Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Hubacek, P. & Wichs, D. (2015). On the Communication Complexity of Secure Function Evaluation with Long Output. I T. Roughgarden (red.), Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS '15 (s. 163-172 ). Association for Computing Machinery. https://doi.org/10.1145/2688073.2688105
Damgård, I. B., Dupont-Dupuis, F. & Nielsen, J. B. (2015). On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation. I Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (s. 87-104). Springer VS. https://doi.org/10.1007/978-3-319-17470-9_6
Durkota, K., Lisý, W., Kiekintveld, C. & Bosansky, B. (2015). Optimal Network Security Hardening Using Attack Graph Games. I N. Criado, M. Rehak, J. M. Such & L. Vercouter (red.), 2nd International Workshop on Agents and Cybersecurity, ACySE 2015: Workshop Notes at AAMAS 2015 (s. 7-14). Lancaster University. http://www.lancaster.ac.uk/staff/suchj/acyse2015-proceedings/ACySE2015_proceedings.pdf#page=14
Micenková, B. (2015). Outlier Detection and Explanation for Domain Experts. Department of Computer Science, University of Aarhus.
Bødker, S. & Zander, P.-O. (2015). Participation in design between public sector and local communities. I B. Begole & J. Kim (red.), Proceedings of the 7th International Conference on Communities and Technologies, C&T '15 Association for Computing Machinery. https://doi.org/10.1145/2768545.2768546
Nielsen, M. & Grønbæk, K. (2015). PivotViz: Interactive Visual Analysis of Multidimensional Library Transaction Data. I Proceedings of the 15th ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL '15 : Large, Dynamic and Ubiquitous –The Era of the Digital Library (s. 139-142). Association for Computing Machinery. https://doi.org/10.1145/2756406.2756937
Feldthaus, A. (2015). Pointer Analysis for JavaScript Programming Tools. Department of Computer Science, Aarhus University.
Jakobsen, T. P. (2015). Practical Aspects of Secure Multiparty Computation. Department of Computer Science, Aarhus University.
Schulz, H.-J. & Hadlak, S. (2015). Preset-based generation and exploration of visualization designs. Journal of Visual Languages Computing, 31 (Part A), 9-29. https://doi.org/10.1016/j.jvlc.2015.09.004
Meiklejohn, S. & Orlandi, C. (2015). Privacy-enhancing overlays in bitcoin. I M. Brenner , N. Christin , B. Johnson & K. Rohloff (red.), Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Bind 8976, s. 127-141). Springer. https://doi.org/10.1007/978-3-662-48051-9_10
Frederiksen, T. K., Nielsen, J. B. & Orlandi, C. (2015). Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. I E. Oswald & M. Fischlin (red.), Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (s. 191-219). Springer VS. https://doi.org/10.1007/978-3-662-46803-6_7
Clouston, R., Bizjak, A., Grathwohl, H. B. & Birkedal, L. (2015). Programming and reasoning with guarded recursion for coinductive types. I A. Pitts (red.), Foundations of Software Science and Computation Structures: 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (s. 305-316). Springer VS. https://doi.org/10.1007/978-3-662-46678-0_26
Mukherjee, P. (2015). Protecting Cryptographic Memory against Tampering Attack. Department of Computer Science, Aarhus University.
Vermeulen, J., Luyten, K., Coninx, K., Marquardt, N. & Bird, J. (2015). Proxemic Flow: Dynamic Peripheral Floor Visualizations for Revealing and Mediating Large Surface Interactions. I J. Abascal, S. Barbosa, M. Fetter, T. Gross, P. Palanque & M. Winckler (red.), Human-Computer Interaction -- INTERACT 2015 (s. 264-281). Springer International Publishing Switzerland.
