Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Amer-Yahia, S., Bogojeska, J., Facchinetti, R., Franceschi, V., Gionis, A., Hose, K., Koutrika, G., Kouyos, R., Lissandrini, M., Maniu, S., Mirylenka, K., Mottin, D., Palpanas, T., Rigotti, M. & Velegrakis, Y. (2025). Towards Reliable Conversational Data Analytics. I roceedings of the 28th International Conference on Extending Database Technology (3 udg., s. 962-969). openproceedings.org. https://doi.org/10.48786/edbt.2025.78
Baum, C., Lin, H. & Oechsner, S. (2018). Towards Practical Lattice-Based One-Time Linkable Ring Signatures. I D. Naccache, S. Xu, S. Qing, P. Samarati, G. Blanc, R. Lu, Z. Zhang & A. Meddahi (red.), Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings: ICICS 2018 (Bind 11149, s. 303-322). Springer VS. https://doi.org/10.1007/978-3-030-01950-1_18
Mahrík, M., Šikyňa, M., Mic, V. & Zezula, P. (2025). Towards Personalized Similarity Search for Vector Databases. I E. Chávez, B. Kimia, J. Lokoč, M. Patella & J. Sedmidubsky (red.), Similarity Search and Applications - 17th International Conference, SISAP 2024, Proceedings (s. 126-139). Springer. https://doi.org/10.1007/978-3-031-75823-2_11
Brodal, G. S., Gfeller, B., Jørgensen, A. G. & Sanders, P. (2011). Towards optimal range medians. Theoretical Computer Science, 412(24), 2588-2601. https://doi.org/10.1016/j.tcs.2010.05.003
Cohen-Addad, V., Larsen, K. G., Saulpic, D. & Schwiegelshohn, C. (2022). Towards optimal lower bounds for k-median and k-means coresets. I S. Leonardi & A. Gupta (red.), STOC 2022 - Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing (s. 1038-1051). Association for Computing Machinery. https://doi.org/10.1145/3519935.3519946
Fournier, H., Limaye, N., Malod, G., Srinivasan, S. & Tavenas, S. (2023). Towards Optimal Depth-Reductions for Algebraic Formulas. I A. Ta-Shma (red.), 38th Computational Complexity Conference, CCC 2023 Artikel 28 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.CCC.2023.28
Streit, M., Schulz, H.-J., Schmalstieg, D. & Schumann, H. (2009). Towards Multi-User Multi-Level Interaction. I P. Isenberg, M. Sedlmair, D. Baur, T. Isenberg & A. Butz (red.), Proceedings of the Workshop on Collaborative Visualization on Interactive Surfaces CoVIS 2009 (s. 5-8). https://www.medien.ifi.lmu.de/forschung/publikationen/detail?pub=isenberg2010covis
Baum, C. (2016). Towards More Efficient Secure Multiparty Computation in the Preprocessing Model. Department of Computer Science, Aarhus University.
Blaabjerg, J. F. & Askarov, A. (2021). Towards Language-Based Mitigation of Traffic Analysis Attacks. Afhandling præsenteret på 34th IEEE Computer Security Foundations Symposium, Online, USA.
Prentow, T. S., Blunck, H., Kjærgaard, M. B. & Stisen, A. (2015). Towards Indoor Transportation Mode Detection using Mobile Sensing. I S. Sigg , P. Nurmi & F. Salim (red.), Mobile Computing, Applications, and Services : 7th International Conference, MobiCASE 2015, Berlin, Germany, November 12-13, 2015, Revised Selected Papers (Bind 162). Springer. https://doi.org/10.1007/978-3-319-29003-4
Nielsen, M. & Grønbæk, K. (2015). Towards highly affine visualizations of consumption data from buildings. I IVAPP 2015 - 6th International Conference on Information Visualization Theory and Applications; VISIGRAPP, Proceedings (s. 247-255). SCITEPRESS Digital Library.
Radaelli, L. & Jensen, C. S. (2013). Towards Fully Organic Indoor Positioning. I Proceedings of the Fifth ACM SIGSPATIAL International Workshop on Indoor Spatial Awareness (s. 16-20). Association for Computing Machinery.
