Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Kunkel, A., Rheinländer, A., Schiefer, C., Helmer, S., Bouros, P. & Leser, U. (2016). PIEJoin: Towards Parallel Set Containment Joins. In P. Baumann, I. Manolescu-Goujot, L. Trani, Y. Ioannidis, G. G. Barnaföldi, L. Dobos & E. Bányai (Eds.), Scientific and Statistical Database Management: 28th International Conference, SSDBM 2016 - Proceedings Article 11 Association for Computing Machinery. https://doi.org/10.1145/2949689.2949694
Zakarias, R. W. (2016). Practical Secure Computation with Pre-Processing. Department of Computer Science, Aarhus University.
Birkedal, L. (2016). Preface. Electronic Notes in Theoretical Computer Science, 325, 1-2. https://doi.org/10.1016/j.entcs.2016.09.028
Hansen, T. D. & Zwick, U. (2016). Random-Edge Is Slower Than Random-Facet on Abstract Cubes. Leibniz International Proceedings in Informatics, 55, 51:1-51:14. https://doi.org/10.4230/LIPIcs.ICALP.2016.51
Cascudo, I., Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016). Rate-1, linear time and additively homomorphic UC commitments. In M. Robshaw & J. Katz (Eds.), Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Vol. 9816, pp. 179-207). Springer VS. https://doi.org/10.1007/978-3-662-53015-3_7
Nielsen, J. B. & Ranellucci, S. (2016). Reactive garbling: Foundation, instantiation, application. In J. H. Cheon & T. Takagi (Eds.), Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. 10032, pp. 1022-1052). Springer VS. https://doi.org/10.1007/978-3-662-53890-6_34
Devriese, D., Birkedal, L. & Piessens, F. (2016). Reasoning about object capabilities with logical relations and effect parametricity. In 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016 (pp. 147-162). Article 7467352 IEEE Press. https://doi.org/10.1109/EuroSP.2016.22
Østergaard Laursen, C., Pedersen, S., Merritt, T. R. & Caprani, O. (2016). Robot-Supported Food Experiences: Exploring Aesthetic Plating with Design Prototypes. In J. T.K.V.Koh, B. J. Dunstan, D. Silvera-Tawil & M. Velonaki (Eds.), Cultural Robotics - 1st International Workshop, CR 2015 and Held as Part of IEEE RO-MAN 2015, Revised Selected Papers: First International Workshop, CR 2015, Held as Part of IEEE RO-MAN 2015, Kobe, Japan, August 31, 2015. Revised Selected Papers (Vol. 9549, pp. 107-130). Springer. https://doi.org/10.1007/978-3-319-42945-8_10
Nielsen, M., Elmqvist, N. & Grønbæk, K. (2016). Scribble query: fluid touch brushing for multivariate data visualization. In C. Parker (Ed.), Proceedings of the 28th Australian Computer-Human Interaction Conference, OzCHI 2016 (pp. 381-390). Association for Computing Machinery. https://doi.org/10.1145/3010915.3010951
Tomlein, M. & Grønbæk, K. (2016). Semantic Model of Variability and Capabilities of IoT Applications for Embedded Software Ecosystems. In Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (pp. 247-252). Article 7516835 IEEE Press. https://doi.org/10.1109/WICSA.2016.17
Bouros, P., Mamoulis, N., Ge, S. & Terrovitis, M. (2016). Set Containment Join Revisited. Knowledge and Information Systems, 49(1), 375-402. https://doi.org/10.1007/s10115-015-0895-7
