Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Nielsen, J. B., Venturi, D. & Zottarel, A. (2014). Leakage-resilient signatures with graceful degradation. I H. Krawczyk (red.), Public-Key Cryptography – PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings (s. 362-379). Springer. https://doi.org/10.1007/978-3-642-54631-0_21
Chattopadhyay, A., Gavaldà, R., Hansen, K. A. & Thérien, D. (2014). Learning Read-Constant Polynomials of Constant Degree Modulo Composites. Theory of Computing Systems, 55(2), 404-420. https://doi.org/10.1007/s00224-013-9488-6
Chan, T. M., Durocher, S., Larsen, K. G., Morrison, J. & Wilkinson, B. T. (2014). Linear-Space Data Structures for Range Mode Query in Arrays. Theory of Computing Systems, 55(4), 719-741. https://doi.org/10.1007/s00224-013-9455-2
Xu, Y., Johnson, P. M., Lee, G. E., Moore, C. A. & Brewer, R. S. (2014). Makahiki: An open source serious game framework for sustainability education and conservation. I P. Kommers, T. Issa, T. Issa, D.-F. Chang & P. Isaías (red.), International Conference on Sustainability, Technology, and Education, STE 2014: proceedings (s. 131-138). International Association for Development, IADIS. http://www.iadisportal.org/digital-library/makahiki-an-open-source-serious-game-framework-for-sustainability-education-and-conservation
Ernst, E., Møller, A., Schwarz, M. R. & Strocco, F. (2014). Managing Gradual Typing with Message-Safety in Dart. Afhandling præsenteret på International Workshop on Foundations of Object-Oriented Languages , Portland, USA. http://homepages.ecs.vuw.ac.nz/~servetto/Fool2014/
Birkedal, L. (2014). Modular reasoning about concurrent higher-order imperative programs. Abstract fra ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, USA. https://doi.org/10.1145/2535838.2537849
Hachisuka, T., Kaplanyan, A. S. & Dachsbacher, C. (2014). Multiplexed Metropolis Light Transport. A C M Transactions on Graphics, 33(4), Artikel 100. https://doi.org/10.1145/2601097.2601138
Alstrup, S., Bistrup Halvorsen, E. & Larsen, K. G. (2014). Near-optimal labeling schemes for nearest common ancestors. I Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms (s. 972-982). Association for Computing Machinery. http://www.scopus.com/inward/record.url?scp=84902108771&partnerID=8YFLogxK
Gilbert, S., Porat, E., King, V., Saia, J., Pettie, S. & Young, M. (2014). (Near) optimal resource-competitive broadcast with jamming. I G. Blelloch & P. Sanders (red.), Annual ACM Symposium on Parallelism in Algorithms and Architectures, SPAA '14 (s. 257-266). Association for Computing Machinery. https://doi.org/10.1145/2612669.2612679
Antoy, S., Johannsen, J. & Libby, S. (2014). Needed Computations Shortcutting Needed Steps. Afhandling præsenteret på International Workshop on Computing with Terms and Graphs, Vienna, Østrig.
Tsirogiannis, C., Sandel, B. S. & Kalvisa, A. (2014). New Algorithms for Computing Phylogenetic Biodiversity. I D. Brown & B. Morgenstern (red.), Algorithms in Bioinformatics: 14th International Workshop, WABI 2014, Wroclaw, Poland, September 8-10, 2014. Proceedings (s. 187-203). Springer VS. https://doi.org/10.1007/978-3-662-44753-6_15
Marcedone , A. & Orlandi, C. (2014). Obfuscation ⇒ (IND-CPA Security ⇏ Circular Security). I M. Abdalla & R. D. Prisco (red.), Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 77-90). Springer VS. https://doi.org/10.1007/978-3-319-10879-7_5
Larsen, K. G., Munro, J. I., Nielsen, J. A. S. & Thankachan, S. V. (2014). On Hardness of Several String Indexing Problems. I A. Kulikov, S. O. Kuznetsov & P. Pevzner (red.), Combinatorial Pattern Matching: 23rd European Symposium on Programming, ESOP 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings (s. 242-251 ). Springer VS. https://doi.org/10.1007/978-3-319-07566-2_25
Tan, B., Zhu, F., Qu, Q. & Liu, S. (2014). Online Community Transition Detection. I F. Li, G. Li , S. Hwang, B. Yao & Z. Zhang (red.), Web-Age Information Management: 15th International Conference, WAIM 2014, Macau, China, June 16-18, 2014. Proceedings (s. 633-644). Springer VS. https://doi.org/10.1007/978-3-319-08010-9_68
Talebanfard, N. (2014). On the Combinatorics of SAT and the Complexity of Planar Problems. Department of Computer Science, Aarhus University.