Johns, C. A., Evangelista Belo, J. M., Feit, A. M., Klokmose, C. N. & Pfeuffer, K. (2023). Towards Flexible and Robust User Interface Adaptations With Multiple Objectives. I S. Follmer, J. Han, J. Steimle & N. Henry Riche (red.), UIST '23: Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology Artikel 108 Association for Computing Machinery. https://doi.org/10.1145/3586183.3606799
Derczynski, L., Yang, B. & Jensen, C. S. (2013). Towards Context-Aware Search and Analysis on Social Media Data. I G. Guerrini & N. W. Paton (red.), Proceedings of The 16th International Conference on Extending Database Technology: EDBT 2013 (s. 137-142 ). Association for Computing Machinery. https://doi.org/10.1145/2452376.2452393
Mascheroni, G., Zaman, B., Eriksson, E., Cino, D., Brandsen, S. & Bressa, N. A. (2022). Towards Computational Empowerment of Disadvantaged Children and Youth in Non-Formal Learning Contexts. Abstract fra ICA annual conference, Paris, Frankrig.
Hubenschmid, S., Zagermann, J., Fink, D., Wieland, J., Feuchtner, T. & Reiterer, H. (2021). Towards Asynchronous Hybrid User Interfaces for Cross-Reality Interaction. I H.-C. Jetter, J.-H. Schröder, J. Gugenheimer, M. Billinghurst, C. Anthes, M. Khamis & T. Feuchtner (red.), ISS'21 Workshop Proceedings: Transitional Interfaces in Mixed and Cross-Reality: A new frontier? https://doi.org/10.18148/kops/352-2-84mm0sggczq02
Hansen, K. M., Ingstrup, M., Kyng, M. & Olsen, J. W. (2011). Towards a Software Ecosystem of Healthcare Services. I Proceedings of the 3rd International Workshop on Infrastructures for Healthcare: Global Healthcare (s. 27-30) http://www.itu.dk/people/lrc/ProcInfraHealth2011.PDF
Brody, J. E., Buhrman, H., Koucký, M., Loff, B. & Speelman, F. (2016). Towards a Reverse Newman's Theorem in Interactive Information Complexity. Algorithmica, 76(3), 749-781. https://doi.org/10.1007/s00453-015-0112-9
Thiel, S.-K., Remy, C., Roque, L., Orji, R., Dalsgaard, P., Latulipe, C. & Sarcar, S. (2019). Towards a Research Agenda for Gameful Creativity. I DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (s. 393-396). Association for Computing Machinery. https://doi.org/10.1145/3301019.3320003
Klokmose, C. N. (2007). Towards an Instrumental Paradigm for Ubiquitous Interaction. I A. C. Brodersen, S. Bødker & C. N. Klokmose (red.), Multiple and Ubiquitous Interaction, 28. - 30. March 2007: Book of Abstracts (s. 33-35)
Andersen, M. S. & Kjærgaard, M. B. (2012). Towards a New Classification of Location Privacy Methods in Pervasive Computing. I A. Puiatti & T. Gu (red.), Mobile and Ubiquitous Systems: Computing, Networking, and Services : 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers (Bind 104, s. 150-161). Springer. https://doi.org/10.1007/978-3-642-30973-1_13
Asharov, G., Canetti, R. & Hazay, C. (2011). Towards a Game Theoretic View of Secure Computation. Lecture Notes in Computer Science, 426-445. https://doi.org/10.1007/978-3-642-20465-4_24
Aehnelt, M., Schulz, H.-J. & Urban, B. (2013). Towards a Contextualized Visual Analysis of Heterogeneous Manufacturing Data. I Advances in Visual Computing : 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part II (s. 76-85). Springer. https://doi.org/10.1007/978-3-642-41939-3_8
Saad-Sulonen, J. & Korsgaard, H. (2015). Towards a concept of community artifact ecology in HCI?. Afhandling præsenteret på CHI, Seoul, Sydkorea.
