Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Truelsen, J. (2015). Space Efficient Data Structures and External Terrain Algorithms. Department of Computer Science, Aarhus University.
Troullinou, G., Kondylakis, H., Lissandrini, M. & Mottin, D. (2021). SOFOS: Demonstrating the Challenges of Materialized View Selection on Knowledge Graph. I Proceedings of the 2021 International Conference on Management of Data (SIGMOD/PODS '21) (s. 2789–2793). Association for Computing Machinery. https://doi.org/10.1145/3448016.3452765
Trittenbach, H., Böhm, K. & Assent, I. (2020). Active Learning of SVDD Hyperparameter Values. I G. Webb, Z. Zhang, V. S. Tseng, G. Williams, M. Vlachos & L. Cao (red.), Proceedings - 2020 IEEE 7th International Conference on Data Science and Advanced Analytics, DSAA 2020 (s. 109-117). Artikel 9260103 IEEE. https://doi.org/10.1109/DSAA49011.2020.00023
Trigg, R., Bødker, S. & Grønbæk, K. (1990). A Video-based Analysis of the Cooperative Prototyping Process. I R. Hellman, M. Ruohonen & P. Sørgaard (red.), Proceedings of the 13th IRIS conference
Trifiletti, R., Nielsen, J. B., Frederiksen, T. K. & Jakobsen, T. P. (2016). On the Complexity of Additively Homomorphic UC Commitments. I E. Kushilevitz & T. Malkin (red.), Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings (Bind 9562, s. 542-565). Springer VS. https://doi.org/10.1007/978-3-662-49096-9
Trifiletti, R. (2017). Amortizing Maliciously Secure Two-party Computation. Department of Computer Science, Aarhus University.
Trier, P., Noe, K. Ø., Sørensen, M. S. & Mosegaard, J. (2008). The visible ear surgery simulator. I Medicine Meets Virtual Reality 16 (s. 523-5). IOS Press.
Triandopoulos, N., Papamanthou, C. & Tamassia, R. (2008). Authenticated hash tables: Proceedings of the 15th ACM Conference on Computer and communications security. I Proceedings of the 15th ACM Conference on Computer and communications security (s. 437-448). Association for Computing Machinery. https://doi.org/10.1145/1455770.1455826
Triandopoulos, N., Goodrich, M. T., Papamanthou, C. & Tamassia, R. (2008). Athos: Efficient Authentication of Outsourced File Systems: Information Security. Lecture Notes in Computer Science, 80-96. https://doi.org/10.1007/978-3-540-85886-7_6
Triandopoulos, N., Cornelius, C., Kapadia, A., Kotz, D., Peebles, D. & Shin, M. (2008). Anonysense: privacy-aware people-centric sensing. I Proceeding of the 6th international conference on Mobile systems, applications, and services (s. 211-224). Association for Computing Machinery. https://doi.org/10.1145/1378600.1378624
Triandopoulos, N., Kapadia, A., Cornelius, C., Peebles, D. & Kotz, D. (2008). AnonySense: Opportunistic and Privacy-Preserving Context Collection. Lecture Notes in Computer Science, 280-297. https://doi.org/10.1007/978-3-540-79576-6_17
Tran, H. V., Zhang, Z., Pham, T. D., Doan, N. P., Hoang, A.-T., Li, P., Vandierendonck, H., Assent, I. & Mai, T. S. (2025). InteDisUX: intepretation-guided discriminative user-centric explanation for time series. Proceedings of the AAAI Conference on Artificial Intelligence, 39(20), 20921-20928. https://doi.org/10.1609/aaai.v39i20.35387
Tran, H. V., Doan, N. P., Zhang, Z., Pham, T. D., Nguyen, P. H., Nguyen, X. H., Vandierendonck, H., Assent, I. & Mai, T. S. (2025). MIX: A Multi-view Time-Frequency Interactive Explanation Framework for Time Series Classification. Poster-session præsenteret på The Thirty-ninth Annual Conference on Neural Information Processing Systems, San Diego, California, USA. https://neurips.cc/virtual/2025/loc/san-diego/poster/117533
Torp, M. T. (2021). Techniques and Tools for Supporting Maintenance of Node.js Programs. [Ph.d.-afhandling, Aarhus Universitet]. Aarhus Universitet.
Torgersen, M. (2002). Inheritance is Specialisation. I A. P. Black, E. Ernst, P. Grogono & M. Sakkinen (red.), Object-oriented Technology ECOOP 2002 Workshop Reader (Bind 12, s. 95-101). Springer LNCS.
Torgersen, M. & Odersky, M. (red.) (2004). The Expression Problem Revisited - Four New Solutions using Generics. I Proceedings of the 18th European Conference on Object-Oriented Programming (ECOOP'04) (3086 i Lecture Notes in Computer Science udg., s. 123-146). Springer.
Torgersen, M. (2001). Unifying Abstractions. (DAIMI PhD Dissertation PD-01-2 udg.) Department of Computer Science.
