Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Yang, B., Guo, C., Ma, Y. & Jensen, C. S. (2015). Toward personalized, context-aware routing. V L D B Journal, 24(2), 297-318. https://doi.org/10.1007/s00778-015-0378-1
Saad-Sulonen, J. & Korsgaard, H. (2015). Towards a concept of community artifact ecology in HCI?. Afhandling præsenteret på CHI, Seoul, Sydkorea.
Nielsen, M. & Grønbæk, K. (2015). Towards highly affine visualizations of consumption data from buildings. I IVAPP 2015 - 6th International Conference on Information Visualization Theory and Applications; VISIGRAPP, Proceedings (s. 247-255). SCITEPRESS Digital Library.
Prentow, T. S., Blunck, H., Kjærgaard, M. B. & Stisen, A. (2015). Towards Indoor Transportation Mode Detection using Mobile Sensing. I S. Sigg , P. Nurmi & F. Salim (red.), Mobile Computing, Applications, and Services : 7th International Conference, MobiCASE 2015, Berlin, Germany, November 12-13, 2015, Revised Selected Papers (Bind 162). Springer. https://doi.org/10.1007/978-3-319-29003-4
Blevis, E., Koskinen, I. K., Lee, K.-P., Bødker, S., Chen, L.-L., Lim, Y., Wei, H. & Wakkary, R. (2015). Transdisciplinary Interaction Design in Design Education. I B. Begole & J. Kim (red.), Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (s. 833-838). Association for Computing Machinery. https://doi.org/10.1145/2702613.2724726
Derczynski, L., Chester, S. & Bøgh, K. S. (2015). Tune Your Brown Clustering, Please. I G. A. Angelova, K. Bontcheva & R. Mitkov (red.), International Conference Recent Advances in Natural Language Processing ’2015 Proceedings (s. 110–117). INCOMA Ltd. http://lml.bas.bg/ranlp2015/docs/RANLP_main.pdf
Garg, S. & Polychroniadou, A. (2015). Two-round adaptively secure MPC from indistinguishability obfuscation. I Y. Dodis & J. Buus Nielsen (red.), Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (s. 614-637). Springer VS. https://doi.org/10.1007/978-3-662-46497-7_24
David, B. M., Dowsley, R., van der Graaf, J., Marques, D., Nascimento, A. C. A. & Pinto, A. (2015). Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra. I E E E Transactions on Information Forensics and Security, 11(1), 59 - 73 . https://doi.org/10.1109/TIFS.2015.2476783
Bødker, S. (2015). Understanding computer applications in use: A human activity analysis. I Signs of Work: Semiosis and Information Processing in Organisations (s. 325-348). Walter de Gruyter GmbH and Co. KG. https://doi.org/10.1515/9783110819014-012
Saad-Sulonen, J., Halskov, K., Eriksson, E., Vines, J., Huybrechts, L. & Karasti, T. H. (2015). Unfolding Participation: What do we mean by participation – conceptually and in practice. Aarhus Series on Human Centered Computing , 1(1). https://doi.org/10.7146/aahcc.v1i1.21324
de Montjoye, Y.-A., Radaelli, L., Singh, V. K. & Pentland, A. S. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 347(6221), 536-539. https://doi.org/10.1126/science.1256297
Branzei, S. & Procaccia, A. D. (2015). Verifiably Truthful Mechanisms. I T. Roughgarden (red.), Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS '15 (s. 297-306 ). Association for Computing Machinery. https://doi.org/10.1145/2688073.2688098
Christensen, L. R. & Bertelsen, O. W. (2015). View of Causation for CSCW: Manipulation and Control in the Material Field of Work. I V. Wulf, K. Schmidt & D. Randall (red.), Designing Socially Embedded Technologies in the Real-World, Part II (s. 151-169). Springer. https://doi.org/10.1007/978-1-4471-6720-4_8
Klokmose, C. N., Eagan, J. R., Baader, S., Mackay, W. & Beaudouin-Lafon, M. (2015). Webstrates: Shareable Dynamic Media. I UIST'15 Proceedings of the 28th annual ACM symposium on User interface software and technology (UIST '15) Association for Computing Machinery. https://doi.org/10.1145/2807442.2807446
