Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Ciampi, M. & Orlandi, C. (2018). Combining Private Set-Intersection with Secure Two-Party Computation. I D. Catalano & R. De Prisco (red.), Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings (Bind 11035, s. 464-482). Springer VS. https://doi.org/10.1007/978-3-319-98113-0
Dowsley, R., Lacerda, F. & Nascimento, A. C. A. (2018). Commitment and Oblivious Transfer in the Bounded Storage Model with Errors. IEEE Transactions on Information Theory, 64(8), 5970-5984. https://doi.org/10.1109/TIT.2018.2796128
Damgård, I., Luo, J., Oechsner, S., Scholl, P. & Simkin, M. (2018). Compact Zero-Knowledge Proofs of Small Hamming Weight. I M. Abdalla & R. Dahab (red.), Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Bind 10770, s. 530-560). Springer VS. https://doi.org/10.1007/978-3-319-76581-5_18
Karbyshev, A., Svendsen, K., Askarov, A. & Birkedal, L. (2018). Compositional Non-interference for Concurrent Programs via Separation and Framing. I L. Bauer & R. Küsters (red.), Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Bind 10804, s. 53-78). Springer VS. https://doi.org/10.1007/978-3-319-89722-6_3
Hansen, K. A. & Lund, T. B. (2018). Computational Complexity of Proper Equilibrium. I É. Tardos, E. Elkind & R. Vohra (red.), ACM EC 2018 - Proceedings of the 2018 ACM Conference on Economics and Computation (s. 113-130). Association for Computing Machinery. https://doi.org/10.1145/3219166.3219199
Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018). Computer-Aided Proofs for Multiparty Computation with Active Security. I Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Bind 2018, s. 119-131). Artikel 8429300 IEEE. https://doi.org/10.1109/CSF.2018.00016
Arge, L., Shin, Y. & Tsirogiannis, C. (2018). Computing Floods Caused by Non-Uniform Sea-Level Rise. I R. Pagh & S. Venkatasubramanian (red.), 2018 Proceedings of the 20th Workshop on Algorithm Engineering and Experiments, ALENEX 2018 (s. 97-108). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611975055.9
Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E. (2018). Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). I T. Peyrin & S. Galbraith (red.), Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Bind 11274, s. 86-117). Springer VS. https://doi.org/10.1007/978-3-030-03332-3_4
Faonio, A., Nielsen, J. B., Simkin, M. & Venturi, D. (2018). Continuously Non-malleable Codes with Split-State Refresh. I B. Preneel & F. Vercauteren (red.), Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Bind 10892, s. 121-139). Springer VS. https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Kazana, T., Obremski, M., Raj, V. & Siniscalchi, L. (2018). Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. I A. Beimel & S. Dziembowski (red.), Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Bind 11240, s. 225-254). Springer VS. https://doi.org/10.1007/978-3-030-03810-6_9
Larsen, K. G., Weinstein, O. & Yu, H. (2018). Crossing the Logarithmic Barrier for Dynamic Boolean Data Structure Lower Bounds. I M. Henzinger, D. Kempe & I. Diakonikolas (red.), STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing (s. 978-989). Association for Computing Machinery. https://doi.org/10.1145/3188745.3188790
Christensen, H. B. (2018). Crunch: Automated Assessment of Microservice Architecture Assignments with Formative Feedback. I C. E. Cuesta, J. Perez & D. Garlan (red.), Software Architecture - 12th European Conference on Software Architecture, ECSA 2018, Proceedings: 12th European Conference on Software Architecture, ECSA 2018 (Bind 11048, s. 175-190). Springer. https://doi.org/10.1007/978-3-030-00761-4_12
Lissandrini, M., Mottin, D., Palpanas, T. & Velegrakis, Y. (2018). Data Exploration using Example-based Methods. Morgan & Claypool Publishers. Synthesis Lectures on Data Management https://doi.org/10.2200/S00881ED1V01Y201810DTM053
