Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Petersen, M. G. (2002). Time and Learning in HCI. In E. Frøkjær & K. Hornbæk (Eds.), Proceedings of the 2nd Danish Human-Computer Interaction Research Symposium (pp. 42-45). University of Copenhagen.
Chrobak, M., Dürr, C., Guíñez, F., Lozano, A. & Thang, N. K. (2010). Tile-Packing Tomography Is NP-hard. Lecture Notes in Computer Science, 6196, 254-263. https://doi.org/10.1007/978-3-642-14031-0_29
Bulánek, J., Koucky, M. & Saks, M. (2012). Tight lower bounds for the online labeling problem. In Proceedings of the 2012 ACM Symposium on Theory of Computing, STOC’12 (pp. 1185-1198). Association for Computing Machinery. https://doi.org/10.1145/2213977.2214083
Larsen, K. G. & Schalburg, N. (2025). Tight Generalization Bounds for Large-Margin Halfspaces. In The Thirty-ninth Annual Conference on Neural Information Processing Systems https://openreview.net/forum?id=wAq0ZLxrGq
Chakraborty, D., Kamma, L. & Larsen, K. G. (2018). Tight cell probe bounds for succinct boolean matrix-Vector multiplication. In STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing (pp. 1297-1306). Association for Computing Machinery. https://doi.org/10.1145/3188745.3188830
Gál, A., Hansen, K. A., Koucký, M., Pudlák, P. & Viola, E. (2011). Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates. Electronic Colloquium on Computational Complexity, 18(150). http://eccc.hpi-web.de/report/2011/150/
Gál , A., Hansen, K. A., Koucký, M., Pudlák, P. & Viola, E. (2012). Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates. In H. Karloff & T. Pitassi (Eds.), STOC '12 Proceedings of the 44th symposium on Theory of Computing (pp. 479-494). Association for Computing Machinery. https://doi.org/10.1145/2213977.2214023
David P., W. & Zhang, Q. (2012). Tight Bounds for Distributed Functional Monitoring. In Proceedings of the 2012 ACM Symposium on Theory of Computing, STOC’12 (pp. 941-960). Association for Computing Machinery. https://doi.org/10.1145/2213977.2214063
Hatcliff, J. & Danvy, O. (1997). Thunks and the λ-calculus. Journal of Functional Programming, 7(3), 303-319.
Hatcliff, J. & Danvy, O. (1996). Thunks and the λ-calculus. BRICS Report Series, (RS-96-19).
Hatcliff, J. & Danvy, O. (1997). Thunks and the λ-calculus. BRICS Report Series, (RS-97-7).
Bødker, S. (1987). Through the Interface - a human activity approach to user interfaces. Department of Computer Science, Aarhus University.
Melissaris Papanikolaou, N., Ravi, D. & Yakoubov, S. (2024). Threshold-Optimal MPC With Friends and Foes. In A. Chattopadhyay, S. Bhasin, S. Picek & C. Rebeiro (Eds.), Progress in Cryptology – INDOCRYPT 2023: 24th International Conference on Cryptology in India, Goa, India, December 10–13, 2023, Proceedings, Part II (Vol. 2, pp. 3-24). Springer. https://doi.org/10.1007/978-3-031-56235-8_1
Doerner, J., Kondi, Y., Lee, E., Shelat, A. & Tyner, L. (2023). Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. In 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023 (pp. 773-789). IEEE. https://doi.org/10.1109/SP46215.2023.10179470
Danvy, O. & Zerny, I. (2013). Three Syntactic Theories for Combinatory Graph Reduction. A C M Transactions on Computational Logic, 14(4), Article 29. https://doi.org/10.1145/2528932
Jørgensen, A. G. & Pettie, S. (2014). Threesomes, Degenerates, and Love Triangles. In B. Barak (Ed.), 2014 IEEE 55th Annual Symposium on Foundations of Computer Science, FOCS (pp. 621-630). IEEE Computer Society Press. https://doi.org/10.1109/FOCS.2014.72
Brewer, R. S., Xu, Y., Lee, G. E., Katchuck, M., Moore, C. A. & Johnson, P. M. (2013). Three Principles for the Design of Energy Feedback Visualizations. International Journal On Advances in Intelligent Systems, 6(3 & 4), 188-198. http://csdl.ics.hawaii.edu/techreports/2013/13-05/13-05.pdf
Lange, M. (2007). Three Notes on the Complexity of Model Checking Fixpoint Logic with Chop. R.A.I.R.O. - Theoretical Informatics and Applications.
