Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Afshani, P., De Berg, M., Casanova, H., Karsin, B., Lambrechts, C., Sitchinava, N. & Tsirogiannis, C. (2017). An efficient algorithm for the 1D total visibility-index problem. In S. Fekete & V. Ramachandran (Eds.), 2017 Proceedings of the Ninteenth Workshop on Algorithm Engineering and Experiments (ALENEX) (Vol. PRAL17, pp. 218-231). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611974768.18
Fauzi, P., Lipmaa, H., Siim, J. & Zajac, M. (2017). An Efficient Pairing-Based Shuffle Argument. In T. Takagi & T. Peyrin (Eds.), Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings (pp. 97-127). Springer VS. https://doi.org/10.1007/978-3-319-70697-9_4
Hoggan, E., Hsieh, Y.-T., Myllymaa, K., Lantz, V., Kildal, J., Eiler, J. & Jacucci, G. (2017). An Exploration of Mobile Shape-Changing Textures. In TEI 2017 - Proceedings of the 11th International Conference on Tangible, Embedded, and Embodied Interaction: TEI '17 (pp. 275-282). Association for Computing Machinery. https://doi.org/10.1145/3024969.3024983
Krogh-Jespersen, M., Svendsen, K. & Birkedal, L. (2017). A relational model of types-and-effects in higher-order concurrent separation logic. In POPL 2017 - Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages: POPL 2017 (pp. 218-231). Association for Computing Machinery. https://doi.org/10.1145/3009837.3009877
Spencer, B., Benedikt, M., Møller, A. & Breugel, F. V. (2017). ArtForm: A Tool for Exploring the Codebase of Form-based Websites. In K. Sen & T. Bultan (Eds.), ISSTA 2017 - Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis (pp. 380-383). Association for Computing Machinery. https://doi.org/10.1145/3092703.3098226
Berglin, E. & Brodal, G. S. (2017). A simple greedy algorithm for dynamic graph orientation. In Y. Okamoto & T. Tokuyama (Eds.), 28th International Symposium on Algorithms and Computation (ISAAC 2017) (pp. 12:1-12:12). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ISAAC.2017.12
Mathisen, A., Krogh Sørensen, S., Stisen, A., Blunck, H. & Grønbæk, K. (2017). A Study on the Impact of Indoor Positioning Performance on Activity Recognition Applications. In 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2017 (pp. 58-67). Association for Computing Machinery. https://doi.org/10.1145/3144457.3144501
Andreasen, E., Gong, L., Møller, A., Pradel, M., Selakovic, M., Sen, K. & Staicu, C.-A. (2017). A Survey of Dynamic Analysis and Test Generation for JavaScript. A C M Computing Surveys, 50(5), 66:1-66:36. Article 66. https://doi.org/10.1145/3106739
Dowsley, R., Michalas, A., Nagel, M. & Paladi, N. (2017). A survey on design and implementation of protected searchable data in the cloud. Computer Science Review, 26(Supplement C), 17 - 30. https://doi.org/10.1016/j.cosrev.2017.08.001
Tomlein, M. & Grønbæk, K. (2017). A Visual Programming Approach Based on Domain Ontologies for Configuring Industrial IoT Installations. In Proceedings of the 7th International Conference on the Internet of Things, IoT 2017 Article 9 Association for Computing Machinery. https://doi.org/10.1145/3131542.3131552
Jafargholi, Z., Kamath, C., Klein, K., Komargodski, I., Pietrzak, K. & Wichs, D. (2017). Be Adaptive, Avoid Overcommitting. In J. Katz & H. Shacham (Eds.), Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Vol. 10401, pp. 133-163). Springer VS. https://doi.org/10.1007/978-3-319-63688-7_5
Lee, B., Deng, Q., Hoggan, E. & Oulasvirta, A. (2017). Boxer: a multimodal collision technique for virtual objects. In E. Lank & A. Vinciarelli (Eds.), ICMI 2017 - Proceedings of the 19th ACM International Conference on Multimodal Interaction (pp. 252-260). Association for Computing Machinery. https://doi.org/10.1145/3136755.3136761
