Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Jensen, S. H., Møller, A. & Thiemann, P. (2009). Type Analysis for JavaScript. Lecture Notes in Computer Science, 5673, 238–255. https://doi.org/10.1007/978-3-642-03237-0_17
Kondi, Y., Orlandi, C. & Roy, L. (2023). Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions. I H. Handschuh & A. Lysyanskaya (red.), Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part I (s. 646-677). Springer. https://doi.org/10.1007/978-3-031-38557-5_21
Damgård, I. B., Orlandi, C., Takahashi, A. & Tibouchi, M. (2021). Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. I J. A. Garay (red.), Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings: 24rd IACR International Conference on Practice and Theory of Public-Key Cryptography, proceedings part 1 (s. 99-130). Springer. https://doi.org/10.1007/978-3-030-75245-3_5
Garg, S. & Polychroniadou, A. (2015). Two-round adaptively secure MPC from indistinguishability obfuscation. I Y. Dodis & J. Buus Nielsen (red.), Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (s. 614-637). Springer VS. https://doi.org/10.1007/978-3-662-46497-7_24
Damgård, I. B. & Knudsen, L. R. (1998). Two-Key Triple Encryption. Journal of Cryptology, 11(3), 209-218. https://doi.org/10.1007/s001459900044
Westergaard, M. & Kristensen, L. M. (2008). Two Interfaces to the CPN Tools Simulator. I Ninth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (s. 83-102). Department of Computer Science.
Brodal, G. S., Davoodi, P., Lewenstein, M., Raman, R. & Rao, S. S. (2012). Two Dimensional Range Minimum Queries and Fibonacci Lattices. Lecture Notes in Computer Science, 7501, 217-228 . https://doi.org/10.1007/978-3-642-33090-2_20
Boudol, G., Castellani, I., Hennessy, M., Nielsen, M. & Winskel, G. (2008). Twenty Years on: Reflections on the CEDISYS Project: Combining True Concurrency with Process Algebra. Lecture Notes in Computer Science, 5065, 757-777. https://doi.org/10.1007/978-3-540-68679-8_47
Reyzin, L., Smith, A. & Yakoubov, S. (2021). Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC. I Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings: Proceedings (Bind 12716, s. 361-378). Springer. https://doi.org/10.1007/978-3-030-78086-9_27
Derczynski, L., Chester, S. & Bøgh, K. S. (2015). Tune Your Brown Clustering, Please. I G. A. Angelova, K. Bontcheva & R. Mitkov (red.), International Conference Recent Advances in Natural Language Processing ’2015 Proceedings (s. 110–117). INCOMA Ltd. http://lml.bas.bg/ranlp2015/docs/RANLP_main.pdf
Christensen, H. B. (2005). TS-05: 150 lines of java with high architectural complexity. I 10th annual SIGCSE conference on Innovation and technology in computer science education, ITiCSE '05 Proceedings (Caparica, Portugal, June 27-29, 2005) (s. 396-396). Association for Computing Machinery. https://doi.org/10.1145/1067445.1067599
Caragiannis, I., Filos-Ratsikas, A., Nath, S. & Voudouris, A. (2024). Truthful ownership transfer with expert advice. Mathematical Programming, 203(1-2), 871-900. https://doi.org/10.1007/s10107-022-01834-3
Caragiannis, I., Filos-Ratsikas, A., Frederiksen, S. K. S., Hansen, K. A. & Tan, Z. (2016). Truthful facility assignment with resource augmentation: An exact analysis of serial dictatorship. I Web and Internet Economics - 12th International Conference, WINE 2016, Proceedings (Bind 10123, s. 236-250). Springer VS. https://doi.org/10.1007/978-3-662-54110-4_17
Filos-Ratsikas, A. & Miltersen, P. B. (2014). Truthful Approximations to Range Voting. I T.-Y. Liu, Q. Qi & Y. Ye (red.), Web and Internet Economics : 10th Workshop of Internet and Web Economics (WINE), proceedings (s. 175-188 ). Springer VS. https://doi.org/10.1007/978-3-319-13129-0_13
Caragiannis, I., Christodoulou, G. & Protopapas, N. (2022). Truthful Aggregation of Budget Proposals with Proportionality Guarantees. Proceedings of the AAAI Conference on Artificial Intelligence, 36(5), 4917-4924. https://doi.org/10.1609/aaai.v36i5.20421
Caragiannis, I., Christodoulou, G. & Protopapas, N. (2024). Truthful aggregation of budget proposals with proportionality guarantees. Artificial Intelligence, 335, Artikel 104178. https://doi.org/10.1016/j.artint.2024.104178
Nielsen, M. & Krukow, K. (2007). Trust Structures. International Journal of Information Security, 6(2-3), 153-181.
