Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Goel, A., Hall-Andersen, M. N., Kaptchuk, G. & Spooner, N. (2023). Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions. In C. Hazay & M. Stam (Eds.), Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (pp. 347-378). Springer. https://doi.org/10.1007/978-3-031-30617-4_12
Vindum, S. F. & Birkedal, L. (2023). Spirea: A Mechanized Concurrent Separation Logic for Weak Persistent Memory. Proceedings of the ACM on Programming Languages , 7(OOPSLA2), 632-657. Article 244. https://doi.org/10.1145/3622820
Haselwarter, P. G., Rivas, E., Van Muylder, A., Winterhalter, T., Abate, C., Sidorenco, N., Hriţcu, C., Maillard, K. & Spitters, B. (2023). SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq. ACM Transactions on Programming Languages and Systems, 45(3), 61. Article 15. https://doi.org/10.1145/3594735
Landis, D. & Schwartzbach, N. (2023). Stackelberg Attacks on Auctions and Blockchain Transaction Fee Mechanisms. In K. Gal, K. Gal, A. Nowe, G. J. Nalepa, R. Fairstein & R. Radulescu (Eds.), ECAI 2023 - 26th European Conference on Artificial Intelligence, including 12th Conference on Prestigious Applications of Intelligent Systems, PAIS 2023 - Proceedings (pp. 2073-2080). IOS Press. https://doi.org/10.3233/FAIA230501
Bouras, C., Caragiannis, I., Gkamas, A., Protopapas, N., Sardelis, T. & Sgarbas, K. (2023). State of the Art Analysis of Resource Allocation Techniques in 5G MIMO Networks. In 37th International Conference on Information Networking, ICOIN 2023 (pp. 632-637). IEEE. https://doi.org/10.1109/ICOIN56518.2023.10049018
Chung, E. & Larsen, K. G. (2023). Stronger 3SUM-Indexing Lower Bounds. In N. Bansal & V. Nagarajan (Eds.), Proceedings of the 2023 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA) (pp. 444-455). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611977554.ch19
Campanelli, M., Francati, D. & Orlandi, C. (2023). Structure-Preserving Compilers from New Notions of Obfuscations. In A. Boldyreva & V. Kolesnikov (Eds.), Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (pp. 663-693). Springer. https://doi.org/10.1007/978-3-031-31371-4_23
Larsen, K. G. & Yu, H. (2023). Super-Logarithmic Lower Bounds for Dynamic Graph Problems. In 2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS) (pp. 1589-1604). IEEE. https://doi.org/10.1109/FOCS57990.2023.00096
Gratzer, D. (2023). Syntax and semantics of modal type theory. [PhD dissertation, Aarhus University]. Aarhus University.
Canetti, R., Kolby, S., Ravi, D., Soria Vazquez, E. & Yakoubov, S. (2023). Taming Adaptivity in YOSO Protocols: The Modular Way. In G. Rothblum & H. Wee (Eds.), Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023, Proceedings, Part II (Vol. 2, pp. 33-62). Springer. https://doi.org/10.1007/978-3-031-48618-0_2
Christensen, H. B. (2023). Teaching Distributed Programming - Revisiting the Broker Pattern. In Proceedings of the 5th European Conference on Software Engineering Education, ECSEE 2023 (pp. 162-168). Association for Computing Machinery. https://doi.org/10.1145/3593663.3593674
Pauli, A. B., Pablos Sarabia, R., Derczynski, L. & Assent, I. (2023). TeamAmpa at SemEval-2023 Task 3: Exploring Multilabel and Multilingual RoBERTa Models for Persuasion and Framing Detection. In A. K. Ojha, A. S. Doğruöz, G. Da San Martino, H. Tayyar Madabushi, R. Kumar & E. Sartori (Eds.), Proceedings of the 17th International Workshop on Semantic Evaluation (SemEval-2023) (pp. 847–855). Association for Computational Linguistics. https://doi.org/10.18653/v1/2023.semeval-1.117
Mueller, F., Petersen, M. G. & Li, Z. (2023). Technology futures: Towards understanding how to design awe-inspiring futures. International Journal of Human Computer Studies, 170, Article 102961. https://doi.org/10.1016/j.ijhcs.2022.102961
Loeschcke, S., Belongie, S. & Benaim, S. (2023). Text-Driven Stylization of Video Objects. In L. Karlinsky, T. Michaeli & K. Nishino (Eds.), Computer Vision – ECCV 2022 Workshops (pp. 594-609). Springer. https://doi.org/10.1007/978-3-031-25069-9_38
Hansen, K. A., Ibsen-Jensen, R. & Neyman, A. (2023). The Big Match with a Clock and a Bit of Memory. Mathematics of Operations Research, 48(1), 419-432. https://doi.org/10.1287/moor.2022.1267
Fandina, O. N., Høgsgaard, M. M. & Larsen, K. G. (2023). The Fast Johnson-Lindenstrauss Transform Is Even Faster. In A. Krause, E. Brunskill, K. Cho, B. Engelhardt, S. Sabato & J. Scarlett (Eds.), Proceedings of ICML 2023 (Vol. 202, pp. 9689-9715). MLResearch Press.
