Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Lyle, P. J. & Korsgaard, H. (2020). Community Values and Technological Mechanisms: Learning from The Amish?. 5. Afhandling præsenteret på Studying Technical Mechanisms for Supporting Sharing Communities, Siegen, Tyskland.
Lykke-Olesen, A. & Nielsen, J. (2007). BibPhone: Adding sound to the children's library. I Proceedings of the 6th international Conference on Interaction Design And Children, IDC 2007 (s. 145-148) https://doi.org/10.1145/1297277.1297307
Luyten, K., Thys, K., Vermeulen, J. & Coninx, K. (2006). A Generic Approach For Multi-Device User Interface Rendering With UIML. I Computer-Aided Design Of User Interfaces V, Proceedings of the Sixth International Conference on Computer-Aided Design of User Interfaces, CADUI 2006 6-8 June 2006, Bucharest, Romania (s. 175-182) https://doi.org/10.1007/978-1-4020-5820-2_14
Lutze, M., Madsen, M., Schuster, P. & Brachthäuser, J. I. (2023). With or Without You: Programming with Effect Exclusion. Proceedings of the ACM on Programming Languages , 7(ICFP), 448-475. https://doi.org/10.1145/3607846
Lutze, M., Schuster, P. & Brachthäuser, J. I. (2025). The Simple Essence of Monomorphization. Proceedings of the ACM on Programming Languages , 9(OOPSLA1), Artikel 116. https://doi.org/10.1145/3720472
Lunemann, C. (2010). Cryptographic Protocols under Quantum Attacks. Department of Computer Science, Aarhus University.
Lunding, M. S., Leiva, G., Grønbæk, J. E. & Petersen, M. G. (2022). ProjectAR: Rapid Prototyping of Projection Mapping with Mobile Augmented Reality. Poster-session præsenteret på Adjunct Proceedings of the 2022 Nordic Human-Computer Interaction Conference. https://doi.org/10.1145/3547522.3547679
Lunding, R. S., Lystbæk, M. N., Feuchtner, T. & Grønbæk, K. (2023). AR-supported Human-Robot Collaboration: Facilitating Workspace Awareness and Parallelised Assembly Tasks. I G. Bruder, A.-H. Olivier, A. Cunningham, E. Y. Peng, J. Grubert & I. Williams (red.), Proceedings - 2023 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2023 (s. 1064-1073). IEEE. https://doi.org/10.1109/ISMAR59233.2023.00123
Lunding, R. S., Lunding, M. S., Feuchtner, T., Petersen, M. G., Grønbæk, K. & Suzuki, R. (2024). RoboVisAR: Immersive Authoring of Condition-based AR Robot Visualisations. I HRI '2024: Proceedings of the 2024 ACM/IEEE International Conference on Human-Robot Interaction (s. 462-471). Association for Computing Machinery. https://doi.org/10.1145/3610977.3634972
Lunding, R. S., Feuchtner, T. & Grønbæk, K. (2025). Investigating AR Assistance for Human-Robot Collaboration in Mould Assembly 'in the Wild'. I HRI 2025 - Proceedings of the 2025 ACM/IEEE International Conference on Human-Robot Interaction (s. 540-549). IEEE. https://doi.org/10.1109/HRI61500.2025.10973920
Lunding, R. S. (2025). Augmented Reality assisted Human-Robot Collaboration. [Ph.d.-afhandling, Aarhus Universitet].
Lund, H. H., Mayoh, B. H. & Perram, J. (2001). Seventh Scandinavian Conference on Artificial Intelligence. I Frontiers in Artificial Intelligence and Applications (66 udg.). IOS Press.
Ludvigsen, M. (2002). Playful Interaction. Afhandling præsenteret på IRIS 2002 Jamboree/review at the International Conference on Ubiquitous Computing, Göteborg, Sverige.
