Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Jacobsen, H., Kyng, M. & Mathiassen, L. (1979). EDB - elektronisk databehandling. AOF's Forlag. DUE TEMAHÆFTE No. 2
Jacobsen, H., Kyng, M. & Mathiassen, L. (1981). EDB til styring, planlægning og kontrol. AOF' Forlag. DUE TEMAHÆFTE No. 3
Jacobs, K., Timany, A. & Devriese, D. (2021). Fully abstract from static to gradual. Proceedings of the ACM on Programming Languages , 5(POPL), Article 7. https://doi.org/10.1145/3434288
Jacobs, K., Devriese, D. & Timany, A. (2022). Purity of an ST monad: Full abstraction by semantically typed back-translation. Proceedings of the ACM on Programming Languages , 6(OOPSLA1), Article 82. https://doi.org/10.1145/3527326
Jacobs, J., Hinrichsen, J. K. & Krebbers, R. (2023). Dependent Session Protocols in Separation Logic from First Principles (Functional Pearl). Proceedings of the ACM on Programming Languages , 7(ICFP), 768-795. Article 214. https://doi.org/10.1145/3607856
Jacob, R., Larsen, K. G. & Nielsen, J. B. (2019). Lower Bounds for Oblivious Data Structures. In T. M. Chan (Ed.), Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms (pp. 2439-2447). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611975482.149
Iversen, J. & Mosses, P. D. (Ed.) (2002). Type Inference for the New Action Notation. Paper presented at International Workshop on Action Semantics (AS 2002), København, Denmark.
Iversen, J. & Mosses, P. D. (2004). Constructive Action Semantics for Core ML. BRICS Report Series, (RS-04-37).
Iversen, O. S., Kanstrup, A. M. & Petersen, M. G. (2004). A Visit to the 'New Utopia': Revitalizing Democracy, Emancipation and Quality in Co-Operative Design. In ACM International Conference Proceeding Series: Proceedings of the third Nordic conference on Human-computer interaction (Vol. 82, pp. 171-179). Association for Computing Machinery. https://doi.org/10.1145/1028014.1028040
Iversen, O. S., Petersen, M. G. & Kanstrup, A.-M. (2004). A Visit to the 'New Utopia'. In Proceedings of the Third Nordic Conference on Human-Computer interaction (pp. 171-179). Association for Computing Machinery.
Iversen, J. (2005). An Action Compiler Targeting Standard ML. In J. Boyland & G. Hedin (Eds.), Electronic Notes in Theoretical Computer Science (Vol. 141/4, pp. 167-188). Pergamon Press.
Iversen, O. S. & Dindler, C. (2008). Pursuing Aesthetic Inquiry in Participatory Design. In J. Simonsen, T. Robertson & D. Hakken (Eds.), Proceedings of the Participatory Design Conference 2008, Bloomington IN, USA (pp. 138-145). The Trustees of Indiana University.
Iversen, O. S., Krogh, P. G. & Petersen, M. G. (2003). The Fifth Element - promoting the perspective of aesthetic interaction. In M. Hertzum & S. Heilesen (Eds.), Proceedings of the third Danish Human-Computer Interaction Research Symposium (pp. 45-50). Roskilde Universitet.
Ishai, Y., Kumarasubramanian, A., Orlandi, C. & Sahai, A. (2011). On Invertible Sampling and Adaptive Security. Lecture Notes in Computer Science, 6477, 466-482. https://doi.org/10.1007/978-3-642-17373-8_27
Ishai, Y., Kushilevitz, E., Meldgaard, S. T., Orlandi, C. & Paskin-Cherniavsky, A. (2013). On the Power of Correlated Randomness in Secure Computation. In A. Sahai (Ed.), Theory of Cryptography: 10th TCC 2013. Proceedings (pp. 600-620 ). Springer VS. https://doi.org/10.1007/978-3-642-36594-2_34
Ishai, Y., Patra, A., Patranabis, S., Ravi, D. & Srinivasan, A. (2022). Fully-Secure MPC with Minimal Trust. In Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings (pp. 470–501). Springer. https://doi.org/10.1007/978-3-031-22365-5_17
Ingstrup, M. & Hansen, K. M. (2005). A Declarative Approach to Architectural Reflection. In R. Nord, N. Medvidovic, R. Krikhaar, J. Stafford & J. Bosch (Eds.), 5th Working IEEE/IFIP Conference on Software Architecture (pp. 149-158). IEEE Computer Society Press. https://doi.org/10.1109/WICSA.2005.6
Ingstrup, M., Zhang, W., Hansen, K. M. & Fernandes, J. M. (2009). Architecting Self-Management in the Hydra Middleware. In A. Brinkmann, H.-J. Eikerling & M. Z. Aziz (Eds.), Proceedings of the 1st International Workshop on Distributed Computing in Ambient Environments: proceedings co-located with the 32nd Annual Conference on Artificial Intelligence Paderborn, September 15th, 2009 (pp. 1-12). COMSATS Institue of Information Technology, Islamabad. http://www.iis.uni-hildesheim.de/files/staff/bach/KI-2009-WS-Web.pdf
Ingstrup, M. (2003). Interaction Widget. In K. Henney & D. Schütz (Eds.), Proceedings of the 8th European Conference on Pattern Languages of Programs, 2003 UVK Verlagsgesellschaft.
