Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Shao, J., Tan, Y., Gao, L., Yang, Q., Plant, C. & Assent, I. (2019). Synchronization-based clustering on evolving data stream. Information Sciences, 501, 573-587. https://doi.org/10.1016/j.ins.2018.09.035
Rasmussen, T. A. & Grønbæk, K. (2019). Tailorable remote assistance with RemoteAssistKit: A study of and design response to remote assistance in the manufacturing industry. In H. Nakanishi, H. Egi, I.-A. Chounta, H. Takada, S. Ichimura & U. Hoppe (Eds.), Collaboration Technologies and Social Computing - 25th International Conference, CRIWG+CollabTech 2019, Proceedings: 25th International Conference, CRIWG+CollabTech 2019 Kyoto, Japan, September 4–6, 2019 Proceedings (pp. 80-95). Springer. https://doi.org/10.1007/978-3-030-28011-6_6
Ghosh, S. & Simkin, M. (2019). The Communication Complexity of Threshold Private Set Intersection. In A. Boldyreva & D. Micciancio (Eds.), Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Vol. II, pp. 3-29). Springer. https://doi.org/10.1007/978-3-030-26951-7_1
Vermeulen, J., Lim, B. Y., Avdic, M., Wang, D. & Abdul, A. (2019). The Curious Case of Providing Intelligibility for Smart Speakers. Abstract from The 2019 ACM CHI Conference on Human Factors in Computing Systems (CHI'19), Glasgow, United Kingdom.
Micallef, L., Schulz, H.-J., Angelini, M., Aupetit, M., Chang, R., Kohlhammer, J., Perer, A. & Santucci, G. (2019). The Human User in Progressive Visual Analytics. In EuroVis 2019 - Short Papers (pp. 19-23). Eurographics Association. https://doi.org/10.2312/evs.20191164
Afshani, P., Agrawal, M., Doerr, B., Doerr, C., Larsen, K. G. & Mehlhorn, K. (2019). The query complexity of a permutation-based variant of Mastermind. Discrete Applied Mathematics, 260, 28-50. https://doi.org/10.1016/j.dam.2019.01.007
Aranha, D. F. & Pagnin, E. (2019). The simplest multi-key linearly homomorphic signature scheme. In P. Schwabe & N. Thériault (Eds.), Progress in Cryptology – LATINCRYPT 2019 (pp. 280-300). Springer. https://doi.org/10.1007/978-3-030-30530-7_14
Christensen, P. K., Skovgaard, C. Ø. & Petersen, M. G. (2019). Together together: Combining shared and separate activities in designing technology for family life. In Proceedings of the 18th ACM International Conference on Interaction Design and Children, IDC 2019 (pp. 374-385). Association for Computing Machinery. https://doi.org/10.1145/3311927.3323141
Pagnin, E., Gunnarsson, G., Talebi, P., Orlandi, C. & Sabelfeld, A. (2019). TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing. Proceedings on Privacy Enhancing Technologies, 2019(4), 93-111. https://doi.org/10.2478/popets-2019-0060
Thiel, S.-K., Remy, C., Roque, L., Orji, R., Dalsgaard, P., Latulipe, C. & Sarcar, S. (2019). Towards a Research Agenda for Gameful Creativity. In DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (pp. 393-396). Association for Computing Machinery. https://doi.org/10.1145/3301019.3320003
Li, Y., Tan, T. & Xue, J. (2019). Understanding and analyzing Java reflection. ACM Transactions on Software Engineering and Methodology, 28(2), Article 7. https://doi.org/10.1145/3295739
Van Oosterhout, A. (2019). Understanding the benefits and drawbacks of shape change in contrast or addition to other modalities. In DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (pp. 113-116). Association for Computing Machinery. https://doi.org/10.1145/3301019.3324875
Bardam, S. K., Mathisen, A., Rädle, R., Klokmose, C. N. & Elmqvist, N. (2019). Vistrates: A Component Model for Ubiquitous Analytics. IEEE Transactions on Visualization and Computer Graphics, 25(1), 586-596. Article 8440803. https://doi.org/10.1109/TVCG.2018.2865144
Horak, T., Mathisen, A., Klokmose, C. N., Dachselt, R. & Elmqvist, N. (2019). Vistribute: Distributing Interactive Visualizations in Dynamic Multi-Device Setups. In CHI 2019 - Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems Article 616 Association for Computing Machinery. https://doi.org/10.1145/3290605.3300846
David, B., Dowsley, R. & Larangeira, M. (2018). 21 - Bringing down the complexity: Fast composable protocols for card games without secret state. In W. Susilo & G. Yang (Eds.), Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings (pp. 45-63). Springer. https://doi.org/10.1007/978-3-319-93638-3_4
Jordan, V. E., Walker, J. A., Beckstrom, T. O., Steely, C. J., McDaniel, C. L., St Romain, C. P., The Baboon Genome Analysis Consortium, Worley, K. C., Phillips-Conroy, J., Jolly, C. J., Rogers, J., Konkel, M. K. & Batzer, M. A. (2018). A computational reconstruction of Papio phylogeny using Alu insertion polymorphisms. Mobile DNA, 9(1), Article 13. https://doi.org/10.1186/s13100-018-0118-3
Bertelsen, O. W. (2018). Against Boredom: The Demonic Pantheism in Design. In J. Bardzell, S. Berdzell & M. Blythe (Eds.), Critical Theory and Interaction Design (pp. 81-94). MIT Press.
