Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Bauer, A., Gross, J., Lumsdaine, P. L., Shulman, M., Sozeau, M. & Spitters, B. (2016). The HoTT Library: A formalization of homotopy type theory in Coq. http://arxiv.org/abs/1610.04591
Larsen, K. G. & Nelson, J. (2016). The Johnson-Lindenstrauss Lemma Is Optimal for Linear Dimensionality Reduction. Leibniz International Proceedings in Informatics, 55, 82:1 - 82:11. https://doi.org/10.4230/LIPIcs.ICALP.2016.82
Schwiegelshohn, C. & Schwiegelshohn, U. (2016). The power of migration for online slack scheduling. I C. Zaroliagis & P. Sankowski (red.), 24th Annual European Symposium on Algorithms, ESA 2016 Artikel 75 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ESA.2016.75
Brody, J. E., Buhrman, H., Koucký, M., Loff, B. & Speelman, F. (2016). Towards a Reverse Newman's Theorem in Interactive Information Complexity. Algorithmica, 76(3), 749-781. https://doi.org/10.1007/s00453-015-0112-9
Baum, C. (2016). Towards More Efficient Secure Multiparty Computation in the Preprocessing Model. Department of Computer Science, Aarhus University.
Andreasen, E. S., Gordon, C. S., Chandra, S., Sridharan, M., Tip, F. & Sen, K. (2016). Trace Typing: An Approach for Evaluating Retrofitted Type Systems. I S. Krishnamurthi & B. S. Lerner (red.), 30th European Conference on Object-Oriented Programming (ECOOP 2016) (s. 231-239, 2310-2328). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ECOOP.2016.1
Svendsen, K., Sieczkowski, F. & Birkedal, L. (2016). Transfinite step-indexing: Decoupling concrete and logical steps. I P. Thiemann (red.), Programming Languages and Systems (Bind 9632, s. 727-751). Springer VS. https://doi.org/10.1007/978-3-662-49498-1_28
Caragiannis, I., Filos-Ratsikas, A., Frederiksen, S. K. S., Hansen, K. A. & Tan, Z. (2016). Truthful facility assignment with resource augmentation: An exact analysis of serial dictatorship. I Web and Internet Economics - 12th International Conference, WINE 2016, Proceedings (Bind 10123, s. 236-250). Springer VS. https://doi.org/10.1007/978-3-662-54110-4_17
Heinze, T. S., Møller, A. & Strocco, F. (2016). Type safety analysis for dart. I R. Ierusalimschy (red.), DLS 2016 - Proceedings of the 12th Symposium on Dynamic Languages (s. 1-12). Association for Computing Machinery. https://doi.org/10.1145/2989225.2989226
Strocco, F. (2016). Type Soundness in the Dart Programming Language. Department of Computer Science, University of Aarhus.
Mezzetti, G., Møller, A. & Strocco, F. (2016). Type unsoundness in practice: An empirical study of dart. I R. Ierusalimschy (red.), DLS 2016 - Proceedings of the 12th Symposium on Dynamic Languages (s. 13-24). Association for Computing Machinery. https://doi.org/10.1145/2989225.2989227
Damgård, I., Nielsen, J. B., Ostrovsky, R. & Rosén, A. (2016). Unconditionally secure computation with reduced interaction. I M. Fischlin & J.-S. Coron (red.), Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (Bind 9666, s. 420-447). Springer VS. https://doi.org/10.1007/978-3-662-49896-5_15
Tsirogiannis, C. & Tsirogiannis, C. (2016). Uncovering the Hidden Routes: Algorithms for Identifying Paths and Missing Links in Trade Networks . I T. Brughmans, A. Collar & F. Coward (red.), The Connected Past: Challenges to Network Studies in Archaeology and History Oxford University Press.
