Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018). Computer-Aided Proofs for Multiparty Computation with Active Security. In Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Vol. 2018, pp. 119-131). Article 8429300 IEEE. https://doi.org/10.1109/CSF.2018.00016
Arge, L., Shin, Y. & Tsirogiannis, C. (2018). Computing Floods Caused by Non-Uniform Sea-Level Rise. In R. Pagh & S. Venkatasubramanian (Eds.), 2018 Proceedings of the 20th Workshop on Algorithm Engineering and Experiments, ALENEX 2018 (pp. 97-108). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611975055.9
Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E. (2018). Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). In T. Peyrin & S. Galbraith (Eds.), Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. 11274, pp. 86-117). Springer VS. https://doi.org/10.1007/978-3-030-03332-3_4
Faonio, A., Nielsen, J. B., Simkin, M. & Venturi, D. (2018). Continuously Non-malleable Codes with Split-State Refresh. In B. Preneel & F. Vercauteren (Eds.), Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Vol. 10892, pp. 121-139). Springer VS. https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Kazana, T., Obremski, M., Raj, V. & Siniscalchi, L. (2018). Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. In A. Beimel & S. Dziembowski (Eds.), Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Vol. 11240, pp. 225-254). Springer VS. https://doi.org/10.1007/978-3-030-03810-6_9
Larsen, K. G., Weinstein, O. & Yu, H. (2018). Crossing the Logarithmic Barrier for Dynamic Boolean Data Structure Lower Bounds. In M. Henzinger, D. Kempe & I. Diakonikolas (Eds.), STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing (pp. 978-989). Association for Computing Machinery. https://doi.org/10.1145/3188745.3188790
Christensen, H. B. (2018). Crunch: Automated Assessment of Microservice Architecture Assignments with Formative Feedback. In C. E. Cuesta, J. Perez & D. Garlan (Eds.), Software Architecture - 12th European Conference on Software Architecture, ECSA 2018, Proceedings: 12th European Conference on Software Architecture, ECSA 2018 (Vol. 11048, pp. 175-190). Springer. https://doi.org/10.1007/978-3-030-00761-4_12
Lissandrini, M., Mottin, D., Palpanas, T. & Velegrakis, Y. (2018). Data Exploration using Example-based Methods. Morgan & Claypool Publishers. Synthesis Lectures on Data Management https://doi.org/10.2200/S00881ED1V01Y201810DTM053
Knudsen, S., Vermeulen, J., Kosminsky, D., Walny, J., West, M., Frisson, C., Adriel Aseniero, B., MacDonald Vermeulen, L., Perin, C., Quach, L., Buk, P., Tabuli, K., Chopra, S., Willett, W. & Carpendale, S. (2018). Democratizing Open Energy Data for Public Discourse Using Visualization. In R. Mandryk & M. Hancock (Eds.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (pp. D406:1-D406:4). Association for Computing Machinery. https://doi.org/10.1145/3170427.3186539
Grønbæk, J. E. (2018). Designing for Interaction Proxemics: Configurations and Transitions. In CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Vol. DC08). Article DC08 Association for Computing Machinery. https://doi.org/10.1145/3170427.3173033
Neerbek, J., Assent, I. & Dolog, P. (2018). Detecting Complex Sensitive Information via Phrase Structure in Recursive Neural Networks. In D. Phung, V. S. Tseng, G. I. Webb, B. Ho, M. Ganji & L. Rashidi (Eds.), Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings: PAKDD '18 (Vol. 10939, pp. 373-385). Springer VS. https://doi.org/10.1007/978-3-319-93040-4_30
