Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Hansen, S. T., Gomes, C., Larsen, P. G. & Van De Pol, J. (2021). Synthesizing Co-Simulation Algorithms with Step Negotiation and Algebraic Loop Handling. I C. R. Martin, M. J. Blas & A. I. Psijas (red.), 2021 Annual Modeling and Simulation Conference (ANNSIM) (s. 62-73). IEEE. https://doi.org/10.23919/ANNSIM52504.2021.9552073
Baum, C., David, B., Dowsley, R., Nielsen, J. B. & Oechsner, S. (2021). TARDIS: A Foundation of Time-Lock Puzzles in UC. I Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (s. 429-459). Springer. https://doi.org/10.1007/978-3-030-77883-5_15
Lewkowicz, M., Bødker, S., Boden, A. & Fedosov, A. (2021). Technical Design and Development of Future Platforms.
Torp, M. T. (2021). Techniques and Tools for Supporting Maintenance of Node.js Programs. [Ph.d.-afhandling, Aarhus Universitet]. Aarhus Universitet.
Kaspersen, M. H., Bilstrup, K.-E. K. & Petersen, M. G. (2021). The Machine Learning Machine: A Tangible User Interface for Teaching Machine Learning. I TEI 2021 - Proceedings of the 15th International Conference on Tangible, Embedded, and Embodied Interaction (s. 1-12). Artikel 19 Association for Computing Machinery. https://doi.org/10.1145/3430524.3440638
Birkedal, L., Dinsdale-Young, T., Guéneau, A., Jaber, G., Svendsen, K. & Tzevelekos, N. (2021). Theorems for free from separation logic specifications. Proceedings of the ACM on Programming Languages , 5(ICFP), Artikel 81. https://doi.org/10.1145/3473586
Bui, T. L., Chatterjee, K., Gautam, T., Pavlogiannis, A. & Toman, V. (2021). The reads-from equivalence for the TSO and PSO memory models. Proceedings of the ACM on Programming Languages , 5(OOPSLA), Artikel 164. https://doi.org/10.1145/3485541
Nayara Ortiz, J., Ricardo de Araujo, R., Aranha, D. F., Rodrigues Costa, S. I. & Dahab, R. (2021). The Ring-LWE Problem in Lattice-based Cryptography: The Case of Twisted Embeddings. Entropy, 23(9), Artikel 1108. https://doi.org/10.3390/e23091108
Orlandi, C., Scholl, P. & Yakoubov, S. (2021). The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT. I A. Canteaut & F.-X. Standaert (red.), Advances in Cryptology – EUROCRYPT 2021 : 7th International Conference on Cryptology and Information Security in Latin America, Proceedings (s. 678-708). Springer. https://doi.org/10.1007/978-3-030-77870-5_24
Nasir, M. A. U., Aslay, C., de Francisi Morales, G. & Riondato, M. (2021). TipTap: Approximate Mining of Frequent k-Subgraph Patterns in Evolving Graphs. ACM Transactions on Knowledge Discovery from Data, 15(3), 1-35. Artikel 48. https://doi.org/10.1145/3442590
Hubenschmid, S., Zagermann, J., Fink, D., Wieland, J., Feuchtner, T. & Reiterer, H. (2021). Towards Asynchronous Hybrid User Interfaces for Cross-Reality Interaction. I H.-C. Jetter, J.-H. Schröder, J. Gugenheimer, M. Billinghurst, C. Anthes, M. Khamis & T. Feuchtner (red.), ISS'21 Workshop Proceedings: Transitional Interfaces in Mixed and Cross-Reality: A new frontier? https://doi.org/10.18148/kops/352-2-84mm0sggczq02
Blaabjerg, J. F. & Askarov, A. (2021). Towards Language-Based Mitigation of Traffic Analysis Attacks. Afhandling præsenteret på 34th IEEE Computer Security Foundations Symposium, Online, USA. https://doi.org/10.1109/CSF51468.2021.00030
Spies, S., Gäher, L., Gratzer, D., Tassarotti, J., Krebbers, R., Dreyer, D. & Birkedal, L. (2021). Transfinite Iris: Resolving an existential dilemma of step-indexed separation logic. I S. N. Freund & E. Yahav (red.), PLDI 2021 - Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation (s. 80-95). Association for Computing Machinery. https://doi.org/10.1145/3453483.3454031
Reyzin, L., Smith, A. & Yakoubov, S. (2021). Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC. I Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings: Proceedings (Bind 12716, s. 361-378). Springer. https://doi.org/10.1007/978-3-030-78086-9_27