Iivari, N., Iversen, O. S., Kafai, Y., Antle, A. N., Petersen, M. G., Kinnula, M., Dindler, C., Kayali, F., Bonsignore, E., Monga, C., Schaper, M. M. & Sharma, S. (2025). Pushing the Boundaries of Computational Empowerment of Children. In IDC '25: Interaction Design and Children Conference (pp. 1231-1234). Association for Computing Machinery. https://doi.org/10.1145/3713043.3734470
Ibsen-Jensen, R. & Chatterjee , K. (2013). Strategy Complexity of Finite-Horizon Markov Decision Processes and Simple Stochastic Games. In A. Kučera , T. A. Henzinger, J. Nešetřil, T. Vojnar & D. Antoš (Eds.), Mathematical and Engineering Methods in Computer Science: 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, 2012, Revised Selected Papers (pp. 106-117). Springer VS. https://doi.org/10.1007/978-3-642-36046-6_11
Ibsen-Jensen, R. (2013). Strategy complexity of two-player, zero-sum games. Department of Computer Science, University of Aarhus.
Hvilshøj, F. (2021). Fast and Explainable Deep Neural Networks. [PhD thesis, Aarhus University]. Aarhus Universitet.
Hvass, B. S., Aranha, D. F. & Spitters, B. (2023). High-assurance field inversion for curve-based cryptography. In 2023 IEEE 36th Computer Security Foundations Symposium (CSF) (pp. 552-567). IEEE. https://doi.org/10.1109/CSF57540.2023.00008
Hvass, B. S. (2023). Foundational Verification of Cryptographic Primitives. [PhD thesis, Aarhus University]. Aarhus Universitet.
Hune, T. & Nielsen, M. (1998). Timed bisimulation and open maps. In L. Brim, J. Gruska & J. Zlatuska (Eds.), Mathematical Foundations of Computer Science 1998: 23rd International Symposium, MFCS'98 Brno, Czech Republic, August 24-28, 1998 Proceedings (pp. 378-387). Springer. https://doi.org/10.1007/BFb0055787
Hu Fleischhauer, Y., Surale, H. B., Alt, F. & Pfeuffer, K. (2023). Gaze-based Mode-Switching to Enhance Interaction with Menus on Tablets. In S. N. Spencer (Ed.), Proceedings of the 2023 Symposium on Eye Tracking Research and Applications (pp. 1-8). Article 7 Association for Computing Machinery. https://doi.org/10.1145/3588015.3588409
Huber, P., Jensen, A. M., Jepsen, L. O. & Jensen, K. (1985). Towards Reachability Trees for High-level Petri Nets. In G. Rozenberg, H. J. Genrich & G. Roucairol (Eds.), Advances in Petri Nets 1984, Proceedings (pp. 215-233). Springer. https://doi.org/10.1007/3-540-15204-0_13
Huber, P., Jensen, K. & Shapiro, R. M. (1991). Hierarchies in Coloured Petri Nets. In G. Rozenberg (Ed.), Advances in Petri Nets 1990 (pp. 313-341). Springer. https://doi.org/10.1007/3-540-53863-1_30
Hubenschmid, S., Zagermann, J., Fink, D., Wieland, J., Feuchtner, T. & Reiterer, H. (2021). Towards Asynchronous Hybrid User Interfaces for Cross-Reality Interaction. In H.-C. Jetter, J.-H. Schröder, J. Gugenheimer, M. Billinghurst, C. Anthes, M. Khamis & T. Feuchtner (Eds.), ISS'21 Workshop Proceedings: Transitional Interfaces in Mixed and Cross-Reality: A new frontier? https://doi.org/10.18148/kops/352-2-84mm0sggczq02