Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Bertelsen, O. W., Breinbjerg, M. & Pold, S. (2008). Tool – Material, Metaphor – Metonymy, Instrument(ness). In J. J. Jensen (Ed.), Proceedings of the Eighth Danish Human-Computer Interaction Research Symposium (pp. 5-9). Aalborg Universitetsforlag.
Danvy, O. (2008). Towards Compatible and Interderivable Semantic Specifications for the Scheme Programming Language, Part I: Denotational Semantics, Natural Semantics, and Abstract Machines. In W. Clinger (Ed.), Proceedings of the 2008 ACM SIGPLAN Workshop on Scheme and Functional Programming (pp. 21-36). Association for Computing Machinery.
Biernacka, M. & Danvy, O. (2008). Towards Compatible and Interderivable Semantic Specifications for the Scheme Programming Language, Part II: Reduction Semantics and Abstract Machines. In W. Clinger (Ed.), Proceedings of the 2008 ACM SIGPLAN Workshop on Scheme and Functional Programming (pp. 37-48). Association for Computing Machinery.
Hansen, K. M., Zhang, W. & Ingstrup, M. (2008). Towards Self-Managed Executable Petri Nets. In S. Brueckner, P. Robertson & U. Bellur (Eds.), Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems (pp. 287-296). IEEE Computer Society Press. https://doi.org/10.1109/SASO.2008.59
Jensen, K., Aalst, W. M. P. V. D. & Billington, J. (Eds.) (2008). Transactions on Petri Nets and Other Models of concurrency I: ToPNoC. Springer. Lecture Notes in Computer Science Vol. 5100 https://doi.org/10.1007/978-3-540-89287-8
van der Aalst, W. M. P. & Lassen, K. B. (2008). Translating Unstructured Workflow Processes to Readable BPEL: Theory and Implementation. Information and Software Technology, 50(3), 131-159.
Ferragina, P. & Satti, S. R. (2008). Tree Compression and Indexing. In Encyclopedia of Algorithms (pp. 1-99). Springer.
Nielsen, M., Krukow, K. & Sassone, V. (2008). Trust Models in Ubiquitous Computing. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 366(1881), 3781-3793. https://doi.org/10.1098/rsta.2008.0134
Boudol, G., Castellani, I., Hennessy, M., Nielsen, M. & Winskel, G. (2008). Twenty Years on: Reflections on the CEDISYS Project: Combining True Concurrency with Process Algebra. Lecture Notes in Computer Science, 5065, 757-777. https://doi.org/10.1007/978-3-540-68679-8_47
Westergaard, M. & Kristensen, L. M. (2008). Two Interfaces to the CPN Tools Simulator. In Ninth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (pp. 83-102). Department of Computer Science.
Bødker, S. & Sundblad, Y. (2008). Usability and Interaction Design - New Challenges for the Scandinavian Tradition. Behaviour and Information Technology, 27(4), 293-300.
Bouvin, N. O. & Albertsen, J. (2008). User Defined Structural Searches in MediaWiki. In Proceedings of the nineteenth ACM conference on Hypertext and hypermedia. (pp. 15-20). Association for Computing Machinery. https://doi.org/10.1145/1379092.1379099
Caspersen, M. E., Cassel, L. N., Davies, G., Pears, A., Seidman, S. & Topi, H. (2008). What is Masters Level Education in Informatics. In Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2008 (pp. 341). Association for Computing Machinery. https://doi.org/10.1145/1384271.1384383
Büscher, M., Mogensen, P. H. & Kristensen, M. (2008). When and How (Not) to Support IT? Supporting virtual emergency teamwork. In F. Fiedrich & B. Van de Walle (Eds.), ISCRAM 2008,: Technology Showcase - Communication Systems and Technologies for Crisis and Disaster Responses (Vol. Session 2, Track 2, pp. 167-176)
Boubertakh, R., Batchelor, P., Uribe, S., Sørensen, T. S., Hansen, M. S., Razavi, R. & Schaeffter, T. (2008). Whole-Heart Imaging Using Undersampled Radial Phase Encoding and a 32-Channel Cardiac Coil. In Proceedings of the 16th Meeting and Exhibition of the International Society for Magnetic Resonance in Medicine (pp. 6). ISMRM.
Caspersen, M. E., Börstler, J., Decker, A. & Alphonce, C. (2008). Worked Examples for Sound Object-Oriented Pedagogy: The Seventh "Killer" Workshop. In Companion to the 23rd ACM SIGPLAN Conference on Object-oriented programming systems languages and applications (pp. 869). Association for Computing Machinery. https://doi.org/10.1145/1449814.1449888
Nielsen, M., Krukow, K. & Sassone, V. (2007). A Bayesian Model for Event-based Trust. Electronic Notes in Theoretical Computer Science, 172, 499-521. https://doi.org/10.1016/j.entcs.2007.02.017
Lee, J. (2007). A Case for Dynamic Reverse-code Generation. BRICS Report Series, (RS-07-15).
