Number | Date | Dissertation title | |
---|---|---|---|
1 | 19-03-1975 | Parallelisme i definitioner af sprog | |
2 | 14-06-1976 | Some results on context-free Lindenmayer systems | |
3 | 13-10-1980 | Net theory - adequacy and applications in language theory | |
4 | 13-10-1980 | Anvendelse af attribut-oversættelsesskemaer i realisation af sprogdefinitioner i alternative formalismer | |
5 | 24-06-1985 | Self Describing Database Systems | |
6 | 18-08-1986 | Semantik af logikprogrammering | |
7 | 15-12-1986 | Understøttelse af undtagelseshåndtering i programmeringssprog | |
8 | 07-09-1987 | Understøttelse af nedarvning i programmeringssprog | |
9 | 07-09-1987 | Transformationer og abstrakte præsentationer i en sprogudviklingsomgivelse | |
10 | 12-10-1987 | Vurdering af systemudviklingsprojekter | |
11 | 14-12-1987 | Brugergrænseflader - hvordan skal vi forstå dem og deres brug, og hvordan skal vi designe dem | |
12 | 25-04-1988 | Sprogbrug og design | |
13 | 30-05-1988 | Ubetinget beskyttelse i kryptografiske protokoller | |
14 | 23-01-1989 | A framework for computer supported cooperative work, and its application to system development | |
15 | 19-06-1989 | Logic grammar + computer science = natural language understanding | |
16 | 19-03-1990 | Interleaving versus noninterleaving in the theory of concurrency | |
17 | 09-09-1991 | Edb-baserede værktøjer - muligheder og begrænsninger for aktiv brugerdeltagelse | |
18 | 10-02-1992 | Distributed Provers and Verifiable Secret Sharing Based on the Discrete Logarithm Problem | |
19 | 24-08-1992 | Provably correct compiler generation | |
20 | 24-08-1992 | Models and logics in concurrency - achievements and major open problems | |
21 | 21-09-1992 | From Bisimulation to Chunk-by-Chunk Simulation | |
22 | 26-10-1992 | Farvede Petri Net: teori, værktøjer og praktisk anvendelse | |
23 | 08-03-1993 | Værktøj til dokumenthåndtering i en programmeringsomgivelse | |
24 | 08-03-1993 | High Level Efficiency in Database Languages | |
25 | 07-06-1993 | Verification of Temporal Properties in Concurrent Systems | |
26 | 21-06-1993 | Sharing of Computations | |
27 | 28-06-1993 | Bitkompleksiteten af endelige datatyper | |
28 | 01-03-1994 | Techniques and tools for building tailorable systems using strongly typed object-oriented languages | |
29 | 24-10-1994 | Block ciphers - analysis, design and applications | |
30 | 24-10-1994 | Genetic algorithms for global routing of VLSI macro-cell layout | |
31 | 24-10-1994 | Challenging practice - an approach to cooperative analysis | |
32 | 20-02-1995 | Prioritized and independent actions in distributed computer systems | |
33 | 20-12-1994 | Efficient training of feed-forward neural Networks | |
34 | 20-02-1995 | Prioritized and independent actions in distributed computer systems | |
35 | 18-10-1995 | Automated Design of neural network architectures for classification | |
36 | 27-11-1995 | Fast VLSI implementation of modular exponentiation | |
37 | 05-01-1996 | Reasoning in the temporal logic of actions | |
38 | 24-05-1996 | Reasoning about concurrency | |
39 | 07-06-1996 | Efficient external memory data structures and applications | |
40 | 26-09-1996 | Tools for stored interactive multimedia | |
41 | 08-11-1996 | An Axiomatic Approach to Adequacy | |
42 | 14-03-1997 | Trust and Dependence Analysis | |
43 | 20-03-1997 | Engineering a Reliable Object Storage System | |
44 | 18-04-1997 | Worst Case Efficient Data Structures | |
45 | 02-05-1997 | Dynamic Computation | |
46 | 14-05-1997 | Towards Orthogonal Persistence as a Basic Technology | |
47 | 15-05-1997 | Analysing Coloured Petri Nets by the Occurrence Graph Method | |
