Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Scheder, D. & Tan, L. Y. (2013). On the average sensitivity and density of k-CNF formulas. I P. Prasad , S. Raskhodnikova, K. Jansen & J. D. P. Rolim (red.), Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques: 16th International Workshop, APPROX 2013, and 17th International Workshop, RANDOM 2013, Berkeley, CA, USA, August 21-23, 2013. Proceedings (s. 683-698). Springer VS. https://doi.org/10.1007/978-3-642-40328-6_47
Schäfer, Z., Mathisen, A., Thomsen, T. R., Rossing, P. & Kirketerp-Møller, K. (2023). Glucagon-like peptide-1 treatment reduces the risk of diabetes-type 2 related amputations: A cohort study in Denmark. Diabetes Research and Clinical Practice, 202, Artikel 110799. https://doi.org/10.1016/j.diabres.2023.110799
Schaeffter, T., Hansen, M. S. & Sørensen, T. S. (2012). Fast Implementation of Iterative Image Reconstruction. Afhandling præsenteret på International Society for Magnetic Resonance in Medicine, Melbourne, Australien. http://www.ismrm.org/12/SS_ImageRecon.htm
Schaefer, Z., Haab, L., Schwerdtfeger, K., Takahashi, K. & Strauss, D. J. (2020). Detection of information flow between cortical laminae activities and auditory evoked potentials in rats by means of Granger causality. I 42nd Annual International Conferences of the IEEE Engineering in Medicine and Biology Society (EMBC) (s. 876-879). IEEE. https://doi.org/10.1109/EMBC44109.2020.9176719
Scafuro, A., Siniscalchi, L. & Visconti, I. (2021). Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains. I J. A. Garay (red.), Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II (s. 469-498). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-75248-4_17
Satyanarayan, A., Strazzulla, D., Klokmose, C. N., Beaudouin-Lafon, M. & Mackay, W. (2013). The CHI 2013 interactive schedule. I W. E. Mackay, S. Brewster & S. Brewster (red.), CHI EA '13 CHI '13 Extended Abstracts on Human Factors in Computing Systems (s. 2987-2990). Association for Computing Machinery. https://doi.org/10.1145/2468356.2479591
San-Segundo, R., Blunck, H., Moreno-Pimentel, J., Stisen, A. & Gil-Martín, M. (2018). Robust Human Activity Recognition using smartwatches and smartphones. Engineering Applications of Artificial Intelligence, 72(6), 190-202. https://doi.org/10.1016/j.engappai.2018.04.002
Sandel, B. S. & Dangremond, E. (2012). Climate change and the invasion of California by grasses. Global Change Biology, 18(1), 277.
Sandel, B. S., Arge, L., Dalsgaard, B., Davies, R. G., Gaston, K. J., Sutherland, W. J. & Svenning, J.-C. (2012). Response - Global Endemism Needs Spatial Integration Response. Science, 335(6066), 285-286. https://doi.org/10.1126/science.335.6066.285-a
Sand, A., Brask, A. T., Pedersen, C. N. S., Mailund, T. & Brask, A. T. (2010). HMMlib: A C++ Library for General Hidden Markov Models Exploiting Modern CPUs. I 2010 Ninth International Workshop on Parallel and Distributed Methods in Verification and Second International Workshop on High Performance Computational Systems Biology (s. 126 - 134 ). IEEE.
Sand, A. (2014). Engineering of Algorithms for Hidden Markov models and Tree Distances. Department of Computer Science, Aarhus University.
Sammler, M., Hammond, A., Lepigre, R., Campbell, B., Pichon-Pharabod, J., Dreyer, D., Garg, D. & Sewell, P. (2022). Islaris: verification of machine code against authoritative ISA semantics. I R. Jhala & I. Dillig (red.), PLDI 2022 - Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation (s. 825-840). Association for Computing Machinery. https://doi.org/10.1145/3519939.3523434
Salgado, M. & Saad-Sulonen, J. (2016). Who needs us? Inquiring into the participatory practices of others and what it means for participatory designers. Afhandling præsenteret på International European Academy of Design Conference, Paris, Frankrig.
