Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Bent, R., Katriel, I. & van Hentenryck, P. (2005). Sub-Optimality Approximations. I Springer LNCS 3709 (s. 122-136). Springer.
Alon, N., Grønlund, A., Jørgensen, S. F. & Larsen, K. G. (2024). Sublinear Time Shortest Path in Expander Graphs. I R. Kralovic & A. Kucera (red.), 49th International Symposium on Mathematical Foundations of Computer Science, MFCS 2024 (s. 8:1-8:13). Artikel 8 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.MFCS.2024.8
Pinder, C., Vermeulen, J. & Cowan, B. R. (2018). Subliminal Semantic Number Processing on Smartphones. I L. Bailie & N. Oliver (red.), MobileHCI 2018 - Beyond Mobile: The Next 20 Years - 20th International Conference on Human-Computer Interaction with Mobile Devices and Services, Conference Proceedings (s. 24:1-24:13). Artikel a24 Association for Computing Machinery. https://doi.org/10.1145/3229434.3229451
Pinder, C., Vermeulen, J., Beale, R. & Hendley, R. (2015). Subliminal Priming of Nonconscious Goals on Smartphones. MobileHCI '15 Adjunct, 825-830. https://doi.org/10.1145/2786567.2793707
Friedmann, O., Hansen, T. D. & Zwick, U. (2011). Subexponential lower bounds for randomized pivoting rules for the simplex algorithm. I Proceedings of the 43rd annual ACM symposium on Theory of computing (s. 283-292). Association for Computing Machinery. https://doi.org/10.1145/1993636.1993675
Riedel, C., Michael, G. G., Orgel, C., Baum, C., van der Bogert, C. H. & Hiesinger, H. (2021). Studying the Global Spatial Randomness of Impact Craters on Mercury, Venus, and the Moon With Geodesic Neighborhood Relationships. Journal of Geophysical Research: Planets, 126(3), Artikel e2020JE006693. https://doi.org/10.1029/2020JE006693
Bødker, S. & Bertelsen, O. W. (1998). Studying programming environments in use: Between principles and praxis. I Proceedings of NWPER '98: Nordic workshop on programming environment research
Avdic, M. & Vermeulen, J. (2019). Studying Breakdowns in Interactions with Smart Speakers. Afhandling præsenteret på The 2019 ACM CHI Conference on Human Factors in Computing Systems (CHI'19), Glasgow, Storbritannien. https://iotdirections.wordpress.com/
Kolby, S. (2025). Studies on Scalable Security. [Ph.d.-afhandling, Aarhus Universitet].
Campanelli, M., Francati, D. & Orlandi, C. (2023). Structure-Preserving Compilers from New Notions of Obfuscations. I A. Boldyreva & V. Kolesnikov (red.), Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (s. 663-693). Springer. https://doi.org/10.1007/978-3-031-31371-4_23
Madsen, O. L., Magnusson, B. & Møller-Pedersen, B. (1990). Strong typing of object-oriented languages revisited. I OOPSLA/ECOOP '90 Proceedings of the European conference on object-oriented programming on Object-oriented programming systems, languages, and applications (s. 140-150). Association for Computing Machinery. https://doi.org/10.1145/97946.97964
Madsen, O. L., Magnusson, B. & Møller-Pedersen, B. (1990). Strong typing of object-oriented languages revisited. I Proceedings of the European Conference on Object-Oriented Programming on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA/ECOOP 1990 (s. 140-150). Association for Computing Machinery. https://doi.org/10.1145/97945.97964
Grønbæk, K., Ørbæk, P., Kristensen, J. F. & Eriksen, M. A. (2003). Physical hypermedia: augmenting physical material with hypermedia structures. New Review of Hypermedia and Multimedia, 9(1), 5-34. https://doi.org/10.1080/13614560410001725293
Loss, J., Maurer, U. & Tschudi, D. (2018). Strong Separations Between Broadcast and Authenticated Channels. I U. Schmid & J. Widder (red.), 32nd International Symposium on Distributed Computing (DISC 2018) (Bind 121, s. 36:1-36:17). Artikel 36 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.DISC.2018.36
Balat, V. & Danvy, O. (1998). Strong normalization by type-directed partial evaluation and run-time code generation. I X. Leroy & A. Ohori (red.), Types in Compilation: Second International Workshop, TIC ’98 Kyoto, Japan, March 25–27, 1998 Proceedings (s. 240-252). Springer. https://doi.org/10.1007/BFb0055521
Gerhardy, P. & Kohlenbach, U. (2004). Strongly Uniform Bounds from Semi-Constructive Proofs. BRICS Report Series, (RS-04-31).
