Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Bilstrup, K.-E. K., Kaspersen, M. H. & Petersen, M. G. (2020). Staging reflections on ethical dilemmas in machine learning: A card-based design workshop for high school students. In DIS 2020 - Proceedings of the 2020 ACM Designing Interactive Systems Conference (pp. 1211-1222). Association for Computing Machinery. https://doi.org/10.1145/3357236.3395558
Rossitto, C., Berns, K. & Larsen-Ledet, I. (2020). Strategies of Visibility: Growth, Media and Social Movements. Paper presented at The 23rd ACM Conference on Computer-Supported Cooperative Work and Social Computing.
Damgård, I., Haagh, H., Mercer, R., Nitulescu, A., Orlandi, C. & Yakoubov, S. (2020). Stronger Security and Constructions of Multi-designated Verifier Signatures. In R. Pass & K. Pietrzak (Eds.), Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings (Vol. II, pp. 229-260). Springer. https://doi.org/10.1007/978-3-030-64378-2_9
Teli, M., Foth, M., Sciannamblo, M., Anastasiu, I. & Lyle, P. J. (2020). Tales of Institutioning and Commoning: Participatory Design Processes with a Strategic and Tactical Perspective. In C. Del Gaudio, L. Parra-Agudelo, R. Clarke, J. Saad-Sulonen, A. Botero, A. Botero, F. C. Londono, F. C. Londono & P. A. Escandon Suarez (Eds.), Proceedings of the 16th Participatory Design Conference 2020 (PDC2020 ed., Vol. 1, pp. 159-171). Association for Computing Machinery. https://doi.org/10.1145/3385010.3385020
Garavel, H., ter Beek, M. H. & van de Pol, J. (2020). The 2020 Expert Survey on Formal Methods. In M. H. ter Beek & D. Nickovic (Eds.), Formal Methods for Industrial Critical Systems - 25th International Conference, FMICS 2020, Proceedings: FMICS 2020, Vienna, Austria, September 2-3, 2020, Proceedings (pp. 3-69). Springer. https://doi.org/10.1007/978-3-030-58298-2_1
Mathur, U., Pavlogiannis, A. & Viswanathan, M. (2020). The Complexity of Dynamic Data Race Prediction. In Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2020 (pp. 713–727). Article 3394783 Association for Computing Machinery. https://doi.org/10.1145/3373718.3394783
Tsitsulin, A., Munkhoeva, M., Mottin, D., Karras, P., Bronstein, A., Oseledets, I. & Müller, E. (2020). The Shape of Data: Intrinsic Distance for Data Distributions. Paper presented at The International Conference on Learning Representations (ICLR), Ababa, Ethiopia.
Hjorth, H. A. & Wilensky, U. (2020). Thinking in Levels Across Multiple Levels. Paper presented at Constructionism 2020, Dublin, Ireland.
Rachuri, S. R., Suresh, A. & Chaudhari, H. (2020). Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. In Proceedings 2020 Network and Distributed System Security Symposium (pp. 1-18). Internet Society. https://doi.org/10.14722/ndss.2020.23005
Eerikson, H., Keller, M., Orlandi, C., Pullonen, P., Puura, J. & Simkin, M. (2020). Use your brain! Arithmetic 3PC for any modulus with active security. In Y. T. Kalai, A. D. Smith & D. Wichs (Eds.), 1st Conference on Information-Theoretic Cryptography (ITC 2020) Article 5 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ITC.2020.5
Baum, C., Cozzo, D. & P. Smart, N. (2020). Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. In K. G. Paterson & D. Stebila (Eds.), Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers: 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers (pp. 274-302). Springer. https://doi.org/10.1007/978-3-030-38471-5_12
Nielsen, B. B. & Møller, A. (2020). Value Partitioning: A Lightweight Approach to Relational Static Analysis for JavaScript. In 34th European Conference on Object-Oriented Programming, ECOOP 2020 Article 16 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ECOOP.2020.16
Kaspersen, M. H. & Bilstrup, K.-E. K. (2020). VotestratesML: Social Studies as a Vehicle for Teaching Machine Learning. In B. Tangney, J. R. Byrne & C. Girvan (Eds.), Proceedings of the 2020 Constructionism Conference (pp. 44-45)
Mathiasen, A., Hvilshøj, F., Jørgensen, J. R., Nasery, A. & Mottin, D. (2020). What if Neural Networks had SVDs? In H. Larochelle, M. Ranzato, R. Hadsell, M. F. Balcan & H. Lin (Eds.), Advances in Neural Information Processing Systems 33 pre-proceedings (NeurIPS 2020)
Lyle, P., Korsgaard, H. & Bødker, S. (2020). What's in an Ecology? A Review of Artifact, Communicative, Device and Information Ecologies. In NordiCHI '20: Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society (pp. 1-14). Article 88 Association for Computing Machinery. https://doi.org/10.1145/3419249.3420185
Bødker, S., Lewkowicz, M. & Boden, A. (2020). What's in a word? Platforms Supporting the Platform Economy. In NordiCHI '20: Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society Article 87 Association for Computing Machinery. https://doi.org/10.1145/3419249.3420167
Ciosici, M. R. & Assent, I. (2019). Abbreviation Explorer - an interactive system for pre-evaluation of Unsupervised Abbreviation Disambiguation. In W. Ammar, A. Louis & N. Mostafazadeh (Eds.), NAACL HLT 2019 - 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies - Proceedings of the Demonstrations Session (pp. 1-5). Association for Computational Linguistics. https://aclweb.org/anthology/papers/N/N19/N19-4001/
