Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Kallel, S., Charfi, A., Mezini, M., Jmaiel, M. & Klose, K. (2009). From Formal Access Control Policies to Runtime Enforcement Aspects. Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-642-00199-4_2
Abam, M., de Berg, M., Farshi, M., Gudmundsson, J. & Smid, M. (2009). Geometric Spanners for Weighted Point Sets. Lecture Notes in Computer Science, 190-202. https://doi.org/10.1007/978-3-642-04128-0_17
Nielsen, J. K., Freckmann, G., Kapitza, C., Ocvirk, G., Koelker, K. H., Amann-Zalan, I., Gillen, R., Kamecke, U., Jendrike, N., Christiansen, J. S., Koschinsky, T. & Heinemann, L. (2009). Glucose monitoring by microdialysis: performance in a multicentre study. Diabetic Medicine, 26(7), 714-21. https://doi.org/10.1111/j.1464-5491.2009.02750.x
Andersson, D. (2009). Hashiwokakero is NP-Complete. Information Processing Letters, 109(19), 1145. https://doi.org/10.1016/j.ipl.2009.07.017
Ham, F. V., Schulz, H.-J. & Dimicco, J. M. (2009). Honeycomb: Visual Analysis of Large Scale Social Networks. In Human-Computer Interaction – INTERACT 2009: 12th IFIP TC 13 International Conference Uppsala, Sweden, August 24-28, 2009 Proceedings, Part II (pp. 429-442). Springer. https://doi.org/10.1007/978-3-642-03658-3_47
Damgård, I. B., Fehr, S., Lunemann, C., Salvail, L. & Schaffner, C. (2009). Improving the Security of Quantum Protocols via Commit-and-Open. Lecture Notes in Computer Science, 408-427. https://doi.org/10.1007/978-3-642-03356-8_24
Afshani, P., Barbay, J. & Chan, T. M. (2009). Instance-optimal geometric algorithms. In 50th Annual Symposium on Foundations of Computer Science. Proceedings (pp. 129-138). IEEE Computer Society Press. https://doi.org/10.1109/FOCS.2009.34
Geisler, M. J. & Cachin, C. (2009). Integrity Protection for Revision Control. Lecture Notes in Computer Science, 382-399. https://doi.org/10.1007/978-3-642-01957-9_24
Nielsen, J., Pedersen, C. S. & Hein, J. (2009). Investigation of a simple heuristic improving the speed of statistical alignments. Poster session presented at 17th Annual International Conference on Intelligent Systems for Molecular Biology (ISMB) & 8th European Conference on Computational Biology (ECCB), Stockholm, Sweden.
Mathiasen, N. R. (2009). It-security seen from a user experience perspective. Poster session presented at NordiCHI. Workshop on User centered Security., Lund, Sweden.
Møller, A. & Schwarz, M. R. (2009). JWIG: Yet Another Framework for Maintainable and Secure Web Applications. In J. Filipe & J. Cordeiro (Eds.), WEBIST 2009 - Proceedings of the Fifth International Conference on Web Information Systems and Technologies (pp. 47-53). Institute for Systems and Technologies of Information, Control and Communication.
Petersen, L. K., Vaesel, H., Brønsgaard, P. H., Kolby, P. & Madsen, K. G. (2009). Kendskab til humant papillomvirus-relateret sygdom blandt kvinder i almen praksis. Ugeskrift for Læger, 171(14), 1173-7.
Abam, M. & de Berg, M. (2009).  Kinetic spanners in Rd. In J. Hershberger & E. Fogel (Eds.), Annual Symposium on Computational Geometry: SESSION: Monday, June 8th, 10:50-11:50 am (pp. 43-50). Association for Computing Machinery. https://doi.org/10.1145/1542362.1542371
Kristensen, T. G., Pedersen, C. S., Thomsen, R. & Christensen, M. H. (2009). Largest Common Chemical Feature Subtree as a Virtual Screening Method. Poster session presented at 17th Annual International Conference on Intelligent Systems for Molecular Bioligy (ISMB) & 8th European Conference on Computational Biology (ECCB), Stockholm, Sweden. http://www.iscb.org/ismbeccb2009/poster_list.php?cat=C
Nevo, I., Kapishnikov, S., Birman, A., Dong, M., Cohen, S. R., Kjaer, K., Besenbacher, F., Stapelfeldt, H., Seideman, T. & Leiserowitz, L. (2009). Laser-induced aligned self-assembly on water surfaces. Journal of Chemical Physics, 130(14), 144704. https://doi.org/10.1063/1.3108540
Thorbek, R. I. (2009). Linear Integer Secret Sharing. Aarhus Universitetsforlag.
Olsen, M. (2009). Link Building. Aarhus Universitetsforlag.
Buscher, M. & Mogensen, P. H. (2009). Matereal methods. In M. Buscher, D. Goodwin & J. Mesman (Eds.), Ethnographies of diagnostic work: Dimensions of transformative practice Palgrave Macmillan.
Petersen, M. G., Gude, R., Nielsen, K. R. & Grønbæk, K. (2009). MediaJourney: capturing and sharing digital media from real-world and virtual journeys. Poster session presented at ACM Conference on Hypertext and Hypermedia, HT, Torino, Italy. https://doi.org/10.1145/1557914.1557979
Kyng, M. & Kristensen, M. (2009). Media Spaces, Emergency Response and Palpable Technologies. Computer Supported Cooperative Work, 325-349. https://doi.org/10.1007/978-1-84882-483-6_20
Grønbæk, L. J., Schwefel, H.-P. & Toftegaard, T. S. (2009). Model based Evaluation of Policies for End-Node Driven Fault Recovery. In Design of Reliable Communication Networks, 2009. DRCN 2009. 7th International Workshop on (pp. 367-374). IEEE Press. https://doi.org/10.1109/DRCN.2009.5339983
Ajwani, D., Beckmann, A., Jakob, R., Meyer, U. & Moruz, G. (2009). On Computational Models for Flash Memory Devices. Lecture Notes in Computer Science, 16-27. https://doi.org/10.1007/978-3-642-02011-7_4
Zerny, I. (2009). On Graph Rewriting, Reduction and Evaluation. In Z. Horváth, V. Zsók, P. Achten & P. Koopman (Eds.), Tenth Symposium on Trends in Functional Programming, TFP. Proceedings (2009 ed., pp. 164-178). Selye János University.