Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Adamsen, C. Q., Møller, A. & Mezzetti, G. (2015). Systematic Execution of Android Test Suites in Adverse Conditions. In Proceedings of the 2015 International Symposium on Software Testing and Analysis, ISSTA '15 (pp. 83-93 ). Association for Computing Machinery. https://doi.org/10.1145/2771783.2771786
Schmidt, A., Kleemann, M., Merritt, T. & Selker, T. (2015). Tactile Communication in Extreme Contexts: Exploring the Design Space Through Kiteboarding. In J. Abascal, S. Barbosa, M. Fetter, T. Gross, P. Palanque & M. Winckler (Eds.), Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part IV (pp. 37-54). Springer. https://doi.org/10.1007/978-3-319-22723-8_4
Nielsen, J. B. (2015). Tamper and leakage resilient von Neumann architectures from continuous non-malleable codes. In S. Wolf & A. Lehmann (Eds.), 8th International Conference on Information Theoretic Security, ICITS 2015 (Vol. 9063, pp. XI-XII). Springer.
Aziz, H., Branzei, S., Filos-Ratsikas, A. & Frederiksen, S. K. S. (2015). The Adjusted Winner Procedure: Characterizations and Equilibria. Paper presented at International Joint Conference on Artificial Intelligence, Buinos Aires, Argentina.
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2015). The Chaining Lemma and its application. In A. Lehmann & S. Wolf (Eds.), Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (pp. 181-196). Springer VS. https://doi.org/10.1007/978-3-319-17470-9_11
Gambs, S., Ranellucci, S. & Tapp, A. (2015). The crypto-democracy and the trustworthy (position paper). In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (Vol. 8872, pp. 58-76). Springer VS. https://doi.org/10.1007/978-3-319-17016-9_5
Fuchsberger, V., Murer, M., Tscheligi, M., Lindtner, S., Reiter, A., Bardzell, S., Bardzell, J. & Bjørn, P. (2015). The Future of Making: Where Industrial and Personal Fabrication Meet. Aarhus Series on Human Centered Computing, 1(1). http://ojs.statsbiblioteket.dk/index.php/ashcc/article/view/21394/18857
Faist, P., Dupont-Dupuis, F., Oppenheim, J. & Renner, R. (2015). The minimal work cost of information processing. Nature Communications, 6, Article 7669. https://doi.org/10.1038/ncomms8669
Chou, T. & Orlandi, C. (2015). The simplest protocol for oblivious transfer. In K. Lauter & F. Rodríguez-Henríquez (Eds.), Progress in Cryptology - LATINCRYPT 2015: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings (Vol. 9230, pp. 40-58). Springer. https://doi.org/10.1007/978-3-319-22174-8_3
Pettie, S. (2015). Three generalizations of Davenport-Schinzel sequences. S I A M Journal on Discrete Mathematics, 29(4), 2189-2238. https://doi.org/10.1137/140968574
Larsen, K. G., Nelson, J. & Nguyen, H. L. (2015). Time Lower Bounds for Nonadaptive Turnstile Streaming Algorithms. In R. Servedio & R. Rubinfeld (Eds.), Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC '15 (pp. 803-812). Association for Computing Machinery. https://doi.org/10.1145/2746539.2746542
Brewer, R. S., Verdezoto, N., Holst, T. & Rasmussen, M. K. (2015). Tough Shift: Exploring the Complexities of Shifting Residential Electricity Use Through a Casual Mobile Game. In CHI PLAY '15 : Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play (pp. 307-317). Association for Computing Machinery. https://doi.org/10.1145/2793107.2793108
Yang, B., Guo, C., Ma, Y. & Jensen, C. S. (2015). Toward personalized, context-aware routing. V L D B Journal, 24(2), 297-318. https://doi.org/10.1007/s00778-015-0378-1
Saad-Sulonen, J. & Korsgaard, H. (2015). Towards a concept of community artifact ecology in HCI?. Paper presented at CHI, Seoul, Korea, Republic of.
Nielsen, M. & Grønbæk, K. (2015). Towards highly affine visualizations of consumption data from buildings. In IVAPP 2015 - 6th International Conference on Information Visualization Theory and Applications; VISIGRAPP, Proceedings (pp. 247-255). SCITEPRESS Digital Library.