Gerhardy, P. & Kohlenbach, U. (2006). Strongly uniform bounds from semi-constructive proofs. Annals of Pure and Applied Logic, 141, 89-107.
Damgård, I., Haagh, H., Mercer, R., Nitulescu, A., Orlandi, C. & Yakoubov, S. (2020). Stronger Security and Constructions of Multi-designated Verifier Signatures. I R. Pass & K. Pietrzak (red.), Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings (Bind II, s. 229-260). Springer. https://doi.org/10.1007/978-3-030-64378-2_9
Munch-Hansen, A., Orlandi, C. & Yakoubov, S. (2021). Stronger Notions and a More Efficient Construction of Threshold Ring Signatures. I P. Longa & C. Ràfols (red.), Progress in Cryptology – LATINCRYPT 2021 : 7th International Conference on Cryptology and Information Security in Latin America, Proceedings (s. 363-381). Springer. https://doi.org/10.1007/978-3-030-88238-9_18
Aggarwal, D., Damgård, I., Nielsen, J. B., Obremski, M., Purwanto, E., Ribeiro, J. & Simkin, M. (2019). Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. I A. Boldyreva & D. Micciancio (red.), Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Bind II, s. 510-539). Springer. https://doi.org/10.1007/978-3-030-26951-7_18
Chung, E. & Larsen, K. G. (2023). Stronger 3SUM-Indexing Lower Bounds. I N. Bansal & V. Nagarajan (red.), Proceedings of the 2023 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA) (s. 444-455). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611977554.ch19
Triandopoulos, N., Papamanthou, C. & Tamassia, R. (2008). Authenticated hash tables: Proceedings of the 15th ACM Conference on Computer and communications security. I Proceedings of the 15th ACM Conference on Computer and communications security (s. 437-448). Association for Computing Machinery. https://doi.org/10.1145/1455770.1455826
Batziou, E., Hansen, K. A. & Høgh, K. (2021). Strong Approximate Consensus Halving and the Borsuk-Ulam Theorem. I N. Bansal, E. Merelli & J. Worrell (red.), 48th International Colloquium on Automata, Languages, and Programming (ICALP 2021) (Bind 198, s. 24:1-24:20). Artikel 24 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ICALP.2021.24
Triandopoulos, N., Cornelius, C., Kapadia, A., Kotz, D., Peebles, D. & Shin, M. (2008). Anonysense: privacy-aware people-centric sensing. I Proceeding of the 6th international conference on Mobile systems, applications, and services (s. 211-224). Association for Computing Machinery. https://doi.org/10.1145/1378600.1378624
Valsted, F. M., Nielsen, C. V. H., Jensen, J. Q., Sonne, T. & Jensen, M. M. (2017). Strive: Exploring Assistive Haptic Feedback on the Run. I M. Brereton, D. Vyas, A. Soro, B. Ploderer, J. Waycott & A. Morrison (red.), Proceedings of the 29th Australian Computer-Human Interaction Conference: Human-Nature, OzCHI 2017 (s. 275-284). Association for Computing Machinery. https://doi.org/10.1145/3152771.3152801
Hansen, T. R. (2006). Strings of experiments: looking at the design process as a set of socio-technical experiments. I Proceedings of the ninth conference on Participatory design: Expanding boundaries in design - Volume 1 (Bind 1, s. 1-10). Association for Computing Machinery. https://doi.org/10.1145/1147261.1147263
Madsen, M. & Andreasen, E. (2014). String Analysis for Dynamic Field Access. I A. Cohen (red.), Compiler Construction: 23rd International Conference, CC 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014. Proceedings (s. 197-217). Springer. https://doi.org/10.1007/978-3-642-54807-9_12
Brodal, G. S., Nielsen, J. A. S. & Truelsen, J. (2015). Strictly Implicit Priority Queues: On the Number of Moves and Worst-Case Time. I F. Dehne, J.-R. Sack & U. Stege (red.), Algorithms and Data Structures: 14th International Symposium, WADS 2015, Proceedings (s. 91-102). Springer VS. https://doi.org/10.1007/978-3-319-21840-3_8
