Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Tan, B., Zhu, F., Qu, Q. & Liu, S. (2014). Online Community Transition Detection. I F. Li, G. Li , S. Hwang, B. Yao & Z. Zhang (red.), Web-Age Information Management: 15th International Conference, WAIM 2014, Macau, China, June 16-18, 2014. Proceedings (s. 633-644). Springer VS. https://doi.org/10.1007/978-3-319-08010-9_68
Talebanfard, N. (2014). On the Combinatorics of SAT and the Complexity of Planar Problems. Department of Computer Science, Aarhus University.
Holt, M. K., Johansen, J. & Brodal, G. S. (2014). On the Scalability of Computing Triplet and Quartet Distances. I C. C. McGeoch & U. Meyer (red.), 2014 Proceedings of the Sixteenth Workshop on Algorithm Engineering and Experiments (ALENEX) (s. 9-19). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611973198.2
Chester, S., Mortensen, M. L. & Assent, I. (2014). On the Suitability of Skyline Queries for Data Exploration. I K. S. Candan et al. (red.), Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference: 1st International Workshop on Exploratory Search in Databases and the Web (ExploreDB 2014) (s. 161-166). CEUR-WS.org. http://ceur-ws.org/Vol-1133/paper-27.pdf
Afshani, P. & Tsakalidis, K. (2014). Optimal deterministic shallow cuttings for 3D dominance ranges. I C. Chekuri (red.), Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms: SODA 2014; Portland, OR; United States; 5 January 2014 through 7 January 2014 (s. 1389-1398 ). Association for Computing Machinery. http://www.scopus.com/inward/record.url?scp=84902105500&partnerID=8YFLogxK
Bødker, S., Klokmose, C. N., Korn, M. & Polli, A. M. (2014). Participatory IT in semi-public spaces. I V. Roto, J. Häkkilä, K. Väänänen-Vainio-Mattila & O. Juhlin (red.), Proceedings of the 8th Nordic Conference on Human-Computer Interaction, NordiCHI '14: Fun, Fast, Foundational (s. 765-774). Association for Computing Machinery. https://doi.org/10.1145/2639189.2639212
Mogensen, P. H. & Wollsen, S. (2014). Participatory Realisation? PD in a complex, large-scale, and commercial context. I O. S. Iversen, H. Winschiers-Theophilus, V. D'Andrea, A. Clement, A. Botero & K. Bødker (red.), Proceedings of the 13th Participatory Design Conference, PDC '14 : Research Papers (s. 21-30 (Vol. 1)). Association for Computing Machinery. https://doi.org/10.1145/2661435.2661443
Baum, C., Damgård, I. B. & Orlandi, C. (2014). Publicly Auditable Secure Multi-Party Computation. I M. Abdalla & R. D. Prisco (red.), Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 175-196 ). Springer VS. https://doi.org/10.1007/978-3-319-10879-7_11
Sonne, T. & Jensen, M. M. (2014). Race By Hearts. I Y. Pisan , N. M. Sgouros & T. Marsh (red.), Entertainment Computing – ICEC 2014: 13th International Conference, Sydney, Australia, October 1-3, 2014. Proceedings (s. 125-132 ). Springer. https://doi.org/10.1007/978-3-662-45212-7_16
Guo, S., Hubacek, P., Rosen, A. & Vald, M. (2014). Rational Arguments: Single Round Delegation with Sublinear Verification. I M. Naor (red.), Proceedings of the 5th Conference on Innovations in Theoretical Computer Science, ITCS '14 (s. 523-540 ). Association for Computing Machinery. https://doi.org/10.1145/2554797.2554845
Hubacek, P. (2014). Rationality in the Cryptographic Model. Department of Computer Science, Aarhus University.
Chen, D., Konrad, C., Yi, K., Yu, W. & Zhang, Q. (2014). Robust set reconciliation. I Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD '14 (s. 135-146). Association for Computing Machinery. https://doi.org/10.1145/2588555.2610528
Jensen, E. B. V. & Rasmusson, A. (2014). Rotational integral geometry and local stereology - with a view to image analysis. I V. Schmidt (red.), Stochastic Geometry, Spatial Statistics and Random Fields: Models and Algorithms (s. 233-255). Springer Publishing Company. https://doi.org/10.1007/978-3-319-10064-7_8
Jensen, M. M. & Mueller, F. F. (2014). Running with technology: Where are we heading? I T. Leong (red.), Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures: the Future of Design (s. 527-530). Association for Computing Machinery. https://doi.org/10.1145/2686612.2686696
Zakarias, S. N. H. (2014). Secure Computation in the Preprocessing Model. Department of Computer Science, Aarhus University.
