Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Verdezoto, N. (2015). Exploring Challenges and Opportunities for Eco-Feedback Technology. Paper presented at Workshop on Expanding the Boundaries: A SIGCHI HCI & Sustainability , Seoul, Korea, Republic of. http://wp.lancs.ac.uk/chi15sust/files/2015/04/pp_verdezoto.pdf
Wilkinson, B. T. (2015). Exploring the Problem Space of Orthogonal Range Searching. Department of Computer Science, Aarhus University.
Zhang, Y., Chong, M. K., Müller, J., Bulling, A. & Gellersen, H. (2015). Eye tracking for public displays in the wild. Personal and Ubiquitous Computing, 19(5-6), 967-981. https://doi.org/10.1007/s00779-015-0866-8
Filos-Ratsikas, A., Li, M., Zhang, J. & Zhang, Q. (2015). Facility Location with Double-peaked Preferences. In Proceedings of the 29th International AAAI Conference on Artificial Intelligence, and the 27th Innovative Applications of Artificial Intelligence Conference, vol. 2 (pp. 893-899). AAAI Press. http://www.aaai.org/ocs/index.php/AAAI/AAAI15/paper/view/9379/9385
de Berg, M., Tsirogiannis, C. & Wilkinson, B. T. (2015). Fast computation of categorical richness on raster data sets and related problems. In GIS '15: Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems Article 18 https://doi.org/10.1145/2820783.2820825
de Berg, M., Tsirogiannis, C. & Wilkinson, B. (2015). Fast Computation of Categorical Richness on Raster Data Sets and Related Problems. In Proceedings. Workshop on Massive Data Algorithmics (MASSIVE) (pp. 86-107)
Donnez, J., Dolmans, M.-M., Pellicer, A., Diaz-Garcia, C., Ernst, E., Macklon, K. T. & Andersen, C. Y. (2015). Fertility preservation for age-related fertility decline. Lancet, 385(9967), 506-7. https://doi.org/10.1016/S0140-6736(15)60198-2
Bertelsen, O. W., Halskov, K., Bardzell, S. (Ed.), Bødker, S. (Ed.), Iversen, O. S. (Ed.), Klokmose, C. N. (Ed.) & Korsgaard, H. (Ed.) (2015). Foreword. In Critical Alternatives: Proceedings of The Fifth Decennial Aarhus Conference 17- 21 August 2015, Aarhus, Denmark (pp. ii). Department of Computer Science, Aarhus University. http://cs.au.dk/~hko/Aarhus2015ProceedingsVolumeI.pdf
Petersen, M. G., Rasmussen, M. K. & Jakobsen, K. (2015). Framing open-ended and constructive play with emerging interactive materials. In Proceedings of the 14th International Conference on Interaction Design and Children , IDC '15 (pp. 150-159 ). Association for Computing Machinery. https://doi.org/10.1145/2771839.2771855
Durkota, K., Lisy, V., Kiekintveld, C. & Bosansky, B. (2015). Game-Theoretic Algorithms for Optimal Nework Security Hardening Using Attack Graphs. Abstract from International Conference on Autonomous Agents and Multiagent Systems, Istanbul, Turkey. http://www.aamas2015.com/en/AAMAS_2015_USB/aamas/p1773.pdf
Miruchna , V., Walter , R., Lindlbauer , D., Lehmann , M., Klitzing, R. V. & Müller, J. (2015). GelTouch: Localized Tactile Feedback Through Thin, Programmable Gel. In UIST '15 Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology (pp. 3-10 ). Association for Computing Machinery. https://doi.org/10.1145/2807442.2807487
David, B. M., Nishimaki, R., Ranellucci, S. & Tapp, A. (2015). Generalizing Efficient Multiparty Computation. In A. Lehmann & S. Wolf (Eds.), Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (pp. 15-32 ). Springer VS. https://doi.org/10.1007/978-3-319-17470-9_2
Döttling, N., Kraschewski, D., Müller-Quade, J. & Nilges, T. (2015). General statistically secure computation with bounded-resettable hardware tokens. In Y. Dodis & J. Buus Nielsen (Eds.), Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I (pp. 319-344). Springer VS. https://doi.org/10.1007/978-3-662-46494-6_14
Son, W., Bae, S. W. & Ahn, H. K. (2015). Group nearest neighbor queries in the L1 plane. Theoretical Computer Science, 592, 39–48. https://doi.org/10.1016/j.tcs.2015.05.011
Bizjak, A., Grathwohl, H. B., Clouston, R., Birkedal, L. & Møgelberg, R. E. (2015). Guarded dependent type theory with coinductive types. In Foundations of Software Science and Computation Structures Springer. https://doi.org/10.1007/978-3-662-49630-5_2
Hansen, T. D., Kaplan, H., Tarjan, R. E. & Zwick, U. (2015). Hollow Heaps. In M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (Eds.), Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Vol. Part 1, pp. 689-700). Springer VS. https://doi.org/10.1007/978-3-662-47672-7_56
Bardzell, J. & Bardzell, S. (2015). Humanistic HCI. Synthesis Lectures on Human-Centered Informatics https://doi.org/10.2200/S00664ED1V01Y201508HCI031
Askarov, A., Chong, S. & Mantel, H. A. (2015). Hybrid Monitors for Concurrent Noninterference. In L. Viganò (Ed.), 28th IEEE Computer Security Foundations Symposium CSF 2015 : Proceedings (pp. 137 - 151). IEEE Computer Society Press. https://doi.org/10.1109/CSF.2015.17
Merritt, T. R., Nørgaard, M., Laursen, C., Rasmussen, M. K. & Petersen, M. G. (2015). Imagined Physics: Exploring Examples of Shape-changing Interfaces. In H. Samani (Ed.), Cognitive Robotics (pp. 89-111). CRC Press.