Brodal, G. S. & Mampentzidis, K. (2017). Cache oblivious algorithms for computing the triplet distance between trees. In K. Pruhs & C. Sohler (Eds.), 25th European Symposium on Algorithms, ESA 2017 (Vol. 87, pp. 21:1--21:14). Article 21 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ESA.2017.21
Haulrik, N., Petersen, R. M. & Merritt, T. (2017). CADLens: Haptic feedback for navigating in 3D environments. In DIS 2017 Companion - Proceedings of the 2017 ACM Conference on Designing Interactive Systems (pp. 127-131). Association for Computing Machinery. https://doi.org/10.1145/3064857.3079132
Sonne, T., Merritt, T. R., Marshall, P., Lomholt, J. J., Müller, J. & Grønbæk, K. (2017). Calming Children When Drawing Blood Using Breath-based Biofeedback. In DIS 2017 - Proceedings of the 2017 Conference on Designing Interactive Systems (pp. 725-737). Association for Computing Machinery. https://doi.org/10.1145/3064663.3064742
Dinsdale-Young, T., da Rocha Pinto, P., Andersen, K. J. A. & Birkedal, L. (2017). Caper: Automatic Verification for Fine-Grained Concurrency. In H. Yang (Ed.), Programming Languages and Systems - 26th European Symposium on Programming, ESOP 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings: 26th European Symposium on Programming, ESOP 2017 (Vol. 10201, pp. 420-447). Springer VS. https://doi.org/10.1007/978-3-662-54434-1_16
Tomlein, M., Booveraghavan, S., Agarwal, Y. & Dey, A. (2017). CharIoT: an end-user programming environment for the IoT. Poster session presented at International Conference on the Internet of Things, Linz, Austria. https://doi.org/10.1145/3131542.3140261
Stisen, A. & Verdezoto, N. (2017). Clinical and Non-clinical Handovers: Designing for Critical Moments. In CSCW 2017 - Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (pp. 2166-2178). Association for Computing Machinery. https://doi.org/10.1145/2998181.2998333
Petersen, M. G., Rasmussen, M. K. & Krogh, P. G. (2017). Collective Interaction: A Designerly Visual Analysis of Seven Research Prototypes. In Proceedings of the 29th Australian Computer-Human Interaction Conference: Human-Nature, OzCHI 2017 (pp. 68-76). Association for Computing Machinery. https://doi.org/10.1145/3152771.3152779
Bødker, S. & Lyle, P. (2017). Community end-user development: Patterns, platforms, possibilities and problems. In K. J.V. , S. I.A.C., D. A. A., P. A. & B. A. (Eds.), IS-EUD 2017 6th international symposium on end-user (pp. 76-81). Technische Universiteit Eindhoven. https://pure.tue.nl/ws/files/69763287/IS_EUD2017_extended_abstracts.pdf#page=77
Guo, Q., An, B., Bošanský, B. & Kiekintveld, C. (2017). Comparing strategic secrecy and Stackelberg commitment in security games. In S. C. (Ed.), 26th International Joint Conference on Artificial Intelligence, IJCAI 2017 (pp. 3691-3699). International Joint Conferences on Artificial Intelligence. https://doi.org/10.24963/ijcai.2017/516
Bosanský, B., Brânzei, S., Hansen, K. A., Lund, T. B. & Miltersen, P. B. (2017). Computation of Stackelberg Equilibria of Finite Sequential Games. A C M Transactions on Economics and Computation, 5(4), 23:1-23:24. Article 23. https://doi.org/10.1145/3133242
Staals, F. & Tsirogiannis, C. (2017). Computing the Expected Value and Variance of Geometric Measures. In S. Fekete & V. Ramachandran (Eds.), 19th Workshop on Algorithm Engineering and Experiments 2017, ALENEX 2017 (pp. 232 - 246). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611974768.19
