Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Jensen, K. (Ed.) (1998). Special Section on Coloured Petri Nets. International Journal on Software Tools for Technology Transfer, 2(2), 95-191. https://doi.org/10.1007/s100090050020
Damgård, I. B., Pedersen, T. P. & Pfitzmann, B. (1998). Statistical secrecy and multibit commitments. I E E E Transactions on Information Theory, 44(3), 1143-1151. https://doi.org/10.1109/18.669255
Balat, V. & Danvy, O. (1998). Strong normalization by type-directed partial evaluation and run-time code generation. In X. Leroy & A. Ohori (Eds.), Types in Compilation: Second International Workshop, TIC ’98 Kyoto, Japan, March 25–27, 1998 Proceedings (pp. 240-252). Springer. https://doi.org/10.1007/BFb0055521
Bødker, S. & Bertelsen, O. W. (1998). Studying programming environments in use: Between principles and praxis. In Proceedings of NWPER '98: Nordic workshop on programming environment research
Mailund & Lyngsø, R. B. (1998). Textual interchange format for high-level Petri nets. In Proceedings of the first workshop on practical use of coloured Petri nets and Design/CPN (pp. 47-64)
Ernst, E., Gerhardt, F. & Benedicenti, L. (Eds.) (1998). The 8th Workshop for PhD Students in Object-Oriented Systems. In S. Demeyer & J. Bosch (Eds.), Object-Oriented Technology: ECOOP’98 Workshop Reader: ECOOP’ 98 Workshops, Demos, and Posters Brussels, Belgium, July 20–24, 1998 Proceedings (pp. 592-634). Springer. https://doi.org/10.1007/3-540-49255-0_1
Bødker, S. (1998). The artifacts of boundary crossing in systems design. Paper presented at Congress of the International Society for Cultural Research and Activity Theory, SCRAT 1998, Århus, Denmark.
Østerby, O. (1998). The Error of the Crank-Nicolson Method for Linear Parabolic Equations with a Derivative Boundary Condition. Department of Computer Science, Aarhus University. Daimi Report Series (DAIMI PB) No. 534
Christensen, M., Crabtree, A., Damm, C. H., Hansen, K. M., Madsen, O. L., Marqvardsen, P., Mogensen, P. H., Sandvad, E., Sloth, L. & Thomsen, M. (1998). The M.A.D Experience: Multiperspective Application Development in Evolutionary Prototyping. In E. Jul (Ed.), ECOOP'98 - Object-Oriented Programming: 12th European Conference Brussels, Belgium, July 20-24, 1998 Proceedings (pp. 13-40). Springer. https://doi.org/10.1007/BFb0054085
Arge, L. A., Procopiuc, O., Ramaswamy, S., Suel, T. & Vitter, J. S. (1998). Theory and practice of I/O-efficient algorithms for multidimensional batched searching problems. In Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms (pp. 685-694). Association for Computing Machinery.
Kristensen, L. M., Christensen, S. & Jensen, K. (1998). The  Practitioner's guide to Coloured Petri Nets. International Journal on Software Tools for Technology Transfer, 2(2), 98-132. https://doi.org/10.1007/s100090050021
Hune, T. & Nielsen, M. (1998). Timed bisimulation and open maps. In L. Brim, J. Gruska & J. Zlatuska (Eds.), Mathematical Foundations of Computer Science 1998: 23rd International Symposium, MFCS'98 Brno, Czech Republic, August 24-28, 1998 Proceedings (pp. 378-387). Springer. https://doi.org/10.1007/BFb0055787
Damgård, I. B. & Knudsen, L. R. (1998). Two-Key Triple Encryption. Journal of Cryptology, 11(3), 209-218. https://doi.org/10.1007/s001459900044
Danvy, O. (1998). Type-Directed Partial Evaluation. BRICS Lecture Series, (LS-98-3).
Bødker, S. & Petersen, M. G. (1998). Usability work: From snapshot to development of use. Paper presented at ISCRAT 1998, Århus, Denmark.
Kyng, M. (1998). Users and Computers: A contextual approach to design of computer artifact. Scandinavian Journal of Information Systems, 10(1-2), 7-44.
Christensen, H. B. (1998). Utilising a Geographic Space Metaphor in a Software Development Environment. In Proceedings of the IFIP TC2/TC13 WG2.7/WG13.4 Seventh Working Conference on Engineering for Human-Computer Interaction (pp. 39-56). Klüwer.
Mogensen, P. H. & Shapiro, D. (1998). When Survival is an Issue: PD in support of landscape architecture. Computer Supported Cooperative Work: The Journal of Collaborative Computing, 7, 187-203. https://doi.org/10.1023/A:1008655302519
Brodal, G. S. & Katajainen, J. (1998). Worst-case efficient external-memory priority queues. In S. Arnborg & L. Ivansson (Eds.), Algorithm Theory — SWAT'98: 6th Scandinavian Workshop on Algorithm Theory Stockholm, Sweden, July 8–10, 1998 Proceedings (pp. 107-118). Springer. https://doi.org/10.1007/BFb0054359
Damgård, I. B. & Cramer, R. (1998). Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free? In H. Krawczyk (Ed.), Advances in Cryptology - CRYPTO '98: 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23-27, 1998 Proceedings (pp. 424-441). Springer. https://doi.org/10.1007/BFb0055745
Jensen, K. (1997). A Brief Introduction to Coloured Petri Nets. In E. Brinksma (Ed.), Tools and Algorithms for the Construction and Analysis of Systems (Vol. 1217, pp. 203-208). Springer. https://doi.org/10.1007/BFb0035389
Hatcliff, J. & Danvy, O. (1997). A computational formalization for partial evaluation. Mathematical Structures in Computer Science, 7(5), 507-541. https://doi.org/10.1017/S0960129597002405
Schwartzbach, M. I. & Klarlund, N. (1997). A Domain-Specific Language for Regular Sets of Strings and Trees. In Proceedings of the Conference on Domain-Specific Languages
Schwartzbach, M. I., Madsen, J. L., Jørgensen, M. E. & Klarlund, N. (1997). Automatic Verification of Pointer Programs using Monadic Scond-Order Logic. In Proceedings of the ACM SIGPLAN 1997 conference on Programming language design and implementation (pp. 226-236). Association for Computing Machinery. https://doi.org/10.1145/258915.258936
Winskel, G. & Nielsen, M. (1997). Categories in Concurrency. In A. Pitts & P. Dybjer (Eds.), Semantics and Logics of Computation (pp. 299-354). Cambridge University Press.
