Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Afshani, P. & Sitchinava , N. (2015). Sorting and Permuting without Bank Conflicts on GPUs. In N. Bansal & I. Finocchi (Eds.), Algorithms – ESA 2015: 23rd Annual European Symposium, Patras, Greece, September 14–16, 2015, Proceedings (pp. 13-24). Springer VS. https://doi.org/10.1007/978-3-662-48350-3_2
Truelsen, J. (2015). Space Efficient Data Structures and External Terrain Algorithms. Department of Computer Science, Aarhus University.
Cascudo Pueyo, I., Cramer, R., Mirandola, D. & Zémor, G. (2015). Squares of Random Linear Codes. I E E E Transactions on Information Theory, 61(3), 1159-1173. https://doi.org/10.1109/TIT.2015.2393251
Jensen, C. S., Møller, A., Raychev, V., Dimitrov, D. & Vechev, M. (2015). Stateless Model Checking of Event-Driven Applications. In OOPSLA 2015 : Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (pp. 57-73). Association for Computing Machinery. https://doi.org/10.1145/2814270.2814282
Madsen, M. (2015). Static Analysis of Dynamic Languages. Department of Computer Science, Aarhus University.
Bizjak, A. & Birkedal, L. (2015). Step-indexed logical relations for probability. In A. Pitts (Ed.), Foundations of Software Science and Computation Structures: 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (pp. 279-294 ). Springer VS. https://doi.org/10.1007/978-3-662-46678-0_18
Da Rocha Pinto, P., Dinsdale-Young, T. & Gardner, P. (2015). Steps in Modular Specifications for Concurrent Modules: (Invited Tutorial Paper). Electronic Notes in Theoretical Computer Science, 319, 3-18. https://doi.org/10.1016/j.entcs.2015.12.002
Cermak, J., Bosansky, B. & Gatti, N. (2015). Strategy Effectiveness of Game-Theoretical Solution Concepts in Extensive-Form General-Sum Games. Abstract from International Conference on Autonomous Agents and Multiagent Systems, Istanbul, Turkey. http://dl.acm.org/citation.cfm?id=2773450&CFID=719158965&CFTOKEN=25615646
Son, W. & Afshani, P. (2015). Streaming Algorithms for Smallest Intersecting Ball of Disjoint Balls. In R. Jain, S. Jain & F. Stephan (Eds.), Theory and Applications of Models of Computation: 12th Annual Conference, TAMC 2015, Singapore, May 18-20, 2015, Proceedings (pp. 189-199 ). Springer VS. https://doi.org/10.1007/978-3-319-17142-5
Brodal, G. S., Nielsen, J. A. S. & Truelsen, J. (2015). Strictly Implicit Priority Queues: On the Number of Moves and Worst-Case Time. In F. Dehne, J.-R. Sack & U. Stege (Eds.), Algorithms and Data Structures: 14th International Symposium, WADS 2015, Proceedings (pp. 91-102). Springer VS. https://doi.org/10.1007/978-3-319-21840-3_8
Adamsen, C. Q., Møller, A. & Mezzetti, G. (2015). Systematic Execution of Android Test Suites in Adverse Conditions. In Proceedings of the 2015 International Symposium on Software Testing and Analysis, ISSTA '15 (pp. 83-93 ). Association for Computing Machinery. https://doi.org/10.1145/2771783.2771786
Schmidt, A., Kleemann, M., Merritt, T. & Selker, T. (2015). Tactile Communication in Extreme Contexts: Exploring the Design Space Through Kiteboarding. In J. Abascal, S. Barbosa, M. Fetter, T. Gross, P. Palanque & M. Winckler (Eds.), Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part IV (pp. 37-54). Springer. https://doi.org/10.1007/978-3-319-22723-8_4
Nielsen, J. B. (2015). Tamper and leakage resilient von Neumann architectures from continuous non-malleable codes. In S. Wolf & A. Lehmann (Eds.), 8th International Conference on Information Theoretic Security, ICITS 2015 (Vol. 9063, pp. XI-XII). Springer.
Aziz, H., Branzei, S., Filos-Ratsikas, A. & Frederiksen, S. K. S. (2015). The Adjusted Winner Procedure: Characterizations and Equilibria. Paper presented at International Joint Conference on Artificial Intelligence, Buinos Aires, Argentina.
