Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Engelmann, F. T., Müller, L., Peter, A., Kargl, F. & Bösch, C. (2021). SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges. Proceedings on Privacy Enhancing Technologies, 2021(4), 270-290. https://doi.org/10.2478/popets-2021-0070
Remy, C., Bates, O., Thomas, V. J. & Broadbent, M. (2018). "Sustainability... it's just not important": The Challenges of Academic Engagement with Diverse Stakeholders. I B. Penzenstadler, S. Easterbrook, C. Venters & S. I. Ahmed (red.), ICT4S2018. 5th International Conference on Information and Communication Technology for Sustainability (Bind 52, s. 316-331). easychair. https://doi.org/10.29007/kln5
Cai, L., Cheng, Y., Verbin, E. & Zhou, Y. (2010). Surviving Rates of Graphs with Bounded Treewidth for the Firefighter Problem. S I A M Journal on Discrete Mathematics, 24(4), 1322-1335. https://doi.org/10.1137/100791130
Danvy, O. (2004). Sur un Exemple de Patrick Greussay. BRICS Report Series, (RS-04-41).
Korn, M., Kawash, R. & Andersen, L. M. (2010). Surprise Trips : A System to Augment the Natural Experience of Exploration. I J. E. Bardram & M. Langheinrich (red.), Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing (s. 413-414). Association for Computing Machinery. https://doi.org/10.1145/1864431.1864463
Korn, M., Kawash, R. & Andersen, L. M. (2010). Surprise Trips: A System to Augment the Natural Experience of Exploration. Poster-session præsenteret på  ACM international conference on Ubiquitous computing, København, Danmark. https://doi.org/10.1145/1864431.1864463
Sørensen, T. S., Greil, G., Hansen, O. K. & Mosegaard, J. (2006). Surgical simulation - a new tool to evaluate surgical incisions in congenital heart disease? Interactive Cardiovascular and Thoracic Surgery, (5), 536-539.
Noe, K. Ø., Tanderup, K. & Sørensen, T. S. (2011). Surface membrane based bladder registration for evaluation of accumulated dose during brachytherapy in cervical cancer. I Proceedings of the 2011 IEEE International Symposium on Biomedical Imaging: From Nano to Macro (s. 1253-1256). IEEE Signal Processing Society. https://doi.org/10.1109/ISBI.2011.5872629
Bardram, J. E. & Bertelsen, O. W. (1995). Supporting the development of transparent interaction. I B. Blumenthal, J. Gornostaev & C. Unger (red.), Human-Computer Interaction: 5th International Conference, EWHCI '95 Moscow, Russia, July 3–7 1995 Selected Papers (s. 79-90). Springer. https://doi.org/10.1007/3-540-60614-9_6
Hansen, K. M., Damm, C. H., Thomsen, M. & Tyrsted, M. (2000). Supporting several levels of restriction in the UML. I A. Evans, S. Kent & B. Selic (red.), «UML» 2000 - The Unified Modeling Language: Advancing the Standard. Third International Conference York, UK, October 2-6, 2000 Proceedings (s. 396-409). Springer. https://doi.org/10.1007/3-540-40011-7_29
Loughran, N., Rashid, A., Zhang, W. & Jarzabek, S. (2004). Supporting Product Line Evolution with Framed Aspects. I Third AOSD Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS04) (s. 15-19). Association for Computing Machinery.
Westergaard, M. (2002). Supporting Multiple Pointing Devices in Microsoft Windows. I L. Cardelli (red.), Proceedings of Microsoft Summer Workshop for Faculty and PhDs.: Supporting Multiple Pointing Devices in Microsoft Windows (s. 11. Talk). Microsoft Press.
Bouvin, N. O., Christensen, B. G., Hansen, F. A. & Nielsen, K. L. (2006). Supporting Mobile and Nomadic Learning. I Proceedings of the Workshop on Emerging Applications for Wireless and Mobile Access MobEA III at the 14th World Wide Web Conference
Bardram, J. E., Kjær, T. A. K. & Nielsen, C. (2003). Supporting Local Mobility in Healthcare by Application Roaming among Heterogeneous Devices. I Lecture Notes in Computer Science: Proceedings of the Fifth International Conference on Human Computer Interaction with Mobile Devices and Services (Bind 2795, s. 161-176). Springer.
Grønbæk, K. & Sloth, L. (1999). Supporting Interchange of Open Hypermedia Structures and Contents. I Proceedings of the 5th Workshop on Open Hypermedia Systems
Nielsen, M., Brewer, R. S. & Grønbæk, K. (2016). Supporting interactive visual analytics of energy behavior in buildings through affine visualizations. I C. Parker (red.), Proceedings of the 28th Australian Computer-Human Interaction Conference, OzCHI 2016 (s. 238-247). Association for Computing Machinery. https://doi.org/10.1145/3010915.3010950
Christensen, H. B. & Bardram, J. (2002). Supporting Human Activities - Exploring Activity-Centered Computing. I G. Borriello & L. E. Holmquist (red.), UbiComp 2002: Ubiquitous Computing: 4th International Conference Göteborg, Sweden, September 29 – October 1, 2002 Proceedings (s. 107-116). Springer. https://doi.org/10.1007/3-540-45809-3_8
Petersen, M. G. & Madsen, K. H. (1999). Supporting Collaboration in Multimedia Design. I S. Brewster, A. Cawsey & G. Cockton (red.), Human-Computer Interaction: INTERACT (s. 185-190). The British Computer Society.