Pettie, S. (2015). Three generalizations of Davenport-Schinzel sequences. S I A M Journal on Discrete Mathematics, 29(4), 2189-2238. https://doi.org/10.1137/140968574
Schwartzbach, M. I. & Palsberg, J. (1992). Three discussions on object-oriented typing. In S. B. Zdonik (Ed.), ACM SIGPLAN OOPS Messenger (April ed., Vol. Vol. 3, Issue 2, pp. 31-38). Association for Computing Machinery. https://doi.org/10.1145/130943.130949
Bødker, S. & Mathiasen, N. R. (2008). Threats or threads: from usable security to secure experience. In K. Tollmar & B. Jönsson (Eds.), ACM International Conference Proceeding Series: Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges (Vol. 358, pp. 283-290). Association for Computing Machinery.
Sidlauskas, D., Ross, K. A., Jensen, C. S. & Saltenis, S. (2011). Thread-Level Parallel Indexing of Update Intensive Moving-Object Workloads. Lecture Notes in Computer Science, 6849, 186-204. https://doi.org/10.1007/978-3-642-22922-0_12
Hansen, K. M. (2004). Thoth - A Publish/Subscribe Architecture for Peer-to-Peer Tool Integration. International Journal on Software Tools for Technology Transfer, 6(3), 219-230. https://doi.org/10.1007/s10009-004-0156-7
Madsen, O. L. & Møller-Pedersen, B. (2018). This is not a Model: On development of a common terminology for modeling and programming. In T. Margaria & B. Steffen (Eds.), Leveraging applications of formal methods, verification and validation (Vol. I, pp. 206-224). Springer. https://doi.org/10.1007/978-3-030-03418-4_13
Hjorth, H. A. & Wilensky, U. (2020). Thinking in Levels Across Multiple Levels. Paper presented at Constructionism 2020, Dublin, Ireland.
Hu, E., Grønbæk, J. E., Ying, W., Du, R. & Heo, S. (2023). ThingShare: Ad-Hoc Digital Copies of Physical Objects for Sharing Things in Video Meetings. In A. Schmidt, K. Väänänen, T. Goyal, P. O. Kristensson, A. Peters, S. Mueller, J. R. Williamson & M. L. Wilson (Eds.), CHI'23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems Article 365 Association for Computing Machinery. https://doi.org/10.1145/3544548.3581148
Gratzer, D., Weinberger, J. & Buchholtz, U. (2025). The Yoneda embedding in simplicial type theory. In Proceedings - 2025 40th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2025 (pp. 127-142). IEEE. https://doi.org/10.1109/LICS65433.2025.00017
Møller, A. & Schwartzbach, M. I. (2001). The XML Revolution. BRICS Notes Series, (NS-01-8).
Ammitzbøll Flügge, A., Korsgaard, H. & Bødker, S. (2024). The Working Jobless: Unemployment as Work. Proceedings of the ACM on Human-Computer Interaction, 8(CSCW2), Article 355. https://doi.org/10.1145/3686894
Kristensen, B. B., Madsen, O. L. & Møller-Pedersen, B. (2007). The When, Why and Why not of the BETA Programming Language. In Proceedings of the Third ACM Conference on History of Programming Languages (pp. 1-57). Association for Computing Machinery. https://doi.org/10.1145/1238844.1238854
Trier, P., Noe, K. Ø., Sørensen, M. S. & Mosegaard, J. (2008). The visible ear surgery simulator. In Medicine Meets Virtual Reality 16 (pp. 523-5). IOS Press.
Mosses, P. D., Bjørner, D. (Ed.), Broy, M. (Ed.) & Zamulin, A. V. (Ed.) (2001). The Varieties of Programming Language Semantics (and Their Uses). In Perspectives of System Informatics: Lecture Notes in Computer Science (Vol. 2244, pp. 165-190). Springer.
Ehn, P., Kyng, M. & Sundblad, Y. (1983). The UTOPIA Project. In Systems design for with and by the Users: Proceedings of the IFIP WG 9.1 Working Conference North-Holland.
Toftkjær, T. & Kjærgaard, M. B. (2010). The use of GPS for Handling Lack of Indoor Constraints in Particle Filter-based Inertial Positioning. Poster session presented at The 7th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2010), Sydney, Australia.
Christensen, H. B., Asklund, U., Bendix, L. & Magnusson, B. (1999). The Unified Extensional Versioning Model. In J. Estublier (Ed.), System Configuration Management: 19th International Symposium, SCM-9 Toulouse, France, September 5–7, 1999 Proceedings (pp. 100-122). Springer. https://doi.org/10.1007/3-540-48253-9_8
Kuutti, K. & Bannon, L. J. (2014). The turn to practice in HCI: Towards a research agenda. In M. Jones , P. Palanque, A. Schmidt & T. Grossman (Eds.), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '14 (pp. 3543-3552). Association for Computing Machinery. https://doi.org/10.1145/2556288.2557111