Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Christensen, P. K., Skovgaard, C. Ø. & Petersen, M. G. (2019). Together together: Combining shared and separate activities in designing technology for family life. In Proceedings of the 18th ACM International Conference on Interaction Design and Children, IDC 2019 (pp. 374-385). Association for Computing Machinery. https://doi.org/10.1145/3311927.3323141
Pagnin, E., Gunnarsson, G., Talebi, P., Orlandi, C. & Sabelfeld, A. (2019). TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing. Proceedings on Privacy Enhancing Technologies, 2019(4), 93-111. https://doi.org/10.2478/popets-2019-0060
Thiel, S.-K., Remy, C., Roque, L., Orji, R., Dalsgaard, P., Latulipe, C. & Sarcar, S. (2019). Towards a Research Agenda for Gameful Creativity. In DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (pp. 393-396). Association for Computing Machinery. https://doi.org/10.1145/3301019.3320003
Li, Y., Tan, T. & Xue, J. (2019). Understanding and analyzing Java reflection. ACM Transactions on Software Engineering and Methodology, 28(2), Article 7. https://doi.org/10.1145/3295739
Van Oosterhout, A. (2019). Understanding the benefits and drawbacks of shape change in contrast or addition to other modalities. In DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (pp. 113-116). Association for Computing Machinery. https://doi.org/10.1145/3301019.3324875
Bardam, S. K., Mathisen, A., Rädle, R., Klokmose, C. N. & Elmqvist, N. (2019). Vistrates: A Component Model for Ubiquitous Analytics. IEEE Transactions on Visualization and Computer Graphics, 25(1), 586-596. Article 8440803. https://doi.org/10.1109/TVCG.2018.2865144
Horak, T., Mathisen, A., Klokmose, C. N., Dachselt, R. & Elmqvist, N. (2019). Vistribute: Distributing Interactive Visualizations in Dynamic Multi-Device Setups. In CHI 2019 - Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems Article 616 Association for Computing Machinery. https://doi.org/10.1145/3290605.3300846
David, B., Dowsley, R. & Larangeira, M. (2018). 21 - Bringing down the complexity: Fast composable protocols for card games without secret state. In W. Susilo & G. Yang (Eds.), Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings (pp. 45-63). Springer. https://doi.org/10.1007/978-3-319-93638-3_4
Jordan, V. E., Walker, J. A., Beckstrom, T. O., Steely, C. J., McDaniel, C. L., St Romain, C. P., The Baboon Genome Analysis Consortium, Worley, K. C., Phillips-Conroy, J., Jolly, C. J., Rogers, J., Konkel, M. K. & Batzer, M. A. (2018). A computational reconstruction of Papio phylogeny using Alu insertion polymorphisms. Mobile DNA, 9(1), Article 13. https://doi.org/10.1186/s13100-018-0118-3
Bertelsen, O. W. (2018). Against Boredom: The Demonic Pantheism in Design. In J. Bardzell, S. Berdzell & M. Blythe (Eds.), Critical Theory and Interaction Design (pp. 81-94). MIT Press.
Timany, A., Stefanesco, L., Krogh-Jespersen, M. & Birkedal, L. (2018). A Logical Relation for Monadic Encapsulation of State: Proving contextual equivalences in the presence of runST. In Proceedings of the ACM on Programming Languages (Vol. 2, pp. 64:00-64:28). Association for Computing Machinery. https://doi.org/10.1145/3158152
Afshani, P., De Berg, M., Casanova, H., Karsin, B., Lambrechts, C., Sitchinava, N. & Tsirogiannis, C. (2018). An efficient algorithm for the 1D total visibility-index problem and its parallelization. ACM Journal of Experimental Algorithmics, 23, Article 2.3. https://doi.org/10.1145/3209685
Jensen, M. M. & Aagaard, J. (2018). A Postphenomenological Method for HCI Research. In Proceedings of the 30th Australian Computer-Human Interaction Conference, OzCHI 2018: OzCHI 2018 (pp. 242-251). Association for Computing Machinery. https://doi.org/10.1145/3292147.3292170
Angelini, M., Santucci, G., Schumann, H. & Schulz, H.-J. (2018). A Review and Characterization of Progressive Visual Analytics. Informatics, 5(3), Article 31. https://doi.org/10.3390/informatics5030031
Badertscher, C., Garay, J., Maurer, U., Tschudi, D. & Zikas, V. (2018). But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin. In J. Buus Nielsen (Ed.), Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings (Vol. 10821, pp. 34-65). Springer VS. https://doi.org/10.1007/978-3-319-78375-8_2
Dalskov, A. P. K. & Orlandi, C. (2018). Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security. In J. Kim, G.-J. Ahn & S. Kim (Eds.), ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security (pp. 343-355). Association for Computing Machinery. https://doi.org/10.1145/3196494.3196547
