Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Baniukevic, A., Jensen, C. S. & Lu, H. (2013). Hybrid Indoor Positioning with Wi-Fi and Bluetooth: Architecture and Performance . In IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1 ) (pp. 207 - 216 ). IEEE. https://doi.org/10.1109/MDM.2013.30
Radaelli, L., Sabonis, D., Lu, H. & Jensen, C. S. (2013). Identifying Typical Movements Among Indoor Objects: Concepts and Empirical Study. In IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1 ) (pp. 197 - 206 ). IEEE. https://doi.org/10.1109/MDM.2013.29
Kjærgaard, M. B., Krarup, M. V., Stisen, A., Prentow, T. S., Blunck, H., Grønbæk, K. & Jensen, C. S. (2013). Indoor Positioning using Wi-Fi: How Well Is the Problem Understood?. Paper presented at International Conference on Indoor Positioning and Indoor Navigation, Montbéliard, France.
Ernst, E. (2013). Inheritance versus parameterization. In M. Markku (Ed.), Proceedings of the 5th Workshop on MechAnisms for SPEcialization, Generalization and inHerItance, MASPEGHI '13 (pp. 26-29 ). Association for Computing Machinery. https://doi.org/10.1145/2489828.2489832
Jensen, M. M., Grønbæk, K., Rasmussen, M. K., Thomassen, N., Andersen, J. & Nielsen, J. (2013). Interactive football training based on rebounders with hit position sensing and audio/light feedback. Abstract from International Symposium on Computer Science in Sports, Istanbul, Turkey.
Brabrand, C., Ribeiro, M., Tolêdo, T., Winther, J. & Borba, P. (2013). Intraprocedural dataflow analysis for software product lines. In G. T. Leavens , S. Chiba & É. Tanter (Eds.), Transactions on Aspect-Oriented Software Development X (pp. 73-108). Springer VS. https://doi.org/10.1007/978-3-642-36964-3_3
Pierce, J., Strengers, Y., Sengers, P. & Bødker, S. (2013). Introduction to the Special Issue on Practice-Oriented Approaches to Sustainable HCI. ACM Transactions on Computer-Human Interaction, 20(4), Article 20. https://doi.org/10.1145/2494260
Kejlberg-Rasmussen, C., Tao, Y., Tsakalidis, K., Tsichlas, K. & Yoon, J. (2013). I/O-Efficient Planar Range Skyline and Attrition Priority Queues. In R. Hull & W. Fan (Eds.), Proceedings of the 32nd symposium on Principles of database systems , PODS '13 (pp. 103-114 ). Association for Computing Machinery. https://doi.org/10.1145/2463664.2465225
Yang, B., Fantini, E. N. & Jensen, C. S. (2013). iPark: Identifying Parking Spaces from Trajectories. In G. Guerrini & N. W. Paton (Eds.), Proceedings of The 16th International Conference on Extending Database Technology: EDBT 2013 (pp. 705-708 ). Association for Computing Machinery. https://doi.org/10.1145/2452376.2452459
Rasmussen, M. K., Grönvall, E., Kinch, S. & Petersen, M. G. (2013). It’s alive, it’s magic, it’s in love with you: Opportunities, Challenges and Open Questions for Actuated Interfaces. In H. Shen, R. Smith, J. Paay, P. Calder & T. Wyeld (Eds.), Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration. OzCHI '13 (pp. 63-72). Association for Computing Machinery. https://doi.org/10.1145/2541016.2541033
Georgiev, I., Křivánek, J., Hachisuka, T., Nowrouzezahrai , D. & Jarosz, W. (2013). Joint importance sampling of low-order volumetric scattering. A C M Transactions on Graphics, (6), Article 164 . https://doi.org/10.1145/2508363.2508411
Bendlin, R. (2013). Lattice-based Cryptography: Threshold Protocols and Multiparty Computation. Department of Computer Science, Aarhus University.
