Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Li, X., Ceikute, V., Jensen, C. S. & Tan, K.-L. (2013). Trajectory Based Optimal Segment Computation in Road Network Databases. In C. Knoblock & M. Schneider (Eds.), Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL'13 (pp. 396-399 ). Association for Computing Machinery. https://doi.org/10.1145/2525314.2525444
Jensen, K., Aalst, W. M. V. D., Balbo, G., Koutny, M. & Wolf, K. (Eds.) (2013). Transactions on Petri Nets and Other Models of Concurrency VII: ToPNoC. Springer VS. Lecture Notes in Computer Science Vol. 7480 https://doi.org/10.1007/978-3-642-38143-0
Scheder, D. (2013). Trivial, tractable, hard. A not so sudden complexity jump in neighborhood restricted CNF formulas. In L. Cai, S.-W. Cheng & A.-W. Lam (Eds.), Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (pp. 251-261). Springer VS. https://doi.org/10.1007/978-3-642-45030-3_24
Damgård, I. B. & Scafuro, A. (2013). Unconditionally Secure and Universally Composable Commitments from Physical Assumptions. In K. Sako & P. Sarkar (Eds.), Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (pp. 100-119 ). Springer VS. https://doi.org/10.1007/978-3-642-42045-0_6
Meldgaard, S. T. (2013). Unconditionally Secure Protocols. Institut for Datalogi, Aarhus Universitet.
Grönvall, E. & Verdezoto, N. (2013). Understanding Challenges and Opportunities of Preventive Blood Pressure Self-Monitoring at Home. In P. Palanque , F. Détienne & A. Tricot (Eds.), Proceedings of the 31st European Conference on Cognitive Ergonomics (ACM ECCE 2013) Association for Computing Machinery. https://doi.org/10.1145/2501907.2501962
Turon, A., Dreyer , D. & Birkedal, L. (2013). Unifying refinement and hoare-style reasoning in a logic for higher-order concurrency. In G. Morrisett & T. Uustalu (Eds.), Proceedings of the 18th ACM SIGPLAN International Conference on Functional Programming, ICFP '13 (pp. 377-390 ). Association for Computing Machinery. https://doi.org/10.1145/2500365.2500600
Scheder, D. (2013). Unsatisfiable CNF formulas contain many conflicts. In L. Cai, S.-W. Cheng & T.-W. Lam (Eds.), Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (pp. 273-283). Springer VS. https://doi.org/10.1007/978-3-642-45030-3_26
Brewster, S. & Bødker, S. (2013). Welcome to CHI 2013! Conference on Human Factors in Computing Systems - Proceedings, 2013-April, vii.
Gao, X. A. G., Zhang, J. & Chen, Y. (2013). What you jointly know determines how you act: Strategic interactions in prediction markets. In Proceedings of of the fourteenth ACM Conference on Electronic Commerce, EC '13 (pp. 489-506). Association for Computing Machinery. https://doi.org/10.1145/2482540.2482592
Pastro, V. (2013). Zero-Knowledge Protocols and Multiparty Computation. Department of Computer Science, Aarhus University.
