Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Baum, C., Damgård, I. B., Larsen, K. G. & Nielsen, M. (2016). How to prove knowledge of small secrets. I J. Katz & M. Robshaw (red.), Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings: CRYPTO 2016: Advances in Cryptology – CRYPTO 2016 (Bind 9816, s. 478-498). Springer VS. https://doi.org/10.1007/978-3-662-53015-3_17
Lindlbauer , D., Lilija, K., Walter , R. & Müller, J. (2016). Influence of Display Transparency on Background Awareness and Task Performance. I CHI 2016 - Proceedings, 34th Annual CHI Conference on Human Factors in Computing Systems (s. 1705-1716). Association for Computing Machinery. https://doi.org/10.1145/2858036.2858453
Nielsen, M. (2016). Interactive Visual Analytics of Big Data - a Web-Based Approach. Department of Computer Science, Aarhus University.
Feuchtner, T., Walter , R. & Müller, J. (2016). Interruption and Pausing of Public Display Games. I Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI 2016: MobileHCI '16 (s. 306-317). Association for Computing Machinery. https://doi.org/10.1145/2935334.2935335
Nunnari, F., Bachynskyi, M. & Heloir, A. (2016). Introducing postural variability improves the distribution of muscular loads during mid-air gestural interaction. I Motion in Games 2016: 9th International Conference on Motion in Games, MIG 2016 (s. 155-160). Artikel 2994278 Association for Computing Machinery. https://doi.org/10.1145/2994258.2994278
Aureliano, V. C. O., Tedesco, P. C. D. A. R. & Caspersen, M. E. (2016). Learning programming through stepwise self-explanations. I Proceedings of the 11th Iberian Conference on Information Systems and Technologies, CISTI 2016 (s. 535-541). IEEE Computer Society Press. https://doi.org/10.1109/CISTI.2016.7521457
Bertelsen, O. W. (2016). Local decision making as a design opportunity. I A. De Angeli, L. Bannon, P. Marti & S. Bordin (red.), COOP 2016: Proceedings of the 12th International Conference on the Design of Cooperative Systems (s. 243-258). Springer VS. https://doi.org/10.1007/978-3-319-33464-6_15
Da Rocha Pinto, P., Dinsdale-Young, T., Gardner, P. & Sutherland, J. (2016). Modular termination verification for non-blocking concurrency. I P. Thiemann (red.), Programming Languages and Systems - 25th European Symposium on Programming, ESOP 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Proceedings (Bind 9632, s. 176-201). Springer. https://doi.org/10.1007/978-3-662-49498-1_8
Höök, K. H., Jonsson, M., Ståhl, A., Tholander, J., Robertson, T., Marti, P., Svanæs, D., Petersen, M. G., Forlizzi, J., Schiphorst, T., Isbister, K., Hummels, C., Klooster, S., Loke, L. & Khut, G. P. (2016). Move to Be Moved. I CHI EA 2016: #chi4good - Extended Abstracts, 34th Annual CHI Conference on Human Factors in Computing Systems (s. 3301-3308). Association for Computing Machinery. https://doi.org/10.1145/2851581.2856470
Bødker, S., Hornbæk, K., Oulasvirta, A. & Reeves, S. (2016). Nine questions for HCI researchers in the making. interactions, 23(4), 58-61. https://doi.org/10.1145/2949686
Bai, G., Damgård, I., Orlandi, C. & Xia, Y. (2016). Non-Interactive Verifiable Secret Sharing for Monotone Circuits. I D. Pointcheval, A. Nitaj & T. Rachidi (red.), Progress in Cryptology – AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Proceedings (Bind 9646, s. 225-244). Springer VS. https://doi.org/10.1007/978-3-319-31517-1_12
Cascudo, I., Damgård, I., Lacerda, F. & Ranellucci, S. (2016). Oblivious transfer from any non-trivial elastic noisy channel via secret key agreement. I Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings (Bind 9985, s. 204-234). Springer VS. https://doi.org/10.1007/978-3-662-53641-4_9
Baum, C. (2016). On Garbling Schemes with and Without Privacy. I V. Zikas & R. De Prisco (red.), Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings: International Conference on Security and Cryptography for Networks (Bind 9841, s. 468-485). Springer VS. https://doi.org/10.1007/978-3-319-44618-9
Ben-Sasson, E., Ben-Tov, I., Damgård, I., Ishai, Y. & Ron-Zewi, N. (2016). On public key encryption from noisy codewords. I Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings (Bind 9615, s. 417-446). Springer VS. https://doi.org/10.1007/978-3-662-49387-8_16
Jakobsen, J. & Orlandi, C. (2016). On the CCA (in)security of MTProto. I Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices: SPSM '16 (s. 113-116). Association for Computing Machinery. https://doi.org/10.1145/2994459.2994468
Damgård, I. B., Nielsen, J. B., Polychroniadou, A. & Raskin, M. (2016). On the Communication Required for Unconditionally Secure Multiplication. I Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Bind 9815, s. 459-488). Springer VS. https://doi.org/10.1007/978-3-662-53008-5_16
Trifiletti, R., Nielsen, J. B., Frederiksen, T. K. & Jakobsen, T. P. (2016). On the Complexity of Additively Homomorphic UC Commitments. I E. Kushilevitz & T. Malkin (red.), Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings (Bind 9562, s. 542-565). Springer VS. https://doi.org/10.1007/978-3-662-49096-9
Campos, G. O., Zimek, A., Sander, J., Campello, R. J. G. B., Micenkova, B., Schubert, E., Assent, I. & Houle, M. E. (2016). On the Evaluation of Outlier Detection: Measures, Datasets, and an Empirical Study Continued. I R. Krestel, D. Mottin & E. Müller (red.), Proceedings of the Conference "Lernen, Wissen, Daten, Analysen" (Bind 1670, s. 1). CEUR Workshop Proceedings. http://ceur-ws.org/Vol-1670/paper-55.pdf
Campos, G. O., Zimek, A., Sander, J., Campello, R. J. G. B., Micenková, B., Schubert, E., Assent, I. & Houle, M. E. (2016). On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study. Data Mining and Knowledge Discovery, 30(4), 891-927. https://doi.org/10.1007/s10618-015-0444-8
Papakonstantinou, P. A., Xu, J. & Yang, G. (2016). On the power and limits of distance-based learning. I M.-F. Balcan & K. Q. Weinberger (red.), Proceedings of the 33nd International Conference on Machine Learning, {ICML} 2016, New York City, NY, USA, June 19-24, 2016 (Bind 48, s. 2263-2271). JMLR.org.
