Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Kaspersen, M. H., Hines, S., Moore, M., Rasmussen, M. K. & Dias, M. A. (2019). Lifting Kirigami Actuators Up Where They Belong: Possibilities for SCI. In DIS 2019 - Proceedings of the 2019 ACM Designing Interactive Systems Conference (pp. 935-947). Association for Computing Machinery. https://doi.org/10.1145/3322276.3323688
Schulz, H.-J., Röhlig, M., Nonnemann, L., Aehnelt, M., Diener, H., Urban, B. & Schumann, H. (2019). Lightweight Coordination of Multiple Independent Visual Analytics Tools. In A. Kerren, C. Hurter & J. Braz (Eds.), VISIGRAPP 2019 - Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (Vol. 2, pp. 106-117). SCITEPRESS Digital Library. https://doi.org/10.5220/0007571101060117
Farhadi, A., Hajiaghayi, M. T., Larsen, K. G. & Shi, E. (2019). Lower bounds for external memory integer sorting via network coding. In M. Charikar & E. Cohen (Eds.), STOC 2019 - Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing (pp. 997-1008). Association for Computing Machinery. https://doi.org/10.1145/3313276.3316337
Jacob, R., Larsen, K. G. & Nielsen, J. B. (2019). Lower Bounds for Oblivious Data Structures. In T. M. Chan (Ed.), Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms (pp. 2439-2447). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611975482.149
Thiel, S.-K. & Lyle, P. J. (2019). Malleable Games - A Literature Review on Communities of Game Modders. In C and T 2019 - 9th International Conference on Communities and Technologies, Conference Proceedings (pp. 198-209). Association for Computing Machinery. https://doi.org/10.1145/3328320.3328393
Grønlund, A., Kamma, L., Larsen, K. G., Mathiasen, A. & Nelson, J. (2019). Margin-Based Generalization Lower Bounds for Boosted Classifiers. In H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alché-Buc, E. Fox & R. Garnett (Eds.), Advances in Neural Information Processing Systems 32 (NIPS 2019) (Vol. 32). Neural Information Processing Systems Foundation. https://arxiv.org/abs/1909.12518
Li, Y., Fan, J., Ovchinnikov, G. & Karras, P. (2019). Maximizing multifaceted network influence. In Proceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019 (pp. 446-457). Article 8731520 IEEE. https://doi.org/10.1109/ICDE.2019.00047
Timany, A. & Birkedal, L. (2019). Mechanized relational verification of concurrent programs with continuations. Proceedings of the ACM on Programming Languages , 3(ICFP), 1-28. Article 105. https://doi.org/10.1145/3341709
André, É., Bloemen, V., Petrucci, L. & Pol, J. V. D. (2019). Minimal-Time Synthesis for Parametric Timed Automata. In L. Zhang & T. Vojnar (Eds.), Tools and Algorithms for the Construction and Analysis of Systems - 25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings: 25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings (Vol. II, pp. 211-228). Springer. https://doi.org/10.1007/978-3-030-17465-1_12
Møller, A. & Torp, M. T. (2019). Model-based testing of breaking changes in Node.js libraries. In S. Apel, M. Dumas, A. Russo & D. Pfahl (Eds.), ESEC/FSE 2019 - Proceedings of the 2019 27th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 409-419). Association for Computing Machinery. https://doi.org/10.1145/3338906.3338940
Bloemen, V., Duret-Lutz, A. & van de Pol, J. (2019). Model checking with generalized Rabin and Fin-less automata. International Journal on Software Tools for Technology Transfer, 21(3), 307-324. https://doi.org/10.1007/s10009-019-00508-4
Logins, A., Karras, P. & Jensen, C. S. (2019). Multicapacity facility selection in networks. In Proceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019 (pp. 794-805). Article 8731341 IEEE. https://doi.org/10.1109/ICDE.2019.00076
Dijk, T. V., Meijer, J. & van de Pol, J. (2019). Multi-core On-The-Fly Saturation. In Tools and Algorithms for the Construction and Analysis of Systems - 25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings (pp. 58-75). Springer. https://doi.org/10.1007/978-3-030-17465-1_4
Nielsen, B. B., Hassanshahi, B. & Gauthier, F. (2019). Nodest: Feedback-driven static analysis of Node.js applications. In S. Apel, M. Dumas, A. Russo & D. Pfahl (Eds.), ESEC/FSE 2019 - Proceedings of the 2019 27th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 455-465). Association for Computing Machinery. https://doi.org/10.1145/3338906.3338933
Eskildsen, S., Iranzo, A., Stokholm, M., Staer, K., Ostergaard, K., Eroles, M., Otto, M., Svendsen, K., Pla, A., Vilas, D., Borghammer, P., Santamaria, J., Moller, A., Gaig, C., Brooks, D., Tolosa, E., Ostergaard, L. & Pavese, N. (2019). Occurrence of brain capillary dysfunction in patients with REM sleep behavior disorder. S786-S787. Abstract from International Congress of Parkinson's Disease and Movement Disorders, Nice, France.
