Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Jensen, M. M., Thiel, S. K., Hoggan, E. & Bødker, S. (2018). Physical Versus Digital Sticky Notes in Collaborative Ideation. Computer Supported Cooperative Work (CSCW): The Journal of Collaborative Computing and Work Practices, 27(3-6), 609-645. https://doi.org/10.1007/s10606-018-9325-1, https://doi.org/10.1007/s10606-018-9325-1
Adamsen, C. Q., Møller, A., Alimadadi, S. & Tip, F. (2018). Practical AJAX Race Detection for JavaScript Web Applications. In G. T. Leavens, A. Garcia & C. S. Păsăreanu (Eds.), ESEC/FSE 2018 - Proceedings of the 2018 26th ACM Joint Meeting on European So ftware Engineering Conference and Symposium on the Foundations of So ftware Engineering (pp. 38-48). Association for Computing Machinery. https://doi.org/10.1145/3236024.3236038
Li, Y., Tan, T., Møller, A. & Smaragdakis, Y. (2018). Precision-Guided Context Sensitivity for Pointer Analysis. Proceedings of the ACM on Programming Languages , 2(OOPSLA), 141:1-141:29. Article 141. https://doi.org/10.1145/3276511
Tsourakakis, C. E., Mitzenmacher, M., Larsen, K. G., Blasiok, J., Lawson, B., Nakkiran, P. & Nakos, V. (2018). Predicting Positive and Negative Links with Noisy Queries: Theory Practice. arxiv.org. http://arxiv.org/abs/1709.07308
Saleem, M. A., Soares da Costa, F., Dolog, P., Karras, P., Pedersen, T. B. & Calders, T. (2018). Predicting Visitors Using Location-Based Social Networks. In Proceedings - 2018 IEEE 19th International Conference on Mobile Data Management, MDM 2018 (pp. 245-250). IEEE. https://doi.org/10.1109/MDM.2018.00043
Faissole, F. & Spitters, B. (2018). Preuves constructives de programmes probabilistes. In Journées Francophones des Langages Applicatifs
Larsen-Ledet, I. (2018). Privacy in Collaborative Work: A Situated Challenge. 1. Abstract from 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018, Montreal, Canada.
Baena, J., Cabarcas, D., Escudero, D. E., Khathuria, K. & Verbel, J. (2018). Rank Analysis of Cubic Multivariate Cryptosystems. In T. Lange & R. Steinwandt (Eds.), Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings (Vol. 10786, pp. 355-374). Springer VS. https://doi.org/10.1007/978-3-319-79063-3_17
Skorstengaard, L., Devriese, D. & Birkedal, L. (2018). Reasoning About a Machine with Local Capabilities: Provably Safe Stack and Return Pointer Management. In A. Ahmed (Ed.), Programming Languages and Systems - 27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Vol. 10801, pp. 475-501). Springer VS. https://doi.org/10.1007/978-3-319-89884-1_17
Aguirre, A., Barthe, G., Birkedal, L., Bizjak, A., Gaboardi, M. & Garg, D. (2018). Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus. In A. Ahmed (Ed.), Programming Languages and Systems - 27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (pp. 214-241). Springer VS. https://doi.org/10.1007/978-3-319-89884-1_8
Frumin, D., Krebbers, R. & Birkedal, L. (2018). ReLoC: A Mechanised Relational Logic for Fine-Grained Concurrency. In Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2018 (pp. 442-451). Association for Computing Machinery. https://doi.org/10.1145/3209108.3209174
Jensen, M. M., Rädle, R., Klokmose, C. N. & Bødker, S. (2018). Remediating a design tool: Implications of digitizing sticky notes. In R. Mandryk & M. Hancock (Eds.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Vol. 2018-April, pp. 1-12). Article 224 Association for Computing Machinery. https://doi.org/10.1145/3173574.3173798
Van Oosterhout, A., Alonso, M. B. & Jumisko-Pyykkö, S. (2018). Ripple thermostat: Affecting the emotional experience through interactive force feedback and shape change. In CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Vol. 2018-April). Association for Computing Machinery. https://doi.org/10.1145/3173574.3174229
