Aarhus Universitets segl

Publikationer

Søg publikationer fra Institut for Datalogi

Liste over publikationer af videnskabelige medarbejdere fra Institut for Datalogi, Aarhus Universitet.

Sortér efter: Dato | Forfatter | Titel

Madsen, M. (2015). Static Analysis of Dynamic Languages. Department of Computer Science, Aarhus University.
Bizjak, A. & Birkedal, L. (2015). Step-indexed logical relations for probability. I A. Pitts (red.), Foundations of Software Science and Computation Structures: 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (s. 279-294 ). Springer VS. https://doi.org/10.1007/978-3-662-46678-0_18
Da Rocha Pinto, P., Dinsdale-Young, T. & Gardner, P. (2015). Steps in Modular Specifications for Concurrent Modules: (Invited Tutorial Paper). Electronic Notes in Theoretical Computer Science, 319, 3-18. https://doi.org/10.1016/j.entcs.2015.12.002
Cermak, J., Bosansky, B. & Gatti, N. (2015). Strategy Effectiveness of Game-Theoretical Solution Concepts in Extensive-Form General-Sum Games. Abstract fra International Conference on Autonomous Agents and Multiagent Systems, Istanbul, Tyrkiet. http://dl.acm.org/citation.cfm?id=2773450&CFID=719158965&CFTOKEN=25615646
Son, W. & Afshani, P. (2015). Streaming Algorithms for Smallest Intersecting Ball of Disjoint Balls. I R. Jain, S. Jain & F. Stephan (red.), Theory and Applications of Models of Computation: 12th Annual Conference, TAMC 2015, Singapore, May 18-20, 2015, Proceedings (s. 189-199 ). Springer VS. https://doi.org/10.1007/978-3-319-17142-5
Brodal, G. S., Nielsen, J. A. S. & Truelsen, J. (2015). Strictly Implicit Priority Queues: On the Number of Moves and Worst-Case Time. I F. Dehne, J.-R. Sack & U. Stege (red.), Algorithms and Data Structures: 14th International Symposium, WADS 2015, Proceedings (s. 91-102). Springer VS. https://doi.org/10.1007/978-3-319-21840-3_8
Pinder, C., Vermeulen, J., Beale, R. & Hendley, R. (2015). Subliminal Priming of Nonconscious Goals on Smartphones. MobileHCI '15 Adjunct, 825-830. https://doi.org/10.1145/2786567.2793707
Adamsen, C. Q., Møller, A. & Mezzetti, G. (2015). Systematic Execution of Android Test Suites in Adverse Conditions. I Proceedings of the 2015 International Symposium on Software Testing and Analysis, ISSTA '15 (s. 83-93 ). Association for Computing Machinery. https://doi.org/10.1145/2771783.2771786
Schmidt, A., Kleemann, M., Merritt, T. & Selker, T. (2015). Tactile Communication in Extreme Contexts: Exploring the Design Space Through Kiteboarding. I J. Abascal, S. Barbosa, M. Fetter, T. Gross, P. Palanque & M. Winckler (red.), Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part IV (s. 37-54). Springer. https://doi.org/10.1007/978-3-319-22723-8_4
Nielsen, J. B. (2015). Tamper and leakage resilient von Neumann architectures from continuous non-malleable codes. I S. Wolf & A. Lehmann (red.), 8th International Conference on Information Theoretic Security, ICITS 2015 (Bind 9063, s. XI-XII). Springer.
Aziz, H., Branzei, S., Filos-Ratsikas, A. & Frederiksen, S. K. S. (2015). The Adjusted Winner Procedure: Characterizations and Equilibria. Afhandling præsenteret på International Joint Conference on Artificial Intelligence, Buinos Aires, Argentina.
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2015). The Chaining Lemma and its application. I A. Lehmann & S. Wolf (red.), Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (s. 181-196). Springer VS. https://doi.org/10.1007/978-3-319-17470-9_11
Gambs, S., Ranellucci, S. & Tapp, A. (2015). The crypto-democracy and the trustworthy (position paper). I Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (Bind 8872, s. 58-76). Springer VS. https://doi.org/10.1007/978-3-319-17016-9_5
Fuchsberger, V., Murer, M., Tscheligi, M., Lindtner, S., Reiter, A., Bardzell, S., Bardzell, J. & Bjørn, P. (2015). The Future of Making: Where Industrial and Personal Fabrication Meet. Aarhus Series on Human Centered Computing, 1(1). http://ojs.statsbiblioteket.dk/index.php/ashcc/article/view/21394/18857
Faist, P., Dupont-Dupuis, F., Oppenheim, J. & Renner, R. (2015). The minimal work cost of information processing. Nature Communications, 6, Artikel 7669. https://doi.org/10.1038/ncomms8669
Chou, T. & Orlandi, C. (2015). The simplest protocol for oblivious transfer. I K. Lauter & F. Rodríguez-Henríquez (red.), Progress in Cryptology - LATINCRYPT 2015: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings (Bind 9230, s. 40-58). Springer. https://doi.org/10.1007/978-3-319-22174-8_3
Larsen, K. G., Nelson, J. & Nguyen, H. L. (2015). Time Lower Bounds for Nonadaptive Turnstile Streaming Algorithms. I R. Servedio & R. Rubinfeld (red.), Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC '15 (s. 803-812). Association for Computing Machinery. https://doi.org/10.1145/2746539.2746542