Gregersen, S. O., Thomsen, S. E. & Askarov, A. (2019). A Dependently Typed Library for Static Information-Flow Control in IDRIS. In F. Nielson & D. Sands (Eds.), Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings (pp. 51-75). Springer. https://doi.org/10.1007/978-3-030-17138-4_3
Jiang, S. & Larsen, K. G. (2019). A Faster External Memory Priority Queue with DecreaseKeys. In T. M. Chan (Ed.), Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms (Vol. PRDA19, pp. 1331-1343). Society for Industrial and Applied Mathematics. https://epubs.siam.org/doi/pdf/10.1137/1.9781611975482.81
Abdolmaleki, B., Khoshakhlagh, H. & Slamanig, D. (2019). A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing. In M. Albrecht (Ed.), Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings (pp. 1-21). Springer. https://doi.org/10.1007/978-3-030-35199-1_1
Ghosh, S. & Nilges, T. (2019). An algebraic approach to maliciously secure private set intersection. In Y. Ishai & V. Rijmen (Eds.), Advances in Cryptology – EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (pp. 154-185). Springer VS. https://doi.org/10.1007/978-3-030-17659-4_6
Afshani, P. (2019). A new lower bound for semigroup orthogonal range searching. In G. Barequet & Y. Wang (Eds.), 35th International Symposium on Computational Geometry, SoCG 2019 Article 3 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.SoCG.2019.3
Logins, A. & Karras, P. (2019). An Experimental Study on Network Immunization. In M. Herschel, H. Galhardas, B. Reinwald, I. Fundulaki, C. Binnig & Z. Kaoudi (Eds.), Advances in Database Technology - EDBT 2019: 22nd International Conference on Extending Database Technology, Proceedings (pp. 726-729). Article 391 openproceedings.org. https://openproceedings.org/2019/conf/edbt/EDBT19_paper_391.pdf
Hansen, K. A. & Raskin, M. (2019). A Stay-in-a-Set Game without a Stationary Equilibrium. In J. Leroux & J.-F. Raskin (Eds.), Proceedings Tenth International Symposium on Games, Automata, Logics, and Formal Verification (Vol. 305, pp. 83-90). Electronic Proceedings in Theoretical Computer Science. https://doi.org/10.4204/EPTCS.305.6
Ledo, D., Vermeulen, J., Carpendale, S., Greenberg, S., Oehlberg, L. & Boring, S. (2019). Astral: prototyping mobile and smart object interactive behaviours using familiar applications. In DIS 2019 - Proceedings of the 2019 ACM Designing Interactive Systems Conference (pp. 711-724). Association for Computing Machinery. https://doi.org/10.1145/3322276.3322329
Jansson, J., Mampentzidis, K. & Sandhya, T. P. (2019). Building a small and informative phylogenetic supertree. In K. T. Huber & D. Gusfield (Eds.), 19th International Workshop on Algorithms in Bioinformatics, WABI 2019 Article 1 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.WABI.2019.1
Jansson, J., Mampentzidis, K. & Thekkumpadan Puthiyaveedu, S. (2019). Building a Small and Informative Phylogenetic Supertree. Abstract from Workshop on Algorithms in Bioinformatics (WABI) 2019, Buffalo, New York, United States.
Jensen, K. & Nielsen, M. (2019). Carl Adam Petri: a tribute from Aarhus. In W. Reisig & G. Rozenberg (Eds.), Carl Adam Petri: ideas, personality, impact (pp. 81-84). Springer. https://doi.org/10.1007/978-3-319-96154-5_10
Bassetti, C., Sciannamblo, M., Lyle, P., Teli, M., De Paoli, S. & De Angeli, A. (2019). Co-designing for common values: creating hybrid spaces to nurture autonomous cooperation. CoDesign, 15(3), 256-271. https://doi.org/10.1080/15710882.2019.1637897
Damgård, I., Haagh, H., Nielsen, M. & Orlandi, C. (2019). Commodity-Based 2PC for Arithmetic Circuits. In M. Albrecht (Ed.), Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings (pp. 154-177). Springer. https://doi.org/10.1007/978-3-030-35199-1_8
Damgård, I., Larsen, K. G. & Nielsen, J. B. (2019). Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing. In A. Boldyreva & D. Micciancio (Eds.), Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings (Vol. II, pp. 61-84). Springer. https://doi.org/10.1007/978-3-030-26951-7_3
Jansson, J., Mampentzidis, K., Rajaby, R. & Sung, W.-K. (2019). Computing the Rooted Triplet Distance between Phylogenetic Networks. In C. J. Colbourn, R. Grossi & N. Pisanti (Eds.), Combinatorial Algorithms - 30th International Workshop, IWOCA 2019, Proceedings (pp. 290-303). Springer.
van de Pol, J. (2019). Concurrent algorithms and data structures for model checking. In W. Fokkink & R. van Glabbeek (Eds.), 30th International Conference on Concurrency Theory, CONCUR 2019 Article 4 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.CONCUR.2019.4
Van Der Berg, F. I. & Van De Pol, J. (2019). Concurrent chaining hash maps for software model checking. In C. Barrett & J. Yang (Eds.), Proceedings of the 19th Conference on Formal Methods in Computer-Aided Design, FMCAD 2019 (pp. 46-54). Article 8894279 IEEE. https://doi.org/10.23919/FMCAD.2019.8894279
Larsen, K. G. (2019). Constructive Discrepancy Minimization with Hereditary L2 Guarantees. In R. Niedermeier & C. Paul (Eds.), 36th International Symposium on Theoretical Aspects of Computer Science (STACS 2019) Article 48 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.STACS.2019.48