Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Nielsen, B. B., Hassanshahi, B. & Gauthier, F. (2019). Nodest: Feedback-driven static analysis of Node.js applications. In S. Apel, M. Dumas, A. Russo & D. Pfahl (Eds.), ESEC/FSE 2019 - Proceedings of the 2019 27th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 455-465). Association for Computing Machinery. https://doi.org/10.1145/3338906.3338933
Eskildsen, S., Iranzo, A., Stokholm, M., Staer, K., Ostergaard, K., Eroles, M., Otto, M., Svendsen, K., Pla, A., Vilas, D., Borghammer, P., Santamaria, J., Moller, A., Gaig, C., Brooks, D., Tolosa, E., Ostergaard, L. & Pavese, N. (2019). Occurrence of brain capillary dysfunction in patients with REM sleep behavior disorder. S786-S787. Abstract from International Congress of Parkinson's Disease and Movement Disorders, Nice, France.
Angelini, M., May, T., Santucci, G. & Schulz, H.-J. (2019). On Quality Indicators for Progressive Visual Analytics. In EuroVA 2019 - EuroVis Workshop on Visual Analytics (pp. 25-29). Eurographics Association. https://doi.org/10.2312/eurova.20191120
Berthelsen, M. L. T. & Hansen, K. A. (2019). On the Computational Complexity of Decision Problems About Multi-player Nash Equilibria. In D. Fotakis & E. Markakis (Eds.), Algorithmic Game Theory - 12th International Symposium, SAGT 2019, Proceedings (pp. 153-167). Springer VS. https://doi.org/10.1007/978-3-030-30473-7_11
Abe, M., Camenisch, J., Dowsley, R. & Dubovitskaya, M. (2019). On the Impossibility of Structure-Preserving Deterministic Primitives. Journal of Cryptology, 32(1), 239-264. https://doi.org/10.1007/s00145-018-9292-1
Grønlund, A., Larsen, K. G. & Mathiasen, A. (2019). Optimal Minimal Margin Maximization with Boosting. In K. Chaudhuri & R. Salakhutdinov (Eds.), 36th International Conference on Machine Learning, ICML 2019 (Vol. 97, pp. 4392-4401). International Machine Learning Society (IMLS). http://proceedings.mlr.press/v97/mathiasen19a/mathiasen19a.pdf
Raskin, M. & Simkin, M. (2019). Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead. In S. D. Galbraith & S. Moriai (Eds.), Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings: 25th International Conference on the Theory and Application of Cryptology and Information Security Kobe, Japan, December 8–12, 2019 Proceedings (Vol. II, pp. 537-563). Springer. https://doi.org/10.1007/978-3-030-34621-8_19
Piras, E. M., Cabitza, F., Lewkowicz, M. & Bannon, L. (2019). Personal Health Records and Patient-Oriented Infrastructures: Building Technology, Shaping (New) Patients, and Healthcare Practitioners. Computer Supported Cooperative Work: CSCW: An International Journal, 28(6), 1001-1009. https://doi.org/10.1007/s10606-019-09364-x
Safavi, T., Belth, C., Faber, L., Mottin, D., Müller, E. & Koutra, D. (2019). Personalized Knowledge Graph Summarization: From the Cloud to Your Pocket. 528-537. Paper presented at IEEE International Conference on Data Mining, Beijing, China. https://web.eecs.umich.edu/~dkoutra/papers/19_ICDM_GLIMPSE-CR.pdf
Agarwal, A., Dowsley, R., McKinney, N. D., Wu, D., Lin, C. T., Cock, M. D. & Nascimento, A. (2019). Privacy-Preserving Linear Regression for Brain-Computer Interface Applications. In Y. Song, B. Liu, K. Lee, N. Abe, C. Pu, M. Qiao, N. Ahmed, D. Kossmann, J. Saltz, J. Tang, J. He, H. Liu & X. Hu (Eds.), Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018 (pp. 5277-5278). Article 8621861 IEEE. https://doi.org/10.1109/BigData.2018.8621861
Fritchman, K., Saminathan, K., Dowsley, R., Hughes, T., De Cock, M., Nascimento, A. & Teredesai, A. (2019). Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare. In Y. Song, B. Liu, K. Lee, N. Abe, C. Pu, M. Qiao, N. Ahmed, D. Kossmann, J. Saltz, J. Tang, J. He, H. Liu & X. Hu (Eds.), Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018 (pp. 2413-2422). Article 8622627 IEEE. https://doi.org/10.1109/BigData.2018.8622627