Pinder, C., Vermeulen, J., Cowan, B. R. & Beale, R. (2018). Digital Behaviour Change Interventions to Break and Form Habits. ACM Transactions on Computer-Human Interaction, 25(3), 15-15:66. Article 15. https://doi.org/10.1145/3196830
Ganesh, C., Kondi, Y., Patra, A. & Sarkar, P. (2018). Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits. In M. Abdalla & R. Dahab (Eds.), Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (pp. 499-529). Springer. https://doi.org/10.1007/978-3-319-76581-5_17
Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D. & Simkin, M. (2018). Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys. IET Information Security, 12(3), 166-183. https://doi.org/10.1049/iet-ifs.2017.0041
Höök, K., Caramiaux, B., Erkut, C., Forlizzi, J., Hajinejad, N., Haller, M., Hummels, C., Isbister, K., Jonsson, M., Khut, G., Loke, L., Lottridge, D., Marti, P., Melcer, E., Müller, F., Petersen, M. G., Schiphorst, T., Segura, E. M., Ståhl, A. ... Tobiasson, H. (2018). Embracing First-Person Perspectives in Soma-Based Design. Informatics, 5/1(8), 1-26. Article 2018,5,8. https://doi.org/10.3390/informatics5010008
Auener, S., Daugbjerg, P. S., Nielsen, K. & Sillasen, M. K. (2018). Engineering i skolen. Hvad, hvordan, hvorfor. VIA University College. https://astra.dk/sites/default/files/eis_rapport_v4_1.pdf
Chung, Y., Mortensen, M. L., Binnig, C. & Kraska, T. (2018). Estimating the impact of unknown unknowns on aggregate qery results. ACM Transactions on Database Systems, 43(1), Article 3. https://doi.org/10.1145/3167970
Remy, C., Bates, O., Dix, A., Thomas, V., Hazas, M., Friday, A. & Huang, E. M. (2018). Evaluation beyond usability: Validating sustainable HCI research. In CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Vol. 2018-April). Association for Computing Machinery. https://doi.org/10.1145/3173574.3173790
Ledo, D., Houben, S., Vermeulen, J., Marquardt, N., Oehlberg, L. & Greenberg, S. (2018). Evaluation Strategies for HCI Toolkit Research. In R. Mandryk & M. Hancock (Eds.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (pp. 36:1-36:17). Association for Computing Machinery. https://doi.org/10.1145/3173574.3173610
Scholl, P. (2018). Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs. In M. Abdalla & R. Dahab (Eds.), Public-Key Cryptography - PKC 2018 (Vol. 10769, pp. 554-583). Springer VS. https://doi.org/10.1007/978-3-319-76578-5_19
Alimadadi, S., Zhong, D., Madsen, M. & Tip, F. (2018). Finding Broken Promises in Asynchronous JavaScript Programs. Proceedings of the ACM on Programming Languages , 2(OOPSLA), 162:1-162:26. Article 162. https://doi.org/10.1145/3276532
Clouston, R. (2018). Fitch-Style Modal Lambda Calculi. In C. Baier & U. Dal Lago (Eds.), Foundations of Software Science and Computation Structures - 21st International Conference, FOSSACS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings: 21st International Conference on Foundations of Software Science and Computation Structures (FoSSaCS) (Vol. 10803, pp. 258-275). Springer. https://doi.org/10.1007/978-3-319-89366-2_14
Freksen, C. B., Kamma, L. & Larsen, K. G. (2018). Fully Understanding the Hashing Trick. 1. Poster session presented at Neural Information Processing Systems Conference, Montreal, Canada.
Thiel, S. K. (2018). Gamifying creative potential: For better or worse? In M. Ciussi (Ed.), 12th European Conference on Game Based Learning, ECGBL 2018 (pp. 915-919). Dechema e.V..
