Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Larsen, K. G., Simkin, M. & Yeo, K. (2020). Lower Bounds for Multi-server Oblivious RAMs. In R. Pass & K. Pietrzak (Eds.), Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings (pp. 486-503). Springer. https://doi.org/10.1007/978-3-030-64375-1_17
Larsen, K. G., Malkin, T., Weinstein, O. & Yeo, K. (2020). Lower Bounds for Oblivious Near-Neighbor Search. In S. Chawla (Ed.), SODA '20: Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms (pp. 1116-1134). Society for Industrial and Applied Mathematics. https://doi.org/10.5555/3381089.3381157
Blundo, C., Cimato, S. & Siniscalchi, L. (2020). Managing Constraints in Role Based Access Control. IEEE Access, 8, 140497-140511. Article 9146129. https://doi.org/10.1109/ACCESS.2020.3011310
Grønlund, A., Kamma, L. & Larsen, K. G. (2020). Margins are Insufficient for Explaining Gradient Boosting. In H. Larochelle, MA. Ranzato, R. Hadsell, M.-F. Balcan & H.-T. Lin (Eds.), Advances in Neural Information Processing Systems 33 (NeurIPS 2020) (Vol. 2020-December) https://proceedings.neurips.cc/paper/2020/hash/146f7dd4c91bc9d80cf4458ad6d6cd1b-Abstract.html
Deuber, D., Döttling, N., Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020). Minting Mechanism for Proof of Stake Blockchains. In M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (Eds.), Applied Cryptography and Network Security (pp. 315-334). Springer. https://doi.org/10.1007/978-3-030-57808-4_16
Birkedal, L., Clouston, R., Mannaa, B., Ejlers Møgelberg, R., Pitts, A. M. & Spitters, B. (2020). Modal dependent type theory and dependent right adjoints. Mathematical Structures in Computer Science, 30(2), 118-138. https://doi.org/10.1017/S0960129519000197
Rijke, E., Shulman, M. & Spitters, B. (2020). Modalities in homotopy type theory. Logical Methods in Computer Science, 16(1), 2:1-2:79. https://doi.org/10.23638/LMCS-16(1:2)2020
Ramirez Gomez, A. & Gellersen, H. (2020). More than Looking: Using Eye Movements Behind the Eyelids as a New Game Mechanic. In CHI PLAY '20: Proceedings of the Annual Symposium on Computer-Human Interaction in Play (pp. 362-373). Association for Computing Machinery. https://doi.org/10.1145/3410404.3414240
Larsen-Ledet, I. (2020). More Than Writing Text: Multiplicity in Collaborative Academic Writing. [PhD dissertation, Aarhus University]. Aarhus Universitet.
Clarke, C., Ehrich, P. & Gellersen, H. (2020). Motion Coupling of Earable Devices in Camera View. In J. Cauchard & M. Lochtefeld (Eds.), MUM 2020 - 19th International Conference on Mobile and Ubiquitous Multimedia, Proceedings (pp. 13-17). Association for Computing Machinery. https://doi.org/10.1145/3428361.3428470
Gratzer, D., Kavvos, G. A., Nuyts, A. & Birkedal, L. (2020). Multimodal Dependent Type Theory. In Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2020 (pp. 492-506). Article 3394736 Association for Computing Machinery. https://doi.org/10.1145/3373718.3394736
Grønlund, A., Kamma, L. & Larsen, K. G. (2020). Near-Tight Margin-Based Generalization Bounds for Support Vector Machines. In H. Daumé III & A. Singh (Eds.), International Conference on Machine Learning (pp. 3737-3746). MLResearch Press. http://proceedings.mlr.press/v119/gronlund20a.html
Endo, A. T. & Møller, A. (2020). NodeRacer: Event Race Detection for Node.js Applications. In 2020 IEEE 13th International Conference on Software Testing, Verification and Validation, ICST 2020: Proceedings (pp. 120-130). Article 9159075 IEEE. https://doi.org/10.1109/ICST46399.2020.00022
Brian, G., Faonio, A., Obremski, M., Simkin, M. & Venturi, D. (2020). Non-malleable secret sharing against bounded joint-tampering attacks in the plain model. In D. Micciancio & T. Ristenpart (Eds.), Advances in Cryptology - CRYPTO 2020 (pp. 127-155). Springer. https://doi.org/10.1007/978-3-030-56877-1_5
