Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Liu, Z., Hammond, A., Pérami, T., Sewell, P., Birkedal, L. & Pichon-Pharabod, J. (2026). An Axiomatic Basis for Computer Programming on Relaxed Hardware Architectures: The AxSL Logics. ACM Transactions on Programming Languages and Systems. Advance online publication. https://doi.org/10.1145/3786762
Caragiannis, I., Larsen, K. G. & Shyam, S. (2026). A New Lower Bound for Multicolor Discrepancy with Applications to Fair Division. I R. Lavi & J. Zhang (red.), Algorithmic Game Theory: 18th International Symposium, SAGT 2025, Bath, UK, September 2–5, 2025, Proceedings (s. 228-246). Springer. https://doi.org/10.1007/978-3-032-03639-1_13
Caragiannis, I., LeGrand, R., Markakis, E. & Pountourakis, E. (2026). An Impossibility Result for Strongly Group-Strategyproof Multi-winner Approval-Based Voting. I M. Mavronicolas, Q. Qi & G. Schoenebeck (red.), Web and Internet Economics - 20th International Conference, WINE 2024, Proceedings (s. 457–475). Springer. https://doi.org/10.1007/978-3-032-08560-3_26
Su, Z., Zhang, Z., Zhao, J., Liang, X., Zhao, C., Liu, Z., Zhuang, M., Sun, J., Lu, B., Liu, K., Pullens, J. W. M., Harrison, M. T., Chen, D. & Yang, X. (2026). An Increasing Misalignment Between Crop Distribution and Environmental Resources Under Climate Change in China. Advanced Science, e16290. Advance online publication. https://doi.org/10.1002/advs.202516290
Cohen, R., Doerner, J., Lee, E., Lysyanskaya, A. & Roy, L. (2026). An Unstoppable Ideal Functionality for Signatures and a Modular Analysis of the Dolev-Strong Broadcast. I B. Applebaum & H. Lin (red.), Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings (s. 675-708). Springer. https://doi.org/10.1007/978-3-032-12290-2_22
Pérami, T., Bauereiss, T., Campbell, B., Liu, Z., Lauermann, N., Armstrong, A. & Sewell, P. (2026). ArchSem: Reusable Rigorous Semantics of Relaxed Architectures. Proceedings of the ACM on Programming Languages , 10, 204-234. https://doi.org/10.1145/3776650
De Vilhena, P. E., Van Collem, S., Wright, I. & Krebbers, R. (2026). A Relational Separation Logic for Effect Handlers. Proceedings of the ACM on Programming Languages , 10(POPL), 981-1009. Artikel 34. https://doi.org/10.1145/3776676
Li, M., Zhang, P., Xing, W., Zheng, Y., Zaporojets, K., Chen, J., Zhang, R., Zhang, Y., Gong, S., Hu, J., Ma, X., Liu, Z., Groth, P. & Worring, M. (2026). A survey of large language models for data challenges in graphs. Expert Systems with Applications, 298, Part A, Artikel 129643. https://doi.org/10.1016/j.eswa.2025.129643
Skoulakis, S., Muller, A., Viano, L., Cevher, V. & Scheider, J. (2026). Best of Both Worlds: Regret Minimization versus Minimax Play.
Årdal, M. A., Aranha, D. F., Feng, Y., Gao, Y. & Pan, Y. (Accepteret/In press). Better Bounds for Finding Fixed-Degree Isogenies via Coppersmith’s Method. I EUROCRYPT 2026
Caragiannis, I. & Fehrs, K. A. F. (2026). Beyond the Worst Case: Distortion in Impartial Culture Electorates. I M. Mavronicolas, Q. Qi & G. Schoenebeck (red.), Web and Internet Economics - 20th International Conference, WINE 2024, Proceedings (Bind LNCS 15534, s. 420-437). Springer. https://doi.org/10.1007/978-3-032-08560-3_24
Canetti, R., Damgård, I. B., Kolby, S., Ravi, D. & Yakoubov, S. (2026). Deniable Secret Sharing. I B. Applebaum & H. Lin (red.), Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings (s. 399-427) https://doi.org/10.1007/978-3-032-12293-3_13
Cominetti, E., Simplicio, M., Aranha, D. F., Matias, P. & Araujo, R. (2026). E2Easy: a simple lattice-based in-person end-to-end voting scheme. I B. Haslhofer, J. Xu, F. Victor, M. Bartoletti, A. Bracciali, K. Matsuura, J. Nabrzyski, V. Estrada-Galiñanes, C. Tessone, J. Budurushi & K. Marky (red.), Financial Cryptography and Data Security. FC 2025 International Workshops - CoDecFin, FinTeAchin, VOTING, 2025, Revised Selected Papers (s. 281-296). Springer. https://doi.org/10.1007/978-3-032-00495-6_16
Dindler, C., Iversen, O. S., Bossen, C., Kaspersen, M. H. & Dalsgaard, P. (Accepteret/In press). Enacting Utopias: A Participatory Design Approach to AI. I Proceedings of the Participatory Design Conference 2026 (PDC '26) Association for Computing Machinery.
