Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Dalsgaard, P., Dindler, C., Stuedahl, D. & Smørdal, O. (2009). Use of blogs for studying users' engagement with mobile telephones in museum environment. I Proceedings of the 2007 Tenth European Conference on Computer-Supported Cooperative Work (Bind Limerick, Irland). Springer Science+Business Media.
Bødker, S. (2011). Use is everywhere and changing: Analysis and design with the Human-Artifact Model. I Proceedings of the 29th Annual European Conference on Cognitive Ergonomics (s. 3-10). Association for Computing Machinery. https://doi.org/10.1145/2074712.2074714
Bertelsen, O. W., Eskildsen, T. & Sperschneider, W. (2002). Use in the oven - product development in HCI research. I E. Frøkjær & K. Hornbæk (red.), Proceedings of the Second Danish Human-Computer Interaction Research Symposium (s. 13-14). University of Copenhagen.
Mathiasen, N. R. (2007). Usable Security Revisited. Poster-session præsenteret på Danish HCI Research Symposium, DHRS 2007, København, Danmark.
Bødker, S. & Petersen, M. G. (1998). Usability work: From snapshot to development of use. Afhandling præsenteret på ISCRAT 1998, Århus, Danmark.
Bødker, S. & Sundblad, Y. (2008). Usability and Interaction Design - New Challenges for the Scandinavian Tradition. Behaviour and Information Technology, 27(4), 293-300.
Hansen, F. A. & Grønbæk, K. (2011). UrbanWeb: a Platform for Mobile, Context-aware Web Services. I S. Ahson & M. Ilyas (red.), Mobile Web 2.0: Developing and Delivering Services to Mobile Devices (s. 137-162). CRC Press/Taylor. http://www.taylorandfrancis.com/books/details/9781439800829/
Hansen, F. A. & Grønbæk, K. (2010). Urbanweb: A platform for mobile, context-aware web services. I Mobile Web 2.0: Developing and Delivering Services to Mobile Devices (s. 137-162). CRC Press. https://doi.org/10.1201/b10445
Hirt, M. & Nielsen, J. B. (2005). Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computations. I B. Roy (red.), Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings (s. 79-99). Springer. https://doi.org/10.1007/11593447_5
Clifford, R., Grønlund, A., Larsen, K. G. & Starikovskaya, T. (2018). Upper and lower bounds for dynamic data structures on strings. I R. Niedermeier & B. Vallée (red.), 35th Symposium on Theoretical Aspects of Computer Science, STACS 2018 (Bind 96, s. 22:1-22:14). Artikel 22 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.STACS.2018.22
Lu, H. & Jensen, C. S. (2012). Upgrading Uncompetitive Products Economically. I IEEE 28th International Conference on Data Engineering (ICDE) (s. 977 - 988 ). IEEE Press. https://doi.org/10.1109/ICDE.2012.92
Hou, B. J., Abdrabou, Y., Weidner, F. & Gellersen, H. (2024). Unveiling Variations: A Comparative Study of VR Headsets Regarding Eye Tracking Volume, Gaze Accuracy, and Precision. I 2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW) (s. 650-655). IEEE. https://doi.org/10.1109/VRW62533.2024.00127
Saioc, G.-V., Shirchenko, D. & Chabbi, M. (2024). Unveiling and Vanquishing Goroutine Leaks in Enterprise Microservices: a Dynamic Analysis Approach. I T. Grosser, C. Dubach, M. Steuwer, J. Xue, G. Ottoni & F. M. Q. Pereira (red.), 2024 IEEE/ACM International Symposium on Code Generation and Optimization (CGO) (s. 411-422). IEEE. https://doi.org/10.1109/CGO57630.2024.10444835
Moradan, A., Sorkhpar, M., Miyauchi, A., Mottin, D. & Assent, I. (2025). Untapping the Power of Indirect Relationships in Entity Summarization. I WSDM 2025 : Proceedings of the 18th ACM International Conference on Web Search and Data Mining (s. 820-828). Association for Computing Machinery. https://doi.org/10.1145/3701551.3703566
Bødker, S., Lyle, P. & Saad-Sulonen, J. (2017). Untangling the Mess of Technological Artifacts: Investigating Community Artifact Ecologies. I C and T 2017 - 8th International Conference on Communities and Technologies, Conference Proceedings (s. 246-255). Association for Computing Machinery. https://doi.org/10.1145/3083671.3083675
Kjærgaard, M. B. & Blunck, H. (2011). Unsupervised Power Profiling for Mobile Devices. Afhandling præsenteret på The 8th Annual International Conference on Mobile and Ubiquitous Systems:Computing, Networking and Services, København, Danmark.
