Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Magnani, M. & Assent, I. (2013). From stars to galaxies: skyline queries on aggregate data. In G. Guerrini & N. W. . Paton (Eds.), International Conference on Extending Database Technology (pp. 477-488 ). Association for Computing Machinery. https://doi.org/10.1145/2452376.2452432
Simonsen, M., Christensen, M. H., Thomsen, R. & Pedersen, C. N. S. (2013). GPU-Accelerated High-Accuracy Molecular Docking using Guided Differential Evolution. In S. tsutsui & P. Collet (Eds.), Massively Parallel Evolutionary Computation on GPGPUs Springer Publishing Company.
Lindell, Y., Nissim, K. & Orlandi, C. (2013). Hiding the Input-Size in Secure Two-Party Computation. In K. Sako & P. Sarkar (Eds.), Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (Vol. 8197, pp. 421-440). Springer VS. https://doi.org/10.1007/978-3-642-41019-2_6
Verdezoto, N. (2013). Home-based Healthcare Technology: Understanding and Designing to Support the Care Management Work at Home. Abstract from IEEE International Conference on Healthcare Informatics, Philadelphia, United States.
Branzei, S., Caragiannis, I., Morgenstern, J. & Procaccia, A. (2013). How Bad is Selfish Voting? In Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence AAAI Press. http://www.aaai.org/Library/AAAI/aaai13contents.php
Bendlin, R., Peikert, C. & Krehbiel, S. (2013). How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE. In 11th International Conference on Applied Cryptography and Network Security, ACNS 2013 (Vol. 7954, pp. 218-236). Springer VS. https://doi.org/10.1007/978-3-642-38980-1_14
Baniukevic, A., Jensen, C. S. & Lu, H. (2013). Hybrid Indoor Positioning with Wi-Fi and Bluetooth: Architecture and Performance . In IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1 ) (pp. 207 - 216 ). IEEE. https://doi.org/10.1109/MDM.2013.30
Radaelli, L., Sabonis, D., Lu, H. & Jensen, C. S. (2013). Identifying Typical Movements Among Indoor Objects: Concepts and Empirical Study. In IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1 ) (pp. 197 - 206 ). IEEE. https://doi.org/10.1109/MDM.2013.29
Kjærgaard, M. B., Krarup, M. V., Stisen, A., Prentow, T. S., Blunck, H., Grønbæk, K. & Jensen, C. S. (2013). Indoor Positioning using Wi-Fi: How Well Is the Problem Understood?. Paper presented at International Conference on Indoor Positioning and Indoor Navigation, Montbéliard, France.
Ernst, E. (2013). Inheritance versus parameterization. In M. Markku (Ed.), Proceedings of the 5th Workshop on MechAnisms for SPEcialization, Generalization and inHerItance, MASPEGHI '13 (pp. 26-29 ). Association for Computing Machinery. https://doi.org/10.1145/2489828.2489832
Jensen, M. M., Grønbæk, K., Rasmussen, M. K., Thomassen, N., Andersen, J. & Nielsen, J. (2013). Interactive football training based on rebounders with hit position sensing and audio/light feedback. Abstract from International Symposium on Computer Science in Sports, Istanbul, Turkey.