Angelini, M., May, T., Santucci, G. & Schulz, H.-J. (2019). On Quality Indicators for Progressive Visual Analytics. In EuroVA 2019 - EuroVis Workshop on Visual Analytics (pp. 25-29). Eurographics Association. https://doi.org/10.2312/eurova.20191120
Berthelsen, M. L. T. & Hansen, K. A. (2019). On the Computational Complexity of Decision Problems About Multi-player Nash Equilibria. In D. Fotakis & E. Markakis (Eds.), Algorithmic Game Theory - 12th International Symposium, SAGT 2019, Proceedings (pp. 153-167). Springer VS. https://doi.org/10.1007/978-3-030-30473-7_11
Abe, M., Camenisch, J., Dowsley, R. & Dubovitskaya, M. (2019). On the Impossibility of Structure-Preserving Deterministic Primitives. Journal of Cryptology, 32(1), 239-264. https://doi.org/10.1007/s00145-018-9292-1
Grønlund, A., Larsen, K. G. & Mathiasen, A. (2019). Optimal Minimal Margin Maximization with Boosting. In K. Chaudhuri & R. Salakhutdinov (Eds.), 36th International Conference on Machine Learning, ICML 2019 (Vol. 97, pp. 4392-4401). International Machine Learning Society (IMLS). http://proceedings.mlr.press/v97/mathiasen19a/mathiasen19a.pdf
Raskin, M. & Simkin, M. (2019). Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead. In S. D. Galbraith & S. Moriai (Eds.), Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings: 25th International Conference on the Theory and Application of Cryptology and Information Security Kobe, Japan, December 8–12, 2019 Proceedings (Vol. II, pp. 537-563). Springer. https://doi.org/10.1007/978-3-030-34621-8_19
Piras, E. M., Cabitza, F., Lewkowicz, M. & Bannon, L. (2019). Personal Health Records and Patient-Oriented Infrastructures: Building Technology, Shaping (New) Patients, and Healthcare Practitioners. Computer Supported Cooperative Work: CSCW: An International Journal, 28(6), 1001-1009. https://doi.org/10.1007/s10606-019-09364-x
Safavi, T., Belth, C., Faber, L., Mottin, D., Müller, E. & Koutra, D. (2019). Personalized Knowledge Graph Summarization: From the Cloud to Your Pocket. 528-537. Paper presented at IEEE International Conference on Data Mining, Beijing, China. https://web.eecs.umich.edu/~dkoutra/papers/19_ICDM_GLIMPSE-CR.pdf
Agarwal, A., Dowsley, R., McKinney, N. D., Wu, D., Lin, C. T., Cock, M. D. & Nascimento, A. (2019). Privacy-Preserving Linear Regression for Brain-Computer Interface Applications. In Y. Song, B. Liu, K. Lee, N. Abe, C. Pu, M. Qiao, N. Ahmed, D. Kossmann, J. Saltz, J. Tang, J. He, H. Liu & X. Hu (Eds.), Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018 (pp. 5277-5278). Article 8621861 IEEE. https://doi.org/10.1109/BigData.2018.8621861
Fritchman, K., Saminathan, K., Dowsley, R., Hughes, T., De Cock, M., Nascimento, A. & Teredesai, A. (2019). Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare. In Y. Song, B. Liu, K. Lee, N. Abe, C. Pu, M. Qiao, N. Ahmed, D. Kossmann, J. Saltz, J. Tang, J. He, H. Liu & X. Hu (Eds.), Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018 (pp. 2413-2422). Article 8622627 IEEE. https://doi.org/10.1109/BigData.2018.8622627
Bhagat, S., Saminathan, K., Agarwal, A., Dowsley, R., De Cock, M. & Nascimento, A. (2019). Privacy-Preserving User Profiling with Facebook Likes. In Y. Song, B. Liu, K. Lee, N. Abe, C. Pu, M. Qiao, N. Ahmed, D. Kossmann, J. Saltz, J. Tang, J. He, H. Liu & X. Hu (Eds.), Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018 (pp. 5298-5299). Article 8622081 IEEE. https://doi.org/10.1109/BigData.2018.8622081
Bouros, P., Assent, I., Jeppesen, J. H. & Toftegaard, T. S. (2019). Processing satellite imagery for decision-making in precision agriculture. In P. Papotti (Ed.), Proceedings of the Workshops of the EDBT/ICDT 2019 Joint Conference (EDBT/ICDT 2019) Sun Site Central Europe. https://bigvis.imsi.athenarc.gr/bigvis2019/papers/BigVis_2019_paper_4.pdf
Pedersen, M. & Chong, S. (2019). Programming with Flow-Limited Authorization: Coarser is Better. In Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019 (pp. 63-78). Article 8806736 IEEE. https://doi.org/10.1109/EuroSP.2019.00015