Bhagat, S., Saminathan, K., Agarwal, A., Dowsley, R., De Cock, M. & Nascimento, A. (2019). Privacy-Preserving User Profiling with Facebook Likes. In Y. Song, B. Liu, K. Lee, N. Abe, C. Pu, M. Qiao, N. Ahmed, D. Kossmann, J. Saltz, J. Tang, J. He, H. Liu & X. Hu (Eds.), Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018 (pp. 5298-5299). Article 8622081 IEEE. https://doi.org/10.1109/BigData.2018.8622081
Bouros, P., Assent, I., Jeppesen, J. H. & Toftegaard, T. S. (2019). Processing satellite imagery for decision-making in precision agriculture. In P. Papotti (Ed.), Proceedings of the Workshops of the EDBT/ICDT 2019 Joint Conference (EDBT/ICDT 2019) Sun Site Central Europe. https://bigvis.imsi.athenarc.gr/bigvis2019/papers/BigVis_2019_paper_4.pdf
Pedersen, M. & Chong, S. (2019). Programming with Flow-Limited Authorization: Coarser is Better. In Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019 (pp. 63-78). Article 8806736 IEEE. https://doi.org/10.1109/EuroSP.2019.00015
Ganesh, C., Orlandi, C. & Tschudi, D. (2019). Proof-of-Stake Protocols for Privacy-Aware Blockchains. In Y. Ishai & V. Rijmen (Eds.), Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (pp. 690-719). Springer. https://doi.org/10.1007/978-3-030-17653-2_23
Damgård, I. B., Ganesh, C. & Orlandi, C. (2019). Proofs of Replicated Storage Without Timing Assumptions. In Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings (pp. 355-380). Springer. https://doi.org/10.1007/978-3-030-26948-7_13
Agarwal, A., Dowsley, R., McKinney, N. D., Wu, D., Lin, C.-T., De Cock, M. & Nascimento, A. C. A. (2019). Protecting Privacy of Users in Brain-Computer Interface Applications. IEEE Transactions on Neural Systems and Rehabilitation Engineering, 27(8), 1546-1555. https://doi.org/10.1109/TNSRE.2019.2926965
Grønbæk, J. E., Linding, C., Kromann, A., Jensen, T. F. H. & Petersen, M. G. (2019). Proxemics play: Exploring the interplay between mobile devices and interiors. In DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (pp. 177-181). Association for Computing Machinery. https://doi.org/10.1145/3301019.3323886
Ateniese, G., Francati, D., Magri, B. & Venturi, D. (2019). Public immunization against complete subversion without random oracles. In R. H. Deng, V. Gauthier-Umanã, M. Ochoa & M. Yung (Eds.), Applied Cryptography and Network Security (pp. 465-485). Springer. https://doi.org/10.1007/978-3-030-21568-2_23
Lyle, P. J. & Kannabiran, G. (2019). Public Outcomes of Publicly Funded Socio-Technical Projects: Reflections on Empowerment, Participation, and Researcher Responsibility. In J. E. Fischer, S. Martindale, M. Porcheron, S. Reeves & J. Spence (Eds.), HTTF 2019: : Proceedings of the Halfway to the Future Symposium 2019 (2019 ed., pp. 1-3). Article 3363480 Association for Computing Machinery. https://doi.org/10.1145/3363384.3363480
Ciosici, M. R., Derczynski, L. & Assent, I. (2019). Quantifying the morphosyntactic content of Brown Clusters. In J. Burstein, C. Doran & T. Solorio (Eds.), Long and Short Papers: Human Language Technologies (Vol. 1, pp. 1541-1550). Association for Computational Linguistics. https://aclweb.org/anthology/papers/N/N19/N19-1157/
Spiel, K., Walker, A. M., DeVito, M. A., Birnholtz, J., Barlas, P., Ahmed, A., Brubaker, J. R., Keyes, O., Brulé, E., Light, A., Hardy, J., Rode, J. A. & Kannabiran, G. (2019). Queer(ing) HCI: Moving forward in theory and practice. In CHI EA 2019 - Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems Article 3311750 Association for Computing Machinery. https://doi.org/10.1145/3290607.3311750
Fauzi, P. M., Meiklejohn, S., Mercer, R. H. & Orlandi, C. (2019). Quisquis: A New Design for Anonymous Cryptocurrencies. In Advances in Cryptology – ASIACRYPT 2019 (pp. 649-678) https://doi.org/10.1007/978-3-030-34578-5
Deuber, D., Magri, B. & Thyagarajan, S. A. K. (2019). Redactable blockchain in the permissionless setting. In Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019 (pp. 124-138). Article 8835372 IEEE. https://doi.org/10.1109/SP.2019.00039
Avram, G., Choi, J. H. J., De Paoli, S., Light, A., Lyle, P. & Teli, M. (2019). Repositioning CoDesign in the age of platform capitalism: from sharing to caring. CoDesign, 15(3), 185-191. https://doi.org/10.1080/15710882.2019.1638063