Hazay, C., López-Alt, A., Wee, H. & Wichs, D. (2013). Leakage-resilient cryptography from minimal assumptions. In T. Johansson & P. Nguyen (Eds.), Leakage-Resilient Cryptography from Minimal Assumptions: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (pp. 160-176). Springer VS. https://doi.org/10.1007/978-3-642-38348-9_10
Hubacek, P., Nielsen, J. B. & Rosen, A. (2013). Limits on the Power of Cryptographic Cheap Talk. In R. Canetti & J. A. Garay (Eds.), Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I (pp. 277-297 ). Springer VS. https://doi.org/10.1007/978-3-642-40041-4_16
Polli, A. M., Korn, M. & Klokmose, C. N. (2013). Local Area Artworks: Collaborative Art Interpretation On-Site. In F. Mattern & S. Santini (Eds.), Proceedings of The 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '13 Adjunct (pp. 79-82). Association for Computing Machinery. https://doi.org/10.1145/2494091.2494114
Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013). Local Outlier Detection with Interpretation. In H. Blockeel, K. Kersting , S. Nijssen & F. Železný (Eds.), Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2013, Prague, Czech Republic, September 23-27, 2013, Proceedings, Part III (pp. 304-320 ). Springer VS. https://doi.org/10.1007/978-3-642-40994-3_20
Rasmussen, M. (2013). Magical Realities in Interaction Design. In Proceedings of the 7th International Conference on Tangible, Embedded and Embodied Interaction, TEL '13 (pp. 125-128 ). Association for Computing Machinery. https://doi.org/10.1145/2460625.2460644
Johnson, P. M., Xu, Y., Brewer, R. S., Moore, C. A., Lee, G. E. & Connell, A. (2013). Makahiki+WattDepot: An open source software stack for next generation energy research and education. In L. M. Hilty, B. Aebischer, G. Andersson & W. Lohmann (Eds.), Proceedings of the First Interntional Conference on Information and Communication Technologies for Sustainability (ICT4S) Akademia.edu. http://www.academia.edu/2911805/ICT4S_2013_Proceedings_of_the_First_International_Conference_on_Information_and_Communication_Technologies_for_Sustainability_ETH_Zurich_February_14-16_2013
Branzei, S., Michalak, T., Rahwan, T., Larson, K. & Jennings, N. (2013). Matchings with Externalities and Attitudes. In M. Gina & O. Shehory (Eds.), International Conference on Autonomous Agents and Multi-agent Systems, AAMAS '13 (pp. 295-302 ). Association for Computing Machinery. http://dl.acm.org/citation.cfm?id=2484969&CFID=340403434&CFTOKEN=84711969
Dalgaard, L. G., Grönvall, E. & Verdezoto, N. (2013). MediFrame: A Tablet Application to Plan, Inform, Remind and Sustain Older Adults Medication Intake. In IEEE International Conference on Healthcare Informatics, IEEE ICHI 2013 (pp. 36-45). IEEE. https://doi.org/10.1109/ICHI.2013.12
Agarwal , P. K., Graham , G., Huang, Z., Phillips, J., Wei, Z. & Yi, K. (2013). Mergeable summaries. A C M Transactions on Database Systems, 38(4), Article 26 . https://doi.org/10.1145/2500128
Jensen, C. S. (Ed.), Jermaine, C., Zhou, X. (Ed.), Kotagiri, R. (Ed.) & Ooi, B. C. (Ed.) (2013). Message from the ICDE 2013 Program Committee and General. In 2013 IEEE 29th International Conference on Data Engineering (ICDE), : Australia, April 8–11, 2013 (pp. i-ii). IEEE Communications Society. http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6530811
Hu, H. (Ed.), Jensen, C. S. & Dingming , D. (Ed.) (2013). Message from the LBS n.0 Workshop Organizers. In IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:2 ) (pp. xiii). IEEE. http://mdm2013.dico.unimi.it/
Wölfel, C. & Merritt, T. (2013). Method card design dimensions: A survey of card-based design tools. In P. Kotzé et al. (Ed.), Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part I (pp. 479-486). Springer VS. https://doi.org/10.1007/978-3-642-40483-2_34
Frederiksen, T. K., Jakobsen, T. P., Nielsen, J. B., Nordholt, P. S. & Orlandi, C. (2013). MiniLEGO: Efficient secure two-party computation from general assumptions. In T. Johansson & P. Q. Nguyen (Eds.), Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (pp. 537-556). Springer VS. https://doi.org/10.1007/978-3-642-38348-9_32
Larsen, K. G. (2013). Models and Techniques for Proving Data Structure Lower Bounds. Department of Computer Science, Aarhus University.
