Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Bardram, J. E., Bossen, C., Lykke-Olesen, A., Madsen, K. H., Nielsen, R. & MacDonald, N. (Ed.) (2002). Virtual Video Prototyping of Pervasive Healthcare Systems. In Proceedings of the conference on Designing interactive systems: processes, practices, methods, and techniques (pp. 167-177). Association for Computing Machinery.
Bardram, J. E., Bossen, C., Lykke-Olesen, A., Madsen, K. H. & Nielsen, R. (2002). Virtual Video Prototyping for Healthcare Systems. In Proceedings of the Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (pp. 167 - 177). Association for Computing Machinery.
Sørensen, T. S., Mosegaard, J., Kislinskiy, S. & Greil, G. (2014). Virtual Surgery in Congenital Heart Disease. In F. Saremi (Ed.), Cardiac CT and MR for Adult Congenital Heart Disease (pp. 515-523). Springer. https://doi.org/10.1007/978-1-4614-8875-0_23
Kristensen, T. G. (2011). Virtual screening algorithms. Department of Computer Science, Aarhus University.
Nielsen, M. B., Nilsson, O., Soderstrom, A. & Museth, K. (2006). Virtually Infinite Deformable Surfaces. In ACM SIGGRAPH 2006 Society for Industrial and Applied Mathematics.
Schougaard, K. R. (2004). Virtual Distances Used for Optimization of Applicationsin the Pervasive Computing Domain. In A. Fersha, H. Hortner & G. Kotsis (Eds.), Advances in Pervasive Computing: A Collection of Contributions Presented at PERVASIVE 2004 (pp. 133-139). Stollfuß Medien.
Nielsen, A. B. & Ernst, E. (2009). Virtual Class Support at the Virtual Machine Level. In H. Rajan, C. Bockisch, M. Haupt & R. Dyer (Eds.), Proceedings of The 3rd workshop on Virtual Machines and Intermediate Languages (VMIL) Association for Computing Machinery. https://doi.org/10.1145/1711506.1711507
Madsen, O. L. & Møller-Pedersen, B. (1989). Virtual classes: a powerful mechanism in object-oriented programming. In OOPSLA '89 Conference proceedings on Object-oriented programming systems, languages and applications (pp. 397-406). Association for Computing Machinery. https://doi.org/10.1145/74878.74919
Ganesh, C., Orlandi, C., Tschudi, D. & Zohar, A. (2022). Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies. In J. Garcia-Alfaro, J. L. Muñoz-Tapia, G. Navarro-Arribas & M. Soriano (Eds.), Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021 (pp. 173-191). Springer. https://doi.org/10.1007/978-3-030-93944-1_12
Klokmose, C. N. & Beaudouin-Lafon, M. (2009). VIGO: Instrumental Interaction in Multi-Surface Environments. In D. R. Olsen Jr. & R. B. Arthur (Eds.), CHI '09 Proceedings of the 27th International Conference on Human factors in Computing Systems (Vol. SESSION: Programming tools and architectures, pp. 869-878). Association for Computing Machinery. https://doi.org/10.1145/1518701.1518833
Christensen, L. R. & Bertelsen, O. W. (2015). View of Causation for CSCW: Manipulation and Control in the Material Field of Work. In V. Wulf, K. Schmidt & D. Randall (Eds.), Designing Socially Embedded Technologies in the Real-World, Part II (pp. 151-169). Springer. https://doi.org/10.1007/978-1-4471-6720-4_8
Hansen, T. R. & Bardram, J. E. (2005). Video prototype of the interactive operating theatre. Pictures, Video and sound recordings (digital)
Burattin, A., Miksch, S., Sadiq, S., Schulz, H.-J. & Vrotsou, K. (2025). VESPA: Visual Event-Stream Progressive Analytics. Paper presented at 2nd Visual Process Analytics Workshop (VIPRA'25), Seville, Spain. https://vipra-workshop.github.io/homepage/papers/BPM_2025_paper_280.pdf
Tsitsulin, A., Mottin, D., Karras, P. & Müller, E. (2018). VERSE: Versatile Graph Embeddings from Similarity Measures. In P.-A. Champin, F. Gandon & L. Médini (Eds.), The Web Conference 2018 - Proceedings of the World Wide Web Conference, WWW 2018: WWW '18 (pp. 539-548). Association for Computing Machinery. https://doi.org/10.1145/3178876.3186120
Zander, P.-O. (2009). Verksamhetsteori. In S. Hrastinski (Ed.), Nätbaserad utbildning: en introduktion Studentlitteratur.
