Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Grønlund, A., Kamma, L. & Larsen, K. G. (2020). Margins are Insufficient for Explaining Gradient Boosting. In H. Larochelle, MA. Ranzato, R. Hadsell, M.-F. Balcan & H.-T. Lin (Eds.), Advances in Neural Information Processing Systems 33 (NeurIPS 2020) https://proceedings.neurips.cc/paper/2020/hash/146f7dd4c91bc9d80cf4458ad6d6cd1b-Abstract.html
Deuber, D., Döttling, N., Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020). Minting Mechanism for Proof of Stake Blockchains. In M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (Eds.), Applied Cryptography and Network Security (pp. 315-334). Springer. https://doi.org/10.1007/978-3-030-57808-4_16
Birkedal, L., Clouston, R., Mannaa, B., Ejlers Møgelberg, R., Pitts, A. M. & Spitters, B. (2020). Modal dependent type theory and dependent right adjoints. Mathematical Structures in Computer Science, 30(2), 118-138. https://doi.org/10.1017/S0960129519000197
Rijke, E., Shulman, M. & Spitters, B. (2020). Modalities in homotopy type theory. Logical Methods in Computer Science, 16(1), 2:1-2:79.
Ramirez Gomez, A. & Gellersen, H. (2020). More than Looking: Using Eye Movements Behind the Eyelids as a New Game Mechanic. In CHI PLAY '20: Proceedings of the Annual Symposium on Computer-Human Interaction in Play (pp. 362-373). Association for Computing Machinery. https://doi.org/10.1145/3410404.3414240
Larsen-Ledet, I. (2020). More Than Writing Text: Multiplicity in Collaborative Academic Writing. [PhD thesis, Aarhus University]. Aarhus Universitet.
Clarke, C., Ehrich, P. & Gellersen, H. (2020). Motion Coupling of Earable Devices in Camera View. In J. Cauchard & M. Lochtefeld (Eds.), MUM 2020 - 19th International Conference on Mobile and Ubiquitous Multimedia, Proceedings (pp. 13-17). Association for Computing Machinery. https://doi.org/10.1145/3428361.3428470
Gratzer, D., Kavvos, G. A., Nuyts, A. & Birkedal, L. (2020). Multimodal Dependent Type Theory. In Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2020 (pp. 492-506). Article 3394736 Association for Computing Machinery. https://doi.org/10.1145/3373718.3394736
Grønlund, A., Kamma, L. & Larsen, K. G. (2020). Near-Tight Margin-Based Generalization Bounds for Support Vector Machines. In H. Daumé III & A. Singh (Eds.), International Conference on Machine Learning (pp. 3779-3788). MLResearch Press. http://proceedings.mlr.press/v119/gronlund20a.html
Endo, A. T. & Møller, A. (2020). NodeRacer: Event Race Detection for Node.js Applications. In 2020 IEEE 13th International Conference on Software Testing, Verification and Validation, ICST 2020: Proceedings (pp. 120-130). Article 9159075 Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICST46399.2020.00022
Brian, G., Faonio, A., Obremski, M., Simkin, M. & Venturi, D. (2020). Non-malleable secret sharing against bounded joint-tampering attacks in the plain model. In D. Micciancio & T. Ristenpart (Eds.), Advances in Cryptology - CRYPTO 2020 (pp. 127-155). Springer. https://doi.org/10.1007/978-3-030-56877-1_5
Logins, A., Li, Y. & Karras, P. (2020). On the Robustness of Cascade Diffusion under Node Attacks. In The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020: Proceedings of the Web Conference 2020 (pp. 2711–2717). Association for Computing Machinery. https://doi.org/10.1145/3366423.3380028
Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R. & Pavlogiannis, A. (2020). Optimal and Perfectly Parallel Algorithms for On-demand Data-Flow Analysis. In P. Müller (Ed.), Programming Languages and Systems- 29th European Symposium on Programming, ESOP 2020 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings (pp. 112-140). Springer. https://doi.org/10.1007/978-3-030-44914-8_5