48 | 15-05-1997 | Coloured Petri Nets - A Pragmatic Formal Method for Designing and Analysing Distributed Systems | |
49 | 12-12-1997 | Relational Reasoning about Functions and Nondeterminism | |
50 | 20-05-1998 | Tractable Type Inference made Easy | |
51 | 11-06-1998 | Reasoning about Reactive Systems | |
52 | 29-10-1998 | An Activity Theoretical Approach to the Design of Computer Supported Cooperative Work | |
53 | 03-12-1998 | Efficient Algorithms for Helioseismic Inversion | |
54 | 08-02-1999 | Presheaf Models for Concurrency | |
55 | 10-06-1999 | RAGNAROK: An architecture Based Software Development Environment | |
56 | 12-10-1999 | gbeta - A Language with Virtual Attributes, Block Structure, and Propagating, Dynamic Inheritance | |
57 | 16-11-1999 | Categorical Models for Concurrency: Independence, Fairness and Dataflow | |
58 | 18-02-2000 | Programming Languages: Design, Analysis, and Semantics | |
59 | 06-03-2000 | Complexity of Data Structures | |
60 | 09-03-2000 | Computational Biology | |
61 | 09-03-2000 | Algorithms in Computational Biology | |
62 | 29-03-2000 | State Space Methods for Coloured Petri Nets | |
63 | 18-04-2000 | Combining Predictors - Meta Machine Learning Methods and Bias/Variance & Ambiguity Decompositions | |
64 | 26-05-2000 | Logics and Automata for Verification: Expressiveness and Decidability Issues | |
65 | 10-11-2000 | Discourse on Genericity in Object-Oriented Programming Languages | |
66 | 18-12-2000 | Games for Verification: Algorithmic Issues | |
67 | 19-01-2001 | Multiparty Computations - Information-Theoretically Secure against an Adaptive Adversary | |
68 | 26-02-2001 | Augmenting the Web through Open Hypermedia - The Development of the Arakne Environment, a Collaborative Open Hypermedia System for Web Augmentation | |
69 | 27-03-2001 | Time-Space Trade Offs | |
70 | 27-03-2001 | Analyzing Real-Time Systems: Theory and Tools | |
71 | 18-05-2001 | On Static and Dynamic Control-Flow Information in Program Analysis and Transformation | |
72 | 17-08-2001 | Higher-Order Program Generation | |
73 | 31-08-2001 | Topics in Semantics-based Program Manipulation | |
74 | 31-08-2001 | A Study of Defunctionalization and Continuation-Passing Style | |
75 | 14-09-2001 | Unifying Abstractions | |
76 | 01-10-2001 | Using Theory to Make Better Tools | |
77 | 01-11-2001 | Patterns in Software Development | |
78 | 16-11-2001 | Compression With Fast Random Access | |
79 | 23-11-2001 | Robust and Flexible Scheduling with Evolutionary Computation | |
80 | 18-01-2002 | Designing to support Mobile Work with Mobile Devices | |
81 | 19-04-2002 | Structure and Hierarchy in Real-Time Systems | |
82 | 10-05-2002 | On Resolution Complexity of Matching Principles | |
83 | 31-05-2002 | Experimental Object-Oriented Modelling | |
84 | 31-05-2002 | Dynamic Planar Convex Hull | |
85 | 19-06-2002 | Simplicity Applied in Projects Involving Embodied, Autonomous Robots | |
86 | 28-08-2002 | Performance Analysis Using Coloured Petri Nets | |
87 | 29-08-2002 | Facilitating the Practical Use of Coloured Petri Nets | |
88 | 30-08-2002 | The Symmetry Method for Coloured Petri Nets | |
89 | 30-09-2002 | Program Verification with Monadic Second-Order Logic & Languages for Web Service Development | |
90 | 11-10-2002 | Hashing, Randomness and Dictionaries | |
91 | 29-10-2002 | Malleable Software Development - Supporting Collaboration and Iteration in Object-Oriented Software Development | |
92 | 24-01-2003 | Domain Specific Languages for Interactive Web Services | |
93 | 29-01-2003 | Designing for Learning in Use of Everyday Artefacts | |
94 | 05-02-2003 | Temporal Concurrent Constraint Programming | |