Brewer, R. S., Verdezoto, N., Holst, T. & Rasmussen, M. K. (2015). Tough Shift: Exploring the Complexities of Shifting Residential Electricity Use Through a Casual Mobile Game. I CHI PLAY '15 : Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play (s. 307-317). Association for Computing Machinery. https://doi.org/10.1145/2793107.2793108
Yang, B., Guo, C., Ma, Y. & Jensen, C. S. (2015). Toward personalized, context-aware routing. V L D B Journal, 24(2), 297-318. https://doi.org/10.1007/s00778-015-0378-1
Saad-Sulonen, J. & Korsgaard, H. (2015). Towards a concept of community artifact ecology in HCI?. Afhandling præsenteret på CHI, Seoul, Sydkorea.
Nielsen, M. & Grønbæk, K. (2015). Towards highly affine visualizations of consumption data from buildings. I IVAPP 2015 - 6th International Conference on Information Visualization Theory and Applications; VISIGRAPP, Proceedings (s. 247-255). SCITEPRESS Digital Library.
Prentow, T. S., Blunck, H., Kjærgaard, M. B. & Stisen, A. (2015). Towards Indoor Transportation Mode Detection using Mobile Sensing. I S. Sigg , P. Nurmi & F. Salim (red.), Mobile Computing, Applications, and Services : 7th International Conference, MobiCASE 2015, Berlin, Germany, November 12-13, 2015, Revised Selected Papers (Bind 162). Springer. https://doi.org/10.1007/978-3-319-29003-4
Blevis, E., Koskinen, I. K., Lee, K.-P., Bødker, S., Chen, L.-L., Lim, Y., Wei, H. & Wakkary, R. (2015). Transdisciplinary Interaction Design in Design Education. I B. Begole & J. Kim (red.), Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (s. 833-838). Association for Computing Machinery. https://doi.org/10.1145/2702613.2724726
Derczynski, L., Chester, S. & Bøgh, K. S. (2015). Tune Your Brown Clustering, Please. I G. A. Angelova, K. Bontcheva & R. Mitkov (red.), International Conference Recent Advances in Natural Language Processing ’2015 Proceedings (s. 110–117). INCOMA Ltd. http://lml.bas.bg/ranlp2015/docs/RANLP_main.pdf
Garg, S. & Polychroniadou, A. (2015). Two-round adaptively secure MPC from indistinguishability obfuscation. I Y. Dodis & J. Buus Nielsen (red.), Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (s. 614-637). Springer VS. https://doi.org/10.1007/978-3-662-46497-7_24
David, B. M., Dowsley, R., van der Graaf, J., Marques, D., Nascimento, A. C. A. & Pinto, A. (2015). Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra. I E E E Transactions on Information Forensics and Security, 11(1), 59 - 73 . https://doi.org/10.1109/TIFS.2015.2476783
Bødker, S. (2015). Understanding computer applications in use: A human activity analysis. I Signs of Work: Semiosis and Information Processing in Organisations (s. 325-348). Walter de Gruyter GmbH and Co. KG. https://doi.org/10.1515/9783110819014-012
Saad-Sulonen, J., Halskov, K., Eriksson, E., Vines, J., Huybrechts, L. & Karasti, T. H. (2015). Unfolding Participation: What do we mean by participation – conceptually and in practice. Aarhus Series on Human Centered Computing , 1(1). https://doi.org/10.7146/aahcc.v1i1.21324
de Montjoye, Y.-A., Radaelli, L., Singh, V. K. & Pentland, A. S. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 347(6221), 536-539. https://doi.org/10.1126/science.1256297
Branzei, S. & Procaccia, A. D. (2015). Verifiably Truthful Mechanisms. I T. Roughgarden (red.), Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS '15 (s. 297-306 ). Association for Computing Machinery. https://doi.org/10.1145/2688073.2688098
Christensen, L. R. & Bertelsen, O. W. (2015). View of Causation for CSCW: Manipulation and Control in the Material Field of Work. I V. Wulf, K. Schmidt & D. Randall (red.), Designing Socially Embedded Technologies in the Real-World, Part II (s. 151-169). Springer. https://doi.org/10.1007/978-1-4471-6720-4_8
Klokmose, C. N., Eagan, J. R., Baader, S., Mackay, W. & Beaudouin-Lafon, M. (2015). Webstrates: Shareable Dynamic Media. I UIST'15 Proceedings of the 28th annual ACM symposium on User interface software and technology (UIST '15) Association for Computing Machinery. https://doi.org/10.1145/2807442.2807446
Hornbæk, K., Oulasvirta, A., Reeves, S. & Bødker, S. (2015). What to Study in HCI? I B. Begole & J. Kim (red.), Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (s. 2385-2388). Association for Computing Machinery. https://doi.org/10.1145/2702613.2702648
Botero, A., Van Amste, F., Seravalli, A. & Saad-Sulonen, J. (2015). WS co-designing and commoning. Nordic Design Research, 2015(6). http://www.nordes.org/opj/index.php/n13/article/view/422