Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Bhagat, S., Saminathan, K., Agarwal, A., Dowsley, R., De Cock, M. & Nascimento, A. (2019). Privacy-Preserving User Profiling with Facebook Likes. I Y. Song, B. Liu, K. Lee, N. Abe, C. Pu, M. Qiao, N. Ahmed, D. Kossmann, J. Saltz, J. Tang, J. He, H. Liu & X. Hu (red.), Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018 (s. 5298-5299). Artikel 8622081 IEEE. https://doi.org/10.1109/BigData.2018.8622081
Bouros, P., Assent, I., Jeppesen, J. H. & Toftegaard, T. S. (2019). Processing satellite imagery for decision-making in precision agriculture. I P. Papotti (red.), Proceedings of the Workshops of the EDBT/ICDT 2019 Joint Conference (EDBT/ICDT 2019) Sun Site Central Europe. https://bigvis.imsi.athenarc.gr/bigvis2019/papers/BigVis_2019_paper_4.pdf
Pedersen, M. & Chong, S. (2019). Programming with Flow-Limited Authorization: Coarser is Better. I Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019 (s. 63-78). Artikel 8806736 IEEE. https://doi.org/10.1109/EuroSP.2019.00015
Ganesh, C., Orlandi, C. & Tschudi, D. (2019). Proof-of-Stake Protocols for Privacy-Aware Blockchains. I Y. Ishai & V. Rijmen (red.), Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (s. 690-719). Springer. https://doi.org/10.1007/978-3-030-17653-2_23
Damgård, I. B., Ganesh, C. & Orlandi, C. (2019). Proofs of Replicated Storage Without Timing Assumptions. I Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings (s. 355-380). Springer. https://doi.org/10.1007/978-3-030-26948-7_13
Agarwal, A., Dowsley, R., McKinney, N. D., Wu, D., Lin, C.-T., De Cock, M. & Nascimento, A. C. A. (2019). Protecting Privacy of Users in Brain-Computer Interface Applications. IEEE Transactions on Neural Systems and Rehabilitation Engineering, 27(8), 1546-1555. https://doi.org/10.1109/TNSRE.2019.2926965
Grønbæk, J. E., Linding, C., Kromann, A., Jensen, T. F. H. & Petersen, M. G. (2019). Proxemics play: Exploring the interplay between mobile devices and interiors. I DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (s. 177-181). Association for Computing Machinery. https://doi.org/10.1145/3301019.3323886
Ateniese, G., Francati, D., Magri, B. & Venturi, D. (2019). Public immunization against complete subversion without random oracles. I R. H. Deng, V. Gauthier-Umanã, M. Ochoa & M. Yung (red.), Applied Cryptography and Network Security (s. 465-485). Springer. https://doi.org/10.1007/978-3-030-21568-2_23
Lyle, P. J. & Kannabiran, G. (2019). Public Outcomes of Publicly Funded Socio-Technical Projects: Reflections on Empowerment, Participation, and Researcher Responsibility. I J. E. Fischer, S. Martindale, M. Porcheron, S. Reeves & J. Spence (red.), HTTF 2019: : Proceedings of the Halfway to the Future Symposium 2019 (2019 udg., s. 1-3). Artikel 3363480 Association for Computing Machinery. https://doi.org/10.1145/3363384.3363480
Ciosici, M. R., Derczynski, L. & Assent, I. (2019). Quantifying the morphosyntactic content of Brown Clusters. I J. Burstein, C. Doran & T. Solorio (red.), Long and Short Papers: Human Language Technologies (Bind 1, s. 1541-1550). Association for Computational Linguistics. https://aclweb.org/anthology/papers/N/N19/N19-1157/
Spiel, K., Walker, A. M., DeVito, M. A., Birnholtz, J., Barlas, P., Ahmed, A., Brubaker, J. R., Keyes, O., Brulé, E., Light, A., Hardy, J., Rode, J. A. & Kannabiran, G. (2019). Queer(ing) HCI: Moving forward in theory and practice. I CHI EA 2019 - Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems Artikel 3311750 Association for Computing Machinery. https://doi.org/10.1145/3290607.3311750
