Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Allan, C., Avgustinov, P., Christensen, A. S., Hendren, L., Kuzins, S., Lhot´ak, O., de Moor, O., Sereni, D., Sittampalam, G. & Tibble, J. (2005). Adding Trace Matching with Free Variables to AspectJ. In Proc. 20th International Conference on Object-Oriented Programming Systems, Languages and Applications, OOPSLA 2005 (pp. 345-364)
Ingstrup, M. & Hansen, K. M. (2005). A Declarative Approach to Architectural Reflection. In R. Nord, N. Medvidovic, R. Krikhaar, J. Stafford & J. Bosch (Eds.), 5th Working IEEE/IFIP Conference on Software Architecture (pp. 149-158). IEEE Computer Society Press. https://doi.org/10.1109/WICSA.2005.6
Petersen, M. G. (2005). Aesthetics of Interaction – a Pragmatist Perspective. In Aesthetic Approaches to Human-Computer Interaction: Proceedings of the NordiCHI 2004 Workshop (pp. 31-32). Department of Computer Science, Aarhus University.
Krukow, K. K., Nielsen, M. & Sassone, V. (2005). A Framework for Concrete Reputation-Systems. BRICS Report Series, (BRICS RS-05-23), 1-48.
Krukow, K. K., Nielsen, M. & Sassone, V. (2005). A Framework for Concrete Reputation-Systems with Applications to History-Based Access Control. In Proc. of 12th ACM Conference on Computer and Communications Security (pp. 260-269). Association for Computing Machinery. https://doi.org/10.1145/1102120.1102155
Iversen, J. (2005). An Action Compiler Targeting Standard ML. In J. Boyland & G. Hedin (Eds.), Electronic Notes in Theoretical Computer Science (Vol. 141/4, pp. 167-188). Pergamon Press.
Brønsted, J., Hansen, K. M. & Kristensen, L. M. (2005). An Infrastructure for a Traffic Warning System. In Proceedings of the International Conference on Pervasive Services 2005 (pp. 136-145). IEEE. https://doi.org/10.1109/PERSER.2005.1506402
Bennedsen, J. & Caspersen, M. E. (2005). An investigation of potential success factors for an introductory model-driven programming course. In The 2005 international workshop on Computing education research, ICER '05 Proceedings (Seattle, WA, USA, October 1-2, 2005) (pp. 155-163). Association for Computing Machinery. https://doi.org/10.1145/1089786.1089801
Agarwal, P. K., Arge, L. & Yi, K. (2005). An optimal dynamic interval stabbing-max data structure? In Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms (pp. 803-812). Society for Industrial and Applied Mathematics.
Bennedsen, J. B. & Caspersen, M. E. (2005). An Upcoming Study of Potential Success Factors for an Introductory Model-Driven Programming Course. In Proceedings of the 5th Koli Calling Conference on Computer Science Education (pp. 166-169). University of Joensuu.
Czumaj, A., Halldorsson, M. M., Lingas, A. & Nilsson, J. P. (2005). Approximation Algorithms for Optimization Problems in Graphs with Super logarithmic Tree width. Information Processing Letters, 94(2), 49-53.
Zhang, W. & Peng, C. (2005). A Program State Monitoring System. Journal of Tongji University, 33(10), 1385-1390.
Damgård, I. B., Salvail, L. & Pedersen, T. B. (2005). A Quantum Cipher with Near Optimal Key-Recycling. In V. Shoup (Ed.), Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings (pp. 494-510). Springer. https://doi.org/10.1007/11535218_30
Zhang, W. (2005). Architecturally Reconfigurable Development of Mobile Games. In 2nd International Conference on Embedded Software and Systems (ICESS-2005) (pp. 66-72). IEEE Computer Society Press. https://doi.org/10.1109/ICESS.2005.32
Kjærside, K., Kortbek, K. J., Møller, H. H. & Grønbæk, K. (2005). ARDressCode: Augmented Dressing Room with Tag-based Motion Tracking and Real-Time Clothes Simulation. In Proceedings of Central European Multimedia and Virtual Reality Conference European Association for Computer Graphics.
Lindgaard, T. & Grønbæk, K. (2005). Automatic geo-referencing of web-pages. In Proceedings of the IADIS International Conference on WWW/Internet 2005 (pp. 200-208). International Association for Development, IADIS.
Ernst, E., Ostermann, K. & Cook, W. R. (2005). A Virtual Class Calculus. Daimi Report Series (DAIMI PB), 577.
Jehøj, H., Bouvin, N. O. & Grønbæk, K. (2005). AwareDAV: A Generic WebDAV Notification Framework and Implementation. In Proceedings of 14th international World Wide Web Conference (pp. 180-189). Association for Computing Machinery. https://doi.org/10.1145/1060745.1060774
Bardram, J. E. & Bossen, C. (2005). A web of coordinative artifacts: collaborative work at a hospital ward. In GROUP 05 (pp. 168-176). Association for Computing Machinery.
