Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Chatterjee, K., Ibsen-Jensen, R. R. & Pavlogiannis, A. (2016). Optimal Reachability and a Space-Time Tradeoff for Distance Queries in Constant-Treewidth Graphs. I 24th Annual European Symposium on Algorithms (ESA 2016) (s. 28:1-28:17). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ESA.2016.28
Lanng, H., Lykkegaard, A., Thornholm, S., Tzannis, P. & Verdezoto, N. (2016). PeaceKeeper: Augmenting the Awareness and Communication of Noise Pollution in Student Dormitories. I Proceedings of the 7th Augmented Human International Conference, AH 2016: AH '16 Artikel 39 Association for Computing Machinery. https://doi.org/10.1145/2875194.2875218
Kunkel, A., Rheinländer, A., Schiefer, C., Helmer, S., Bouros, P. & Leser, U. (2016). PIEJoin: Towards Parallel Set Containment Joins. I P. Baumann, I. Manolescu-Goujot, L. Trani, Y. Ioannidis, G. G. Barnaföldi, L. Dobos & E. Bányai (red.), Scientific and Statistical Database Management: 28th International Conference, SSDBM 2016 - Proceedings Artikel 11 Association for Computing Machinery. https://doi.org/10.1145/2949689.2949694
Zakarias, R. W. (2016). Practical Secure Computation with Pre-Processing. Department of Computer Science, Aarhus University.
Birkedal, L. (2016). Preface. Electronic Notes in Theoretical Computer Science, 325, 1-2. https://doi.org/10.1016/j.entcs.2016.09.028
Hansen, T. D. & Zwick, U. (2016). Random-Edge Is Slower Than Random-Facet on Abstract Cubes. Leibniz International Proceedings in Informatics, 55, 51:1-51:14. https://doi.org/10.4230/LIPIcs.ICALP.2016.51
Cascudo, I., Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016). Rate-1, linear time and additively homomorphic UC commitments. I M. Robshaw & J. Katz (red.), Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Bind 9816, s. 179-207). Springer VS. https://doi.org/10.1007/978-3-662-53015-3_7
Nielsen, J. B. & Ranellucci, S. (2016). Reactive garbling: Foundation, instantiation, application. I J. H. Cheon & T. Takagi (red.), Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Bind 10032, s. 1022-1052). Springer VS. https://doi.org/10.1007/978-3-662-53890-6_34
Devriese, D., Birkedal, L. & Piessens, F. (2016). Reasoning about object capabilities with logical relations and effect parametricity. I 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016 (s. 147-162). Artikel 7467352 IEEE Press. https://doi.org/10.1109/EuroSP.2016.22
Østergaard Laursen, C., Pedersen, S., Merritt, T. R. & Caprani, O. (2016). Robot-Supported Food Experiences: Exploring Aesthetic Plating with Design Prototypes. I J. T.K.V.Koh, B. J. Dunstan, D. Silvera-Tawil & M. Velonaki (red.), Cultural Robotics - 1st International Workshop, CR 2015 and Held as Part of IEEE RO-MAN 2015, Revised Selected Papers: First International Workshop, CR 2015, Held as Part of IEEE RO-MAN 2015, Kobe, Japan, August 31, 2015. Revised Selected Papers (Bind 9549, s. 107-130). Springer. https://doi.org/10.1007/978-3-319-42945-8_10
Nielsen, M., Elmqvist, N. & Grønbæk, K. (2016). Scribble query: fluid touch brushing for multivariate data visualization. I C. Parker (red.), Proceedings of the 28th Australian Computer-Human Interaction Conference, OzCHI 2016 (s. 381-390). Association for Computing Machinery. https://doi.org/10.1145/3010915.3010951
Tomlein, M. & Grønbæk, K. (2016). Semantic Model of Variability and Capabilities of IoT Applications for Embedded Software Ecosystems. I Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (s. 247-252). Artikel 7516835 IEEE Press. https://doi.org/10.1109/WICSA.2016.17
Bouros, P., Mamoulis, N., Ge, S. & Terrovitis, M. (2016). Set Containment Join Revisited. Knowledge and Information Systems, 49(1), 375-402. https://doi.org/10.1007/s10115-015-0895-7
