Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Gratzer, D., Weinberger, J. & Buchholtz, U. (2025). The Yoneda embedding in simplicial type theory. I Proceedings - 2025 40th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2025 (s. 127-142). IEEE. https://doi.org/10.1109/LICS65433.2025.00017
Møller, A. & Schwartzbach, M. I. (2001). The XML Revolution. BRICS Notes Series, (NS-01-8).
Ammitzbøll Flügge, A., Korsgaard, H. & Bødker, S. (2024). The Working Jobless: Unemployment as Work. Proceedings of the ACM on Human-Computer Interaction, 8(CSCW2), Artikel 355. https://doi.org/10.1145/3686894
Kristensen, B. B., Madsen, O. L. & Møller-Pedersen, B. (2007). The When, Why and Why not of the BETA Programming Language. I Proceedings of the Third ACM Conference on History of Programming Languages (s. 1-57). Association for Computing Machinery. https://doi.org/10.1145/1238844.1238854
Trier, P., Noe, K. Ø., Sørensen, M. S. & Mosegaard, J. (2008). The visible ear surgery simulator. I Medicine Meets Virtual Reality 16 (s. 523-5). IOS Press.
Mosses, P. D., Bjørner, D. (red.), Broy, M. (red.) & Zamulin, A. V. (red.) (2001). The Varieties of Programming Language Semantics (and Their Uses). I Perspectives of System Informatics: Lecture Notes in Computer Science (Bind 2244, s. 165-190). Springer.
Ehn, P., Kyng, M. & Sundblad, Y. (1983). The UTOPIA Project. I Systems design for with and by the Users: Proceedings of the IFIP WG 9.1 Working Conference North-Holland.
Toftkjær, T. & Kjærgaard, M. B. (2010). The use of GPS for Handling Lack of Indoor Constraints in Particle Filter-based Inertial Positioning. Poster-session præsenteret på The 7th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2010), Sydney, Australien.
Christensen, H. B., Asklund, U., Bendix, L. & Magnusson, B. (1999). The Unified Extensional Versioning Model. I J. Estublier (red.), System Configuration Management: 19th International Symposium, SCM-9 Toulouse, France, September 5–7, 1999 Proceedings (s. 100-122). Springer. https://doi.org/10.1007/3-540-48253-9_8
Kuutti, K. & Bannon, L. J. (2014). The turn to practice in HCI: Towards a research agenda. I M. Jones , P. Palanque, A. Schmidt & T. Grossman (red.), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '14 (s. 3543-3552). Association for Computing Machinery. https://doi.org/10.1145/2556288.2557111
Damgård, I., Nielsen, J. B., Nielsen, M. & Ranellucci, S. (2017). The tinytable protocol for 2-party secure computation, or: Gate-scrambling revisited. I J. Katz & H. Shacham (red.), Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Bind 10401, s. 167-187). Springer VS. https://doi.org/10.1007/978-3-319-63688-7_6
Chatterjee, K., Pavlogiannis, A., Adlam, B. & Nowak, M. A. (2014). The Time Scale of Evolutionary Innovation. PLoS Computational Biology, 10(9). https://doi.org/10.1371/journal.pcbi.1003818
Damgård, I. B., Groth, J., Salomonsen, G. & Gritzalis, D. (red.) (2002). The Theory and Implementation of Electronic Voting Systems. I Secure Electronic Voting (Bind 7, s. 77-100). Kluwer Academic Publishers.
Corry, A. V. & Søndergaard, B. D. (2011). The Teaching Portfolio. Developing Good Teachers and Scientists, 1.
Kyng, M. (1991). The System Work Group Computer Science Department Aarhus University. I CHI '91 Proceedings of the SIGCHI conference on Human factors in computing systems: Reaching through technology (s. 477-478). Association for Computing Machinery. https://doi.org/10.1145/108844.109011
Jensen, K., Kristensen, L. M. & Mailund, T. (2012). The sweep-line state space exploration method. Theoretical Computer Science, 429, 169–179. https://doi.org/10.1016/j.tcs.2011.12.036
Verbin, E. & Yu, W. (2011). The Streaming Complexity of Cycle Counting, Sorting by Reversals, and Other Problems. I Proceedings of the 22nd Annual ACM-SIAM Symposium on Discrete Algorithms. SODA 2011 (s. 11-25). Society for Industrial and Applied Mathematics. http://www.siam.org/proceedings/soda/2011/SODA11_002_verbine.pdf
Corry, A. V., Gjerlufsen, T. & Olsen, J. W. (2005). The Stone: Digital Support for (Un)common Pregnancies. I 3rd Scandinavian conference on Health Informatics (3 udg., s. 37-41). Aalborg University.