Fauzi, P. M., Meiklejohn, S., Mercer, R. H. & Orlandi, C. (2019). Quisquis: A New Design for Anonymous Cryptocurrencies. I Advances in Cryptology – ASIACRYPT 2019 (s. 649-678) https://doi.org/10.1007/978-3-030-34578-5
Deuber, D., Magri, B. & Thyagarajan, S. A. K. (2019). Redactable blockchain in the permissionless setting. I Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019 (s. 124-138). Artikel 8835372 IEEE. https://doi.org/10.1109/SP.2019.00039
Avram, G., Choi, J. H. J., De Paoli, S., Light, A., Lyle, P. & Teli, M. (2019). Repositioning CoDesign in the age of platform capitalism: from sharing to caring. CoDesign: International Journal of CoCreation in Design and the Arts, 15(3), 185-191. https://doi.org/10.1080/15710882.2019.1638063
Hogräfer, M. & Schulz, H.-J. (2019). ReVize: A Library for Visualization Toolchaining with Vega-Lite. I Italian Chapter Conference 2019 - Smart Tools and Apps in computer Graphics, STAG 2019 (s. 129-139). Eurographics Association. https://doi.org/10.2312/stag.20191375
Blazy, O., Bossuat, A., Bultel, X., Fouque, P. A., Onete, C. & Pagnin, E. (2019). SAID: Reshaping signal into an identity-based asynchronous messaging protocol with authenticated ratcheting. I Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019 (s. 294-309). Artikel 8806729 IEEE. https://doi.org/10.1109/EuroSP.2019.00030
Rasmussen, T. A. & Huang, W. (2019). SceneCam: Using AR to improve multi-camera remote collaboration. I SIGGRAPH Asia 2019 XR, SA 2019 (s. 36-37). Association for Computing Machinery. https://doi.org/10.1145/3355355.3361892
Neerbek, J., Dolog, P. & Assent, I. (2019). Selective Training: A Strategy for Fast Backpropagation on Sentence Embeddings. I Q. Yang, M.-L. Zhang, Z. Gong, S.-J. Huang & Z.-H. Zhou (red.), Advances in Knowledge Discovery and Data Mining - 23rd Pacific-Asia Conference, PAKDD 2019, Proceedings: PAKDD '19 (s. 40-53). Springer. https://doi.org/10.1007/978-3-030-16142-2_4
Branzei, S., Orlandi, C. & Yang, G. (2019). Sharing Information with Competitors. I D. Fotakis & E. Markakis (red.), Algorithmic Game Theory - 12th International Symposium, SAGT 2019, Proceedings: SAGT 2019 (s. 34-48). Springer. https://doi.org/10.1007/978-3-030-30473-7
Bressa, N. A., Wannamaker, K., Korsgaard, H., Willett, W. & Vermeulen, J. (2019). Sketching and Ideation Activities for Situated Visualization Design. I DIS 2019 - Proceedings of the 2019 ACM Designing Interactive Systems Conference (s. 173-185). Association for Computing Machinery. https://doi.org/10.1145/3322276.3322326
Bressa, N. A. & Vermeulen, J. (2019). Sketching for Immersive Analytics with Situated Visualizations. Afhandling præsenteret på The 2019 ACM CHI Conference on Human Factors in Computing Systems (CHI'19), Glasgow, Storbritannien. https://immersiveanalytics456268596.files.wordpress.com/2019/04/bressa.pdf
Meijer, J. & van de Pol, J. (2019). Sound black-box checking in the LearnLib. Innovations in Systems and Software Engineering, 15(3-4), 267-287. https://doi.org/10.1007/s11334-019-00342-6
Fender, A. & Müller, J. (2019). SpaceState: Ad-Hoc Definition and Recognition of Hierarchical Room States for Smart Environments. I ISS 2019 - Proceedings of the 2019 ACM International Conference on Interactive Surfaces and Spaces (s. 303-314). Association for Computing Machinery. https://doi.org/10.1145/3343055.3359715