Ganesh, C., Orlandi, C. & Tschudi, D. (2019). Proof-of-Stake Protocols for Privacy-Aware Blockchains. In Y. Ishai & V. Rijmen (Eds.), Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (pp. 690-719). Springer. https://doi.org/10.1007/978-3-030-17653-2_23
Damgård, I. B., Ganesh, C. & Orlandi, C. (2019). Proofs of Replicated Storage Without Timing Assumptions. In Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings (pp. 355-380). Springer. https://doi.org/10.1007/978-3-030-26948-7_13
Agarwal, A., Dowsley, R., McKinney, N. D., Wu, D., Lin, C.-T., De Cock, M. & Nascimento, A. C. A. (2019). Protecting Privacy of Users in Brain-Computer Interface Applications. IEEE Transactions on Neural Systems and Rehabilitation Engineering, 27(8), 1546-1555. https://doi.org/10.1109/TNSRE.2019.2926965
Grønbæk, J. E., Linding, C., Kromann, A., Jensen, T. F. H. & Petersen, M. G. (2019). Proxemics play: Exploring the interplay between mobile devices and interiors. In DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (pp. 177-181). Association for Computing Machinery. https://doi.org/10.1145/3301019.3323886
Ateniese, G., Francati, D., Magri, B. & Venturi, D. (2019). Public immunization against complete subversion without random oracles. In R. H. Deng, V. Gauthier-Umanã, M. Ochoa & M. Yung (Eds.), Applied Cryptography and Network Security (pp. 465-485). Springer. https://doi.org/10.1007/978-3-030-21568-2_23
Lyle, P. J. & Kannabiran, G. (2019). Public Outcomes of Publicly Funded Socio-Technical Projects: Reflections on Empowerment, Participation, and Researcher Responsibility. In J. E. Fischer, S. Martindale, M. Porcheron, S. Reeves & J. Spence (Eds.), HTTF 2019: : Proceedings of the Halfway to the Future Symposium 2019 (2019 ed., pp. 1-3). Article 3363480 Association for Computing Machinery. https://doi.org/10.1145/3363384.3363480
Ciosici, M. R., Derczynski, L. & Assent, I. (2019). Quantifying the morphosyntactic content of Brown Clusters. In J. Burstein, C. Doran & T. Solorio (Eds.), Long and Short Papers: Human Language Technologies (Vol. 1, pp. 1541-1550). Association for Computational Linguistics. https://aclweb.org/anthology/papers/N/N19/N19-1157/
Spiel, K., Walker, A. M., DeVito, M. A., Birnholtz, J., Barlas, P., Ahmed, A., Brubaker, J. R., Keyes, O., Brulé, E., Light, A., Hardy, J., Rode, J. A. & Kannabiran, G. (2019). Queer(ing) HCI: Moving forward in theory and practice. In CHI EA 2019 - Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems Article 3311750 Association for Computing Machinery. https://doi.org/10.1145/3290607.3311750
Fauzi, P. M., Meiklejohn, S., Mercer, R. H. & Orlandi, C. (2019). Quisquis: A New Design for Anonymous Cryptocurrencies. In Advances in Cryptology – ASIACRYPT 2019 (pp. 649-678) https://doi.org/10.1007/978-3-030-34578-5
Deuber, D., Magri, B. & Thyagarajan, S. A. K. (2019). Redactable blockchain in the permissionless setting. In Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019 (pp. 124-138). Article 8835372 IEEE. https://doi.org/10.1109/SP.2019.00039
Avram, G., Choi, J. H. J., De Paoli, S., Light, A., Lyle, P. & Teli, M. (2019). Repositioning CoDesign in the age of platform capitalism: from sharing to caring. CoDesign, 15(3), 185-191. https://doi.org/10.1080/15710882.2019.1638063
Hogräfer, M. & Schulz, H.-J. (2019). ReVize: A Library for Visualization Toolchaining with Vega-Lite. In Italian Chapter Conference 2019 - Smart Tools and Apps in computer Graphics, STAG 2019 (pp. 129-139). Eurographics Association. https://doi.org/10.2312/stag.20191375
Blazy, O., Bossuat, A., Bultel, X., Fouque, P. A., Onete, C. & Pagnin, E. (2019). SAID: Reshaping signal into an identity-based asynchronous messaging protocol with authenticated ratcheting. In Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019 (pp. 294-309). Article 8806729 IEEE. https://doi.org/10.1109/EuroSP.2019.00030