Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Bouros, P., Mamoulis, N., Ge, S. & Terrovitis, M. (2016). Set Containment Join Revisited. Knowledge and Information Systems, 49(1), 375-402. https://doi.org/10.1007/s10115-015-0895-7
Abboud, A., Hansen, T. D., Williams, V. V. & Williams, R. (2016). Simulating Branching Programs with Edit Distance and Friends: Or: a Polylog Shaved is a Lower Bound Made. In STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing (pp. 375-388). Association for Computing Machinery. https://doi.org/10.1145/2897518.2897653
Rasmussen, M. K., Troiano, G. M., Petersen, M. G., Simonsen, J. G. & Hornbæk, K. (2016). Sketching Shape-changing Interfaces: Exploring Vocabulary, Metaphor Use, and Affordances. In CHI 2016 - Proceedings, 34th Annual CHI Conference on Human Factors in Computing Systems: CHI'16 (Vol. 2016, pp. 2740-2751). Association for Computing Machinery. https://doi.org/10.1145/2858036.2858183
Christodoulou, G., Filos-Ratsikas, A., Frederiksen, S. K. S., Goldberg, P. W., Zhang, J. & Zhang, J. (2016). Social Welfare in One-Sided Matching Mechanisms. In N. Osman & C. Sierra (Eds.), Autonomous Agents and Multiagent Systems, IFAAMAS 2016 Workshops, Best Papers, Revised Selected Papers: AAMAS 2016 Workshops, Best Papers (Vol. 10002, pp. 30-50). Springer VS. https://doi.org/10.1007/978-3-319-46882-2_3
Abboud, A., Backurs, A., Hansen, T. D., Williams, V. V. & Zamir, O. (2016). Subtree isomorphism revisited. In 27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016 (Vol. 2, pp. 1256-1271). Association for Computing Machinery. https://doi.org/10.1137/1.9781611974331.ch88
Nielsen, M., Brewer, R. S. & Grønbæk, K. (2016). Supporting interactive visual analytics of energy behavior in buildings through affine visualizations. In C. Parker (Ed.), Proceedings of the 28th Australian Computer-Human Interaction Conference, OzCHI 2016 (pp. 238-247). Association for Computing Machinery. https://doi.org/10.1145/3010915.3010950
Christensen, H. B. (2016). Teaching DevOps and Cloud Computing using a Cognitive Apprenticeship and Story-Telling Approach. In ITiCSE 2016 - Proceedings of the 2016 ACM Conference on Innovation and Technology in Computer Science Education (pp. 174-179). Association for Computing Machinery. https://doi.org/10.1145/2899415.2899426
Hansen, K. A., Ibsen-Jensen, R. & Koucký, M. (2016). The big match in small space. In M. Gairing & R. Savani (Eds.), Algorithmic Game Theory - 9th International Symposium, SAGT 2016, Proceedings (Vol. 9928, pp. 64-76). Springer VS. https://doi.org/10.1007/978-3-662-53354-3_6
Garg, S., Mukherjee, P., Pandey, O. & Polychroniadou, A. (2016). The Exact Round Complexity of Secure Computation. In M. Fischlin & J.-S. Coron (Eds.), Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (pp. 448 - 476). Springer VS. https://doi.org/10.1007/978-3-662-49896-5
Bauer, A., Gross, J., Lumsdaine, P. L., Shulman, M., Sozeau, M. & Spitters, B. (2016). The HoTT Library: A formalization of homotopy type theory in Coq. http://arxiv.org/abs/1610.04591
Larsen, K. G. & Nelson, J. (2016). The Johnson-Lindenstrauss Lemma Is Optimal for Linear Dimensionality Reduction. Leibniz International Proceedings in Informatics, 55, 82:1 - 82:11. https://doi.org/10.4230/LIPIcs.ICALP.2016.82
Brody, J. E., Buhrman, H., Koucký, M., Loff, B. & Speelman, F. (2016). Towards a Reverse Newman's Theorem in Interactive Information Complexity. Algorithmica, 76(3), 749-781. https://doi.org/10.1007/s00453-015-0112-9
Baum, C. (2016). Towards More Efficient Secure Multiparty Computation in the Preprocessing Model. Department of Computer Science, Aarhus University.
Andreasen, E. S., Gordon, C. S., Chandra, S., Sridharan, M., Tip, F. & Sen, K. (2016). Trace Typing: An Approach for Evaluating Retrofitted Type Systems. In S. Krishnamurthi & B. S. Lerner (Eds.), 30th European Conference on Object-Oriented Programming (ECOOP 2016) (pp. 11-126). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ECOOP.2016.1
Svendsen, K., Sieczkowski, F. & Birkedal, L. (2016). Transfinite step-indexing: Decoupling concrete and logical steps. In P. Thiemann (Ed.), Programming Languages and Systems (Vol. 9632, pp. 727-751). Springer VS. https://doi.org/10.1007/978-3-662-49498-1_28
Caragiannis, I., Filos-Ratsikas, A., Frederiksen, S. K. S., Hansen, K. A. & Tan, Z. (2016). Truthful facility assignment with resource augmentation: An exact analysis of serial dictatorship. In Web and Internet Economics - 12th International Conference, WINE 2016, Proceedings (Vol. 10123, pp. 236-250). Springer VS. https://doi.org/10.1007/978-3-662-54110-4_17
Heinze, T. S., Møller, A. & Strocco, F. (2016). Type safety analysis for dart. In R. Ierusalimschy (Ed.), DLS 2016 - Proceedings of the 12th Symposium on Dynamic Languages (pp. 1-12). Association for Computing Machinery. https://doi.org/10.1145/2989225.2989226
Strocco, F. (2016). Type Soundness in the Dart Programming Language. Department of Computer Science, University of Aarhus.
