Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Aagaard, L., Amarzguioui, M., Sun, G., Santos, L. C., Ehsani, A., Prydz, H. & Rossi, J. J. (2007). A Facile Lentiviral Vector System for Expression of Doxycycline-Inducible shRNAs: Knockdown of the Pre-miRNA Processing Enzyme Drosha. Molecular Therapy, 15(5), 938-945. https://doi.org/10.1038/sj.mt.6300118
Westergaard, M. (2007). A Game-theoretic View on Behavioural Visualisation. In A. Cerone & P. Curzon (Eds.), Electronic Notes in Theoretical Computer Science: Proceedings of the 2nd International Workshop on Formal Methods for Interactive Systems (FMIS 2007) (Vol. 208, pp. 113-129). Pergamon Press.
Brodal, G. S. & Jørgensen, A. G. (2007). A Linear Time Algorithm for the k Maximal Sums Problem. In L. Kucera & A. Kucera (Eds.), Mathematical Foundations of Computer Science 2007: 32nd International Symposium, MFCS 2007 Ceský Krumlov, Czech Republic, August 26-31, 2007 Proceedings (pp. 442-453). Springer. https://doi.org/10.1007/978-3-540-74456-6_40
Kjeldbjerg, A. L., Villesen, P., Aagaard, L. & Pedersen, F. S. (2007). An active 70 million year old viral infection in humans. Poster session presented at High Throughput Biology: Genomics, Fluxomics, Proteomics, and Interactomics, Denmark.
Brabrand, C., Giegerich, R. & Møller, A. (2007). Analyzing Ambiguity of Context-Free Grammars. In Proc. 12th International Conference on Implementation and Application of Automata
Miltersen, P. B. & Sørensen, T. B. (2007). A Near-Optimal Strategy for a Heads-Up No-Limit Texas Hold'em Poker Tournament. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (pp. 1168-1175) http://www.daimi.au.dk/~bromille/Papers/aamaspoker.pdf
Klokmose, C. N. (2007). An Instrumental Paradigm for Ubiquitous Interaction. In Conference Proceedings of ECCE 2007 Association for Computing Machinery.
McCauley, S., de Groot, S., Mailund, T. & Hein, J. (2007). Annotation of selection strengths in viral genomes. Bioinformatics, 23(22), 2978-2986. https://doi.org/10.1093/bioinformatics/btm472
Zhang, W. (2007). An Overview of Product Line Enabled Intelligent Mobile Middleware. In 31st Annual International Computer Software and Applications Conference IEEE Computer Society Press.
Brønsted, J. (2007). Anvendelser af Pervasive Communication. (2 ed.) Komialt - Vidennetværk for Pervasive Communication.
Hansen, T. R. & Bardram, J. (2007). Applying Mobile and Pervasive Computer Technology to Enhance Coordination of Work in a Surgical Ward. In Studies in Health Technology and Informatics: MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics - Building Sustainable Health Systems (Vol. 129, pp. 107-111). IOS Press. http://www.ncbi.nlm.nih.gov/sites/entrez?db=pubmed&uid=17911688&cmd=showdetailview&indexed=google
Damgård, I. B. (2007). A "proof-reading" of Some Issues in Cryptography. In Automata, Languages and Programming: 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007. Proceedings (pp. 2-11). Springer. https://doi.org/10.1007/978-3-540-73420-8_2
Danvy, O. & Millikin, K. (2007). A Rational Deconstruction of Landin's J Operator. Lecture Notes in Computer Science, 4015, 55-73.
Petersen, M. G. & Pagter, J. I. (2007).  A Sense of Security in Pervasive Computing - is the light on when the refrigerator door is closed? In R. Dhamija & S. Dietrich (Eds.), Financial and Cryptography and Data Security: 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 2007, Revised Selecgted Papers (Vol. LNCS 4886, pp. 383-388). Springer.
Kjær, K. E. (2007). A survey of context-aware middleware. In SE'07: Proceedings of the 25th IASTED Conference on Software Engineering (Vol. ProfileID:81343494583, pp. 148-155). ACTA Press.
Kjærgaard, M. B. (2007). A Taxonomy for Radio Location Fingerprinting. In Proceedings of the Third International Symposium on Location and Context Awareness (LoCA 2007) (Vol. 4718, pp. 139-156). Springer. https://doi.org/10.1007/978-3-540-75160-1_9
Damgård, I. B., Salvail, L., Fehr, S., Schaffner, C. & Renner, R. (2007). A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. In A. Menezes (Ed.), Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings (pp. 360-378). Springer. https://doi.org/10.1007/978-3-540-74143-5_20
Damgård, I. B., Cramer, R. & de Haan, R. (2007). Atomic Secure Multi-party Multiplication with Low Communication. In M. Naor (Ed.), Advances in Cryptology - EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings (pp. 329-346). Springer. https://doi.org/10.1007/978-3-540-72540-4_19
Dalevi, D., DeSantis, T. Z., Fredslund, J., Andersen, G. L., Markowitz, V. M. & Hugenholtz, P. (2007). Automated assignment of groups in large phylogenetic trees using GRUNT: Grouping, Ungrouping, Naming Tool. BMC Bioinformatics, 8, 402-407.
