Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Danvy, O. & Talcott, C. (2009). Editorial. Higher-Order and Symbolic Computation, 22(2), 113-113. https://doi.org/10.1007/s10990-009-9045-9
Blunck, H., Kjærgaard, M. B., Godsk, T., Toftkjær, T., Christensen, D. L. & Grønbæk, K. (2009). Empirical Analysis and Characterization of Indoor GPS Signal Fading and Multipath Conditions. In Proceedings of the 22nd International Technical Meeting of the Satellite Division of the Institute of Navigation (GNSS 2009) (Vol. Session 2E, pp. 2363). The Institute of Navigation.
Andersen, J. & Hansen, M. T. (2009). Energy Bucket: A Tool for Power Profiling and Debugging of Sensor Nodes. In C. Paleologu (Ed.), The Third International Conference on Sensor Technologies and Applications,  SENSORCOMM 2009 (pp. 132-138). IEEE Computer Society Press. https://doi.org/10.1109/SENSORCOMM.2009.29
Achenbach, M. & Ostermann, K. (2009). Engineering Abstractions in Model Checking and Testing. IEEE International Working Conference on Source Code Analysis and Manipulation. Proceedings, 137-146. https://doi.org/10.1109/SCAM.2009.25
Kjærgaard, M. B., Jensen, J. L., Godsk, T. & Toftkjær, T. (2009). EnTracked: Energy-Efficient Robust Position Tracking for Mobile Devices. In Proceedings of the 7th ACM International Conference on Mobile Systems, Applications and Services (MobiSys 2009): SESSION: Location (pp. 221-234). Association for Computing Machinery. https://doi.org/10.1145/1555816.1555839
Mogensen, M. (2009). Epidemic Protocols for Pervasive Computing Systems - Moving Focus from Architecture to Protocol. In L. Veiga, D. Donsez, O. Riva & S. Terzis (Eds.), Proceedings of the International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2009) (pp. Article 6). Association for Computing Machinery.
Lemelson, H., Kjærgaard, M. B., Hansen, R. & King, T. (2009). Error Estimation for Indoor 802.11 Location Fingerprinting. Lecture Notes in Computer Science, 138-155. https://doi.org/10.1007/978-3-642-01721-6_9
Escamocher, G., Miltersen, P. B. & Santillan, R. (2009). Existence and computation of equilibria of first-price auctions with integral valuations and bids. In K. S. Decker, J. S. Sichman, C. Sierra & C. Castelfranchi (Eds.), Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'09): SESSION: Interactions (Vol. 2, pp. 1227-1228). International Foundation for Autonomous Agents and Multiagent Systems. http://delivery.acm.org/10.1145/1560000/1558225/p1227-escamocher.pdf?key1=1558225&key2=4204373621&coll=GUIDE&dl=GUIDE&CFID=73345521&CFTOKEN=52226755
Boggs, N. A., Dwyer, K. G., Shah, P., McCulloch, A. A., Bechsgaard, J., Schierup, M. H., Nasrallah, M. E. & Nasrallah, J. B. (2009). Expression of distinct self-incompatibility specificities in Arabidopsis thaliana. Genetics, 182(4), 1313-21. https://doi.org/10.1534/genetics.109.102442
Wolff, S., Larsen, P. G., Lausdahl, K., Ribeiro, A. & Toftegaard, T. S. (2009). Facilitating Home Automation Through Wireless Protocol Interoperability. Proceedings of the Wireless Personal Multimedia Communications Symposia.
