Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Nielsen, J. B. & Simkin, M. (2020). Lower bounds for leakage-resilient secret sharing. I A. Canteaut & Y. Ishai (red.), Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (s. 556-577). Springer. https://doi.org/10.1007/978-3-030-45721-1_20
Larsen, K. G., Simkin, M. & Yeo, K. (2020). Lower Bounds for Multi-server Oblivious RAMs. I R. Pass & K. Pietrzak (red.), Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings (s. 486-503). Springer. https://doi.org/10.1007/978-3-030-64375-1_17
Larsen, K. G., Malkin, T., Weinstein, O. & Yeo, K. (2020). Lower Bounds for Oblivious Near-Neighbor Search. I S. Chawla (red.), SODA '20: Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms (s. 1116-1134). Society for Industrial and Applied Mathematics. https://doi.org/10.5555/3381089.3381157
Blundo, C., Cimato, S. & Siniscalchi, L. (2020). Managing Constraints in Role Based Access Control. IEEE Access, 8, 140497-140511. Artikel 9146129. https://doi.org/10.1109/ACCESS.2020.3011310
Grønlund, A., Kamma, L. & Larsen, K. G. (2020). Margins are Insufficient for Explaining Gradient Boosting. I H. Larochelle, MA. Ranzato, R. Hadsell, M.-F. Balcan & H.-T. Lin (red.), Advances in Neural Information Processing Systems 33 (NeurIPS 2020) (Bind 2020-December) https://proceedings.neurips.cc/paper/2020/hash/146f7dd4c91bc9d80cf4458ad6d6cd1b-Abstract.html
Deuber, D., Döttling, N., Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020). Minting Mechanism for Proof of Stake Blockchains. I M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (red.), Applied Cryptography and Network Security (s. 315-334). Springer. https://doi.org/10.1007/978-3-030-57808-4_16
Birkedal, L., Clouston, R., Mannaa, B., Ejlers Møgelberg, R., Pitts, A. M. & Spitters, B. (2020). Modal dependent type theory and dependent right adjoints. Mathematical Structures in Computer Science, 30(2), 118-138. https://doi.org/10.1017/S0960129519000197
Rijke, E., Shulman, M. & Spitters, B. (2020). Modalities in homotopy type theory. Logical Methods in Computer Science, 16(1), 2:1-2:79. https://doi.org/10.23638/LMCS-16(1:2)2020
Ramirez Gomez, A. & Gellersen, H. (2020). More than Looking: Using Eye Movements Behind the Eyelids as a New Game Mechanic. I CHI PLAY '20: Proceedings of the Annual Symposium on Computer-Human Interaction in Play (s. 362-373). Association for Computing Machinery. https://doi.org/10.1145/3410404.3414240
Larsen-Ledet, I. (2020). More Than Writing Text: Multiplicity in Collaborative Academic Writing. [Ph.d.-afhandling, Aarhus Universitet]. Aarhus Universitet.
Clarke, C., Ehrich, P. & Gellersen, H. (2020). Motion Coupling of Earable Devices in Camera View. I J. Cauchard & M. Lochtefeld (red.), MUM 2020 - 19th International Conference on Mobile and Ubiquitous Multimedia, Proceedings (s. 13-17). Association for Computing Machinery. https://doi.org/10.1145/3428361.3428470
Gratzer, D., Kavvos, G. A., Nuyts, A. & Birkedal, L. (2020). Multimodal Dependent Type Theory. I Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2020 (s. 492-506). Artikel 3394736 Association for Computing Machinery. https://doi.org/10.1145/3373718.3394736
Grønlund, A., Kamma, L. & Larsen, K. G. (2020). Near-Tight Margin-Based Generalization Bounds for Support Vector Machines. I H. Daumé III & A. Singh (red.), International Conference on Machine Learning (s. 3779-3788). MLResearch Press. http://proceedings.mlr.press/v119/gronlund20a.html
Endo, A. T. & Møller, A. (2020). NodeRacer: Event Race Detection for Node.js Applications. I 2020 IEEE 13th International Conference on Software Testing, Verification and Validation, ICST 2020: Proceedings (s. 120-130). Artikel 9159075 Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICST46399.2020.00022