Larsen, K. G., Mitzenmacher, M. & Tsourakakis, C. E. (2020). Optimal Learning of Joint Alignments with a Faulty Oracle. In 2020 IEEE International Symposium on Information Theory, ISIT 2020 (pp. 2492-2497). IEEE. https://doi.org/10.1109/ISIT44484.2020.9174310
Brandt, M., Orlandi, C., Shrishak, K. & Shulman, H. (2020). Optimal Transport Layer for Secure Computation. In P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (Eds.), ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Vol. Volume 3: SECRYPT, pp. 130-141). SCITEPRESS Digital Library. https://doi.org/10.5220/0009826801300141
Sidenmark, L., Clarke, C., Zhang, X., Phu, J. & Gellersen, H. (2020). Outline Pursuits: Gaze-assisted Selection of Occluded Objects in Virtual Reality. In CHI 2020 - Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Article 3376438 Association for Computing Machinery. https://doi.org/10.1145/3313831.3376438
Baum, C., Frederiksen, T. K., Hesse, J., Lehmann, A. & Yanai, A. (2020). Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. In Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 (pp. 587-606). Article 9230400 IEEE. https://doi.org/10.1109/EuroSP48549.2020.00044
Madsen, M. & Pol, J. V. D. (2020). Polymorphic types and effects with Boolean unification. In Proceedings of the ACM on Programming Languages (OOPSLA ed., Vol. 4). Association for Computing Machinery. https://doi.org/10.1145/3428222
Pavlogiannis, A., Schaumberger, N., Schmid, U. & Chatterjee, K. (2020). Precedence-Aware Automated Competitive Analysis of Real-Time Scheduling. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(11), 3981-3992. Article 9211419. https://doi.org/10.1109/TCAD.2020.3012803
Loeschcke, S. B., Hogräfer, M. & Schulz, H.-J. (2020). Progressive Parameter Space Visualization for Task-Driven SAX Configuration. In K. Vrotsou & C. Turkay (Eds.), EuroVA 2020 - EuroVis Workshop on Visual Analytics (pp. 43-47). European Association for Computer Graphics. https://doi.org/10.2312/eurova.20201085
Kannabiran, G. & Bødker, S. (2020). Prototypes as Objects of Desire. In DIS 2020 - Proceedings of the 2020 ACM Designing Interactive Systems Conference (pp. 1619-1631). Association for Computing Machinery. https://doi.org/10.1145/3357236.3395487
Grønbæk, J. E., Knudsen, M., O'Hara, K., Krogh, P. G., Vermeulen, J. & Petersen, M. G. (2020). Proxemics Beyond Proximity: Designing for Flexible Social Interaction Through Cross-Device Interaction. In CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Article 3376379 Association for Computing Machinery. https://doi.org/10.1145/3313831.3376379
Hansen, K. A. & Sølvsten, S. C. (2020). ∃R-completeness of stationary nash equilibria in perfect information stochastic games. In J. Esparza & D. Král (Eds.), 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020 (pp. 45:1-45:15). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.MFCS.2020.45
Cavassim, M. I. A. (2020). Recombination and horizontal gene transfer through the lens of phylogenomics. [PhD thesis, Aarhus University]. Aarhus Universitet.
Bay, J. & Askarov, A. (2020). Reconciling progress-insensitive noninterference and declassification. In 2020 IEEE 33rd Computer Security Foundations Symposium (CSF) (pp. 95-106). IEEE. https://doi.org/10.1109/CSF49147.2020.00015
Rossitto, C., Lampinen, A., Bødker, S., Light, A., Berns, K. & Hui, J. (2020). Reconsidering scale and scaling in CSCW research. In CSCW '20 : Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing (pp. 493-501). Association for Computing Machinery. https://doi.org/10.1145/3406865.3419409
van Oosterhout, A. & Hoggan, E. (2020). Reshaping Interaction with Rotary Knobs: Combining Form, Feel and Function. In DIS 2020 - Proceedings of the 2020 ACM Designing Interactive Systems Conference (pp. 1973-1982). Association for Computing Machinery. https://doi.org/10.1145/3357236.3395536
Logins, A. (2020). Resource Allocation in Networks. [PhD thesis, Aarhus University]. Aarhus Universitet.