Hogräfer, M. & Schulz, H.-J. (2019). ReVize: A Library for Visualization Toolchaining with Vega-Lite. In Italian Chapter Conference 2019 - Smart Tools and Apps in computer Graphics, STAG 2019 (pp. 129-139). Eurographics Association. https://doi.org/10.2312/stag.20191375
Blazy, O., Bossuat, A., Bultel, X., Fouque, P. A., Onete, C. & Pagnin, E. (2019). SAID: Reshaping signal into an identity-based asynchronous messaging protocol with authenticated ratcheting. In Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019 (pp. 294-309). Article 8806729 IEEE. https://doi.org/10.1109/EuroSP.2019.00030
Rasmussen, T. A. & Huang, W. (2019). SceneCam: Using AR to improve multi-camera remote collaboration. In SIGGRAPH Asia 2019 XR, SA 2019 (pp. 36-37). Association for Computing Machinery. https://doi.org/10.1145/3355355.3361892
Neerbek, J., Dolog, P. & Assent, I. (2019). Selective Training: A Strategy for Fast Backpropagation on Sentence Embeddings. In Q. Yang, M.-L. Zhang, Z. Gong, S.-J. Huang & Z.-H. Zhou (Eds.), Advances in Knowledge Discovery and Data Mining - 23rd Pacific-Asia Conference, PAKDD 2019, Proceedings: PAKDD '19 (pp. 40-53). Springer. https://doi.org/10.1007/978-3-030-16142-2_4
Branzei, S., Orlandi, C. & Yang, G. (2019). Sharing Information with Competitors. In D. Fotakis & E. Markakis (Eds.), Algorithmic Game Theory - 12th International Symposium, SAGT 2019, Proceedings: SAGT 2019 (pp. 34-48). Springer. https://doi.org/10.1007/978-3-030-30473-7
Bressa, N. A., Wannamaker, K., Korsgaard, H., Willett, W. & Vermeulen, J. (2019). Sketching and Ideation Activities for Situated Visualization Design. In DIS 2019 - Proceedings of the 2019 ACM Designing Interactive Systems Conference (pp. 173-185). Association for Computing Machinery. https://doi.org/10.1145/3322276.3322326
Bressa, N. A. & Vermeulen, J. (2019). Sketching for Immersive Analytics with Situated Visualizations. Paper presented at The 2019 ACM CHI Conference on Human Factors in Computing Systems (CHI'19), Glasgow, United Kingdom. https://immersiveanalytics456268596.files.wordpress.com/2019/04/bressa.pdf
Meijer, J. & van de Pol, J. (2019). Sound black-box checking in the LearnLib. Innovations in Systems and Software Engineering, 15(3-4), 267-287. https://doi.org/10.1007/s11334-019-00342-6
Fender, A. & Müller, J. (2019). SpaceState: Ad-Hoc Definition and Recognition of Hierarchical Room States for Smart Environments. In ISS 2019 - Proceedings of the 2019 ACM International Conference on Interactive Surfaces and Spaces (pp. 303-314). Association for Computing Machinery. https://doi.org/10.1145/3343055.3359715
Tsitsulin, A., Mottin, D., Karras, P., Bronstein, A. & Müller, E. (2019). Spectral graph complexity. In L. Liu & R. White (Eds.), The Web Conference 2019 - Companion of the World Wide Web Conference, WWW 2019 (pp. 308-309). Association for Computing Machinery. https://doi.org/10.1145/3308560.3316589
Stein, B., Nielsen, B. B., Chang, B.-Y. E. & Møller, A. (2019). Static Analysis with Demand-driven Value Refinement. Proceedings of the ACM on Programming Languages , 3(OOPSLA), Article 140. https://doi.org/10.1145/3360566
Pedersen, M. & Askarov, A. (2019). Static Enforcement of Security in Runtime Systems. In Proceedings - 2019 IEEE 32nd Computer Security Foundations Symposium, CSF 2019 (pp. 335-350). Article 8823712 IEEE. https://doi.org/10.1109/CSF.2019.00030
Aggarwal, D., Damgård, I., Nielsen, J. B., Obremski, M., Purwanto, E., Ribeiro, J. & Simkin, M. (2019). Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In A. Boldyreva & D. Micciancio (Eds.), Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Vol. II, pp. 510-539). Springer. https://doi.org/10.1007/978-3-030-26951-7_18
Avdic, M. & Vermeulen, J. (2019). Studying Breakdowns in Interactions with Smart Speakers. Paper presented at The 2019 ACM CHI Conference on Human Factors in Computing Systems (CHI'19), Glasgow, United Kingdom. https://iotdirections.wordpress.com/