Hu, E., Grønbæk, J. E., Ying, W., Du, R. & Heo, S. (2023). ThingShare: Ad-Hoc Digital Copies of Physical Objects for Sharing Things in Video Meetings. In A. Schmidt, K. Väänänen, T. Goyal, P. O. Kristensson, A. Peters, S. Mueller, J. R. Williamson & M. L. Wilson (Eds.), CHI'23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems Article 365 Association for Computing Machinery. https://doi.org/10.1145/3544548.3581148
Doerner, J., Kondi, Y., Lee, E., Shelat, A. & Tyner, L. (2023). Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. In 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023 (pp. 773-789). IEEE. https://doi.org/10.1109/SP46215.2023.10179470
Johns, C. A., Evangelista Belo, J. M., Feit, A. M., Klokmose, C. N. & Pfeuffer, K. (2023). Towards Flexible and Robust User Interface Adaptations With Multiple Objectives. In S. Follmer, J. Han, J. Steimle & N. Henry Riche (Eds.), UIST '23: Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology Article 108 Association for Computing Machinery. https://doi.org/10.1145/3586183.3606799
Fournier, H., Limaye, N., Malod, G., Srinivasan, S. & Tavenas, S. (2023). Towards Optimal Depth-Reductions for Algebraic Formulas. In A. Ta-Shma (Ed.), 38th Computational Complexity Conference, CCC 2023 Article 28 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.CCC.2023.28
Han, W. (2023). Towards Trustworthy Decision Making in Visual Analytics. [PhD dissertation, Aarhus University]. Aarhus Universitet.
Kondi, Y., Orlandi, C. & Roy, L. (2023). Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions. In H. Handschuh & A. Lysyanskaya (Eds.), Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part I (pp. 646-677). Springer. https://doi.org/10.1007/978-3-031-38557-5_21
Madsen, O. L. (2023). Using Object-Sequence Diagrams for Debugging. In E. Gonzalez Boix & C. Scholliers (Eds.), DEBT 2023: Proceedings of the 1st ACM International Workshop on Future Debugging Techniques (pp. 11-22). Association for Computing Machinery. https://doi.org/10.1145/3605155.3605864
Shaik, I., Heisinger, M., Seidl, M. & Pol, J. V. D. (2023). Validation of QBF Encodings with Winning Strategies. Leibniz International Proceedings in Informatics, 271. https://doi.org/10.4230/LIPIcs.SAT.2023.24
Sidenmark, L., Clarke, C., Newn, J., Lystbæk, M. N., Pfeuffer, K. & Gellersen, H. (2023). Vergence Matching: Inferring Attention to Objects in 3D Environments for Gaze-Assisted Selection. In CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems Article 257 Association for Computing Machinery. https://doi.org/10.1145/3544548.3580685
Ateniese, G., Chen, L., Francati, D., Papadopoulos, D. & Tang, Q. (2023). Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting). In A. Boldyreva & V. Kolesnikov (Eds.), Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (pp. 63-93). Springer. https://doi.org/10.1007/978-3-031-31371-4_3
Aranha, D. F., Baum, C., Gjøsteen, K. & Silde, T. (2023). Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. In CCS'23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (pp. 1467-1481). Association for Computing Machinery. https://doi.org/10.1145/3576915.3616683
Brânzei, S., Filos-Ratsikas, A., Miltersen, P. B. & Zeng, Y. (2023). Walrasian pricing in multi-unit auctions. Artificial Intelligence, 322, Article 103961. https://doi.org/10.1016/j.artint.2023.103961
Sterling, J. (2023). What should a generic object be? Mathematical Structures in Computer Science, 33(1), 46-67. https://doi.org/10.1017/S0960129523000117