Prentow, T. S., Blunck, H., Kjærgaard, M. B. & Stisen, A. (2015). Towards Indoor Transportation Mode Detection using Mobile Sensing. In S. Sigg , P. Nurmi & F. Salim (Eds.), Mobile Computing, Applications, and Services : 7th International Conference, MobiCASE 2015, Berlin, Germany, November 12-13, 2015, Revised Selected Papers (Vol. 162). Springer. https://doi.org/10.1007/978-3-319-29003-4
Blevis, E., Koskinen, I. K., Lee, K.-P., Bødker, S., Chen, L.-L., Lim, Y., Wei, H. & Wakkary, R. (2015). Transdisciplinary Interaction Design in Design Education. In B. Begole & J. Kim (Eds.), Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (pp. 833-838). Association for Computing Machinery. https://doi.org/10.1145/2702613.2724726
Derczynski, L., Chester, S. & Bøgh, K. S. (2015). Tune Your Brown Clustering, Please. In G. A. Angelova, K. Bontcheva & R. Mitkov (Eds.), International Conference Recent Advances in Natural Language Processing ’2015 Proceedings (pp. 110–117). INCOMA Ltd. http://lml.bas.bg/ranlp2015/docs/RANLP_main.pdf
Garg, S. & Polychroniadou, A. (2015). Two-round adaptively secure MPC from indistinguishability obfuscation. In Y. Dodis & J. Buus Nielsen (Eds.), Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (pp. 614-637). Springer VS. https://doi.org/10.1007/978-3-662-46497-7_24
David, B. M., Dowsley, R., van der Graaf, J., Marques, D., Nascimento, A. C. A. & Pinto, A. (2015). Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra. I E E E Transactions on Information Forensics and Security, 11(1), 59 - 73 . https://doi.org/10.1109/TIFS.2015.2476783
Saad-Sulonen, J., Halskov, K., Eriksson, E., Vines, J., Huybrechts, L. & Karasti, T. H. (2015). Unfolding Participation: What do we mean by participation – conceptually and in practice. Aarhus Series on Human Centered Computing , 1(1). https://doi.org/10.7146/aahcc.v1i1.21324
de Montjoye, Y.-A., Radaelli, L., Singh, V. K. & Pentland, A. S. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 347(6221), 536-539. https://doi.org/10.1126/science.1256297
Branzei, S. & Procaccia, A. D. (2015). Verifiably Truthful Mechanisms. In T. Roughgarden (Ed.), Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS '15 (pp. 297-306 ). Association for Computing Machinery. https://doi.org/10.1145/2688073.2688098
Christensen, L. R. & Bertelsen, O. W. (2015). View of Causation for CSCW: Manipulation and Control in the Material Field of Work. In V. Wulf, K. Schmidt & D. Randall (Eds.), Designing Socially Embedded Technologies in the Real-World, Part II (pp. 151-169). Springer. https://doi.org/10.1007/978-1-4471-6720-4_8
Klokmose, C. N., Eagan, J. R., Baader, S., Mackay, W. & Beaudouin-Lafon, M. (2015). Webstrates: Shareable Dynamic Media. In UIST'15 Proceedings of the 28th annual ACM symposium on User interface software and technology (UIST '15) Association for Computing Machinery. https://doi.org/10.1145/2807442.2807446
Hornbæk, K., Oulasvirta, A., Reeves, S. & Bødker, S. (2015). What to Study in HCI? In B. Begole & J. Kim (Eds.), Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (pp. 2385-2388). Association for Computing Machinery. https://doi.org/10.1145/2702613.2702648
Botero, A., Van Amste, F., Seravalli, A. & Saad-Sulonen, J. (2015). WS co-designing and commoning. Nordic Design Research, 2015(6). http://www.nordes.org/opj/index.php/n13/article/view/422
Xue, H., Kelmann, P., Inati, S., Sørensen, T. S. & Hansen, M. (2014). 3D High Resolution l1-SPIRiT Reconstruction on Gadgetron based Cloud: no. 1882. Abstract from Joint Annual Meeting ISMRM-ESMRMB, Milan, Italy. http://www.ismrm.org/14/
Prentow, T. S., Blunck, H., Stisen, A., Kjærgaard, M. B. & Grønbæk, K. (2014). Accurate estimation of indoor travel times: learned unsupervised from position traces. In M. Youssef , C. Mascolo & F. Kawsar (Eds.), MOBIQUITOUS '14. Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 90-99). Association for Computing Machinery. https://doi.org/10.4108/icst.mobiquitous.2014.258020
Clausen, C., Danvy, O. & Masuko, M. (2014). A Characterization of Moessner's Sieve. Theoretical Computer Science, 546(August), 244–256. https://doi.org/10.1016/j.tcs.2014.03.012
Skovsgaard, A., Sidlauskas, D. & Jensen, C. S. (2014). A Clustering Approach to the Discovery of Points of Interest from Geo-Tagged Microblog Posts. In J. E. Guerrero (Ed.), 15th IEEE International Conference on Mobile Data Management (MDM), 2014 : Proceedings (pp. 178-189 (vol. 1)). IEEE Computer Society Press. https://doi.org/10.1109/MDM.2014.28
Damgård, I. B. & Nielsen, J. B. (2014). Adaptive versus static security in the UC Model. In S. S. M. Chow , J. K. Liu, L. C. K. Hui & S. M. Yiu (Eds.), Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (pp. 10-28). Springer VS. https://doi.org/10.1007/978-3-319-12475-9_2
Dupont-Dupuis, F., Szehr, O. & Tomamichel, M. (2014). A decoupling approach to classical data transmission over quantum channels. I E E E Transactions on Information Theory, 60(3), 1562 - 1572 . https://doi.org/10.1109/TIT.2013.2295330
Bizjak, A., Birkedal, L. & Miculan, M. (2014). A model of countable nondeterminism in guarded type theory. In G. Dowek (Ed.), Rewriting and Typed Lambda Calculi: Joint International Conference, RTA-TLCA 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014. Proceedings (pp. 108-123). Springer VS. https://doi.org/10.1007/978-3-319-08918-8_8
Wilkinson, B. T. (2014). Amortized bounds for dynamic orthogonal range reporting. In A. S. Schulz & D. Wagner (Eds.), Algorithms - ESA 2014: 22th Annual European Symposium, Wroclaw, Poland, September 8-10, 2014. Proceedings (pp. 842-856). Springer. https://doi.org/10.1007/978-3-662-44777-2_69