Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Jensen, C. (Ed.), Lind Olsen, E. (Ed.), Mikkelsen, G. L., Syberg , L., Nielsen, L. L., Hansen, M. A. E., Hjortlund, M., Madsen, O. L., Høngaard Andersen, P. & Duvold, T. (2018). The future market for cybersecurity in Denmark.
Bates, O., Thomas, V., Remy, C., Nathan, L. P., Mann, S. & Friday, A. (2018). The future of HCI and sustainability: Championing environmental and social justice. In R. Mandryk & M. Hancock (Eds.), CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Vol. 2018-April). Article SIG01 Association for Computing Machinery. https://doi.org/10.1145/3170427.3185365
Madsen, O. L. & Møller-Pedersen, B. (2018). This is not a Model: On development of a common terminology for modeling and programming. In T. Margaria & B. Steffen (Eds.), Leveraging applications of formal methods, verification and validation (Vol. I, pp. 206-224). Springer. https://doi.org/10.1007/978-3-030-03418-4_13
Chakraborty, D., Kamma, L. & Larsen, K. G. (2018). Tight cell probe bounds for succinct boolean matrix-Vector multiplication. In STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing (pp. 1297-1306). Association for Computing Machinery. https://doi.org/10.1145/3188745.3188830
Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E. (2018). TinyKeys: A New Approach to Efficient Multi-Party Computation. In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Vol. 10993, pp. 3-33). Springer VS. https://doi.org/10.1007/978-3-319-96878-0_1
LaVigne, R., Liu-Zhang, C.-D., Maurer, U. M., Moran, T., Mularczyk, M. & Tschudi, D. (2018). Topology-Hiding Computation Beyond Semi-Honest Adversaries. In A. Beimel & S. Dziembowski (Eds.), Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings: Theory of Cryptography (Vol. 11240, pp. 3-35). Springer VS. https://doi.org/10.1007/978-3-030-03810-6_1
Baum, C., Lin, H. & Oechsner, S. (2018). Towards Practical Lattice-Based One-Time Linkable Ring Signatures. In D. Naccache, S. Xu, S. Qing, P. Samarati, G. Blanc, R. Lu, Z. Zhang & A. Meddahi (Eds.), Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings: ICICS 2018 (Vol. 11149, pp. 303-322). Springer VS. https://doi.org/10.1007/978-3-030-01950-1_18
Abdul, A., Vermeulen, J., Wang, D., Lim, B. Y. & Kankanhalli, M. (2018). Trends and Trajectories for Explainable, Accountable and Intelligible Systems: An HCI Research Agenda. In R. Mandryk & M. Hancock (Eds.), CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (pp. 582:1-582:18). Association for Computing Machinery. https://doi.org/10.1145/3173574.3174156
Mezzetti, G., Møller, A. & Torp, M. T. (2018). Type Regression Testing to Detect Breaking Changes in Node.js Libraries. In T. D. Millstein (Ed.), 32nd European Conference on Object-Oriented Programming, ECOOP 2018 (Vol. 109, pp. 7:1-7:24). Article 7 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ECOOP.2018.7
Thiel, S. K. (2018). Uncovering the influence of game components on creativity. In CHI PLAY 2018 - Proceedings of the 2018 Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts (pp. 637-645). Association for Computing Machinery. https://doi.org/10.1145/3270316.3271515
Clifford, R., Grønlund, A., Larsen, K. G. & Starikovskaya, T. (2018). Upper and lower bounds for dynamic data structures on strings. In R. Niedermeier & B. Vallée (Eds.), 35th Symposium on Theoretical Aspects of Computer Science, STACS 2018 (Vol. 96, pp. 22:1-22:14). Article 22 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.STACS.2018.22
Enni, S. & Assent, I. (2018). Using Balancing Terms to Avoid Discrimination in Classification. In 2018 IEEE International Conference on Data Mining, ICDM 2018 (pp. 947-952). Article 8594925 IEEE Press. https://doi.org/10.1109/ICDM.2018.00116
Fender, A. & Müller, J. (2018). Velt: A Framework for Multi RGB-D Camera Systems. In Proceedings of the 2018 ACM International Conference on Interactive Surfaces and Spaces (pp. 73-83). Association for Computing Machinery. https://doi.org/10.1145/3279778.3279794