San-Segundo, R., Blunck, H., Moreno-Pimentel, J., Stisen, A. & Gil-Martín, M. (2018). Robust Human Activity Recognition using smartwatches and smartphones. Engineering Applications of Artificial Intelligence, 72(6), 190-202. https://doi.org/10.1016/j.engappai.2018.04.002
Li, Y., Tan, T., Møller, A. & Smaragdakis, Y. (2018). Scalability-First Pointer Analysis with Self-Tuning Context-Sensitivity. In G. T. Leavens, A. Garcia & C. S. Păsăreanu (Eds.), ESEC/FSE 2018 - Proceedings of the 2018 26th ACM Joint Meeting on European So ftware Engineering Conference and Symposium on the Foundations of So ftware Engineering (pp. 129-140). Association for Computing Machinery. https://doi.org/10.1145/3236024.3236041
Pham, T., Vermeulen, J., Tang, A. & Vermeulen, L. M. (2018). Scale Impacts Elicited Gestures for Manipulating Holograms: Implications for AR Gesture Design. In Companion Publication of the 2019 on Designing Interactive Systems Conference 2019 Companion (2018 ed., pp. 227-240). Association for Computing Machinery. https://doi.org/10.1145/3196709.3196719
Thomas, V., Brueggemann, M. J., Wang, D., Gaytán-Lugo, L. S. & Bidwell, N. J. (2018). Silent SIG: Reflection in action at CHI. In R. Mandryk, M. Hancock, M. Perry & A. Cox (Eds.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Vol. 2018-April, pp. 1-4). Article SIG16 Association for Computing Machinery. https://doi.org/10.1145/3170427.3185362
Cramer, R., Damgård, I., Escudero, D., Scholl, P. & Xing, C. (2018). SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority. In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology - CRYPTO 2018 (Vol. 10992, pp. 769-798). Springer VS. https://doi.org/10.1007/978-3-319-96881-0_26
Loss, J., Maurer, U. & Tschudi, D. (2018). Strong Separations Between Broadcast and Authenticated Channels. In U. Schmid & J. Widder (Eds.), 32nd International Symposium on Distributed Computing (DISC 2018) (Vol. 121, pp. 36:1-36:17). Article 36 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.DISC.2018.36
Pinder, C., Vermeulen, J. & Cowan, B. R. (2018). Subliminal Semantic Number Processing on Smartphones. In L. Bailie & N. Oliver (Eds.), MobileHCI 2018 - Beyond Mobile: The Next 20 Years - 20th International Conference on Human-Computer Interaction with Mobile Devices and Services, Conference Proceedings (pp. 24:1-24:13). Article a24 Association for Computing Machinery. https://doi.org/10.1145/3229434.3229451
Remy, C., Bates, O., Thomas, V. J. & Broadbent, M. (2018). "Sustainability... it's just not important": The Challenges of Academic Engagement with Diverse Stakeholders. In B. Penzenstadler, S. Easterbrook, C. Venters & S. I. Ahmed (Eds.), ICT4S2018. 5th International Conference on Information and Communication Technology for Sustainability (Vol. 52, pp. 316-331). easychair. https://doi.org/10.29007/kln5
Wang, X., Deng, K., Li, J., Yu, J. X., Jensen, C. S. & Yang, X. (2018). Targeted influence minimization in social networks. In G. I. Webb, D. Phung, M. Ganji, L. Rashidi, V. S. Tseng & B. Ho (Eds.), Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings (pp. 689-700). Springer. https://doi.org/10.1007/978-3-319-93040-4_54
Hansen, K. A., Ibsen-Jensen, R. & Neyman, A. (2018). The Big Match with a Clock and a Bit of Memory. In É. Tardos, E. Elkind & R. Vohra (Eds.), ACM EC 2018 - Proceedings of the 2018 ACM Conference on Economics and Computation (pp. 149-150). Association for Computing Machinery. https://doi.org/10.1145/3219166.3219198
Jensen, C. (Ed.), Lind Olsen, E. (Ed.), Mikkelsen, G. L., Syberg , L., Nielsen, L. L., Hansen, M. A. E., Hjortlund, M., Madsen, O. L., Høngaard Andersen, P. & Duvold, T. (2018). The future market for cybersecurity in Denmark.