Chatterjee, K., Ibsen-Jensen, R. R. & Pavlogiannis, A. (2016). Optimal Reachability and a Space-Time Tradeoff for Distance Queries in Constant-Treewidth Graphs. I 24th Annual European Symposium on Algorithms (ESA 2016) (s. 28:1-28:17). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ESA.2016.28
Lanng, H., Lykkegaard, A., Thornholm, S., Tzannis, P. & Verdezoto, N. (2016). PeaceKeeper: Augmenting the Awareness and Communication of Noise Pollution in Student Dormitories. I Proceedings of the 7th Augmented Human International Conference, AH 2016: AH '16 Artikel 39 Association for Computing Machinery. https://doi.org/10.1145/2875194.2875218
Kunkel, A., Rheinländer, A., Schiefer, C., Helmer, S., Bouros, P. & Leser, U. (2016). PIEJoin: Towards Parallel Set Containment Joins. I P. Baumann, I. Manolescu-Goujot, L. Trani, Y. Ioannidis, G. G. Barnaföldi, L. Dobos & E. Bányai (red.), Scientific and Statistical Database Management: 28th International Conference, SSDBM 2016 - Proceedings Artikel 11 Association for Computing Machinery. https://doi.org/10.1145/2949689.2949694
Zakarias, R. W. (2016). Practical Secure Computation with Pre-Processing. Department of Computer Science, Aarhus University.
Birkedal, L. (2016). Preface. Electronic Notes in Theoretical Computer Science, 325, 1-2. https://doi.org/10.1016/j.entcs.2016.09.028
Hansen, T. D. & Zwick, U. (2016). Random-Edge Is Slower Than Random-Facet on Abstract Cubes. Leibniz International Proceedings in Informatics, 55, 51:1-51:14. https://doi.org/10.4230/LIPIcs.ICALP.2016.51
Cascudo, I., Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016). Rate-1, linear time and additively homomorphic UC commitments. I M. Robshaw & J. Katz (red.), Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Bind 9816, s. 179-207). Springer VS. https://doi.org/10.1007/978-3-662-53015-3_7
Nielsen, J. B. & Ranellucci, S. (2016). Reactive garbling: Foundation, instantiation, application. I J. H. Cheon & T. Takagi (red.), Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Bind 10032, s. 1022-1052). Springer VS. https://doi.org/10.1007/978-3-662-53890-6_34
Devriese, D., Birkedal, L. & Piessens, F. (2016). Reasoning about object capabilities with logical relations and effect parametricity. I 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016 (s. 147-162). Artikel 7467352 IEEE Press. https://doi.org/10.1109/EuroSP.2016.22
Østergaard Laursen, C., Pedersen, S., Merritt, T. R. & Caprani, O. (2016). Robot-Supported Food Experiences: Exploring Aesthetic Plating with Design Prototypes. I J. T.K.V.Koh, B. J. Dunstan, D. Silvera-Tawil & M. Velonaki (red.), Cultural Robotics - 1st International Workshop, CR 2015 and Held as Part of IEEE RO-MAN 2015, Revised Selected Papers: First International Workshop, CR 2015, Held as Part of IEEE RO-MAN 2015, Kobe, Japan, August 31, 2015. Revised Selected Papers (Bind 9549, s. 107-130). Springer. https://doi.org/10.1007/978-3-319-42945-8_10
Nielsen, M., Elmqvist, N. & Grønbæk, K. (2016). Scribble query: fluid touch brushing for multivariate data visualization. I C. Parker (red.), Proceedings of the 28th Australian Computer-Human Interaction Conference, OzCHI 2016 (s. 381-390). Association for Computing Machinery. https://doi.org/10.1145/3010915.3010951
Tomlein, M. & Grønbæk, K. (2016). Semantic Model of Variability and Capabilities of IoT Applications for Embedded Software Ecosystems. I Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (s. 247-252). Artikel 7516835 IEEE Press. https://doi.org/10.1109/WICSA.2016.17
Bouros, P., Mamoulis, N., Ge, S. & Terrovitis, M. (2016). Set Containment Join Revisited. Knowledge and Information Systems, 49(1), 375-402. https://doi.org/10.1007/s10115-015-0895-7