Filos-Ratsikas, A., Stiil Frederiksen, S. K., Goldberg, P. W. & Zhang, J. (2018). Hardness results for consensus-halving. In I. Potapov, J. Worrell & P. Spirakis (Eds.), 43rd International Symposium on Mathematical Foundations of Computer Science, MFCS 2018 (Vol. 117). Article 24 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.MFCS.2018.24
Agarwal, P. K., Arge, L. & Staals, F. (2018). Improved dynamic geodesic nearest neighbor searching in a simple polygon. In C. D. Toth & B. Speckmann (Eds.), 34th International Symposium on Computational Geometry, SoCG 2018 (Vol. 99, pp. 4:1-4:14). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.SoCG.2018.4
Jensen, S. Q., Fender, A. & Müller, J. (2018). Inpher: Inferring physical properties of virtual objects from mid-air interaction. In R. Mandryk & M. Hancock (Eds.), Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Vol. 2018-April). Article 530 Association for Computing Machinery. https://doi.org/10.1145/3173574.3174104
Pham, T. H., Kristensen, J., Mai, S. T., Assent, I., Jacobsen, J., Vo, B. & Le, A. (2018). Interactive Exploration of Subspace Clusters on Multicore Processors. In A. Hameurlain, R. Wagner, D. Benslimane, E. Damiani & W. I. Grosky (Eds.), Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXIX - Special Issue on Database- and Expert-Systems Applications: Special Issue on Database- and Expert-Systems Applications (Vol. 11310, pp. 169-199). Springer VS. https://doi.org/10.1007/978-3-662-58415-6_6
Thomsen, J. R., Krogh, P. G., Schnedler, J. A. & Linnet, H. (2018). Interactive interior and proxemics thresholds: Empowering participants in sensitive conversations. In CHI 2018 - Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Vol. 2018). Article 68 Association for Computing Machinery. https://doi.org/10.1145/3173574.3173642
Licata, D. R., Orton, I., Pitts, A. M. & Spitters, B. (2018, Jul 1). Internal Universes in Models of Homotopy Type Theory. arxiv.org. https://arxiv.org/abs/1801.07664
Thomas, V., Brueggemann, M. J., Wang, D., Darby, A., Wohl, B., Vermeulen, L. M. D., Bates, O. & Feldman, D. (2018). In the eye of a hurricane there is quiet, for just a moment, -. In R. Mandryk, M. Hancock, M. Perry & A. Cox (Eds.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (pp. 1-10). Article alt01 Association for Computing Machinery. https://doi.org/10.1145/3170427.3188394
Obremski, M. & Skorski, M. (2018). Inverted Leftover Hash Lemma. In 2018 IEEE International Symposium on Information Theory, ISIT 2018 (Vol. 2018-June, pp. 1834-1838). Article 8437654 IEEE. https://doi.org/10.1109/ISIT.2018.8437654
JUNG, RALF., KREBBERS, ROBBERT., JOURDAN, JACQUES.-HENRI., BIZJAK, ALEŠ., BIRKEDAL, LARS. & DREYER, DEREK. (2018). Iris from the ground up: A modular foundation for higher-order concurrent separation logic. Journal of Functional Programming, 28, 1-73. Article e20. https://doi.org/10.1017/S0956796818000151
van Oosterhout, A., Rasmussen, M. K., Hoggan, E. & Alonso, M. B. (2018). Knobology 2.0: Giving Shape to the Haptic Force Feedback of Interactive Knobs. In UIST 2018 Adjunct - Adjunct Publication of the 31st Annual ACM Symposium on User Interface Software and Technology: UIST '18 Adjunct (pp. 197-199). Association for Computing Machinery. https://doi.org/10.1145/3266037.3271649
Aggarwal, D., Kazana, T. & Obremski, M. (2018). Leakage-Resilient Algebraic Manipulation Detection Codes with Optimal Parameters. In 2018 IEEE International Symposium on Information Theory, ISIT 2018 (Vol. 2018-June, pp. 1131-1135). Article 8437762 IEEE. https://doi.org/10.1109/ISIT.2018.8437762
Brueggemann, M. J., Thomas, V. & Wang, D. (2018). Lickable cities: Lick everything in sight and on site. In R. Mandryk, M. Hancock, M. Perry & A. Cox (Eds.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (pp. 1-11). Article alt06 Association for Computing Machinery. https://doi.org/10.1145/3170427.3188399
Dan, C., Hansen, K. A., Jiang, H., Wang, L. & Zhou, Y. (2018). Low rank approximation of binary matrices: Column subset selection and generalizations. In I. Potapov, J. Worrell & P. Spirakis (Eds.), 43rd International Symposium on Mathematical Foundations of Computer Science, MFCS 2018 (Vol. 117, pp. 41:1-41:16). Article 41 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.MFCS.2018.41
David, B., Dowsley, R. & Larangeira, M. (2018). MARS: Monetized ad-hoc routing system (a position paper). In CRYBLOCK 2018 - Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, Part of MobiSys 2018 (pp. 82-86). Association for Computing Machinery. https://doi.org/10.1145/3211933.3211948