Grønkjær Jensen, M. V., Kjeldsen, H.-C., Skriver Nielsen, A., Olesen, N. B. & Aranha, D. F. (2024). Verifying ElectionGuard: a theoretical and empirical analysis. In E-Vote-ID 2024 - Ninth International Joint Conference on Electronic Voting: Proceedings (pp. 17-33). Gesellschaft fur Informatik (GI). https://doi.org/10.18420/e-vote-id2024_01
Dodds, M., Jagannathan, S., Parkinson, M. J., Svendsen, K. & Birkedal, L. (2016). Verifying custom synchronisation constructs using higher-order separation logic. ACM Transactions on Programming Languages and Systems, 38/2(2), 4:1 - 4:72. Article 4. https://doi.org/10.1145/2818638
Hansen, S. T., Gomes, C., Palmieri, M., Thule, C., van de Pol, J. & Woodcock, J. (2021). Verification of Co-simulation Algorithms Subject to Algebraic Loops and Adaptive Steps. In A. L. Lafuente & A. Mavridou (Eds.), Formal Methods for Industrial Critical Systems (pp. 3-20). Springer. https://doi.org/10.1007/978-3-030-85248-1_1
Hansen, S. T., Thule, C., Gomes, C., van de Pol, J., Palmieri, M., Inci, E. O., Madsen, F., Alfonso, J., Castellanos, J. Á. & Rodriguez, J. M. (2022). Verification and synthesis of co-simulation algorithms subject to algebraic loops and adaptive steps. International Journal on Software Tools for Technology Transfer, 24(6), 999-1024. https://doi.org/10.1007/s10009-022-00686-8
Branzei, S. & Procaccia, A. D. (2015). Verifiably Truthful Mechanisms. In T. Roughgarden (Ed.), Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS '15 (pp. 297-306 ). Association for Computing Machinery. https://doi.org/10.1145/2688073.2688098
Aranha, D. F., Baum, C., Gjøsteen, K. & Silde, T. (2023). Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. In CCS'23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (pp. 1467-1481). Association for Computing Machinery. https://doi.org/10.1145/3576915.3616683
Camenisch, J. & Damgård, I. B. (2000). Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes (Extended Abstract). In T. Okamoto (Ed.), Advances in Cryptology - ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3-7, 2000 Proceedings (pp. 331-345). Springer. https://doi.org/10.1007/3-540-44448-3_25
Ateniese, G., Chen, L., Francati, D., Papadopoulos, D. & Tang, Q. (2023). Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting). In A. Boldyreva & V. Kolesnikov (Eds.), Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (pp. 63-93). Springer. https://doi.org/10.1007/978-3-031-31371-4_3
Sidenmark, L., Clarke, C., Newn, J., Lystbæk, M. N., Pfeuffer, K. & Gellersen, H. (2023). Vergence Matching: Inferring Attention to Objects in 3D Environments for Gaze-Assisted Selection. In CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems Article 257 Association for Computing Machinery. https://doi.org/10.1145/3544548.3580685
Blunck, H., Hinrichs, K., Puke, I. & Vahrenhold, J. (2004). Verarbeitung von Trajektorien mobiler Objekte. In Geoinformation und Mobilität - von der Forschung zur praktischen Anwendung. : Beiträge zu den Münsteraner GI-Tagen 2004 (pp. 29-40)
Fender, A. & Müller, J. (2018). Velt: A Framework for Multi RGB-D Camera Systems. In Proceedings of the 2018 ACM International Conference on Interactive Surfaces and Spaces (pp. 73-83). Association for Computing Machinery. https://doi.org/10.1145/3279778.3279794
Campanelli, M. & Hall-Andersen, M. (2022). Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets fromWell-Studied Assumptions. In ASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (pp. 652-666). Association for Computing Machinery. https://doi.org/10.1145/3488932.3517424
Schougaard, K. R. (2007). Vehicular Mobility Prediction by Bayesian Networks. (pp. 1-7). Department of Computer Science, University of Aarhus.
