Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Pastro, V. (2013). Zero-Knowledge Protocols and Multiparty Computation. Department of Computer Science, Aarhus University.
Jawurek, M., Kerschbaum, F. & Orlandi, C. (2013). Zero-knowledge using garbled circuits: Or how to prove non-algebraic statements efficiently. In A.-R. Sadeghi , V. Gligor & M. Yung (Eds.), Proceedings of the ACM Conference on Computer and Communications Security, CCS '13 (pp. 955-966). Association for Computing Machinery. https://doi.org/10.1145/2508859.2516662
Urazimbetova, S. (2012). A Case Study - On Patient Empowerment and Integration of Telemedicine to National Healthcare Services. Paper presented at International Conference on Health Informatics, Vilamoura, Algarve, Portugal. https://doi.org/10.5220/0003870902630269
Šidlauskas, D., Jensen, C. S. & Šaltenis , S. (2012). A comparison of the use of virtual versus physical snapshots for supporting update-intensive workloads. In Proceedings of the Eighth International Workshop on Data Management on New Hardware: DaMoN '12 (pp. 1-8). Association for Computing Machinery. https://doi.org/10.1145/2236584.2236585
Dupuis, F., Nielsen, J. B. & Salvail, L. (2012). Actively Secure Two-Party Evaluation of Any Quantum Operation. Lecture Notes in Computer Science, 7417, 794-811. https://doi.org/10.1007/978-3-642-32009-5_46
Backes, M., Goldberg, I., Kate, A. & Toft, T. (2012). Adding query privacy to robust DHTs. In ASIACCS '12 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (pp. 30-31 ). Association for Computing Machinery. https://doi.org/10.1145/2414456.2414473
Bitsch, J. E. & Bouvin, N. O. (2012). Ad-hoc Symbiotic Interactive Displays through DLNA. In IEEE International Conference on Pervasive Computing and Communications (PerCom), 2012 (pp. 57-65). IEEE Computer Society Press. https://doi.org/10.1109/PerCom.2012.6199849
Alrøe, T. F., Grann, J., Grönvall, E., Petersen, M. G. & L. Rasmussen, J. (2012). Aerial Tunes : Exploring Interaction Qualities of Mid-air Displays. In Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making sense through design (NordiCHI 2012), (pp. 514-523). Association for Computing Machinery. https://doi.org/10.1145/2399016.2399095
Lu, H., Cao, X. & Jensen, C. S. (2012). A Foundation for Efficient Indoor Distance-Aware Query Processing. In IEEE 28th International Conference on Data Engineering (ICDE) (pp. 438 -449). IEEE Press. https://doi.org/10.1109/ICDE.2012.44
Dang, X.-H., Ong, K.-L. & Lee, V. (2012). An Adaptive Algorithm for Finding Frequent Sets in Landmark Windows. Lecture Notes in Computer Science, 7520, 590-597 . https://doi.org/10.1007/978-3-642-33362-0_47
Nielsen, J. B., Nordholt, P. S., Orlandi, C. & Burra, S. S. (2012). A New Approach to Practical Active-Secure Two-Party Computation. Lecture Notes in Computer Science, 7417, 681-700 . https://doi.org/10.1007/978-3-642-32009-5_40
Agarwal, P. K., Arge, L., Kaplan, H., Molad, E., Tarjan, R. E. & Yi, K. (2012). An Optimal Dynamic Data Structure for Stabbing-Semigroup Queries. S I A M Journal on Computing, 41(1), 104–127. https://doi.org/10.1137/10078791X
Assent, I., Kranen, P., Baldauf, C. & Seidl, T. (2012). AnyOut : Anytime Outlier Detection Approach for High-dimensional Data. Lecture Notes in Computer Science, 7238, 228-242. https://doi.org/10.1007/978-3-642-29038-1_18
Magnani, M., Assent, I. & Mortensen, M. L. (2012). Anytime skyline query processing for interactive systems. Paper presented at International Workshop on Ranking in Databases, Istanbul, Turkey. http://chenwsdb.fulton.ad.asu.edu/DBRank2012/
