Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Jensen, M. M., Rädle, R., Klokmose, C. N. & Bødker, S. (2018). Remediating a design tool: Implications of digitizing sticky notes. In R. Mandryk & M. Hancock (Eds.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Vol. 2018-April, pp. 1-12). Article 224 Association for Computing Machinery. https://doi.org/10.1145/3173574.3173798
Van Oosterhout, A., Alonso, M. B. & Jumisko-Pyykkö, S. (2018). Ripple thermostat: Affecting the emotional experience through interactive force feedback and shape change. In CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Vol. 2018-April). Association for Computing Machinery. https://doi.org/10.1145/3173574.3174229
San-Segundo, R., Blunck, H., Moreno-Pimentel, J., Stisen, A. & Gil-Martín, M. (2018). Robust Human Activity Recognition using smartwatches and smartphones. Engineering Applications of Artificial Intelligence, 72(6), 190-202. https://doi.org/10.1016/j.engappai.2018.04.002
Li, Y., Tan, T., Møller, A. & Smaragdakis, Y. (2018). Scalability-First Pointer Analysis with Self-Tuning Context-Sensitivity. In G. T. Leavens, A. Garcia & C. S. Păsăreanu (Eds.), ESEC/FSE 2018 - Proceedings of the 2018 26th ACM Joint Meeting on European So ftware Engineering Conference and Symposium on the Foundations of So ftware Engineering (pp. 129-140). Association for Computing Machinery. https://doi.org/10.1145/3236024.3236041
Pham, T., Vermeulen, J., Tang, A. & Vermeulen, L. M. (2018). Scale Impacts Elicited Gestures for Manipulating Holograms: Implications for AR Gesture Design. In Companion Publication of the 2019 on Designing Interactive Systems Conference 2019 Companion (2018 ed., pp. 227-240). Association for Computing Machinery. https://doi.org/10.1145/3196709.3196719
Thomas, V., Brueggemann, M. J., Wang, D., Gaytán-Lugo, L. S. & Bidwell, N. J. (2018). Silent SIG: Reflection in action at CHI. In R. Mandryk, M. Hancock, M. Perry & A. Cox (Eds.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Vol. 2018-April, pp. 1-4). Article SIG16 Association for Computing Machinery. https://doi.org/10.1145/3170427.3185362
Cramer, R., Damgård, I., Escudero, D., Scholl, P. & Xing, C. (2018). SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority. In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology - CRYPTO 2018 (Vol. 10992, pp. 769-798). Springer VS. https://doi.org/10.1007/978-3-319-96881-0_26
Loss, J., Maurer, U. & Tschudi, D. (2018). Strong Separations Between Broadcast and Authenticated Channels. In U. Schmid & J. Widder (Eds.), 32nd International Symposium on Distributed Computing (DISC 2018) (Vol. 121, pp. 36:1-36:17). Article 36 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.DISC.2018.36
Pinder, C., Vermeulen, J. & Cowan, B. R. (2018). Subliminal Semantic Number Processing on Smartphones. In L. Bailie & N. Oliver (Eds.), MobileHCI 2018 - Beyond Mobile: The Next 20 Years - 20th International Conference on Human-Computer Interaction with Mobile Devices and Services, Conference Proceedings (pp. 24:1-24:13). Article a24 Association for Computing Machinery. https://doi.org/10.1145/3229434.3229451
Remy, C., Bates, O., Thomas, V. J. & Broadbent, M. (2018). "Sustainability... it's just not important": The Challenges of Academic Engagement with Diverse Stakeholders. In B. Penzenstadler, S. Easterbrook, C. Venters & S. I. Ahmed (Eds.), ICT4S2018. 5th International Conference on Information and Communication Technology for Sustainability (Vol. 52, pp. 316-331). easychair. https://doi.org/10.29007/kln5
Wang, X., Deng, K., Li, J., Yu, J. X., Jensen, C. S. & Yang, X. (2018). Targeted influence minimization in social networks. In G. I. Webb, D. Phung, M. Ganji, L. Rashidi, V. S. Tseng & B. Ho (Eds.), Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings (pp. 689-700). Springer. https://doi.org/10.1007/978-3-319-93040-4_54
Hansen, K. A., Ibsen-Jensen, R. & Neyman, A. (2018). The Big Match with a Clock and a Bit of Memory. In É. Tardos, E. Elkind & R. Vohra (Eds.), ACM EC 2018 - Proceedings of the 2018 ACM Conference on Economics and Computation (pp. 149-150). Association for Computing Machinery. https://doi.org/10.1145/3219166.3219198
Jensen, C. (Ed.), Lind Olsen, E. (Ed.), Mikkelsen, G. L., Syberg , L., Nielsen, L. L., Hansen, M. A. E., Hjortlund, M., Madsen, O. L., Høngaard Andersen, P. & Duvold, T. (2018). The future market for cybersecurity in Denmark.
