Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Bertelsen, O. W. (2018). Against Boredom: The Demonic Pantheism in Design. I J. Bardzell, S. Berdzell & M. Blythe (red.), Critical Theory and Interaction Design (s. 81-94). MIT Press.
Timany, A., Stefanesco, L., Krogh-Jespersen, M. & Birkedal, L. (2018). A Logical Relation for Monadic Encapsulation of State: Proving contextual equivalences in the presence of runST. I Proceedings of the ACM on Programming Languages (Bind 2, s. 64:00-64:28). Association for Computing Machinery. https://doi.org/10.1145/3158152
Afshani, P., De Berg, M., Casanova, H., Karsin, B., Lambrechts, C., Sitchinava, N. & Tsirogiannis, C. (2018). An efficient algorithm for the 1D total visibility-index problem and its parallelization. ACM Journal of Experimental Algorithmics, 23, Artikel 2.3. https://doi.org/10.1145/3209685
Jensen, M. M. & Aagaard, J. (2018). A Postphenomenological Method for HCI Research. I Proceedings of the 30th Australian Computer-Human Interaction Conference, OzCHI 2018: OzCHI 2018 (s. 242-251). Association for Computing Machinery. https://doi.org/10.1145/3292147.3292170
Angelini, M., Santucci, G., Schumann, H. & Schulz, H.-J. (2018). A Review and Characterization of Progressive Visual Analytics. Informatics, 5(3), Artikel 31. https://doi.org/10.3390/informatics5030031
Badertscher, C., Garay, J., Maurer, U., Tschudi, D. & Zikas, V. (2018). But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin. I J. Buus Nielsen (red.), Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings (Bind 10821, s. 34-65). Springer VS. https://doi.org/10.1007/978-3-319-78375-8_2
Dalskov, A. P. K. & Orlandi, C. (2018). Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security. I J. Kim, G.-J. Ahn & S. Kim (red.), ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security (s. 343-355). Association for Computing Machinery. https://doi.org/10.1145/3196494.3196547
Mathisen, A. & Grønbæk, K. (2018). Clear Visual Separation of Temporal Event Sequences. I 2017 IEEE Visualization in Data Science, VDS 2017 (s. 7-14). Artikel 8573439 IEEE. https://doi.org/10.1109/VDS.2017.8573439
Ciampi, M. & Orlandi, C. (2018). Combining Private Set-Intersection with Secure Two-Party Computation. I D. Catalano & R. De Prisco (red.), Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings (Bind 11035, s. 464-482). Springer VS. https://doi.org/10.1007/978-3-319-98113-0
Dowsley, R., Lacerda, F. & Nascimento, A. C. A. (2018). Commitment and Oblivious Transfer in the Bounded Storage Model with Errors. IEEE Transactions on Information Theory, 64(8), 5970-5984. https://doi.org/10.1109/TIT.2018.2796128
Damgård, I., Luo, J., Oechsner, S., Scholl, P. & Simkin, M. (2018). Compact Zero-Knowledge Proofs of Small Hamming Weight. I M. Abdalla & R. Dahab (red.), Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Bind 10770, s. 530-560). Springer VS. https://doi.org/10.1007/978-3-319-76581-5_18
Karbyshev, A., Svendsen, K., Askarov, A. & Birkedal, L. (2018). Compositional Non-interference for Concurrent Programs via Separation and Framing. I L. Bauer & R. Küsters (red.), Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Bind 10804, s. 53-78). Springer VS. https://doi.org/10.1007/978-3-319-89722-6_3
Hansen, K. A. & Lund, T. B. (2018). Computational Complexity of Proper Equilibrium. I É. Tardos, E. Elkind & R. Vohra (red.), ACM EC 2018 - Proceedings of the 2018 ACM Conference on Economics and Computation (s. 113-130). Association for Computing Machinery. https://doi.org/10.1145/3219166.3219199
Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018). Computer-Aided Proofs for Multiparty Computation with Active Security. I Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Bind 2018, s. 119-131). Artikel 8429300 IEEE. https://doi.org/10.1109/CSF.2018.00016
Arge, L., Shin, Y. & Tsirogiannis, C. (2018). Computing Floods Caused by Non-Uniform Sea-Level Rise. I R. Pagh & S. Venkatasubramanian (red.), 2018 Proceedings of the 20th Workshop on Algorithm Engineering and Experiments, ALENEX 2018 (s. 97-108). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611975055.9
Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E. (2018). Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). I T. Peyrin & S. Galbraith (red.), Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Bind 11274, s. 86-117). Springer VS. https://doi.org/10.1007/978-3-030-03332-3_4
Faonio, A., Nielsen, J. B., Simkin, M. & Venturi, D. (2018). Continuously Non-malleable Codes with Split-State Refresh. I B. Preneel & F. Vercauteren (red.), Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Bind 10892, s. 121-139). Springer VS. https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Kazana, T., Obremski, M., Raj, V. & Siniscalchi, L. (2018). Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. I A. Beimel & S. Dziembowski (red.), Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Bind 11240, s. 225-254). Springer VS. https://doi.org/10.1007/978-3-030-03810-6_9