Torgersen, M., Ernst, E. & Hansen, C. P. (2005). Wild FJ. I Proceedings of FOOL 12 http://homepages.inf.ed.ac.uk/wadler/fool/program/14.html
Torgersen, M., Hansen, C. P., Ernst, E., Ahé, P. V. D., Bracha, G. & Gafter, N. M. (2004). Adding Wildcards to the Java Programming Language. I Proceedings of the 2004 ACM Symposium on Applied Computing (Bind 104042, s. 1289-1296). Association for Computing Machinery. https://doi.org/10.1145/967900.968162
Torgersen, M., Hansen, C. P., Ernst, E., von der Ahé, P., Bracha, G. & Gafter, N. M. (2004). Adding Wildcards to the Java Programming Language. Journal of Object Technology, 3(11), 97-116. https://doi.org/10.5381/jot.2004.3.11.a5
Tommasel, A., Pablos Sarabia, R. & Assent, I. (2023). Re2Dan: Retrieval of Medical Documents for e-Health in Danish. I Proceedings of the 17th ACM Conference on Recommender Systems, RecSys 2023 (s. 1208-1211). Association for Computing Machinery. https://doi.org/10.1145/3604915.3610655
Tommasel, A. & Assent, I. (2023). Recommendation fairness and where to find it: An empirical study on fairness of user recommender systems. I J. He, T. Palpanas, X. Hu, A. Cuzzocrea, D. Dou, D. Slezak, W. Wang, A. Gruca, J. C.-W. Lin & R. Agrawal (red.), IEEE International Conference on Big Data, BigData 2023, Sorrento, Italy, December 15-18, 2023 (s. 4195-4204). IEEE. https://doi.org/10.1109/BIGDATA59044.2023.10386616
Tommasel, A. & Assent, I. (2024). Semantic grounding of LLMs using knowledge graphs for query reformulation in medical information retrieval. I W. Ding, C.-T. Lu, F. Wang, L. Di, K. Wu, J. Huan, R. Nambiar, J. Li, F. Ilievski, R. Baeza-Yates & X. Hu (red.), 2024 IEEE International Conference on Big Data (BigData) (s. 4048-4057). IEEE. https://doi.org/10.1109/BigData62323.2024.10826117, https://doi.org/10.1109/BigData62323.2024.10826117
Tomlein, M. & Grønbæk, K. (2016). Building Models of Installations to Recommend Applications in IoT Software Ecosystems. I Proceedings - 2016 IEEE 4th International Conference on Future Internet of Things and Cloud, FiCloud 2016 (s. 9-16). Artikel 7575838 IEEE Press. https://doi.org/10.1109/FiCloud.2016.10
Tomlein, M. & Grønbæk, K. (2016). Semantic Model of Variability and Capabilities of IoT Applications for Embedded Software Ecosystems. I Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (s. 247-252). Artikel 7516835 IEEE Press. https://doi.org/10.1109/WICSA.2016.17
Tomlein, M. (2016). Context-Aware Software Ecosystem for Industrial Products. I Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (s. 279-280). Artikel 7516845 IEEE Press. https://doi.org/10.1109/WICSA.2016.53
Tomlein, M. & Grønbæk, K. (2017). A Visual Programming Approach Based on Domain Ontologies for Configuring Industrial IoT Installations. I Proceedings of the 7th International Conference on the Internet of Things, IoT 2017 Artikel 9 Association for Computing Machinery. https://doi.org/10.1145/3131542.3131552
Tomlein, M., Booveraghavan, S., Agarwal, Y. & Dey, A. (2017). CharIoT: an end-user programming environment for the IoT. Poster-session præsenteret på International Conference on the Internet of Things, Linz, Østrig. https://doi.org/10.1145/3131542.3140261
Tominski, C. & Schulz, H.-J. (2012). The Great Wall of Space-Time. I T. Grosch, B. Preim, H. Theisel & K.-D. Toennies (red.), Proceedings of the Workshop on Vision, Modeling, and Visualization (VMV) (s. 199-206). Eurographics Association. https://doi.org/10.2312/PE/VMV/VMV12/199-206
Toma, L., Wickremsinghe, R., Arge, L. A., Chase, J. S., Vitter, J. S., Halpin, P. N. & Urban, D. (2001). Flow computation on massive grids. I Proceedings of the 9th ACM international symposium on Advances in geographic information systems (s. 82-87). Association for Computing Machinery. https://doi.org/10.1145/512161.512180
Toftkjær, T. & Kjærgaard, M. B. (2010). The use of GPS for Handling Lack of Indoor Constraints in Particle Filter-based Inertial Positioning. Poster-session præsenteret på The 7th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2010), Sydney, Australien.
Toft, T. (2006). An efficient, unconditionally secure equality test for secret shared values. I Proceedings of the 2006 Workshop on Models for Cryptographic Protocols
Toft, T. (2011). Secure data structures based on multi-party computation. I Proceedings of the 30th Annual ACM SIGACT-SIGOPS ACM Symposium on Principles of Distributed Computing, PODC 2011 (s. 291-292). Association for Computing Machinery. https://doi.org/10.1145/1993806.1993859
Toft, T. (2014). A secure priority queue; or: On secure datastructures from multiparty computation. I H.-S. Lee & D.-G. Han (red.), Information Security and Cryptology -- ICISC 2013: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers (Bind 8565, s. 20-33). Springer. https://doi.org/10.1007/978-3-319-12160-4_2
Toft, T. (2007). Primitives and Applications for Multi-party Computation. Department of Computer Science, Aarhus University.
Tkadlec, J., Pavlogiannis, A., Chatterjee, K. & Nowak, M. A. (2021). Fast and strong amplifiers of natural selection. Nature Communications, 12(1), Artikel 4009. https://doi.org/10.1038/s41467-021-24271-w