Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Micenková, B. (2015). Outlier Detection and Explanation for Domain Experts. Department of Computer Science, University of Aarhus.
Micenkova, B. & van Beusekom, J. (2011). Stamp Detection in Color Document Images. In 2011 International Conference on Document Analysis and Recognition (ICDAR) (pp. 1125-1129). IEEE Computer Society Press. https://doi.org/10.1109/ICDAR.2011.227
Micallef, L., Schulz, H.-J., Angelini, M., Aupetit, M., Chang, R., Kohlhammer, J., Perer, A. & Santucci, G. (2019). The Human User in Progressive Visual Analytics. In EuroVis 2019 - Short Papers (pp. 19-23). Eurographics Association. https://doi.org/10.2312/evs.20191164
Mic, V., Sedmidubsky, J. & Zezula, P. (2023). CRANBERRY: Memory-Effective Search in 100M High-Dimensional CLIP Vectors. In O. Pedreira & V. Estivill-Castro (Eds.), Similarity Search and Applications - 16th International Conference, SISAP 2023, Proceedings (pp. 300-308). Springer. https://doi.org/10.1007/978-3-031-46994-7_26
Mic, V. & Zezula, P. (2024). Filtering with relational similarity. Information Systems, 122, Article 102345. https://doi.org/10.1016/j.is.2024.102345
Mezzetti, G., Møller, A. & Strocco, F. (2016). Type unsoundness in practice: An empirical study of dart. In R. Ierusalimschy (Ed.), DLS 2016 - Proceedings of the 12th Symposium on Dynamic Languages (pp. 13-24). Association for Computing Machinery. https://doi.org/10.1145/2989225.2989227
Mezzetti, G. (2017). Foreword to the thematic track: Quality aspects in verification and validation. Proceedings - 2016 10th International Conference on the Quality of Information and Communications Technology, QUATIC 2016, Article 7814536. https://doi.org/10.1109/QUATIC.2016.039
Mezzetti, G., Møller, A. & Torp, M. T. (2018). Type Regression Testing to Detect Breaking Changes in Node.js Libraries. In T. D. Millstein (Ed.), 32nd European Conference on Object-Oriented Programming, ECOOP 2018 (Vol. 109, pp. 7:1-7:24). Article 7 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ECOOP.2018.7
Meyer, P., Orlandi, C., Roy, L. & Scholl, P. (2025). Rate-1 Arithmetic Garbling From Homomorphic Secret Sharing. In E. Boyle & M. Mahmoody (Eds.), Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings (pp. 71-97). Article 323579 Springer Nature. https://doi.org/10.1007/978-3-031-78023-3_3
Meyer, P., Orlandi, C., Roy, L. & Scholl, P. (2025). Silent Circuit Relinearisation: Sublinear-Size (Boolean and Arithmetic) Garbled Circuits from DCR. In Y. Tauman Kalai & S. F. Kamara (Eds.), Advances in Cryptology – CRYPTO 2025 - 45th Annual International Cryptology Conference, Proceedings (pp. 426-458). Springer Science+Business Media. https://doi.org/10.1007/978-3-032-01884-7_14
Merritt, T. R., Nørgaard, M., Laursen, C., Rasmussen, M. K. & Petersen, M. G. (2015). Imagined Physics: Exploring Examples of Shape-changing Interfaces. In H. Samani (Ed.), Cognitive Robotics (pp. 89-111). CRC Press.
Merritt, T. R., Nielsen, C. L., Jakobsen, F. L. & Grønbæk, J. E. (2017). GlowPhones: Designing for Proxemics Play with Low-Resolution Displays in Location-based Games. In Proceedings of the Annual Symposium on Computer-Human Interaction in Play: CHI PLAY '17 (pp. 69-81). Association for Computing Machinery. https://doi.org/10.1145/3116595.3116598
Menheere, D., Van Hartingsveldt, E., Birkebæk, M., Vos, S. & Lallemand, C. (2021). Laina: Dynamic Data Physicalization for Slow Exercising Feedback. In DIS 2021 - Proceedings of the 2021 ACM Designing Interactive Systems Conference: Nowhere and Everywhere (pp. 1015-1030). Association for Computing Machinery. https://doi.org/10.1145/3461778.3462041
Mendling, J., Lassen, K. B. & Zdun, U. (2006). Transformation Strategies between Block-Oriented and Graph-Oriented Process Modelling Languages. In 3rd GI Workshop XML4BPM - XML Integration and Transformation for Business Process Management at MKWI 2006
Mendling, J., Lassen, K. B. & Zdun, U. (2005). Transformation Strategies between Block-Oriented and Graph-Oriented Process Modelling Languages. (pp. 20). Vienna University of Economics and Business Administration.
