Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Baum, C., Cozzo, D. & P. Smart, N. (2020). Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. In K. G. Paterson & D. Stebila (Eds.), Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (pp. 274-302). Springer. https://doi.org/10.1007/978-3-030-38471-5_12
Simonsen, M., Sand, A., Mailund, T. & Pedersen, C. N. S. (2010). Using the Power of Modern Processors in Bioformatics. Poster session presented at Conference on IT research at AU, Århus, Denmark.
Madsen, O. L. & Møller-Pedersen, B. (2022). Using supplementary properties to reduce the need for documentation. In T. Margaria & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering - 11th International Symposium, ISoLA 2022, Proceedings: Software Engineering (pp. 35-59). Springer. https://doi.org/10.1007/978-3-031-19756-7_4
Christensen, H. B. (2022). Using Students’ Screencasts as Alternative to Written Submissions. In Proceedings of the 55th Hawaii International Conference on System Sciences (pp. 881-889). University of Hawai'i at Manoa . http://hdl.handle.net/10125/79440
Christensen, H. B. (2003). Using Software Architectures for Designing Distributed Embedded Systems. Department of Computer Science, Aarhus University.
Hansen, T. R., Eklund, J. M., Sprinkle, J., Bajcsy, R. & Sastry, S. (2005). Using Smart Sensors and a Camera Phone to Detect and Verify the Fall of Elderly Persons. In Proceedings of 3rd European Medical and Biological Engineering Conference: EMBEC 2005 (pp. 2486-2487). IFMBE.
Madsen, O. L. (2023). Using Object-Sequence Diagrams for Debugging. In E. Gonzalez Boix & C. Scholliers (Eds.), DEBT 2023: Proceedings of the 1st ACM International Workshop on Future Debugging Techniques (pp. 11-22). Association for Computing Machinery. https://doi.org/10.1145/3605155.3605864
Christensen, H. B. (2002). Using Logic Programming to Detect Activities in Pervasive Healthcare. In P. J. Stuckey (Ed.), Logic Programming: 18th International Conference, ICLP 2002 Copenhagen, Denmark, July 29 – August 1, 2002 Proceedings (2401 ed., pp. 185-199). Springer. https://doi.org/10.1007/3-540-45619-8_29
Yang, B., Kaul, M. & Jensen, C. S. (2014). Using Incomplete Information for Complete Weight Annotation of Road Networks. I E E E Transactions on Knowledge & Data Engineering, 26(5), 1267-1279. https://doi.org/10.1109/TKDE.2013.89
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2012). Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks. In A. U. Schmidt, G. Russello, I. Krontiris & S. Lian (Eds.), Security and Privacy in Mobile Information and Communication Systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers (pp. 107-118). Springer. https://doi.org/10.1007/978-3-642-33392-7_12
Lehmann, A. & Gross, A. (2016). Using Crowd Sensed Data as Input to Congestion Model. In 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016: The Third International Workshop on Crowd Assisted Sensing Pervasive Systems and Communications Article 7457105 IEEE Press. https://doi.org/10.1109/PERCOMW.2016.7457105
Čermák, J., Bosansky, B., Durkota, K., Lisý, V. & Kiekintveld, C. (2016). Using correlated strategies for computing stackelberg equilibria in extensive-form games. In 30th AAAI Conference on Artificial Intelligence, AAAI 2016 (pp. 439-445). AAAI Press. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85007242893&partnerID=40&md5=d6d209b2094ebcd4dd19608badb7e971
Madsen, O. L. (2021). Using Coroutines for Multi-core Preemptive Scheduling. In Proceedings of the 11th Workshop on Programming Languages and Operating Systems (PLOS '21) (pp. 46-52). Association for Computing Machinery. https://doi.org/10.1145/3477113.3487271
Zhang, W. & Hansen, K. M. (2011). Using Context Awareness for Self Management in Pervasive Service Middleware. In F. Mastrogiovanni & N.-Y. Chong (Eds.), Handbook of Research on Ambient Intelligence and Smart Environments Trends and Perspectives (pp. 248-271). Idea Group Publishing. http://www.igi-global.com/book/handbook-research-ambient-intelligence-smart/41775#table-of-contents
Kristensen, L. M. (2004). Using Coloured Petri Nets in the Development of Protocols for Ad-Hoc Networking. In Proceedings of 3rd International Workshop on Integration and Specification Techniques for Applications in Engineering (pp. 12-13)
Radaelli, L., Moses, Y. & Jensen, C. S. (2014). Using cameras to improve Wi-Fi based indoor positioning. In D. Pfoser & K.-J. Li (Eds.), Web and Wireless Geographical Information Systems: 13th International Symposium, W2GIS 2014, Seoul, South Korea, May 29-30, 2014. Proceedings (pp. 166-183). Springer VS. https://doi.org/10.1007/978-3-642-55334-9-11
Enni, S. & Assent, I. (2018). Using Balancing Terms to Avoid Discrimination in Classification. In 2018 IEEE International Conference on Data Mining, ICDM 2018 (pp. 947-952). Article 8594925 IEEE Press. https://doi.org/10.1109/ICDM.2018.00116
Grønbæk, K., Bang, T. & Hansen, P. S. (2002). Using a Metro Map Metaphor for organizing Web-based learning resources. In P. Barker & S. Rebelsky (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2002 (pp. 647-652). Association for the Advancement of Computing in Education.