Holt, M. K., Johansen, J. & Brodal, G. S. (2014). On the Scalability of Computing Triplet and Quartet Distances. I C. C. McGeoch & U. Meyer (red.), 2014 Proceedings of the Sixteenth Workshop on Algorithm Engineering and Experiments (ALENEX) (s. 9-19). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611973198.2
Chester, S., Mortensen, M. L. & Assent, I. (2014). On the Suitability of Skyline Queries for Data Exploration. I K. S. Candan et al. (red.), Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference: 1st International Workshop on Exploratory Search in Databases and the Web (ExploreDB 2014) (s. 161-166). CEUR-WS.org. http://ceur-ws.org/Vol-1133/paper-27.pdf
Afshani, P. & Tsakalidis, K. (2014). Optimal deterministic shallow cuttings for 3D dominance ranges. I C. Chekuri (red.), Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms: SODA 2014; Portland, OR; United States; 5 January 2014 through 7 January 2014 (s. 1389-1398 ). Association for Computing Machinery. http://www.scopus.com/inward/record.url?scp=84902105500&partnerID=8YFLogxK
Bødker, S., Klokmose, C. N., Korn, M. & Polli, A. M. (2014). Participatory IT in semi-public spaces. I V. Roto, J. Häkkilä, K. Väänänen-Vainio-Mattila & O. Juhlin (red.), Proceedings of the 8th Nordic Conference on Human-Computer Interaction, NordiCHI '14: Fun, Fast, Foundational (s. 765-774). Association for Computing Machinery. https://doi.org/10.1145/2639189.2639212
Mogensen, P. H. & Wollsen, S. (2014). Participatory Realisation? PD in a complex, large-scale, and commercial context. I O. S. Iversen, H. Winschiers-Theophilus, V. D'Andrea, A. Clement, A. Botero & K. Bødker (red.), Proceedings of the 13th Participatory Design Conference, PDC '14 : Research Papers (s. 21-30 (Vol. 1)). Association for Computing Machinery. https://doi.org/10.1145/2661435.2661443
Baum, C., Damgård, I. B. & Orlandi, C. (2014). Publicly Auditable Secure Multi-Party Computation. I M. Abdalla & R. D. Prisco (red.), Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 175-196 ). Springer VS. https://doi.org/10.1007/978-3-319-10879-7_11
Sonne, T. & Jensen, M. M. (2014). Race By Hearts. I Y. Pisan , N. M. Sgouros & T. Marsh (red.), Entertainment Computing – ICEC 2014: 13th International Conference, Sydney, Australia, October 1-3, 2014. Proceedings (s. 125-132 ). Springer. https://doi.org/10.1007/978-3-662-45212-7_16
Guo, S., Hubacek, P., Rosen, A. & Vald, M. (2014). Rational Arguments: Single Round Delegation with Sublinear Verification. I M. Naor (red.), Proceedings of the 5th Conference on Innovations in Theoretical Computer Science, ITCS '14 (s. 523-540 ). Association for Computing Machinery. https://doi.org/10.1145/2554797.2554845
Hubacek, P. (2014). Rationality in the Cryptographic Model. Department of Computer Science, Aarhus University.
Chen, D., Konrad, C., Yi, K., Yu, W. & Zhang, Q. (2014). Robust set reconciliation. I Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD '14 (s. 135-146). Association for Computing Machinery. https://doi.org/10.1145/2588555.2610528
Jensen, E. B. V. & Rasmusson, A. (2014). Rotational integral geometry and local stereology - with a view to image analysis. I V. Schmidt (red.), Stochastic Geometry, Spatial Statistics and Random Fields: Models and Algorithms (s. 233-255). Springer Publishing Company. https://doi.org/10.1007/978-3-319-10064-7_8
Jensen, M. M. & Mueller, F. F. (2014). Running with technology: Where are we heading? I T. Leong (red.), Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures: the Future of Design (s. 527-530). Association for Computing Machinery. https://doi.org/10.1145/2686612.2686696
Zakarias, S. N. H. (2014). Secure Computation in the Preprocessing Model. Department of Computer Science, Aarhus University.
Damgård, I. B., Fehr, S., Salvail, L. & Schaffner, C. (2014). Secure identification and QKD in the bounded-quantum-storage model. Theoretical Computer Science, 560(1), 12-26. https://doi.org/10.1016/j.tcs.2014.09.014
Miltersen, P. B. (2014). Semi-algebraic geometry in computational game theory - A consumer's perspective: Invited Talk. I E. W. Mayr & N. Portier (red.), 31st International Symposium on Theoretical Aspects of Computer Science (STACS 2014) (s. 11-12). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.STACS.2014.11