Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Abe, M., Chase, M., David, B., Kohlweiss, M., Nishimaki, R. & Ohkubo, M. (2016). Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions. Journal of Cryptology, 29(4), 1-46. https://doi.org/10.1007/s00145-015-9211-7
Tomlein, M. (2016). Context-Aware Software Ecosystem for Industrial Products. I Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (s. 279-280). Artikel 7516845 IEEE Press. https://doi.org/10.1109/WICSA.2016.53
Duijn, I. V., Kostitsyna, I., Kreveld, M. V. & Löffler, M. (2016). Critical Placements of a Square or Circle amidst Trajectories for Junction Detection. I T. C. Shermer (red.), Proceedings of the 28th Canadian Conference on Computational Geometry (s. 208 - 215). Simon Fraser University. Vancouver, British Columbia Canada. http://www.sfu.ca/~shermer/CCCG2016/CCCG_2016_proceedings_preliminary.pdf
Nielsen, J. B. & Orlandi, C. (2016). Cross and Clean: Amortized Garbled Circuits with Constant Overhead. I M. Hirt & A. Smith (red.), Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings (Bind 9985, s. 582-603). Springer VS. https://doi.org/10.1007/978-3-662-53641-4_22
Houben, S., Marquardt, N., Vermeulen, J., Schöning, J., Klokmose, C. N., Reiterer, H., Korsgaard, H. & Schreiner, M. (2016). Cross-Surface: Challenges and Opportunities for 'bring your own device' in the wild. I CHI EA 2016: #chi4good - Extended Abstracts, 34th Annual CHI Conference on Human Factors in Computing Systems (s. 3366-3372). Association for Computing Machinery. https://doi.org/10.1145/2851581.2856490
Afshani, P. & Nielsen, J. A. S. (2016). Data Structure Lower Bounds for Document Indexing Problems. I I. Chatzigiannakis, M. Mitzenmacher, Y. Rabani & D. Sangiorgi (red.), 43rd International Colloquium on Automata, Languages, and Programming (ICALP 2016) (Bind 55, s. 93:1-93:15). Artikel 93 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ICALP.2016.93
Chechik, S., Hansen, T. D., Italiano, G. F., Łącki, J. & Parotsidis, N. (2016). Decremental Single-Source Reachability and Strongly Connected Components in Õ(m√n) Total Update Time. I Proceedings - 57th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2016 (s. 315-324). Artikel 7782945 IEEE. https://doi.org/10.1109/FOCS.2016.42
Andreasen, E. S. (2016). Designing Abstractions for JavaScript Program Analysis. Department of Computer Science, Aarhus University.
Sonne, T. & Grønbæk, K. (2016). Designing assistive technologies for the ADHD domain. I S. Serino, A. Matic, D. Giakoumis, G. Lopez & P. Cipresso (red.), Pervasive Computing Paradigms for Mental Health: 5th International Conference, MindCare 2015, Revised Selected Papers (Bind 604, s. 259-268). Springer VS. https://doi.org/10.1007/978-3-319-32270-4_26
Grønbæk, J. E., Jakobsen, K., Petersen, M. G., Rasmussen, M. K., Winge, J. & Stougaard, J. (2016). Designing for Children's Collective Music Making: How Spatial Orientation and Configuration Matter. I W. Barendregt & M. Obaid (red.), Proceedings of the 9th Nordic Conference on Human-Computer Interaction: Game-Changing Design, NordiCHI 2016 Artikel 60 Association for Computing Machinery. https://doi.org/10.1145/2971485.2971552
Goddard, W., Garner, J. & Jensen, M. M. (2016). Designing for social play in co-located mobile games. I Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2016: ACSW '16 Artikel 68 Association for Computing Machinery. https://doi.org/10.1145/2843043.2843476
Jensen, M. M. & Grønbæk, K. (2016). Design Strategies for Balancing Exertion Games: A Study of Three Approaches. I DIS 2016 - Proceedings of the 2016 ACM Conference on Designing Interactive Systems: Fuse (s. 936-946). Association for Computing Machinery. https://doi.org/10.1145/2901790.2901843
Bødker, S. & Klokmose, C. N. (2016). Dynamics, Multiplicity and Conceptual Blends in HCI. I CHI 2016 - Proceedings, 34th Annual CHI Conference on Human Factors in Computing Systems: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (s. 2538-2548). Association for Computing Machinery. https://doi.org/10.1145/2858036.2858530
Lehmann, A. & Gross, A. (2016). Effect of GPS errors on Emission model. Afhandling præsenteret på Global Wireless Summit 2016, Aarhus, Danmark.