Brabrand, C., Ribeiro, M., Tolêdo, T., Winther, J. & Borba, P. (2013). Intraprocedural dataflow analysis for software product lines. In G. T. Leavens , S. Chiba & É. Tanter (Eds.), Transactions on Aspect-Oriented Software Development X (pp. 73-108). Springer VS. https://doi.org/10.1007/978-3-642-36964-3_3
Pierce, J., Strengers, Y., Sengers, P. & Bødker, S. (2013). Introduction to the Special Issue on Practice-Oriented Approaches to Sustainable HCI. ACM Transactions on Computer-Human Interaction, 20(4), Article 20. https://doi.org/10.1145/2494260
Kejlberg-Rasmussen, C., Tao, Y., Tsakalidis, K., Tsichlas, K. & Yoon, J. (2013). I/O-Efficient Planar Range Skyline and Attrition Priority Queues. In R. Hull & W. Fan (Eds.), Proceedings of the 32nd symposium on Principles of database systems , PODS '13 (pp. 103-114 ). Association for Computing Machinery. https://doi.org/10.1145/2463664.2465225
Yang, B., Fantini, E. N. & Jensen, C. S. (2013). iPark: Identifying Parking Spaces from Trajectories. In G. Guerrini & N. W. Paton (Eds.), Proceedings of The 16th International Conference on Extending Database Technology: EDBT 2013 (pp. 705-708 ). Association for Computing Machinery. https://doi.org/10.1145/2452376.2452459
Rasmussen, M. K., Grönvall, E., Kinch, S. & Petersen, M. G. (2013). It’s alive, it’s magic, it’s in love with you: Opportunities, Challenges and Open Questions for Actuated Interfaces. In H. Shen, R. Smith, J. Paay, P. Calder & T. Wyeld (Eds.), Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration. OzCHI '13 (pp. 63-72). Association for Computing Machinery. https://doi.org/10.1145/2541016.2541033
Georgiev, I., Křivánek, J., Hachisuka, T., Nowrouzezahrai , D. & Jarosz, W. (2013). Joint importance sampling of low-order volumetric scattering. A C M Transactions on Graphics, (6), Article 164 . https://doi.org/10.1145/2508363.2508411
Bendlin, R. (2013). Lattice-based Cryptography: Threshold Protocols and Multiparty Computation. Department of Computer Science, Aarhus University.
Hazay, C., López-Alt, A., Wee, H. & Wichs, D. (2013). Leakage-resilient cryptography from minimal assumptions. In T. Johansson & P. Nguyen (Eds.), Leakage-Resilient Cryptography from Minimal Assumptions: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (pp. 160-176). Springer VS. https://doi.org/10.1007/978-3-642-38348-9_10
Hubacek, P., Nielsen, J. B. & Rosen, A. (2013). Limits on the Power of Cryptographic Cheap Talk. In R. Canetti & J. A. Garay (Eds.), Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I (pp. 277-297 ). Springer VS. https://doi.org/10.1007/978-3-642-40041-4_16
Polli, A. M., Korn, M. & Klokmose, C. N. (2013). Local Area Artworks: Collaborative Art Interpretation On-Site. In F. Mattern & S. Santini (Eds.), Proceedings of The 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '13 Adjunct (pp. 79-82). Association for Computing Machinery. https://doi.org/10.1145/2494091.2494114
Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013). Local Outlier Detection with Interpretation. In H. Blockeel, K. Kersting , S. Nijssen & F. Železný (Eds.), Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2013, Prague, Czech Republic, September 23-27, 2013, Proceedings, Part III (pp. 304-320 ). Springer VS. https://doi.org/10.1007/978-3-642-40994-3_20
Rasmussen, M. (2013). Magical Realities in Interaction Design. In Proceedings of the 7th International Conference on Tangible, Embedded and Embodied Interaction, TEL '13 (pp. 125-128 ). Association for Computing Machinery. https://doi.org/10.1145/2460625.2460644
Johnson, P. M., Xu, Y., Brewer, R. S., Moore, C. A., Lee, G. E. & Connell, A. (2013). Makahiki+WattDepot: An open source software stack for next generation energy research and education. In L. M. Hilty, B. Aebischer, G. Andersson & W. Lohmann (Eds.), Proceedings of the First Interntional Conference on Information and Communication Technologies for Sustainability (ICT4S) Akademia.edu. http://www.academia.edu/2911805/ICT4S_2013_Proceedings_of_the_First_International_Conference_on_Information_and_Communication_Technologies_for_Sustainability_ETH_Zurich_February_14-16_2013