95 | 19-03-2003 | Collaborative Software Development - Design and Implementation of Tools for Object-Oriented Modelling | |
96 | 14-04-2003 | Decidability and Complexity Issues for Infinite-State Processes | |
97 | 28-04-2003 | Sweeping the State Space - A Sweep-Line State Space Exploration Method | |
98 | 15-05-2003 | Language, Semantics, and Methods for Security Protocols | |
99 | 16-06-2003 | Applying Formal Methods to Programming Language Design and Implementation | |
100 | 20-06-2003 | Models for Evolutionary Algorithms and Their Applications in System Identification and Control Optimization | |
101 | 23-06-2003 | A Formal Calculus for Categories | |
102 | 07-08-2003 | On Protocol Security in the Cryptographic Model | |
103 | 07-08-2003 | Extensions to the Paillier Cryptosystem with Applications to Cryptological Protocols | |
104 | 08-08-2003 | Cryptographic Protocols Based on Root Extracting | |
105 | 08-08-2003 | Secure Multi-Player Protocols: Fundamentals, Generality, and Efficiency | |
106 | 26-09-2003 | Proof Mining in Subsystems of Analysis | |
107 | 21-11-2003 | Domain Theory for Concurrency | |
108 | 24-11-2003 | Probability, Nondeterminism and Concurrence: Two Denotational Models for Probabilistic Computation | |
109 | 28-11-2003 | An Abstract Coalgebraic Approach to Process Equivalence for Well-Behaved Operational Semantics | |
110 | 31-05-2004 | Evolutionary Algorithms and their Application in Bioinformatics | |
111 | 07-07-2004 | Rigidity of frameworks and connectivity of graphs | |
112 | 08-10-2004 | Interaction through Negotiation - Interaction design in a pervasive computing perspective | |
113 | 15-10-2004 | Honest Verifier Zero-knowledge Arguments applied | |
114 | 11-11-2004 | Exact Algorithms for Graph Colouring and Exact Satisfiability | |
115 | 26-11-2004 | Exact Algorithms for Variants of Satisfiability and Colouring Problems | |
116 | 03-12-2004 | Deriving process congruences from reaction rules | |
117 | 10-02-2005 | Perceptual Features of Music and Speech - Measured by Listening Experiments, and Computer Modelled from Signal Analysis | |
118 | 11-03-2005 | On Cryptographic Primitives Based on Noisy Channels | |
119 | 12-05-2005 | Formalisms and tools supporting Constructive Action Semantics | |
120 | 30-06-2005 | Trust and Mobility | |
121 | 09-09-2005 | Exact Algorithms and Exact Satisfiability | |
122 | 12-09-2005 | A Study for Cryptologic Protocols | |
123 | 28-10-2005 | GCD Algorithms for Quadratic Number Rings | |
124 | 12-12-2005 | Disk Encryption, Group Identification, Byzantine Agreement, and Threshold RSA | |
125 | 15-12-2005 | The Theory and Practice of Programming Languages with Delimited Continuations | |
126 | 19-12-2005 | Formal Aspects of Partial Evaluation | |
127 | 23-01-2006 | Quantum Encryption Minimising Key Leakage unider Known Plaintext Attacks | |
128 | 27-01-2006 | A Derivational Approach to the Operational Semantics of Functional Languages | |
129 | 30-01-2006 | Partial Evaluation of String Matchers & Constructions of Abstract Machines | |
130 | 20-02-2006 | Participatory Design Beyond Work Practices - Designing with Children | |
131 | 10-03-2006 | Heurestic Algorithms in Bioinformatics | |
132 | 31-03-2006 | Topics in the Theory and Practice of Computable Analysis | |
133 | 04-05-2006 | Something to do with Java | |
134 | 29-05-2006 | Applications of Proof Interpretations | |
135 | 08-06-2006 | Home Appliance Integration by Pervasive Computing | |
136 | 04-10-2006 | Programming with XML | |
137 | 12-10-2006 | Pervasive Home Care - Technological support for treatment of diabetic foot ulcers at home | |
