Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Bødker, S. (2013). Boundaries, work and the rest. Paper presented at Workshop at CSCW at the Boundary of Work and Life , Paphos, Cyprus. http://cscwworkandlife.wordpress.com/
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2013). Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier. In K. Sako & P. Sarkar (Eds.), Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (pp. 140-160 ). Springer VS. https://doi.org/10.1007/978-3-642-42045-0_8
Kaul, M., Yang, B. & Jensen, C. S. (2013). Building Accurate 3D Spatial Networks to Enable Next Generation Intelligent Transportation Systems. In IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1 ) (pp. 137 - 146 ). IEEE. https://doi.org/10.1109/MDM.2013.24
Bødker, S. & Grönvall, E. (2013). Calendars: Time coordination and overview in families and beyond. In O. W. Bertelsen, L. Ciolfi, M. A. Grasso & G. A. Papadopoulos (Eds.), ECSCW 2013 : Proceedings of the 13th European Conference on Computer Supported Cooperative Work, 2013 (pp. 63-81). Springer VS. https://doi.org/10.1007/978-1-4471-5346-7_4
Vitanov, A., Dupont-Dupuis, F., Tomamichel, M. & Renner, R. (2013). Chain rules for smooth min-and max-entropies. I E E E Transactions on Information Theory, 59(5), 2603-2612. https://doi.org/10.1109/TIT.2013.2238656
Sükösd, Z., Knudsen, B., Anderson, J. WJ., Novák, A., Kjems, J. & Pedersen, C. N. S. (2013). Characterising RNA secondary structure space using information entropy. BMC Bioinformatics, 14 (Suppl 2), 1-9. Article S22. https://doi.org/10.1186/1471-2105-14-S2-S22
Smith, A. B., Sandel, B., Kraft, N. J. B. & Carey, S. (2013). Characterizing scale-dependent community assembly using the functional-diversity-area relationship. Ecology, 94(11), 2392-2402.
Arge, L., Goodrich, M. T. & Walderveen, F. V. (2013). Computing betweenness centrality in external memory. In Proceedings, 2013 IEEE International Conference on Big Data (pp. 368 - 375 ). IEEE. https://doi.org/10.1109/BigData.2013.6691597
Tsirogiannis, C. & Sandel, B. S. (2013). Computing the Skewness of the Phylogenetic Mean Pairwise Distance in Linear Time. In A. Darling & J. Stoye (Eds.), Algorithms in Bioinformatics: 13th International Workshop, WABI 2013, Sophia Antipolis, France, September 2-4, 2013. Proceedings (pp. 170-184). Springer VS. https://doi.org/10.1007/978-3-642-40453-5_14
Rasmusson, A., Sørensen, T. S. & Ziegler, G. (2013). Connected Components Labeling on the GPU with Generalization to Voronoi Diagrams and Signed Distance Fields. In G. Bebis et al. (Ed.), Advances in Visual Computing: 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part I (pp. 206-215). Springer VS. https://doi.org/10.1007/978-3-642-41914-0_21
Damgård, I. B. & Zakarias, S. (2013). Constant-overhead secure computation of Boolean circuits using preprocessing. In A. Sahai (Ed.), Theory of Cryptography: 10th TCC 2013. Proceedings (pp. 621-641). Springer VS. https://doi.org/10.1007/978-3-642-36594-2_35
Schmidt, K. & Bannon, L. J. (2013). Constructing CSCW: The First Quarter Century. Computer Supported Cooperative Work (CSCW): The Journal of Collaborative Computing and Work Practices, 22(4-6), 345-372. https://doi.org/10.1007/s10606-013-9193-7
Moreira, J. M. M., Jensen, C. S., Dias, P. & Mesquita, P. (2013). Creating data representations for moving objects with extent from images. In Presented at the COST MOVE Workshop at Moving Objects at Sea, Brest, France, June 28–29, 2013
Bannon, L. J. & Schmidt, K. (Eds.) (2013). CSCW: The First Quarter Century. Computer Supported Cooperative Work (CSCW): The Journal of Collaborative Computing and Work Practices, 22(4-6), 345-715. http://link.springer.com/journal/10606/22/4/page/1
Verbin, E. & Yu, W. (2013). Data structure lower bounds on random access to grammar-compressed strings. In J. Fischer & P. Sanders (Eds.), Combinatorial Pattern Matching: 24th Annual Symposium, CPM 2013, Bad Herrenalb, Germany, June 17-19, 2013. Proceedings (pp. 247-258). Springer VS. https://doi.org/10.1007/978-3-642-38905-4_24
Szehr, O., Dupont-Dupuis, F., Tomamichel, M. & Renner, R. (2013). Decoupling with unitary approximate two-designs. New Journal of Physics, 15(5). https://doi.org/10.1088/1367-2630/15/5/053022
Bannon, L. J. & Ehn, P. (2013). Design: design matters in participatory design. In J. Simonsen & T. Robertson (Eds.), Routledge International Handbook of Participatory Design (pp. 37-63). Routledge.