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2015). The Chaining Lemma and its application. In A. Lehmann & S. Wolf (Eds.), Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (pp. 181-196). Springer VS. https://doi.org/10.1007/978-3-319-17470-9_11
Gambs, S., Ranellucci, S. & Tapp, A. (2015). The crypto-democracy and the trustworthy (position paper). In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (Vol. 8872, pp. 58-76). Springer VS. https://doi.org/10.1007/978-3-319-17016-9_5
Fuchsberger, V., Murer, M., Tscheligi, M., Lindtner, S., Reiter, A., Bardzell, S., Bardzell, J. & Bjørn, P. (2015). The Future of Making: Where Industrial and Personal Fabrication Meet. Aarhus Series on Human Centered Computing, 1(1). http://ojs.statsbiblioteket.dk/index.php/ashcc/article/view/21394/18857
Faist, P., Dupont-Dupuis, F., Oppenheim, J. & Renner, R. (2015). The minimal work cost of information processing. Nature Communications, 6, Article 7669. https://doi.org/10.1038/ncomms8669
Chou, T. & Orlandi, C. (2015). The simplest protocol for oblivious transfer. In K. Lauter & F. Rodríguez-Henríquez (Eds.), Progress in Cryptology - LATINCRYPT 2015: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings (Vol. 9230, pp. 40-58). Springer. https://doi.org/10.1007/978-3-319-22174-8_3
Pettie, S. (2015). Three generalizations of Davenport-Schinzel sequences. S I A M Journal on Discrete Mathematics, 29(4), 2189-2238. https://doi.org/10.1137/140968574
Larsen, K. G., Nelson, J. & Nguyen, H. L. (2015). Time Lower Bounds for Nonadaptive Turnstile Streaming Algorithms. In R. Servedio & R. Rubinfeld (Eds.), Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC '15 (pp. 803-812). Association for Computing Machinery. https://doi.org/10.1145/2746539.2746542
Brewer, R. S., Verdezoto, N., Holst, T. & Rasmussen, M. K. (2015). Tough Shift: Exploring the Complexities of Shifting Residential Electricity Use Through a Casual Mobile Game. In CHI PLAY '15 : Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play (pp. 307-317). Association for Computing Machinery. https://doi.org/10.1145/2793107.2793108
Yang, B., Guo, C., Ma, Y. & Jensen, C. S. (2015). Toward personalized, context-aware routing. V L D B Journal, 24(2), 297-318. https://doi.org/10.1007/s00778-015-0378-1
Saad-Sulonen, J. & Korsgaard, H. (2015). Towards a concept of community artifact ecology in HCI?. Paper presented at CHI, Seoul, Korea, Republic of.
Nielsen, M. & Grønbæk, K. (2015). Towards highly affine visualizations of consumption data from buildings. In IVAPP 2015 - 6th International Conference on Information Visualization Theory and Applications; VISIGRAPP, Proceedings (pp. 247-255). SCITEPRESS Digital Library.
Prentow, T. S., Blunck, H., Kjærgaard, M. B. & Stisen, A. (2015). Towards Indoor Transportation Mode Detection using Mobile Sensing. In S. Sigg , P. Nurmi & F. Salim (Eds.), Mobile Computing, Applications, and Services : 7th International Conference, MobiCASE 2015, Berlin, Germany, November 12-13, 2015, Revised Selected Papers (Vol. 162). Springer. https://doi.org/10.1007/978-3-319-29003-4
Blevis, E., Koskinen, I. K., Lee, K.-P., Bødker, S., Chen, L.-L., Lim, Y., Wei, H. & Wakkary, R. (2015). Transdisciplinary Interaction Design in Design Education. In B. Begole & J. Kim (Eds.), Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (pp. 833-838). Association for Computing Machinery. https://doi.org/10.1145/2702613.2724726
Derczynski, L., Chester, S. & Bøgh, K. S. (2015). Tune Your Brown Clustering, Please. In G. A. Angelova, K. Bontcheva & R. Mitkov (Eds.), International Conference Recent Advances in Natural Language Processing ’2015 Proceedings (pp. 110–117). INCOMA Ltd. http://lml.bas.bg/ranlp2015/docs/RANLP_main.pdf
Garg, S. & Polychroniadou, A. (2015). Two-round adaptively secure MPC from indistinguishability obfuscation. In Y. Dodis & J. Buus Nielsen (Eds.), Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (pp. 614-637). Springer VS. https://doi.org/10.1007/978-3-662-46497-7_24
David, B. M., Dowsley, R., van der Graaf, J., Marques, D., Nascimento, A. C. A. & Pinto, A. (2015). Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra. I E E E Transactions on Information Forensics and Security, 11(1), 59 - 73 . https://doi.org/10.1109/TIFS.2015.2476783
Saad-Sulonen, J., Halskov, K., Eriksson, E., Vines, J., Huybrechts, L. & Karasti, T. H. (2015). Unfolding Participation: What do we mean by participation – conceptually and in practice. Aarhus Series on Human Centered Computing , 1(1). https://doi.org/10.7146/aahcc.v1i1.21324
de Montjoye, Y.-A., Radaelli, L., Singh, V. K. & Pentland, A. S. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 347(6221), 536-539. https://doi.org/10.1126/science.1256297
Branzei, S. & Procaccia, A. D. (2015). Verifiably Truthful Mechanisms. In T. Roughgarden (Ed.), Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS '15 (pp. 297-306 ). Association for Computing Machinery. https://doi.org/10.1145/2688073.2688098
Christensen, L. R. & Bertelsen, O. W. (2015). View of Causation for CSCW: Manipulation and Control in the Material Field of Work. In V. Wulf, K. Schmidt & D. Randall (Eds.), Designing Socially Embedded Technologies in the Real-World, Part II (pp. 151-169). Springer. https://doi.org/10.1007/978-1-4471-6720-4_8
Klokmose, C. N., Eagan, J. R., Baader, S., Mackay, W. & Beaudouin-Lafon, M. (2015). Webstrates: Shareable Dynamic Media. In UIST'15 Proceedings of the 28th annual ACM symposium on User interface software and technology (UIST '15) Association for Computing Machinery. https://doi.org/10.1145/2807442.2807446
Hornbæk, K., Oulasvirta, A., Reeves, S. & Bødker, S. (2015). What to Study in HCI? In B. Begole & J. Kim (Eds.), Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (pp. 2385-2388). Association for Computing Machinery. https://doi.org/10.1145/2702613.2702648