Mendling, J., Lassen, K. B. & Zdun, U. (2006). Experiences in enhancing existing BPM Tools with BPEL Import and Export. In Proceedings of the 4th International Conference Business Process Management: LNCS (Vol. 4102, pp. 348-357). Springer.
Melissaris Papanikolaou, N., Rachuri, R., Baum, C. & Scholl, P. (2024). Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs. 454-488. Paper presented at 44th Annual International Cryptology Conference - CRYPTO 2024, Santa Barbara, California, United States. https://doi.org/10.1007/978-3-031-68397-8_14
Melissaris Papanikolaou, N., Ravi, D. & Yakoubov, S. (2024). Threshold-Optimal MPC With Friends and Foes. In A. Chattopadhyay, S. Bhasin, S. Picek & C. Rebeiro (Eds.), Progress in Cryptology – INDOCRYPT 2023: 24th International Conference on Cryptology in India, Goa, India, December 10–13, 2023, Proceedings, Part II (Vol. 2, pp. 3-24). Springer. https://doi.org/10.1007/978-3-031-56235-8_1
Meldgaard, S. T. (2013). Unconditionally Secure Protocols. Institut for Datalogi, Aarhus Universitet.
Meiklejohn, S. & Orlandi, C. (2015). Privacy-enhancing overlays in bitcoin. In M. Brenner , N. Christin , B. Johnson & K. Rohloff (Eds.), Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Vol. 8976, pp. 127-141). Springer. https://doi.org/10.1007/978-3-662-48051-9_10
Meiklejohn, S. & Mercer, R. (2018). Möbius: Trustless tumbling for transaction privacy. Proceedings on Privacy Enhancing Technologies, 2018(2), 105-121. https://doi.org/10.1515/popets-2018-0015
Meijer, J. & van de Pol, J. (2019). Sound black-box checking in the LearnLib. Innovations in Systems and Software Engineering, 15(3-4), 267-287. https://doi.org/10.1007/s11334-019-00342-6
Meier, W., Jensen, M., Pichon-Pharabod, J. & Spitters, B. (2025). CertiCoq-Wasm: A Verified WebAssembly Backend for CertiCoq. In Proceedings of the 14th ACM SIGPLAN International Conference on Certified Programs and Proofs (pp. 127-139). Association for Computing Machinery. https://doi.org/10.1145/3703595.3705879
Mehlhorn, K. & Schmidt, E. M. (1982). Las Vegas is better than determinism in VLSI and distributed computing. In STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing (pp. 330-337). Association for Computing Machinery. https://doi.org/10.1145/800070.802208
McMillan, D., Brown, B., Lampinen, A., McGregor, M., Hoggan, E. & Pizza, S. (2017). Situating Wearables: Smartwatch Use in Context. In CHI 2017 - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire (pp. 3582-3594). Association for Computing Machinery. https://doi.org/10.1145/3025453.3025993
McCauley, S., de Groot, S., Mailund, T. & Hein, J. (2007). Annotation of selection strengths in viral genomes. Bioinformatics, 23(22), 2978-2986. https://doi.org/10.1093/bioinformatics/btm472
Mayoh, B. H., Shafazand, H. (Ed.) & Tjoa, A. M. (Ed.) (2002). Evolution of Cooperation in Multiagent Systems. In Proceeding of EurAsia-ICT 2002: Information and Communication Technology (2510 of Lecture Notes in Computer Science ed., pp. 701-710). Springer.
Mayoh, B. H. (1986). A Uniform Model for the Growth of Biological Organisms: Cooperating Sequential Processes. In G. Rozenberg & A. Salomaa (Eds.), The Book of L (pp. 291-302). Springer.