Nielsen, J. A. S. (2015). Implicit Data Structures, Sorting, and Text Indexing. Department of Computer Science, Aarhus University.
Hansen, T. D. & Zwick, U. (2015). Improved Version of the Random-Facet Pivoting Rule for the Simplex Algorithm. In Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC '15 (pp. 209-218 ). Association for Computing Machinery. https://doi.org/10.1145/2746539.2746557
Livshits, B., Sridharan, M., Smaragdakis, Y., Lhoták, O., Amaral, J. N., Chang, B.-Y. E., Guyer, S. Z., Khedker, U. P., Møller, A. & Vardoulakis, D. (2015). In Defense of Soundiness: A Manifesto. Communications of the A C M, 58(2). https://doi.org/10.1145/2644805
Tataru, P. (2015). Inference of population history and patterns from molecular data. Department of Computer Science, Aarhus University.
Arge, L., Rav, M., Raza, S. & Revsbæk, M. (2015). I/O-Efficient Event Based Depression Flood Risk. Paper presented at 7th Workshop on Massive Data Algorithms, Patras, Greece.
Jung, R., Swasey, D., Sieczkowski, F., Svendsen, K., Turon, A., Birkedal, L. & Dreyer, D. (2015). Iris: Monoids and invariants as an orthogonal basis for concurrent reasoning. In S. Rajamani (Ed.), Conference Record of the Annual ACM Symposium on Principles of Programming Languages (pp. 637-650). Association for Computing Machinery. https://doi.org/10.1145/2676726.2676980
Jensen, M. M., Rasmussen, M. K., Mueller, F. F. & Grønbæk, K. (2015). Keepin' it Real: Challenges when Designing Sports-Training Games. In B. Begole & J. Kim (Eds.), Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems: CHI '15 (pp. 2003-2012). Association for Computing Machinery. https://doi.org/10.1145/2702123.2702243
Cramer, R., Damgård, I. B., Döttling, N. M., Fehr, S. & Spini, G. (2015). Linear secret sharing schemes from error correcting codes and universal hash functions. In E. Oswald & M. F. Fischlin (Eds.), Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (pp. 313-336). Springer VS. https://doi.org/10.1007/978-3-662-46803-6_11
Blonder, B., Nogués-Bravo, D., Borregaard, M. K., Donoghue II, J. C., Jørgensen, P. M., Kraft, N. J. B., Lessard, J.-P., Morueta-Holme, N., Sandel, B. S., Svenning, J.-C., Violle, C., Rahbek, C. & Enquist, B. J. (2015). Linking environmental filtering and disequilibrium to biogeography with a community climate framework. Ecology, 96(4), 972-985. https://doi.org/10.1890/14-0589.1
Döttling, N. M. (2015). Low noise LPN: KDM secure public key encryption and sample amplification. In J. Katz (Ed.), Public-Key Cryptography -- PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (Vol. 9020, pp. 604-626). Springer VS. https://doi.org/10.1007/978-3-662-46447-2_27
Agarwal, P. K., Mølhave, T., Revsbæk, M., Safa, I., Wang, Y. & Yang, J. (2015). Maintaining Contour Trees of Dynamic Terrains. In L. Arge & J. Pach (Eds.), 31st International Symposium on Computational Geometry (SoCG 2015) (pp. 796-811) https://doi.org/10.4230/LIPIcs.SOCG.2015.796
Prentow, T. S., Thom, A., Blunck, H. & Vahrenhold, J. (2015). Making Sense of Trajectory Data in Indoor Spaces. In Proceedings of the 16th IEEE International Conference on Mobile Data Management, vol.1 (pp. 116-121). IEEE. https://doi.org/10.1109/MDM.2015.44
Bødker, S., Bertelsen, O. W., Bannon, L. J., De Souza, C., Barbosa, S. & Prates, R. (2015). Mediation and Meaning in HCI. In Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part IV (pp. 667-668). Springer. https://doi.org/10.1007/978-3-319-22723-8_93
Koester, T., Jakobsen, J., Brøsted, J. E., Bach, K., Petersen, O. B., Kyng, M. & Rasch, S. M. (2015). Mental Models and Deliberate Manipulation of Data. In Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 2015 (1 ed., Vol. 4, pp. 62-69) https://doi.org/10.1177/2327857915041021
Faonio, A., Nielsen, J. B. & Venturi, D. (2015). Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. In M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (Eds.), Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Vol. Part 1, pp. 456-468). Springer VS. https://doi.org/10.1007/978-3-662-47672-7_37
Sieczkowski, F., Bizjak, A. & Birkedal, L. (2015). ModuRes: A Coq Library for Modular Reasoning About Concurrent Higher-Order Imperative Programming Languages. In C. Urban & X. Zhang (Eds.), Interactive Theorem Proving: 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings (pp. 375-390). Springer. https://doi.org/10.1007/978-3-319-22102-1_25