Logins, A., Li, Y. & Karras, P. (2020). On the Robustness of Cascade Diffusion under Node Attacks. In The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020: Proceedings of the Web Conference 2020 (pp. 2711–2717). Association for Computing Machinery. https://doi.org/10.1145/3366423.3380028
Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R. & Pavlogiannis, A. (2020). Optimal and Perfectly Parallel Algorithms for On-demand Data-Flow Analysis. In P. Müller (Ed.), Programming Languages and Systems- 29th European Symposium on Programming, ESOP 2020 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings (pp. 112-140). Springer. https://doi.org/10.1007/978-3-030-44914-8_5
Larsen, K. G., Mitzenmacher, M. & Tsourakakis, C. E. (2020). Optimal Learning of Joint Alignments with a Faulty Oracle. In 2020 IEEE International Symposium on Information Theory, ISIT 2020 (pp. 2492-2497). IEEE. https://doi.org/10.1109/ISIT44484.2020.9174310
Brandt, M., Orlandi, C., Shrishak, K. & Shulman, H. (2020). Optimal Transport Layer for Secure Computation. In P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (Eds.), ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Vol. Volume 3: SECRYPT, pp. 130-141). SCITEPRESS Digital Library. https://doi.org/10.5220/0009826801300141
Sidenmark, L., Clarke, C., Zhang, X., Phu, J. & Gellersen, H. (2020). Outline Pursuits: Gaze-assisted Selection of Occluded Objects in Virtual Reality. In CHI 2020 - Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Article 3376438 Association for Computing Machinery. https://doi.org/10.1145/3313831.3376438
Baum, C., Frederiksen, T. K., Hesse, J., Lehmann, A. & Yanai, A. (2020). Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. In Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 (pp. 587-606). Article 9230400 IEEE. https://doi.org/10.1109/EuroSP48549.2020.00044
Andersen, R. F., Byriel, L., Fernebro, E., Jakobsen, A., Lindebjerg, J., Nottelmann, L., Ploen, J., Hansen, T. F. & Jensen, L. H. (2020). Phase II study of gemcitabine, oxaliplatin and capecitabine in patients with KRAS exon 2 mutated biliary tract cancers. Acta oncologica (Stockholm, Sweden), 59(3), 298-301. https://doi.org/10.1080/0284186X.2019.1701201
Madsen, M. & Pol, J. V. D. (2020). Polymorphic types and effects with Boolean unification. In Proceedings of the ACM on Programming Languages (OOPSLA ed., Vol. 4). Association for Computing Machinery. https://doi.org/10.1145/3428222
Pavlogiannis, A., Schaumberger, N., Schmid, U. & Chatterjee, K. (2020). Precedence-Aware Automated Competitive Analysis of Real-Time Scheduling. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(11), 3981-3992. Article 9211419. https://doi.org/10.1109/TCAD.2020.3012803
Loeschcke, S. B., Hogräfer, M. & Schulz, H.-J. (2020). Progressive Parameter Space Visualization for Task-Driven SAX Configuration. In K. Vrotsou & C. Turkay (Eds.), EuroVA 2020 - EuroVis Workshop on Visual Analytics (pp. 43-47). European Association for Computer Graphics. https://doi.org/10.2312/eurova.20201085
Kannabiran, G. & Bødker, S. (2020). Prototypes as Objects of Desire. In DIS 2020 - Proceedings of the 2020 ACM Designing Interactive Systems Conference (pp. 1619-1631). Association for Computing Machinery. https://doi.org/10.1145/3357236.3395487
Grønbæk, J. E., Knudsen, M., O'Hara, K., Krogh, P. G., Vermeulen, J. & Petersen, M. G. (2020). Proxemics Beyond Proximity: Designing for Flexible Social Interaction Through Cross-Device Interaction. In CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Article 3376379 Association for Computing Machinery. https://doi.org/10.1145/3313831.3376379
Hansen, K. A. & Sølvsten, S. C. (2020). ∃R-completeness of stationary nash equilibria in perfect information stochastic games. In J. Esparza & D. Král (Eds.), 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020 (pp. 45:1-45:15). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.MFCS.2020.45
Cavassim, M. I. A. (2020). Recombination and horizontal gene transfer through the lens of phylogenomics. [PhD dissertation, Aarhus University]. Aarhus Universitet.