Mayer, S., Lischke, L., Grønbæk, J. E., Sarsenbayeva, Z., Vogelsang, J., Wozniak, P. W., Henze, N. & Jacucci, G. (2018). Pac-Many: Movement Behavior when Playing Collaborative and Competitive Games on Large Displays. In CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems Article 539 Association for Computing Machinery. https://doi.org/10.1145/3173574.3174113
Matt, C., Nielsen, J. B. & Thomsen, S. E. (2022). Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks. In Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings: 42nd Annual International Cryptology Conference, CRYPTO 2022, Procerdings (pp. 400-430). Springer, Cham. https://doi.org/10.1007/978-3-031-15979-4_14
Mathur, U., Pavlogiannis, A. & Viswanathan, M. (2020). The Complexity of Dynamic Data Race Prediction. In Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2020 (pp. 713–727). Article 3394783 Association for Computing Machinery. https://doi.org/10.1145/3373718.3394783
Mathur, U., Pavlogiannis, A. & Viswanathan, M. (2021). Optimal Prediction of Synchronization-Preserving Races. Proceedings of the ACM on Programming Languages , 5(POPL), Article 36. https://doi.org/10.1145/3434317
Mathur, U., Pavlogiannis, A., Tunc, H. C. & Viswanathan, M. (2022). A Tree Clock Data Structure for Causal Orderings in Concurrent Executions. In B. Falsafi, M. Ferdman, S. Lu & T. F. Wenisch (Eds.), ASPLOS 2022 - Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (pp. 710-725). Association for Computing Machinery. https://doi.org/10.1145/3503222.3507734
Mathisen, A., Krogh, S., Stisen, A., Blunck, H. & Grønbæk, K. (2016). A comparative analysis of Indoor WiFi Positioning at a large building complex. In J. J. G. Domínguez, Á. H. Alonso & J. Ureña Ureña (Eds.), 2016 International Conference on Indoor Positioning and Indoor Navigation, IPIN 2016 Article 7743666 IEEE Press. https://doi.org/10.1109/IPIN.2016.7743666
Mathisen, A., Krogh Sørensen, S., Stisen, A., Blunck, H. & Grønbæk, K. (2017). A Study on the Impact of Indoor Positioning Performance on Activity Recognition Applications. In 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2017 (pp. 58-67). Association for Computing Machinery. https://doi.org/10.1145/3144457.3144501
Mathisen, A. & Grønbæk, K. (2018). Clear Visual Separation of Temporal Event Sequences. In 2017 IEEE Visualization in Data Science, VDS 2017 (pp. 7-14). Article 8573439 IEEE. https://doi.org/10.1109/VDS.2017.8573439
Mathiesen, S. S. & Schulz, H.-J. (2021). Aesthetics and Ordering in Stacked Area Charts. In A. Basu, G. Stapleton, S. Linker, C. Legg, E. Manalo & P. Viana (Eds.), Diagrammatic Representation and Inference - 12th International Conference, Diagrams 2021, Proceedings: 12th International Conference on the Theory and Application of Diagrams (DIAGRAMS'21) (pp. 3-19). Springer. https://doi.org/10.1007/978-3-030-86062-2_1
Mathiasen, N. R. (2007). Usable Security Revisited. Poster session presented at Danish HCI Research Symposium, DHRS 2007, København, Denmark.
Mathiasen, N. R. (2008). New design perspectives on security sensible systems. In J. Abdelnour-Nocera, L. Dunckley, K. Eason & R. Beale (Eds.), Sociotech-ID 2008 Workshop: New Sociotechnical Insights in Interaction Design (pp. 83-87). British Computer Society.
Mathiasen, N. R. (2008). Investigating how everyday people experience security. Poster session presented at Symposium On Usable Privacy and Security, Pittsburgh, United States.
Mathiasen, N. R. (2009). It-security seen from a user experience perspective. Poster session presented at NordiCHI. Workshop on User centered Security., Lund, Sweden.
Mathiasen, N. R., Bødker, S. & Petersen, M. G. (2011). While working around security. Paper presented at 3rd International Conference on Human Computer Interaction. HCI 2011, Bangalore, India.
Mathiasen, N. R. & Bødker, S. (2011). Experiencing Security in Interaction Design. In Proceedings of the 2011 annual Conference on Human Factors in Computing Systems (pp. 2325-2334). Association for Computing Machinery. https://doi.org/10.1145/1978942.1979283