Jensen, K. (1997). Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol 1, Basic Concepts. (2. ed., 2. corr. printing ed.) Springer. Monographs in theoretical computer science: an EATCS series
Jensen, K. (1997). Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol. 3, Practical Use. Springer. Monographs in theoretical computer science: an EATCS series
Danvy, O. & Rhiger, M. (1997). Compiling Actions by Type-Directed Partial Evaluation. In Proceedings of the Nordic Workshop on Programming Theory. NWPT'97
Engberg, U. H. & Winskel, G. (1997). Completeness Results for Linear Logic on Petri Nets. Annals of Pure and Applied Logic, 86(2), 101-135.
Kyng, M. & Mathiassen, L. (Eds.) (1997). Computers and Design in Context. MIT Press.
Bødker, S. & Bannon, L. J. (1997). Constructing Common Information Spaces. In Proceedings of ECSCW 97 (pp. 81-96). Kluwer Academic Publishers.
Christensen, S., Jørgensen, J. B. & Madsen, K. H. (1997). Design as Interaction with Computer Based Materials. In G. van der Veer, A. Henderson & S. Coles (Eds.), Proceeding of DIS 97 (pp. 65-71). Society for Industrial and Applied Mathematics.
Grønbæk, K., Bouvin, N. O. & Sloth, L. (1997). Designing Dexter-based hypermedia services for the World Wide Web. In M. Bernstein, L. Carr & K. Østerbye (Eds.), Proceedings of the eighth ACM conference on Hypertext (pp. 146-156). Association for Computing Machinery. https://doi.org/10.1145/267437.267453
Cramer, R., Damgård, I. B. & Pedersen, T. P. (1997). Efficient and provable security amplifications. In M. Lomas (Ed.), Security Protocols: International Workshop Cambridge, United Kingdom, April 10-12, 1996 Proceedings (pp. 101-109). Springer. https://doi.org/10.1007/3-540-62494-5_9
Arge, L. A. (1997). External-Memory Algorithms with Applications in GIS. In M. V. Kreveld, J. Nievergelt, T. Roos & P. Widmayer (Eds.), Algorithmic Foundations of Geographic Information Systems (pp. 213-254). Springer.
Cramer, R. & Damgård, I. B. (1997). Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. In W. Fumy (Ed.), Advances in Cryptology - EUROCRYPT '97: International Conference on the Theory and Application of Cryptographic Techniques Konstanz, Germany, May 11-15, 1997 Proceedings (pp. 75-87). Springer. https://doi.org/10.1007/3-540-69053-0_7
Ernst, E. (1997). gbeta. Computer programme, Department of Computer Science, Aarhus University.
Grønbæk, K. & Trigg, R. (1997). Heterogeneity, Structure and CSCW: Three Challenges for Open Hypermedia. In Proceedings of the 8th ACM International Conference on Hypertext Association for Computing Machinery.
Danvy, O. & Rose, K. H. (1997). Higher-Order Rewriting and Partial Evaluation. BRICS Report Series, (RS-97-46).
Wigard, J., Nielsen, T. T. & Mogensen, P. E. (1997). Improved Intelligent Underlay-Overlay Combined with Frequency Hopping in GSM. In The 8th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 1997. 'Waves of the Year 2000'. PIMRC '97. : 'Waves of the Year 2000'. PIMRC '97. IEEE Computer Society Press. https://doi.org/10.1109/PIMRC.1997.630948
Grønbæk, K. & Mogensen, P. H. (1997). Informing General CSCW Product Development through Cooperative Design in Specific Work Domains. Computer Supported Cooperative Work (CSCW): The Journal of Collaborative Computing and Work Practices, 6(4), 275-304. https://doi.org/10.1023/A:1008626106968
Bødker, S. (1997). Interative design, hands-on experience and guiding lights. In Proceedings of the SIGCHI conference on Human factors in computing systems Association for Computing Machinery.
Alon, N., Dietzfelbinger, M., Miltersen, P. B., Petrank, E. & Tardos, G. (1997). Is linear hashing good? In Proceedings of the twenty-ninth annual ACM symposium on Theory of computing (pp. 465-474). Association for Computing Machinery. https://doi.org/10.1145/258533.258639
Danvy, O. & Schultz, U. P. (1997). Lambda-dropping: transforming recursive equations into programs with block structure. In PEPM '97 Proceedings of the 1997 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation (pp. 90-106). Association for Computing Machinery. https://doi.org/10.1145/258993.259007