Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Arge, L., Brodal, G. S., Fagerberg, R. & Laustsen, M. (2005). Cache-Oblivious Planar Orthogonal Range Searching and Counting. In Proceedings of the twenty-first annual symposium on Computational geometry (pp. 160-169). Association for Computing Machinery. https://doi.org/10.1145/1064092.1064119
Arge, L., de Berg, M. & Haverkort, H. (2005). Cache-Oblivious R-trees. In J. Mitchell & G. Rote (Eds.), Proceedings of 21th ACM Symposium on Computational Geometry (pp. 170-179). Association for Computing Machinery.
Gallasch, G. E., Vanit-Anunchai, S., Billington, J. & Kristensen, L. M. (2005). Checking Language Inclusion On-The-Fly with the Sweep-line Method. In Sixth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (pp. 1-20). Department of Computer Science, University of Aarhus.
Lambov, B. Z. (2005). Complexity and Intensionality in a Type-1 Framework for Computable Analysis. In C.-H. L. Ong (Ed.), Computer Science Logic, 19th International Workshop, CSL 2005 Proceedings, 14th Annual Conference of the EACSL (Oxford, UK, August 22-25, 2005) (pp. 442-461). Springer LNCS.
Bødker, S. & Andersen, P. B. (2005). Complex Mediation. Journal of Human Computer Interaction, 20(4), 353-402.
Christiansen, C., Mailund, Pedersen, C. N. S. & Randers, M. (2005). Computing the Quartet Distance between Trees of Arbitrary Degree. In Proceedings of the 5th International Workshop on Algorithms in Bioinformatics (WABI) (pp. 77-88)
Damgård, I. B. & Ishai, Y. (2005). Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. In V. Shoup (Ed.), Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings (pp. 378-394). Springer. https://doi.org/10.1007/11535218_23
Gudmundsson, J., Haverkort, H. J. & van Krefeld, M. (2005). Constrained Higher-Order Delaunay Triangulations. Computational Geometry, 30(3), 271-277.
Benkert, M., Gudmundsson, J. & Haverkort, H. J. (2005). Constructing Interference-Minimal Networks. In Proc. 21th European Workshop on Computational Geometry (pp. 203-206). Technische Universiteit Eindhoven.
Danvy, O. & Nielsen, L. (2005). CPS Transformation of Beta-Redexes. Information Processing Letters, 94(5), 217-224. https://doi.org/10.1016/j.ipl.2005.02.002
Hirt, M., Nielsen, J. B. & Przydatek, B. (2005). Cryptographic Asynchronous Multi-party Computation with Optimal Resilience: Extended abstract. In R. Cramer (Ed.), Advances in Cryptology – EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings (pp. 322-340). Springer LNCS. https://doi.org/10.1007/11426639_19
Damgård, I. B., Salvail, L., Schaffner, C. & Fehr, S. (2005). Cryptography In The Bounded Quantum-Storage Model. In Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (pp. 449-458). IEEE. https://doi.org/10.1109/SFCS.2005.30
Zhang, W. & Ding, P. (2005). Debugging Environment for a Meta-programming Language. Mini-Micro Systems, 26(4), 707-709.
Filinski, A. & Rohde, H. K. (2005). Denotational Aspects of Untyped Normalization by Evaluation. BRICS Report Series, (RS-05-4).
Miltersen, P. B. & Vinodchandran, N. V. (2005). Derandomizing Arthur-Merlin Games using Hitting Sets. Computational Complexity, 14(3), 256-279. https://doi.org/10.1007/s00037-005-0197-7
Andersen, J. R., Bak, L., Grarup, S., Lund, K. V., Hansen, K. M. & Torgersen, M. (2005). Design, implementation, and evaluation of the Resilient Smalltalk embedded platform. Computer Languages, Systems and Structures, 31(3-4), 127-141. https://doi.org/10.1016/j.cl.2005.02.003
Bardram, J. E., Bossen, C. & Thomsen, A. B. (2005). Designing for Transformations in Collaboration: A Study of the Deployment of Homecare Technology. In GROUP´05: Proceedings of teh 2005 International ACM SIGGROUP Conference on Supporting Group Work (pp. 294-303). Association for Computing Machinery.
Bardram, J. E., Bossen, C. & Thomsen, A. (2005). Designing for transformations in collaboration: a study of the deployment of homecare technology. In GROUP 05 (pp. 294-303). Association for Computing Machinery.
Lindholm, M. (2005). Development of Object-understanding Among Students in the Humanities. Poster session presented at ITiCSE 2005, Monte de Caparica, Portugal.
Hansen, K. M. & Damm, C. H. (2005). Distributed Knight. Computer programme
Christensen, B. G. (2005). Do Social Computing Make You Happy? A Case Study of Nomadic Children in Mixed Environments. In O. W. Bertelsen, P. Marti & D. Shapiro (Eds.), The 4th decennial conference on Critical computing: between sense and sensibility 2005, Aarhus, Denmark
Brabrand, C., Møller, A. & Schwartzbach, M. I. (2005). Dual Syntax for XML Languages. In Database Programming Languages: 10th International Workshop, DBPL 2005, Trondheim, Norway, August 28-29, 2005, Revised Selected Papers (pp. 27-41). Springer. https://doi.org/10.1007/11601524_2
Fritsch, J., Fogtmann, M. H. & Lassen, T. M. (2005). Dunning the Data: Towards Para-functional Qualities of Product Design. In J. Buur & B. Mathews (Eds.), Proceedings of Student Interaction Design Conference SIDER05 (pp. 116-121).
