Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Miltersen, P. B. & Sheffet, O. (2012). Send mixed signals : earn more, work less. In B. Faltings, K. Leyton-Brown & P. Ipeirotis (Eds.), EC '12 Proceedings of the 13th ACM Conference on Electronic Commerce (pp. 234-247). Association for Computing Machinery. https://doi.org/10.1145/2229012.2229033
Rasmussen, M. K., Pedersen, E. W., Petersen, M. G. & Hornbæk, K. A. S. (2012). Shape-changing interfaces: a review of the design space and open research questions. In CHI '12 : Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 735-744 ). Association for Computing Machinery. https://doi.org/10.1145/2212776.2212798
Cao, X., Chen, L., Cong, G., Jensen, C. S., Qu, Q., Skovsgaard, A., Wu, D. & Yiu, M. L. (2012). Spatial Keyword Querying: Invited Paper. Lecture Notes in Computer Science, 7532, 16-29 . https://doi.org/10.1007/978-3-642-34002-4_2
Schleuning, M., Fründ, J., Klein, A.-M., Abrahamczyk, S., Alarcón, R., Albrecht, M., Andersson, G. K. S., Bazarian, S., Blüthgen, N., Böhning-Gaese, K., Bommarco, R., Dalsgaard, B., Dehling, D. M., Dormann, C. F., Gotlieb, A., Hagen, M., Hickler, T., Holzschuh, A., Kaiser-Bunbury, C. N. ... Blüthgen, N. (2012). Specialization of mutualistic interaction networks decreases toward tropical latitudes. Current Biology, 22(20), 1925-1931. https://doi.org/10.1016/j.cub.2012.08.015
Micenková, B., van Beusekom, J. & Shafait, F. (2012). Stamp Verification for Automated Document Authentication. Paper presented at International Workshop on Computational Forensics , Tsukuba, Japan.
Hachisuka, T., Jarosz, W., Bouchard , G., Christensen, P., Frisvad, J. R., Wenzel, J., Henrik Wann, J., Kaschalk, M., Knaus, C., Selle, A. & Spencer, B. (2012). State of the Art in Photon-Density Estimation: Course notes. In SIGGRAPH '12 ACM SIGGRAPH 2012 Courses Association for Computing Machinery. https://doi.org/10.1145/2343483.2343489
Bhatacharya, H., Nielsen, M. B. & Bridson, R. (2012). Steady State Stokes Flow Interpolation for Fluid Control. Annual Conference of the European Association for Computer Graphics , 33, 57-60. https://doi.org/10.2312/conf/EG2012/short/057-060
Brodal, G. S., Lagogiannis, G. & Tarjan, R. E. (2012). Strict fibonacci heaps. In STOC '12 Proceedings of the 44th symposium on Theory of Computing (pp. 1177-1184 ). Association for Computing Machinery. https://doi.org/10.1145/2213977.2214082
Davoodi, P., Raman, R. & Satti, S. (2012). Succinct Representations of Binary Trees for Range Minimum Queries. Lecture Notes in Computer Science, 7434, 396-407 . https://doi.org/10.1007/978-3-642-32241-9_34
Cao, X., Cong, G., Jensen, C. S., NG, J. J., Ooi, B. C., Phan, N.-T. & Wu, D. (2012). SWORS: a system for the efficient retrieval of relevant spatial web objects. Proceedings of the VLDB Endowment, 5(12), 1914-1917. http://dl.acm.org/citation.cfm?id=2367536
Korn, M. & Back, J. (2012). Talking it Further: From Feelings and Memories to Civic Discussions In and About Places. In L. Malmborg & T. Pederson (Eds.), NordiCHI '12 Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design (pp. 189-198). Association for Computing Machinery. https://doi.org/10.1145/2399016.2399046
Reetz, E., Lehmann, A., Kümper, D. & Tönjes, R. (2012). Test Driven Life Cycle Management for Internet of Things based Services: a Semantic Approach. Paper presented at International Conference on Advances in System Testing and Validation Lifecycle, Lisbon, Portugal.
Larsen, K. G. (2012). The Cell Probe Complexity of Dynamic Range Counting. In STOC’12 : Proceedings of the 44th symposium on Theory of Computing (pp. 85-94). Association for Computing Machinery. https://doi.org/10.1145/2213977.2213987
Kölker, J. (2012). The Magnets Puzzle is NP-Complete. Journal of Information Processing, 20(3), 707-708 . https://doi.org/10.2197/ipsjjip.20.707
Balasch, J., Faust, S., Gierlichs, B. & Verbauwhede, I. (2012). Theory and Practice of a Leakage Resilient Masking Scheme. Lecture Notes in Computer Science, 7658, 758-775. https://doi.org/10.1007/978-3-642-34961-4_45
Keller, M. (2012). Theory and practice of cryptographic protocols -or- cryptography: will it blend? Department of Computer Science, Aarhus University.