Brian, G., Faonio, A., Obremski, M., Simkin, M. & Venturi, D. (2020). Non-malleable secret sharing against bounded joint-tampering attacks in the plain model. I D. Micciancio & T. Ristenpart (red.), Advances in Cryptology - CRYPTO 2020 (s. 127-155). Springer. https://doi.org/10.1007/978-3-030-56877-1_5
Logins, A., Li, Y. & Karras, P. (2020). On the Robustness of Cascade Diffusion under Node Attacks. I The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020: Proceedings of the Web Conference 2020 (s. 2711–2717). Association for Computing Machinery. https://doi.org/10.1145/3366423.3380028
Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R. & Pavlogiannis, A. (2020). Optimal and Perfectly Parallel Algorithms for On-demand Data-Flow Analysis. I P. Müller (red.), Programming Languages and Systems- 29th European Symposium on Programming, ESOP 2020 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings (s. 112-140). Springer. https://doi.org/10.1007/978-3-030-44914-8_5
Larsen, K. G., Mitzenmacher, M. & Tsourakakis, C. E. (2020). Optimal Learning of Joint Alignments with a Faulty Oracle. I 2020 IEEE International Symposium on Information Theory, ISIT 2020 (s. 2492-2497). IEEE. https://doi.org/10.1109/ISIT44484.2020.9174310
Brandt, M., Orlandi, C., Shrishak, K. & Shulman, H. (2020). Optimal Transport Layer for Secure Computation. I P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (red.), ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Bind Volume 3: SECRYPT, s. 130-141). SCITEPRESS Digital Library. https://doi.org/10.5220/0009826801300141
Sidenmark, L., Clarke, C., Zhang, X., Phu, J. & Gellersen, H. (2020). Outline Pursuits: Gaze-assisted Selection of Occluded Objects in Virtual Reality. I CHI 2020 - Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Artikel 3376438 Association for Computing Machinery. https://doi.org/10.1145/3313831.3376438
Baum, C., Frederiksen, T. K., Hesse, J., Lehmann, A. & Yanai, A. (2020). Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. I Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 (s. 587-606). Artikel 9230400 IEEE. https://doi.org/10.1109/EuroSP48549.2020.00044
Madsen, M. & Pol, J. V. D. (2020). Polymorphic types and effects with Boolean unification. I Proceedings of the ACM on Programming Languages (OOPSLA udg., Bind 4). Association for Computing Machinery. https://doi.org/10.1145/3428222
Pavlogiannis, A., Schaumberger, N., Schmid, U. & Chatterjee, K. (2020). Precedence-Aware Automated Competitive Analysis of Real-Time Scheduling. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(11), 3981-3992. Artikel 9211419. https://doi.org/10.1109/TCAD.2020.3012803
Loeschcke, S. B., Hogräfer, M. & Schulz, H.-J. (2020). Progressive Parameter Space Visualization for Task-Driven SAX Configuration. I K. Vrotsou & C. Turkay (red.), EuroVA 2020 - EuroVis Workshop on Visual Analytics (s. 43-47). European Association for Computer Graphics. https://doi.org/10.2312/eurova.20201085
Kannabiran, G. & Bødker, S. (2020). Prototypes as Objects of Desire. I DIS 2020 - Proceedings of the 2020 ACM Designing Interactive Systems Conference (s. 1619-1631). Association for Computing Machinery. https://doi.org/10.1145/3357236.3395487
Grønbæk, J. E., Knudsen, M., O'Hara, K., Krogh, P. G., Vermeulen, J. & Petersen, M. G. (2020). Proxemics Beyond Proximity: Designing for Flexible Social Interaction Through Cross-Device Interaction. I CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Artikel 3376379 Association for Computing Machinery. https://doi.org/10.1145/3313831.3376379
Hansen, K. A. & Sølvsten, S. C. (2020). ∃R-completeness of stationary nash equilibria in perfect information stochastic games. I J. Esparza & D. Král (red.), 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020 (s. 45:1-45:15). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.MFCS.2020.45
Cavassim, M. I. A. (2020). Recombination and horizontal gene transfer through the lens of phylogenomics. [Ph.d.-afhandling, Aarhus Universitet]. Aarhus Universitet.