Schwarz, M. R. (2013). Design and Analysis of Web Application Frameworks. Datalogisk Institut, Aarhus Universitet.
Andersen, O., Jensen, C. S., Torp, K. & Yang, B. (2013). EcoTour: Reducing the Environmental Footprint of Vehicles Using Eco-Routes. In IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1) (pp. 338 - 340 ). IEEE. https://doi.org/10.1109/MDM.2013.50
Korn, M., Colombino, T. & Lewkowicz, M. (Eds.) (2013). ECSCW 2013 Adjunct Proceedings: The 13th European Conference on Computer Supported Cooperative Work, 21-25 September 2013, Paphos, Cyprus. Department of Computer Science, Aarhus University. Daimi Report Series (DAIMI PB) No. 596
Li, X., Ceikute, V., Jensen, C. S. & Tan, K.-L. (2013). Effective Online Group Discovery in Trajectory Databases. I E E E Transactions on Knowledge & Data Engineering, 25(12), 2752 - 2766 . https://doi.org/10.1109/TKDE.2012.193
Feldthaus, A., Schäfer, M., Sridharan, M., Dolby, J. & Tip, F. (2013). Efficient construction of approximate call graphs for JavaScript IDE services. In D. Notkin, B. H. C. Cheng & K. Pohl (Eds.), Proceedings of the 2013 International Conference on Software Engineering, ICSE '13 (pp. 752-761 ). IEEE Communications Society. http://dl.acm.org.ez.statsbiblioteket.dk:2048/citation.cfm?id=2486887&CFID=280253056&CFTOKEN=11487082
Agarwal, P. K., Yang, J., Arge, L., Govindarajan, S. & Yi, K. (2013). Efficient external memory structures for range-aggregate queries. Computational Geometry, 46(3), 358-370. https://doi.org/10.1016/j.comgeo.2012.10.003
Bøgh, K. S., Assent, I. & Magnani, M. (2013). Efficient GPU-based skyline computation. In R. Johnson & A. Kemper (Eds.), Proceedings of the Ninth International Workshop on Data Management on New Hardware , DaMoN '13 Article 5 Association for Computing Machinery. https://doi.org/10.1145/2485278.2485283
Cohen, G., Damgård, I. B., Ishai, Y., Kölker, J., Miltersen, P. B., Raz, R. & Rothblum, R. D. (2013). Efficient multiparty protocols via log-depth threshold formulae. In R. Canetti & J. A. Garay (Eds.), Advances in Cryptology – CRYPTO 2013: 33rd Annual Conference. Proceedings, Part II (pp. 185-202). Springer VS. https://doi.org/10.1007/978-3-642-40084-1_11
Midtgaard, J., Ramsay, N. & Larsen, B. (2013). Engineering Definitional Interpreters. In T. Schrijvers & R. Peña (Eds.), Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming , PPDP '13 (pp. 121-132). Association for Computing Machinery. https://doi.org/10.1145/2505879.2505894
Branzei, S., Caragiannis, I., Kurokawa, D. & Procaccia, A. (2013). Equilibria of Generalized Cut and Choose Protocols. (1307.2225v1 ed.) arxiv.org. http://arxiv.org/abs/1307.2225
Branzei, S. & Miltersen, P. B. (2013). Equilibrium Analysis in Cake Cutting. In M. Gini & O. Shehory (Eds.), Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems , AAMAS '13 (pp. 327-334 ). Association for Computing Machinery. http://dl.acm.org/citation.cfm?id=2484920.2484974&coll=DL&dl=ACM&CFID=340403434&CFTOKEN=84711969