Damgård, I. B., Orlandi, C., Takahashi, A. & Tibouchi, M. (2021). Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. I J. A. Garay (red.), Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings: 24rd IACR International Conference on Practice and Theory of Public-Key Cryptography, proceedings part 1 (s. 99-130). Springer. https://doi.org/10.1007/978-3-030-75245-3_5
Teli, M., Rossitto, C., Lewkowicz, M. & Bødker, S. (2021). Understanding, Promoting, and Designing for Sustainable Appropriation of Technologies by Grassroots Communities. Towards a new wave of technological activism: Sustainable Appropriation of Technologies by Grassroots Communities. I C&T '21: Proceedings of the 10th International Conference on Communities & Technologies - Wicked Problems in the Age of Tech (s. 332-335). Association for Computing Machinery. https://doi.org/10.1145/3461564.3468163
Seinfeld, S., Feuchtner, T., Maselli, A. & Müller, J. (2021). User Representations in Human-Computer Interaction. Human-Computer Interaction, 36(5-6), 400-438. https://doi.org/10.1080/07370024.2020.1724790
Madsen, O. L. (2021). Using Coroutines for Multi-core Preemptive Scheduling. I Proceedings of the 11th Workshop on Programming Languages and Operating Systems (PLOS '21) (s. 46-52). Association for Computing Machinery. https://doi.org/10.1145/3477113.3487271
Hansen, S. T., Gomes, C., Palmieri, M., Thule, C., van de Pol, J. & Woodcock, J. (2021). Verification of Co-simulation Algorithms Subject to Algebraic Loops and Adaptive Steps. I A. L. Lafuente & A. Mavridou (red.), Formal Methods for Industrial Critical Systems (s. 3-20). Springer. https://doi.org/10.1007/978-3-030-85248-1_1
Kamp, S. H., Magri, B., Matt, C., Nielsen, J. B., Thomsen, S. E. & Tschudi, D. (2021). Weight-Based Nakamoto-Style Blockchains. I P. Longa & C. Ràfols (red.), Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America Bogotá, Colombia, October 6–8, 2021, Proceedings (s. 299-319). Springer International Publishing. https://doi.org/10.1007/978-3-030-88238-9_15
Babai, L., Hansen, K. A., Podolskii, V. V. & Sun, X. (2021). Weights of exact threshold functions. Izvestiya: Mathematics, 85(6), 1039-1059. https://doi.org/10.1070/IM9113
Bødker, S., Korsgaard, H. & Lyle, P. (2021). What's in a Pattern: A Vocabulary to Articulate Group Routines and Practices. I F. Cech & S. Farnham (red.), C&T '21: Proceedings of the 10th International Conference on Communities & Technologies - Wicked Problems in the Age of Tech (s. 179-190). Association for Computing Machinery. https://doi.org/10.1145/3461564.3461570
Aslay, C., Ciaperoni, M., Gionis, A. & Mathioudakis, M. (2021). Workload-aware materialization for efficient variable elimination on Bayesian networks. I Proceedings - 2021 IEEE 37th International Conference on Data Engineering, ICDE 2021 (s. 1152-1163). Artikel 9458677 IEEE. https://doi.org/10.1109/ICDE51399.2021.00104
Evangelista Belo, J. M., Feit, A. M., Feuchtner, T. & Grønbæk, K. (2021). XRgonomics: Facilitating the Creation of Ergonomic 3D Interfaces. I CHI 2021 - Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems: Making Waves, Combining Strengths (s. 1-11). Artikel 290 Association for Computing Machinery. https://doi.org/10.1145/3411764.3445349
Gentry, C., Halevi, S., Krawczyk, H., Magri, B., Nielsen, J. B., Rabin, T. & Yakoubov, S. (2021). YOSO: You Only Speak Once: Secure MPC with Stateless Ephemeral Roles. I T. Malkin & C. Peikert (red.), Advances in Cryptology – CRYPTO 2021: Annual International Cryptology Conference (s. 64-93). Springer. https://doi.org/10.1007/978-3-030-84245-1_3