Bay, J. & Askarov, A. (2020). Reconciling progress-insensitive noninterference and declassification. I 2020 IEEE 33rd Computer Security Foundations Symposium (CSF) (s. 95-106). IEEE. https://doi.org/10.1109/CSF49147.2020.00015
Rossitto, C., Lampinen, A., Bødker, S., Light, A., Berns, K. & Hui, J. (2020). Reconsidering scale and scaling in CSCW research. I CSCW '20 : Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing (s. 493-501). Association for Computing Machinery. https://doi.org/10.1145/3406865.3419409
van Oosterhout, A. & Hoggan, E. (2020). Reshaping Interaction with Rotary Knobs: Combining Form, Feel and Function. I DIS 2020 - Proceedings of the 2020 ACM Designing Interactive Systems Conference (s. 1973-1982). Association for Computing Machinery. https://doi.org/10.1145/3357236.3395536
Logins, A. (2020). Resource Allocation in Networks. [Ph.d.-afhandling, Aarhus Universitet]. Aarhus Universitet.
Grønbæk, J. E. (2020). Rethinking Proxemics: Designing Interactive Technologies for Co-located Collaboration. [Ph.d.-afhandling, Aarhus Universitet]. Aarhus Universitet.
Chakraborty, S., Dziembowski, S. & Nielsen, J. B. (2020). Reverse firewalls for actively secure mpcs. I D. Micciancio & T. Ristenpart (red.), Advances in Cryptology - CRYPTO 2020 (s. 732-762). Springer. https://doi.org/10.1007/978-3-030-56880-1_26
Zardbani, F., Afshani, P. & Karras, P. (2020). Revisiting the theory and practice of database cracking. I A. Bonifati, Y. Zhou, M. A. Vaz Salles, A. Bohm, D. Olteanu, G. Fletcher, A. Khan & B. Yang (red.), Advances in Database Technology - EDBT 2020: 23rd International Conference on Extending Database Technology, Proceedings (s. 415-418). openproceedings.org. https://doi.org/10.5441/002/edbt.2020.46
Larsen, K. G. & Simkin, M. (2020). Secret sharing lower bound: Either reconstruction is hard or shares are long. I C. Galdi & V. Kolesnikov (red.), Security and Cryptography for Networks (s. 566-578). Springer. https://doi.org/10.1007/978-3-030-57990-6_28
Dalskov, A. P. K., Escudero Ospina, D. E. & Keller, M. (2020). Secure Evaluation of Quantized Neural Networks. Proceedings on Privacy Enhancing Technologies, 2020(4), 355-375. https://doi.org/10.2478/popets-2020-0077
Lucani Rötter, D. E., Nielsen, L., Orlandi, C., Pagnin, E. & Vestergaard, R. (2020). Secure generalized deduplication via multi-key revealing encryption. I C. Galdi & V. Kolesnikov (red.), Security and Cryptography for Networks (s. 298-318). Springer. https://doi.org/10.1007/978-3-030-57990-6_15
Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020). Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. I L. Chen, S. Schneider, N. Li & K. Liang (red.), European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Bind I, s. 654-673). Springer. https://doi.org/10.1007/978-3-030-59013-0_32
Aranha, D. F., Orlandi, C., Takahashi, A. & Zaverucha, G. (2020). Security of Hedged Fiat–Shamir Signatures under Fault Attacks. I A. Canteaut & Y. Ishai (red.), Advances in Cryptology – EUROCRYPT 2020 (s. 644-674). Springer. https://doi.org/10.1007/978-3-030-45721-1_23
Khurana, A., Logins, A. & Karras, P. (2020). Selecting Influential Features by a Learnable Content-Aware Linear Threshold Model. I CIKM '20: Proceedings of the 29th ACM International Conference on Information & Knowledge Management (s. 635-644). Association for Computing Machinery. https://doi.org/10.1145/3340531.3411886
Neerbek, J. (2020). Sensitive Information Detection: Recursive Neural Networks for Encoding Context. [Ph.d.-afhandling, Aarhus Universitet]. Aarhus Universitet.
Larsen, M. R. E., Han, W. & Schulz, H.-J. (2020). Sketchy Rendering to Aid the Recollection of Regular Visualizations. I EuroVis 2020: Short Papers (s. 139-143). Eurographics Association. https://doi.org/10.2312/evs.20201062
Nielsen, J. B. & Spitters, B. (2020). Smart contract interactions in coq. I E. Sekerinski, N. Moreira, J. N. Oliveira, D. Ratiu, R. Guidotti, M. Farrell, M. Luckcuck, D. Marmsoler, J. Campos, T. Astarte, L. Gonnord, A. Cerone, L. Couto, B. Dongol, M. Kutrib, P. Monteiro & D. Delmas (red.), Formal Methods- FM 2019 International Workshops - Revised Selected Papers (s. 380-391). Springer. https://doi.org/10.1007/978-3-030-54994-7_29