Bay, J. & Askarov, A. (2020). Reconciling progress-insensitive noninterference and declassification. In 2020 IEEE 33rd Computer Security Foundations Symposium (CSF) (pp. 95-106). IEEE. https://doi.org/10.1109/CSF49147.2020.00015
Rossitto, C., Lampinen, A., Bødker, S., Light, A., Berns, K. & Hui, J. (2020). Reconsidering scale and scaling in CSCW research. In CSCW '20 : Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing (pp. 493-501). Association for Computing Machinery. https://doi.org/10.1145/3406865.3419409
van Oosterhout, A. & Hoggan, E. (2020). Reshaping Interaction with Rotary Knobs: Combining Form, Feel and Function. In DIS 2020 - Proceedings of the 2020 ACM Designing Interactive Systems Conference (pp. 1973-1982). Association for Computing Machinery. https://doi.org/10.1145/3357236.3395536
Logins, A. (2020). Resource Allocation in Networks. [PhD dissertation, Aarhus University]. Aarhus Universitet.
Grønbæk, J. E. (2020). Rethinking Proxemics: Designing Interactive Technologies for Co-located Collaboration. [PhD dissertation, Aarhus University]. Aarhus Universitet.
Chakraborty, S., Dziembowski, S. & Nielsen, J. B. (2020). Reverse firewalls for actively secure mpcs. In D. Micciancio & T. Ristenpart (Eds.), Advances in Cryptology - CRYPTO 2020 (pp. 732-762). Springer. https://doi.org/10.1007/978-3-030-56880-1_26
Zardbani, F., Afshani, P. & Karras, P. (2020). Revisiting the theory and practice of database cracking. In A. Bonifati, Y. Zhou, M. A. Vaz Salles, A. Bohm, D. Olteanu, G. Fletcher, A. Khan & B. Yang (Eds.), Advances in Database Technology - EDBT 2020: 23rd International Conference on Extending Database Technology, Proceedings (pp. 415-418). openproceedings.org. https://doi.org/10.5441/002/edbt.2020.46
Arge, L., Rav, M., Revsbæk, M., Shin, Y. & Yang, J. (2020). Sea-rise flooding on massive dynamic terrains. In S. Albers (Ed.), 17th Scandinavian Symposium and Workshops on Algorithm Theory, SWAT 2020 (pp. 6:1-6:19). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.SWAT.2020.6
Larsen, K. G. & Simkin, M. (2020). Secret sharing lower bound: Either reconstruction is hard or shares are long. In C. Galdi & V. Kolesnikov (Eds.), Security and Cryptography for Networks (pp. 566-578). Springer. https://doi.org/10.1007/978-3-030-57990-6_28
Dalskov, A. P. K., Escudero Ospina, D. E. & Keller, M. (2020). Secure Evaluation of Quantized Neural Networks. Proceedings on Privacy Enhancing Technologies, 2020(4), 355-375. https://doi.org/10.2478/popets-2020-0077
Lucani Rötter, D. E., Nielsen, L., Orlandi, C., Pagnin, E. & Vestergaard, R. (2020). Secure generalized deduplication via multi-key revealing encryption. In C. Galdi & V. Kolesnikov (Eds.), Security and Cryptography for Networks (pp. 298-318). Springer. https://doi.org/10.1007/978-3-030-57990-6_15
Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020). Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. In L. Chen, S. Schneider, N. Li & K. Liang (Eds.), European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Vol. I, pp. 654-673). Springer. https://doi.org/10.1007/978-3-030-59013-0_32
Aranha, D. F., Orlandi, C., Takahashi, A. & Zaverucha, G. (2020). Security of Hedged Fiat–Shamir Signatures under Fault Attacks. In A. Canteaut & Y. Ishai (Eds.), Advances in Cryptology – EUROCRYPT 2020 (pp. 644-674). Springer. https://doi.org/10.1007/978-3-030-45721-1_23
Khurana, A., Logins, A. & Karras, P. (2020). Selecting Influential Features by a Learnable Content-Aware Linear Threshold Model. In CIKM '20: Proceedings of the 29th ACM International Conference on Information & Knowledge Management (pp. 635-644). Association for Computing Machinery. https://doi.org/10.1145/3340531.3411886
Neerbek, J. (2020). Sensitive Information Detection: Recursive Neural Networks for Encoding Context. [PhD dissertation, Aarhus University]. Aarhus Universitet.