Ranellucci, S., Tapp, A. & Zakarias, R. (2016). Efficient generic zero-knowledge proofs from commitments. I A. C. A. Nascimento & P. Barreto (red.), Information Theoretic Security - 9th International Conference, ICITS 2016, Revised Selected Papers (Bind 10015, s. 190-212). Springer VS. https://doi.org/10.1007/978-3-319-49175-2_10
Faonio, A. & Venturi, D. (2016). Efficient public-key cryptography with bounded leakage and tamper resilience. I Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Bind 10031 LNCS, s. 877-907). Springer VS. https://doi.org/10.1007/978-3-662-53887-6_32
Baum, C., Scholl, P. & Orsini, E. (2016). Efficient Secure Multiparty Computation with Identifiable Abort. I M. Hirt & A. Smith (red.), Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings: Fourteenth IACR Theory of Cryptography Conference, TCC 2016-B (Bind 9985, s. 461-469). Springer VS. https://doi.org/10.1007/978-3-662-53641-4
Ateniese, G., Dagdelen, Ö., Damgård, I. & Venturi, D. (2016). Entangled cloud storage. Future Generation Computer Systems - The International Journal of eScience, 62(9), 104-118. https://doi.org/10.1016/j.future.2016.01.008
Sonne, T. & Jensen, M. M. (2016). Evaluating the ChillFish Biofeedback Game with Children with ADHD. I Proceedings of IDC 2016 - The 15th International Conference on Interaction Design and Children: IDC '16 (s. 529-534). Association for Computing Machinery. https://doi.org/10.1145/2930674.2935981
Legaard, L., Thomsen, J. R., Lorentzen, C. H. & Techen, J. P. (2016). Exploring SCI as Means of Interaction through the Design Case of Vacuum Cleaning. I M. Broekhuijsen (red.), TEI 2016 - Proceedings of the 10th Anniversary Conference on Tangible Embedded and Embodied Interaction (s. 488-493). Association for Computing Machinery. https://doi.org/10.1145/2839462.2856540
Jakobsen, F. L., Pedersen, S. M., Schnedler, J. A. & Øllegaard, N. H. (2016). Exploring the use of shape change in home appliances. I M. Broekhuijsen (red.), Proceedings of the 10th Anniversary Conference on Tangible Embedded and Embodied Interaction - TEI 2016 (s. 462-467). Association for Computing Machinery. https://doi.org/10.1145/2839462.2856539
Jakobsen, K., Stougaard, J., Petersen, M. G., Winge, J., Grønbæk, J. E. & Rasmussen, M. K. (2016). Expressivity in Open-ended Constructive Play: Building and Playing Musical Lego Instruments. I L. Anthony, G. Sim & R. Jones (red.), Proceedings of IDC 2016 - The 15th International Conference on Interaction Design and Children (s. 46 - 57). Association for Computing Machinery. https://doi.org/10.1145/2930674.2930683
Brodal, G. S. (2016). External Memory Three-Sided Range Reporting and Top-k Queries with Sublogarithmic Updates. I N. Ollinger & H. Vollmer (red.), 33rd Symposium on Theoretical Aspects of Computer Science (STACS 2016) (Bind 47, s. 23:1-23:14). Artikel 23 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.STACS.2016.23
Damgård, I. & Zakarias, R. (2016). Fast oblivious AES a dedicated application of the MiniMac protocol. I D. Pointcheval, A. Nitaj & T. Rachidi (red.), Progress in Cryptology – AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Proceedings (Bind 9646, s. 245-264). Springer VS. https://doi.org/10.1007/978-3-319-31517-1_13
Madsen, M., Tip, F., Andreasen, E. S., Sen, K. & Møller, A. (2016). Feedback-directed instrumentation for deployed JavaScript applications. I Proceedings - 2016 IEEE/ACM 38th IEEE International Conference on Software Engineering Companion, ICSE 2016: ICSE 2016 (s. 899-910). Association for Computing Machinery. https://doi.org/10.1145/2884781.2884846
Derczynski, L. & Chester, S. (2016). Generalised Brown Clustering and Roll-up Feature Generation. I 30th AAAI Conference on Artificial Intelligence, AAAI 2016: AAAI (s. 1533-1539). AAAI Press.