Midtgaard, J. & Møller, A. (2015). QuickChecking Static Analysis Properties. I 8th IEEE International Conference on Software Testing, Verification and Validation (ICST), 2015 (s. 1-10). IEEE. https://doi.org/10.1109/ICST.2015.7102603
Fang, W., Filos-Ratsikas, A., Frederiksen, S. K. S., Tang, P. & Zuo, S. (2015). Randomized Assignments for Barter Exchanges: Fairness vs Efficiency. I T. Walsh (red.), Algorithmic Decision Theory: 4th International Conference, ADT 2015, Lexington, KY, USA, September 27-30, 2015, Proceedings (s. 537-552). Springer VS. https://doi.org/10.1007/978-3-319-23114-3_32
Nocke, T., Buschmann, S., Donges, J. F., Marwan, N., Schulz, H.-J. & Tominski, C. (2015). Review: Visual Analytics of climate networks. Nonlinear Processes in Geophysics, 22, 545-570. https://doi.org/10.5194/npg-22-545-2015
Wilkinson, B. T. (2015). Revisiting visibility in the plane. Afhandling præsenteret på International Symposium on Computational Geometry, Eindhoven, Holland. http://www.madalgo.au.dk/~bw/papers/2015W.pdf
Abel, P., Fox, M., Potts, R., Hemment, D., Thomson, C., Gajdos, P., Li, S., Vazquez, A. D., Barraclough, R., Schliwa, G., Lindley, J., Turner, S., Devitt, J., MacDonald, J., Lee, A., Trueblood, C., Maxwell, D., Mehrpouya, H., Woods, M. ... Monsen, K. (2015). Re-writing the City: Negotiating and Reflecting on Data Streams. https://doi.org/10.1145/2783446.2783562
Bhattacharya, S., Blunck, H., Kjaergaard, M. B. & Nurmi, P. (2015). Robust and Energy-Efficient Trajectory Tracking for Mobile Devices. I E E E Transactions on Mobile Computing, 14(2), 430-443. https://doi.org/10.1109/TMC.2014.2318712
Basile, D., Galletta, L. & Mezzetti, G. (2015). Safe Adaptation Through Implicit Effect Coercion. I C. Bodei, G.-L. Ferrari & C. Priami (red.), Programming Languages with Applications to Biology and Security: Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday (Bind 9465, s. 122-141). Springer Publishing Company. https://doi.org/10.1007/978-3-319-25527-9_10
Chester, S., Sidlauskas, D., Assent, I. & Bøgh, K. S. (2015). Scalable Parallelization of Skyline Computation for Multi-core Processors. I 31st IEEE International Conference on Data Engineering (ICDE 2015) (s. 1083 - 1094). IEEE Computer Society Press. https://doi.org/10.1109/ICDE.2015.7113358
Skovsgaard, A. & Jensen, C. S. (2015). Scalable Spatio-Textual Region Querying in Key-Value Stores. Afhandling præsenteret på ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Dallas, USA. http://sigspatial2014.sigspatial.org/
Giacomelli, I., Olimid, R. & Ranellucci, S. (2015). Security of Linear Secret-Sharing Schemes Against Mass Surveillance. I M. Reiter & D. Naccache (red.), Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Bind 9476, s. 43-58). Springer. https://doi.org/10.1007/978-3-319-26823-1
Aronov, B., Driemel, A., Van Kreveld, M., Löffler, M. & Staals, F. (2015). Segmentation of trajectories on nonmonotone criteria. A C M Transactions on Algorithms, 12(2), Artikel 26. https://doi.org/10.1145/2660772
Nunes, F., Verdezoto, N., Fitzpatrick, G., Kyng, M., Grönvall, E. & Storni, C. (2015). Self-Care Technologies in HCI: Trends, Tensions, and Opportunities. ACM Transactions on Computer-Human Interaction, 22(6), Artikel 33. https://doi.org/10.1145/2803173
Frederiksen, S. K. S. (2015). Semi-algebraic Geometry for Stochastic Games. Department of Computer Science, Aarhus University.
Bosansky, B. & Cemak, J. (2015). Sequence-Form Algorithm for Computing Stackelberg Equilibria in Extensive-Form Games. I Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (s. 805-811). AAAI Press. http://www.aaai.org/ocs/index.php/AAAI/AAAI15/paper/view/9610
Clouston, R. & Goré, R. (2015). Sequent Calculus in the Topos of Trees. I A. Pitts (red.), Foundations of Software Science and Computation Structures : 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (Bind 9034, s. 133-147). Springer VS. http://link.springer.com/chapter/10.1007/978-3-662-46678-0_9
Rijke, E. & Spitters, B. (2015). Sets in homotopy type theory. Mathematical Structures in Computer Science, 25(5), 1172-1202. https://doi.org/10.1017/S0960129514000553
Pettie, S. (2015). Sharp Bounds on Formation-free Sequences. I P. Indyk (red.), Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '15 (s. 592-604 ). Society for Industrial and Applied Mathematics. http://dl.acm.org/citation.cfm?id=2722155
Baader, S. & Bødker, S. (2015). SketchCode – an extensible code editor for crafting software. I End-User Development: 5th International Symposium, IS-EUD 2015, Madrid, Spain, May 26-29, 2015. Proceedings (Bind 9083, s. 211-216). Springer. https://doi.org/10.1007/978-3-319-18425-8_18
Møller, A. & Naik, M. (2015). SOAP'15: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. I Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis Association for Computing Machinery. http://dl.acm.org/citation.cfm?id=2771284
Filos-Ratsikas, A. (2015). Social Welfare in Algorithmic Mechanism Design Without Money. Department of Computer Science, Aarhus University.
Afshani, P. & Sitchinava , N. (2015). Sorting and Permuting without Bank Conflicts on GPUs. I N. Bansal & I. Finocchi (red.), Algorithms – ESA 2015: 23rd Annual European Symposium, Patras, Greece, September 14–16, 2015, Proceedings (s. 13-24). Springer VS. https://doi.org/10.1007/978-3-662-48350-3_2
Truelsen, J. (2015). Space Efficient Data Structures and External Terrain Algorithms. Department of Computer Science, Aarhus University.
Cascudo Pueyo, I., Cramer, R., Mirandola, D. & Zémor, G. (2015). Squares of Random Linear Codes. I E E E Transactions on Information Theory, 61(3), 1159-1173. https://doi.org/10.1109/TIT.2015.2393251
Jensen, C. S., Møller, A., Raychev, V., Dimitrov, D. & Vechev, M. (2015). Stateless Model Checking of Event-Driven Applications. I OOPSLA 2015 : Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (s. 57-73). Association for Computing Machinery. https://doi.org/10.1145/2814270.2814282