Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Lu, H. & Jensen, C. S. (2012). Upgrading Uncompetitive Products Economically. In IEEE 28th International Conference on Data Engineering (ICDE) (pp. 977 - 988 ). IEEE Press. https://doi.org/10.1109/ICDE.2012.92
Hou, B. J., Abdrabou, Y., Weidner, F. & Gellersen, H. (2024). Unveiling Variations: A Comparative Study of VR Headsets Regarding Eye Tracking Volume, Gaze Accuracy, and Precision. In 2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW) (pp. 650-655). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/VRW62533.2024.00127
Saioc, G.-V., Shirchenko, D. & Chabbi, M. (2024). Unveiling and Vanquishing Goroutine Leaks in Enterprise Microservices: a Dynamic Analysis Approach. In T. Grosser, C. Dubach, M. Steuwer, J. Xue, G. Ottoni & F. M. Q. Pereira (Eds.), 2024 IEEE/ACM International Symposium on Code Generation and Optimization (CGO) (pp. 411-422). IEEE. https://doi.org/10.1109/CGO57630.2024.10444835
Moradan, A., Sorkhpar, M., Miyauchi, A., Mottin, D. & Assent, I. (2025). Untapping the Power of Indirect Relationships in Entity Summarization. In WSDM 2025 : Proceedings of the 18th ACM International Conference on Web Search and Data Mining (pp. 820-828). Association for Computing Machinery. https://doi.org/10.1145/3701551.3703566
Bødker, S., Lyle, P. & Saad-Sulonen, J. (2017). Untangling the Mess of Technological Artifacts: Investigating Community Artifact Ecologies. In C and T 2017 - 8th International Conference on Communities and Technologies, Conference Proceedings (pp. 246-255). Association for Computing Machinery. https://doi.org/10.1145/3083671.3083675
Kjærgaard, M. B. & Blunck, H. (2011). Unsupervised Power Profiling for Mobile Devices. Paper presented at The 8th Annual International Conference on Mobile and Ubiquitous Systems:Computing, Networking and Services, København, Denmark.
Kjærgaard, M. B. & Blunck, H. (2012). Unsupervised Power Profiling for Mobile Devices. In A. Puiatti & T. Gu (Eds.), Mobile and Ubiquitous Systems: Computing, Networking, and Services: 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers (pp. 138-149). Springer. https://doi.org/10.1007/978-3-642-30973-1_12
Scheder, D. (2013). Unsatisfiable CNF formulas contain many conflicts. In L. Cai, S.-W. Cheng & T.-W. Lam (Eds.), Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (pp. 273-283). Springer VS. https://doi.org/10.1007/978-3-642-45030-3_26
Dahl, M. & Damgård, I. B. (2014). Universally composable symbolic analysis for two-party protocols based on homomorphic encryption. In P. Q. Nguyen & E. Oswald (Eds.), Advances in Cryptology – EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings (pp. 695-712). Springer VS. https://doi.org/10.1007/978-3-642-55220-5_38
Chakraborty, S., Magri, B., Nielsen, J. B. & Venturi, D. (2022). Universally Composable Subversion-Resilient Cryptography. In O. Dunkelman & S. Dziembowski (Eds.), Advances in Cryptology – EUROCRYPT 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings (pp. 272-302). Springer. https://doi.org/10.1007/978-3-031-06944-4_10
Barak, B., Canetti, R., Nielsen, J. B., Pass, R. & IEEE (Ed.) (2004). Universally Composable Protocols with Relaxed Set-Up Assumptions. In Ikke angivet (pp. 186-195). IEEE Press.