Timany, A., Stefanesco, L., Krogh-Jespersen, M. & Birkedal, L. (2018). A Logical Relation for Monadic Encapsulation of State: Proving contextual equivalences in the presence of runST. In Proceedings of the ACM on Programming Languages (Vol. 2, pp. 64:00-64:28). Association for Computing Machinery. https://doi.org/10.1145/3158152
Afshani, P., De Berg, M., Casanova, H., Karsin, B., Lambrechts, C., Sitchinava, N. & Tsirogiannis, C. (2018). An efficient algorithm for the 1D total visibility-index problem and its parallelization. ACM Journal of Experimental Algorithmics, 23, Article 2.3. https://doi.org/10.1145/3209685
Jensen, M. M. & Aagaard, J. (2018). A Postphenomenological Method for HCI Research. In Proceedings of the 30th Australian Computer-Human Interaction Conference, OzCHI 2018: OzCHI 2018 (pp. 242-251). Association for Computing Machinery. https://doi.org/10.1145/3292147.3292170
Angelini, M., Santucci, G., Schumann, H. & Schulz, H.-J. (2018). A Review and Characterization of Progressive Visual Analytics. Informatics, 5(3), Article 31. https://doi.org/10.3390/informatics5030031
Badertscher, C., Garay, J., Maurer, U., Tschudi, D. & Zikas, V. (2018). But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin. In J. Buus Nielsen (Ed.), Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings (Vol. 10821, pp. 34-65). Springer VS. https://doi.org/10.1007/978-3-319-78375-8_2
Dalskov, A. P. K. & Orlandi, C. (2018). Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security. In J. Kim, G.-J. Ahn & S. Kim (Eds.), ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security (pp. 343-355). Association for Computing Machinery. https://doi.org/10.1145/3196494.3196547
Mathisen, A. & Grønbæk, K. (2018). Clear Visual Separation of Temporal Event Sequences. In 2017 IEEE Visualization in Data Science, VDS 2017 (pp. 7-14). Article 8573439 IEEE. https://doi.org/10.1109/VDS.2017.8573439
Ciampi, M. & Orlandi, C. (2018). Combining Private Set-Intersection with Secure Two-Party Computation. In D. Catalano & R. De Prisco (Eds.), Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings (Vol. 11035, pp. 464-482). Springer VS. https://doi.org/10.1007/978-3-319-98113-0
Dowsley, R., Lacerda, F. & Nascimento, A. C. A. (2018). Commitment and Oblivious Transfer in the Bounded Storage Model with Errors. IEEE Transactions on Information Theory, 64(8), 5970-5984. https://doi.org/10.1109/TIT.2018.2796128
Damgård, I., Luo, J., Oechsner, S., Scholl, P. & Simkin, M. (2018). Compact Zero-Knowledge Proofs of Small Hamming Weight. In M. Abdalla & R. Dahab (Eds.), Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Vol. 10770, pp. 530-560). Springer VS. https://doi.org/10.1007/978-3-319-76581-5_18
Karbyshev, A., Svendsen, K., Askarov, A. & Birkedal, L. (2018). Compositional Non-interference for Concurrent Programs via Separation and Framing. In L. Bauer & R. Küsters (Eds.), Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Vol. 10804, pp. 53-78). Springer VS. https://doi.org/10.1007/978-3-319-89722-6_3
Hansen, K. A. & Lund, T. B. (2018). Computational Complexity of Proper Equilibrium. In É. Tardos, E. Elkind & R. Vohra (Eds.), ACM EC 2018 - Proceedings of the 2018 ACM Conference on Economics and Computation (pp. 113-130). Association for Computing Machinery. https://doi.org/10.1145/3219166.3219199