Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Dodds, M., Jagannathan, S., Parkinson, M. J., Svendsen, K. & Birkedal, L. (2016). Verifying custom synchronisation constructs using higher-order separation logic. ACM Transactions on Programming Languages and Systems, 38/2(2), 4:1 - 4:72. Artikel 4. https://doi.org/10.1145/2818638
Klokmose, C. N., Eagan, J., Baader, S., Mackay, W. & Beaudouin-Lafon, M. (2016). Webstrates: Demonstrating the potential of shareable dynamic media. I Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion, CSCW 2016 Companion: CSCW '16 Companion (s. 61-64). Association for Computing Machinery. https://doi.org/10.1145/2818052.2874325
Zagermann, J., Pfeil, U., Rädle, R., Jetter, H.-C., Klokmose, C. N. & Reiterer, H. (2016). When Tablets meet Tabletops: The Effect of Tabletop Size on Around-the-Table Collaboration with Personal Tablets. I CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (s. 5470-5481). Association for Computing Machinery. https://doi.org/10.1145/2858036.2858224
Salgado, M. & Saad-Sulonen, J. (2016). Who needs us? Inquiring into the participatory practices of others and what it means for participatory designers. Afhandling præsenteret på International European Academy of Design Conference, Paris, Frankrig.
Giacomelli, I., Madsen, J. & Orlandi, C. (2016). ZKBoo: Faster Zero-Knowledge for Boolean Circuits. I Proceedings of the 25th USENIX Security Symposium: (USENIX Security 16) (s. 1069-1083). USENIX - The Advanced Computing Systems Association. https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_giacomelli.pdf
Danvy, O. (red.) (2015). 2015 Workshop on Continuations: pre-proceedings. Department of Computer Science, University of Aarhus. https://doi.org/10.7146/aul.4.4
Elkin , M., Pettie, S. & Su, H.-H. (2015). (2Δ − 1)-edge-coloring is much easier than maximal matching in the distributed setting. I P. Indyk (red.), Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '15 (s. 355-370 ). Society for Industrial and Applied Mathematics. http://dl.acm.org/citation.cfm?id=2722155
Cascudo Pueyo, I., Damgård, I. B., David, B. M., Giacomelli, I., Nielsen, J. B. & Trifiletti, R. (2015). Additively Homomorphic UC commitments with Optimal Amortized Overhead. I J. Katz (red.), Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30-April 1, 2015, Proceedings (s. 495–515). Springer. https://doi.org/10.1007/978-3-662-46447-2_22
Branzei, S. & Miltersen, P. B. (2015). A Dictatorship Theorem for Cake Cutting. I Q. Yang & M. Wooldridge (red.), Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015) (s. 481-488). AAAI Press. http://ijcai.org/papers15/Papers/IJCAI15-074.pdf
Elkin , M. & Pettie, S. (2015). A linear-size logarithmic stretch path-reporting distance oracle for general graphs. I P. Indyk (red.), SODA '15 Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms (s. 805-821 ). Society for Industrial and Applied Mathematics. http://dl.acm.org/citation.cfm?id=2722129.2722184&coll=DL&dl=ACM&CFID=630471957&CFTOKEN=95259129
Jespersen, S., Stounbjerg, R. B. K. & Verdezoto, N. (2015). AmBird: Mediating Intimacy for Long Distance Relationships through an Ambient Awareness System. I O. W. Bertelsen & K. Halskov (red.), Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers. Department of Computer Science, Aarhus University. https://doi.org/10.7146/aahcc.v1i1.21321
Bizjak, A. & Møgelberg, R. E. (2015). A model of guarded recursion with clock synchronisation. Electronic Notes in Theoretical Computer Science, 319, 83-101. https://doi.org/10.1016/j.entcs.2015.12.007
Paviotti, M., Møgelberg, R. E. & Birkedal, L. (2015). A model of PCF in guarded type theory. Electronic Notes in Theoretical Computer Science, 319, 333–349. https://doi.org/10.1016/j.entcs.2015.12.020
