Aarhus University Seal

Publications

The most recently published scientific articles from the Department of Biology. The overview shows the Department's publications with the latest at the top:

Sort by: Date | Author | Title

Jensen, J. L. (1993). Comments on nonparametric predictions of sunspot numbers. Astronomical Journal, 105(1), 350-352.
Jensen, J. L. & Johansson, B. (1990). The extremal family generated by the Yule process. Stochastic Processes and Their Applications, 36(1), 59-76. https://doi.org/10.1016/0304-4149(90)90042-Q
Jensen, J. L. & Sørensen, M. (1983). On the mathematical modeling of aeolian saltation. In B. M. Sumer & A. Muller (Eds.), Mechanics of sediment transport: Proc. Euromech 156, Istanbul, July 1982 (pp. 65-72). CRC Press/Balkema.
Jensen, J. L. (1981). On the hyperboloid distribution. Scandinavian Journal of Statistics, 8(4), 193-206. http://www.jstor.org/stable/4615838
Fort, J., Steen, H., Strøm, H., Tramblay, Y., Grønningsæter, E., Pettex, E., Porter, W. & Grémillet, D. (2013). Energetic consequences of contrasting winter migratory strategies in a sympatric Arctic seabird duet. Journal of Avian Biology, 44(3), 255-262. http://onlinelibrary.wiley.com/doi/10.1111/j.1600-048X.2012.00128.x/abstract
Cao, X., Cong, G., Cui, B., Jensen, C. S. & Yuan, Q. (2012). Approaches to Exploring Category Information for Question Retrieval in Community Question-Answer Archives. A C M Transactions on Information Systems, 30(2), Article No. 7 . https://doi.org/10.1145/2180868.2180869
Bogdanov, D., Niitsoo, M., Toft, T. & Willemson, J. (2012). High-performance secure multi-party computation for data mining applications. International Journal of Information Security, 11(6), 403-418 . https://doi.org/10.1007/s10207-012-0177-2
Erkin, Z., Veugen, T., Toft, T. & Lagendijk, R. L. (2012). Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing. I E E E Transactions on Information Forensics and Security, 7(3), 1053 - 1066 . https://doi.org/10.1109/TIFS.2012.2190726
Dahl, M., Ning, C. & Toft, T. (2012). On Secure Two-Party Integer Division. Lecture Notes in Computer Science, 7397, 164-178 . https://doi.org/10.1007/978-3-642-32946-3_13
Jensen, K., Donatelli, S. & Kleijn , J. (Eds.) (2012). Transactions on Petri Nets and Other Models of Concurrency V: ToPNoC. Springer. Lecture Notes in Computer Science Vol. 6900 https://doi.org/10.1007/978-3-642-29072-5
Chen, N., Deng, X., Zhang, H. & Zhang, J. (2012). Incentive Ratios of Fisher Markets. Lecture Notes in Computer Science, 7392, 464-475 . https://doi.org/10.1007/978-3-642-31585-5_42
Nielsen, J. B., Nordholt, P. S., Orlandi, C. & Burra, S. S. (2012). A New Approach to Practical Active-Secure Two-Party Computation. Lecture Notes in Computer Science, 7417, 681-700 . https://doi.org/10.1007/978-3-642-32009-5_40
Babka, M., Bulánek, J., Cunat, V., Koucky, M. & Saks, M. (2012). On Online Labeling with Polynomially Many Labels. Lecture Notes in Computer Science, 7501, 121-132 . https://doi.org/10.1007/978-3-642-33090-2_12
Dang, X.-H., Ong, K.-L. & Lee, V. (2012). An Adaptive Algorithm for Finding Frequent Sets in Landmark Windows. Lecture Notes in Computer Science, 7520, 590-597 . https://doi.org/10.1007/978-3-642-33362-0_47
Assent, I., Kranen, P., Baldauf, C. & Seidl, T. (2012). AnyOut : Anytime Outlier Detection Approach for High-dimensional Data. Lecture Notes in Computer Science, 7238, 228-242. https://doi.org/10.1007/978-3-642-29038-1_18
Lee, L.-K., Lewenstein, M. & Zhang, Q. (2012). Parikh Matching in the Streaming Model. Lecture Notes in Computer Science, 7608, 336-341. https://doi.org/10.1007/978-3-642-34109-0_35
Borchorst, N. G., McPhail, B., Smith, K. L., Ferenbok, J. & Clement, A. (2012). Bridging Identity Gaps : Supporting Identity Performance in Citizen Service Encounters. Computer Supported Cooperative Work (CSCW): The Journal of Collaborative Computing and Work Practices, 21(6), 555-590 . https://doi.org/10.1007/s10606-012-9163-5
Jensen, K., Aalst, W. M. V. D., Marsan, M. A., Franceschinis, G., Kleijn , J. & Kristensen, L. M. (Eds.) (2012). Transactions on Petri Nets and Other Models of Concurrency VI: ToPNoC. Springer. Lecture Notes in Computer Science Vol. 7400 https://doi.org/10.1007/978-3-642-35179-2
Schøler, L. V., Møller, T. H., Nørgaard, S., Vestergård, L. & Olsen, A. (2012). Isolating genes involved with genotoxic drug response in the nematode Caenorhabditis elegans using genome-wide RNAi screening. In L. Bjergbæk (Ed.), DNA Repair Protocols: Isolating Genes Involved with Genotoxic Drug Response in the Nematode Caenorhabditis elegans Using Genome-Wide RNAi Screening (1 ed., Vol. 920, pp. 27-38). Springer Science+Business Media. https://doi.org/10.1007/978-1-61779-998-3_3
Christensen, H. B., Hansen, K. M., Rasmussen, M. & Manikos, K. (2012). Net4Care Ecosystem Website. http://www.net4care.org
Christensen, H. B. & Hansen, K. M. (2012). Net4Care platform. Computer programme . http://www.net4care.org
Damgård, I. B., Keller, M., Keller, E., Miles, C. & Smart, N. P. (2012). Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol. Lecture Notes in Computer Science, 7485, 241-263. https://doi.org/10.1007/978-3-642-32928-9_14
Dietz, R., Sonne, C., Basu, N., Braune, B., O'Hara, T., Letcher, R. J., Scheuhammer, T., Andersen, M., Andreasen, C., Andriashek, D., Asmund, G., Aubail, A., Baagøe, H. J., Born, E. W., Chan, H. M., Derocher, A. E., Grandjean, P., Knott, K., Kirkegaard, M. ... Aars, J. (2012). What are the toxicological effects of mercury in Arctic biota? Science of the Total Environment, 443C, 775-790. https://doi.org/10.1016/j.scitotenv.2012.11.046

Sort by: Date | Author | Title