Aarhus Universitets segl

Publikationer

Følg med i de senest publicerede videnskabelige artikler fra Institut for Biologi. Oversigten viser Instituttets publikationer med de nyeste øverst:

Sortér efter: Dato | Forfatter | Titel

Jensen, J. L. (1993). Comments on nonparametric predictions of sunspot numbers. Astronomical Journal, 105(1), 350-352.
Jensen, J. L. & Johansson, B. (1990). The extremal family generated by the Yule process. Stochastic Processes and Their Applications, 36(1), 59-76. https://doi.org/10.1016/0304-4149(90)90042-Q
Jensen, J. L. & Sørensen, M. (1983). On the mathematical modeling of aeolian saltation. I B. M. Sumer & A. Muller (red.), Mechanics of sediment transport: Proc. Euromech 156, Istanbul, July 1982 (s. 65-72). CRC Press/Balkema.
Jensen, J. L. (1981). On the hyperboloid distribution. Scandinavian Journal of Statistics, 8(4), 193-206. http://www.jstor.org/stable/4615838
Fort, J., Steen, H., Strøm, H., Tramblay, Y., Grønningsæter, E., Pettex, E., Porter, W. & Grémillet, D. (2013). Energetic consequences of contrasting winter migratory strategies in a sympatric Arctic seabird duet. Journal of Avian Biology, 44(3), 255-262. http://onlinelibrary.wiley.com/doi/10.1111/j.1600-048X.2012.00128.x/abstract
Cao, X., Cong, G., Cui, B., Jensen, C. S. & Yuan, Q. (2012). Approaches to Exploring Category Information for Question Retrieval in Community Question-Answer Archives. A C M Transactions on Information Systems, 30(2), Article No. 7 . https://doi.org/10.1145/2180868.2180869
Bogdanov, D., Niitsoo, M., Toft, T. & Willemson, J. (2012). High-performance secure multi-party computation for data mining applications. International Journal of Information Security, 11(6), 403-418 . https://doi.org/10.1007/s10207-012-0177-2
Erkin, Z., Veugen, T., Toft, T. & Lagendijk, R. L. (2012). Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing. I E E E Transactions on Information Forensics and Security, 7(3), 1053 - 1066 . https://doi.org/10.1109/TIFS.2012.2190726
Dahl, M., Ning, C. & Toft, T. (2012). On Secure Two-Party Integer Division. Lecture Notes in Computer Science, 7397, 164-178 . https://doi.org/10.1007/978-3-642-32946-3_13
Jensen, K., Donatelli, S. & Kleijn , J. (red.) (2012). Transactions on Petri Nets and Other Models of Concurrency V: ToPNoC. Springer. Lecture Notes in Computer Science Bind 6900 https://doi.org/10.1007/978-3-642-29072-5
Chen, N., Deng, X., Zhang, H. & Zhang, J. (2012). Incentive Ratios of Fisher Markets. Lecture Notes in Computer Science, 7392, 464-475 . https://doi.org/10.1007/978-3-642-31585-5_42
Nielsen, J. B., Nordholt, P. S., Orlandi, C. & Burra, S. S. (2012). A New Approach to Practical Active-Secure Two-Party Computation. Lecture Notes in Computer Science, 7417, 681-700 . https://doi.org/10.1007/978-3-642-32009-5_40
Babka, M., Bulánek, J., Cunat, V., Koucky, M. & Saks, M. (2012). On Online Labeling with Polynomially Many Labels. Lecture Notes in Computer Science, 7501, 121-132 . https://doi.org/10.1007/978-3-642-33090-2_12
Dang, X.-H., Ong, K.-L. & Lee, V. (2012). An Adaptive Algorithm for Finding Frequent Sets in Landmark Windows. Lecture Notes in Computer Science, 7520, 590-597 . https://doi.org/10.1007/978-3-642-33362-0_47
Assent, I., Kranen, P., Baldauf, C. & Seidl, T. (2012). AnyOut : Anytime Outlier Detection Approach for High-dimensional Data. Lecture Notes in Computer Science, 7238, 228-242. https://doi.org/10.1007/978-3-642-29038-1_18
Lee, L.-K., Lewenstein, M. & Zhang, Q. (2012). Parikh Matching in the Streaming Model. Lecture Notes in Computer Science, 7608, 336-341. https://doi.org/10.1007/978-3-642-34109-0_35
Borchorst, N. G., McPhail, B., Smith, K. L., Ferenbok, J. & Clement, A. (2012). Bridging Identity Gaps : Supporting Identity Performance in Citizen Service Encounters. Computer Supported Cooperative Work (CSCW): The Journal of Collaborative Computing and Work Practices, 21(6), 555-590 . https://doi.org/10.1007/s10606-012-9163-5
Jensen, K., Aalst, W. M. V. D., Marsan, M. A., Franceschinis, G., Kleijn , J. & Kristensen, L. M. (red.) (2012). Transactions on Petri Nets and Other Models of Concurrency VI: ToPNoC. Springer. Lecture Notes in Computer Science Bind 7400 https://doi.org/10.1007/978-3-642-35179-2
Schøler, L. V., Møller, T. H., Nørgaard, S., Vestergård, L. & Olsen, A. (2012). Isolating genes involved with genotoxic drug response in the nematode Caenorhabditis elegans using genome-wide RNAi screening. I L. Bjergbæk (red.), DNA Repair Protocols: Isolating Genes Involved with Genotoxic Drug Response in the Nematode Caenorhabditis elegans Using Genome-Wide RNAi Screening (1 udg., Bind 920, s. 27-38). Springer Science+Business Media. https://doi.org/10.1007/978-1-61779-998-3_3
Christensen, H. B., Hansen, K. M., Rasmussen, M. & Manikos, K. (2012). Net4Care Ecosystem Website. http://www.net4care.org
Christensen, H. B. & Hansen, K. M. (2012). Net4Care platform. Softwareprogram . http://www.net4care.org
Damgård, I. B., Keller, M., Keller, E., Miles, C. & Smart, N. P. (2012). Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol. Lecture Notes in Computer Science, 7485, 241-263. https://doi.org/10.1007/978-3-642-32928-9_14

Sortér efter: Dato | Forfatter | Titel