Kjærgaard, M. B. & Blunck, H. (2012). Unsupervised Power Profiling for Mobile Devices. I A. Puiatti & T. Gu (red.), Mobile and Ubiquitous Systems: Computing, Networking, and Services: 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers (s. 138-149). Springer. https://doi.org/10.1007/978-3-642-30973-1_12
Scheder, D. (2013). Unsatisfiable CNF formulas contain many conflicts. I L. Cai, S.-W. Cheng & T.-W. Lam (red.), Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (s. 273-283). Springer VS. https://doi.org/10.1007/978-3-642-45030-3_26
Dahl, M. & Damgård, I. B. (2014). Universally composable symbolic analysis for two-party protocols based on homomorphic encryption. I P. Q. Nguyen & E. Oswald (red.), Advances in Cryptology – EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings (s. 695-712). Springer VS. https://doi.org/10.1007/978-3-642-55220-5_38
Chakraborty, S., Magri, B., Nielsen, J. B. & Venturi, D. (2022). Universally Composable Subversion-Resilient Cryptography. I O. Dunkelman & S. Dziembowski (red.), Advances in Cryptology – EUROCRYPT 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings (s. 272-302). Springer. https://doi.org/10.1007/978-3-031-06944-4_10
Barak, B., Canetti, R., Nielsen, J. B., Pass, R. & IEEE (red.) (2004). Universally Composable Protocols with Relaxed Set-Up Assumptions. I Ikke angivet (s. 186-195). IEEE Press.
Barak, B., Canetti, R., Nielsen, J. B. & Pass, R. (2004). Universally composable protocols with relaxed set-up assumptions. I 45th Annual IEEE Symposium on Foundations of Computer Science, 2004. Proceedings. (s. 186-195). IEEE Computer Society Press. https://doi.org/10.1109/FOCS.2004.71
David, B. M., Dowsley, R. & Nascimento, A. C. A. (2014). Universally composable oblivious transfer based on a variant of lPN. I D. Gritzalis, A. Kiayias & I. Askoxylakis (red.), Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings (s. 143-158). Springer. https://doi.org/10.1007/978-3-319-12280-9_10
Damgård, I. B. & Nielsen, J. B. (2003). Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption. I D. Boneh (red.), Advances in Cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings (s. 247-264). Springer. https://doi.org/10.1007/978-3-540-45146-4_15
Strzebonski, A. & Tsigaridas, E. (2011). Univariate real root isolation in an extension field. I Proceedings of the 36th International Symposium on Symbolic and Algebraic Computation (s. 321-328). Association for Computing Machinery. https://doi.org/10.1145/1993886.1993934
de Montjoye, Y.-A., Radaelli, L., Singh, V. K. & Pentland, A. S. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 347(6221), 536-539. https://doi.org/10.1126/science.1256297
Bouvin, N. O. (1999). Unifying strategies for Web augmentation. I J. Westbomke, U. K. Wiil, J. J. Leggett, K. Tochtermann & J. M. Haake (red.), Proceedings of the tenth ACM Conference on Hypertext and hypermedia: returning to our diverse roots (s. 91-100). Association for Computing Machinery. https://doi.org/10.1145/294469.294493
Turon, A., Dreyer , D. & Birkedal, L. (2013). Unifying refinement and hoare-style reasoning in a logic for higher-order concurrency. I G. Morrisett & T. Uustalu (red.), Proceedings of the 18th ACM SIGPLAN International Conference on Functional Programming, ICFP '13 (s. 377-390 ). Association for Computing Machinery. https://doi.org/10.1145/2500365.2500600
Křivánek, J., Georgiev, I., Hachisuka, T., Vévoda, P., Šik, M., Nowrouzezahrai, D. & Jarosz, W. (2014). Unifying Points, Beams, and Paths in Volumetric Light Transport Simulation. A C M Transactions on Graphics, 33(4), Artikel 13. https://doi.org/10.1145/2601097.2601219
Aagaard, F. L., Kristensen, M., Gratzer, D. & Birkedal, L. (2022). Unifying Cubical and Multimodal Type Theory. Abstract fra 28th International Conference on Types for Proofs and Programs, Nantes, Frankrig. https://types22.inria.fr/files/2022/06/TYPES_2022_paper_35.pdf
Torgersen, M. (2001). Unifying Abstractions. (DAIMI PhD Dissertation PD-01-2 udg.) Department of Computer Science.