Schultz, U. P. & Schougaard, K. R. (2004). Supporting Activity-Based Computingusing Dynamically (De)Composable Mobile Applications. I J. E. Bardram, H. B. Christensen, D. Garlan & J. P. Sousa (red.), Proceedings of First International Workshop on Computer Support for Human Tasks and Activities (Bind CfPC-2004-PB-60, s. 12-16). Center for Pervasive Computing.
Grønbæk, K. (1990). Supporting Active User Involvment in Prototyping. Scandinavian Journal of Information Systems, 2(1).
MacIntyre, B., Mynatt, E. D., Voida, S., Hansen, K. M., Tullio, J. & Corso, G. M. (2001). Support for Multitasking and background Awareness Using Interactive Peripheral Displays. I J. Marks & E. D. Mynatt (red.), Proceedings of the 14th annual ACM symposium on User interface software and technology (s. 41-50). Association for Computing Machinery. https://doi.org/10.1145/502348.502355
Bardram, J., Bunde-Pedersen, J. & Søgaard, M. (2006). Support for activity-based computing in a personal computing operating system. I R. E. Grinter, T. Rodden, P. M. Aoki, E. Cutrell, R. Jeffries & G. M. Olson (red.), CHI '06: Proceedings of the 2006 Conference on Human Factors in Computing Systems (s. 211-220) https://doi.org/10.1145/1124772.1124805
Damgård, I. B., Funder, J., Nielsen, J. B. & Salvail, L. (2014). Superposition attacks on cryptographic protocols. I C. Padró (red.), Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (s. 142-161). Springer. https://doi.org/10.1007/978-3-319-04268-8_9
Miltersen, P. B., Vinodchandran, N. V. & Watanabe, O. (1999). Super-Polynomial Versus Half-Exponential Circuit Size in the Exponential Hierarchy. I T. Asano, H. Imai, D. T. Lee, S. Nakano & T. Tokuyama (red.), Computing and Combinatorics: 5th Annual International Conference, COCOON'99 Tokyo, Japan, July 26-28, 1999 Proceedings (s. 210-220). Springer. https://doi.org/10.1007/3-540-48686-0_21
Limaye, N., Srinivasan, S. & Tavenas, S. (2022). Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits. I Proceedings - 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science, FOCS 2021 (s. 804-814). IEEE Computer Society Press. https://doi.org/10.1109/FOCS52979.2021.00083
Larsen, K. G. & Yu, H. (2023). Super-Logarithmic Lower Bounds for Dynamic Graph Problems. I 2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS) (s. 1589-1604). IEEE. https://doi.org/10.1109/FOCS57990.2023.00096
Nielsen, J. B. (red.), Damgård, I. B., Salvail, L. & Cachin, C. (2006). Summary Report on Unconditionally Secure Protocols. (s. 1- 25). ECRYPT - European Network of Excellence in Cryptology.
Nielsen, J. B. (red.), Alwen, J., Cachin, C., Pereira, O., Sadeghi, A.-R., Schoenmakers, B., Shelat, A. & Visconti, I. (2007). Summary Report on Rational Cryptographic Protocols. ECRYPT - European Network of Excellence in Cryptology.
Østerby, O., Møller-Pedersen, K. & North, J. (1975). Summa Ratione Confectum. Archives Internationales d'Histoire des Sciences, 25(96), 73-81.
Bertelsen, O. W. (2014). Suffering Beyond Negotiation: Towards a Biographic Perspective on Cooperative Design for Therapy. I C. Rossitto, L. Ciolfi, D. Martin & B. C. (red.), COOP 2014 - Proceedings of the 11th International Conference on the Design of Cooperative Systems, 27-30 May 2014, Nice (France) Springer. http://www.springer.com/computer/hci/book/978-3-319-06497-0
Bringmann, K. & Larsen, K. G. (2013). Succinct Sampling from Discrete Distributions. I Proceedings of the 45th annual ACM Symposium on Theory of Computing, STOC '13 (s. 775-782 ). Association for Computing Machinery. https://doi.org/10.1145/2488608.2488707
Davoodi, P., Raman, R. & Satti, S. (2012). Succinct Representations of Binary Trees for Range Minimum Queries. Lecture Notes in Computer Science, 7434, 396-407 . https://doi.org/10.1007/978-3-642-32241-9_34
Campanelli, M. & Khoshakhlagh, H. (2021). Succinct Publicly-Certifiable Proofs: Or, Can a Blockchain Verify a Designated-Verifier Proof? I A. Adhikari, R. Küsters & B. Preneel (red.), Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings: 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings (s. 607-631). Springer. https://doi.org/10.1007/978-3-030-92518-5_27
Abram, D., Malavolta, G. & Roy, L. (2025). Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits. I M. Koucky & N. Bansal (red.), STOC 2025 - Proceedings of the 57th Annual ACM Symposium on Theory of Computing (s. 1875-1886). Association for Computing Machinery. https://doi.org/10.1145/3717823.3718164
Schmidt, E. M. & Szymanski, T. G. (1977). Succinctness of Descriptions of Unambiguous Context-Free Languages. S I A M Journal on Computing, 6(3), 547-553. https://doi.org/10.1137/0206039
Abram, D., Roy, L. & Scholl, P. (2024). Succinct Homomorphic Secret Sharing. I M. Joye & G. Leander (red.), Advances in Cryptology -- EUROCRYPT 2024 (s. 301-330). Springer Nature. https://doi.org/10.1007/978-3-031-58751-1_11
Abboud, A., Backurs, A., Hansen, T. D., Williams, V. V. & Zamir, O. (2016). Subtree isomorphism revisited. I 27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016 (Bind 2, s. 1256-1271). Association for Computing Machinery. https://doi.org/10.1137/1.9781611974331.ch88