Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Jørgensen, J. B., Knudsen, B., Sloth, L., Vase, J. R. & Christensen, H. B. (2016). Variability Handling for Mobile Banking Apps on iOS and Android. I Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (s. 283-286). Artikel 7516847 IEEE Computer Society Press. https://doi.org/10.1109/WICSA.2016.29
Bhandari, S., Harsha, P., Saptharishi, R. & Srinivasan, S. (2022). Vanishing Spaces of Random Sets and Applications to Reed-Muller Codes. I S. Lovett (red.), 37th Computational Complexity Conference, CCC 2022 Artikel 31 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.CCC.2022.31
Petersen, M. G. & Rasmussen, M. K. (2011). Value representations: a value based dialogue tool. I making Design Matter! : Proceedings Nordes '11 : the Nordic 4th Nordic Design Research Conference (s. 284-287). School of Art & Design, Aalto University . http://ocs.sfu.ca/nordes/index.php/nordes/2011/paper/view/445
Nielsen, B. B. & Møller, A. (2020). Value Partitioning: A Lightweight Approach to Relational Static Analysis for JavaScript. I 34th European Conference on Object-Oriented Programming, ECOOP 2020 Artikel 16 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ECOOP.2020.16
S. Fitzgerald, J., Gorm Larsen, P., Tjell, S. & Verhoef, M. (2007). Validation Support for Distributed Real-Time Embedded Systems in VDM++. I Proceedings of the Tenth IEEE International Symposium on High Assurance Software Engineering (HASE 2007) (s. 331-340). IEEE Computer Society Press.
Shaik, I., Heisinger, M., Seidl, M. & Pol, J. V. D. (2023). Validation of QBF Encodings with Winning Strategies. Leibniz International Proceedings in Informatics, 271. https://doi.org/10.4230/LIPIcs.SAT.2023.24
Winge, K., Haugaard, R. & Merritt, T. R. (2014). VAL: Visually Augmented Laser cutting to enhance and support creativity. I IEEE International Symposium on Mixed and Augmented Reality - Media, Arts, Social Science, Humanities and Design, ISMAR 2014, Proceedings (s. 31-34). Artikel 6935435 IEEE. https://doi.org/10.1109/ISMAR-AMH.2014.6935435
Bødker, S. (1985). UTOPIA and the Design of User Interfaces. I Precedings of the Working Conference on Development and Use of Computer-based Systems and Tools (s. 109-124). Department of Computer Science, Aarhus University.
Christensen, H. B. (1998). Utilising a Geographic Space Metaphor in a Software Development Environment. I Proceedings of the IFIP TC2/TC13 WG2.7/WG13.4 Seventh Working Conference on Engineering for Human-Computer Interaction (s. 39-56). Klüwer.
Kristensen, M. D. & Bouvin, N. O. (2010). Using Wi-Fi to Save Energy via P2P Remote Execution. I 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops 2010). Proceedings (s. 123-128). IEEE. https://doi.org/10.1109/PERCOMW.2010.5470614
Cahill, V., Gray, E., Seigneur, J., Jensen, C., Chen, Y., Shand, B., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., Serugendo, G. D. M., Bryce, C., Carbone, M., Krukow, K. & Nielsen, M. (2003). Using trust for Secure Collaboration in Uncertain Environments. I E E E Pervasive Computing, 2(3), 52-61. https://doi.org/10.1109/MPRV.2003.1228527
Baum, C., Cozzo, D. & P. Smart, N. (2020). Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. I K. G. Paterson & D. Stebila (red.), Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (s. 274-302). Springer. https://doi.org/10.1007/978-3-030-38471-5_12
Simonsen, M., Sand, A., Mailund, T. & Pedersen, C. N. S. (2010). Using the Power of Modern Processors in Bioformatics. Poster-session præsenteret på Conference on IT research at AU, Århus, Danmark.
Madsen, O. L. & Møller-Pedersen, B. (2022). Using supplementary properties to reduce the need for documentation. I T. Margaria & B. Steffen (red.), Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering - 11th International Symposium, ISoLA 2022, Proceedings: Software Engineering (s. 35-59). Springer. https://doi.org/10.1007/978-3-031-19756-7_4
Christensen, H. B. (2022). Using Students’ Screencasts as Alternative to Written Submissions. I Proceedings of the 55th Hawaii International Conference on System Sciences (s. 881-889). University of Hawai'i at Manoa . http://hdl.handle.net/10125/79440
Christensen, H. B. (2003). Using Software Architectures for Designing Distributed Embedded Systems. Department of Computer Science, Aarhus University.
Hansen, T. R., Eklund, J. M., Sprinkle, J., Bajcsy, R. & Sastry, S. (2005). Using Smart Sensors and a Camera Phone to Detect and Verify the Fall of Elderly Persons. I Proceedings of 3rd European Medical and Biological Engineering Conference: EMBEC 2005 (s. 2486-2487). IFMBE.