Mathisen, A. & Grønbæk, K. (2018). Clear Visual Separation of Temporal Event Sequences. In 2017 IEEE Visualization in Data Science, VDS 2017 (pp. 7-14). Article 8573439 IEEE. https://doi.org/10.1109/VDS.2017.8573439
Ciampi, M. & Orlandi, C. (2018). Combining Private Set-Intersection with Secure Two-Party Computation. In D. Catalano & R. De Prisco (Eds.), Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings (Vol. 11035, pp. 464-482). Springer VS. https://doi.org/10.1007/978-3-319-98113-0
Dowsley, R., Lacerda, F. & Nascimento, A. C. A. (2018). Commitment and Oblivious Transfer in the Bounded Storage Model with Errors. IEEE Transactions on Information Theory, 64(8), 5970-5984. https://doi.org/10.1109/TIT.2018.2796128
Damgård, I., Luo, J., Oechsner, S., Scholl, P. & Simkin, M. (2018). Compact Zero-Knowledge Proofs of Small Hamming Weight. In M. Abdalla & R. Dahab (Eds.), Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Vol. 10770, pp. 530-560). Springer VS. https://doi.org/10.1007/978-3-319-76581-5_18
Karbyshev, A., Svendsen, K., Askarov, A. & Birkedal, L. (2018). Compositional Non-interference for Concurrent Programs via Separation and Framing. In L. Bauer & R. Küsters (Eds.), Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Vol. 10804, pp. 53-78). Springer VS. https://doi.org/10.1007/978-3-319-89722-6_3
Hansen, K. A. & Lund, T. B. (2018). Computational Complexity of Proper Equilibrium. In É. Tardos, E. Elkind & R. Vohra (Eds.), ACM EC 2018 - Proceedings of the 2018 ACM Conference on Economics and Computation (pp. 113-130). Association for Computing Machinery. https://doi.org/10.1145/3219166.3219199
Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018). Computer-Aided Proofs for Multiparty Computation with Active Security. In Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Vol. 2018, pp. 119-131). Article 8429300 IEEE. https://doi.org/10.1109/CSF.2018.00016
Arge, L., Shin, Y. & Tsirogiannis, C. (2018). Computing Floods Caused by Non-Uniform Sea-Level Rise. In R. Pagh & S. Venkatasubramanian (Eds.), 2018 Proceedings of the 20th Workshop on Algorithm Engineering and Experiments, ALENEX 2018 (pp. 97-108). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611975055.9
Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E. (2018). Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). In T. Peyrin & S. Galbraith (Eds.), Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. 11274, pp. 86-117). Springer VS. https://doi.org/10.1007/978-3-030-03332-3_4
Faonio, A., Nielsen, J. B., Simkin, M. & Venturi, D. (2018). Continuously Non-malleable Codes with Split-State Refresh. In B. Preneel & F. Vercauteren (Eds.), Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Vol. 10892, pp. 121-139). Springer VS. https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Kazana, T., Obremski, M., Raj, V. & Siniscalchi, L. (2018). Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. In A. Beimel & S. Dziembowski (Eds.), Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Vol. 11240, pp. 225-254). Springer VS. https://doi.org/10.1007/978-3-030-03810-6_9
Larsen, K. G., Weinstein, O. & Yu, H. (2018). Crossing the Logarithmic Barrier for Dynamic Boolean Data Structure Lower Bounds. In M. Henzinger, D. Kempe & I. Diakonikolas (Eds.), STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing (pp. 978-989). Association for Computing Machinery. https://doi.org/10.1145/3188745.3188790
Christensen, H. B. (2018). Crunch: Automated Assessment of Microservice Architecture Assignments with Formative Feedback. In C. E. Cuesta, J. Perez & D. Garlan (Eds.), Software Architecture - 12th European Conference on Software Architecture, ECSA 2018, Proceedings: 12th European Conference on Software Architecture, ECSA 2018 (Vol. 11048, pp. 175-190). Springer. https://doi.org/10.1007/978-3-030-00761-4_12
Lissandrini, M., Mottin, D., Palpanas, T. & Velegrakis, Y. (2018). Data Exploration using Example-based Methods. Morgan & Claypool Publishers. Synthesis Lectures on Data Management https://doi.org/10.2200/S00881ED1V01Y201810DTM053
Knudsen, S., Vermeulen, J., Kosminsky, D., Walny, J., West, M., Frisson, C., Adriel Aseniero, B., MacDonald Vermeulen, L., Perin, C., Quach, L., Buk, P., Tabuli, K., Chopra, S., Willett, W. & Carpendale, S. (2018). Democratizing Open Energy Data for Public Discourse Using Visualization. In R. Mandryk & M. Hancock (Eds.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (pp. D406:1-D406:4). Association for Computing Machinery. https://doi.org/10.1145/3170427.3186539