Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Brodal, G. S., Brodnik, A. & Davoodi, P. (2013). The encoding complexity of two dimensional range minimum data structures. I H. L. Bodlaender & G. F. Italiano (red.), Algorithms – ESA 2013: 21st Annual European Symposium, Sophia Antipolis, France, September 2-4, 2013. Proceedings (s. 229-240). Springer VS. https://doi.org/10.1007/978-3-642-40450-4_20
Dalsgaard, P., Halskov, K. & Klokmose, C. N. (2013). The interplay between personal and collaborative computing at big wall displays. I M. Rester, P. Judmaier, T. De Groeve & A. Annunziato (red.), Collaborative Human-Computer Interaction with Big Wall Displays - BigWallHCI 2013 3rd JRC ECML Crisis Management Technology Workshop: 3rd JRC ECML Crisis Management Technology Workshop Publications office of the European Union. http://lunar.jrc.it/critech/Home/tabid/36/Default.aspx
Klokmose, C. N. & Bertelsen, O. W. (2013). The Mysterious Whiteboard. I P. Kotzé , G. Marsden , G. Lindgaard, J. Wesson & M. Winckler (red.), Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part II (s. 37-54 ). Springer VS. https://doi.org/10.1007/978-3-642-40480-1_3
Afshani, P., Agrawal, M., Benjamin, D., Doerr, C., Larsen, K. G. & Mehlhorn, K. (2013). The Query Complexity of Finding a Hidden Permutation. I A. Brodnik, A. López-Ortiz, V. Raman & A. Viola (red.), Space-Efficient Data Structures, Streams, and Algorithms: Papers in Honor of J. Ian Munro on the Occasion of His 66th Birthday (s. 1-11). Springer VS. https://doi.org/10.1007/978-3-642-40273-9_1
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2013). The SITA principle for Location Privacy: Conceptual model and architecture . I 2013 International Conference on Privacy and Security in Mobile Systems (PRISMS) (s. 1 - 8 ). IEEE. https://doi.org/10.1109/PRISMS.2013.6927184
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2013). The SITA principle for Location Privacy – Conceptual Model and Architecture. Afhandling præsenteret på International Conference on Privacy and Security in Mobile Systems, Atlantic City, NJ, USA.
Wei, Z. & Yi, K. (2013). The Space Complexity of 2-Dimensional Approximate Range Counting. I S. Sanjeev Khanna (red.), Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA (s. 252-264). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611973105.19
Brewer, R. S., Xu, Y., Lee, G. E., Katchuck, M., Moore, C. A. & Johnson, P. M. (2013). Three Principles for the Design of Energy Feedback Visualizations. International Journal On Advances in Intelligent Systems, 6(3 & 4), 188-198. http://csdl.ics.hawaii.edu/techreports/2013/13-05/13-05.pdf
Danvy, O. & Zerny, I. (2013). Three Syntactic Theories for Combinatory Graph Reduction. A C M Transactions on Computational Logic, 14(4), Artikel 29. https://doi.org/10.1145/2528932
Kjærgaard, M. B., Blunck, H., Wüstenberg, M., Grønbæk, K., Wirz, M., Roggen, D. & Tröster, G. (2013). Time-lag Method for Detecting Following and Leadership Behavior of Pedestrians from Mobile Sensing Data. I IEEE International Conference on Pervasive Computing and Communications (PerCom), 2013 (s. 56 - 64 ). IEEE. https://doi.org/10.1109/PerCom.2013.6526714
Aehnelt, M., Schulz, H.-J. & Urban, B. (2013). Towards a Contextualized Visual Analysis of Heterogeneous Manufacturing Data. I Advances in Visual Computing : 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part II (s. 76-85). Springer. https://doi.org/10.1007/978-3-642-41939-3_8
Derczynski, L., Yang, B. & Jensen, C. S. (2013). Towards Context-Aware Search and Analysis on Social Media Data. I G. Guerrini & N. W. Paton (red.), Proceedings of The 16th International Conference on Extending Database Technology: EDBT 2013 (s. 137-142 ). Association for Computing Machinery. https://doi.org/10.1145/2452376.2452393
Radaelli, L. & Jensen, C. S. (2013). Towards Fully Organic Indoor Positioning. I Proceedings of the Fifth ACM SIGSPATIAL International Workshop on Indoor Spatial Awareness (s. 16-20). Association for Computing Machinery.
Picozzi, M., Verdezoto, N., Pouke, M., Vatjus-Anttila, J. & Quigley, A. (2013). Traffic Visualization: Applying Information Visualization Techniques to Enhance Traffic Planning. I GRAPP 2013 IVAPP 2013 : Proceedings of the 8thInternational Conference on Computer Graphics Theory and Applications (s. 554-557). SCITEPRESS Digital Library. https://doi.org/10.5220/0004291605540557
Li, X., Ceikute, V., Jensen, C. S. & Tan, K.-L. (2013). Trajectory Based Optimal Segment Computation in Road Network Databases. I C. Knoblock & M. Schneider (red.), Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL'13 (s. 396-399 ). Association for Computing Machinery. https://doi.org/10.1145/2525314.2525444
Jensen, K., Aalst, W. M. V. D., Balbo, G., Koutny, M. & Wolf, K. (red.) (2013). Transactions on Petri Nets and Other Models of Concurrency VII: ToPNoC. Springer VS. Lecture Notes in Computer Science Bind 7480 https://doi.org/10.1007/978-3-642-38143-0
Scheder, D. (2013). Trivial, tractable, hard. A not so sudden complexity jump in neighborhood restricted CNF formulas. I L. Cai, S.-W. Cheng & A.-W. Lam (red.), Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (s. 251-261). Springer VS. https://doi.org/10.1007/978-3-642-45030-3_24
Damgård, I. B. & Scafuro, A. (2013). Unconditionally Secure and Universally Composable Commitments from Physical Assumptions. I K. Sako & P. Sarkar (red.), Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (s. 100-119 ). Springer VS. https://doi.org/10.1007/978-3-642-42045-0_6
Meldgaard, S. T. (2013). Unconditionally Secure Protocols. Institut for Datalogi, Aarhus Universitet.
