Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Munro, J. I., Navarro, G., Nielsen, J. A. S. & ShaH, R. (2014). Top- k Term-Proximity in Succinct Space. I H.-K. Ahn & C.-S. Shin (red.), Algorithms and Computation: 25th International Symposium, ISAAC 2014, Proceedings (s. 169-180 ). Springer VS. https://doi.org/10.1007/978-3-319-13075-0_14
Munch-Hansen, A., Orlandi, C. & Yakoubov, S. (2021). Stronger Notions and a More Efficient Construction of Threshold Ring Signatures. I P. Longa & C. Ràfols (red.), Progress in Cryptology – LATINCRYPT 2021 : 7th International Conference on Cryptology and Information Security in Latin America, Proceedings (s. 363-381). Springer. https://doi.org/10.1007/978-3-030-88238-9_18
Munch-Hansen, A. (2023). Quattro Formaggi: Zero-Knowledge from VOLE. [Ph.d.-afhandling, Aarhus Universitet]. Aarhus Universitet.
Müller-Lennert, M., Dupont-Dupuis, F., Szehr, O., Fehr, S. & Tomamichel, M. (2013). On quantum Rényi entropies: A new generalization and some properties. Journal of Mathematical Physics, 54(12), Artikel 122203. https://doi.org/10.1063/1.4838856
Müller, E., Assent, I., Günnemann, S., Gerwert, P., Hannen, M., Jansen, T. & Seidl, T. (2011). A Framework for Evaluation and Exploration of Clustering Algorithms in Subspaces of High Dimensional Databases. I T. Härder, W. Lehner, B. Mitschang, H. Schöning & H. Schwarz (red.), Proceedings of the 14th GI Conference on Database Systems for Business, Technology, and the Web (BTW 2011) (s. 347-366). Gesellschaft für Informatik e.V..
Müller, E., Assent, I., Günnemann, S. & Seidl, T. (2011). Scalable Density-Based Subspace Clustering. I Proceedings of the 20th ACM international conference on Information and knowledge management (s. 1077-1086). Association for Computing Machinery. https://doi.org/10.1145/2063576.2063733
Müller, J., Eberle, D. & Schmidt, C. (2015). BaseLase: An Interactive Focus + Context Laser Floor. I B. Begole & J. Kim (red.), CHI '15, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (s. 3869-3878 ). Association for Computing Machinery. http://dx.doi.org/10.1145/2702123.2702246
Müller, J., Oulasvirta, A. & Murray-Smith, R. (2017). Control theoretic models of pointing. ACM Transactions on Computer-Human Interaction, 24(4), Artikel 27. https://doi.org/10.1145/3121431
Müller, J. (2017). Dynamics of pointing with pointer acceleration. I R. Bernhaupt, G. Dalvi, A. Joshi, D. K. Balkrishan, J. O'Neill & M. Winckler (red.), Human-Computer Interaction - INTERACT 2017 - 16th IFIP TC 13 International Conference, Proceedings (Bind 10515 LNCS, s. 475-495). Springer VS. https://doi.org/10.1007/978-3-319-67687-6_33
Müller, M., Schuster, P., Starup, J. L., Ostermann, K. & Brachthäuser, J. I. (2023). From Capabilities to Regions: Enabling Efficient Compilation of Lexical Effect Handlers. Proceedings of the ACM on Programming Languages , 7(OOPSLA2), Artikel 255. https://doi.org/10.1145/3622831
Muller, E., Assent, I., Iglesias, P., Mülle, Y. & Böhm, K. B. (2012). Outlier Ranking via Subspace Analysis in Multiple Views of the Data. I Proceedings of the 12th IEEE International Conference on Data Mining, ICDM (s. 529 - 538 ). IEEE Communications Society. https://doi.org/10.1109/ICDM.2012.112
Muller, M., Neureiter, K., Verdezoto, N., Krischkowsky, A., Al Zubaidi-Polli, A. M. & Tscheligi, M. (2016). Collaborative Appropriation: How Couples, Teams, Groups and Communities Adapt and Adopt Technologies. I Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion, CSCW 2016 Companion: CSCW '16 Companion (s. 473-480). Association for Computing Machinery. https://doi.org/10.1145/2818052.2855508
Mukund, M. & Nielsen, M. (1992). CCS, locations and asynchronous transition systems. I R. Shyamasundar (red.), Foundations of Software Technology and Theoretical Computer Science: 12th Conference New Delhi, India, December 18-20, 1992 Proceedings (s. 328-341). Springer. https://doi.org/10.1007/3-540-56287-7_116
Mukherjee, P. (2015). Protecting Cryptographic Memory against Tampering Attack. Department of Computer Science, Aarhus University.
Mueller, F., Petersen, M. G. & Li, Z. (2023). Technology futures: Towards understanding how to design awe-inspiring futures. International Journal of Human Computer Studies, 170, Artikel 102961. https://doi.org/10.1016/j.ijhcs.2022.102961
Mu, Q., Borowski, M., Grønbæk, J. E., Bødker, S. & Hoggan, E. (2024). Whispering Through Walls: Towards Inclusive Backchannel Communication in Hybrid Meetings. I CHI 2024 - Proceedings of the 2024 CHI Conference on Human Factors in Computing Sytems: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems Artikel 1032 Association for Computing Machinery. https://doi.org/10.1145/3613904.3642419
Mottin, D., Marascu, A., Basu Roy, S., Das, G., Palpanas, T. & Velegrakis, Y. (2013). A Probabilistic Optimization Framework for the Empty-Answer Problem. PVLDB, 6(14).
Mottin, D., Palpanas, T. & Velegrakis, Y. (2013). Entity ranking using click-log information. Intelligent Data Analysis, 17(5), 837-856.