Nielsen, M., Krukow, K. & Sassone, V. (2008). Trust Models in Ubiquitous Computing. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 366(1881), 3781-3793. https://doi.org/10.1098/rsta.2008.0134
Carbone, M., Nielsen, M. & Sassone, V. (2004). Trust in Global Computing. Association for Logic Programming Newsletter, 17(4).
Nielsen, M. (2014). Trust in Event Structures. Theoretical Computer Science, 546(August), 3-6. https://doi.org/10.1016/j.tcs.2014.02.039
Carbone, M. (2005). Trust and Mobility. Aarhus Universitet.
Engberg, U. H. (1990). True Concurrency can be Traced. Daimi Report Nr. PB-308
Condit, R., Ashton, P., Balslev, H., Brokaw, N., Bunyavejchewin, S., Chuyong, G., Co, L., Shivaramaiah, H. S., Davies, S., Ewango, C. E. N., Foster, R., Gunatilleke, N., Gunatilleke, S., Hernandez, C., Hubbell, S., John, R., Kenfack, D., Kiratiprayoon, S., Hall, P. ... Zimmerman, J. K. (2005). Tropical tree α-diversity: Results from a worldwide network of large plots. Biologiske Skrifter, 55, 565-582.
Scheder, D. (2013). Trivial, tractable, hard. A not so sudden complexity jump in neighborhood restricted CNF formulas. I L. Cai, S.-W. Cheng & A.-W. Lam (red.), Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (s. 251-261). Springer VS. https://doi.org/10.1007/978-3-642-45030-3_24
Mogensen, P. H. & Robinson, M. (1995). Triggering Artefacts. AI & Society, 9(4), 373-388. https://doi.org/10.1007/BF01210588
Rachuri, S. R., Suresh, A. & Chaudhari, H. (2020). Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. I Proceedings 2020 Network and Distributed System Security Symposium (s. 1-18). Internet Society. https://doi.org/10.14722/ndss.2020.23005
Abdul, A., Vermeulen, J., Wang, D., Lim, B. Y. & Kankanhalli, M. (2018). Trends and Trajectories for Explainable, Accountable and Intelligible Systems: An HCI Research Agenda. I R. Mandryk & M. Hancock (red.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. 582:1-582:18). Association for Computing Machinery. https://doi.org/10.1145/3173574.3174156
Schulz, H.-J. (2011). Treevis.net: A Tree Visualization Reference. IEEE Computer Graphics and Applications, 31(6), 11-15. https://doi.org/10.1109/MCG.2011.103
Valencia, R., Condit, R., Romoleroux, K., Foster, R. B., Munoz, G. V., Losos, E. C., Balslev, H., Svenning, J.-C. & Magård, E. (2004). Tree species diversity and distribution in a forest plot at Yasuní National Park, Amazonian Ecuador. I in: E.C. Losos and E. G. Leigh, Jr. (eds.). Tropical Forest Diversity and Dynamism, The University of Chicago Press, Chicago and London. (s. 107-118)
Valencia, R., Foster, R. B., Villa, G., Condit, R., Svenning, J.-C., Hernandez, C., Romoleroux, K., Losos, E., Magård, E. & Balslev, H. (2004). Tree species distributions and local habitat variation in the Amazon: large forest plot in eastern Ecuador. Journal of Ecology, 92, 214-229.
Ferragina, P. & Satti, S. R. (2008). Tree Compression and Indexing. I Encyclopedia of Algorithms (s. 1-99). Springer.
Corry, A. V., Hansen, K. M. & Svensson, D. (2006). Traveling Architects: A New Way of Herding Cats. I C. Hofmeister, I. Crnkovic & R. Reussner (red.), Quality of Software Architectures (s. 111-126). Springer. https://doi.org/10.1007/11921998_12
Bertelsen, O. W. (2004). Transparency by Tertiary Artefactness. I Workshop on Aesthetic Approaches to Human-Computer Interaction (Bind DAIMI PB-572, s. 1-4). Department of Computer Science.