Grönvall, E. & Verdezoto, N. (2013). Understanding Challenges and Opportunities of Preventive Blood Pressure Self-Monitoring at Home. I P. Palanque , F. Détienne & A. Tricot (red.), Proceedings of the 31st European Conference on Cognitive Ergonomics (ACM ECCE 2013) Association for Computing Machinery. https://doi.org/10.1145/2501907.2501962
Turon, A., Dreyer , D. & Birkedal, L. (2013). Unifying refinement and hoare-style reasoning in a logic for higher-order concurrency. I G. Morrisett & T. Uustalu (red.), Proceedings of the 18th ACM SIGPLAN International Conference on Functional Programming, ICFP '13 (s. 377-390 ). Association for Computing Machinery. https://doi.org/10.1145/2500365.2500600
Scheder, D. (2013). Unsatisfiable CNF formulas contain many conflicts. I L. Cai, S.-W. Cheng & T.-W. Lam (red.), Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (s. 273-283). Springer VS. https://doi.org/10.1007/978-3-642-45030-3_26
Brewster, S. & Bødker, S. (2013). Welcome to CHI 2013! Conference on Human Factors in Computing Systems - Proceedings, 2013-April, vii.
Eagan, J. R., Lecolinet, E. & Klokmose, C. N. (2013). What are Applications in Multi-Surface Environments. Afhandling præsenteret på POWERWALL, Paris, Frankrig. http://www.powerwall.mdx.ac.uk/papers/POWERWALL-Eagan.pdf
Gao, X. A. G., Zhang, J. & Chen, Y. (2013). What you jointly know determines how you act: Strategic interactions in prediction markets. I Proceedings of of the fourteenth ACM Conference on Electronic Commerce, EC '13 (s. 489-506). Association for Computing Machinery. https://doi.org/10.1145/2482540.2482592
Pastro, V. (2013). Zero-Knowledge Protocols and Multiparty Computation. Department of Computer Science, Aarhus University.
Jawurek, M., Kerschbaum, F. & Orlandi, C. (2013). Zero-knowledge using garbled circuits: Or how to prove non-algebraic statements efficiently. I A.-R. Sadeghi , V. Gligor & M. Yung (red.), Proceedings of the ACM Conference on Computer and Communications Security, CCS '13 (s. 955-966). Association for Computing Machinery. https://doi.org/10.1145/2508859.2516662
Urazimbetova, S. (2012). A Case Study - On Patient Empowerment and Integration of Telemedicine to National Healthcare Services. Afhandling præsenteret på International Conference on Health Informatics, Vilamoura, Algarve, Portugal. https://doi.org/10.5220/0003870902630269
Šidlauskas, D., Jensen, C. S. & Šaltenis , S. (2012). A comparison of the use of virtual versus physical snapshots for supporting update-intensive workloads. I Proceedings of the Eighth International Workshop on Data Management on New Hardware: DaMoN '12 (s. 1-8). Association for Computing Machinery. https://doi.org/10.1145/2236584.2236585
Dupuis, F., Nielsen, J. B. & Salvail, L. (2012). Actively Secure Two-Party Evaluation of Any Quantum Operation. Lecture Notes in Computer Science, 7417, 794-811. https://doi.org/10.1007/978-3-642-32009-5_46
Backes, M., Goldberg, I., Kate, A. & Toft, T. (2012). Adding query privacy to robust DHTs. I ASIACCS '12 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (s. 30-31 ). Association for Computing Machinery. https://doi.org/10.1145/2414456.2414473
Bitsch, J. E. & Bouvin, N. O. (2012). Ad-hoc Symbiotic Interactive Displays through DLNA. I IEEE International Conference on Pervasive Computing and Communications (PerCom), 2012 (s. 57-65). IEEE Computer Society Press. https://doi.org/10.1109/PerCom.2012.6199849
Alrøe, T. F., Grann, J., Grönvall, E., Petersen, M. G. & L. Rasmussen, J. (2012). Aerial Tunes : Exploring Interaction Qualities of Mid-air Displays. I Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making sense through design (NordiCHI 2012), (s. 514-523). Association for Computing Machinery. https://doi.org/10.1145/2399016.2399095
Lu, H., Cao, X. & Jensen, C. S. (2012). A Foundation for Efficient Indoor Distance-Aware Query Processing. I IEEE 28th International Conference on Data Engineering (ICDE) (s. 438 -449). IEEE Press. https://doi.org/10.1109/ICDE.2012.44