Čermák, J., Bosansky, B., Durkota, K., Lisý, V. & Kiekintveld, C. (2016). Using correlated strategies for computing stackelberg equilibria in extensive-form games. I 30th AAAI Conference on Artificial Intelligence, AAAI 2016 (s. 439-445). AAAI Press. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85007242893&partnerID=40&md5=d6d209b2094ebcd4dd19608badb7e971
Lehmann, A. & Gross, A. (2016). Using Crowd Sensed Data as Input to Congestion Model. I 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016: The Third International Workshop on Crowd Assisted Sensing Pervasive Systems and Communications Artikel 7457105 IEEE Press. https://doi.org/10.1109/PERCOMW.2016.7457105
Jørgensen, J. B., Knudsen, B., Sloth, L., Vase, J. R. & Christensen, H. B. (2016). Variability Handling for Mobile Banking Apps on iOS and Android. I Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (s. 283-286). Artikel 7516847 IEEE Computer Society Press. https://doi.org/10.1109/WICSA.2016.29
Dodds, M., Jagannathan, S., Parkinson, M. J., Svendsen, K. & Birkedal, L. (2016). Verifying custom synchronisation constructs using higher-order separation logic. ACM Transactions on Programming Languages and Systems, 38/2(2), 4:1 - 4:72. Artikel 4. https://doi.org/10.1145/2818638
Klokmose, C. N., Eagan, J., Baader, S., Mackay, W. & Beaudouin-Lafon, M. (2016). Webstrates: Demonstrating the potential of shareable dynamic media. I Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion, CSCW 2016 Companion: CSCW '16 Companion (s. 61-64). Association for Computing Machinery. https://doi.org/10.1145/2818052.2874325
Zagermann, J., Pfeil, U., Rädle, R., Jetter, H.-C., Klokmose, C. N. & Reiterer, H. (2016). When Tablets meet Tabletops: The Effect of Tabletop Size on Around-the-Table Collaboration with Personal Tablets. I CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (s. 5470-5481). Association for Computing Machinery. https://doi.org/10.1145/2858036.2858224
Salgado, M. & Saad-Sulonen, J. (2016). Who needs us? Inquiring into the participatory practices of others and what it means for participatory designers. Afhandling præsenteret på International European Academy of Design Conference, Paris, Frankrig.
Giacomelli, I., Madsen, J. & Orlandi, C. (2016). ZKBoo: Faster Zero-Knowledge for Boolean Circuits. I Proceedings of the 25th USENIX Security Symposium: (USENIX Security 16) (s. 1069-1083). USENIX - The Advanced Computing Systems Association. https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_giacomelli.pdf
Danvy, O. (red.) (2015). 2015 Workshop on Continuations: pre-proceedings. Department of Computer Science, University of Aarhus. https://doi.org/10.7146/aul.4.4
Elkin , M., Pettie, S. & Su, H.-H. (2015). (2Δ − 1)-edge-coloring is much easier than maximal matching in the distributed setting. I P. Indyk (red.), Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '15 (s. 355-370 ). Society for Industrial and Applied Mathematics. http://dl.acm.org/citation.cfm?id=2722155
Cascudo Pueyo, I., Damgård, I. B., David, B. M., Giacomelli, I., Nielsen, J. B. & Trifiletti, R. (2015). Additively Homomorphic UC commitments with Optimal Amortized Overhead. I J. Katz (red.), Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30-April 1, 2015, Proceedings (s. 495–515). Springer. https://doi.org/10.1007/978-3-662-46447-2_22
Branzei, S. & Miltersen, P. B. (2015). A Dictatorship Theorem for Cake Cutting. I Q. Yang & M. Wooldridge (red.), Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015) (s. 481-488). AAAI Press. http://ijcai.org/papers15/Papers/IJCAI15-074.pdf