138 | 03-11-2006 | Cardiac Surgery Simulation | |
139 | 13-11-2006 | Constant Width and Constant Depth Computation | |
140 | 17-11-2006 | Towards a Theory of Trust for the Global Ubiquitous Computer | |
141 | 01-12-2006 | Context-aware Mobile Hypermedia: Concepts, Framework, and Applications | |
142 | 05-12-2006 | Efficient and High Resolution Level Set Simulations - Data Structures, Algorithms and Applications | |
143 | 15-12-2006 | Towards Distributed Declarative Architectural Reflection | |
144 | 18-12-2006 | Pervasive Interaction - Designing interactive pervasive systems for complex work environments | |
145 | 26-02-2007 | Program Validation by Symbolic and Reverse Execution | |
146 | 27-04-2007 | Cryptography in the Bounded-Quantum-Storage Model | |
147 | 01-05-2007 | A Structured Approach to the Transformation, Nomalization and Execution of Computer Programs | |
148 | 31-05-2007 | Educating Novices in the Skills of Programming | |
149 | 20-06-2007 | Transformation, Analysis, and Interpretation of Higher-Order Procedural Programs | |
150 | 27-06-2007 | Flexible Methods for Geometric Texturing - From Terrain Visualization to Geometric Texture Mapping | |
151 | 06-07-2007 | Primitives and Applications for Multi-party Computation | |
152 | 25-08-2007 | Hardware-Aware Algorithms and Data Structures | |
153 | 15-10-2007 | Combinatorial algorithms for partially ordered sets | |
154 | 23-10-2007 | Looking Good, Behaving Well - Behavioural Verification and Visualisation of Formal Models of Concurrent Systems | |
155 | 24-10-2007 | On Reasoning Equationally: Lambda Calculi and Programs with Computational Effects | |
156 | 12-12-2007 | Programming with Location from Conceptualization to Language Design | |
157 | 10-03-2008 | Computing Equilibria of Two Player Games | |
158 | 11-03-2008 | Mobile P2P in Ad Hoc Networks: Framework and Applications | |
159 | 31-03-2008 | Tools for Social Construction: A Framework for Pervasive Media for Children | |
160 | 30-05-2008 | Authentication and Privacy with Application to Pervasive Computing | |
161 | 08-09-2008 | Indoor Positioning with Radio Location Fingerprinting | |
162 | 12-09-2008 | Vehicle to Vehicle Services. Service oriented architecture for pervasive computing systems with emphasis on vehicle to vehicle applications | |
163 | 21-10-2008 | Using Formal Behavioral Models in Software Development: From Real-World Problems to Software Systems | |
164 | 31-10-2008 | Challenges in whole-genome association mapping | |
165 | 21-11-2008 | On Context awareness in Ubiquitous Computing | |
166 | 20-03-2009 | On the Power of Two-Party Quantum Cryptography | |
167 | 15-04-2009 | Infrastructure Support for Collaborative Pervasive Computing Systems | |
168 | 16-04-2009 | Distributed Interaction for Activity-Based Computing | |
169 | 28-04-2009 | Formal Requirements Modeling | |
170 | 28-05-2009 | Languages for Secure Multiparty Computation and Towards Strongly Typed Macroes | |
171 | 15-09-2009 | Linear Integer Secret Sharing | |
172 | 01-10-2009 | Deformable Image Registration for Use in Radiotherapy, Using GPU Acceleration | |
173 | 21-10-2009 | Handling Massive Terrains and Unreliable Memory | |
174 | 22-10-2009 | On Human-Computer Interaction in Complex Artefact Ecologies | |
175 | 31-10-2009 | Perfect-Information Games with Cycles | |
176 | 09-11-2009 | Link Building | |
177 | 17-12-2009 | Participatory Middleware Design | |
178 | 02-03-2010 | Medical Sensor Network Infrastructures | |
179 | 29-04-2010 | Data Structures: Sequence Problems, Range Queries, and Fault Tolerance | |
180 | 11-05-2010 | Cryptographic Protocols: Theory and Implementation | |