Abboud, A., Hansen, T. D., Williams, V. V. & Williams, R. (2016). Simulating Branching Programs with Edit Distance and Friends: Or: a Polylog Shaved is a Lower Bound Made. I STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing (s. 375-388). Association for Computing Machinery. https://doi.org/10.1145/2897518.2897653
Rasmussen, M. K., Troiano, G. M., Petersen, M. G., Simonsen, J. G. & Hornbæk, K. (2016). Sketching Shape-changing Interfaces: Exploring Vocabulary, Metaphor Use, and Affordances. I CHI 2016 - Proceedings, 34th Annual CHI Conference on Human Factors in Computing Systems: CHI'16 (Bind 2016, s. 2740-2751). Association for Computing Machinery. https://doi.org/10.1145/2858036.2858183
Christodoulou, G., Filos-Ratsikas, A., Frederiksen, S. K. S., Goldberg, P. W., Zhang, J. & Zhang, J. (2016). Social Welfare in One-Sided Matching Mechanisms. I N. Osman & C. Sierra (red.), Autonomous Agents and Multiagent Systems, IFAAMAS 2016 Workshops, Best Papers, Revised Selected Papers: AAMAS 2016 Workshops, Best Papers (Bind 10002, s. 30-50). Springer VS. https://doi.org/10.1007/978-3-319-46882-2_3
Abboud, A., Backurs, A., Hansen, T. D., Williams, V. V. & Zamir, O. (2016). Subtree isomorphism revisited. I 27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016 (Bind 2, s. 1256-1271). Association for Computing Machinery.
Nielsen, M., Brewer, R. S. & Grønbæk, K. (2016). Supporting interactive visual analytics of energy behavior in buildings through affine visualizations. I C. Parker (red.), Proceedings of the 28th Australian Computer-Human Interaction Conference, OzCHI 2016 (s. 238-247). Association for Computing Machinery. https://doi.org/10.1145/3010915.3010950
Christensen, H. B. (2016). Teaching DevOps and Cloud Computing using a Cognitive Apprenticeship and Story-Telling Approach. I ITiCSE 2016 - Proceedings of the 2016 ACM Conference on Innovation and Technology in Computer Science Education (s. 174-179). Association for Computing Machinery. https://doi.org/10.1145/2899415.2899426
Hansen, K. A., Ibsen-Jensen, R. & Koucký, M. (2016). The big match in small space. I M. Gairing & R. Savani (red.), Algorithmic Game Theory - 9th International Symposium, SAGT 2016, Proceedings (Bind 9928, s. 64-76). Springer VS. https://doi.org/10.1007/978-3-662-53354-3_6
Madsen, O. L. & Møller-Pedersen, B. (2016). The Essence of Subclassing. Afhandling præsenteret på NOOL 2016, Amsterdam, Holland.
Garg, S., Mukherjee, P., Pandey, O. & Polychroniadou, A. (2016). The Exact Round Complexity of Secure Computation. I M. Fischlin & J.-S. Coron (red.), Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (s. 448 - 476). Springer VS. https://doi.org/10.1007/978-3-662-49896-5
Bauer, A., Gross, J., Lumsdaine, P. L., Shulman, M., Sozeau, M. & Spitters, B. (2016). The HoTT Library: A formalization of homotopy type theory in Coq. http://arxiv.org/abs/1610.04591
Larsen, K. G. & Nelson, J. (2016). The Johnson-Lindenstrauss Lemma Is Optimal for Linear Dimensionality Reduction. Leibniz International Proceedings in Informatics, 55, 82:1 - 82:11. https://doi.org/10.4230/LIPIcs.ICALP.2016.82
Schwiegelshohn, C. & Schwiegelshohn, U. (2016). The power of migration for online slack scheduling. I C. Zaroliagis & P. Sankowski (red.), 24th Annual European Symposium on Algorithms, ESA 2016 Artikel 75 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ESA.2016.75
Brody, J. E., Buhrman, H., Koucký, M., Loff, B. & Speelman, F. (2016). Towards a Reverse Newman's Theorem in Interactive Information Complexity. Algorithmica, 76(3), 749-781. https://doi.org/10.1007/s00453-015-0112-9
Baum, C. (2016). Towards More Efficient Secure Multiparty Computation in the Preprocessing Model. Department of Computer Science, Aarhus University.