Ha, J.-S., Cheong, O., Goaoc, X. & Yang, J. (2016). Geometric permutations of non-overlapping unit balls revisited. Computational Geometry, 53(Februar), 36–50. https://doi.org/10.1016/j.comgeo.2015.12.003
Birkedal, L., Bizjak, A., Clouston, R., Grathwohl, H. B., Spitters, B. & Vezzosi, A. (2016). Guarded cubical type theory. Abstract fra 22nd International Conference on Types for Proofs and Programs, Novi Sad, Serbien. http://www.cs.au.dk/~spitters/TYPES16.pdf
Birkedal, L., Bizjak, A., Clouston, R., Grathwohl, H. B., Spitters, B. & Vezzosi, A. (2016). Guarded Cubical Type Theory: Path Equality for Guarded Recursion. I J.-M. Talbot & L. Regnier (red.), CSL 2016: 25th EACSL Annual Conference on Computer Science Logic (s. 1 - 17)
Bizjak, A., Grathwohl, H. B., Clouston, R., Møgelberg, R. E. & Birkedal, L. (2016). Guarded dependent type theory with coinductive types. I B. Jacobs & C. Löding (red.), Foundations of Software Science and Computation Structures: 19th International Conference, FOSSACS 2016 (Bind 9634, s. 20-35). Springer VS. https://doi.org/10.1007/978-3-662-49630-5_2
Grathwohl, H. B. (2016). Guarded Recursive Type Theory. Department of Computer Science, Aarhus University.
Arge, L. & Pach, J. (2016). Guest Editors’ Foreword. Discrete & Computational Geometry, 56(4), 833–835. https://doi.org/10.1007/s00454-016-9826-y
Mitchell, R., Fender, A. & Mueller, F. F. (2016). HandyFeet: Social Bodily Play Via Split Control of a Human Puppet's Limbs. I TEI 2016 - Proceedings of the 10th Anniversary Conference on Tangible Embedded and Embodied Interaction (s. 506-511). Association for Computing Machinery. https://doi.org/10.1145/2839462.2856531
Bødker, S., Korsgaard, H., Lyle, P. & Saad-Sulonen, J. (2016). Happenstance, Strategies and Tactics: Intrinsic Design in a Volunteer-based Community. I W. Barendregt & M. Obaid (red.), Proceedings of the 9th Nordic Conference on Human-Computer Interaction: Game-Changing Design, NordiCHI 2016 (s. 10:1-10:10). Artikel a10 Association for Computing Machinery. https://doi.org/10.1145/2971485.2971564
Larsen, K. G., Nelson, J., Nguyen, H. L. & Thorup, M. (2016). Heavy hitters via cluster-preserving clustering. I Proceedings - 57th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2016 (s. 61-70). Artikel 7782918 IEEE. https://doi.org/10.1109/FOCS.2016.16
Jung, R., Krebbers, R., Birkedal, L. & Dreyer, D. (2016). Higher-order ghost state. I E. Sumii (red.), ICFP 2016 Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming (s. 256-269). Association for Computing Machinery. https://doi.org/10.1145/2951913.2951943
Jakobsen, K., Winge, J. & Petersen, M. G. (2016). Hitmachine: Collective Musical Expressivity for Novices. Afhandling præsenteret på New Interfaces for Musical Expression 2016, Brisbane, Queensland, Australien.
Jakobsen, S. K. & Orlandi, C. (2016). How To Bootstrap Anonymous Communication. I ITCS 2016 - Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science (s. 333-344). Association for Computing Machinery. https://doi.org/10.1145/2840728.2840743
Baum, C., Damgård, I. B., Larsen, K. G. & Nielsen, M. (2016). How to prove knowledge of small secrets. I J. Katz & M. Robshaw (red.), Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings: CRYPTO 2016: Advances in Cryptology – CRYPTO 2016 (Bind 9816, s. 478-498). Springer VS. https://doi.org/10.1007/978-3-662-53015-3_17