181 | 25-05-2010 | Efficient Algorithms for Controllable Fluid Simulations and High-Resolution Level Set Deformaties | |
182 | 21-06-2010 | On the Computational Overhead of Secure Multiparty Computation | |
183 | 17-08-2010 | Monomial Ideal Algorithms: Connections to Numerical Semigroups and Scarf's Theory of Bodies | |
184 | 02-09-2010 | On the expressiveness of Declarative Meta-Languages | |
185 | 27-09-2010 | Distinct Candidates Optimization: A Novel Approach to Applied Evolutionary Multi-and Many-Objective Optimization | |
186 | 30-09-2010 | Empowering Mobile Devices Through Cyper Foraging: The Development of Scavenger, and Open Mobile Cyber Foraging System | |
187 | 07-10-2010 | An Engineering Approach to Dynamic Program Analysis by Layering Language Abstraction | |
188 | 07-10-2010 | Embedded programming Languages and Their Representation | |
189 | 12-10-2010 | Existence and computation of Equilibria in Auction Games | |
190 | 26-10-2010 | Initializing and Evaluation of Nested Class Structures | |
191 | 12-11-2010 | Cryptographic Protocols under Quantum Attacks | |
192 | 27-01-2011 | Material Dispositions: a hybrid and interwoven design perspective | |
193 | 07-04-2011 | Secure Computation in Untrusted Environments | |
194 | 16-06-2011 | Virtual Screening Algorithms | |
195 | 27-06-2011 | Staging as a Holistic Perspective on Interaction Design for Public Enviroments | |
196 | 04-07-2011 | Data Structures: Range Queries and Space Efficiency | |
197 | 08-08-2011 | On the protection of digital identities through threshold cryptography | |
198 | 23-09-2011 | Dynamic data structures: Orthogonal range queries and update efficiency | |
199 | 28-09-2011 | Participatory citizenship - supporting citizen empowerment in digitally mediated public service provision | |
200 | 28-10-2011 | Engineering algorithms for finding patterns in biological data | |
201 | 11-11-2011 | Engaging the citizens through collaborative, mobile and web-based public services | |
202 | 09-12-2011 | Efficient algorithms for tree reconstruction and prediction of molecular interactions | |
203 | 14-12-2011 | Methods and software architecture for activity recognition from position data - applied to cow activity recognition | |
204 | 09-01-2012 | Cryptography with quantum mechanics | |
205 | 10-01-2012 | Accurate positioning of pedestrains in mixed indoor/outdoor settings - A particle filter approach to sensor and map fusion | |
206 | 12-01-2012 | Supporting seamful development of positioning applications through model based translucent middleware | |
207 | 16-01-2012 | Theory and practice of cryptographic protocols -or- cryptography: will it blend? | |
208 | 23-01-2012 | Low-power wireless sensor network infrastructures | |
209 | 22-03-2012 | Improving precision of types | |
210 | 26-03-2012 | While working around security | |
211 | 16-04-2012 | Contributions to computational stereology and parallel programming | |
212 | 07-09-2012 | Worst-case analysis of strategy iteration and the simplex method | |
213 | 17-09-2012 | Homotopic polygonal line simplification | |
214 | 26-10-2012 | I/O-efficient multiparty computation, formulaic secret sharing and np-complete puzzles | |
215 | 30-10-2012 | External memory graph algorithms and range searching data structures | |
216 | 08-04-2013 | New Approaches to Practical Secure Two-Party Computation | |
217 | 23-04-2013 | Design and Analysis of Web Application Frameworks | |
218 | 23-04-2013 | Static Analysis for JavaScript | |
219 | 23-04-2013 | Unconditionally Secure Protocols | |
220 | 07-05-2013 | Situating Engagement: Ubiquitous Infrastructures for In-Situ Civic Engagement | |