Tsitsulin, A., Mottin, D., Karras, P., Bronstein, A. & Müller, E. (2019). Spectral graph complexity. I L. Liu & R. White (red.), The Web Conference 2019 - Companion of the World Wide Web Conference, WWW 2019 (s. 308-309). Association for Computing Machinery. https://doi.org/10.1145/3308560.3316589
Stein, B., Nielsen, B. B., Chang, B.-Y. E. & Møller, A. (2019). Static Analysis with Demand-driven Value Refinement. Proceedings of the ACM on Programming Languages , 3(OOPSLA), Artikel 140. https://doi.org/10.1145/3360566
Pedersen, M. & Askarov, A. (2019). Static Enforcement of Security in Runtime Systems. I Proceedings - 2019 IEEE 32nd Computer Security Foundations Symposium, CSF 2019 (s. 335-350). Artikel 8823712 IEEE. https://doi.org/10.1109/CSF.2019.00030
Aggarwal, D., Damgård, I., Nielsen, J. B., Obremski, M., Purwanto, E., Ribeiro, J. & Simkin, M. (2019). Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. I A. Boldyreva & D. Micciancio (red.), Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Bind II, s. 510-539). Springer. https://doi.org/10.1007/978-3-030-26951-7_18
Avdic, M. & Vermeulen, J. (2019). Studying Breakdowns in Interactions with Smart Speakers. Afhandling præsenteret på The 2019 ACM CHI Conference on Human Factors in Computing Systems (CHI'19), Glasgow, Storbritannien. https://iotdirections.wordpress.com/
Shao, J., Tan, Y., Gao, L., Yang, Q., Plant, C. & Assent, I. (2019). Synchronization-based clustering on evolving data stream. Information Sciences, 501, 573-587. https://doi.org/10.1016/j.ins.2018.09.035
Rasmussen, T. A. & Grønbæk, K. (2019). Tailorable remote assistance with RemoteAssistKit: A study of and design response to remote assistance in the manufacturing industry. I H. Nakanishi, H. Egi, I.-A. Chounta, H. Takada, S. Ichimura & U. Hoppe (red.), Collaboration Technologies and Social Computing - 25th International Conference, CRIWG+CollabTech 2019, Proceedings: 25th International Conference, CRIWG+CollabTech 2019 Kyoto, Japan, September 4–6, 2019 Proceedings (s. 80-95). Springer. https://doi.org/10.1007/978-3-030-28011-6_6
Larsen-Ledet, I. & Korsgaard, H. (2019). Territorial Functioning in Collaborative Writing: Fragmented Exchanges and Common Outcomes. Computer Supported Cooperative Work (CSCW): The Journal of Collaborative Computing and Work Practices, 28(3-4), 391-433. https://doi.org/10.1007/s10606-019-09359-8
Ghosh, S. & Simkin, M. (2019). The Communication Complexity of Threshold Private Set Intersection. I A. Boldyreva & D. Micciancio (red.), Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Bind II, s. 3-29). Springer. https://doi.org/10.1007/978-3-030-26951-7_1
Vermeulen, J., Lim, B. Y., Avdic, M., Wang, D. & Abdul, A. (2019). The Curious Case of Providing Intelligibility for Smart Speakers. Abstract fra The 2019 ACM CHI Conference on Human Factors in Computing Systems (CHI'19), Glasgow, Storbritannien.
Micallef, L., Schulz, H.-J., Angelini, M., Aupetit, M., Chang, R., Kohlhammer, J., Perer, A. & Santucci, G. (2019). The Human User in Progressive Visual Analytics. I EuroVis 2019 - Short Papers (s. 19-23). Eurographics Association. https://doi.org/10.2312/evs.20191164
Afshani, P., Agrawal, M., Doerr, B., Doerr, C., Larsen, K. G. & Mehlhorn, K. (2019). The query complexity of a permutation-based variant of Mastermind. Discrete Applied Mathematics, 260, 28-50. https://doi.org/10.1016/j.dam.2019.01.007
Aranha, D. F. & Pagnin, E. (2019). The simplest multi-key linearly homomorphic signature scheme. I P. Schwabe & N. Thériault (red.), Progress in Cryptology – LATINCRYPT 2019 (s. 280-300). Springer. https://doi.org/10.1007/978-3-030-30530-7_14