEE Communications Society. https://doi.org/10.1109/ICDE.2013.6544799
Satyanarayan, A., Strazzulla, D., Klokmose, C. N., Beaudouin-Lafon, M. & Mackay, W. (2013). The CHI 2013 interactive schedule. I W. E. Mackay, S. Brewster & S. Brewster (red.), CHI EA '13 CHI '13 Extended Abstracts on Human Factors in Computing Systems (s. 2987-2990). Association for Computing Machinery. https://doi.org/10.1145/2468356.2479591
Hansen, T. D. & Ibsen-Jensen, R. (2013). The complexity of interior point methods for solving discounted turn-based stochastic games. I The Nature of Computation, Logic, Algorithms, Applications: 9th Conference on Computability in Europe, CiE 2013, Milan, Italy, July 1-5, 2013. Proceedings (s. 252-262). Springer VS. https://doi.org/10.1007/978-3-642-39053-1_29
Brodal, G. S., Brodnik, A. & Davoodi, P. (2013). The encoding complexity of two dimensional range minimum data structures. I H. L. Bodlaender & G. F. Italiano (red.), Algorithms – ESA 2013: 21st Annual European Symposium, Sophia Antipolis, France, September 2-4, 2013. Proceedings (s. 229-240). Springer VS. https://doi.org/10.1007/978-3-642-40450-4_20
Dalsgaard, P., Halskov, K. & Klokmose, C. N. (2013). The interplay between personal and collaborative computing at big wall displays. I M. Rester, P. Judmaier, T. De Groeve & A. Annunziato (red.), Collaborative Human-Computer Interaction with Big Wall Displays - BigWallHCI 2013 3rd JRC ECML Crisis Management Technology Workshop: 3rd JRC ECML Crisis Management Technology Workshop Publications office of the European Union. http://lunar.jrc.it/critech/Home/tabid/36/Default.aspx
Klokmose, C. N. & Bertelsen, O. W. (2013). The Mysterious Whiteboard. I P. Kotzé , G. Marsden , G. Lindgaard, J. Wesson & M. Winckler (red.), Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part II (s. 37-54 ). Springer VS. https://doi.org/10.1007/978-3-642-40480-1_3
Afshani, P., Agrawal, M., Benjamin, D., Doerr, C., Larsen, K. G. & Mehlhorn, K. (2013). The Query Complexity of Finding a Hidden Permutation. I A. Brodnik, A. López-Ortiz, V. Raman & A. Viola (red.), Space-Efficient Data Structures, Streams, and Algorithms: Papers in Honor of J. Ian Munro on the Occasion of His 66th Birthday (s. 1-11). Springer VS. https://doi.org/10.1007/978-3-642-40273-9_1
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2013). The SITA principle for Location Privacy: Conceptual model and architecture . I 2013 International Conference on Privacy and Security in Mobile Systems (PRISMS) (s. 1 - 8 ). IEEE. https://doi.org/10.1109/PRISMS.2013.6927184
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2013). The SITA principle for Location Privacy – Conceptual Model and Architecture. Afhandling præsenteret på International Conference on Privacy and Security in Mobile Systems, Atlantic City, NJ, USA.