Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Jetter, H.-C., Rädle, R., Feuchtner, T., Anthes, C., Friedl, J. & Klokmose, C. N. (2020). “In VR, everything is possible!”: Sketching and Simulating Spatially-Aware Interactive Spaces in Virtual Reality. I CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Artikel 523 Association for Computing Machinery. https://doi.org/10.1145/3313831.3376652
Larsen-Ledet, I. & Borowski, M. (2020). "It Looks Like You Don't Agree": Idiosyncratic Needs and Practices in Collaborative Writing. I N. Ahmadpour, T. Leong, B. Ploderer, C. Parker, S. Webber, D. Munoz, L. Loke & M. Tomitsch (red.), OzCHI '20: 32nd Australian Conference on Human-Computer Interaction (s. 339-354). Association for Computing Machinery. https://doi.org/10.1145/3441000.3441032
Grønbæk, J. E., Rasmussen, M. K., Halskov, K. & Petersen, M. G. (2020). KirigamiTable: Designing for Proxemic Transitions with a Shape-Changing Tabletop. I CHI 2020 - Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Artikel 3376834 Association for Computing Machinery. https://doi.org/10.1145/3313831.3376834
Lissandrini, M., Pedersen, T. B., Hose, K. & Mottin, D. (2020). Knowledge Graph Exploration: Where Are We and Where Are We Going? S I G W E B Newsletter, (Summer), Artikel 4. https://doi.org/10.1145/3409481.3409485
Gomez, A. R. & Gellersen, H. (2020). KryptonEyed: Playing with Gaze without Looking. I G. N. Yannakakis, A. Liapis, K. Penny, V. Volz, F. Khosmood & P. Lopes (red.), Proceedings of the 15th International Conference on the Foundations of Digital Games, FDG 2020 Artikel 52 Association for Computing Machinery. https://doi.org/10.1145/3402942.3403017
Aranha, D. F., Novaes, F. R., Takahashi, A., Tibouchi, M. & Yarom, Y. (2020). LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage. I CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (s. 225-242). Association for Computing Machinery. https://doi.org/10.1145/3372297.3417268
Abel, A., Cockx, J., Devriese, D., Timany, A. & Wadler, P. (2020). Leibniz equality is isomorphic to Martin-Löf identity, parametrically. Journal of Functional Programming, 30, Artikel e17. https://doi.org/10.1017/S0956796820000155
Silva, G., Lyle, P. J. & Silva, C. (2020). Local Perspectives for Sharing Economy Design on a Remote Tourist Island. I Proceedings of the 32nd Australian Computer-Human Interaction Conference, OzCHI 2020 (s. 368-378). Association for Computing Machinery. https://doi.org/10.1145/3441000.3441058
Nielsen, J. B. & Simkin, M. (2020). Lower bounds for leakage-resilient secret sharing. I A. Canteaut & Y. Ishai (red.), Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (s. 556-577). Springer. https://doi.org/10.1007/978-3-030-45721-1_20
Larsen, K. G., Simkin, M. & Yeo, K. (2020). Lower Bounds for Multi-server Oblivious RAMs. I R. Pass & K. Pietrzak (red.), Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings (s. 486-503). Springer. https://doi.org/10.1007/978-3-030-64375-1_17
Larsen, K. G., Malkin, T., Weinstein, O. & Yeo, K. (2020). Lower Bounds for Oblivious Near-Neighbor Search. I S. Chawla (red.), SODA '20: Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms (s. 1116-1134). Society for Industrial and Applied Mathematics. https://doi.org/10.5555/3381089.3381157
Blundo, C., Cimato, S. & Siniscalchi, L. (2020). Managing Constraints in Role Based Access Control. IEEE Access, 8, 140497-140511. Artikel 9146129. https://doi.org/10.1109/ACCESS.2020.3011310
Grønlund, A., Kamma, L. & Larsen, K. G. (2020). Margins are Insufficient for Explaining Gradient Boosting. I H. Larochelle, MA. Ranzato, R. Hadsell, M.-F. Balcan & H.-T. Lin (red.), Advances in Neural Information Processing Systems 33 (NeurIPS 2020) https://proceedings.neurips.cc/paper/2020/hash/146f7dd4c91bc9d80cf4458ad6d6cd1b-Abstract.html
Deuber, D., Döttling, N., Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020). Minting Mechanism for Proof of Stake Blockchains. I M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (red.), Applied Cryptography and Network Security (s. 315-334). Springer. https://doi.org/10.1007/978-3-030-57808-4_16
Birkedal, L., Clouston, R., Mannaa, B., Ejlers Møgelberg, R., Pitts, A. M. & Spitters, B. (2020). Modal dependent type theory and dependent right adjoints. Mathematical Structures in Computer Science, 30(2), 118-138. https://doi.org/10.1017/S0960129519000197
Rijke, E., Shulman, M. & Spitters, B. (2020). Modalities in homotopy type theory. Logical Methods in Computer Science, 16(1), 2:1-2:79.