Damgård, I., Damgård, K., Nielsen, K., Nordholt, P. S. & Toft, T. (2017). Confidential benchmarking based on multiparty computation. In J. Grossklags & B. Preneel (Eds.), Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers (Vol. 9603 LNCS, pp. 169-187). Springer VS. https://doi.org/10.1007/978-3-662-54970-4_10
Hazay, C., Polychroniadou, A. & Venkitasubramaniam, M. (2017). Constant-Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. In S. Fehr (Ed.), Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings: PKC 2017 (Vol. 10175, pp. 428-460 ). Springer VS. https://doi.org/10.1007/978-3-662-54388-7_15
Müller, J., Oulasvirta, A. & Murray-Smith, R. (2017). Control theoretic models of pointing. ACM Transactions on Computer-Human Interaction, 24(4), Article 27. https://doi.org/10.1145/3121431
Afshani, P., Bender, M. A., Farach-Colton, M., Fineman, J. T., Goswami, M. & Tsai, M. T. (2017). Cross-Referenced dictionaries and the limits of write optimization. In P. N. Klein (Ed.), 28th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2017 (pp. 1523-1532). Association for Computing Machinery. https://doi.org/10.1137/1.9781611974782.99
Eenberg, K., Larsen, K. G. & Yu, H. (2017). DecreaseKeys are expensive for external memory priority queues. In STOC 2017 - Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing (Vol. Part F128415, pp. 1081-1093). Association for Computing Machinery. https://doi.org/10.1145/3055399.3055437
Georgiadis, L., Hansen, T. D., Italiano, G. F., Krinninger, S. & Parotsidis, N. (2017). Decremental Data Structures for Connectivity and Dominators in Directed Graphs. In I. Chatzigiannakis, P. Indyk, F. Kuhn & A. Muscholl (Eds.), 44th International Colloquium on Automata, Languages, and Programming (ICALP 2017) (Vol. 80, pp. 42:1-42:15). Article 42 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ICALP.2017.42
Kolesnikov, V., Nielsen, J. B., Rosulek, M., Trieu, N. & Trifiletti, R. (2017). DUPLO: Unifying Cut-and-Choose for Garbled Circuits. In CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 3-20). Association for Computing Machinery. https://doi.org/10.1145/3133956.3133991
Müller, J. (2017). Dynamics of pointing with pointer acceleration. In R. Bernhaupt, G. Dalvi, A. Joshi, D. K. Balkrishan, J. O'Neill & M. Winckler (Eds.), Human-Computer Interaction - INTERACT 2017 - 16th IFIP TC 13 International Conference, Proceedings (Vol. 10515 LNCS, pp. 475-495). Springer VS. https://doi.org/10.1007/978-3-319-67687-6_33
Bannon, L. J. (2017). Elucidating frames of reference for HCI. In S. D. J. Barbosa & K. Breitman (Eds.), Conversations Around Semiotic Engineering (pp. 5-11). Springer. https://doi.org/10.1007/978-3-319-56291-9_2
Nielsen, K., Daugbjerg, P. S. & Sillasen, M. (2017). Engineering - en uddybende kommentar til en kommentar fra Kolmos og Grunwald. MONA - Matematik- og Naturfagsdidaktik, 2017(03), 95-97.
Nielsen, K., Sillasen, M. K. & Daugbjerg, P. S. (2017). Engineering - svaret på naturfagenes udfordringer? MONA: Matematik og Naturfagsdidaktik, 2017-2, 64. https://tidsskrift.dk/mona/article/view/36656
Chondrogiannis, T., Bouros, P., Gamper, J. & Leser, U. (2017). Exact and Approximate Algorithms for Finding k-Shortest Paths with Limited Overlap. 414-425. Paper presented at International Conference on Extending Database Technology, Venice, Italy. https://doi.org/10.5441/002/edbt.2017.37
Rasmussen, M. K., Rasmussen, M. K., Verdezoto, N., Brewer, R. S., Nielsen, L. L. & Bouvin, N. O. (2017). Exploring the Flexibility of Everyday Practices for Shifting Energy Consumption through ClockCast. In Proceedings of the 29th Australian Computer-Human Interaction Conference: Human-Nature, OzCHI 2017 (pp. 296-306). Association for Computing Machinery. https://doi.org/10.1145/3152771.3152803