Bates, O., Thomas, V., Remy, C., Nathan, L. P., Mann, S. & Friday, A. (2018). The future of HCI and sustainability: Championing environmental and social justice. In R. Mandryk & M. Hancock (Eds.), CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Vol. 2018-April). Article SIG01 Association for Computing Machinery. https://doi.org/10.1145/3170427.3185365
Madsen, O. L. & Møller-Pedersen, B. (2018). This is not a Model: On development of a common terminology for modeling and programming. In T. Margaria & B. Steffen (Eds.), Leveraging applications of formal methods, verification and validation (Vol. I, pp. 206-224). Springer. https://doi.org/10.1007/978-3-030-03418-4_13
Chakraborty, D., Kamma, L. & Larsen, K. G. (2018). Tight cell probe bounds for succinct boolean matrix-Vector multiplication. In STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing (pp. 1297-1306). Association for Computing Machinery. https://doi.org/10.1145/3188745.3188830
Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E. (2018). TinyKeys: A New Approach to Efficient Multi-Party Computation. In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Vol. 10993, pp. 3-33). Springer VS. https://doi.org/10.1007/978-3-319-96878-0_1
LaVigne, R., Liu-Zhang, C.-D., Maurer, U. M., Moran, T., Mularczyk, M. & Tschudi, D. (2018). Topology-Hiding Computation Beyond Semi-Honest Adversaries. In A. Beimel & S. Dziembowski (Eds.), Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings: Theory of Cryptography (Vol. 11240, pp. 3-35). Springer VS. https://doi.org/10.1007/978-3-030-03810-6_1
Baum, C., Lin, H. & Oechsner, S. (2018). Towards Practical Lattice-Based One-Time Linkable Ring Signatures. In D. Naccache, S. Xu, S. Qing, P. Samarati, G. Blanc, R. Lu, Z. Zhang & A. Meddahi (Eds.), Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings: ICICS 2018 (Vol. 11149, pp. 303-322). Springer VS. https://doi.org/10.1007/978-3-030-01950-1_18
Abdul, A., Vermeulen, J., Wang, D., Lim, B. Y. & Kankanhalli, M. (2018). Trends and Trajectories for Explainable, Accountable and Intelligible Systems: An HCI Research Agenda. In R. Mandryk & M. Hancock (Eds.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (pp. 582:1-582:18). Association for Computing Machinery. https://doi.org/10.1145/3173574.3174156
Mezzetti, G., Møller, A. & Torp, M. T. (2018). Type Regression Testing to Detect Breaking Changes in Node.js Libraries. In T. D. Millstein (Ed.), 32nd European Conference on Object-Oriented Programming, ECOOP 2018 (Vol. 109, pp. 7:1-7:24). Article 7 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ECOOP.2018.7
Thiel, S. K. (2018). Uncovering the influence of game components on creativity. In CHI PLAY 2018 - Proceedings of the 2018 Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts (pp. 637-645). Association for Computing Machinery. https://doi.org/10.1145/3270316.3271515
Clifford, R., Grønlund, A., Larsen, K. G. & Starikovskaya, T. (2018). Upper and lower bounds for dynamic data structures on strings. In R. Niedermeier & B. Vallée (Eds.), 35th Symposium on Theoretical Aspects of Computer Science, STACS 2018 (Vol. 96, pp. 22:1-22:14). Article 22 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.STACS.2018.22
Enni, S. & Assent, I. (2018). Using Balancing Terms to Avoid Discrimination in Classification. In 2018 IEEE International Conference on Data Mining, ICDM 2018 (pp. 947-952). Article 8594925 IEEE Press. https://doi.org/10.1109/ICDM.2018.00116
Fender, A. & Müller, J. (2018). Velt: A Framework for Multi RGB-D Camera Systems. In Proceedings of the 2018 ACM International Conference on Interactive Surfaces and Spaces (pp. 73-83). Association for Computing Machinery. https://doi.org/10.1145/3279778.3279794
Tsitsulin, A., Mottin, D., Karras, P. & Müller, E. (2018). VERSE: Versatile Graph Embeddings from Similarity Measures. In P.-A. Champin, F. Gandon & L. Médini (Eds.), The Web Conference 2018 - Proceedings of the World Wide Web Conference, WWW 2018: WWW '18 (pp. 539-548). Association for Computing Machinery. https://doi.org/10.1145/3178876.3186120
Korsgaard, H., Thiel, S. K., Thomas, V. & Ertiö, T. (2018). Working across boundaries in smart city research. In C. C. Hinnant & A. Zuiderwijk (Eds.), Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age Article 39 Association for Computing Machinery. https://doi.org/10.1145/3209281.3209315