Brodersen, A. C., Christensen, B. G., Grønbæk, K., Dindler, C. & Sundararajah, B. (2005). eBag: a Ubiquitous Web Infrastructure for Nomadic Learning. In Proceedings of the 14th International World Wide Web Conference (pp. 298-306). Association for Computing Machinery. https://doi.org/10.1145/1060745.1060791
Brodersen, A. C. & Iversen, O. S. (2005). eCell: Spatial IT Design for Group Collaboration in School Environments. In GROUP 05 (pp. 227-235). Society for Industrial and Applied Mathematics.
Damgård, I. B. & Dupont, K. (2005). Efficient Threshold RSA Signatures with General Moduli and no Extra Assumptions. In S. Vaudenay (Ed.), Public Key Cryptography - PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings (pp. 346-361). Springer. https://doi.org/10.1007/978-3-540-30580-4_24
Allan, C., Avgustinov, P., Christensen, A. S., Hendren, L. J., Kuzins, S., Lhoták, J., Lhoták, O., de Moor, O., Sereni, D., Sittampalam, G. & Tibble, J. (2005). abc: The AspectBench Compiler for AspectJ. In R. Glück & M. R. Lowry (Eds.), Generative Programming and Component Engineering, 4th International Conference, GPCE 2005 Proceedings (Tallinn, Estonia, September 29 - October 1, 2005) (pp. 10-16)
Brodal, G. S. & Leonardi, S. (Eds.) (2005). ESA 2005: 13th Annual European Symposium: Springer LNCS.
Hansen, K. M., Antolin Rafael, P., Camara, J., Carro, S., Metha, G., Rosengren, P., Pagter, J. I. & Pedersen, M. Ø. (2005). eu-DOMAIN D3.1 + D4.1 Software Architecture Specification.
Machado, R. J., Lassen, K. B., Oliveira, S., Couto, M. & Pinto, P. (2005). Execution of UML Models with CPN Tools for Workflow Requirements Validation. In Proceedings of Sixth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, volume PB-576 of DAIMI (pp. 231-250). DAIMI PB-576.
Foster, J. N., Greenwald, M. B., Kirkegaard, C., Pierce, B. C. & Schmitt, A. (2005). Exploiting Schemas in Data Synchronization. In DBPL 2005 (pp. 42-57). Springer LNCS.
Bardram, J. E., Christensen, H. B., Corry, A. V., Hansen, K. M. & Ingstrup, M. (2005). Exploring Quality Attributes using Architectural Prototyping. In R. Reussner, J. Mayer, J. A. Stafford, S. Overhage, S. Becker & P. J. Schroeder (Eds.), Quality of Software Architectures and Software Quality: First International Conference on the Quality of Software Architectures, QoSA 2005, and Second International Workshop on Software Quality, SOQUA 2005, Erfurt, Germany, September 20-22, 2005. Proceedings (pp. 155-170). Springer. https://doi.org/10.1007/11558569_12
Jelling Kristoffersen, K., Kjærgaard, M. B., Chen, J., Sheridan, J., Rønning, R. & Aa. Sørensen, J. (2005). Extending Wireless Broadband Network Architectures with Home Gateways, Localization, and Physical Environment Surveillance. In Proceedings of the Second International CICT Conference: Next Generation Broadband -Content and User Perspectives Center for Information and Communication Technologies.
Arge, L. & Toma, L. (2005). External Data Structures for Shortest Path Queries on Planar Digraphs. In X. Deng & D. Du (Eds.), Algorithms and Computation: 16th International Symposium, ISAAC 2005, Sanya, Hainan, China, December 19-21, 2005. Proceedings (pp. 328-338). Springer. https://doi.org/10.1007/11602613_34
Biernacka, M., Danvy, O. & Sørensen, K. S. (2005). Extracting Evaluators from Proofs of Weak Head Normalization. In Electronic Notes in Theoretical Computer Science Elsevier Science Publishers.
Gerhardy, P. (2005). Extracting Herbrand Disjunctions by Functional Interpretation. Archive for Mathematical Logic, 44, 633-644.
Brodal, G. S., Demaine, E. D. & Munro, J. I. (2005). Fast Allocation and Deallocation with an Improved Buddy System. Acta Informatica, 41(4-5), 273-291. https://doi.org/10.1007/s00236-004-0159-6
Brodal, G. S., Kaligosi, K., Katriel, I. & Kutz, M. (2005). Faster Algorithms for Computing Longest Common Increasing Subsequences. BRICS Report Series, (RS-05-37).
Brodal, G. S. (2005). Finger Search Trees. In D. Mehta & S. Sahni (Eds.), Handbook of Data Structures and Applications CRC Press.
Petersen, M. G., Krogh, P., Ludvigsen, M. & Lykke-Olesen, A. (2005). Floor interaction: HCI reaching new ground. In CHI '05 extended abstracts on Human factors in computing systems (pp. 1717-1720). Association for Computing Machinery. https://doi.org/10.1145/1056808.1057005