Mu, Q. (2026). Exploring Backchannel Communication in Hybrid Meetings. [Ph.d.-afhandling, Aarhus Universitet].
van Baarsen, A. N. & Pu, S. (2026). Fuzzy Private Set Intersection from VOLE. I G. Hanaoka & B.-Y. Yang (red.), Advances in Cryptology – ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part V (s. 327-360). Springer. https://doi.org/10.1007/978-981-95-5116-3_11
Skitsas, K. (2026). Graph-based Reasoning: Effective Mapping and Planning on Graphs. [Ph.d.-afhandling, Aarhus Universitet].
Grønbæk, J. E., Klokmose, C. N. & Hornbæk, K. (Accepteret/In press). How Do Future Visions Shape the Field of Human-Computer Interaction? I CHI'26: Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems https://doi.org/10.1145/3772318.3791038
Borowski, M., Butcher, P. W. S., Jones, S. J., Ritsos, P. D., Klokmose, C. N. & Elmqvist, N. (Accepteret/In press). “I Feel Like Iron Man”: Authoring, Exploring, and Presenting Data Visualizations in Immersive AR. IEEE Transactions on Visualization and Computer Graphics. https://doi.org/10.1109/TVCG.2026.3672314
Dohn, S., Hansen, K. A. & Klinkby, A. (2026). Improved Hardness Results for the Clearing Problem in Financial Networks with Credit Default Swaps. I R. Lavi & J. Zhang (red.), Algorithmic Game Theory - 18th International Symposium, SAGT 2025, Proceedings: 18th International Symposium, SAGT 2025, Bath, UK, September 2–5, 2025, Proceedings (s. 81-98) https://doi.org/10.1007/978-3-032-03639-1_5
Yakoubov, S., Damgård, I. B., Siniscalchi, L., Ravi, D. & Ciampi, M. (2026). Information-Theoretic Broadcast-Optimal MPC. I B. Applebaum & H. Lin (red.), Theory of Cryptography Conference (TCC 2025) (s. 152-181) https://doi.org/10.1007/978-3-032-12287-2_6
Marionneau, V., Sassus Bourda, F., Aguirre, A. & Birkedal, L. (2026). Modular Specifications and Implementations of Random Samplers in Higher-Order Separation Logic. I K. Stark, Y. Zakowski, N. Swamy & N. Tabareau (red.), CPP 2026 - Proceedings of the 15th ACM SIGPLAN International Conference on Certified Programs and Proofs, Co-located with POPL 2026 (s. 368-382) https://doi.org/10.1145/3779031.3779109
Acharya, A., Hazay, C. & Venkitasubramaniam, M. (2026). On Achieving "Best-in-the-Multiverse" MPC. I B. Applebaum & H. Lin (red.), Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part I (Bind 16268, s. 119–151). Springer LNCS. https://doi.org/10.1007/978-3-032-12287-2_5
Lutze, M. C. D. (2026). On Effects, Inference, and Type Flow. [Ph.d.-afhandling, Aarhus Universitet].