Barak, B., Canetti, R., Nielsen, J. B. & Pass, R. (2004). Universally composable protocols with relaxed set-up assumptions. In 45th Annual IEEE Symposium on Foundations of Computer Science, 2004. Proceedings. (pp. 186-195). IEEE Computer Society Press. https://doi.org/10.1109/FOCS.2004.71
David, B. M., Dowsley, R. & Nascimento, A. C. A. (2014). Universally composable oblivious transfer based on a variant of lPN. In D. Gritzalis, A. Kiayias & I. Askoxylakis (Eds.), Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings (pp. 143-158). Springer. https://doi.org/10.1007/978-3-319-12280-9_10
Damgård, I. B. & Nielsen, J. B. (2003). Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption. In D. Boneh (Ed.), Advances in Cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings (pp. 247-264). Springer. https://doi.org/10.1007/978-3-540-45146-4_15
Strzebonski, A. & Tsigaridas, E. (2011). Univariate real root isolation in an extension field. In Proceedings of the 36th International Symposium on Symbolic and Algebraic Computation (pp. 321-328). Association for Computing Machinery. https://doi.org/10.1145/1993886.1993934
de Montjoye, Y.-A., Radaelli, L., Singh, V. K. & Pentland, A. S. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 347(6221), 536-539. https://doi.org/10.1126/science.1256297
Bouvin, N. O. (1999). Unifying strategies for Web augmentation. In J. Westbomke, U. K. Wiil, J. J. Leggett, K. Tochtermann & J. M. Haake (Eds.), Proceedings of the tenth ACM Conference on Hypertext and hypermedia: returning to our diverse roots (pp. 91-100). Association for Computing Machinery. https://doi.org/10.1145/294469.294493
Turon, A., Dreyer , D. & Birkedal, L. (2013). Unifying refinement and hoare-style reasoning in a logic for higher-order concurrency. In G. Morrisett & T. Uustalu (Eds.), Proceedings of the 18th ACM SIGPLAN International Conference on Functional Programming, ICFP '13 (pp. 377-390 ). Association for Computing Machinery. https://doi.org/10.1145/2500365.2500600
Křivánek, J., Georgiev, I., Hachisuka, T., Vévoda, P., Šik, M., Nowrouzezahrai, D. & Jarosz, W. (2014). Unifying Points, Beams, and Paths in Volumetric Light Transport Simulation. A C M Transactions on Graphics, 33(4), Article 13. https://doi.org/10.1145/2601097.2601219
Aagaard, F. L., Kristensen, M., Gratzer, D. & Birkedal, L. (2022). Unifying Cubical and Multimodal Type Theory. Abstract from 28th International Conference on Types for Proofs and Programs, Nantes, France. https://types22.inria.fr/files/2022/06/TYPES_2022_paper_35.pdf
Torgersen, M. (2001). Unifying Abstractions. (DAIMI PhD Dissertation PD-01-2 ed.) Department of Computer Science.
Høgsgaard, M. M. & Paudice, A. (2025). Uniform Mean Estimation for Heavy-Tailed Distributions via Median-of-Means. In Proceedings of the 42nd International Conference on Machine Learning (Vol. 267, pp. 23357-23381)
Hansen, M. T., Jurdak, R. & Kusy, B. (2011). Unified broadcast in sensor networks. In 10th International Conference on Information Processing in Sensor Networks (IPSN), 2011 (pp. 306-317). IEEE Computer Society Press. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5779047
Saad-Sulonen, J., Halskov, K., Eriksson, E., Vines, J., Huybrechts, L. & Karasti, T. H. (2015). Unfolding Participation: What do we mean by participation – conceptually and in practice. Aarhus Series on Human Centered Computing , 1(1). https://doi.org/10.7146/aahcc.v1i1.21324
Damgård, I. B., Fehr, S., Morozov, K. & Salvail, L. (2004). Unfair Noisy Channels and Oblivious Transfer. In M. Naor (Ed.), Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004. Proceedings (pp. 355-373). Springer. https://doi.org/10.1007/978-3-540-24638-1_20
Berlin, R. & Klokmose, C. N. (2007). Undo in Dynamic and Distributed User Interfaces. Poster session presented at Danish HCI Research Symposium, DHRS 2007, København, Denmark.
Beldiceanu, N., Katriel, I. & Lorca, X. (2006). Undirected Forest Constraints. In Integration of AI and OR techniques in Constraint Programming for Combinatorial Optimization Problems (CPAIOR 2006) (Vol. LNCS 3990, pp. 29-43). Springer.