Larsen, K. G., Weinstein, O. & Yu, H. (2018). Crossing the Logarithmic Barrier for Dynamic Boolean Data Structure Lower Bounds. I M. Henzinger, D. Kempe & I. Diakonikolas (red.), STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing (s. 978-989). Association for Computing Machinery. https://doi.org/10.1145/3188745.3188790
Christensen, H. B. (2018). Crunch: Automated Assessment of Microservice Architecture Assignments with Formative Feedback. I C. E. Cuesta, J. Perez & D. Garlan (red.), Software Architecture - 12th European Conference on Software Architecture, ECSA 2018, Proceedings: 12th European Conference on Software Architecture, ECSA 2018 (Bind 11048, s. 175-190). Springer. https://doi.org/10.1007/978-3-030-00761-4_12
Lissandrini, M., Mottin, D., Palpanas, T. & Velegrakis, Y. (2018). Data Exploration using Example-based Methods. Morgan & Claypool Publishers. Synthesis Lectures on Data Management https://doi.org/10.2200/S00881ED1V01Y201810DTM053
Knudsen, S., Vermeulen, J., Kosminsky, D., Walny, J., West, M., Frisson, C., Adriel Aseniero, B., MacDonald Vermeulen, L., Perin, C., Quach, L., Buk, P., Tabuli, K., Chopra, S., Willett, W. & Carpendale, S. (2018). Democratizing Open Energy Data for Public Discourse Using Visualization. I R. Mandryk & M. Hancock (red.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. D406:1-D406:4). Association for Computing Machinery. https://doi.org/10.1145/3170427.3186539
Grønbæk, J. E. (2018). Designing for Interaction Proxemics: Configurations and Transitions. I CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Bind DC08). Artikel DC08 Association for Computing Machinery. https://doi.org/10.1145/3170427.3173033
Neerbek, J., Assent, I. & Dolog, P. (2018). Detecting Complex Sensitive Information via Phrase Structure in Recursive Neural Networks. I D. Phung, V. S. Tseng, G. I. Webb, B. Ho, M. Ganji & L. Rashidi (red.), Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings: PAKDD '18 (Bind 10939, s. 373-385). Springer VS. https://doi.org/10.1007/978-3-319-93040-4_30
Pinder, C., Vermeulen, J., Cowan, B. R. & Beale, R. (2018). Digital Behaviour Change Interventions to Break and Form Habits. ACM Transactions on Computer-Human Interaction, 25(3), 15-15:66. Artikel 15. https://doi.org/10.1145/3196830
Ganesh, C., Kondi, Y., Patra, A. & Sarkar, P. (2018). Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits. I M. Abdalla & R. Dahab (red.), Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (s. 499-529). Springer. https://doi.org/10.1007/978-3-319-76581-5_17
Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D. & Simkin, M. (2018). Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys. IET Information Security, 12(3), 166-183. https://doi.org/10.1049/iet-ifs.2017.0041
Höök, K., Caramiaux, B., Erkut, C., Forlizzi, J., Hajinejad, N., Haller, M., Hummels, C., Isbister, K., Jonsson, M., Khut, G., Loke, L., Lottridge, D., Marti, P., Melcer, E., Müller, F., Petersen, M. G., Schiphorst, T., Segura, E. M., Ståhl, A. ... Tobiasson, H. (2018). Embracing First-Person Perspectives in Soma-Based Design. Informatics, 5/1(8), 1-26. Artikel 2018,5,8. https://doi.org/10.3390/informatics5010008
Auener, S., Daugbjerg, P. S., Nielsen, K. & Sillasen, M. K. (2018). Engineering i skolen. Hvad, hvordan, hvorfor. VIA University College. https://astra.dk/sites/default/files/eis_rapport_v4_1.pdf
Chung, Y., Mortensen, M. L., Binnig, C. & Kraska, T. (2018). Estimating the impact of unknown unknowns on aggregate qery results. ACM Transactions on Database Systems, 43(1), Artikel 3. https://doi.org/10.1145/3167970
Remy, C., Bates, O., Dix, A., Thomas, V., Hazas, M., Friday, A. & Huang, E. M. (2018). Evaluation beyond usability: Validating sustainable HCI research. I CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Bind 2018-April). Association for Computing Machinery. https://doi.org/10.1145/3173574.3173790
Ledo, D., Houben, S., Vermeulen, J., Marquardt, N., Oehlberg, L. & Greenberg, S. (2018). Evaluation Strategies for HCI Toolkit Research. I R. Mandryk & M. Hancock (red.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. 36:1-36:17). Association for Computing Machinery. https://doi.org/10.1145/3173574.3173610
Scholl, P. (2018). Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs. I M. Abdalla & R. Dahab (red.), Public-Key Cryptography - PKC 2018 (Bind 10769, s. 554-583). Springer VS. https://doi.org/10.1007/978-3-319-76578-5_19
Alimadadi, S., Zhong, D., Madsen, M. & Tip, F. (2018). Finding Broken Promises in Asynchronous JavaScript Programs. Proceedings of the ACM on Programming Languages , 2(OOPSLA), 162:1-162:26. Artikel 162. https://doi.org/10.1145/3276532