Nemitz, O., Nielsen, M. B., Rumpf, M. & Whitaker, R. (2009). Finite Element Methods On Very Large, Dynamic Tubular Grid Encoded Implicit Surfaces. S I A M Journal on Scientific Computing, 31(3), 2258-2281. https://doi.org/10.1137/080718334
Ernst, E. (2009). First-Class Object Sets. Lecture Notes in Computer Science, 5497, 83-99. https://doi.org/10.1007/978-3-642-02444-3_6
Kallel, S., Charfi, A., Mezini, M., Jmaiel, M. & Klose, K. (2009). From Formal Access Control Policies to Runtime Enforcement Aspects. Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-642-00199-4_2
Abam, M., de Berg, M., Farshi, M., Gudmundsson, J. & Smid, M. (2009). Geometric Spanners for Weighted Point Sets. Lecture Notes in Computer Science, 190-202. https://doi.org/10.1007/978-3-642-04128-0_17
Nielsen, J. K., Freckmann, G., Kapitza, C., Ocvirk, G., Koelker, K. H., Amann-Zalan, I., Gillen, R., Kamecke, U., Jendrike, N., Christiansen, J. S., Koschinsky, T. & Heinemann, L. (2009). Glucose monitoring by microdialysis: performance in a multicentre study. Diabetic Medicine, 26(7), 714-21. https://doi.org/10.1111/j.1464-5491.2009.02750.x
Andersson, D. (2009). Hashiwokakero is NP-Complete. Information Processing Letters, 109(19), 1145. https://doi.org/10.1016/j.ipl.2009.07.017
Ham, F. V., Schulz, H.-J. & Dimicco, J. M. (2009). Honeycomb: Visual Analysis of Large Scale Social Networks. In Human-Computer Interaction – INTERACT 2009: 12th IFIP TC 13 International Conference Uppsala, Sweden, August 24-28, 2009 Proceedings, Part II (pp. 429-442). Springer. https://doi.org/10.1007/978-3-642-03658-3_47
Damgård, I. B., Fehr, S., Lunemann, C., Salvail, L. & Schaffner, C. (2009). Improving the Security of Quantum Protocols via Commit-and-Open. Lecture Notes in Computer Science, 408-427. https://doi.org/10.1007/978-3-642-03356-8_24
Afshani, P., Barbay, J. & Chan, T. M. (2009). Instance-optimal geometric algorithms. In 50th Annual Symposium on Foundations of Computer Science. Proceedings (pp. 129-138). IEEE Computer Society Press. https://doi.org/10.1109/FOCS.2009.34
Geisler, M. J. & Cachin, C. (2009). Integrity Protection for Revision Control. Lecture Notes in Computer Science, 382-399. https://doi.org/10.1007/978-3-642-01957-9_24
Nielsen, J., Pedersen, C. S. & Hein, J. (2009). Investigation of a simple heuristic improving the speed of statistical alignments. Poster session presented at 17th Annual International Conference on Intelligent Systems for Molecular Biology (ISMB) & 8th European Conference on Computational Biology (ECCB), Stockholm, Sweden.
Mathiasen, N. R. (2009). It-security seen from a user experience perspective. Poster session presented at NordiCHI. Workshop on User centered Security., Lund, Sweden.
Møller, A. & Schwarz, M. R. (2009). JWIG: Yet Another Framework for Maintainable and Secure Web Applications. In J. Filipe & J. Cordeiro (Eds.), WEBIST 2009 - Proceedings of the Fifth International Conference on Web Information Systems and Technologies (pp. 47-53). Institute for Systems and Technologies of Information, Control and Communication.
Petersen, L. K., Vaesel, H., Brønsgaard, P. H., Kolby, P. & Madsen, K. G. (2009). Kendskab til humant papillomvirus-relateret sygdom blandt kvinder i almen praksis. Ugeskrift for Læger, 171(14), 1173-7.
Abam, M. & de Berg, M. (2009).  Kinetic spanners in Rd. In J. Hershberger & E. Fogel (Eds.), Annual Symposium on Computational Geometry: SESSION: Monday, June 8th, 10:50-11:50 am (pp. 43-50). Association for Computing Machinery. https://doi.org/10.1145/1542362.1542371
Kristensen, T. G., Pedersen, C. S., Thomsen, R. & Christensen, M. H. (2009). Largest Common Chemical Feature Subtree as a Virtual Screening Method. Poster session presented at 17th Annual International Conference on Intelligent Systems for Molecular Bioligy (ISMB) & 8th European Conference on Computational Biology (ECCB), Stockholm, Sweden. http://www.iscb.org/ismbeccb2009/poster_list.php?cat=C
Nevo, I., Kapishnikov, S., Birman, A., Dong, M., Cohen, S. R., Kjaer, K., Besenbacher, F., Stapelfeldt, H., Seideman, T. & Leiserowitz, L. (2009). Laser-induced aligned self-assembly on water surfaces. Journal of Chemical Physics, 130(14), 144704. https://doi.org/10.1063/1.3108540