Januzelli, J., Roy, L. & Xu, J. (2025). Under What Conditions Is Encrypted Key Exchange Actually Secure? In S. Fehr & P.-A. Fouque (Eds.), Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques: Proceedings (pp. 451-481). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-91124-8_16
Korn, M. (2010). Understanding Use Situated in Real-world Mobile Contexts. Paper presented at ACM Conference on Ubiquitous Computing. Ubicomp '10, København, Denmark. http://mkorn.binaervarianz.de/pub/ubicomp2010-ws.pdf
Chundury, P., Thakkar, U., Reyazuddin, Y., Jordan, J. B., Elmqvist, N. & Lazar, J. (2024). Understanding the Visualization and Analytics Needs of Blind and Low-Vision Professionals. In ASSETS 2024 - Proceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility Article 111 Association for Computing Machinery. https://doi.org/10.1145/3663548.3688496
Van Oosterhout, A. (2019). Understanding the benefits and drawbacks of shape change in contrast or addition to other modalities. In DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (pp. 113-116). Association for Computing Machinery. https://doi.org/10.1145/3301019.3324875
Strauss, D. J., Francis, A. L., Schäfer, Z., Latzel, M., Corona–Strauss, F. I. & Launer, S. (2025). Understanding speech in “noise” or free energy minimization in the soundscapes of the anthropocene. Frontiers in Neuroscience, 19, Article 1534425. https://doi.org/10.3389/fnins.2025.1534425
Teli, M., Rossitto, C., Lewkowicz, M. & Bødker, S. (2021). Understanding, Promoting, and Designing for Sustainable Appropriation of Technologies by Grassroots Communities. Towards a new wave of technological activism: Sustainable Appropriation of Technologies by Grassroots Communities. In C&T '21: Proceedings of the 10th International Conference on Communities & Technologies - Wicked Problems in the Age of Tech (pp. 332-335). Association for Computing Machinery. https://doi.org/10.1145/3461564.3468163
Bertelsen, O. W. (1997). Understanding objects in use-oriented design. In K. Braa & E. Monteiro (Eds.), Proceedings of the 20th Information Systems Research Seminar in Scandinavia (pp. 311-324)
Whiffing, J., Langlotz, T., Lutteroth, C., Sharma, A. & Clarke, C. (2025). Understanding Freehand Cursorless Pointing Variability and Its Impact on Selection Performance. ACM Transactions on Computer-Human Interaction. Advance online publication. https://doi.org/10.1145/3770583
Bødker, S. (1996). Understanding computer applications in use - a human activity analysis. In P. Bøgh Andersen, B. Holmquist, H. Klein & R. Possner (Eds.), Signs at work (pp. 325-348). De Gruyter.
Grönvall, E. & Verdezoto, N. (2013). Understanding Challenges and Opportunities of Preventive Blood Pressure Self-Monitoring at Home. In P. Palanque , F. Détienne & A. Tricot (Eds.), Proceedings of the 31st European Conference on Cognitive Ergonomics (ACM ECCE 2013) Association for Computing Machinery. https://doi.org/10.1145/2501907.2501962
Ciolfi, L., Cooke, M., Bertelsen, O. W. & Bannon, L. J. (2005). Understanding and Designing for Aesthetic Experience. In L. MacKinnon, O. Bertelsen & N. Bryan-Kinns (Eds.), The 19th British HCI Group Annual Conference (pp. 289-291). The British Computer Society.
Li, Y., Tan, T. & Xue, J. (2019). Understanding and analyzing Java reflection. ACM Transactions on Software Engineering and Methodology, 28(2), Article 7. https://doi.org/10.1145/3295739
Asilis, J., Høgsgaard, M. M. & Velegkas, G. (2025). Understanding Aggregations of Proper Learners in Multiclass Classification. In Proceedings of The 36th International Conference on Algorithmic Learning Theory (pp. 89-111). PMLR.
Jurdzinski, M., Nielsen, M. & Srba, J. (2003). Undecidability of Domino Games and Hhp-Bisimilarity. Information and Computation, 184(2), 343-368. https://doi.org/10.1016/S0890-5401(03)00064-6
Thiel, S. K. (2018). Uncovering the influence of game components on creativity. In CHI PLAY 2018 - Proceedings of the 2018 Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts (pp. 637-645). Association for Computing Machinery. https://doi.org/10.1145/3270316.3271515