Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Brewer, R. S., Xu, Y., Lee, G. E., Katchuck, M., Moore, C. A. & Johnson, P. M. (2013). Three Principles for the Design of Energy Feedback Visualizations. International Journal On Advances in Intelligent Systems, 6(3 & 4), 188-198. http://csdl.ics.hawaii.edu/techreports/2013/13-05/13-05.pdf
Danvy, O. & Zerny, I. (2013). Three Syntactic Theories for Combinatory Graph Reduction. A C M Transactions on Computational Logic, 14(4), Article 29. https://doi.org/10.1145/2528932
Kjærgaard, M. B., Blunck, H., Wüstenberg, M., Grønbæk, K., Wirz, M., Roggen, D. & Tröster, G. (2013). Time-lag Method for Detecting Following and Leadership Behavior of Pedestrians from Mobile Sensing Data. In IEEE International Conference on Pervasive Computing and Communications (PerCom), 2013 (pp. 56 - 64 ). IEEE. https://doi.org/10.1109/PerCom.2013.6526714
Aehnelt, M., Schulz, H.-J. & Urban, B. (2013). Towards a Contextualized Visual Analysis of Heterogeneous Manufacturing Data. In Advances in Visual Computing : 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part II (pp. 76-85). Springer. https://doi.org/10.1007/978-3-642-41939-3_8
Derczynski, L., Yang, B. & Jensen, C. S. (2013). Towards Context-Aware Search and Analysis on Social Media Data. In G. Guerrini & N. W. Paton (Eds.), Proceedings of The 16th International Conference on Extending Database Technology: EDBT 2013 (pp. 137-142 ). Association for Computing Machinery. https://doi.org/10.1145/2452376.2452393
Radaelli, L. & Jensen, C. S. (2013). Towards Fully Organic Indoor Positioning. In Proceedings of the Fifth ACM SIGSPATIAL International Workshop on Indoor Spatial Awareness (pp. 16-20). Association for Computing Machinery.
Picozzi, M., Verdezoto, N., Pouke, M., Vatjus-Anttila, J. & Quigley, A. (2013). Traffic Visualization: Applying Information Visualization Techniques to Enhance Traffic Planning. In GRAPP 2013 IVAPP 2013 : Proceedings of the 8thInternational Conference on Computer Graphics Theory and Applications (pp. 554-557). SCITEPRESS Digital Library. https://doi.org/10.5220/0004291605540557
Li, X., Ceikute, V., Jensen, C. S. & Tan, K.-L. (2013). Trajectory Based Optimal Segment Computation in Road Network Databases. In C. Knoblock & M. Schneider (Eds.), Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL'13 (pp. 396-399 ). Association for Computing Machinery. https://doi.org/10.1145/2525314.2525444
Jensen, K., Aalst, W. M. V. D., Balbo, G., Koutny, M. & Wolf, K. (Eds.) (2013). Transactions on Petri Nets and Other Models of Concurrency VII: ToPNoC. Springer VS. Lecture Notes in Computer Science Vol. 7480 https://doi.org/10.1007/978-3-642-38143-0
Scheder, D. (2013). Trivial, tractable, hard. A not so sudden complexity jump in neighborhood restricted CNF formulas. In L. Cai, S.-W. Cheng & A.-W. Lam (Eds.), Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (pp. 251-261). Springer VS. https://doi.org/10.1007/978-3-642-45030-3_24
Damgård, I. B. & Scafuro, A. (2013). Unconditionally Secure and Universally Composable Commitments from Physical Assumptions. In K. Sako & P. Sarkar (Eds.), Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (pp. 100-119 ). Springer VS. https://doi.org/10.1007/978-3-642-42045-0_6
Meldgaard, S. T. (2013). Unconditionally Secure Protocols. Institut for Datalogi, Aarhus Universitet.