Tsitsulin, A., Mottin, D., Karras, P. & Müller, E. (2018). VERSE: Versatile Graph Embeddings from Similarity Measures. In P.-A. Champin, F. Gandon & L. Médini (Eds.), The Web Conference 2018 - Proceedings of the World Wide Web Conference, WWW 2018: WWW '18 (pp. 539-548). Association for Computing Machinery. https://doi.org/10.1145/3178876.3186120
Korsgaard, H., Thiel, S. K., Thomas, V. & Ertiö, T. (2018). Working across boundaries in smart city research. In C. C. Hinnant & A. Zuiderwijk (Eds.), Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age Article 39 Association for Computing Machinery. https://doi.org/10.1145/3209281.3209315
Larsen, K. G. & Nielsen, J. B. (2018). Yes, There is an Oblivious RAM Lower Bound! In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology -- CRYPTO 2018 (pp. 523-542). Springer VS. https://doi.org/10.1007/978-3-319-96881-0_18
Damgård, I., Orlandi, C. & Simkin, M. (2018). Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings. In H. Shacham & A. Boldyreva (Eds.), Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Vol. 10992, pp. 799-829). Springer VS. https://doi.org/10.1007/978-3-319-96881-0_27
Fuchsbauer, G., Gay, R., Kowalczyk, L. & Orlandi, C. (2017). Access Control Encryption for Equality, Comparison, and More. In S. Fehr (Ed.), Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II (Vol. 10175, pp. 88-118). Springer VS. https://doi.org/10.1007/978-3-662-54388-7_4
Jafargholi, Z., Scafuro, A. & Wichs, D. (2017). Adaptively Indistinguishable Garbled Circuits. In Y. Kalai & L. Reyzin (Eds.), Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings (Vol. 10678, pp. 40-71). Springer VS. https://doi.org/10.1007/978-3-319-70503-3
Bringmann, K., Grønlund, A. & Larsen, K. G. (2017). A Dichotomy for Regular Expression Membership Testing. In Proceedings - 58th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2017 (pp. 307-318). Article 8104068 IEEE Computer Society Press. https://doi.org/10.1109/FOCS.2017.36
Coron, J.-S. & Nielsen, J. B. (Eds.) (2017). Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. In J.-S. Coron & J. Buus Nielsen (Eds.), Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I (Vol. 10210). Springer VS. https://doi.org/10.1007/978-3-319-56620-7
Coron, J.-S. & Nielsen, J. B. (Eds.) (2017). Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. In J.-S. Coron & J. Buus Nielsen (Eds.), Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II (Vol. 10211). Springer VS. https://doi.org/10.1007/978-3-319-56614-6
Coron, J.-S. & Nielsen, J. B. (Eds.) (2017). Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. In J.-S. Coron & J. Buus Nielsen (Eds.), Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III (Vol. 10212). Springer VS. https://doi.org/10.1007/978-3-319-56617-7
Bouros, P. & Mamoulis, N. (2017). A Forward Scan based Plane Sweep Algorithm for Parallel Interval Joins. Proceedings of the VLDB Endowment, 10(11), 1346-1357. https://doi.org/10.14778/3137628.3137644
David, B. M. (2017). A Framework For Efficient Homomorphic Universally Composable Commitments. Department of Computer Science, University of Aarhus.
Raskin, M. (2017). A linear lower bound for incrementing a space-optimal integer representation in the bit-probe model. In I. Chatzigiannakis, P. Indyk, F. Kuhn & A. Muscholl (Eds.), 44th International Colloquium on Automata, Languages, and Programming, ICALP 2017 (Vol. 80, pp. 88:1--88:12). Article 88 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ICALP.2017.88
Cramer, R., Damgård, I., Xing, C. & Yuan, C. (2017). Amortized complexity of zero-knowledge proofs revisited: Achieving linear soundness slack. In J.-S. Coron & J. Buus Nielsen (Eds.), Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (Vol. 10210, pp. 479-500). Springer VS. https://doi.org/10.1007/978-3-319-56620-7_17
Trifiletti, R. (2017). Amortizing Maliciously Secure Two-party Computation. Department of Computer Science, Aarhus University.