Sitchinava, N. & Zeh, N. (2012). A parallel buffer tree. In Proceedings of the 24th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA (pp. 214-223). Association for Computing Machinery. https://doi.org/10.1145/2312005.2312046
Hachisuka, T., Pantaleoni, J. & Jensen, H. W. (2012). A Path Space Extension for Robust Light Transport Simulation. A C M Transactions on Graphics, 31(6), Article 191. https://doi.org/10.1145/2366145.2366210
Cao, X., Cong, G., Cui, B., Jensen, C. S. & Yuan, Q. (2012). Approaches to Exploring Category Information for Question Retrieval in Community Question-Answer Archives. A C M Transactions on Information Systems, 30(2), Article No. 7 . https://doi.org/10.1145/2180868.2180869
Jurik, B. A. & Nielsen, J. A. S. (2012). Audio Quality Assurance : An Application of Cross Correlation. In Proceedings of the 9th International Conference on Preservation of Digital Objects, iPRES (pp. 144-149). Digital Curation Institute, University of Toronto. http://www.scape-project.eu/publication/audio-quality-assurance
Møller, A. & Schwarz, M. (2012). Automated Detection of Client-State Manipulation Vulnerabilities. In M. Glinz, G. Murphy & M. Pezzè (Eds.), 34th International Conference on Software Engineering (ICSE 2012) : Proceedings (pp. 749 - 759 ). IEEE Communications Society. https://doi.org/10.1109/ICSE.2012.6227143
Hansen, M. T., Kusy, B., Jurdak, R. & Langendoen, K. (2012). AutoSync : Automatic duty-cycle control for synchronous low-power listening. In 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) (pp. 139 - 147 ). IEEE Signal Processing Society. https://doi.org/10.1109/SECON.2012.6275770
Borchorst, N. G., McPhail, B., Smith, K. L., Ferenbok, J. & Clement, A. (2012). Bridging Identity Gaps : Supporting Identity Performance in Citizen Service Encounters. Computer Supported Cooperative Work (CSCW): The Journal of Collaborative Computing and Work Practices, 21(6), 555-590 . https://doi.org/10.1007/s10606-012-9163-5
Brody, J. E., Chakrabarti, A., McGregor, A. & Kondapally, R. (2012). Certifying Equality With Limited Interaction. Electronic Colloquium on Computational Complexity, (TR12-153 ). http://eccc.hpi-web.de/report/2012/153/
Kjærgaard, M. B. & Nurmi, P. (2012). Challenges for Social Sensing using WiFi Signals. In Proceedings of the 1st ACM workshop on Mobile systems for computational social science, MCSS '12 (pp. 17-21 ). Association for Computing Machinery. https://doi.org/10.1145/2307863.2307869
Sandel, B. S. & Dangremond, E. (2012). Climate change and the invasion of California by grasses. Global Change Biology, 18(1), 277.
Assent, I. (2012). Clustering high dimensional data. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 2(4), 340-350. https://doi.org/10.1002/widm.1062
Pastro, V. (2012). Construction of rational elliptic surfaces with Mordell-Weil rank four. Commentarii Mathematici Universitatis Sancti Pauli, 61(1), 29-42.
Wagner, S. R., Rasmussen, N. H., Ahrendt, P., Toftegaard, T. S. & Bertelsen, O. W. (2012). Context classification during blood pressure self-measurement using the sensor seat and the audio classification device. In The 6th International Conference on Pervasive Computing Technologies for Healthcare and Workshops (pp. 201 - 202 ). ICST, The Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=6240390
Graham, C., Muthukrishnan, S., Yi, K. & Zhang, Q. (2012). Continuous sampling from distributed streams: Article No.: 10. Journal of the ACM, 59(2). https://doi.org/10.1145/2160158.2160163