Larsen, K. G. & Nielsen, J. B. (2018). Yes, There is an Oblivious RAM Lower Bound! In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology -- CRYPTO 2018 (pp. 523-542). Springer VS. https://doi.org/10.1007/978-3-319-96881-0_18
Damgård, I., Orlandi, C. & Simkin, M. (2018). Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings. In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Vol. 10992, pp. 799-829). Springer VS. https://doi.org/10.1007/978-3-319-96881-0_27
Fuchsbauer, G., Gay, R., Kowalczyk, L. & Orlandi, C. (2017). Access Control Encryption for Equality, Comparison, and More. In S. Fehr (Ed.), Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II (Vol. 10175, pp. 88-118). Springer VS. https://doi.org/10.1007/978-3-662-54388-7_4
Jafargholi, Z., Scafuro, A. & Wichs, D. (2017). Adaptively Indistinguishable Garbled Circuits. In Y. Kalai & L. Reyzin (Eds.), Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings (Vol. 10678, pp. 40-71). Springer VS. https://doi.org/10.1007/978-3-319-70503-3
Bringmann, K., Grønlund, A. & Larsen, K. G. (2017). A Dichotomy for Regular Expression Membership Testing. In Proceedings - 58th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2017 (pp. 307-318). Article 8104068 IEEE Computer Society Press. https://doi.org/10.1109/FOCS.2017.36
Coron, J.-S. & Nielsen, J. B. (Eds.) (2017). Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. In J.-S. Coron & J. Buus Nielsen (Eds.), Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I (Vol. 10210, pp. V-VI). Springer VS. https://doi.org/10.1007/978-3-319-56620-7
Coron, J.-S. & Nielsen, J. B. (Eds.) (2017). Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. In J.-S. Coron & J. Buus Nielsen (Eds.), Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II (Vol. 10211). Springer VS. https://doi.org/10.1007/978-3-319-56614-6
Coron, J.-S. & Nielsen, J. B. (Eds.) (2017). Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. In J.-S. Coron & J. Buus Nielsen (Eds.), Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III (Vol. 10212). Springer VS. https://doi.org/10.1007/978-3-319-56617-7
Bouros, P. & Mamoulis, N. (2017). A Forward Scan based Plane Sweep Algorithm for Parallel Interval Joins. Proceedings of the VLDB Endowment, 10(11), 1346-1357. https://doi.org/10.14778/3137628.3137644
David, B. M. (2017). A Framework For Efficient Homomorphic Universally Composable Commitments. Department of Computer Science, University of Aarhus.
Raskin, M. (2017). A linear lower bound for incrementing a space-optimal integer representation in the bit-probe model. In I. Chatzigiannakis, P. Indyk, F. Kuhn & A. Muscholl (Eds.), 44th International Colloquium on Automata, Languages, and Programming, ICALP 2017 (Vol. 80, pp. 88:1--88:12). Article 88 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ICALP.2017.88
Cramer, R., Damgård, I., Xing, C. & Yuan, C. (2017). Amortized complexity of zero-knowledge proofs revisited: Achieving linear soundness slack. In J.-S. Coron & J. Buus Nielsen (Eds.), Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (Vol. 10210, pp. 479-500). Springer VS. https://doi.org/10.1007/978-3-319-56620-7_17
Trifiletti, R. (2017). Amortizing Maliciously Secure Two-party Computation. Department of Computer Science, Aarhus University.
Afshani, P., De Berg, M., Casanova, H., Karsin, B., Lambrechts, C., Sitchinava, N. & Tsirogiannis, C. (2017). An efficient algorithm for the 1D total visibility-index problem. In S. Fekete & V. Ramachandran (Eds.), 2017 Proceedings of the Ninteenth Workshop on Algorithm Engineering and Experiments (ALENEX) (Vol. PRAL17, pp. 218-231). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611974768.18
Fauzi, P., Lipmaa, H., Siim, J. & Zajac, M. (2017). An Efficient Pairing-Based Shuffle Argument. In T. Takagi & T. Peyrin (Eds.), Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings (pp. 97-127). Springer VS. https://doi.org/10.1007/978-3-319-70697-9_4
Hoggan, E., Hsieh, Y.-T., Myllymaa, K., Lantz, V., Kildal, J., Eiler, J. & Jacucci, G. (2017). An Exploration of Mobile Shape-Changing Textures. In TEI 2017 - Proceedings of the 11th International Conference on Tangible, Embedded, and Embodied Interaction: TEI '17 (pp. 275-282). Association for Computing Machinery. https://doi.org/10.1145/3024969.3024983