221 | 17-05-2013 | Models and Techniques for Proving Data Structure Lower Bounds | |
222 | 19-06-2013 | Symbolic Analysis of Cryptographic Protocols: Models, Methods, and Soundness | |
223 | 03-09-2013 | Multi-dimensional Location Privacy - Concepts, Architecture, and User Interface | |
224 | 27-09-2013 | Consistency in the World Wide Web: Specification, Verification, and Evaluation | |
225 | 10-10-2013 | Zero-Knowledge Protocols and Multiparty Computation | |
226 | 11-10-2013 | Lattice-based Cryptography - Threshold Protocols and Multiparty Computation | |
227 | 04-11-2013 | Strategy complexity of two player, zero-sum games | |
228 | 18-11-2013 | Dynamic Data Structures: The Interplay of Invariants and Algorithm Design | |
229 | 09-12-2013 | The Interpretation and Inter-derivation of Small-step and Big-step Specifications | |
230 | 10-12-2013 | Inferring Groups of Objects, Preferred Routes, and Facility Locations from Trajectories | |
231 | 14-01-2014 | Public-key Cryptography from Weaker Assumption | |
232 | 24-02-2014 | Home-based Self-Care – Understanding and Designing Pervasive Technology to Support Care Management Work at Home | |
233 | 29-04-2014 | Secure Computation in the Preprocessing Model | |
234 | 19-08-2014 | Enabling Advanced Path-Finding on Terrains and in Spatial Networks | |
235 | 08-09-2014 | Rationality in the Cryptographic Model | |
236 | 16-09-2014 | Indexing, Query Processing, and Clustering of Spatio-Temporal Text Objects | |
237 | 18-09-2014 | Engineering of Algorithms for Hidden Markov Models and Tree Distances | |
238 | 10-10-2014 | Enabling indoor location-based services | |
239 | 24-10-2014 | Applied bioinformatics: Genome annotation and transcriptome analysis | |
240 | 14-11-2014 | Handling Massive and Dynamic Terrain Data | |
241 | 17-11-2014 | On the Combinatorics of SAT and the Complexity of Planar Problems | |
242 | 03-12-2014 | Efficient Extraction of Content from Enriched Geospatial and Networked Data | |
243 | 09-01-2015 | Pointer Analysis for JavaScript Programming Tools | |
244 | 23-01-2015 | Inference of population history and patterns from molecular data | |
245 | 09-03-2015 | Automated Testing of Event-Driven Applications | |
246 | 13-03-2015 | On Computational Small Steps and Big Steps: Refocusing for Outermost Reduction | |
247 | 17-04-2015 | Space Efficient Data Structures and External Terrain Algorithms | |
248 | 29-04-2015 | Computational Fair Division | |
249 | 13-05-2015 | Efficient Algorithms for HandlingMassive Terrains | |
250 | 19-05-215 | Static Analysis of Dynamic Languages | |
251 | 22-05-2015 | Outlier Detection and Explanation for Domain Experts | |
252 | 05-08-2015 | Social Welfare in Algorithmic Mechanism Design Without Money | |
253 | 02-09-2015 | Changing the Shape of Interaction: Shape-changing Interfaces | |
254 | 22-09-2015 | ||
256 | 25-09-2015 | ||
257 | 13-10-2015 | Enabling Time-Dependent Uncertain Edge Weights and Stochastic Routing in Road Networks | |
258 | 19-10-2015 | ||
259 | 29-10-2015 | ||
260 | 29-10-2015 | ||
261 | 29-10-2015 | ||
262 | 16-11-2015 | Spatio-Temporal Analysis of Human Activities in Indoor Environments through Mobile Sensing | |
263 | 29-01-2016 | Multi-Criteria Decision Support Queries in Exploratory & Open World Settings | |
264 | 22-03-2016 | Practical Secure Computation with Pre-Processing | |
265 | 15-05-2016 | On semantics and applications of guarded recursion | |
266 | 20-04-2016 | Interactive Visual Analytics of Big Data - a Web-Based Approach | |
267 | 24-08-2016 | Designing abstractions for JavaScript program analysis | |