Ramirez Gomez, A. & Gellersen, H. (2020). More than Looking: Using Eye Movements Behind the Eyelids as a New Game Mechanic. I CHI PLAY '20: Proceedings of the Annual Symposium on Computer-Human Interaction in Play (s. 362-373). Association for Computing Machinery. https://doi.org/10.1145/3410404.3414240
Larsen-Ledet, I. (2020). More Than Writing Text: Multiplicity in Collaborative Academic Writing. [Ph.d.-afhandling, Aarhus Universitet]. Aarhus Universitet.
Clarke, C., Ehrich, P. & Gellersen, H. (2020). Motion Coupling of Earable Devices in Camera View. I J. Cauchard & M. Lochtefeld (red.), MUM 2020 - 19th International Conference on Mobile and Ubiquitous Multimedia, Proceedings (s. 13-17). Association for Computing Machinery. https://doi.org/10.1145/3428361.3428470
Gratzer, D., Kavvos, G. A., Nuyts, A. & Birkedal, L. (2020). Multimodal Dependent Type Theory. I Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2020 (s. 492-506). Artikel 3394736 Association for Computing Machinery. https://doi.org/10.1145/3373718.3394736
Grønlund, A., Kamma, L. & Larsen, K. G. (2020). Near-Tight Margin-Based Generalization Bounds for Support Vector Machines. I H. Daumé III & A. Singh (red.), International Conference on Machine Learning (s. 3779-3788). MLResearch Press. http://proceedings.mlr.press/v119/gronlund20a.html
Endo, A. T. & Møller, A. (2020). NodeRacer: Event Race Detection for Node.js Applications. I 2020 IEEE 13th International Conference on Software Testing, Verification and Validation, ICST 2020: Proceedings (s. 120-130). Artikel 9159075 Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICST46399.2020.00022
Brian, G., Faonio, A., Obremski, M., Simkin, M. & Venturi, D. (2020). Non-malleable secret sharing against bounded joint-tampering attacks in the plain model. I D. Micciancio & T. Ristenpart (red.), Advances in Cryptology - CRYPTO 2020 (s. 127-155). Springer. https://doi.org/10.1007/978-3-030-56877-1_5
Logins, A., Li, Y. & Karras, P. (2020). On the Robustness of Cascade Diffusion under Node Attacks. I The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020: Proceedings of the Web Conference 2020 (s. 2711–2717). Association for Computing Machinery. https://doi.org/10.1145/3366423.3380028
Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R. & Pavlogiannis, A. (2020). Optimal and Perfectly Parallel Algorithms for On-demand Data-Flow Analysis. I P. Müller (red.), Programming Languages and Systems- 29th European Symposium on Programming, ESOP 2020 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings (s. 112-140). Springer. https://doi.org/10.1007/978-3-030-44914-8_5
Larsen, K. G., Mitzenmacher, M. & Tsourakakis, C. E. (2020). Optimal Learning of Joint Alignments with a Faulty Oracle. I 2020 IEEE International Symposium on Information Theory, ISIT 2020 (s. 2492-2497). IEEE. https://doi.org/10.1109/ISIT44484.2020.9174310
Brandt, M., Orlandi, C., Shrishak, K. & Shulman, H. (2020). Optimal Transport Layer for Secure Computation. I P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (red.), ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Bind Volume 3: SECRYPT, s. 130-141). SCITEPRESS Digital Library. https://doi.org/10.5220/0009826801300141
Sidenmark, L., Clarke, C., Zhang, X., Phu, J. & Gellersen, H. (2020). Outline Pursuits: Gaze-assisted Selection of Occluded Objects in Virtual Reality. I CHI 2020 - Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Artikel 3376438 Association for Computing Machinery. https://doi.org/10.1145/3313831.3376438
Baum, C., Frederiksen, T. K., Hesse, J., Lehmann, A. & Yanai, A. (2020). Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. I Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 (s. 587-606). Artikel 9230400 IEEE. https://doi.org/10.1109/EuroSP48549.2020.00044