Hornbæk, K., Oulasvirta, A., Reeves, S. & Bødker, S. (2015). What to Study in HCI? I B. Begole & J. Kim (red.), Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (s. 2385-2388). Association for Computing Machinery. https://doi.org/10.1145/2702613.2702648
Botero, A., Van Amste, F., Seravalli, A. & Saad-Sulonen, J. (2015). WS co-designing and commoning. Nordic Design Research, 2015(6). http://www.nordes.org/opj/index.php/n13/article/view/422
Xue, H., Kelmann, P., Inati, S., Sørensen, T. S. & Hansen, M. (2014). 3D High Resolution l1-SPIRiT Reconstruction on Gadgetron based Cloud: no. 1882. Abstract fra Joint Annual Meeting ISMRM-ESMRMB, Milan, Italien. http://www.ismrm.org/14/
Prentow, T. S., Blunck, H., Stisen, A., Kjærgaard, M. B. & Grønbæk, K. (2014). Accurate estimation of indoor travel times: learned unsupervised from position traces. I M. Youssef , C. Mascolo & F. Kawsar (red.), MOBIQUITOUS '14. Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (s. 90-99). Association for Computing Machinery. https://doi.org/10.4108/icst.mobiquitous.2014.258020
Clausen, C., Danvy, O. & Masuko, M. (2014). A Characterization of Moessner's Sieve. Theoretical Computer Science, 546(August), 244–256. https://doi.org/10.1016/j.tcs.2014.03.012
Skovsgaard, A., Sidlauskas, D. & Jensen, C. S. (2014). A Clustering Approach to the Discovery of Points of Interest from Geo-Tagged Microblog Posts. I J. E. Guerrero (red.), 15th IEEE International Conference on Mobile Data Management (MDM), 2014 : Proceedings (s. 178-189 (vol. 1)). IEEE Computer Society Press. https://doi.org/10.1109/MDM.2014.28
Damgård, I. B. & Nielsen, J. B. (2014). Adaptive versus static security in the UC Model. I S. S. M. Chow , J. K. Liu, L. C. K. Hui & S. M. Yiu (red.), Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (s. 10-28). Springer VS. https://doi.org/10.1007/978-3-319-12475-9_2
Dupont-Dupuis, F., Szehr, O. & Tomamichel, M. (2014). A decoupling approach to classical data transmission over quantum channels. I E E E Transactions on Information Theory, 60(3), 1562 - 1572 . https://doi.org/10.1109/TIT.2013.2295330
Bønnelykke, K., Sleiman, P., Nielsen, K., Kreiner-Møller, E., Mercader, J. M., Belgrave, D., Den Dekker, H. T., Husby, A., Sevelsted, A., Faura-Tellez, G., Mortensen, L. J., Paternoster, L., Flaaten, R., Mølgaard, A., Smart, D. E., Thomsen, P. F., Rasmussen, M. A., Bonàs-Guarch, S., Holst, C. ... Bisgaard, H. (2014). A genome-wide association study identifies CDHR3 as a susceptibility locus for early childhood asthma with severe exacerbations. Nature Genetics, 46(1), 51-55. https://doi.org/10.1038/ng.2830
Bizjak, A., Birkedal, L. & Miculan, M. (2014). A model of countable nondeterminism in guarded type theory. I G. Dowek (red.), Rewriting and Typed Lambda Calculi: Joint International Conference, RTA-TLCA 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014. Proceedings (s. 108-123). Springer VS. https://doi.org/10.1007/978-3-319-08918-8_8
Wilkinson, B. T. (2014). Amortized bounds for dynamic orthogonal range reporting. I A. S. Schulz & D. Wagner (red.), Algorithms - ESA 2014: 22th Annual European Symposium, Wroclaw, Poland, September 8-10, 2014. Proceedings (s. 842-856). Springer. https://doi.org/10.1007/978-3-662-44777-2_69
Ruiz-Ruiz, A., Blunck, H., Prentow, T. S., Stisen, A. & Kjærgaard, M. B. (2014). Analysis Methods for Extracting Knowledge from Large-Scale WiFi Monitoring to Inform Building Facility Planning. I G. Záruba & K. Farkas (red.), Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom 2013) (s. 130 - 138 ). IEEE Communications Society. https://doi.org/10.1109/PerCom.2014.6813953
Damgård, I. B., Lauritsen, R. & Toft, T. (2014). An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation. I M. Abdalla & R. D. Prisco (red.), Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 398-415 ). Springer. https://doi.org/10.1007/978-3-319-10879-7_23
Gupta, V. (2014). Applied bioinformatics: Genome annotation and transcriptome analysis. Department of Computer Science, Aarhus University.