Abram, D., Fehr, S., Obremski, M. & Scholl, P. (2026). On the Impossibility of Actively Secure Distributed Samplers. I B. Applebaum & H. Lin (red.), Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part IV (s. 547-581). Springer Nature. https://doi.org/10.1007/978-3-032-12290-2_18
Tellez, ES., Chavez, E., Aumüller, M. & Mic, V. (2026). Overview of the SISAP 2025 Indexing Challenge. I G. Amato, V. Mic, A. Traina, N. Messina, L. Amsaleg, G. Þór Guðmundsson, B. Þór Jónsson & L. Vadicamo (red.), Similarity Search and Applications - 18th International Conference, SISAP 2025, Proceedings (s. 403-414). Springer. https://doi.org/10.1007/978-3-032-06069-3_33
Escudero, D. & Damgård, I. (2026). Preface. I D. Escudero & I. Damgård (red.), Progress in Cryptology – LATINCRYPT 2025: 9th International Conference on Cryptology and Information Security in Latin America, Medellín, Colombia, October 1–3, 2025, Proceedings (s. v). Springer. https://doi.org/10.1007/978-3-032-06754-8
Behera, A. R., Meyer, P., Orlandi, C., Roy, L. & Scholl, P. (2026). Privately Constrained PRFs from DCR: Puncturing and Bounded Waring Rank. I B. Applebaum & H. Lin (red.), Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings (s. 301-332). Springer. https://doi.org/10.1007/978-3-032-12287-2_11
Chiang, J. H.-Y., Damgård, I., Orlandi, C., Pancholi, M. & Simkin, M. (2026). Securely Computing One-Sided Matching Markets. I C. Garman & P. Moreno-Sanchez (red.), Financial Cryptography and Data Security - 29th International Conference, FC 2025, Revised Selected Papers (s. 126-143). Springer Nature. https://doi.org/10.1007/978-3-032-07024-1_8
Abram, D., Malavolta, G. & Roy, L. (2026). Slightly Sublinear Trapdoor Hash Functions and PIR from Low-Noise LPN. I B. Applebaum & H. Lin (red.), Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings (s. 280-300). Springer Science+Business Media. https://doi.org/10.1007/978-3-032-12287-2_10
Shi, Z., Møldrup, L., Mathur, U. & Pavlogiannis, A. (2026). The Complexity of Testing Message-Passing Concurrency. Proceedings of the ACM on Programming Languages , 10, 1-32. https://doi.org/10.1145/3776643
Acharya, A., Hazay, C., Prabhakaran, M. & Kolesnikov, V. (2026). Towards Building Efficient SCALES Protocols. I G. Hanaoka & B.-Y. Yang (red.), Advances in Cryptology - ASIACRYPT 2025 - 31st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings: 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part V (Bind 16249, s. 35-67). Springer LNCS. https://doi.org/10.1007/978-981-95-5116-3_2
van de Pol, J. & Bouyer, P. (red.) (2025). 36th International Conference on Concurrency Theory, CONCUR 2025. Dagstuhl Publishing. Leibniz International Proceedings in Informatics, LIPIcs Bind 348 https://www.dagstuhl.de/dagpub/978-3-95977-389-8
Manakhov, P. (2025). 3D UI Placement for Interaction on the Go. [Ph.d.-afhandling, Aarhus Universitet].
Cohen-Addad, V., Grandoni, F., Lee, E., Schwiegelshohn, C. & Svensson, O. (2025). A (2+ϵ)-Approximation Algorithm for Metric κ-Median. I M. Koucký & N. Bansal (red.), STOC '25: Proceedings of the 57th Annual ACM Symposium on Theory of Computing (s. 615-624). Association for Computing Machinery. https://doi.org/10.1145/3717823.3718299
Argo, S., Venema, M., Riepel, D., Güneysu, T. & Aranha, D. F. (2025). ABE Cubed: Advanced Benchmarking Extensions for ABE Squared. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(4), 544-587. https://doi.org/10.46586/tches.v2025.i4.544-587
Ozbek, D., AlAlawi, M. & Wessely, M. (2025). AcceloPrint: Fabricating Customizable Accelerometers with Multi-Material 3D Printing. I CHI EA 2025 - Proceedings of the Extended Abstracts of the 2025 CHI Conference on Human Factors in Computing Systems Artikel 59 Association for Computing Machinery. https://doi.org/10.1145/3706599.3720059
Afshani, P. & Sitchinava , N. (2025). A Cell Probe Lower Bound for the Predecessor Search Problem in PRAM. I ACACM-SIAM Symposium on Discrete Algorithms, SODA 2025 (s. 3998-4008). Association for Computing Machinery. https://doi.org/10.1137/1.9781611978322.136
Prummer, F., Weidner, F. & Gellersen, H. (2025). Advancing Eye Dominance Testing: Comparing Traditional Methods with an In-HMD Approach for AR/VR Applications. I Proceedings - 2025 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, VRW 2025 (s. 112-116) https://doi.org/10.1109/VRW66409.2025.00030
Bødker, S. & Ehn, P. (2025). Afterthoughts for an Emergent Future. I Routledge International Handbook of Contemporary Participatory Design (s. 291-293). Taylor & Francis. https://doi.org/10.4324/9781003334330-16