Aranha, D. F., Engelmann, F. T., Kolby, S. & Yakoubov, S. (2022). The State of the Union: Union-Only Signatures for Data Aggregation. I C. Galdi & S. Jarecki (red.), Security and Cryptography for Networks - 13th International Conference, SCN 2022, Proceedings (s. 387-410). Springer. https://doi.org/10.1007/978-3-031-14791-3_17
Rasmusson, A. (2009). The Spatiale Rotator. I V. Capasso et al., Ed. (red.), Stereology and Image Analysis. Ecs10: Proceeding of the 10th European Conference of ISS. (Bind 4). ESCULAPIO Pub. Co, Bologna. http://newrobin.mat.unimi.it/OCS/index.php/ECS/ecs10/paper/view/199
Wei, Z. & Yi, K. (2013). The Space Complexity of 2-Dimensional Approximate Range Counting. I S. Sanjeev Khanna (red.), Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA (s. 252-264). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611973105.19
Roune, B. H. (2009). The Slice Algorithm For Irreducible Decomposition of Monomial Ideals. Journal of Symbolic Computation, 44(4), 358-381.
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2013). The SITA principle for Location Privacy – Conceptual Model and Architecture. Afhandling præsenteret på International Conference on Privacy and Security in Mobile Systems, Atlantic City, NJ, USA.
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2013). The SITA principle for Location Privacy: Conceptual model and architecture . I 2013 International Conference on Privacy and Security in Mobile Systems (PRISMS) (s. 1 - 8 ). IEEE. https://doi.org/10.1109/PRISMS.2013.6927184
Chou, T. & Orlandi, C. (2015). The simplest protocol for oblivious transfer. I K. Lauter & F. Rodríguez-Henríquez (red.), Progress in Cryptology - LATINCRYPT 2015: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings (Bind 9230, s. 40-58). Springer. https://doi.org/10.1007/978-3-319-22174-8_3
Aranha, D. F. & Pagnin, E. (2019). The simplest multi-key linearly homomorphic signature scheme. I P. Schwabe & N. Thériault (red.), Progress in Cryptology – LATINCRYPT 2019 (s. 280-300). Springer. https://doi.org/10.1007/978-3-030-30530-7_14
Lutze, M., Schuster, P. & Brachthäuser, J. I. (2025). The Simple Essence of Monomorphization. Proceedings of the ACM on Programming Languages , 9(OOPSLA1), Artikel 116. https://doi.org/10.1145/3720472
Tsitsulin, A., Munkhoeva, M., Mottin, D., Karras, P., Bronstein, A., Oseledets, I. & Müller, E. (2020). The Shape of Data: Intrinsic Distance for Data Distributions. Afhandling præsenteret på The International Conference on Learning Representations (ICLR), Ababa, Etiopien.
Andersen, P. B. & Brynskov, M. (2007). The semiotics of smart appliances and pervasive computing. I R. Gudwin & J. Queiroz (red.), Semiotics and Intelligent Systems Development (1 udg., s. 211-256). Idea Group Publishing.
Gerhardy, P. (2005). The Role of Quantifier Alternations in Cut Elimination. Notre Dame Journal of Formal Logic, 46(2), 165-171.
Orlandi, C., Scholl, P. & Yakoubov, S. (2021). The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT. I A. Canteaut & F.-X. Standaert (red.), Advances in Cryptology – EUROCRYPT 2021 : 7th International Conference on Cryptology and Information Security in Latin America, Proceedings (s. 678-708). Springer. https://doi.org/10.1007/978-3-030-77870-5_24
Nayara Ortiz, J., Ricardo de Araujo, R., Aranha, D. F., Rodrigues Costa, S. I. & Dahab, R. (2021). The Ring-LWE Problem in Lattice-based Cryptography: The Case of Twisted Embeddings. Entropy, 23(9), Artikel 1108. https://doi.org/10.3390/e23091108
Sun, X., Wang, C. & Yu, W. (2012). The Relationship between Inner Product and Counting Cycles. Lecture Notes in Computer Science, 7256, 643-654. https://doi.org/10.1007/978-3-642-29344-3_54
Henderson, A. & Kyng, M. (1991). There is no place like home - continuing design in use. I J. Greenbaum & M. Kyng (red.), Design at Work: Cooperative Design of Computer Systems (s. 219-240). Lawrence Erlbaum Associates.
Fink, D. I., Skowronski, M., Zagermann, J., Reinschluessel, A. V., Reiterer, H. & Feuchtner, T. (2024). There Is More to Avatars Than Visuals: Investigating Combinations of Visual and Auditory User Representations for Remote Collaboration in Augmented Reality. Proceedings of the ACM on Human-Computer Interaction, 8(ISS), 540-568. https://doi.org/10.1145/3698148
Danvy, O. & Goldberg, M. (2001). There and Back Again. BRICS Report Series, (RS-01-39).
Danvy, O. & Goldberg, M. (2002). There and Back Again. I Proceedings of the seventh ACM SIGPLAN international conference on Functional programming (s. 230-234). Association for Computing Machinery. https://doi.org/10.1145/581478.581500
Danvy, O. & Goldberg, M. (2005). There and Back Again. Fundamenta Informaticae, 66(4), 397-413.
Danvy, O. & Goldberg, M. (2002). There and Back Again. BRICS Report Series, (RS-02-12).