Høgsgaard, M. M. & Paudice, A. (2025). Uniform Mean Estimation for Heavy-Tailed Distributions via Median-of-Means. I Proceedings of the 42nd International Conference on Machine Learning (Bind 267, s. 23357-23381)
Hansen, M. T., Jurdak, R. & Kusy, B. (2011). Unified broadcast in sensor networks. I 10th International Conference on Information Processing in Sensor Networks (IPSN), 2011 (s. 306-317). IEEE Computer Society Press. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5779047
Saad-Sulonen, J., Halskov, K., Eriksson, E., Vines, J., Huybrechts, L. & Karasti, T. H. (2015). Unfolding Participation: What do we mean by participation – conceptually and in practice. Aarhus Series on Human Centered Computing , 1(1). https://doi.org/10.7146/aahcc.v1i1.21324
Damgård, I. B., Fehr, S., Morozov, K. & Salvail, L. (2004). Unfair Noisy Channels and Oblivious Transfer. I M. Naor (red.), Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004. Proceedings (s. 355-373). Springer. https://doi.org/10.1007/978-3-540-24638-1_20
Berlin, R. & Klokmose, C. N. (2007). Undo in Dynamic and Distributed User Interfaces. Poster-session præsenteret på Danish HCI Research Symposium, DHRS 2007, København, Danmark.
Beldiceanu, N., Katriel, I. & Lorca, X. (2006). Undirected Forest Constraints. I Integration of AI and OR techniques in Constraint Programming for Combinatorial Optimization Problems (CPAIOR 2006) (Bind LNCS 3990, s. 29-43). Springer.
Januzelli, J., Roy, L. & Xu, J. (2025). Under What Conditions Is Encrypted Key Exchange Actually Secure? I S. Fehr & P.-A. Fouque (red.), Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques: Proceedings (s. 451-481). Springer Science+Business Media. https://doi.org/10.1007/978-3-031-91124-8_16
Korn, M. (2010). Understanding Use Situated in Real-world Mobile Contexts. Afhandling præsenteret på ACM Conference on Ubiquitous Computing. Ubicomp '10, København, Danmark. http://mkorn.binaervarianz.de/pub/ubicomp2010-ws.pdf
Chundury, P., Thakkar, U., Reyazuddin, Y., Jordan, J. B., Elmqvist, N. & Lazar, J. (2024). Understanding the Visualization and Analytics Needs of Blind and Low-Vision Professionals. I ASSETS 2024 - Proceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility Artikel 111 Association for Computing Machinery. https://doi.org/10.1145/3663548.3688496
Van Oosterhout, A. (2019). Understanding the benefits and drawbacks of shape change in contrast or addition to other modalities. I DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (s. 113-116). Association for Computing Machinery. https://doi.org/10.1145/3301019.3324875
Strauss, D. J., Francis, A. L., Schäfer, Z., Latzel, M., Corona–Strauss, F. I. & Launer, S. (2025). Understanding speech in “noise” or free energy minimization in the soundscapes of the anthropocene. Frontiers in Neuroscience, 19, Artikel 1534425. https://doi.org/10.3389/fnins.2025.1534425