Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Winge, K., Haugaard, R. & Merritt, T. R. (2014). VAL: Visually Augmented Laser cutting to enhance and support creativity. In IEEE International Symposium on Mixed and Augmented Reality - Media, Arts, Social Science, Humanities and Design, ISMAR 2014, Proceedings (pp. 31-34). Article 6935435 IEEE. https://doi.org/10.1109/ISMAR-AMH.2014.6935435
Sørensen, T. S., Mosegaard, J., Kislinskiy, S. & Greil, G. (2014). Virtual Surgery in Congenital Heart Disease. In F. Saremi (Ed.), Cardiac CT and MR for Adult Congenital Heart Disease (pp. 515-523). Springer. https://doi.org/10.1007/978-1-4614-8875-0_23
Klokmose, C. N., Korn, M. & Blunck, H. (2014). WiFi proximity detection in mobile web applications. In EICS 2014 - Proceedings of the 2014 ACM SIGCHI Symposium on Engineering Interactive Computing Systems (pp. 123-128). Association for Computing Machinery. https://doi.org/10.1145/2607023.2610281
Dalgaard, L. G., Grönvall, E. & Verdezoto, N. (2013). Accounting for Medication Particularities: Designing for Everyday Medication Management. In V. Osman, A. Campbell & P. Lukowicz (Eds.), The 7th International Conference on Pervasive Computing Technologies for Healthcare (pp. 137-144). IEEE. https://doi.org/10.4108/pervasivehealth.2013.252058
Dupont-Dupuis, F., Fawzi, O. & Wehner, S. (2013). Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling. In R. Canetti & J. A. Garay (Eds.), Advances in Cryptology – CRYPTO 2013: 33rd Annual Conference. Proceedings, Part II (pp. 326-343 ). Springer VS. https://doi.org/10.1007/978-3-642-40084-1_19
Chan, T. M. & Wilkinson, B. T. (2013). Adaptive and Approximate Orthogonal Range Counting. In S. Khanna (Ed.), Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2013 (pp. 241-251). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611973105.18
Kalkofen, D., Veas, E., Zollmann, S., Steinberger, M. & Schmalstieg, D. (2013). Adaptive ghosted views for Augmented Reality. In 2013 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2013 (pp. 1-9). Article 6671758 https://doi.org/10.1109/ISMAR.2013.6671758
Zhu, F., Zhang, Z. & Qu, Q. (2013). A direct mining approach to efficient constrained graph pattern discovery. Association for Computing Machinery. Special Interest Group on Management of Data. International Conference Proceedings, 821-832. https://doi.org/10.1145/2463676.2463723
Hansen, T. D., Ibsen-Jensen, R. & Miltersen, P. B. (2013). A Faster Algorithm for Solving One-Clock Priced Timed Games. In P. R. D*Argenio & H. Melgratti (Eds.), CONCUR 2013 – Concurrency Theory: 24th International Conference, CONCUR 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings (pp. 531-545). Springer VS. https://doi.org/10.1007/978-3-642-40184-8_37
Arge, L. & Tsirogiannis, C. (2013). Algorithms for Computing Prominence on Grid Terrains. In C. Knoblock, M. Schneider, P. Peer Kröger , J. Krumm & P. Widmayer (Eds.), Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS 2013) (pp. 254-263 ). Association for Computing Machinery. http://dl.acm.org/citation.cfm?id=2525314.2594229&coll=DL&dl=ACM&CFID=448731544&CFTOKEN=20995598
Olsen, M. & Revsbæk, M. (2013). Alliances and Bisection Width for Planar Graphs. In S. K. Ghosh & T. Tokuyama (Eds.), WALCOM: Algorithms and Computation: 7th International Workshop, WALCOM 2013, Kharagpur, India, February 14-16, 2013. Proceedings (pp. 206-216). Springer VS. https://doi.org/10.1007/978-3-642-36065-7_20
Simmons , R. J. & Zerny, I. (2013). A logical correspondence between natural semantics and abstract machines. In R. Peña & T. Schrijvers (Eds.), Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming, PPDP '13 (pp. 109-119 ). Association for Computing Machinery. https://doi.org/10.1145/2505879.2505899
Gutin, G., Jones, M., Scheder, D. & Yeo, A. (2013). A new bound for 3-satisfiable MaxSat and its algorithmic application. Information and Computation, 231(October), 117-124. https://doi.org/10.1016/j.ic.2013.08.008
Kohlweiss , M., Maurer , U., Onete , C., Tackmann , B. & Venturi, D. (2013). Anonymity-Preserving Public-Key Encryption: A Constructive Approach. In E. De Cristofaro & M. Wright (Eds.), Privacy Enhancing Technologies: 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings (pp. 19-39). Springer VS. https://doi.org/10.1007/978-3-642-39077-7_2
Arge, L., Brodal, G. S., Truelsen, J. & Tsirogiannis, C. (2013). An optimal and practical cache-oblivious algorithm for computing multiresolution rasters. In Algorithms – ESA 2013: 21st Annual European Symposium, Sophia Antipolis, France, September 2-4, 2013. Proceedings (pp. 61-72). Springer VS. https://doi.org/10.1007/978-3-642-40450-4_6
Afshani, P., Agarwal, P. K., Arge, L., Larsen, K. G. & Phillips, J. (2013). (Approximate) Uncertain Skylines. Theory of Computing Systems, 52(3), 342-366. https://doi.org/10.1007/s00224-012-9382-7
Frederiksen, S. K. S. & Miltersen, P. B. (2013). Approximating the Value of a Concurrent Reachability Game in the Polynomial Time Hierarchy. In L. Cai, S.-W. Cheng & T.-W. Lam (Eds.), Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (pp. 457-467 ). Springer VS. https://doi.org/10.1007/978-3-642-45030-3_43