Walter, R., Bulling, A., Lindlbauer, D., Schuessler , M. & Müller, J. (2015). Analyzing visual attention during whole body interaction with public displays. I Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '15 (s. 1263-1267). Association for Computing Machinery. https://doi.org/10.1145/2750858.2804255
Caragiannis, I., Filos-Ratsikas, A. & Procaccia, A. D. (2015). An improved 2-agent kidney exchange mechanism. Theoretical Computer Science, 589, 53–60. https://doi.org/10.1016/j.tcs.2015.04.013
Goswami, M., Jørgensen, A. G., Larsen, K. G. & Pagh, R. (2015). Approximate Range Emptiness in Constant Time and Optimal Space. I Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '15 (s. 769-775). Society for Industrial and Applied Mathematics. http://dl.acm.org/citation.cfm?id=2133036&picked=prox
Durkota, K., Lisý, V., Bosansky, B. & Kiekintveld, C. (2015). Approximate solutions for attack graph games with imperfect information. I 6th International Conference on Decision and Game Theory for Security, GameSec 2015 (Bind 9406, s. 228-249). Springer. https://doi.org/10.1007/978-3-319-25594-1_13
Sieczkowski, F., Svendsen, K., Birkedal, L. & Pichon-Pharabod, J. (2015). A separation logic for fictional sequential consistency. I J. Vitek (red.), Programming Languages and Systems : 24th European Symposiumon Programming, ESOP 2015 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015 (s. 736-761). Springer. https://doi.org/10.1007/978-3-662-46669-8_30
Hadlak, S., Schumann, H. & Schulz, H.-J. (2015). A Survey of Multi-faceted Graph Visualization. I R. Borgo, F. Ganovelli & I. Viola (red.), EuroVis'15 State of the Art Reports (s. 1-20). Eurographics Association. https://doi.org/10.2312/eurovisstar.20151109
Faust, S., Mukherjee, P., Nielsen, J. B. & Venturi, D. (2015). A Tamper and Leakage Resilient von Neumann Architecture. I J. Katz (red.), Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (s. 579-603). Springer VS. https://doi.org/10.1007/978-3-662-46447-2_26
Jensen, C. S. (2015). Automated Testing of Event-Driven Applications. Department of Computer Science, Aarhus University.
Müller, J., Eberle, D. & Schmidt, C. (2015). BaseLase: An Interactive Focus + Context Laser Floor. I B. Begole & J. Kim (red.), CHI '15, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (s. 3869-3878 ). Association for Computing Machinery. http://dx.doi.org/10.1145/2702123.2702246
Entwistle, J. M., Rasmussen, M. K., Verdezoto, N., Brewer, R. S. & Andersen, M. S. (2015). Beyond the Individual: The Contextual Wheel of Practice as a Research Framework for Sustainable HCI. I B. Begole & J. Kim (red.), Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15 (s. 1125-1134 ). Association for Computing Machinery. https://doi.org/10.1145/2702123.2702232
Chandran, N., Goyal, V., Mukherjee, P., Pandey, O. & Upadhyay, J. (2015). Block-wise Non-Malleable Codes. Cryptology ePrint Archive. http://eprint.iacr.org/2015/129
Dupont-Dupuis, F. (2015). Chain rules for quantum Rényi entropies. Journal of Mathematical Physics, 56(2), Artikel 1.4907981. https://doi.org/10.1063/1.4907981
Brewer, R. S., Verdezoto, N., Rasmussen, M. K., Entwistle, J. M., Grønbæk, K., Blunck, H. & Holst, T. (2015). Challenge: Getting Residential Users to Shift Their Electricity Usage Patterns. I S. Kalyanaraman, D. P. Seetharam & R. Shorey (red.), The sixth ACM International Conference on Future Energy Systems (ACM e-Energy) (s. 83-88). Association for Computing Machinery. https://doi.org/10.1145/2768510.2770934
Rasmussen, M. K. (2015). Changing the Shape of Interaction: Shape-changing Interfaces. Department of Computer Science, Aarhus University.
