Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Höök, K. H., Jonsson, M., Ståhl, A., Tholander, J., Robertson, T., Marti, P., Svanæs, D., Petersen, M. G., Forlizzi, J., Schiphorst, T., Isbister, K., Hummels, C., Klooster, S., Loke, L. & Khut, G. P. (2016). Move to Be Moved. I CHI EA 2016: #chi4good - Extended Abstracts, 34th Annual CHI Conference on Human Factors in Computing Systems (s. 3301-3308). Association for Computing Machinery. https://doi.org/10.1145/2851581.2856470
Bødker, S., Hornbæk, K., Oulasvirta, A. & Reeves, S. (2016). Nine questions for HCI researchers in the making. interactions, 23(4), 58-61. https://doi.org/10.1145/2949686
Bai, G., Damgård, I., Orlandi, C. & Xia, Y. (2016). Non-Interactive Verifiable Secret Sharing for Monotone Circuits. I D. Pointcheval, A. Nitaj & T. Rachidi (red.), Progress in Cryptology – AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Proceedings (Bind 9646, s. 225-244). Springer VS. https://doi.org/10.1007/978-3-319-31517-1_12
Cascudo, I., Damgård, I., Lacerda, F. & Ranellucci, S. (2016). Oblivious transfer from any non-trivial elastic noisy channel via secret key agreement. I Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings (Bind 9985, s. 204-234). Springer VS. https://doi.org/10.1007/978-3-662-53641-4_9
Baum, C. (2016). On Garbling Schemes with and Without Privacy. I V. Zikas & R. De Prisco (red.), Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings: International Conference on Security and Cryptography for Networks (Bind 9841, s. 468-485). Springer VS. https://doi.org/10.1007/978-3-319-44618-9
Ben-Sasson, E., Ben-Tov, I., Damgård, I., Ishai, Y. & Ron-Zewi, N. (2016). On public key encryption from noisy codewords. I Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings (Bind 9615, s. 417-446). Springer VS. https://doi.org/10.1007/978-3-662-49387-8_16
Jakobsen, J. & Orlandi, C. (2016). On the CCA (in)security of MTProto. I Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices: SPSM '16 (s. 113-116). Association for Computing Machinery. https://doi.org/10.1145/2994459.2994468
Damgård, I. B., Nielsen, J. B., Polychroniadou, A. & Raskin, M. (2016). On the Communication Required for Unconditionally Secure Multiplication. I Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Bind 9815, s. 459-488). Springer VS. https://doi.org/10.1007/978-3-662-53008-5_16
Trifiletti, R., Nielsen, J. B., Frederiksen, T. K. & Jakobsen, T. P. (2016). On the Complexity of Additively Homomorphic UC Commitments. I E. Kushilevitz & T. Malkin (red.), Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings (Bind 9562, s. 542-565). Springer VS. https://doi.org/10.1007/978-3-662-49096-9
Campos, G. O., Zimek, A., Sander, J., Campello, R. J. G. B., Micenkova, B., Schubert, E., Assent, I. & Houle, M. E. (2016). On the Evaluation of Outlier Detection: Measures, Datasets, and an Empirical Study Continued. I R. Krestel, D. Mottin & E. Müller (red.), Proceedings of the Conference "Lernen, Wissen, Daten, Analysen" (Bind 1670, s. 1). CEUR Workshop Proceedings. http://ceur-ws.org/Vol-1670/paper-55.pdf
Campos, G. O., Zimek, A., Sander, J., Campello, R. J. G. B., Micenková, B., Schubert, E., Assent, I. & Houle, M. E. (2016). On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study. Data Mining and Knowledge Discovery, 30(4), 891-927. https://doi.org/10.1007/s10618-015-0444-8
Papakonstantinou, P. A., Xu, J. & Yang, G. (2016). On the power and limits of distance-based learning. I M.-F. Balcan & K. Q. Weinberger (red.), Proceedings of the 33nd International Conference on Machine Learning, {ICML} 2016, New York City, NY, USA, June 19-24, 2016 (Bind 48, s. 2263-2271). JMLR.org.
Chatterjee, K., Ibsen-Jensen, R. R. & Pavlogiannis, A. (2016). Optimal Reachability and a Space-Time Tradeoff for Distance Queries in Constant-Treewidth Graphs. I 24th Annual European Symposium on Algorithms (ESA 2016) (s. 28:1-28:17). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ESA.2016.28
Lanng, H., Lykkegaard, A., Thornholm, S., Tzannis, P. & Verdezoto, N. (2016). PeaceKeeper: Augmenting the Awareness and Communication of Noise Pollution in Student Dormitories. I Proceedings of the 7th Augmented Human International Conference, AH 2016: AH '16 Artikel 39 Association for Computing Machinery. https://doi.org/10.1145/2875194.2875218
Kunkel, A., Rheinländer, A., Schiefer, C., Helmer, S., Bouros, P. & Leser, U. (2016). PIEJoin: Towards Parallel Set Containment Joins. I P. Baumann, I. Manolescu-Goujot, L. Trani, Y. Ioannidis, G. G. Barnaföldi, L. Dobos & E. Bányai (red.), Scientific and Statistical Database Management: 28th International Conference, SSDBM 2016 - Proceedings Artikel 11 Association for Computing Machinery. https://doi.org/10.1145/2949689.2949694
Zakarias, R. W. (2016). Practical Secure Computation with Pre-Processing. Department of Computer Science, Aarhus University.