Ludvigsen, M., Fogtmann, M. H. & Grønbæk, K. (2010). TacTowers: An Interactive Training Equipment for Elite. I O. W. Bertelsen, P. G. Krogh, K. Halskov & M. G. Petersen (red.), Proceedings of the 8th ACM Conference on Designing Interactive Systems (s. 412-415). Association for Computing Machinery. https://doi.org/10.1145/1858171.1858250
Lucas, C., Raub, D. & Maurer, U. (2010). Hybrid-secure MPC : trading information-theoretic robustness for computational privacy. I Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing. PODC '10 (s. 219-228). Association for Computing Machinery. https://doi.org/10.1145/1835698.1835747
Lucani Rötter, D. E., Nielsen, L., Orlandi, C., Pagnin, E. & Vestergaard, R. (2020). Secure generalized deduplication via multi-key revealing encryption. I C. Galdi & V. Kolesnikov (red.), Security and Cryptography for Networks (s. 298-318). Springer. https://doi.org/10.1007/978-3-030-57990-6_15
Luboschik, M., Maus, C., Schulz, H.-J., Schumann, H. & Uhrmacher, A. (2012). Heterogeneity-based guidance for exploring multiscale data in systems biology. I J. Roerdink & M. Hibbs (red.), Proceedings of the IEEE Symposium on Biological Data Visualization BioVis (s. 33-40). IEEE. https://doi.org/10.1109/BioVis.2012.6378590
Lu, H., Jensen, C. S. & Zhang, Z. (2011). Flexible and Efficient Resolution of Skyline Query Size Constraints. I E E E Transactions on Knowledge & Data Engineering, 23(7), 991-1005. https://doi.org/10.1109/TKDE.2010.47
Lu, H., Yang, B. & Jensen, C. S. (2011). Spatio-temporal joins on symbolic indoor tracking data. Proceedings of the International Conference on Data Engineering, 816-827. https://doi.org/10.1109/ICDE.2011.5767902
Lu, H., Cao, X. & Jensen, C. S. (2012). A Foundation for Efficient Indoor Distance-Aware Query Processing. I IEEE 28th International Conference on Data Engineering (ICDE) (s. 438 -449). IEEE Press. https://doi.org/10.1109/ICDE.2012.44
Lu, H. & Jensen, C. S. (2012). Upgrading Uncompetitive Products Economically. I IEEE 28th International Conference on Data Engineering (ICDE) (s. 977 - 988 ). IEEE Press. https://doi.org/10.1109/ICDE.2012.92
Lowe, A., Svendsen, S. C., Agarwal, P. K. & Arge, L. (2020). 1D and 2D Flow Routing on a Terrain. I C.-T. Lu, F. Wang, G. Trajcevski, Y. Huang, S. Newsam & L. Xiong (red.), Proceedings of the 28th International Conference on Advances in Geographic Information Systems, SIGSPATIAL GIS 2020 (s. 5-14). Association for Computing Machinery. https://doi.org/10.1145/3397536.3422269
Løvbjerg, M., Krink, T., Fogel, D. B. (red.), Yao, X. (red.), Greenwood, G. (red.), Iba, H. (red.), Marrow, P. (red.) & Shackleton, M. (red.) (2002). Extending Particle Swarm Optimisers with Self-Organized Criticality. I Proceedings of the 2002 Congress on Evolutionary Computation : CEC'02 (Bind 2, s. 1588-1593). IEEE Press.
Loughran, N., Rashid, A., Zhang, W. & Jarzabek, S. (2004). Supporting Product Line Evolution with Framed Aspects. I Third AOSD Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS04) (s. 15-19). Association for Computing Machinery.