Branzei, S., Hosseini, H. & Miltersen, P. B. (2015). Characterization and Computation of Equilibria for Indivisible Goods. I Algorithmic Game Theory: 8th International Symposium, SAGT 2015, Saarbrücken, Germany, September 28–30, 2015, Proceedings (s. 244-255). Springer VS. https://doi.org/10.1007/978-3-662-48433-3_19
Bothorel, C., Cruz, J. D., Magnani, M. & Micenková, B. (2015). Clustering attributed graphs: models, measures and methods. Network Science , 3(03), 408-444. https://doi.org/10.1017/nws.2015.9
Bosansky, B., Xin Jiang, A., Tambe, M. & Kiekintveld, C. (2015). Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies. I Proceedings of the twenty-ninth AAAI Conference on Artificial Intelligence and the twenty-seventh Innovative Applications of Artificial Intelligence Conference (s. 812-818). AAAI Press. http://www.aaai.org/ocs/index.php/AAAI/AAAI15/paper/view/9824/9373
Bosansky, B., Xin Jiang, A., Tambe, M. & Kiekintveld, C. (2015). Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies. I AAAI'15: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (s. 812-818) http://teamcore.usc.edu/papers/2015/bosansky_1567.pdf
Huang, Z., Radunović, B., Vojnović, M. & Zhang, Q. (2015). Communication complexity of approximate matching in distributed graphs. I 32nd International Symposium on Theoretical Aspects of Computer Science: STACS’15, March 4–7, 2015, Garching, Germany (s. 460-473). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.STACS.2015.460
Branzei, S. (2015). Computational Fair Division. Department of Computer Science, Aarhus University.
Bosansky, B., Branzei, S., Hansen, K. A., Miltersen, P. B. & Sørensen , T. B. (2015). Computation of Stackelberg Equilibria of Finite Sequential Games. I E. Markakis & G. Schäfer (red.), Web and Internet Economics: 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015, Proceedings (Bind 9470, s. 201-215). Springer VS. http://arxiv.org/abs/1507.07677
Alexander, C., Arge, L., Bøcher, P. K., Revsbæik, M., Sandel, B. S., Svenning, J.-C., Tsirogiannis, C. & Yang, J. (2015). Computing River Floods Using Massive Terrain Data. I Proceedings. Workshop on Massive Data Algorithmics (MASSIVE) (s. 67-85)
Gronvall, E., Verdezoto, N., Bagalkot, N. L. & Sokoler, T. (2015). Concordance: A Critical Participatory Alternative in Healthcare IT. I O. W. Bertelsen & K. Halskov (red.), Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers. Department of Computer Science, Aarhus University. https://doi.org/10.7146/aahcc.v1i1.21315
Fender, A., Müller, J. & Lindlbauer, D. (2015). Creature Teacher: A Performance-Based Animation System for Creating Cyclic Movements. I Proceedings of the 3rd ACM Symposium on Spatial User Interaction, SUI '15 (s. 113-122). Association for Computing Machinery. https://doi.org/10.1145/2788940.2788944
Pold, S., Bertelsen, O. W., Koefoed Hansen, L., Andersen, C. U., Bardzell, S. & Bardzell, J. (2015). Criticism – for Computational Alternatives. I O. Bertelsen & K. Halskov (red.), Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers Department of Computer Science, Aarhus University. https://doi.org/10.7146/aahcc.v1i1.21621
Askarov, A., Moore, S., Dimoulas, C. & Chong, S. (2015). Cryptographic Enforcement of Language-Based Information Erasure. I L. Viganò (red.), 28th IEEE Computer Security Foundations Symposium CSF 2015 : Proceedings (s. 334-348). IEEE Computer Society Press. https://doi.org/10.1109/CSF.2015.30
Spitters, B. (2015). Cubical sets as a classifying topos. Abstract fra 21st International Conference on Types for Proofs and Programs, , Tallinn, Estland.