Abboud, A., Hansen, T. D., Williams, V. V. & Williams, R. (2016). Simulating Branching Programs with Edit Distance and Friends: Or: a Polylog Shaved is a Lower Bound Made. In STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing (pp. 375-388). Association for Computing Machinery. https://doi.org/10.1145/2897518.2897653
Rasmussen, M. K., Troiano, G. M., Petersen, M. G., Simonsen, J. G. & Hornbæk, K. (2016). Sketching Shape-changing Interfaces: Exploring Vocabulary, Metaphor Use, and Affordances. In CHI 2016 - Proceedings, 34th Annual CHI Conference on Human Factors in Computing Systems: CHI'16 (Vol. 2016, pp. 2740-2751). Association for Computing Machinery. https://doi.org/10.1145/2858036.2858183
Christodoulou, G., Filos-Ratsikas, A., Frederiksen, S. K. S., Goldberg, P. W., Zhang, J. & Zhang, J. (2016). Social Welfare in One-Sided Matching Mechanisms. In N. Osman & C. Sierra (Eds.), Autonomous Agents and Multiagent Systems, IFAAMAS 2016 Workshops, Best Papers, Revised Selected Papers: AAMAS 2016 Workshops, Best Papers (Vol. 10002, pp. 30-50). Springer VS. https://doi.org/10.1007/978-3-319-46882-2_3
Abboud, A., Backurs, A., Hansen, T. D., Williams, V. V. & Zamir, O. (2016). Subtree isomorphism revisited. In 27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016 (Vol. 2, pp. 1256-1271). Association for Computing Machinery. https://doi.org/10.1137/1.9781611974331.ch88
Nielsen, M., Brewer, R. S. & Grønbæk, K. (2016). Supporting interactive visual analytics of energy behavior in buildings through affine visualizations. In C. Parker (Ed.), Proceedings of the 28th Australian Computer-Human Interaction Conference, OzCHI 2016 (pp. 238-247). Association for Computing Machinery. https://doi.org/10.1145/3010915.3010950
Christensen, H. B. (2016). Teaching DevOps and Cloud Computing using a Cognitive Apprenticeship and Story-Telling Approach. In ITiCSE 2016 - Proceedings of the 2016 ACM Conference on Innovation and Technology in Computer Science Education (pp. 174-179). Association for Computing Machinery. https://doi.org/10.1145/2899415.2899426
Hansen, K. A., Ibsen-Jensen, R. & Koucký, M. (2016). The big match in small space. In M. Gairing & R. Savani (Eds.), Algorithmic Game Theory - 9th International Symposium, SAGT 2016, Proceedings (Vol. 9928, pp. 64-76). Springer VS. https://doi.org/10.1007/978-3-662-53354-3_6
Garg, S., Mukherjee, P., Pandey, O. & Polychroniadou, A. (2016). The Exact Round Complexity of Secure Computation. In M. Fischlin & J.-S. Coron (Eds.), Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (pp. 448 - 476). Springer VS. https://doi.org/10.1007/978-3-662-49896-5
Bauer, A., Gross, J., Lumsdaine, P. L., Shulman, M., Sozeau, M. & Spitters, B. (2016). The HoTT Library: A formalization of homotopy type theory in Coq. http://arxiv.org/abs/1610.04591
Larsen, K. G. & Nelson, J. (2016). The Johnson-Lindenstrauss Lemma Is Optimal for Linear Dimensionality Reduction. Leibniz International Proceedings in Informatics, 55, 82:1 - 82:11. https://doi.org/10.4230/LIPIcs.ICALP.2016.82
Brody, J. E., Buhrman, H., Koucký, M., Loff, B. & Speelman, F. (2016). Towards a Reverse Newman's Theorem in Interactive Information Complexity. Algorithmica, 76(3), 749-781. https://doi.org/10.1007/s00453-015-0112-9
Baum, C. (2016). Towards More Efficient Secure Multiparty Computation in the Preprocessing Model. Department of Computer Science, Aarhus University.