Elkin , M. & Pettie, S. (2015). A linear-size logarithmic stretch path-reporting distance oracle for general graphs. I P. Indyk (red.), SODA '15 Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms (s. 805-821 ). Society for Industrial and Applied Mathematics. http://dl.acm.org/citation.cfm?id=2722129.2722184&coll=DL&dl=ACM&CFID=630471957&CFTOKEN=95259129
Jespersen, S., Stounbjerg, R. B. K. & Verdezoto, N. (2015). AmBird: Mediating Intimacy for Long Distance Relationships through an Ambient Awareness System. I O. W. Bertelsen & K. Halskov (red.), Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers. Department of Computer Science, Aarhus University. https://doi.org/10.7146/aahcc.v1i1.21321
Bizjak, A. & Møgelberg, R. E. (2015). A model of guarded recursion with clock synchronisation. Electronic Notes in Theoretical Computer Science, 319, 83-101. https://doi.org/10.1016/j.entcs.2015.12.007
Paviotti, M., Møgelberg, R. E. & Birkedal, L. (2015). A model of PCF in guarded type theory. Electronic Notes in Theoretical Computer Science, 319, 333–349. https://doi.org/10.1016/j.entcs.2015.12.020
Walter, R., Bulling, A., Lindlbauer, D., Schuessler , M. & Müller, J. (2015). Analyzing visual attention during whole body interaction with public displays. I Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '15 (s. 1263-1267). Association for Computing Machinery. https://doi.org/10.1145/2750858.2804255
Caragiannis, I., Filos-Ratsikas, A. & Procaccia, A. D. (2015). An improved 2-agent kidney exchange mechanism. Theoretical Computer Science, 589, 53–60. https://doi.org/10.1016/j.tcs.2015.04.013
Goswami, M., Jørgensen, A. G., Larsen, K. G. & Pagh, R. (2015). Approximate Range Emptiness in Constant Time and Optimal Space. I Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '15 (s. 769-775). Society for Industrial and Applied Mathematics. http://dl.acm.org/citation.cfm?id=2133036&picked=prox
Durkota, K., Lisý, V., Bosansky, B. & Kiekintveld, C. (2015). Approximate solutions for attack graph games with imperfect information. I 6th International Conference on Decision and Game Theory for Security, GameSec 2015 (Bind 9406, s. 228-249). Springer. https://doi.org/10.1007/978-3-319-25594-1_13
Sieczkowski, F., Svendsen, K., Birkedal, L. & Pichon-Pharabod, J. (2015). A separation logic for fictional sequential consistency. I J. Vitek (red.), Programming Languages and Systems : 24th European Symposiumon Programming, ESOP 2015 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015 (s. 736-761). Springer. https://doi.org/10.1007/978-3-662-46669-8_30
Hadlak, S., Schumann, H. & Schulz, H.-J. (2015). A Survey of Multi-faceted Graph Visualization. I R. Borgo, F. Ganovelli & I. Viola (red.), EuroVis'15 State of the Art Reports (s. 1-20). Eurographics Association. https://doi.org/10.2312/eurovisstar.20151109
Faust, S., Mukherjee, P., Nielsen, J. B. & Venturi, D. (2015). A Tamper and Leakage Resilient von Neumann Architecture. I J. Katz (red.), Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (s. 579-603). Springer VS. https://doi.org/10.1007/978-3-662-46447-2_26
Jensen, C. S. (2015). Automated Testing of Event-Driven Applications. Department of Computer Science, Aarhus University.
Müller, J., Eberle, D. & Schmidt, C. (2015). BaseLase: An Interactive Focus + Context Laser Floor. I B. Begole & J. Kim (red.), CHI '15, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (s. 3869-3878 ). Association for Computing Machinery. http://dx.doi.org/10.1145/2702123.2702246
Entwistle, J. M., Rasmussen, M. K., Verdezoto, N., Brewer, R. S. & Andersen, M. S. (2015). Beyond the Individual: The Contextual Wheel of Practice as a Research Framework for Sustainable HCI. I B. Begole & J. Kim (red.), Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15 (s. 1125-1134 ). Association for Computing Machinery. https://doi.org/10.1145/2702123.2702232