Zimmer, P. (2004). Using Ambients to Control Resources. International Journal of Information Security, 2(3-4), 126-144.
Hansen, T. R., Eriksson, E. & Lykke-Olesen, A. (2006). Use your head: Exploring face tracking for mobile interaction. In G. M. Olson & R. Jeffries (Eds.), CHI Extended Abstracts ´06: Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems Society for Industrial and Applied Mathematics. https://doi.org/10.1145/1125451.1125617
Eerikson, H., Keller, M., Orlandi, C., Pullonen, P., Puura, J. & Simkin, M. (2020). Use your brain! Arithmetic 3PC for any modulus with active security. In Y. T. Kalai, A. D. Smith & D. Wichs (Eds.), 1st Conference on Information-Theoretic Cryptography (ITC 2020) Article 5 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ITC.2020.5
Bødker, S. & Grønbæk, K. (1995). Users and Designers in Mutual Activity - an analysis of cooperative activities in systems design. In Y. Engeström & D. Middleton (Eds.), Cognition and communication at work (pp. 130-158). Cambridge University Press.
Kyng, M. (1998). Users and Computers: A contextual approach to design of computer artifact. Scandinavian Journal of Information Systems, 10(1-2), 7-44.
Seinfeld, S., Feuchtner, T., Maselli, A. & Müller, J. (2021). User Representations in Human-Computer Interaction. Human-Computer Interaction, 36(5-6), 400-438. https://doi.org/10.1080/07370024.2020.1724790
Bouvin, N. O. & Thomsen, K. S. (1999). User Guide to the COCONUT Arakne Application. Department of Computer Science, Aarhus University. CIT-Coconut No. 99-04Intermedia Working Papers No. 2
Bouvin, N. O. & Albertsen, J. (2008). User Defined Structural Searches in MediaWiki. In Proceedings of the nineteenth ACM conference on Hypertext and hypermedia. (pp. 15-20). Association for Computing Machinery. https://doi.org/10.1145/1379092.1379099
Dalsgaard, P., Dindler, C., Stuedahl, D. & Smørdal, O. (2009). Use of blogs for studying users' engagement with mobile telephones in museum environment. In Proceedings of the 2007 Tenth European Conference on Computer-Supported Cooperative Work (Vol. Limerick, Irland). Springer Science+Business Media.
Bødker, S. (2011). Use is everywhere and changing: Analysis and design with the Human-Artifact Model. In Proceedings of the 29th Annual European Conference on Cognitive Ergonomics (pp. 3-10). Association for Computing Machinery. https://doi.org/10.1145/2074712.2074714
Bertelsen, O. W., Eskildsen, T. & Sperschneider, W. (2002). Use in the oven - product development in HCI research. In E. Frøkjær & K. Hornbæk (Eds.), Proceedings of the Second Danish Human-Computer Interaction Research Symposium (pp. 13-14). University of Copenhagen.
Mathiasen, N. R. (2007). Usable Security Revisited. Poster session presented at Danish HCI Research Symposium, DHRS 2007, København, Denmark.
Bødker, S. & Petersen, M. G. (1998). Usability work: From snapshot to development of use. Paper presented at ISCRAT 1998, Århus, Denmark.
Bødker, S. & Sundblad, Y. (2008). Usability and Interaction Design - New Challenges for the Scandinavian Tradition. Behaviour and Information Technology, 27(4), 293-300.
Hansen, F. A. & Grønbæk, K. (2011). UrbanWeb: a Platform for Mobile, Context-aware Web Services. In S. Ahson & M. Ilyas (Eds.), Mobile Web 2.0: Developing and Delivering Services to Mobile Devices (pp. 137-162). CRC Press/Taylor. http://www.taylorandfrancis.com/books/details/9781439800829/
Hirt, M. & Nielsen, J. B. (2005). Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computations. In B. Roy (Ed.), Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings (pp. 79-99). Springer. https://doi.org/10.1007/11593447_5
Clifford, R., Grønlund, A., Larsen, K. G. & Starikovskaya, T. (2018). Upper and lower bounds for dynamic data structures on strings. In R. Niedermeier & B. Vallée (Eds.), 35th Symposium on Theoretical Aspects of Computer Science, STACS 2018 (Vol. 96, pp. 22:1-22:14). Article 22 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.STACS.2018.22
Lu, H. & Jensen, C. S. (2012). Upgrading Uncompetitive Products Economically. In IEEE 28th International Conference on Data Engineering (ICDE) (pp. 977 - 988 ). IEEE Press. https://doi.org/10.1109/ICDE.2012.92
Hou, B. J., Abdrabou, Y., Weidner, F. & Gellersen, H. (2024). Unveiling Variations: A Comparative Study of VR Headsets Regarding Eye Tracking Volume, Gaze Accuracy, and Precision. In 2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW) (pp. 650-655). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/VRW62533.2024.00127