Benarroch, D., Campanelli, M., Fiore, D., Gurkan, K. & Kolonelos, D. (2021). Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular. I N. Borisov & C. Diaz (red.), Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part I (s. 393-414). Springer. https://doi.org/10.1007/978-3-662-64322-8_19
Lowe, A., Svendsen, S. C., Agarwal, P. K. & Arge, L. (2020). 1D and 2D Flow Routing on a Terrain. I C.-T. Lu, F. Wang, G. Trajcevski, Y. Huang, S. Newsam & L. Xiong (red.), Proceedings of the 28th International Conference on Advances in Geographic Information Systems, SIGSPATIAL GIS 2020 (s. 5-14). Association for Computing Machinery. https://doi.org/10.1145/3397536.3422269
Afshani, P. & Cheng, P. (2020). 2D generalization of fractional cascading on axis-aligned planar subdivisions. I Proceedings - 2020 IEEE 61st Annual Symposium on Foundations of Computer Science, FOCS 2020 (s. 716-727). Artikel 9317953 IEEE Computer Society Press. https://doi.org/10.1109/FOCS46700.2020.00072
Ciosici, M. R., Assent, I. & Derczynski, L. (2020). Accelerated High-Quality Mutual-Information Based Word Clustering. I LREC 2020 - 12th International Conference on Language Resources and Evaluation, Conference Proceedings (s. 2491-2496). European Language Resources Association. https://www.aclweb.org/anthology/2020.lrec-1.303
Nonnemann, L., Schumann, H., Urban, B., Aehnelt, M. & Schulz, H.-J. (2020). A Characterization of Data Exchange between Visual Analytics Tools. I 2020 24th International Conference Information Visualisation, IV 2020 (s. 368-377). Artikel 9373163 IEEE. https://doi.org/10.1109/IV51561.2020.00066
Trittenbach, H., Böhm, K. & Assent, I. (2020). Active Learning of SVDD Hyperparameter Values. I G. Webb, Z. Zhang, V. S. Tseng, G. Williams, M. Vlachos & L. Cao (red.), Proceedings - 2020 IEEE 7th International Conference on Data Science and Advanced Analytics, DSAA 2020 (s. 109-117). Artikel 9260103 IEEE. https://doi.org/10.1109/DSAA49011.2020.00023
Jafargholi, Z. & Oechsner, S. (2020). Adaptive Security of Practical Garbling Schemes. I K. Bhargavan, E. Oswald & M. Prabhakaran (red.), Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings: INDOCRYPT 2020 (s. 741-762). Springer VS. https://doi.org/10.1007/978-3-030-65277-7_33
Petersen, M. G., Rasmussen, M. K. & Trettvik, J. (2020). Affordances of Shape-Changing Interfaces: An Information Perspective on transformability and Movement. I DIS 2020 - Proceedings of the 2020 ACM Designing Interactive Systems Conference (s. 1959-1971). Association for Computing Machinery. https://doi.org/10.1145/3357236.3395521
Dinsdale-Young, T., Magri, B., Matt, C., Nielsen, J. B. & Tschudi, D. (2020). Afgjort: A partially synchronous finality layer for blockchains. I C. Galdi & V. Kolesnikov (red.), Security and Cryptography for Networks (s. 24-44). Springer. https://doi.org/10.1007/978-3-030-57990-6_2
Schulz, H.-J., Röhlig, M., Nonnemann, L., Hogräfer, M., Aehnelt, M., Urban, B. & Schumann, H. (2020). A Layered Approach to Lightweight Toolchaining in Visual Analytics. I A. P. Cláudio, K. Bouatouch, M. Chessa, A. Paljic, A. Kerren, C. Hurter, A. Tremeau & G. M. Farinella (red.), Computer Vision, Imaging and Computer Graphics Theory and Applications : 14th International Joint Conference, VISIGRAPP 2019, Revised Selected Papers (s. 313-337). Springer. https://doi.org/10.1007/978-3-030-41590-7_13
Afshani, P., van Duijn, I., Killmann, R. & Nielsen, J. S. (2020). A lower bound for jumbled indexing. I S. Chawla (red.), Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms (s. 592-606). Association for Computing Machinery. https://doi.org/10.1137/1.9781611975994.36
Cheng, J. Y. & Mailund, T. (2020). Ancestral population genomics with Jocx, a coalescent hidden markov model. I J. Y. Dutheil (red.), Statistical population genomics (s. 167-189). Humana Press. https://doi.org/10.1007/978-1-0716-0199-0_8