Knudsen, S., Vermeulen, J., Kosminsky, D., Walny, J., West, M., Frisson, C., Adriel Aseniero, B., MacDonald Vermeulen, L., Perin, C., Quach, L., Buk, P., Tabuli, K., Chopra, S., Willett, W. & Carpendale, S. (2018). Democratizing Open Energy Data for Public Discourse Using Visualization. I R. Mandryk & M. Hancock (red.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. D406:1-D406:4). Association for Computing Machinery. https://doi.org/10.1145/3170427.3186539
Grønbæk, J. E. (2018). Designing for Interaction Proxemics: Configurations and Transitions. I CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Bind DC08). Artikel DC08 Association for Computing Machinery. https://doi.org/10.1145/3170427.3173033
Neerbek, J., Assent, I. & Dolog, P. (2018). Detecting Complex Sensitive Information via Phrase Structure in Recursive Neural Networks. I D. Phung, V. S. Tseng, G. I. Webb, B. Ho, M. Ganji & L. Rashidi (red.), Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings: PAKDD '18 (Bind 10939, s. 373-385). Springer VS. https://doi.org/10.1007/978-3-319-93040-4_30
Pinder, C., Vermeulen, J., Cowan, B. R. & Beale, R. (2018). Digital Behaviour Change Interventions to Break and Form Habits. ACM Transactions on Computer-Human Interaction, 25(3), 15-15:66. Artikel 15. https://doi.org/10.1145/3196830
Ganesh, C., Kondi, Y., Patra, A. & Sarkar, P. (2018). Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits. I M. Abdalla & R. Dahab (red.), Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (s. 499-529). Springer. https://doi.org/10.1007/978-3-319-76581-5_17
Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D. & Simkin, M. (2018). Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys. IET Information Security, 12(3), 166-183. https://doi.org/10.1049/iet-ifs.2017.0041
Höök, K., Caramiaux, B., Erkut, C., Forlizzi, J., Hajinejad, N., Haller, M., Hummels, C., Isbister, K., Jonsson, M., Khut, G., Loke, L., Lottridge, D., Marti, P., Melcer, E., Müller, F., Petersen, M. G., Schiphorst, T., Segura, E. M., Ståhl, A. ... Tobiasson, H. (2018). Embracing First-Person Perspectives in Soma-Based Design. Informatics, 5/1(8), 1-26. Artikel 2018,5,8. https://doi.org/10.3390/informatics5010008
Auener, S., Daugbjerg, P. S., Nielsen, K. & Sillasen, M. K. (2018). Engineering i skolen. Hvad, hvordan, hvorfor. VIA University College. https://astra.dk/sites/default/files/eis_rapport_v4_1.pdf
Chung, Y., Mortensen, M. L., Binnig, C. & Kraska, T. (2018). Estimating the impact of unknown unknowns on aggregate qery results. ACM Transactions on Database Systems, 43(1), Artikel 3. https://doi.org/10.1145/3167970
Remy, C., Bates, O., Dix, A., Thomas, V., Hazas, M., Friday, A. & Huang, E. M. (2018). Evaluation beyond usability: Validating sustainable HCI research. I CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Bind 2018-April). Association for Computing Machinery. https://doi.org/10.1145/3173574.3173790
Ledo, D., Houben, S., Vermeulen, J., Marquardt, N., Oehlberg, L. & Greenberg, S. (2018). Evaluation Strategies for HCI Toolkit Research. I R. Mandryk & M. Hancock (red.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. 36:1-36:17). Association for Computing Machinery. https://doi.org/10.1145/3173574.3173610
Scholl, P. (2018). Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs. I M. Abdalla & R. Dahab (red.), Public-Key Cryptography - PKC 2018 (Bind 10769, s. 554-583). Springer VS. https://doi.org/10.1007/978-3-319-76578-5_19
Alimadadi, S., Zhong, D., Madsen, M. & Tip, F. (2018). Finding Broken Promises in Asynchronous JavaScript Programs. Proceedings of the ACM on Programming Languages , 2(OOPSLA), 162:1-162:26. Artikel 162. https://doi.org/10.1145/3276532
Clouston, R. (2018). Fitch-Style Modal Lambda Calculi. I C. Baier & U. Dal Lago (red.), Foundations of Software Science and Computation Structures - 21st International Conference, FOSSACS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings: 21st International Conference on Foundations of Software Science and Computation Structures (FoSSaCS) (Bind 10803, s. 258-275). Springer. https://doi.org/10.1007/978-3-319-89366-2_14
Freksen, C. B., Kamma, L. & Larsen, K. G. (2018). Fully Understanding the Hashing Trick. 5389-5399. Poster-session præsenteret på Neural Information Processing Systems Conference, Montreal, Canada.