Mottin, D., Lissandrini, M., Velegrakis, Y. & Palpanas, T. (2019). Exploring the Data Wilderness through Examples. I SIGMOD 2019 - Proceedings of the 2019 International Conference on Management of Data (s. 2031-2035). Association for Computing Machinery. https://doi.org/10.1145/3299869.3314031
Mosses, P. D. (2002). Action Semantics and ASF+SDF: System demonstration. Electronic Notes in Theoretical Computer Science, 65(3).
Mosses, P. D. (2004). Exploiting Labels in Structural Operational Semantics. Fundamenta Informaticae, 60, 17-31.
Mosses, P. D., Haddad, H. (red.), Omicini, A. (red.), Wainwright, R. L. (red.) & Liebrock, L. M. (red.) (2004). Exploiting Labels in Structural Operational Semantics. I Ikke angivet (s. 1476-1481). Association for Computing Machinery.
Mosses, P. D., Karsai, G. (red.) & Visser, E. (red.) (2004). Modular Language Descriptions. I Ikke angivet (3286 i Lecture Notes in Computer Science udg., s. 489-490). Springer.
Mosses, P. D. (2004). Modular Structural Operational Semantics. Journal of Logical and Algebraic Methods in Programming, 60-61, 195-228.
Mosses, P. D., Kirchner, H. (red.) & Ringeissen, C. (red.) (2002). Pragmatics of Modular SOS. I Ikke angivet (2422 of Lecture Notes in Computer Science udg., s. 49-72). Springer.
Mosses, P. D., Bjørner, D. (red.), Broy, M. (red.) & Zamulin, A. V. (red.) (2001). The Varieties of Programming Language Semantics (and Their Uses). I Perspectives of System Informatics: Lecture Notes in Computer Science (Bind 2244, s. 165-190). Springer.
Mosses, P. D. (2005). Modular Structural Operational Semantics. BRICS Report Series, (RS-05-7).
Mosses, P. D. & Czaja, L. (red.) (2003). Some Novel Techniques in Operational Semantics. I L. Czaja (red.), Concurrency, Specification, and Programming, CS\&P 2003, Czarna, Poland, Proceedings (s. 21-34). Warsaw University.
Mosegaard, J. & Sørensen, T. S. (2005). Real-time Deformation of Detailed Geometry Based on Mappings to a Less Detailed Physical Simulation on the GPU. I 11th Eurographics Workshop on Virtual Enviroments (s. 105-111). European Association for Computer Graphics.
Mosegaard, J. & Sørensen, T. S. (2005). A GPU Accelerated Spring Mass System for Surgical Simulation. I Medicine Meets Virtual Reality (13 udg., s. 342-348). IOS Press.
Mosegaard, J. (2004). Parameter Optimisation for the Behaviour of Elastic Models over Time. I J. D. Westwood (red.), Medicine Meets Virtual Reality (Bind Technology and informatics 98, s. 256-258). IOS Press.
Mosegaard, J. (2004). LR-Spring Mass Model for Cardiac Surgical Simulation. I Medicine Meets Virtual Reality (12 udg., Bind 98, s. 253-255). IOS Press.
Mosegaard, J. & Bennedsen, J. (2006). A Framework for Narration and Learning in Educational Multimedia. I D. Lassner & C. McNaught (red.), World Conference on Educational Multimedia, Hypermedia and Telecommunications 2003 (Bind 2003, Issue 1, s. 99-106). ED-MEDIA.
Mosegaard, J., Carstensen, B. S., Rasmusson, A. & Sørensen, T. S. (2007). Smooth haptic interaction from discontinuous simulation data. I Proceedings of Medicine Meets Virtual Reality 15. Studies in Health Technology and Informatics (Bind 125, s. 328-333). IOS Press.
Mortensen, K. H. (2001). Efficient Data-Structures and Algorithms for a Coloured Petri Nets Simulator. I K. Jensen (red.), Third Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (s. 57-75). Department of Computer Science, Aarhus University.
Mortensen, K. H., Schougaard, K. R., Schultz, U. P., Markopoulos, P. (red.), Eggen, B. (red.) & Aarts (red.) (2004). Distance-Based Access Modifiers Applied to Safety in Home Networks. I Ambient Intelligence: Second European Symposium (3295 i Lecture Notes in Computer Science udg., s. 315-326). Springer.
Mortensen, K. H., Schougaard, K. S. F. & Schultz, U. P. (2003). A Programming Language Approach to Safety in Home Networks. Center for Pervasive Computing Publications, CfPC-2003-PB-53.
Mortensen, K. H., Schougaard, K. R. & Schultz, U. P. (2004). Distance-Based Access Modifiers Applied to Safety in Home Networks. I P. Markopoulos, B. Eggen, E. Aarts & J. Crowley (red.), Ambient Intelligence: Second European Symposium, EUSAI 2004, Eindhoven, The Netherlands, November 8-11, 2004. Proceedings (s. 315-326). Springer. https://doi.org/10.1007/978-3-540-30473-9_30
Mortensen, K. H., Schougaard, K. R. & Schultz, U. P. (2003). A Programming Language Approach to Safety in Home Networks. Department of Computer Science, Aarhus University.
Mortensen, D. H., Hepworth, S. J., Berg, K. S. & Petersen, M. G. (2012). "It's in Love with You". Communicating Status and Preference with Simple Product Movements. I CHI EA '12: Extended abstracts on Human Factors in Computing Systems (s. 61-70). Association for Computing Machinery. https://doi.org/10.1145/2212776.2212784
Mortensen, M. L., Chester, S., Assent, I. & Magnani, M. (2015). Efficient caching for constrained skyline queries. I International Conference on Extending Database Technology (EDBT 2015) (s. 337-348). openproceedings.org. https://doi.org/10.5441/002/edbt.2015.30