Madsen, O. L. (2023). Using Object-Sequence Diagrams for Debugging. I E. Gonzalez Boix & C. Scholliers (red.), DEBT 2023: Proceedings of the 1st ACM International Workshop on Future Debugging Techniques (s. 11-22). Association for Computing Machinery. https://doi.org/10.1145/3605155.3605864
Christensen, H. B. (2002). Using Logic Programming to Detect Activities in Pervasive Healthcare. I P. J. Stuckey (red.), Logic Programming: 18th International Conference, ICLP 2002 Copenhagen, Denmark, July 29 – August 1, 2002 Proceedings (2401 udg., s. 185-199). Springer. https://doi.org/10.1007/3-540-45619-8_29
Yang, B., Kaul, M. & Jensen, C. S. (2014). Using Incomplete Information for Complete Weight Annotation of Road Networks. I E E E Transactions on Knowledge & Data Engineering, 26(5), 1267-1279. https://doi.org/10.1109/TKDE.2013.89
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2012). Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks. I A. U. Schmidt, G. Russello, I. Krontiris & S. Lian (red.), Security and Privacy in Mobile Information and Communication Systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers (s. 107-118). Springer. https://doi.org/10.1007/978-3-642-33392-7_12
Lehmann, A. & Gross, A. (2016). Using Crowd Sensed Data as Input to Congestion Model. I 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016: The Third International Workshop on Crowd Assisted Sensing Pervasive Systems and Communications Artikel 7457105 IEEE Press. https://doi.org/10.1109/PERCOMW.2016.7457105
Čermák, J., Bosansky, B., Durkota, K., Lisý, V. & Kiekintveld, C. (2016). Using correlated strategies for computing stackelberg equilibria in extensive-form games. I 30th AAAI Conference on Artificial Intelligence, AAAI 2016 (s. 439-445). AAAI Press. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85007242893&partnerID=40&md5=d6d209b2094ebcd4dd19608badb7e971
Madsen, O. L. (2021). Using Coroutines for Multi-core Preemptive Scheduling. I Proceedings of the 11th Workshop on Programming Languages and Operating Systems (PLOS '21) (s. 46-52). Association for Computing Machinery. https://doi.org/10.1145/3477113.3487271
Zhang, W. & Hansen, K. M. (2011). Using Context Awareness for Self Management in Pervasive Service Middleware. I F. Mastrogiovanni & N.-Y. Chong (red.), Handbook of Research on Ambient Intelligence and Smart Environments Trends and Perspectives (s. 248-271). Idea Group Publishing. http://www.igi-global.com/book/handbook-research-ambient-intelligence-smart/41775#table-of-contents
Kristensen, L. M. (2004). Using Coloured Petri Nets in the Development of Protocols for Ad-Hoc Networking. I Proceedings of 3rd International Workshop on Integration and Specification Techniques for Applications in Engineering (s. 12-13)
Radaelli, L., Moses, Y. & Jensen, C. S. (2014). Using cameras to improve Wi-Fi based indoor positioning. I D. Pfoser & K.-J. Li (red.), Web and Wireless Geographical Information Systems: 13th International Symposium, W2GIS 2014, Seoul, South Korea, May 29-30, 2014. Proceedings (s. 166-183). Springer VS. https://doi.org/10.1007/978-3-642-55334-9-11
Enni, S. & Assent, I. (2018). Using Balancing Terms to Avoid Discrimination in Classification. I 2018 IEEE International Conference on Data Mining, ICDM 2018 (s. 947-952). Artikel 8594925 IEEE Press. https://doi.org/10.1109/ICDM.2018.00116
Grønbæk, K., Bang, T. & Hansen, P. S. (2002). Using a Metro Map Metaphor for organizing Web-based learning resources. I P. Barker & S. Rebelsky (red.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2002 (s. 647-652). Association for the Advancement of Computing in Education.
Zimmer, P. (2004). Using Ambients to Control Resources. International Journal of Information Security, 2(3-4), 126-144.
Hansen, T. R., Eriksson, E. & Lykke-Olesen, A. (2006). Use your head: Exploring face tracking for mobile interaction. I G. M. Olson & R. Jeffries (red.), CHI Extended Abstracts ´06: Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems Society for Industrial and Applied Mathematics. https://doi.org/10.1145/1125451.1125617
Eerikson, H., Keller, M., Orlandi, C., Pullonen, P., Puura, J. & Simkin, M. (2020). Use your brain! Arithmetic 3PC for any modulus with active security. I Y. T. Kalai, A. D. Smith & D. Wichs (red.), 1st Conference on Information-Theoretic Cryptography (ITC 2020) Artikel 5 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ITC.2020.5
Bødker, S. & Grønbæk, K. (1995). Users and Designers in Mutual Activity - an analysis of cooperative activities in systems design. I Y. Engeström & D. Middleton (red.), Cognition and communication at work (s. 130-158). Cambridge University Press.
Kyng, M. (1998). Users and Computers: A contextual approach to design of computer artifact. Scandinavian Journal of Information Systems, 10(1-2), 7-44.
Seinfeld, S., Feuchtner, T., Maselli, A. & Müller, J. (2021). User Representations in Human-Computer Interaction. Human-Computer Interaction, 36(5-6), 400-438. https://doi.org/10.1080/07370024.2020.1724790
Bouvin, N. O. & Thomsen, K. S. (1999). User Guide to the COCONUT Arakne Application. Department of Computer Science, Aarhus University. CIT-Coconut Nr. 99-04Intermedia Working Papers Nr. 2
Bouvin, N. O. & Albertsen, J. (2008). User Defined Structural Searches in MediaWiki. I Proceedings of the nineteenth ACM conference on Hypertext and hypermedia. (s. 15-20). Association for Computing Machinery. https://doi.org/10.1145/1379092.1379099
Dalsgaard, P., Dindler, C., Stuedahl, D. & Smørdal, O. (2009). Use of blogs for studying users' engagement with mobile telephones in museum environment. I Proceedings of the 2007 Tenth European Conference on Computer-Supported Cooperative Work (Bind Limerick, Irland). Springer Science+Business Media.
Bødker, S. (2011). Use is everywhere and changing: Analysis and design with the Human-Artifact Model. I Proceedings of the 29th Annual European Conference on Cognitive Ergonomics (s. 3-10). Association for Computing Machinery. https://doi.org/10.1145/2074712.2074714