Afshani, P., De Berg, M., Casanova, H., Karsin, B., Lambrechts, C., Sitchinava, N. & Tsirogiannis, C. (2017). An efficient algorithm for the 1D total visibility-index problem. In S. Fekete & V. Ramachandran (Eds.), 2017 Proceedings of the Ninteenth Workshop on Algorithm Engineering and Experiments (ALENEX) (Vol. PRAL17, pp. 218-231). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611974768.18
Fauzi, P., Lipmaa, H., Siim, J. & Zajac, M. (2017). An Efficient Pairing-Based Shuffle Argument. In T. Takagi & T. Peyrin (Eds.), Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings (pp. 97-127). Springer VS. https://doi.org/10.1007/978-3-319-70697-9_4
Hoggan, E., Hsieh, Y.-T., Myllymaa, K., Lantz, V., Kildal, J., Eiler, J. & Jacucci, G. (2017). An Exploration of Mobile Shape-Changing Textures. In TEI 2017 - Proceedings of the 11th International Conference on Tangible, Embedded, and Embodied Interaction: TEI '17 (pp. 275-282). Association for Computing Machinery. https://doi.org/10.1145/3024969.3024983
Krogh-Jespersen, M., Svendsen, K. & Birkedal, L. (2017). A relational model of types-and-effects in higher-order concurrent separation logic. In POPL 2017 - Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages: POPL 2017 (pp. 218-231). Association for Computing Machinery. https://doi.org/10.1145/3009837.3009877
Spencer, B., Benedikt, M., Møller, A. & Breugel, F. V. (2017). ArtForm: A Tool for Exploring the Codebase of Form-based Websites. In K. Sen & T. Bultan (Eds.), ISSTA 2017 - Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis (pp. 380-383). Association for Computing Machinery. https://doi.org/10.1145/3092703.3098226
Berglin, E. & Brodal, G. S. (2017). A simple greedy algorithm for dynamic graph orientation. In Y. Okamoto & T. Tokuyama (Eds.), 28th International Symposium on Algorithms and Computation (ISAAC 2017) (pp. 12:1-12:12). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ISAAC.2017.12
Mathisen, A., Krogh Sørensen, S., Stisen, A., Blunck, H. & Grønbæk, K. (2017). A Study on the Impact of Indoor Positioning Performance on Activity Recognition Applications. In 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2017 (pp. 58-67). Association for Computing Machinery. https://doi.org/10.1145/3144457.3144501
Andreasen, E., Gong, L., Møller, A., Pradel, M., Selakovic, M., Sen, K. & Staicu, C.-A. (2017). A Survey of Dynamic Analysis and Test Generation for JavaScript. A C M Computing Surveys, 50(5), 66:1-66:36. Article 66. https://doi.org/10.1145/3106739
Dowsley, R., Michalas, A., Nagel, M. & Paladi, N. (2017). A survey on design and implementation of protected searchable data in the cloud. Computer Science Review, 26(Supplement C), 17 - 30. https://doi.org/10.1016/j.cosrev.2017.08.001
Tomlein, M. & Grønbæk, K. (2017). A Visual Programming Approach Based on Domain Ontologies for Configuring Industrial IoT Installations. In Proceedings of the 7th International Conference on the Internet of Things, IoT 2017 Article 9 Association for Computing Machinery. https://doi.org/10.1145/3131542.3131552
Jafargholi, Z., Kamath, C., Klein, K., Komargodski, I., Pietrzak, K. & Wichs, D. (2017). Be Adaptive, Avoid Overcommitting. In J. Katz & H. Shacham (Eds.), Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Vol. 10401, pp. 133-163). Springer VS. https://doi.org/10.1007/978-3-319-63688-7_5
Lee, B., Deng, Q., Hoggan, E. & Oulasvirta, A. (2017). Boxer: a multimodal collision technique for virtual objects. In E. Lank & A. Vinciarelli (Eds.), ICMI 2017 - Proceedings of the 19th ACM International Conference on Multimodal Interaction (pp. 252-260). Association for Computing Machinery. https://doi.org/10.1145/3136755.3136761
Brodal, G. S. & Mampentzidis, K. (2017). Cache oblivious algorithms for computing the triplet distance between trees. In K. Pruhs & C. Sohler (Eds.), 25th European Symposium on Algorithms, ESA 2017 (Vol. 87, pp. 21:1--21:14). Article 21 Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ESA.2017.21
Haulrik, N., Petersen, R. M. & Merritt, T. (2017). CADLens: Haptic feedback for navigating in 3D environments. In DIS 2017 Companion - Proceedings of the 2017 ACM Conference on Designing Interactive Systems (pp. 127-131). Association for Computing Machinery. https://doi.org/10.1145/3064857.3079132
Sonne, T., Merritt, T. R., Marshall, P., Lomholt, J. J., Müller, J. & Grønbæk, K. (2017). Calming Children When Drawing Blood Using Breath-based Biofeedback. In DIS 2017 - Proceedings of the 2017 Conference on Designing Interactive Systems (pp. 725-737). Association for Computing Machinery. https://doi.org/10.1145/3064663.3064742
Dinsdale-Young, T., da Rocha Pinto, P., Andersen, K. J. A. & Birkedal, L. (2017). Caper: Automatic Verification for Fine-Grained Concurrency. In H. Yang (Ed.), Programming Languages and Systems - 26th European Symposium on Programming, ESOP 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings: 26th European Symposium on Programming, ESOP 2017 (Vol. 10201, pp. 420-447). Springer VS. https://doi.org/10.1007/978-3-662-54434-1_16