Fitzi, M. (2005). Byzantine agreement given partial broadcast. Journal of Cryptology, 18(3), 191-217.
Brodal, G. S., Fagerberg, R. & Moruz, G. (2005). Cache-Aware and Cache-Oblivious Adaptive Sorting. In L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi & M. Yung (Eds.), Automata, Languages and Programming: 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005. Proceedings (pp. 576-588). Springer. https://doi.org/10.1007/11523468_47
Arge, L., Brodal, G. S. & Fagerberg, R. (2005). Cache-Oblivious Data Structures. In D. Mehta & S. Sahni (Eds.), Handbook of Data Structures and Applications CRC Press.
Arge, L., Brodal, G. S., Fagerberg, R. & Laustsen, M. (2005). Cache-Oblivious Planar Orthogonal Range Searching and Counting. In Proceedings of the twenty-first annual symposium on Computational geometry (pp. 160-169). Association for Computing Machinery. https://doi.org/10.1145/1064092.1064119
Arge, L., de Berg, M. & Haverkort, H. (2005). Cache-Oblivious R-trees. In J. Mitchell & G. Rote (Eds.), Proceedings of 21th ACM Symposium on Computational Geometry (pp. 170-179). Association for Computing Machinery.
Gallasch, G. E., Vanit-Anunchai, S., Billington, J. & Kristensen, L. M. (2005). Checking Language Inclusion On-The-Fly with the Sweep-line Method. In Sixth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (pp. 1-20). Department of Computer Science, University of Aarhus.
Lambov, B. Z. (2005). Complexity and Intensionality in a Type-1 Framework for Computable Analysis. In C.-H. L. Ong (Ed.), Computer Science Logic, 19th International Workshop, CSL 2005 Proceedings, 14th Annual Conference of the EACSL (Oxford, UK, August 22-25, 2005) (pp. 442-461). Springer LNCS.
Bødker, S. & Andersen, P. B. (2005). Complex Mediation. Journal of Human Computer Interaction, 20(4), 353-402.
Christiansen, C., Mailund, Pedersen, C. N. S. & Randers, M. (2005). Computing the Quartet Distance between Trees of Arbitrary Degree. In Proceedings of the 5th International Workshop on Algorithms in Bioinformatics (WABI) (pp. 77-88)
Damgård, I. B. & Ishai, Y. (2005). Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. In V. Shoup (Ed.), Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings (pp. 378-394). Springer. https://doi.org/10.1007/11535218_23
Gudmundsson, J., Haverkort, H. J. & van Krefeld, M. (2005). Constrained Higher-Order Delaunay Triangulations. Computational Geometry, 30(3), 271-277.
Benkert, M., Gudmundsson, J. & Haverkort, H. J. (2005). Constructing Interference-Minimal Networks. In Proc. 21th European Workshop on Computational Geometry (pp. 203-206). Technische Universiteit Eindhoven.
Danvy, O. & Nielsen, L. (2005). CPS Transformation of Beta-Redexes. Information Processing Letters, 94(5), 217-224. https://doi.org/10.1016/j.ipl.2005.02.002
Hirt, M., Nielsen, J. B. & Przydatek, B. (2005). Cryptographic Asynchronous Multi-party Computation with Optimal Resilience: Extended abstract. In R. Cramer (Ed.), Advances in Cryptology – EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings (pp. 322-340). Springer LNCS. https://doi.org/10.1007/11426639_19
Damgård, I. B., Salvail, L., Schaffner, C. & Fehr, S. (2005). Cryptography In The Bounded Quantum-Storage Model. In Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (pp. 449-458). IEEE. https://doi.org/10.1109/SFCS.2005.30
Zhang, W. & Ding, P. (2005). Debugging Environment for a Meta-programming Language. Mini-Micro Systems, 26(4), 707-709.
Filinski, A. & Rohde, H. K. (2005). Denotational Aspects of Untyped Normalization by Evaluation. BRICS Report Series, (RS-05-4).
Miltersen, P. B. & Vinodchandran, N. V. (2005). Derandomizing Arthur-Merlin Games using Hitting Sets. Computational Complexity, 14(3), 256-279. https://doi.org/10.1007/s00037-005-0197-7
Andersen, J. R., Bak, L., Grarup, S., Lund, K. V., Hansen, K. M. & Torgersen, M. (2005). Design, implementation, and evaluation of the Resilient Smalltalk embedded platform. Computer Languages, Systems and Structures, 31(3-4), 127-141. https://doi.org/10.1016/j.cl.2005.02.003