Eichberg, M., Kahl, M., Saha, D., Mezini, M. & Ostermann, K. (2007). Automatic incrementalization of Prolog based static analyses. In M. Hanus (Ed.), Proceedings of Practical Aspects of Declarative Languages, 9th International Symposium (PADL): Lecture Notes in Computer Science (Vol. 4354/2007, pp. 109-123). Springer Science+Business Media.
Camenisch, J., Hohenberger, S. & Pedersen, M. Ø. (2007). Batch Verification of Short Signatures. In M. Naor (Ed.), Advances in Cryptology - EUROCRYPT 2007 (4515 of Lecture Notes in Computer Science ed., pp. 246-263). Springer.
Caspersen, M. E., Börstler, J. & Nordström, M. (2007). Beauty and the Beast: Toward a Measurement Framework for Example Program Quality. Department of Computing Science, Umeå University, Sweden.
Lykke-Olesen, A. & Nielsen, J. (2007). BibPhone: Adding sound to the children's library. In Proceedings of the 6th international Conference on Interaction Design And Children, IDC 2007 (pp. 145-148) https://doi.org/10.1145/1297277.1297307
Andersen, J. & Bardram, J. E. (2007). BLIG: A New Approach for Sensor Identification, Grouping,and Authorisation in Body Sensor Networks. In S. Leonhardt, T. Falck & P. Mähönen (Eds.), 4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2007) (pp. 223-228). Springer.
Arge, L., Bender, M. A., Demaine, E. D. & Munro, J. I. (2007). Cache-Oblivious Priority Queue and Graph Algorithm Applications. S I A M Journal on Computing, 36(6), 1672-1695. https://doi.org/10.1145/509907.509950
Nielsen, M., Aranda, J. A., Di Giusto, C. & Valencia, F. (2007). CCS with Replication in the Chomsky Hierarchy: The Expressive Power of Divergence. In Z. Shao (Ed.), Programming Languages and Systems: 5th Asian Symposium, APLAS 2007, Singapore, November 29-December 1, 2007. Proceedings (pp. 383-398). Springer. https://doi.org/10.1007/978-3-540-76637-7_26
Kristensen, M., Kyng, M. & Nielsen, E. T. (2007). Challenges in designing interactive systems for emergency response. In Proceedings of the 6th ACM conference on Designing Interactive systems DIS '06 (pp. 301-310). Society for Industrial and Applied Mathematics. https://doi.org/10.1145/1142405.1142450
Gallasch, G., Billington, J., Vanit-Anunchai, S. & Kristensen, L. M. (2007). Checking Safety Properties On-the-Fly using the Sweep-Line Method. International Journal on Software Tools for Technology Transfer, 9(3-4), 371-392.
Kjærgaard, M. B. (2007). Cleaning and Processing RSS measurements for Location Fingerprinting. In Proceedings of the Third International Conference on Autonomic and Autonomous Systems (ICAS 2007) (pp. 12). IEEE. https://doi.org/10.1109/CONIELECOMP.2007.64
Schäfer, T., Aracic, I., Merz, M., Mezini, M. & Ostermann, K. (2007). Clustering for Generating Framework Top-Level Views. In Reverse Engineering, 2007, WCRE 2007, 14th Working Conference on (pp. 239-248). IEEE.
Stawiaski, J., Sørensen, T. S., Bidault, F. & Decenciere, E. (2007). Combining Morphological and Graph Based Methods for Multi-Label Segmentation. In Proceedings of MICCAI workshop: Interaction in Medical Image Analysis and Visualization
Miltersen, P. B. & Sørensen, T. B. (2007). Computing Proper Equilibria of Zero-Sum Games. In Proceedings of the 5th International Conference on Computers and Games: Computers and Games (pp. 200-211). Springer. https://doi.org/10.1007/978-3-540-75538-8_18
Hansen, K. A. (2007). Computing Symmetric Boolean Functions by Circuits with Few Exact Threshold Gates. In G. Lin (Ed.), Computing and Combinatorics: 13th Annual International Conference, COCOON 2007, Banff, Canada, July 16-19, 2007. Proceedings (pp. 448-458). Springer. https://doi.org/10.1007/978-3-540-73545-8_44
Stissing, M., Mailund, T., Pedersen, C. N. S., Brodal, G. S. & Fagerberg, R. (2007). Computing the All-Pairs Quartet Distance on a Set of Evolutionary Trees. In Proceedings of the 5th Asia-Pacific Bioinformatics Conference (APBC) (pp. 91-100)
Stissing, M., Pedersen, C. N. S., Mailund, T. & Brodal, G. S. (2007). Computing the Quartet Distance between Evolutionary Trees of Bounded Degree. In Proceedings of the 5th Asia-Pacific Bioinformatics Conference (APBC) (pp. 101-110)
Nielsen, M. L. (2007). Conceptions of Object-oriented Terms: A Study in Progress. In Proceedings of WIP-PPIG 2007 Psychology of Programming Interest Group.