Saleem, M. A., Soares da Costa, F., Dolog, P., Karras, P., Pedersen, T. B. & Calders, T. (2018). Predicting Visitors Using Location-Based Social Networks. I Proceedings - 2018 IEEE 19th International Conference on Mobile Data Management, MDM 2018 (s. 245-250). IEEE. https://doi.org/10.1109/MDM.2018.00043
Saleem, M. A., Calders, T., Pedersen, T. B. & Karras, P. (2021). Finding Geo-Social Cohorts in Location-Based Social Networks. I L. H. U, M. Spaniol, Y. Sakurai & J. Chen (red.), Web and Big Data - 5th International Joint Conference, APWeb-WAIM 2021, Proceedings: 5th International Joint Conference, APWeb-WAIM 2021, Proceedings, Part II (s. 368-383). Springer International Publishing. https://doi.org/10.1007/978-3-030-85899-5_27
Saioc, G.-V., Shirchenko, D. & Chabbi, M. (2024). Unveiling and Vanquishing Goroutine Leaks in Enterprise Microservices: a Dynamic Analysis Approach. I T. Grosser, C. Dubach, M. Steuwer, J. Xue, G. Ottoni & F. M. Q. Pereira (red.), 2024 IEEE/ACM International Symposium on Code Generation and Optimization (CGO) (s. 411-422). IEEE. https://doi.org/10.1109/CGO57630.2024.10444835
Saioc, G.-V., Lange, J. & Møller, A. (2024). Automated Verification of Parametric Channel-Based Process Communication. I Proceedings of the ACM on Programming Languages (Bind 8, s. 2070-2096). Artikel 344 https://doi.org/10.1145/3689784
Saioc, G.-V., Lee, I.-T. A., Møller, A. & Chabbi, M. (2025). Dynamic Partial Deadlock Detection and Recovery via Garbage Collection. I ASPLOS 2025 - Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (s. 244-259). Association for Computing Machinery. https://doi.org/10.1145/3676641.3715990
Safavi, T., Belth, C., Faber, L., Mottin, D., Müller, E. & Koutra, D. (2019). Personalized Knowledge Graph Summarization: From the Cloud to Your Pocket. 528-537. Afhandling præsenteret på IEEE International Conference on Data Mining, Beijing, Kina. https://web.eecs.umich.edu/~dkoutra/papers/19_ICDM_GLIMPSE-CR.pdf
Sacharidis, D., Bouros, P. & Chondrogiannis, T. (2017). Finding The Most Preferred Path. I E. Hoel, S. Newsam, S. Ravada , R. Tamassia & G. Trajcevski (red.), GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems Artikel 5 Association for Computing Machinery. https://doi.org/10.1145/3139958.3140029
Saatci, B., Rädle, R., Rintel, S., O'Hara, K. & Klokmose, C. N. (2019). Hybrid Meetings in the Modern Workplace: Stories of Success and Failure. 45-61. Afhandling præsenteret på International Conference on Collaboration and Technology, Kyoto, Japan.
Saad-Sulonen, J. & Korsgaard, H. (2015). Towards a concept of community artifact ecology in HCI?. Afhandling præsenteret på CHI, Seoul, Sydkorea.
Saad-Sulonen, J., Halskov, K., Eriksson, E., Vines, J., Huybrechts, L. & Karasti, T. H. (2015). Unfolding Participation: What do we mean by participation – conceptually and in practice. Aarhus Series on Human Centered Computing , 1(1). https://doi.org/10.7146/aahcc.v1i1.21324
Rysgaard, C. M. & Wild, S. (2025). Lazy B-Trees. I P. Gawrychowski, F. Mazowiecki & M. Skrzypczak (red.), 50th International Symposium on Mathematical Foundations of Computer Science, MFCS 2025 Artikel 87 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.MFCS.2025.87
Ruiz-Ruiz, A., Blunck, H., Prentow, T. S., Stisen, A. & Kjærgaard, M. B. (2014). Analysis Methods for Extracting Knowledge from Large-Scale WiFi Monitoring to Inform Building Facility Planning. I G. Záruba & K. Farkas (red.), Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom 2013) (s. 130 - 138 ). IEEE Communications Society. https://doi.org/10.1109/PerCom.2014.6813953
Roy, L. & Xu, J. (2023). A Universally Composable PAKE with Zero Communication Cost: (And Why It Shouldn’t Be Considered UC-Secure). I A. Boldyreva & V. Kolesnikov (red.), Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I (s. 714-743). Springer. https://doi.org/10.1007/978-3-031-31368-4_25
Rossitto, C., Berns, K. & Larsen-Ledet, I. (2020). Strategies of Visibility: Growth, Media and Social Movements. Afhandling præsenteret på The 23rd ACM Conference on Computer-Supported Cooperative Work and Social Computing.
Rossitto, C., Lampinen, A., Bødker, S., Light, A., Berns, K. & Hui, J. (2020). Reconsidering scale and scaling in CSCW research. I CSCW '20 : Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing (s. 493-501). Association for Computing Machinery. https://doi.org/10.1145/3406865.3419409
Rossitto, C., Korsgaard, H., Lampinen, A. & Bødker, S. (2021). Efficiency and Care in Community-Led Initiatives. Proceedings of the ACM on Human-Computer Interaction, 5(CSCW2), Artikel 467. https://doi.org/10.1145/3479611
Rossi, L., Magnani, M. & Ladarola , B. (2012). Rescatemineros: Global Media Events in the Microblogging Age. Social Science Electronic Publishing. http://ssrn.com/abstract=1989791
Rossi, L. & Magnani, M. (2012). Conversation practices and network structure in Twitter. I Proceedings of the Sixth International Conference on Weblogs and Social Media (s. 563-566). AAAI Press. http://www.aaai.org/ocs/index.php/ICWSM/ICWSM12/paper/view/4634
Rodriguez, J. M., Tavassoli, N., Levy, E., Lederman, G., Sivov, D., Lissandrini, M. & Mottin, D. (2024). Does the Performance of Text-to-Image Retrieval Models Generalize Beyond Captions-as-a-Query? I N. Goharian, N. Tonellotto, Y. He, A. Lipani, G. McDonald, C. Macdonald & I. Ounis (red.), Advances in Information Retrieval: 46th European Conference on Information Retrieval, ECIR 2024, Glasgow, UK, March 24–28, 2024, Proceedings, Part IV (s. 161-176). Springer. https://doi.org/10.1007/978-3-031-56066-8_15
Rocha, R. V. M., Libório, P. P., Kupwade Patil, H. & Aranha, D. F. (2021). A Differentially Private Hybrid Approach to Traffic Monitoring. I K. Sako & N. O. Tippenhauer (red.), Applied Cryptography and Network Security - ACNS 2021 (s. 233-256). Springer. https://doi.org/10.1007/978-3-030-78375-4_10