Bates, O., Thomas, V., Remy, C., Nathan, L. P., Mann, S. & Friday, A. (2018). The future of HCI and sustainability: Championing environmental and social justice. In R. Mandryk & M. Hancock (Eds.), CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Vol. 2018-April). Article SIG01 Association for Computing Machinery. https://doi.org/10.1145/3170427.3185365
Madsen, O. L. & Møller-Pedersen, B. (2018). This is not a Model: On development of a common terminology for modeling and programming. In T. Margaria & B. Steffen (Eds.), Leveraging applications of formal methods, verification and validation (Vol. I, pp. 206-224). Springer. https://doi.org/10.1007/978-3-030-03418-4_13
Chakraborty, D., Kamma, L. & Larsen, K. G. (2018). Tight cell probe bounds for succinct boolean matrix-Vector multiplication. In STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing (pp. 1297-1306). Association for Computing Machinery. https://doi.org/10.1145/3188745.3188830
Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E. (2018). TinyKeys: A New Approach to Efficient Multi-Party Computation. In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Vol. 10993, pp. 3-33). Springer VS. https://doi.org/10.1007/978-3-319-96878-0_1
LaVigne, R., Liu-Zhang, C.-D., Maurer, U. M., Moran, T., Mularczyk, M. & Tschudi, D. (2018). Topology-Hiding Computation Beyond Semi-Honest Adversaries. In A. Beimel & S. Dziembowski (Eds.), Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings: Theory of Cryptography (Vol. 11240, pp. 3-35). Springer VS. https://doi.org/10.1007/978-3-030-03810-6_1
Baum, C., Lin, H. & Oechsner, S. (2018). Towards Practical Lattice-Based One-Time Linkable Ring Signatures. In D. Naccache, S. Xu, S. Qing, P. Samarati, G. Blanc, R. Lu, Z. Zhang & A. Meddahi (Eds.), Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings: ICICS 2018 (Vol. 11149, pp. 303-322). Springer VS. https://doi.org/10.1007/978-3-030-01950-1_18
Abdul, A., Vermeulen, J., Wang, D., Lim, B. Y. & Kankanhalli, M. (2018). Trends and Trajectories for Explainable, Accountable and Intelligible Systems: An HCI Research Agenda. In R. Mandryk & M. Hancock (Eds.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (pp. 582:1-582:18). Association for Computing Machinery. https://doi.org/10.1145/3173574.3174156
Mezzetti, G., Møller, A. & Torp, M. T. (2018). Type Regression Testing to Detect Breaking Changes in Node.js Libraries. In T. D. Millstein (Ed.), 32nd European Conference on Object-Oriented Programming, ECOOP 2018 (Vol. 109, pp. 7:1-7:24). Article 7 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ECOOP.2018.7
Thiel, S. K. (2018). Uncovering the influence of game components on creativity. In CHI PLAY 2018 - Proceedings of the 2018 Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts (pp. 637-645). Association for Computing Machinery. https://doi.org/10.1145/3270316.3271515
Clifford, R., Grønlund, A., Larsen, K. G. & Starikovskaya, T. (2018). Upper and lower bounds for dynamic data structures on strings. In R. Niedermeier & B. Vallée (Eds.), 35th Symposium on Theoretical Aspects of Computer Science, STACS 2018 (Vol. 96, pp. 22:1-22:14). Article 22 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.STACS.2018.22
Enni, S. & Assent, I. (2018). Using Balancing Terms to Avoid Discrimination in Classification. In 2018 IEEE International Conference on Data Mining, ICDM 2018 (pp. 947-952). Article 8594925 IEEE Press. https://doi.org/10.1109/ICDM.2018.00116
Fender, A. & Müller, J. (2018). Velt: A Framework for Multi RGB-D Camera Systems. In Proceedings of the 2018 ACM International Conference on Interactive Surfaces and Spaces (pp. 73-83). Association for Computing Machinery. https://doi.org/10.1145/3279778.3279794
Tsitsulin, A., Mottin, D., Karras, P. & Müller, E. (2018). VERSE: Versatile Graph Embeddings from Similarity Measures. In P.-A. Champin, F. Gandon & L. Médini (Eds.), The Web Conference 2018 - Proceedings of the World Wide Web Conference, WWW 2018: WWW '18 (pp. 539-548). Association for Computing Machinery. https://doi.org/10.1145/3178876.3186120
Korsgaard, H., Thiel, S. K., Thomas, V. & Ertiö, T. (2018). Working across boundaries in smart city research. In C. C. Hinnant & A. Zuiderwijk (Eds.), Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age Article 39 Association for Computing Machinery. https://doi.org/10.1145/3209281.3209315
Larsen, K. G. & Nielsen, J. B. (2018). Yes, There is an Oblivious RAM Lower Bound! In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology -- CRYPTO 2018 (pp. 523-542). Springer VS. https://doi.org/10.1007/978-3-319-96881-0_18
Damgård, I., Orlandi, C. & Simkin, M. (2018). Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings. In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Vol. 10992, pp. 799-829). Springer VS. https://doi.org/10.1007/978-3-319-96881-0_27