Andreasen, E. S., Gordon, C. S., Chandra, S., Sridharan, M., Tip, F. & Sen, K. (2016). Trace Typing: An Approach for Evaluating Retrofitted Type Systems. In S. Krishnamurthi & B. S. Lerner (Eds.), 30th European Conference on Object-Oriented Programming (ECOOP 2016) (pp. 11-126). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ECOOP.2016.1
Svendsen, K., Sieczkowski, F. & Birkedal, L. (2016). Transfinite step-indexing: Decoupling concrete and logical steps. In P. Thiemann (Ed.), Programming Languages and Systems (Vol. 9632, pp. 727-751). Springer VS. https://doi.org/10.1007/978-3-662-49498-1_28
Caragiannis, I., Filos-Ratsikas, A., Frederiksen, S. K. S., Hansen, K. A. & Tan, Z. (2016). Truthful facility assignment with resource augmentation: An exact analysis of serial dictatorship. In Web and Internet Economics - 12th International Conference, WINE 2016, Proceedings (Vol. 10123, pp. 236-250). Springer VS. https://doi.org/10.1007/978-3-662-54110-4_17
Heinze, T. S., Møller, A. & Strocco, F. (2016). Type safety analysis for dart. In R. Ierusalimschy (Ed.), DLS 2016 - Proceedings of the 12th Symposium on Dynamic Languages (pp. 1-12). Association for Computing Machinery. https://doi.org/10.1145/2989225.2989226
Strocco, F. (2016). Type Soundness in the Dart Programming Language. Department of Computer Science, University of Aarhus.
Mezzetti, G., Møller, A. & Strocco, F. (2016). Type unsoundness in practice: An empirical study of dart. In R. Ierusalimschy (Ed.), DLS 2016 - Proceedings of the 12th Symposium on Dynamic Languages (pp. 13-24). Association for Computing Machinery. https://doi.org/10.1145/2989225.2989227
Damgård, I., Nielsen, J. B., Ostrovsky, R. & Rosén, A. (2016). Unconditionally secure computation with reduced interaction. In M. Fischlin & J.-S. Coron (Eds.), Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (Vol. 9666, pp. 420-447). Springer VS. https://doi.org/10.1007/978-3-662-49896-5_15
Tsirogiannis, C. & Tsirogiannis, C. (2016). Uncovering the Hidden Routes: Algorithms for Identifying Paths and Missing Links in Trade Networks . In T. Brughmans, A. Collar & F. Coward (Eds.), The Connected Past: Challenges to Network Studies in Archaeology and History Oxford University Press.
Čermák, J., Bosansky, B., Durkota, K., Lisý, V. & Kiekintveld, C. (2016). Using correlated strategies for computing stackelberg equilibria in extensive-form games. In 30th AAAI Conference on Artificial Intelligence, AAAI 2016 (pp. 439-445). AAAI Press. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85007242893&partnerID=40&md5=d6d209b2094ebcd4dd19608badb7e971
Lehmann, A. & Gross, A. (2016). Using Crowd Sensed Data as Input to Congestion Model. In 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016: The Third International Workshop on Crowd Assisted Sensing Pervasive Systems and Communications Article 7457105 IEEE Press. https://doi.org/10.1109/PERCOMW.2016.7457105
Jørgensen, J. B., Knudsen, B., Sloth, L., Vase, J. R. & Christensen, H. B. (2016). Variability Handling for Mobile Banking Apps on iOS and Android. In Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (pp. 283-286). Article 7516847 IEEE Computer Society Press. https://doi.org/10.1109/WICSA.2016.29
Dodds, M., Jagannathan, S., Parkinson, M. J., Svendsen, K. & Birkedal, L. (2016). Verifying custom synchronisation constructs using higher-order separation logic. ACM Transactions on Programming Languages and Systems, 38/2(2), 4:1 - 4:72. Article 4. https://doi.org/10.1145/2818638
Klokmose, C. N., Eagan, J., Baader, S., Mackay, W. & Beaudouin-Lafon, M. (2016). Webstrates: Demonstrating the potential of shareable dynamic media. In Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion, CSCW 2016 Companion: CSCW '16 Companion (pp. 61-64). Association for Computing Machinery. https://doi.org/10.1145/2818052.2874325
Zagermann, J., Pfeil, U., Rädle, R., Jetter, H.-C., Klokmose, C. N. & Reiterer, H. (2016). When Tablets meet Tabletops: The Effect of Tabletop Size on Around-the-Table Collaboration with Personal Tablets. In CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (pp. 5470-5481). Association for Computing Machinery. https://doi.org/10.1145/2858036.2858224
Salgado, M. & Saad-Sulonen, J. (2016). Who needs us? Inquiring into the participatory practices of others and what it means for participatory designers. Paper presented at International European Academy of Design Conference, Paris, France.