Christensen, H. B. & Hansen, K. M. (2013). Architectural Slicing: Towards Automatic Harvesting of Architectural Prototypes. In K. Drira (Ed.), Software Architecture : 7th European Conference, ECSA 2013, Montpellier, France, July 1-5, 2013. Proceedings (pp. 316-319 ). Springer VS. https://doi.org/10.1007/978-3-642-39031-9_28
Grönvall, E. (2013). Aspects of family-managed care at home. Paper presented at Workshop at CSCW at the Boundary of Work and Life , Paphos, Cyprus. http://cscwworkandlife.wordpress.com/
Brodal, G. S. (2013). A Survey on Priority Queues. In A. Brodnik, A. López-Ortiz, V. Raman & A. Viola (Eds.), Space-Efficient Data Structures, Streams, and Algorithms: Papers in Honor of J. Ian Munro on the Occasion of His 66th Birthday (pp. 150-163 ). Springer VS. https://doi.org/10.1007/978-3-642-40273-9_11
Zerny, I. & Danvy, O. (2013). A synthetic operational account of call-by-need evaluation. In R. Peña & T. Schrijvers (Eds.), Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming, PPDP '13 (pp. 97-108). Association for Computing Machinery. https://doi.org/10.1145/2505879.2505898
Jensen, C. S., Prasad, M. R. & Møller, A. (2013). Automated Testing with Targeted Event Sequence Generation. In M. Pezzè & M. Harman (Eds.), International Symposium on Software Testing and Analysis (ISSTA), 2013: Proceedings (pp. 67-77). Association for Computing Machinery. https://doi.org/10.1145/2483760.2483777
Grönvall, E. & Verdezoto, N. (2013). Beyond Self-Monitoring: Understanding Non-functional Aspects of Home-based Healthcare Technology. In F. Mattern & S. Santini (Eds.), Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing, UbiComp '13 (pp. 587-596 ). Association for Computing Machinery. https://doi.org/10.1145/2493432.2493495
Bødker, S. (2013). Boundaries, work and the rest. Paper presented at Workshop at CSCW at the Boundary of Work and Life , Paphos, Cyprus. http://cscwworkandlife.wordpress.com/
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2013). Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier. In K. Sako & P. Sarkar (Eds.), Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (pp. 140-160 ). Springer VS. https://doi.org/10.1007/978-3-642-42045-0_8
Kaul, M., Yang, B. & Jensen, C. S. (2013). Building Accurate 3D Spatial Networks to Enable Next Generation Intelligent Transportation Systems. In IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1 ) (pp. 137 - 146 ). IEEE. https://doi.org/10.1109/MDM.2013.24
Bødker, S. & Grönvall, E. (2013). Calendars: Time coordination and overview in families and beyond. In O. W. Bertelsen, L. Ciolfi, M. A. Grasso & G. A. Papadopoulos (Eds.), ECSCW 2013 : Proceedings of the 13th European Conference on Computer Supported Cooperative Work, 2013 (pp. 63-81). Springer VS. https://doi.org/10.1007/978-1-4471-5346-7_4
Vitanov, A., Dupont-Dupuis, F., Tomamichel, M. & Renner, R. (2013). Chain rules for smooth min-and max-entropies. I E E E Transactions on Information Theory, 59(5), 2603-2612. https://doi.org/10.1109/TIT.2013.2238656
Sükösd, Z., Knudsen, B., Anderson, J. WJ., Novák, A., Kjems, J. & Pedersen, C. N. S. (2013). Characterising RNA secondary structure space using information entropy. BMC Bioinformatics, 14 (Suppl 2), 1-9. Article S22. https://doi.org/10.1186/1471-2105-14-S2-S22
Smith, A. B., Sandel, B., Kraft, N. J. B. & Carey, S. (2013). Characterizing scale-dependent community assembly using the functional-diversity-area relationship. Ecology, 94(11), 2392-2402.
Arge, L., Goodrich, M. T. & Walderveen, F. V. (2013). Computing betweenness centrality in external memory. In Proceedings, 2013 IEEE International Conference on Big Data (pp. 368 - 375 ). IEEE. https://doi.org/10.1109/BigData.2013.6691597
Tsirogiannis, C. & Sandel, B. S. (2013). Computing the Skewness of the Phylogenetic Mean Pairwise Distance in Linear Time. In A. Darling & J. Stoye (Eds.), Algorithms in Bioinformatics: 13th International Workshop, WABI 2013, Sophia Antipolis, France, September 2-4, 2013. Proceedings (pp. 170-184). Springer VS. https://doi.org/10.1007/978-3-642-40453-5_14
Rasmusson, A., Sørensen, T. S. & Ziegler, G. (2013). Connected Components Labeling on the GPU with Generalization to Voronoi Diagrams and Signed Distance Fields. In G. Bebis et al. (Ed.), Advances in Visual Computing: 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part I (pp. 206-215). Springer VS. https://doi.org/10.1007/978-3-642-41914-0_21
Damgård, I. B. & Zakarias, S. (2013). Constant-overhead secure computation of Boolean circuits using preprocessing. In A. Sahai (Ed.), Theory of Cryptography: 10th TCC 2013. Proceedings (pp. 621-641). Springer VS. https://doi.org/10.1007/978-3-642-36594-2_35
Schmidt, K. & Bannon, L. J. (2013). Constructing CSCW: The First Quarter Century. Computer Supported Cooperative Work (CSCW): The Journal of Collaborative Computing and Work Practices, 22(4-6), 345-372. https://doi.org/10.1007/s10606-013-9193-7