Yang, B., Guo, C., Ma, Y. & Jensen, C. S. (2015). Toward personalized, context-aware routing. V L D B Journal, 24(2), 297-318. https://doi.org/10.1007/s00778-015-0378-1
Brewer, R. S., Verdezoto, N., Holst, T. & Rasmussen, M. K. (2015). Tough Shift: Exploring the Complexities of Shifting Residential Electricity Use Through a Casual Mobile Game. I CHI PLAY '15 : Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play (s. 307-317). Association for Computing Machinery. https://doi.org/10.1145/2793107.2793108
Pagnin, E., Gunnarsson, G., Talebi, P., Orlandi, C. & Sabelfeld, A. (2019). TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing. Proceedings on Privacy Enhancing Technologies, 2019(4), 93-111. https://doi.org/10.2478/popets-2019-0060
LaVigne, R., Liu-Zhang, C.-D., Maurer, U. M., Moran, T., Mularczyk, M. & Tschudi, D. (2018). Topology-Hiding Computation Beyond Semi-Honest Adversaries. I A. Beimel & S. Dziembowski (red.), Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings: Theory of Cryptography (Bind 11240, s. 3-35). Springer VS. https://doi.org/10.1007/978-3-030-03810-6_1
Munro, J. I., Navarro, G., Nielsen, J. A. S. & ShaH, R. (2014). Top- k Term-Proximity in Succinct Space. I H.-K. Ahn & C.-S. Shin (red.), Algorithms and Computation: 25th International Symposium, ISAAC 2014, Proceedings (s. 169-180 ). Springer VS. https://doi.org/10.1007/978-3-319-13075-0_14
Skovsgaard, A. & Jensen, C. S. (2014). Top-k point of interest retrieval using standard indexes. I Y. Huang & M. Schneider (red.), Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL '14 (s. 173-182 ). Association for Computing Machinery. https://doi.org/10.1145/2666310.2666399
Christensen, P. K., Skovgaard, C. Ø. & Petersen, M. G. (2019). Together together: Combining shared and separate activities in designing technology for family life. I Proceedings of the 18th ACM International Conference on Interaction Design and Children, IDC 2019 (s. 374-385). Association for Computing Machinery. https://doi.org/10.1145/3311927.3323141
Schmidt, E. M., Skyum, S. & Nielsen, M. (2012). To Dexter - A Tribute from Aarhus. I R. L. Constable & A. Silva (red.), Logic and Program Semantics : Essays Dedicated to Dexter Kozen on the Occasion of His 60th Birthday (s. 341). Springer. https://doi.org/10.1007/978-3-642-29485-3_30
Nasir, M. A. U., Aslay, C., de Francisi Morales, G. & Riondato, M. (2021). TipTap: Approximate Mining of Frequent k-Subgraph Patterns in Evolving Graphs. ACM Transactions on Knowledge Discovery from Data, 15(3), 1-35. Artikel 48. https://doi.org/10.1145/3442590
Döttling, N. M., Ghosh, S., Nielsen, J. B., Nilges, T. & Trifiletti, R. (2017). TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation. I CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security: CCS '17 (s. 2263-2276). Association for Computing Machinery. https://doi.org/10.1145/3133956.3134024
Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E. (2018). TinyKeys: A New Approach to Efficient Multi-Party Computation. I H. Shacham & A. Boldyreva (red.), Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Bind 10993, s. 3-33). Springer VS. https://doi.org/10.1007/978-3-319-96878-0_1
Hansen, M. T. & Kusy, B. (2011). TinyInventor: A Holistic Approach to Sensor Network Application Development. Afhandling præsenteret på Extending the Internet to Low power and Lossy Networks. IP+SN 2011 , Chicago, IL, USA.
Nyborg, J. C., Pelletier, C., Lefevre, S. & Assent, I. (2022). TimeMatch: Unsupervised Cross-Region Adaptation by Temporal Shift Estimation. ISPRS Journal of Photogrammetry and Remote Sensing, 188, 301-313. https://doi.org/10.1016/j.isprsjprs.2022.04.018
Larsen, K. G., Nelson, J. & Nguyen, H. L. (2015). Time Lower Bounds for Nonadaptive Turnstile Streaming Algorithms. I R. Servedio & R. Rubinfeld (red.), Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC '15 (s. 803-812). Association for Computing Machinery. https://doi.org/10.1145/2746539.2746542