Grönvall, E. & Verdezoto, N. (2013). Understanding Challenges and Opportunities of Preventive Blood Pressure Self-Monitoring at Home. In P. Palanque , F. Détienne & A. Tricot (Eds.), Proceedings of the 31st European Conference on Cognitive Ergonomics (ACM ECCE 2013) Association for Computing Machinery. https://doi.org/10.1145/2501907.2501962
Turon, A., Dreyer , D. & Birkedal, L. (2013). Unifying refinement and hoare-style reasoning in a logic for higher-order concurrency. In G. Morrisett & T. Uustalu (Eds.), Proceedings of the 18th ACM SIGPLAN International Conference on Functional Programming, ICFP '13 (pp. 377-390 ). Association for Computing Machinery. https://doi.org/10.1145/2500365.2500600
Scheder, D. (2013). Unsatisfiable CNF formulas contain many conflicts. In L. Cai, S.-W. Cheng & T.-W. Lam (Eds.), Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (pp. 273-283). Springer VS. https://doi.org/10.1007/978-3-642-45030-3_26
Brewster, S. & Bødker, S. (2013). Welcome to CHI 2013! Conference on Human Factors in Computing Systems - Proceedings, 2013-April, vii.
Gao, X. A. G., Zhang, J. & Chen, Y. (2013). What you jointly know determines how you act: Strategic interactions in prediction markets. In Proceedings of of the fourteenth ACM Conference on Electronic Commerce, EC '13 (pp. 489-506). Association for Computing Machinery. https://doi.org/10.1145/2482540.2482592
Pastro, V. (2013). Zero-Knowledge Protocols and Multiparty Computation. Department of Computer Science, Aarhus University.
Jawurek, M., Kerschbaum, F. & Orlandi, C. (2013). Zero-knowledge using garbled circuits: Or how to prove non-algebraic statements efficiently. In A.-R. Sadeghi , V. Gligor & M. Yung (Eds.), Proceedings of the ACM Conference on Computer and Communications Security, CCS '13 (pp. 955-966). Association for Computing Machinery. https://doi.org/10.1145/2508859.2516662
Urazimbetova, S. (2012). A Case Study - On Patient Empowerment and Integration of Telemedicine to National Healthcare Services. Paper presented at International Conference on Health Informatics, Vilamoura, Algarve, Portugal. https://doi.org/10.5220/0003870902630269
Šidlauskas, D., Jensen, C. S. & Šaltenis , S. (2012). A comparison of the use of virtual versus physical snapshots for supporting update-intensive workloads. In Proceedings of the Eighth International Workshop on Data Management on New Hardware: DaMoN '12 (pp. 1-8). Association for Computing Machinery. https://doi.org/10.1145/2236584.2236585
Dupuis, F., Nielsen, J. B. & Salvail, L. (2012). Actively Secure Two-Party Evaluation of Any Quantum Operation. Lecture Notes in Computer Science, 7417, 794-811. https://doi.org/10.1007/978-3-642-32009-5_46
Backes, M., Goldberg, I., Kate, A. & Toft, T. (2012). Adding query privacy to robust DHTs. In ASIACCS '12 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (pp. 30-31 ). Association for Computing Machinery. https://doi.org/10.1145/2414456.2414473
Bitsch, J. E. & Bouvin, N. O. (2012). Ad-hoc Symbiotic Interactive Displays through DLNA. In IEEE International Conference on Pervasive Computing and Communications (PerCom), 2012 (pp. 57-65). IEEE Computer Society Press. https://doi.org/10.1109/PerCom.2012.6199849
Alrøe, T. F., Grann, J., Grönvall, E., Petersen, M. G. & L. Rasmussen, J. (2012). Aerial Tunes : Exploring Interaction Qualities of Mid-air Displays. In Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making sense through design (NordiCHI 2012), (pp. 514-523). Association for Computing Machinery. https://doi.org/10.1145/2399016.2399095
Lu, H., Cao, X. & Jensen, C. S. (2012). A Foundation for Efficient Indoor Distance-Aware Query Processing. In IEEE 28th International Conference on Data Engineering (ICDE) (pp. 438 -449). IEEE Press. https://doi.org/10.1109/ICDE.2012.44
Dang, X.-H., Ong, K.-L. & Lee, V. (2012). An Adaptive Algorithm for Finding Frequent Sets in Landmark Windows. Lecture Notes in Computer Science, 7520, 590-597 . https://doi.org/10.1007/978-3-642-33362-0_47
Nielsen, J. B., Nordholt, P. S., Orlandi, C. & Burra, S. S. (2012). A New Approach to Practical Active-Secure Two-Party Computation. Lecture Notes in Computer Science, 7417, 681-700 . https://doi.org/10.1007/978-3-642-32009-5_40