Jawurek, M., Kerschbaum, F. & Orlandi, C. (2013). Zero-knowledge using garbled circuits: Or how to prove non-algebraic statements efficiently. In A.-R. Sadeghi , V. Gligor & M. Yung (Eds.), Proceedings of the ACM Conference on Computer and Communications Security, CCS '13 (pp. 955-966). Association for Computing Machinery. https://doi.org/10.1145/2508859.2516662
Urazimbetova, S. (2012). A Case Study - On Patient Empowerment and Integration of Telemedicine to National Healthcare Services. Paper presented at International Conference on Health Informatics, Vilamoura, Algarve, Portugal. https://doi.org/10.5220/0003870902630269
Šidlauskas, D., Jensen, C. S. & Šaltenis , S. (2012). A comparison of the use of virtual versus physical snapshots for supporting update-intensive workloads. In Proceedings of the Eighth International Workshop on Data Management on New Hardware: DaMoN '12 (pp. 1-8). Association for Computing Machinery. https://doi.org/10.1145/2236584.2236585
Dupuis, F., Nielsen, J. B. & Salvail, L. (2012). Actively Secure Two-Party Evaluation of Any Quantum Operation. Lecture Notes in Computer Science, 7417, 794-811. https://doi.org/10.1007/978-3-642-32009-5_46
Backes, M., Goldberg, I., Kate, A. & Toft, T. (2012). Adding query privacy to robust DHTs. In ASIACCS '12 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (pp. 30-31 ). Association for Computing Machinery. https://doi.org/10.1145/2414456.2414473
Bitsch, J. E. & Bouvin, N. O. (2012). Ad-hoc Symbiotic Interactive Displays through DLNA. In IEEE International Conference on Pervasive Computing and Communications (PerCom), 2012 (pp. 57-65). IEEE Computer Society Press. https://doi.org/10.1109/PerCom.2012.6199849
Alrøe, T. F., Grann, J., Grönvall, E., Petersen, M. G. & L. Rasmussen, J. (2012). Aerial Tunes : Exploring Interaction Qualities of Mid-air Displays. In Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making sense through design (NordiCHI 2012), (pp. 514-523). Association for Computing Machinery. https://doi.org/10.1145/2399016.2399095
Lu, H., Cao, X. & Jensen, C. S. (2012). A Foundation for Efficient Indoor Distance-Aware Query Processing. In IEEE 28th International Conference on Data Engineering (ICDE) (pp. 438 -449). IEEE Press. https://doi.org/10.1109/ICDE.2012.44
Dang, X.-H., Ong, K.-L. & Lee, V. (2012). An Adaptive Algorithm for Finding Frequent Sets in Landmark Windows. Lecture Notes in Computer Science, 7520, 590-597 . https://doi.org/10.1007/978-3-642-33362-0_47
Nielsen, J. B., Nordholt, P. S., Orlandi, C. & Burra, S. S. (2012). A New Approach to Practical Active-Secure Two-Party Computation. Lecture Notes in Computer Science, 7417, 681-700 . https://doi.org/10.1007/978-3-642-32009-5_40
Agarwal, P. K., Arge, L., Kaplan, H., Molad, E., Tarjan, R. E. & Yi, K. (2012). An Optimal Dynamic Data Structure for Stabbing-Semigroup Queries. S I A M Journal on Computing, 41(1), 104–127. https://doi.org/10.1137/10078791X
Assent, I., Kranen, P., Baldauf, C. & Seidl, T. (2012). AnyOut : Anytime Outlier Detection Approach for High-dimensional Data. Lecture Notes in Computer Science, 7238, 228-242. https://doi.org/10.1007/978-3-642-29038-1_18
Magnani, M., Assent, I. & Mortensen, M. L. (2012). Anytime skyline query processing for interactive systems. Paper presented at International Workshop on Ranking in Databases, Istanbul, Turkey. http://chenwsdb.fulton.ad.asu.edu/DBRank2012/
Sitchinava, N. & Zeh, N. (2012). A parallel buffer tree. In Proceedings of the 24th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA (pp. 214-223). Association for Computing Machinery. https://doi.org/10.1145/2312005.2312046
Hachisuka, T., Pantaleoni, J. & Jensen, H. W. (2012). A Path Space Extension for Robust Light Transport Simulation. A C M Transactions on Graphics, 31(6), Article 191. https://doi.org/10.1145/2366145.2366210
Cao, X., Cong, G., Cui, B., Jensen, C. S. & Yuan, Q. (2012). Approaches to Exploring Category Information for Question Retrieval in Community Question-Answer Archives. A C M Transactions on Information Systems, 30(2), Article No. 7 . https://doi.org/10.1145/2180868.2180869
Jurik, B. A. & Nielsen, J. A. S. (2012). Audio Quality Assurance : An Application of Cross Correlation. In Proceedings of the 9th International Conference on Preservation of Digital Objects, iPRES (pp. 144-149). Digital Curation Institute, University of Toronto. http://www.scape-project.eu/publication/audio-quality-assurance
Møller, A. & Schwarz, M. (2012). Automated Detection of Client-State Manipulation Vulnerabilities. In M. Glinz, G. Murphy & M. Pezzè (Eds.), 34th International Conference on Software Engineering (ICSE 2012) : Proceedings (pp. 749 - 759 ). IEEE Communications Society. https://doi.org/10.1109/ICSE.2012.6227143
Hansen, M. T., Kusy, B., Jurdak, R. & Langendoen, K. (2012). AutoSync : Automatic duty-cycle control for synchronous low-power listening. In 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) (pp. 139 - 147 ). IEEE Signal Processing Society. https://doi.org/10.1109/SECON.2012.6275770