Mezzetti, G., Møller, A. & Strocco, F. (2016). Type unsoundness in practice: An empirical study of dart. In R. Ierusalimschy (Ed.), DLS 2016 - Proceedings of the 12th Symposium on Dynamic Languages (pp. 13-24). Association for Computing Machinery. https://doi.org/10.1145/2989225.2989227
Damgård, I., Nielsen, J. B., Ostrovsky, R. & Rosén, A. (2016). Unconditionally secure computation with reduced interaction. In M. Fischlin & J.-S. Coron (Eds.), Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (Vol. 9666, pp. 420-447). Springer VS. https://doi.org/10.1007/978-3-662-49896-5_15
Tsirogiannis, C. & Tsirogiannis, C. (2016). Uncovering the Hidden Routes: Algorithms for Identifying Paths and Missing Links in Trade Networks . In T. Brughmans, A. Collar & F. Coward (Eds.), The Connected Past: Challenges to Network Studies in Archaeology and History Oxford University Press.
Čermák, J., Bosansky, B., Durkota, K., Lisý, V. & Kiekintveld, C. (2016). Using correlated strategies for computing stackelberg equilibria in extensive-form games. In 30th AAAI Conference on Artificial Intelligence, AAAI 2016 (pp. 439-445). AAAI Press. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85007242893&partnerID=40&md5=d6d209b2094ebcd4dd19608badb7e971
Lehmann, A. & Gross, A. (2016). Using Crowd Sensed Data as Input to Congestion Model. In 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016: The Third International Workshop on Crowd Assisted Sensing Pervasive Systems and Communications Article 7457105 IEEE Press. https://doi.org/10.1109/PERCOMW.2016.7457105
Jørgensen, J. B., Knudsen, B., Sloth, L., Vase, J. R. & Christensen, H. B. (2016). Variability Handling for Mobile Banking Apps on iOS and Android. In Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (pp. 283-286). Article 7516847 IEEE Computer Society Press. https://doi.org/10.1109/WICSA.2016.29
Dodds, M., Jagannathan, S., Parkinson, M. J., Svendsen, K. & Birkedal, L. (2016). Verifying custom synchronisation constructs using higher-order separation logic. ACM Transactions on Programming Languages and Systems, 38/2(2), 4:1 - 4:72. Article 4. https://doi.org/10.1145/2818638
Klokmose, C. N., Eagan, J., Baader, S., Mackay, W. & Beaudouin-Lafon, M. (2016). Webstrates: Demonstrating the potential of shareable dynamic media. In Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion, CSCW 2016 Companion: CSCW '16 Companion (pp. 61-64). Association for Computing Machinery. https://doi.org/10.1145/2818052.2874325
Zagermann, J., Pfeil, U., Rädle, R., Jetter, H.-C., Klokmose, C. N. & Reiterer, H. (2016). When Tablets meet Tabletops: The Effect of Tabletop Size on Around-the-Table Collaboration with Personal Tablets. In CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (pp. 5470-5481). Association for Computing Machinery. https://doi.org/10.1145/2858036.2858224
Salgado, M. & Saad-Sulonen, J. (2016). Who needs us? Inquiring into the participatory practices of others and what it means for participatory designers. Paper presented at International European Academy of Design Conference, Paris, France.
Giacomelli, I., Madsen, J. & Orlandi, C. (2016). ZKBoo: Faster Zero-Knowledge for Boolean Circuits. In Proceedings of the 25th USENIX Security Symposium: (USENIX Security 16) (pp. 1069-1083). USENIX - The Advanced Computing Systems Association. https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_giacomelli.pdf
Danvy, O. (Ed.) (2015). 2015 Workshop on Continuations: pre-proceedings. Department of Computer Science, University of Aarhus. https://doi.org/10.7146/aul.4.4
Elkin , M., Pettie, S. & Su, H.-H. (2015). (2Δ − 1)-edge-coloring is much easier than maximal matching in the distributed setting. In P. Indyk (Ed.), Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '15 (pp. 355-370 ). Society for Industrial and Applied Mathematics. http://dl.acm.org/citation.cfm?id=2722155
Cascudo Pueyo, I., Damgård, I. B., David, B. M., Giacomelli, I., Nielsen, J. B. & Trifiletti, R. (2015). Additively Homomorphic UC commitments with Optimal Amortized Overhead. In J. Katz (Ed.), Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30-April 1, 2015, Proceedings (pp. 495–515). Springer. https://doi.org/10.1007/978-3-662-46447-2_22
Branzei, S. & Miltersen, P. B. (2015). A Dictatorship Theorem for Cake Cutting. In Q. Yang & M. Wooldridge (Eds.), Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015) (pp. 481-488). AAAI Press. http://ijcai.org/papers15/Papers/IJCAI15-074.pdf
Elkin , M. & Pettie, S. (2015). A linear-size logarithmic stretch path-reporting distance oracle for general graphs. In P. Indyk (Ed.), SODA '15 Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms (pp. 805-821 ). Society for Industrial and Applied Mathematics. http://dl.acm.org/citation.cfm?id=2722129.2722184&coll=DL&dl=ACM&CFID=630471957&CFTOKEN=95259129
Jespersen, S., Stounbjerg, R. B. K. & Verdezoto, N. (2015). AmBird: Mediating Intimacy for Long Distance Relationships through an Ambient Awareness System. In O. W. Bertelsen & K. Halskov (Eds.), Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers. Department of Computer Science, Aarhus University. https://doi.org/10.7146/aahcc.v1i1.21321
Bizjak, A. & Møgelberg, R. E. (2015). A model of guarded recursion with clock synchronisation. Electronic Notes in Theoretical Computer Science, 319, 83-101. https://doi.org/10.1016/j.entcs.2015.12.007