Brodal, G. S., Lagogiannis, G. & Tarjan, R. E. (2025). Strict Fibonacci Heaps. ACM Transactions on Algorithms, 21(2), Artikel 15. https://doi.org/10.1145/3707692
Brodal, G. S., Lagogiannis, G. & Tarjan, R. E. (2012). Strict fibonacci heaps. I STOC '12 Proceedings of the 44th symposium on Theory of Computing (s. 1177-1184 ). Association for Computing Machinery. https://doi.org/10.1145/2213977.2214082
Son, W. & Afshani, P. (2015). Streaming Algorithms for Smallest Intersecting Ball of Disjoint Balls. I R. Jain, S. Jain & F. Stephan (red.), Theory and Applications of Models of Computation: 12th Annual Conference, TAMC 2015, Singapore, May 18-20, 2015, Proceedings (s. 189-199 ). Springer VS. https://doi.org/10.1007/978-3-319-17142-5
Abam, M., de Berg, M., Hachenberger, P. & Zarei, A. (2010). Streaming Algorithms for Line Simplification. Discrete & Computational Geometry, 43(3), 497-515. https://doi.org/10.1007/s00454-008-9132-4
Lex, A., Streit, M., Schulz, H.-J., Partl, C., Schmalstieg, D., Park, P. J. & Gehlenborg, N. (2012). StratomeX: Visual Analysis of Large-Scale Heterogeneous Genomics Data for Cancer Subtype Characterization. Computer Graphics Forum, 31(3), 1175-1184. https://doi.org/10.1111/j.1467-8659.2012.03110.x
Hansen, T. D., Miltersen, P. B. & Zwick, U. (2011). Strategy iteration is strongly polynomial for 2-player turn-based stochastic games with a constant discount factor. I Proceedings of the Second Symposium on Innovations in Computer Science (s. 253-263). Tsinghua University Press, Beijing. http://conference.itcs.tsinghua.edu.cn/ICS2011/content/papers/7.html
Cermak, J., Bosansky, B. & Gatti, N. (2015). Strategy Effectiveness of Game-Theoretical Solution Concepts in Extensive-Form General-Sum Games. Abstract fra International Conference on Autonomous Agents and Multiagent Systems, Istanbul, Tyrkiet. http://dl.acm.org/citation.cfm?id=2773450&CFID=719158965&CFTOKEN=25615646
Ibsen-Jensen, R. (2013). Strategy complexity of two-player, zero-sum games. Department of Computer Science, University of Aarhus.
Ibsen-Jensen, R. & Chatterjee , K. (2013). Strategy Complexity of Finite-Horizon Markov Decision Processes and Simple Stochastic Games. I A. Kučera , T. A. Henzinger, J. Nešetřil, T. Vojnar & D. Antoš (red.), Mathematical and Engineering Methods in Computer Science: 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, 2012, Revised Selected Papers (s. 106-117). Springer VS. https://doi.org/10.1007/978-3-642-36046-6_11
Chatterjee, K., Hansen, K. A. & Ibsen-Jensen, R. (2017). Strategy Complexity of Concurrent Safety Games. I K. G. Larsen, H. L. Bodlaender & J.-F. Raskin (red.), 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2017) (Bind 83, s. 55:1-55:13). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.MFCS.2017.55
Rossitto, C., Berns, K. & Larsen-Ledet, I. (2020). Strategies of Visibility: Growth, Media and Social Movements. Afhandling præsenteret på The 23rd ACM Conference on Computer-Supported Cooperative Work and Social Computing.
Rohde, J., Wolff, S. & Toftegaard, T. S. (2009). Strategies For Releasing The Green Potential In Home Automation. Proceedings of the Wireless Personal Multimedia Communications Symposia.
Guerraoui, R., Aksit, M., Black, A., Cardelli, L., Cointe, P., Coplien, J., Kiczales, G., Lea, D., Madsen, O., Magnusson, B., Meseguer, J., Moessenboeck, H., Palsberg, J. & Schmidt, D. (1996). Strategic directions in object-oriented programming. ACM Computing Surveys, 28(4), 691-700. https://doi.org/10.1145/242223.242275