Madsen, M. & Pol, J. V. D. (2020). Polymorphic types and effects with Boolean unification. I Proceedings of the ACM on Programming Languages (OOPSLA udg., Bind 4). Association for Computing Machinery. https://doi.org/10.1145/3428222
Pavlogiannis, A., Schaumberger, N., Schmid, U. & Chatterjee, K. (2020). Precedence-Aware Automated Competitive Analysis of Real-Time Scheduling. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(11), 3981-3992. Artikel 9211419. https://doi.org/10.1109/TCAD.2020.3012803
Loeschcke, S. B., Hogräfer, M. & Schulz, H.-J. (2020). Progressive Parameter Space Visualization for Task-Driven SAX Configuration. I K. Vrotsou & C. Turkay (red.), EuroVA 2020 - EuroVis Workshop on Visual Analytics (s. 43-47). European Association for Computer Graphics. https://doi.org/10.2312/eurova.20201085
Kannabiran, G. & Bødker, S. (2020). Prototypes as Objects of Desire. I DIS 2020 - Proceedings of the 2020 ACM Designing Interactive Systems Conference (s. 1619-1631). Association for Computing Machinery. https://doi.org/10.1145/3357236.3395487
Grønbæk, J. E., Knudsen, M., O'Hara, K., Krogh, P. G., Vermeulen, J. & Petersen, M. G. (2020). Proxemics Beyond Proximity: Designing for Flexible Social Interaction Through Cross-Device Interaction. I CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Artikel 3376379 Association for Computing Machinery. https://doi.org/10.1145/3313831.3376379
Hansen, K. A. & Sølvsten, S. C. (2020). ∃R-completeness of stationary nash equilibria in perfect information stochastic games. I J. Esparza & D. Král (red.), 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020 (s. 45:1-45:15). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.MFCS.2020.45
Cavassim, M. I. A. (2020). Recombination and horizontal gene transfer through the lens of phylogenomics. [Ph.d.-afhandling, Aarhus Universitet]. Aarhus Universitet.
Bay, J. & Askarov, A. (2020). Reconciling progress-insensitive noninterference and declassification. I 2020 IEEE 33rd Computer Security Foundations Symposium (CSF) (s. 95-106). IEEE. https://doi.org/10.1109/CSF49147.2020.00015
Rossitto, C., Lampinen, A., Bødker, S., Light, A., Berns, K. & Hui, J. (2020). Reconsidering scale and scaling in CSCW research. I CSCW '20 : Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing (s. 493-501). Association for Computing Machinery. https://doi.org/10.1145/3406865.3419409
van Oosterhout, A. & Hoggan, E. (2020). Reshaping Interaction with Rotary Knobs: Combining Form, Feel and Function. I DIS 2020 - Proceedings of the 2020 ACM Designing Interactive Systems Conference (s. 1973-1982). Association for Computing Machinery. https://doi.org/10.1145/3357236.3395536
Logins, A. (2020). Resource Allocation in Networks. [Ph.d.-afhandling, Aarhus Universitet]. Aarhus Universitet.
Grønbæk, J. E. (2020). Rethinking Proxemics: Designing Interactive Technologies for Co-located Collaboration. [Ph.d.-afhandling, Aarhus Universitet]. Aarhus Universitet.
Chakraborty, S., Dziembowski, S. & Nielsen, J. B. (2020). Reverse firewalls for actively secure mpcs. I D. Micciancio & T. Ristenpart (red.), Advances in Cryptology - CRYPTO 2020 (s. 732-762). Springer. https://doi.org/10.1007/978-3-030-56880-1_26
Zardbani, F., Afshani, P. & Karras, P. (2020). Revisiting the theory and practice of database cracking. I A. Bonifati, Y. Zhou, M. A. Vaz Salles, A. Bohm, D. Olteanu, G. Fletcher, A. Khan & B. Yang (red.), Advances in Database Technology - EDBT 2020: 23rd International Conference on Extending Database Technology, Proceedings (s. 415-418). openproceedings.org. https://doi.org/10.5441/002/edbt.2020.46