Afshani, P., Afrawal, M., Benjamin, D., Larsen, K. G., Mehlhorn, K. & Winzen, C. (2012). The Query Complexity of Finding a Hidden Permutation. Electronic Colloquium on Computational Complexity, (TR12-087). http://eccc.hpi-web.de/report/2012/087/
Sun, X., Wang, C. & Yu, W. (2012). The Relationship between Inner Product and Counting Cycles. Lecture Notes in Computer Science, 7256, 643-654. https://doi.org/10.1007/978-3-642-29344-3_54
Jensen, K., Kristensen, L. M. & Mailund, T. (2012). The sweep-line state space exploration method. Theoretical Computer Science, 429, 169–179. https://doi.org/10.1016/j.tcs.2011.12.036
David P., W. & Zhang, Q. (2012). Tight Bounds for Distributed Functional Monitoring. In Proceedings of the 2012 ACM Symposium on Theory of Computing, STOC’12 (pp. 941-960). Association for Computing Machinery. https://doi.org/10.1145/2213977.2214063
Gál , A., Hansen, K. A., Koucký, M., Pudlák, P. & Viola, E. (2012). Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates. In H. Karloff & T. Pitassi (Eds.), STOC '12 Proceedings of the 44th symposium on Theory of Computing (pp. 479-494). Association for Computing Machinery. https://doi.org/10.1145/2213977.2214023
Bulánek, J., Koucky, M. & Saks, M. (2012). Tight lower bounds for the online labeling problem. In Proceedings of the 2012 ACM Symposium on Theory of Computing, STOC’12 (pp. 1185-1198). Association for Computing Machinery. https://doi.org/10.1145/2213977.2214083
Schmidt, E. M., Skyum, S. & Nielsen, M. (2012). To Dexter - A Tribute from Aarhus. In R. L. Constable & A. Silva (Eds.), Logic and Program Semantics : Essays Dedicated to Dexter Kozen on the Occasion of His 60th Birthday (pp. 341). Springer. https://doi.org/10.1007/978-3-642-29485-3_30
Sandel, B. S. & Svenning, J.-C. (2012). Topographic controls on the distribution of tree cover from local to global scales. Abstract from The Ecological Society of America, 89th Annual Meeting, Portland, United States.
Andersen, M. S. & Kjærgaard, M. B. (2012). Towards a New Classification of Location Privacy Methods in Pervasive Computing. In A. Puiatti & T. Gu (Eds.), Mobile and Ubiquitous Systems: Computing, Networking, and Services : 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers (Vol. 104, pp. 150-161). Springer. https://doi.org/10.1007/978-3-642-30973-1_13
Jensen, K., Donatelli, S. & Kleijn , J. (Eds.) (2012). Transactions on Petri Nets and Other Models of Concurrency V: ToPNoC. Springer. Lecture Notes in Computer Science Vol. 6900 https://doi.org/10.1007/978-3-642-29072-5
Jensen, K., Aalst, W. M. V. D., Marsan, M. A., Franceschinis, G., Kleijn , J. & Kristensen, L. M. (Eds.) (2012). Transactions on Petri Nets and Other Models of Concurrency VI: ToPNoC. Springer. Lecture Notes in Computer Science Vol. 7400 https://doi.org/10.1007/978-3-642-35179-2
Brodal, G. S., Davoodi, P., Lewenstein, M., Raman, R. & Rao, S. S. (2012). Two Dimensional Range Minimum Queries and Fibonacci Lattices. Lecture Notes in Computer Science, 7501, 217-228 . https://doi.org/10.1007/978-3-642-33090-2_20
Kjærgaard, M. B. & Blunck, H. (2012). Unsupervised Power Profiling for Mobile Devices. In A. Puiatti & T. Gu (Eds.), Mobile and Ubiquitous Systems: Computing, Networking, and Services: 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers (pp. 138-149). Springer. https://doi.org/10.1007/978-3-642-30973-1_12
Lu, H. & Jensen, C. S. (2012). Upgrading Uncompetitive Products Economically. In IEEE 28th International Conference on Data Engineering (ICDE) (pp. 977 - 988 ). IEEE Press. https://doi.org/10.1109/ICDE.2012.92
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2012). Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks. In A. U. Schmidt, G. Russello, I. Krontiris & S. Lian (Eds.), Security and Privacy in Mobile Information and Communication Systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers (pp. 107-118). Springer. https://doi.org/10.1007/978-3-642-33392-7_12