Korn, M., Polli, A. M. & Klokmose, C. N. (2013). Experiences from a Real-Time Mobile Collaborative Writing System in an Art Gallery. Paper presented at Designing Mobile Face-to-Face Group Interactions at ECSCW 2013, Paphos, Cyprus. http://groupinteractions.wordpress.com/
Micenková, B., Ng, R. T., Dang, X.-H. & Assent, I. (2013). Explaining outliers by subspace separability. In H. Xiong, G. Karypis, B. Thuraisingham, D. Cook & X. Wu (Eds.), Proceedings, IEEE 13th International Conference on Data Mining (ICDM 2013) (pp. 518 - 527 ). IEEE Press. http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6724379
Nielsen, M., Kjærgaard, M. B. & Grønbæk, K. (2013). Exploring Interaction Techniques and Task Types for Direct-Touch as Input Modality. Poster session presented at VAST Infovis Scivis, Atlanta, Georgia, United States.
Sonne, T. & Grønbæk, K. (2013). Exploring New Potentials in Preventing Unhealthy Computer Habits. In W. E. Mackay, S. Brewster & S. Bødker (Eds.), CHI '13 Extended Abstracts on Human Factors in Computing Systems, CHI EA '13 (pp. 487-492 ). Association for Computing Machinery. https://doi.org/10.1145/2468356.2468442
Jensen, M. M., Rasmussen, M. & Grønbæk, K. (2013). Exploring Opponent Formats: Game Mechanics for Computer-Supported Physical Games. In J. C. Anacleto, E. W. G. Clua, F. S. Correa da Silva, S. Fels & H. S. Yang (Eds.), Entertainment Computing - ICEC 2013: 12th International Conference, ICEC 2013, São Paulo, Brazil, October 16-18, 2013. Proceedings (Vol. 8215, pp. 48-60). Springer VS. https://doi.org/10.1007/978-3-642-41106-9_6
Nørgaard, M., Merritt, T. R., Rasmussen, M. & Petersen, M. G. (2013). Exploring the design space of shape-changing objects: imagined physics. In Proceedings of the 6th International Conference on Designing Pleasurable Products and Interfaces (pp. 251-260 ). Association for Computing Machinery. https://doi.org/10.1145/2513506.2513533
Chen, S., Scheder, D. A., Talebanfard, N. & Tang, B. (2013). Exponential Lower Bounds for the PPSZ k-SAT Algorithm. In Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '13 (pp. 1253-1263). Society for Industrial and Applied Mathematics. http://knowledgecenter.siam.org/0236-000027/0236-000027/1
Branzei, S., Procaccia, A. & Zhang, J. (2013). Externalities in Cake Cutting. Proceedings of the International Joint Conference on Artificial Intelligence, 13.
Magnani, M., Montesi, D. & Rossi, L. (2013). Factors enabling information propagation in a Social Network Site. In T. Özyer , J. Rokne , G. Wagner & A. H. P. Reuser (Eds.), The Influence of Technology on Social Network Analysis and Mining (pp. 411-426 ). Springer. https://doi.org/10.1007/978-3-7091-1346-2_18