Birkedal, L. (2016). Preface. Electronic Notes in Theoretical Computer Science, 325, 1-2. https://doi.org/10.1016/j.entcs.2016.09.028
Hansen, T. D. & Zwick, U. (2016). Random-Edge Is Slower Than Random-Facet on Abstract Cubes. Leibniz International Proceedings in Informatics, 55, 51:1-51:14. https://doi.org/10.4230/LIPIcs.ICALP.2016.51
Cascudo, I., Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016). Rate-1, linear time and additively homomorphic UC commitments. I M. Robshaw & J. Katz (red.), Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Bind 9816, s. 179-207). Springer VS. https://doi.org/10.1007/978-3-662-53015-3_7
Nielsen, J. B. & Ranellucci, S. (2016). Reactive garbling: Foundation, instantiation, application. I J. H. Cheon & T. Takagi (red.), Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Bind 10032, s. 1022-1052). Springer VS. https://doi.org/10.1007/978-3-662-53890-6_34
Devriese, D., Birkedal, L. & Piessens, F. (2016). Reasoning about object capabilities with logical relations and effect parametricity. I 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016 (s. 147-162). Artikel 7467352 IEEE Press. https://doi.org/10.1109/EuroSP.2016.22
Østergaard Laursen, C., Pedersen, S., Merritt, T. R. & Caprani, O. (2016). Robot-Supported Food Experiences: Exploring Aesthetic Plating with Design Prototypes. I J. T.K.V.Koh, B. J. Dunstan, D. Silvera-Tawil & M. Velonaki (red.), Cultural Robotics - 1st International Workshop, CR 2015 and Held as Part of IEEE RO-MAN 2015, Revised Selected Papers: First International Workshop, CR 2015, Held as Part of IEEE RO-MAN 2015, Kobe, Japan, August 31, 2015. Revised Selected Papers (Bind 9549, s. 107-130). Springer. https://doi.org/10.1007/978-3-319-42945-8_10
Nielsen, M., Elmqvist, N. & Grønbæk, K. (2016). Scribble query: fluid touch brushing for multivariate data visualization. I C. Parker (red.), Proceedings of the 28th Australian Computer-Human Interaction Conference, OzCHI 2016 (s. 381-390). Association for Computing Machinery. https://doi.org/10.1145/3010915.3010951
Tomlein, M. & Grønbæk, K. (2016). Semantic Model of Variability and Capabilities of IoT Applications for Embedded Software Ecosystems. I Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (s. 247-252). Artikel 7516835 IEEE Press. https://doi.org/10.1109/WICSA.2016.17
Bouros, P., Mamoulis, N., Ge, S. & Terrovitis, M. (2016). Set Containment Join Revisited. Knowledge and Information Systems, 49(1), 375-402. https://doi.org/10.1007/s10115-015-0895-7
Abboud, A., Hansen, T. D., Williams, V. V. & Williams, R. (2016). Simulating Branching Programs with Edit Distance and Friends: Or: a Polylog Shaved is a Lower Bound Made. I STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing (s. 375-388). Association for Computing Machinery. https://doi.org/10.1145/2897518.2897653
Rasmussen, M. K., Troiano, G. M., Petersen, M. G., Simonsen, J. G. & Hornbæk, K. (2016). Sketching Shape-changing Interfaces: Exploring Vocabulary, Metaphor Use, and Affordances. I CHI 2016 - Proceedings, 34th Annual CHI Conference on Human Factors in Computing Systems: CHI'16 (Bind 2016, s. 2740-2751). Association for Computing Machinery. https://doi.org/10.1145/2858036.2858183
Christodoulou, G., Filos-Ratsikas, A., Frederiksen, S. K. S., Goldberg, P. W., Zhang, J. & Zhang, J. (2016). Social Welfare in One-Sided Matching Mechanisms. I N. Osman & C. Sierra (red.), Autonomous Agents and Multiagent Systems, IFAAMAS 2016 Workshops, Best Papers, Revised Selected Papers: AAMAS 2016 Workshops, Best Papers (Bind 10002, s. 30-50). Springer VS. https://doi.org/10.1007/978-3-319-46882-2_3
Abboud, A., Backurs, A., Hansen, T. D., Williams, V. V. & Zamir, O. (2016). Subtree isomorphism revisited. I 27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016 (Bind 2, s. 1256-1271). Association for Computing Machinery. https://doi.org/10.1137/1.9781611974331.ch88
Nielsen, M., Brewer, R. S. & Grønbæk, K. (2016). Supporting interactive visual analytics of energy behavior in buildings through affine visualizations. I C. Parker (red.), Proceedings of the 28th Australian Computer-Human Interaction Conference, OzCHI 2016 (s. 238-247). Association for Computing Machinery. https://doi.org/10.1145/3010915.3010950
Christensen, H. B. (2016). Teaching DevOps and Cloud Computing using a Cognitive Apprenticeship and Story-Telling Approach. I ITiCSE 2016 - Proceedings of the 2016 ACM Conference on Innovation and Technology in Computer Science Education (s. 174-179). Association for Computing Machinery. https://doi.org/10.1145/2899415.2899426
Hansen, K. A., Ibsen-Jensen, R. & Koucký, M. (2016). The big match in small space. I M. Gairing & R. Savani (red.), Algorithmic Game Theory - 9th International Symposium, SAGT 2016, Proceedings (Bind 9928, s. 64-76). Springer VS. https://doi.org/10.1007/978-3-662-53354-3_6
Madsen, O. L. & Møller-Pedersen, B. (2016). The Essence of Subclassing. Afhandling præsenteret på NOOL 2016, Amsterdam, Holland.
Garg, S., Mukherjee, P., Pandey, O. & Polychroniadou, A. (2016). The Exact Round Complexity of Secure Computation. I M. Fischlin & J.-S. Coron (red.), Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (s. 448 - 476). Springer VS. https://doi.org/10.1007/978-3-662-49896-5