Støvring, K. & Lassen, S. B. (2007). A Complete, Co-Inductive Syntactic Theory of Sequential Control and State. In Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (Vol. 42, Issue1, pp. 161-172). Society for Industrial and Applied Mathematics.
Biernacka, M. & Danvy, O. (2007). A Concrete Framework for Environment Machines. A C M Transactions on Computational Logic, 9(1), 1-30.
Brynskov, M. (2007). Activity-Based Design as a Way to Bridge Artifacts, Professions, and Theories. In C. Brodersen, S. Bødker & C. N. Klokmose (Eds.), Multiple and Ubiquitous Interaction, 28. - 30. March 2007: Book of Abstracts (pp. 21-24)
Wang, H., Schwefel, H.-P. & Toftegaard, T. S. (2007). Adaptive Modulation for a Downlink Multicast Channel in OFDMA Systems. In IEEE Wireless Communications and Networking Conference. WCNC 2007. (pp. 650-655). IEEE Computer Society Press. https://doi.org/10.1109/WCNC.2007.125
Nielsen, J. D. & Schwartzbach, M. I. (2007). A Domain-Specific Programming Language for Secure Multiparty Computation. In Preceedings of the 2007 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (pp. 21-31). Society for Industrial and Applied Mathematics. https://doi.org/10.1145/1255329.1255333
Aagaard, L., Amarzguioui, M., Sun, G., Santos, L. C., Ehsani, A., Prydz, H. & Rossi, J. J. (2007). A Facile Lentiviral Vector System for Expression of Doxycycline-Inducible shRNAs: Knockdown of the Pre-miRNA Processing Enzyme Drosha. Molecular Therapy, 15(5), 938-945. https://doi.org/10.1038/sj.mt.6300118
Westergaard, M. (2007). A Game-theoretic View on Behavioural Visualisation. In A. Cerone & P. Curzon (Eds.), Electronic Notes in Theoretical Computer Science: Proceedings of the 2nd International Workshop on Formal Methods for Interactive Systems (FMIS 2007) (Vol. 208, pp. 113-129). Pergamon Press.
Brodal, G. S. & Jørgensen, A. G. (2007). A Linear Time Algorithm for the k Maximal Sums Problem. In L. Kucera & A. Kucera (Eds.), Mathematical Foundations of Computer Science 2007: 32nd International Symposium, MFCS 2007 Ceský Krumlov, Czech Republic, August 26-31, 2007 Proceedings (pp. 442-453). Springer. https://doi.org/10.1007/978-3-540-74456-6_40
Kjeldbjerg, A. L., Villesen, P., Aagaard, L. & Pedersen, F. S. (2007). An active 70 million year old viral infection in humans. Poster session presented at High Throughput Biology: Genomics, Fluxomics, Proteomics, and Interactomics, Denmark.
Brabrand, C., Giegerich, R. & Møller, A. (2007). Analyzing Ambiguity of Context-Free Grammars. In Proc. 12th International Conference on Implementation and Application of Automata
Miltersen, P. B. & Sørensen, T. B. (2007). A Near-Optimal Strategy for a Heads-Up No-Limit Texas Hold'em Poker Tournament. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (pp. 1168-1175) http://www.daimi.au.dk/~bromille/Papers/aamaspoker.pdf
Klokmose, C. N. (2007). An Instrumental Paradigm for Ubiquitous Interaction. In Conference Proceedings of ECCE 2007 Association for Computing Machinery.
McCauley, S., de Groot, S., Mailund, T. & Hein, J. (2007). Annotation of selection strengths in viral genomes. Bioinformatics, 23(22), 2978-2986. https://doi.org/10.1093/bioinformatics/btm472
Zhang, W. (2007). An Overview of Product Line Enabled Intelligent Mobile Middleware. In 31st Annual International Computer Software and Applications Conference IEEE Computer Society Press.
Brønsted, J. (2007). Anvendelser af Pervasive Communication. (2 ed.) Komialt - Vidennetværk for Pervasive Communication.
Hansen, T. R. & Bardram, J. (2007). Applying Mobile and Pervasive Computer Technology to Enhance Coordination of Work in a Surgical Ward. In Studies in Health Technology and Informatics: MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics - Building Sustainable Health Systems (Vol. 129, pp. 107-111). IOS Press. http://www.ncbi.nlm.nih.gov/sites/entrez?db=pubmed&uid=17911688&cmd=showdetailview&indexed=google
Damgård, I. B. (2007). A "proof-reading" of Some Issues in Cryptography. In Automata, Languages and Programming: 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007. Proceedings (pp. 2-11). Springer. https://doi.org/10.1007/978-3-540-73420-8_2
Danvy, O. & Millikin, K. (2007). A Rational Deconstruction of Landin's J Operator. Lecture Notes in Computer Science, 4015, 55-73.
Petersen, M. G. & Pagter, J. I. (2007).  A Sense of Security in Pervasive Computing - is the light on when the refrigerator door is closed? In R. Dhamija & S. Dietrich (Eds.), Financial and Cryptography and Data Security: 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 2007, Revised Selecgted Papers (Vol. LNCS 4886, pp. 383-388). Springer.