Andreasen, E. S., Gordon, C. S., Chandra, S., Sridharan, M., Tip, F. & Sen, K. (2016). Trace Typing: An Approach for Evaluating Retrofitted Type Systems. I S. Krishnamurthi & B. S. Lerner (red.), 30th European Conference on Object-Oriented Programming (ECOOP 2016) (s. 231-239, 2310-2328). Dagstuhl Publishing. http://arxiv.org/abs/1605.01362
Svendsen, K., Sieczkowski, F. & Birkedal, L. (2016). Transfinite step-indexing: Decoupling concrete and logical steps. I P. Thiemann (red.), Programming Languages and Systems (Bind 9632, s. 727-751). Springer VS. https://doi.org/10.1007/978-3-662-49498-1_28
Caragiannis, I., Filos-Ratsikas, A., Frederiksen, S. K. S., Hansen, K. A. & Tan, Z. (2016). Truthful facility assignment with resource augmentation: An exact analysis of serial dictatorship. I Web and Internet Economics - 12th International Conference, WINE 2016, Proceedings (Bind 10123, s. 236-250). Springer VS. https://doi.org/10.1007/978-3-662-54110-4_17
Heinze, T. S., Møller, A. & Strocco, F. (2016). Type safety analysis for dart. I R. Ierusalimschy (red.), DLS 2016 - Proceedings of the 12th Symposium on Dynamic Languages (s. 1-12). Association for Computing Machinery. https://doi.org/10.1145/2989225.2989226
Strocco, F. (2016). Type Soundness in the Dart Programming Language. Department of Computer Science, University of Aarhus.
Mezzetti, G., Møller, A. & Strocco, F. (2016). Type unsoundness in practice: An empirical study of dart. I R. Ierusalimschy (red.), DLS 2016 - Proceedings of the 12th Symposium on Dynamic Languages (s. 13-24). Association for Computing Machinery. https://doi.org/10.1145/2989225.2989227
Damgård, I., Nielsen, J. B., Ostrovsky, R. & Rosén, A. (2016). Unconditionally secure computation with reduced interaction. I M. Fischlin & J.-S. Coron (red.), Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (Bind 9666, s. 420-447). Springer VS. https://doi.org/10.1007/978-3-662-49896-5_15
Tsirogiannis, C. & Tsirogiannis, C. (2016). Uncovering the Hidden Routes: Algorithms for Identifying Paths and Missing Links in Trade Networks . I T. Brughmans, A. Collar & F. Coward (red.), The Connected Past: Challenges to Network Studies in Archaeology and History Oxford University Press.
Čermák, J., Bosansky, B., Durkota, K., Lisý, V. & Kiekintveld, C. (2016). Using correlated strategies for computing stackelberg equilibria in extensive-form games. I 30th AAAI Conference on Artificial Intelligence, AAAI 2016 (s. 439-445). AAAI Press. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85007242893&partnerID=40&md5=d6d209b2094ebcd4dd19608badb7e971
Lehmann, A. & Gross, A. (2016). Using Crowd Sensed Data as Input to Congestion Model. I 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016: The Third International Workshop on Crowd Assisted Sensing Pervasive Systems and Communications Artikel 7457105 IEEE Press. https://doi.org/10.1109/PERCOMW.2016.7457105
Jørgensen, J. B., Knudsen, B., Sloth, L., Vase, J. R. & Christensen, H. B. (2016). Variability Handling for Mobile Banking Apps on iOS and Android. I Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (s. 283-286). Artikel 7516847 IEEE Computer Society Press. https://doi.org/10.1109/WICSA.2016.29