268 | 08-09-2016 | Type Soundness in the Dart Programming Language | |
269 | 01-11-2016 | Mobile Sensing and Recognition of Human Activities to Support Work Coordination | |
270 | 02-11-2016 | Game Mechanics and Bodily Interactions: Designing Interactive Technologies for Sports Training | |
271 | 07-11-2016 | Towards More Efficient Secure Multiparty Computation in the Preprocessing Model | |
272 | 06-12-2016 | Guarded Recursive Type Theory | |
273 | 20-12-2016 |
| |
274 | 04-01-2017 | New Applications of Secret-Sharing in Cryptography | |
275 | 01-02-2017 | Parallel Algorithms for Skyline and Skycube Computation on Multicore CPUs and GPUs | |
276 | 20-02-2017 | Toward Place-Centric Computing: Making Place With Technology Together | |
277 | 07-03-2017 | On the Communication and Round Complexity of Secure Computation | |
278 | 05-05-2017 | A Framework For Efficient Homomorphic Universally Composable Commitments | |
279 | 12-09-2017 | Algorithmic Aspects of Arrangements and Incidences (not available online) | |
280 | 29-09-2017 | Amortizing Maliciously Secure Two-party Computation | |
281 | 29-10-2017 | Modelling Emission of Pollutants from transportation using mobile sensing data: Advancing modelling of street level pollution and climate forcing gas emissions | |
282 | 29-11-2017 | Geometric covers, graph orientations, counter games (Not available online) | |
283 | 03-04-2018 | Context-Aware Integrability and Maintainability of Cyber-Physical Ecosystems: Tactics and Tools | |
284 | 23-05-2018 | Automated Testing Techniques for Event-Driven and Dynamically Typed Software Applications | |
285 | 28-09-2018 | External Memory Algorithms for Massive Terrains and Polygons | |
286 | 23-10-2018 | Optimal Placement of Virtual Content in Physical Space (not available online) | |
287 | 24-10-2018 | Designing for Hand Ownership in Interaction with Virtual and Augmented Reality | |
288 | 12-12-2018 | Towards Modular Reasoning for Stateful and Concurrent Programs | |
289 | 18-01-2019 | Event-Based Flood Risk Assessment on Massive Terrains | |
290 | 15-03-2019 | Secure Computation Based on Oblivious Function Evaluation (not available online) | |
291 | 28-03-2019 | Constructions and Proof Techniques for Secure Computation (not available online) | |
292 | 15-04-2019 | Correlated randomness in cryptographic protocols (not available online) | |
293 | 13-08-2019 | Fine-grained Access and Secure Computation on Encrypted Data (not available online) | |
294 | 14-08-2019 | Collaborative Visual Analytics: Leveraging Mixed Expertise in Data Analysis | |
295 | 03-10-2019 | Graphene-based Interaction Design for Constructive Play: Tangible Music-making Technologies for Children | |
296 | 08-10-2019 | Characterizing Word Representations For Natural Language Processing | |
297 | 22-10-2019 | Alice, Bits, and Bob | |
298 | 23-10-2019 | Enforcement of Timing-Sensitive Security Policies in Runtime Systems | |
299 | 24-10-2019 | Comparison and Construction of Phylogenetic Trees and Networks | |
300 | 31-10-2019 | Automated Techniques for Creation and Maintenance of TypeScript Declaration Files | |
301 | 13-11-2019 | Automatic Program Verification (not available online) | |
302 | 14-11-2019 | ||
303 | 30-03-2020 | ||
304 | 06-05-2020 | Rethinking Proxemics - Designing Interactive Technologies for Co-located Collaboration | |
305 | 01-09-2020 | Sensitive Information Detection: Recursive Neural Networks for Encoding Context | |
306 | 06-10-2020 | More Than Writing Text: Multiplicity in Collaborative Academic Writing | |
307 | 09-11-2020 | A song of Johnson and Lindenstrauss | |
308 | 16-11-2020 | Cats or Croissants? Techniques for Secure Inference |