Madsen, O. L. & Møller-Pedersen, B. (2023). What your mother forgot to tell you about modeling – and programming. In 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C) (pp. 200-210). IEEE. https://doi.org/10.1109/MODELS-C59198.2023.00049
Pedersen, J. M., Blatchley Hansen, A. & Halbe Torres, M. (2023). Winning the European Cyber Security Challenge 2022: What did We Learn? In International Symposium on Project Approaches in Engineering Education (Vol. 13, pp. 139-148) http://paee.dps.uminho.pt/proceedingsSCOPUS/PAEE_ALE_2023_PROCEEDINGS.pdf
Lutze, M., Madsen, M., Schuster, P. & Brachthäuser, J. I. (2023). With or Without You: Programming with Effect Exclusion. Proceedings of the ACM on Programming Languages , 7(ICFP), 448-475. https://doi.org/10.1145/3607846
Ganesh, C., Kondi, Y. M., Orlandi, C., Pancholi, M. R., Takahashi, A. & Tschudi, D. (2023). Witness-Succinct Universally-Composable SNARKs. In C. Hazay & M. Stam (Eds.), Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (pp. 315–346). Springer. https://doi.org/10.1007/978-3-031-30617-4_11
Braun, L., Delpech de Saint Guilhem, C., Jadoul, R., Orsini, E., Smart, N. P. & Tanguy, T. (2023). ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for Z2k. In E. A. Quaglia (Ed.), Cryptography and Coding - 19th IMA International Conference, IMACC 2023, London, UK, December 12-14, 2023, Proceedings (Vol. 14421, pp. 137-157). Springer, Cham. https://doi.org/10.1007/978-3-031-47818-58
Theocharidis, K., Terrovitis, M., Skiadopoulos, S. & Karras, P. (2022). A Content Recommendation Policy for Gaining Subscribers. In SIGIR 2022 - Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 2501-2506). Association for Computing Machinery. https://doi.org/10.1145/3477495.3531885
Niu, Y., Sterling, J., Grodin, H. & Harper, R. (2022). A cost-Aware logical framework. Proceedings of the ACM on Programming Languages , 6(POPL), Article 3498670. https://doi.org/10.1145/3498670
Hinrichsen, J. K., Bengtson, J. & Krebbers, R. (2022). ACTRIS 2.0: ASYNCHRONOUS SESSION-TYPE BASED REASONING IN SEPARATION LOGIC. Logical Methods in Computer Science, 18(2), 16:1-16:64. https://doi.org/10.46298/lmcs-18(2:16)2022
Sterling, J., Angiuli, C. & Gratzer, D. (2022). A cubical language for bishop sets. Logical Methods in Computer Science, 18(1), 43:1-43:80. https://doi.org/10.46298/LMCS-18(1:43)2022
Sølvsten, S. C., de Pol, J. V., Jakobsen, A. B. & Thomasen, M. W. B. (2022). Adiar Binary Decision Diagrams in External Memory. In D. Fisman & G. Rosu (Eds.), Tools and Algorithms for the Construction and Analysis of Systems - 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Proceedings (pp. 295-313). Springer. https://doi.org/10.1007/978-3-030-99527-0_16
Van Oosterhout, A., Hoggan, E. & Bruns, M. (2022). Adjustable Graphical Notation and Accessible Hardware to Accommodate the Force Feedback Design Process Redesign of Feelix based on Preliminary Evaluations of Design Tools and Methods. In Participative Computing for Sustainable Futures : Adjunct Proceedings of the 12th Nordic Conference on Human-Computer Interaction (NordiCHI’22) Article 52 Association for Computing Machinery. https://doi.org/10.1145/3547522.3547683
Bonsangue, M., Caltais, G., Feng, H. & Tunç, H. C. (2022). A Language-Based Causal Model for Safety. In Y. Aït-Ameur & F. Craciun (Eds.), Theoretical Aspects of Software Engineering - 16th International Symposium, TASE 2022, Proceedings (pp. 290-307). Springer. https://doi.org/10.1007/978-3-031-10363-6_20