Attema, T., Cascudo, I., Cramer, R., Damgård, I. & Escudero, D. (2022). Vector Commitments over Rings and Compressed Σ -Protocols. In E. Kiltz & V. Vaikuntanathan (Eds.), Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings (Vol. Part 1, pp. 173-202). Springer. https://doi.org/10.1007/978-3-031-22318-1_7
Borowski, M., Murray, L., Bagge, R., Kristensen, J. B., Satyanarayan, A. & Klokmose, C. N. (2022). Varv: Reprogrammable Interactive Software as a Declarative Data Structure. In CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems Article 492 Association for Computing Machinery. https://doi.org/10.1145/3491102.3502064
Hansen, K. M. (2005). Various Ideogramic products. Computer programme
Jørgensen, J. B., Knudsen, B., Sloth, L., Vase, J. R. & Christensen, H. B. (2016). Variability Handling for Mobile Banking Apps on iOS and Android. In Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (pp. 283-286). Article 7516847 IEEE Computer Society Press. https://doi.org/10.1109/WICSA.2016.29
Bhandari, S., Harsha, P., Saptharishi, R. & Srinivasan, S. (2022). Vanishing Spaces of Random Sets and Applications to Reed-Muller Codes. In S. Lovett (Ed.), 37th Computational Complexity Conference, CCC 2022 Article 31 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.CCC.2022.31
Petersen, M. G. & Rasmussen, M. K. (2011). Value representations: a value based dialogue tool. In making Design Matter! : Proceedings Nordes '11 : the Nordic 4th Nordic Design Research Conference (pp. 284-287). School of Art & Design, Aalto University . http://ocs.sfu.ca/nordes/index.php/nordes/2011/paper/view/445
Nielsen, B. B. & Møller, A. (2020). Value Partitioning: A Lightweight Approach to Relational Static Analysis for JavaScript. In 34th European Conference on Object-Oriented Programming, ECOOP 2020 Article 16 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ECOOP.2020.16
S. Fitzgerald, J., Gorm Larsen, P., Tjell, S. & Verhoef, M. (2007). Validation Support for Distributed Real-Time Embedded Systems in VDM++. In Proceedings of the Tenth IEEE International Symposium on High Assurance Software Engineering (HASE 2007) (pp. 331-340). IEEE Computer Society Press.
Shaik, I., Heisinger, M., Seidl, M. & Pol, J. V. D. (2023). Validation of QBF Encodings with Winning Strategies. Leibniz International Proceedings in Informatics, 271. https://doi.org/10.4230/LIPIcs.SAT.2023.24
Winge, K., Haugaard, R. & Merritt, T. R. (2014). VAL: Visually Augmented Laser cutting to enhance and support creativity. In IEEE International Symposium on Mixed and Augmented Reality - Media, Arts, Social Science, Humanities and Design, ISMAR 2014, Proceedings (pp. 31-34). Article 6935435 IEEE. https://doi.org/10.1109/ISMAR-AMH.2014.6935435
Lee, C., Gong, U., Lin, T., Zollmann, S., Epsley, S. A., Petway, A. & Pfister, H. (2025). VAIR: Visual Analytics for Injury Risk Exploration in Sports. In 2025 IEEE 16th Workshop on Visual Analytics in Healthcare (VAHC) (pp. 22-28). IEEE. https://doi.org/10.1109/VAHC69430.2025.00008
Bødker, S. (1985). UTOPIA and the Design of User Interfaces. In Precedings of the Working Conference on Development and Use of Computer-based Systems and Tools (pp. 109-124). Department of Computer Science, Aarhus University.
Christensen, H. B. (1998). Utilising a Geographic Space Metaphor in a Software Development Environment. In Proceedings of the IFIP TC2/TC13 WG2.7/WG13.4 Seventh Working Conference on Engineering for Human-Computer Interaction (pp. 39-56). Klüwer.
Kristensen, M. D. & Bouvin, N. O. (2010). Using Wi-Fi to Save Energy via P2P Remote Execution. In 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops 2010). Proceedings (pp. 123-128). IEEE. https://doi.org/10.1109/PERCOMW.2010.5470614