Branzei, S., Michalak, T., Rahwan, T., Larson, K. & Jennings, N. (2013). Matchings with Externalities and Attitudes. In M. Gina & O. Shehory (Eds.), International Conference on Autonomous Agents and Multi-agent Systems, AAMAS '13 (pp. 295-302 ). Association for Computing Machinery. http://dl.acm.org/citation.cfm?id=2484969&CFID=340403434&CFTOKEN=84711969
Dalgaard, L. G., Grönvall, E. & Verdezoto, N. (2013). MediFrame: A Tablet Application to Plan, Inform, Remind and Sustain Older Adults Medication Intake. In IEEE International Conference on Healthcare Informatics, IEEE ICHI 2013 (pp. 36-45). IEEE. https://doi.org/10.1109/ICHI.2013.12
Agarwal , P. K., Graham , G., Huang, Z., Phillips, J., Wei, Z. & Yi, K. (2013). Mergeable summaries. A C M Transactions on Database Systems, 38(4), Article 26 . https://doi.org/10.1145/2500128
Jensen, C. S. (Ed.), Jermaine, C., Zhou, X. (Ed.), Kotagiri, R. (Ed.) & Ooi, B. C. (Ed.) (2013). Message from the ICDE 2013 Program Committee and General. In 2013 IEEE 29th International Conference on Data Engineering (ICDE), : Australia, April 8–11, 2013 (pp. i-ii). IEEE Communications Society. http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6530811
Hu, H. (Ed.), Jensen, C. S. & Dingming , D. (Ed.) (2013). Message from the LBS n.0 Workshop Organizers. In IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:2 ) (pp. xiii). IEEE. http://mdm2013.dico.unimi.it/
Wölfel, C. & Merritt, T. (2013). Method card design dimensions: A survey of card-based design tools. In P. Kotzé et al. (Ed.), Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part I (pp. 479-486). Springer VS. https://doi.org/10.1007/978-3-642-40483-2_34
Frederiksen, T. K., Jakobsen, T. P., Nielsen, J. B., Nordholt, P. S. & Orlandi, C. (2013). MiniLEGO: Efficient secure two-party computation from general assumptions. In T. Johansson & P. Q. Nguyen (Eds.), Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (pp. 537-556). Springer VS. https://doi.org/10.1007/978-3-642-38348-9_32
Larsen, K. G. (2013). Models and Techniques for Proving Data Structure Lower Bounds. Department of Computer Science, Aarhus University.
Liu, K., Yang, B., Shang, S., Li, Y. & Ding, Z. (2013). MOIR/UOTS: Trip recommendation with user oriented trajectory search. In IEEE 14th International Conference on Mobile Data Management (MDM), 2013 (Volume:1 ) (pp. 335-337). IEEE. https://doi.org/10.1109/MDM.2013.49
Sergey, I., Devriese, D., Might, M., Midtgaard, J., Darais, D., Clarke, D. & Piessens, F. (2013). Monadic abstract interpreters. In H.-J. Boehm (Ed.), Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '13 (pp. 399-410). Association for Computing Machinery. https://doi.org/10.1145/2491956.2491979
Frederiksen, S. K. S. & Miltersen, P. B. (2013). Monomial strategies for concurrent reachability games and other stochastic games. In P. A. Abdulla & I. Potapov (Eds.), Reachability Problems: 7th International Workshop, RP 2013, Uppsala, Sweden, September 24-26, 2013 Proceedings (pp. 122-134 ). Springer VS. https://doi.org/10.1007/978-3-642-41036-9_12
Alamdari, S., Angelini, P., Chan, T. M., Di Battista, G., Frati, F., Lubiw, A., Patrignani, M., Roselli, V., Singla, S. & Wilkinson, B. T. (2013). Morphing Planar Graph Drawings with a Polynomial Number of Steps. The Annual A C M - S I A M Symposium on Discrete Algorithms. Proceedings, 24, 1656-1667. http://knowledgecenter.siam.org/0236-000137/0236-000137/1
Wu, D., Yiu, M. L. & Jensen, C. S. (2013). Moving Spatial Keyword Queries: Formulation, Methods, and Analysis. A C M Transactions on Database Systems, 38(1), Article 7. https://doi.org/10.1145/2445583.2445590