Toft, T. (2014). A secure priority queue; or: On secure datastructures from multiparty computation. I H.-S. Lee & D.-G. Han (red.), Information Security and Cryptology -- ICISC 2013: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers (Bind 8565, s. 20-33). Springer. https://doi.org/10.1007/978-3-319-12160-4_2
Møller, A. & Schwarz, M. R. (2014). Automated Detection of Client-State Manipulation Vulnerabilities. A C M Transactions on Software Engineering and Methodology, 23/4, Artikel 29. https://doi.org/10.1145/2531921
Bødker, S. & Polli, A. M. (2014). Between initial familiarity and future use – a case of Collocated Collaborative Writing. I C. Rossitta, L. Ciolfi, D. M. & B. Conein (red.), COOP 2014 - Proceedings of the 11th International Conference on the Design of Cooperative Systems, 27-30 May 2014, Nice (France) Springer. http://www.springer.com/computer/hci/book/978-3-319-06497-0
Wriedt Larsen, R., Obel, C., Skovgård Jensen, T. & Grønbæk, K. (2014). Big data giver gladere børn og bedre busruter. Videnskab.dk [online].
Madsen, O. L. (2014). Building Safe Concurrency Abstractions. I G. Agha, A. Igarashi, N. Kobayashi , H. Masuhara, S. Matsuoka , E. Shibayama & K. Taura (red.), Concurrent Objects and Beyond: Papers dedicated to Akinori Yonezawa on the Occasion of His 65th Birthday (s. 66-104). Springer VS. https://doi.org/10.1007/978-3-662-44471-9_4
Klokmose, C. N., Kristensen, J. B., Bagge, R. & Halskov, K. (2014). BullsEye: High-Precision Fiducial Tracking for Table-based Tangible Interaction. I R. Dachselt, N. Graham, K. Hornbæk & M. Nacenta (red.), Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces, ITS '14 (s. 269-278 ). Association for Computing Machinery. https://doi.org/10.1145/2669485.2669503
Pagh, R., Wei, Z., Yi, K. & Zhang , Q. (2014). Cache-Oblivious Hashing. Algorithmica, 69(4), 864-883. https://doi.org/10.1007/s00453-013-9763-6
Grönvall, E., Kinch, S., Petersen, M. G. & Rasmussen, M. K. (2014). Causing Commotion with a Shape-changing Bench: Experiencing Shape-Changing Interfaces in Use. I M. Jones, P. Palanque, A. Schmidt & T. Grossman (red.), CHI'14, SIGCHIConference on Human Factors in Computing Systems : Proceedings (s. 2559-2568). Association for Computing Machinery. https://doi.org/10.1145/2556288.2557360
Feldthaus, A. & Møller, A. (2014). Checking Correctness of TypeScript Interfaces for JavaScript Libraries. I OOPSLA '14 Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications Association for Computing Machinery. https://doi.org/10.1145/2660193.2660215
Hansen, K. A., Komarath, B., Sarma M. N., J., Talebanfard, N. & Skyum, S. (2014). Circuit Complexity of Properties of Graphs with Constant Planar Cutwidth. I E. Csuhaj-Varjú, M. Dietzfelbinger & Z. Ésik (red.), Mathematical Foundations of Computer Science 2014: 39th International Symposium, MFCS 2014, Budapest, Hungary, August 25-29, 2014. Proceedings, Part II (s. 336-347 ). Springer VS. https://doi.org/10.1007/978-3-662-44465-8_29
Korsgaard, H. & Brynskov, M. (2014). City Bug Report: Urban prototyping as participatory process and practice. I M. Brynskov, P. Dalsgaard & A. F. G. Schiec (red.), MAB14, Proceedings of the 2nd Media Architecture Biennale Conference : World Cities (s. 21-29). Association for Computing Machinery. https://doi.org/10.1145/2682884.2682896
Büscher, M., Liegl, M. & Thomas, V. (2014). Collective Intelligence in Crises. I D. Miorandi, V. Maltese, M. Rovatsos, A. Nijholt & J. Stewart (red.), Social Collective Intelligence: Combining the Powers of Humans and Machines to Build a Smarter Society (s. 243-265). Springer International Publishing AG. https://doi.org/10.1007/978-3-319-08681-1_12
Huang, Z., Radunović, B., Vojnović, M. & Zhang, Q. (2014). Communication Complexity of Approximate Matching in Distributed Graphs. Afhandling præsenteret på Symposium on Theoretical Aspects of Computer Science, München, Tyskland. http://www.cse.ust.hk/~huangzf/stacs15-matching.pdf