Thiel, S. K. (2018). Gamifying creative potential: For better or worse? I M. Ciussi (red.), 12th European Conference on Game Based Learning, ECGBL 2018 (s. 915-919). Dechema e.V..
Filos-Ratsikas, A., Stiil Frederiksen, S. K., Goldberg, P. W. & Zhang, J. (2018). Hardness results for consensus-halving. I I. Potapov, J. Worrell & P. Spirakis (red.), 43rd International Symposium on Mathematical Foundations of Computer Science, MFCS 2018 (Bind 117). Artikel 24 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.MFCS.2018.24
Angerås, O., Haraldsson, I., Redfors, B., Fröbert, O., Petursson, P., Albertsson, P., Ioanes, D., Odenstedt, J., Olsson, H., Witt, N., Rück, A., Millgård, J., Nilsson, J., Persson, J., Söderbom, M., Wedel, H., Erlinge, D., James, S., Råmunddal, T. & Omerovic, E. (2018). Impact of thrombus aspiration on mortality, stent thrombosis, and stroke in patients with ST-segment-elevation myocardial infarction: A report from the Swedish coronary angiography and angioplasty registry. Journal of the American Heart Association, 7(1), Artikel e007680. https://doi.org/10.1161/JAHA.117.007680
Jensen, S. Q., Fender, A. & Müller, J. (2018). Inpher: Inferring physical properties of virtual objects from mid-air interaction. I R. Mandryk & M. Hancock (red.), Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Bind 2018-April). Artikel 530 Association for Computing Machinery. https://doi.org/10.1145/3173574.3174104
Pham, T. H., Kristensen, J., Mai, S. T., Assent, I., Jacobsen, J., Vo, B. & Le, A. (2018). Interactive Exploration of Subspace Clusters on Multicore Processors. I A. Hameurlain, R. Wagner, D. Benslimane, E. Damiani & W. I. Grosky (red.), Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXIX - Special Issue on Database- and Expert-Systems Applications: Special Issue on Database- and Expert-Systems Applications (Bind 11310, s. 169-199). Springer VS. https://doi.org/10.1007/978-3-662-58415-6_6
Thomsen, J. R., Krogh, P. G., Schnedler, J. A. & Linnet, H. (2018). Interactive interior and proxemics thresholds: Empowering participants in sensitive conversations. I CHI 2018 - Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Bind 2018). Artikel 68 Association for Computing Machinery. https://doi.org/10.1145/3173574.3173642
Thomas, V., Brueggemann, M. J., Wang, D., Darby, A., Wohl, B., Vermeulen, L. M. D., Bates, O. & Feldman, D. (2018). In the eye of a hurricane there is quiet, for just a moment, -. I R. Mandryk, M. Hancock, M. Perry & A. Cox (red.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (s. 1-10). Artikel alt01 Association for Computing Machinery. https://doi.org/10.1145/3170427.3188394
Obremski, M. & Skorski, M. (2018). Inverted Leftover Hash Lemma. I 2018 IEEE International Symposium on Information Theory, ISIT 2018 (Bind 2018-June, s. 1834-1838). Artikel 8437654 IEEE. https://doi.org/10.1109/ISIT.2018.8437654