Loster, M., Mottin, D., Papotti, P., Ehmüller, J., Feldmann, B. & Naumann, F. (2021). Few-Shot Knowledge Validation using Rules. I J. Leskovec, M. Grobelnik, M. Najork, J. Tang & L. Zia (red.), The Web Conference 2021 - Proceedings of the World Wide Web Conference, WWW 2021 (s. 3314-3324). Association for Computing Machinery. https://doi.org/10.1145/3442381.3450040
Loss, J., Maurer, U. & Tschudi, D. (2018). Strong Separations Between Broadcast and Authenticated Channels. I U. Schmid & J. Widder (red.), 32nd International Symposium on Distributed Computing (DISC 2018) (Bind 121, s. 36:1-36:17). Artikel 36 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.DISC.2018.36
Loss, J. & Nielsen, J. B. (2024). Early Stopping for Any Number of Corruptions. I M. Joye & G. Leander (red.), Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (Bind III, s. 457-488). Springer. https://doi.org/10.1007/978-3-031-58734-4_16
Lorenz, D. H., Ernst, E. & Aksit, M. (red.) (2003). Aspects and Polymorphism in AspectJ. I Proc. of AOSD'03: Proceedings of the 2nd international conference on Aspect-oriented software development (s. 150-157). Association for Computing Machinery. https://doi.org/10.1145/643603.643619
Lorentsen, L. & Kristensen, L. M. (2001). Exploiting Stabilizers and Parallelism in State Space Generation with the Symmetry Method. I A. Valmari & A. Yakoviev (red.), Proceedings of Second International Conference on Application of Concurrency to System Design (ACSD'01) (Bind ACSD, s. 211-220). IEEE Computer Society Press.
Lorentsen, L., Tuovinen, A.-P. & Xu, J. (2002). Modelling Feature Interaction Patterns in Nokia Mobile Phones using Coloured Petri Nets and Design/CPN. I Application and Theory of Petri Nets 2002: 23rd International Conference, ICATPN 2002 Adelaide, Australia, June 24-30, 2002 Proceedings (s. 15 - 45). Springer. https://doi.org/10.1007/3-540-48068-4_18
Lorentsen, L., Tuovinen, A.-P. & Xu, J. (2001). Modelling of Features and Feature Interactions in Nokia Mobile Phones Using Coloured Petri Nets. I K. Jensen (red.), Third Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (s. 1-14). Department of Computer Science, Aarhus University.
Logins, A., Karras, P. & Jensen, C. S. (2019). Multicapacity facility selection in networks. I Proceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019 (s. 794-805). Artikel 8731341 IEEE. https://doi.org/10.1109/ICDE.2019.00076
Logins, A. & Karras, P. (2019). An Experimental Study on Network Immunization. I M. Herschel, H. Galhardas, B. Reinwald, I. Fundulaki, C. Binnig & Z. Kaoudi (red.), Advances in Database Technology - EDBT 2019: 22nd International Conference on Extending Database Technology, Proceedings (s. 726-729). Artikel 391 openproceedings.org. https://doi.org/10.5441/002/edbt.2019.97
Logins, A. & Karras, P. (2019). Content-based Network Influence Probabilities: Extraction and Application. I Proceedings - 19th IEEE International Conference on Data Mining Workshops, ICDMW 2019 (s. 69-72). Artikel 8955604 IEEE. https://doi.org/10.1109/ICDMW.2019.00020
Logins, A., Li, Y. & Karras, P. (2020). On the Robustness of Cascade Diffusion under Node Attacks. I The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020: Proceedings of the Web Conference 2020 (s. 2711–2717). Association for Computing Machinery. https://doi.org/10.1145/3366423.3380028
Logins, A., U, L. H. & Karras, P. (2020). Fair Cruising. Manuskript afsendt til publicering. I Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining 2020
Logins, A., Li, Y. & Karras, P. (2022). On the Robustness of Diffusion in a Network under Node Attacks. IEEE Transactions on Knowledge and Data Engineering, 34(12), 5884-5895. https://doi.org/10.1109/TKDE.2021.3071081
Logins, A. (2020). Resource Allocation in Networks. [Ph.d.-afhandling, Aarhus Universitet]. Aarhus Universitet.
Loeschcke, S. B., Hogräfer, M. & Schulz, H.-J. (2020). Progressive Parameter Space Visualization for Task-Driven SAX Configuration. I K. Vrotsou & C. Turkay (red.), EuroVA 2020 - EuroVis Workshop on Visual Analytics (s. 43-47). European Association for Computer Graphics. https://doi.org/10.2312/eurova.20201085
Loeschcke, S., Belongie, S. & Benaim, S. (2023). Text-Driven Stylization of Video Objects. I L. Karlinsky, T. Michaeli & K. Nishino (red.), Computer Vision – ECCV 2022 Workshops (s. 594-609). Springer. https://doi.org/10.1007/978-3-031-25069-9_38