Chakraborty, S., Dziembowski, S. & Nielsen, J. B. (2020). Reverse firewalls for actively secure mpcs. In D. Micciancio & T. Ristenpart (Eds.), Advances in Cryptology - CRYPTO 2020 (pp. 732-762). Springer. https://doi.org/10.1007/978-3-030-56880-1_26
Zardbani, F., Afshani, P. & Karras, P. (2020). Revisiting the theory and practice of database cracking. In A. Bonifati, Y. Zhou, M. A. Vaz Salles, A. Bohm, D. Olteanu, G. Fletcher, A. Khan & B. Yang (Eds.), Advances in Database Technology - EDBT 2020: 23rd International Conference on Extending Database Technology, Proceedings (pp. 415-418). openproceedings.org. https://doi.org/10.5441/002/edbt.2020.46
Arge, L., Rav, M., Revsbæk, M., Shin, Y. & Yang, J. (2020). Sea-rise flooding on massive dynamic terrains. In S. Albers (Ed.), 17th Scandinavian Symposium and Workshops on Algorithm Theory, SWAT 2020 (pp. 6:1-6:19). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.SWAT.2020.6
Larsen, K. G. & Simkin, M. (2020). Secret sharing lower bound: Either reconstruction is hard or shares are long. In C. Galdi & V. Kolesnikov (Eds.), Security and Cryptography for Networks (pp. 566-578). Springer. https://doi.org/10.1007/978-3-030-57990-6_28
Dalskov, A. P. K., Escudero Ospina, D. E. & Keller, M. (2020). Secure Evaluation of Quantized Neural Networks. Proceedings on Privacy Enhancing Technologies, 2020(4), 355-375. https://doi.org/10.2478/popets-2020-0077
Lucani Rötter, D. E., Nielsen, L., Orlandi, C., Pagnin, E. & Vestergaard, R. (2020). Secure generalized deduplication via multi-key revealing encryption. In C. Galdi & V. Kolesnikov (Eds.), Security and Cryptography for Networks (pp. 298-318). Springer. https://doi.org/10.1007/978-3-030-57990-6_15
Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020). Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. In L. Chen, S. Schneider, N. Li & K. Liang (Eds.), European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Vol. I, pp. 654-673). Springer. https://doi.org/10.1007/978-3-030-59013-0_32
Aranha, D. F., Orlandi, C., Takahashi, A. & Zaverucha, G. (2020). Security of Hedged Fiat–Shamir Signatures under Fault Attacks. In A. Canteaut & Y. Ishai (Eds.), Advances in Cryptology – EUROCRYPT 2020 (pp. 644-674). Springer. https://doi.org/10.1007/978-3-030-45721-1_23
Khurana, A., Logins, A. & Karras, P. (2020). Selecting Influential Features by a Learnable Content-Aware Linear Threshold Model. In CIKM '20: Proceedings of the 29th ACM International Conference on Information & Knowledge Management (pp. 635-644). Association for Computing Machinery. https://doi.org/10.1145/3340531.3411886
Neerbek, J. (2020). Sensitive Information Detection: Recursive Neural Networks for Encoding Context. [PhD thesis, Aarhus University]. Aarhus Universitet.
Larsen, M. R. E., Han, W. & Schulz, H.-J. (2020). Sketchy Rendering to Aid the Recollection of Regular Visualizations. In EuroVis 2020: Short Papers (pp. 139-143). Eurographics Association. https://doi.org/10.2312/evs.20201062
Nielsen, J. B. & Spitters, B. (2020). Smart contract interactions in coq. In E. Sekerinski, N. Moreira, J. N. Oliveira, D. Ratiu, R. Guidotti, M. Farrell, M. Luckcuck, D. Marmsoler, J. Campos, T. Astarte, L. Gonnord, A. Cerone, L. Couto, B. Dongol, M. Kutrib, P. Monteiro & D. Delmas (Eds.), Formal Methods- FM 2019 International Workshops - Revised Selected Papers (pp. 380-391). Springer. https://doi.org/10.1007/978-3-030-54994-7_29
Kannabiran, G., Hoggan, E. & Hansen, L. K. (2020). Somehow They Are Never Horny! In DIS 2020 Companion - Companion Publication of the 2020 ACM Designing Interactive Systems Conference (pp. 131-137). Association for Computing Machinery. https://doi.org/10.1145/3393914.3395877
Vollrath, F. & Krink, T. (2020). Spider webs inspiring soft robotics. Journal of the Royal Society, Interface, 17(172). https://doi.org/10.1098/rsif.2020.0569