Liu, K., Yang, B., Shang, S., Li, Y. & Ding, Z. (2013). MOIR/UOTS: Trip recommendation with user oriented trajectory search. In IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1 ) (pp. 335-337). IEEE. https://doi.org/10.1109/MDM.2013.49
Sergey, I., Devriese, D., Might, M., Midtgaard, J., Darais, D., Clarke, D. & Piessens, F. (2013). Monadic abstract interpreters. In H.-J. Boehm (Ed.), Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '13 (pp. 399-410). Association for Computing Machinery. https://doi.org/10.1145/2491956.2491979
Frederiksen, S. K. S. & Miltersen, P. B. (2013). Monomial strategies for concurrent reachability games and other stochastic games. In P. A. Abdulla & I. Potapov (Eds.), Reachability Problems: 7th International Workshop, RP 2013, Uppsala, Sweden, September 24-26, 2013 Proceedings (pp. 122-134 ). Springer VS. https://doi.org/10.1007/978-3-642-41036-9_12
Alamdari, S., Angelini, P., Chan, T. M., Di Battista, G., Frati, F., Lubiw, A., Patrignani, M., Roselli, V., Singla, S. & Wilkinson, B. T. (2013). Morphing Planar Graph Drawings with a Polynomial Number of Steps. The Annual A C M - S I A M Symposium on Discrete Algorithms. Proceedings, 24, 1656-1667. http://knowledgecenter.siam.org/0236-000137/0236-000137/1
Wu, D., Yiu, M. L. & Jensen, C. S. (2013). Moving Spatial Keyword Queries: Formulation, Methods, and Analysis. A C M Transactions on Database Systems, 38(1), Article 7. https://doi.org/10.1145/2445583.2445590
Arge, L., Walderveen, F. V. & Zeh, N. (2013). Multiway simple cycle separators and I/O-efficient algorithms for planar graphs. In Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms (pp. 901-918). Society for Industrial and Applied Mathematics. http://knowledgecenter.siam.org/soda/
Larsen, K. G. & Walderveen, F. V. (2013). Near-Optimal Range Reporting Structures for Categorical. In Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2013 (pp. 265-276). Association for Computing Machinery. http://knowledgecenter.siam.org/0236-000081/~~PdfSource/0
Nordholt, P. S. (2013). New Approaches to Practical Secure Two-Party Computation. Institut for Datalogi, Aarhus Universitet.
Arge, L., Fischer, J., Sanders, P. & Sitchinava, N. (2013). On (dynamic) range minimum queries in external memory. In F. Dehne, R. Solis-Oba & J.-R. Sack (Eds.), Algorithms and Data Structures: 13th International Symposium, WADS 2013, London, ON, Canada, August 12-14, 2013. Proceedings (pp. 37-48). Springer VS. https://doi.org/10.1007/978-3-642-40104-6_4
Blunck, H., Bouvin, N. O., Franke, T., Grønbæk, K., Kjærgaard, M. B., Lukowicz, P. & Wüstenberg, M. (2013). On Heterogeneity in Mobile Sensing Applications Aiming at Representative Data Collection. In F. Mattern & S. Santini (Eds.), Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication, UbiComp '13 Adjunct (pp. 1087-1098 ). Association for Computing Machinery. https://doi.org/10.1145/2494091.2499576
Müller-Lennert, M., Dupont-Dupuis, F., Szehr, O., Fehr, S. & Tomamichel, M. (2013). On quantum Rényi entropies: A new generalization and some properties. Journal of Mathematical Physics, 54(12), Article 122203. https://doi.org/10.1063/1.4838856