Damgård, I. B., Fehr, S., Salvail, L. & Schaffner, C. (2014). Secure identification and QKD in the bounded-quantum-storage model. Theoretical Computer Science, 560(1), 12-26. https://doi.org/10.1016/j.tcs.2014.09.014
Miltersen, P. B. (2014). Semi-algebraic geometry in computational game theory - A consumer's perspective: Invited Talk. I E. W. Mayr & N. Portier (red.), 31st International Symposium on Theoretical Aspects of Computer Science (STACS 2014) (s. 11-12). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.STACS.2014.11
Arge, L., Truelsen, J. & Yang, J. (2014). Simplifying massive planar subdivisions. I C. C. McGeoch & U. Meyer (red.), 2014 Proceedings of the Sixteenth Workshop on Algorithm Engineering and Experiments (ALENEX) (s. 20-30). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611973198.3
Balkanski, E., Branzei, S., Kurokawa, D. & Procaccia, A. D. (2014). Simultaneous Cake Cutting. I Proceedings of the 28th AAAI Conference on Artificial Intelligence AAAI Press. http://www.aaai.org/ocs/index.php/AAAI/AAAI14/schedConf/presentations
Filos-Ratsikas, A., Frederiksen, S. K. S. & Zhang, J. (2014). Social welfare in one-sided matchings: Random priority and beyond. I R. Lavi (red.), Algorithmic Game Theory: 7th International Symposium, SAGT 2014, Proceedings (s. 1-12). Springer VS. https://doi.org/10.1007/978-3-662-44803-8_1
Madsen, M. & Møller, A. (2014). Sparse Dataflow Analysis with Pointers and Reachability. I M. Müller-Olm & H. Seidl (red.), Static Analysis: 21st International Symposium, SAS 2014, Munich, Germany, September 11-13, 2014. Proceedings (s. 201-218). Springer VS. https://doi.org/10.1007/978-3-319-10936-7_13
Orlandi, C., Ostrovsky, R., Rao, V., Sahai, A. & Visconti, I. (2014). Statistical Concurrent Non-malleable Zero Knowledge. I Y. Lindell (red.), Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, 2014. Proceedings (s. 167-191). Springer Publishing Company. https://doi.org/10.1007/978-3-642-54242-8_8
Yang, B., Guo, C., Jensen, C. S., Kaul, M. & Shang, S. (2014). Stochastic skyline route planning under time-varying uncertainty. I 2014 IEEE 30th International Conference on Data Engineering (ICDE), (s. 136-147). IEEE. https://doi.org/10.1109/ICDE.2014.6816646
Madsen, M. & Andreasen, E. (2014). String Analysis for Dynamic Field Access. I A. Cohen (red.), Compiler Construction: 23rd International Conference, CC 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014. Proceedings (s. 197-217). Springer. https://doi.org/10.1007/978-3-642-54807-9_12
Bertelsen, O. W. (2014). Suffering Beyond Negotiation: Towards a Biographic Perspective on Cooperative Design for Therapy. I C. Rossitto, L. Ciolfi, D. Martin & B. C. (red.), COOP 2014 - Proceedings of the 11th International Conference on the Design of Cooperative Systems, 27-30 May 2014, Nice (France) Springer. http://www.springer.com/computer/hci/book/978-3-319-06497-0
Damgård, I. B., Funder, J., Nielsen, J. B. & Salvail, L. (2014). Superposition attacks on cryptographic protocols. I C. Padró (red.), Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (s. 142-161). Springer. https://doi.org/10.1007/978-3-319-04268-8_9
Andreasen, E., Li, G. & Ghosh, I. (2014). SymJS: Automatic Symbolic Testing of JavaScript Web Applications. I S.-C. Cheung , A. Orso & M.-A. Storey (red.), Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014 (s. 449-459 ). Association for Computing Machinery.
Midtgaard, J., Brabrand, C. & Wasowski , A. (2014). Systematic Derivation of Static Analyses for Software Product Lines. I W. Binder (red.), MODULARITY '14 Proceedings of the 13th international conference on Modularity (s. 181-192 ). Association for Computing Machinery. https://doi.org/10.1145/2577080.2577091
Da Rocha Pinto, P., Dinsdale-Young, T. & Gardner, P. (2014). TaDA: A logic for time and data abstraction. I R. Jones (red.), ECOOP 2014 – Object-Oriented Programming: 28th European Conference, Uppsala, Sweden, July 28 – August 1, 2014. Proceedings (s. 207-231). Springer. https://doi.org/10.1007/978-3-662-44202-9_9
Wang, Q., Kaul, M., Long, C. & Wong, R. (2014). Terrain-Toolkit: A Multi-Functional Tool for Terrain Data. Proceedings of the VLDB Endowment, 7(13), 1645 - 1648. http://www.vldb.org/pvldb/vol7/p1645-wang.pdf
Ackerman, M. & Branzei, S. (2014). The Authorship Dilemma: Alphabetical or Contribution? I A. Bazzan & M. Huhns (red.), Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems : AAMAS '14 (s. 1487-1488). Association for Computing Machinery. http://dl.acm.org/citation.cfm?id=2616025&bnc=1
Huang, Z. & Yi, K. (2014). The communication complexity of distributed epsilon-approximations. I D. Shmoys (red.), 2014 IEEE 55th Annual Symposium on Foundations of Computer Science (FOCS) Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS (s. 591-600). IEEE Computer Society Press. https://doi.org/10.1109/FOCS.2014.69
Etessami, K., Hansen, K. A., Miltersen, P. B. & Sørensen , T. B. (2014). The Complexity of Approximating a Trembling Hand Perfect Equilibrium of a Multi-player Game in Strategic Form. I R. Lavi (red.), Algorithmic Game Theory: 7th International Symposium, SAGT 2014, Haifa, Israel, September 30 – October 2, 2014. Proceedings (s. 231-243 ). Springer VS. https://doi.org/10.1007/978-3-662-44803-8_20