Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Farshim, P., Orlandi, C. & Rosie, R. (2017). Security of Symmetric Primitives under Incorrect Usage of Keys. IACR Trans. Symmetric Cryptol., 2017(1), 449-473. https://doi.org/10.13154/tosc.v2017.i1.449-473
Krogh, P. G., Petersen, M. G., O'Hara, K. & Grønbæk, J. E. (2017). Sensitizing Concepts for Socio-Spatial Literacy in HCI. In CHI 2017 - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire (pp. 6449-6460). Association for Computing Machinery. https://doi.org/10.1145/3025453.3025756
McMillan, D., Brown, B., Lampinen, A., McGregor, M., Hoggan, E. & Pizza, S. (2017). Situating Wearables: Smartwatch Use in Context. In CHI 2017 - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire (pp. 3582-3594). Association for Computing Machinery. https://doi.org/10.1145/3025453.3025993
Qi, S., Sacharidis, D., Bouros, P. & Mamoulis, N. (2017). Snapshot and Continuous Points-based Trajectory Search. Geoinformatica, 21(4), 669-701. https://doi.org/10.1007/s10707-016-0267-9
Höök, K., Hummels, C., Isbister, K., Marti, P., Márquez Segura, E., Jonsson, M., Mueller, F. F., Sanches, P. A. N., Schiphorst, T., Ståhl, A., Svanaes, D., Trotto, A., Petersen, M. G. & Lim, Y. (2017). Soma-Based Design Theory. In CHI 2017 Extended Abstracts - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire (pp. 550-557). Association for Computing Machinery. https://doi.org/10.1145/3027063.3027082
Chatterjee, K., Hansen, K. A. & Ibsen-Jensen, R. (2017). Strategy Complexity of Concurrent Safety Games. In K. G. Larsen, H. L. Bodlaender & J.-F. Raskin (Eds.), 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2017) (Vol. 83, pp. 55:1-55:13). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.MFCS.2017.55
Valsted, F. M., Nielsen, C. V. H., Jensen, J. Q., Sonne, T. & Jensen, M. M. (2017). Strive: Exploring Assistive Haptic Feedback on the Run. In M. Brereton, D. Vyas, A. Soro, B. Ploderer, J. Waycott & A. Morrison (Eds.), Proceedings of the 29th Australian Computer-Human Interaction Conference: Human-Nature, OzCHI 2017 (pp. 275-284). Association for Computing Machinery. https://doi.org/10.1145/3152771.3152801
Andreasen, E. S., Møller, A. & Nielsen, B. B. (2017). Systematic Approaches for Increasing Soundness and Precision of Static Analyzers. In K. Ali & C. Cifuentes (Eds.), SOAP 2017 - Proceedings of the 6th ACM SIGPLAN International Workshop on State of the Art in Program Analysis, co-located with PLDI 2017 (pp. 31-36). Association for Computing Machinery. https://doi.org/10.1145/3088515.3088521
Billes, M., Møller, A. & Pradel, M. (2017). Systematic black-box analysis of collaborative web applications. In PLDI 2017 - Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation (Vol. Part F128414, pp. 171-184). Association for Computing Machinery. https://doi.org/10.1145/3062341.3062364
Neerbek, J., Assent, I. & Dolog, P. (2017). TABOO: Detecting unstructured sensitive information using recursive neural networks. In Proceedings - 2017 IEEE 33rd International Conference on Data Engineering, ICDE 2017 (pp. 1399-1400). Article 7930091 IEEE Computer Society Press. https://doi.org/10.1109/ICDE.2017.195
Bøgh, K. S., Chester, S., Sidlauskas, D. & Assent, I. (2017). Template Skycube Algorithms for Heterogeneous Parallelism on Multicore and GPU Architectures. In SIGMOD 2017 - Proceedings of the 2017 ACM International Conference on Management of Data (pp. 447-462). Association for Computing Machinery. https://doi.org/10.1145/3035918.3035962
Bahr, P., Grathwohl, H. B. & Møgelberg, R. E. (2017). The clocks are ticking: No more delays! In 2017 32nd Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2017 Article 8005097 IEEE. https://doi.org/10.1109/LICS.2017.8005097
Krebbers, R., Jung, R., Bizjak, A., Jourdan, J.-H., Dreyer, D. & Birkedal, L. (2017). The Essence of Higher-Order Concurrent Separation Logic. In H. Yang (Ed.), Programming Languages and Systems - 26th European Symposium on Programming, ESOP 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings (pp. 696-723). Springer VS. https://doi.org/10.1007/978-3-662-54434-1_26
Bauer, A., Gross, J., Lumsdaine, P. L., Shulman, M., Sozeau, M. & Spitters, B. (2017). The HoTT Library: A Formalization of Homotopy Type Theory in Coq. In Y. Bertot & V. Vafeiadis (Eds.), CPP 2017 - Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs, co-located with POPL 2017: CPP 2017 (pp. 164-172). Association for Computing Machinery. https://doi.org/10.1145/3018610.3018615
Remy, C., Bates, O., Thomas, V. & Huang, E. M. (2017). The Limits of Evaluating Sustainability. 103-110. Paper presented at ACM Limits 2017, Santa Barbara, California, United States. https://doi.org/10.1145/3080556.3080567
Hansen, K. A. (2017). The Real Computational Complexity of Minmax Value and Equilibrium Refinements in Multi-player Games. In V. Bilò & M. Flammini (Eds.), Algorithmic Game Theory - 10th International Symposium, SAGT 2017, Proceedings: 10th International Symposium, SAGT 2017 (pp. 119-130). Springer VS. https://doi.org/10.1007/978-3-319-66700-3_10
Damgård, I., Nielsen, J. B., Nielsen, M. & Ranellucci, S. (2017). The tinytable protocol for 2-party secure computation, or: Gate-scrambling revisited. In J. Katz & H. Shacham (Eds.), Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Vol. 10401, pp. 167-187). Springer VS. https://doi.org/10.1007/978-3-319-63688-7_6
Döttling, N. M., Ghosh, S., Nielsen, J. B., Nilges, T. & Trifiletti, R. (2017). TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation. In CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security: CCS '17 (pp. 2263-2276). Association for Computing Machinery. https://doi.org/10.1145/3133956.3134024
Munro, J. I., Navarro, G., Nielsen, J. S., Shah, R. & Thankachan, S. V. (2017). Top-k Term-Proximity in Succinct Space. Algorithmica, 78(2), 379-393. https://doi.org/10.1007/s00453-016-0167-2
Lehmann, A. & Gross, A. (2017). Towards vehicle emission estimation from smartphone sensors. In Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017 (pp. 154-163). Article 7962447 IEEE Press. https://doi.org/10.1109/MDM.2017.29
Kristensen, E. K. & Møller, A. (2017). Type Test Scripts for TypeScript Testing. Proceedings of the ACM on Programming Languages , 1(OOPSLA), 90:1-90:25. Article 90. https://doi.org/10.1145/3133914
Bødker, S., Lyle, P. & Saad-Sulonen, J. (2017). Untangling the Mess of Technological Artifacts: Investigating Community Artifact Ecologies. In C and T 2017 - 8th International Conference on Communities and Technologies, Conference Proceedings (pp. 246-255). Association for Computing Machinery. https://doi.org/10.1145/3083671.3083675
Brânzei, S., Filos-Ratsikas, A., Miltersen, P. B. & Zeng, Y. (2017). Walrasian pricing in multi-unit auctions. In K. G. Larsen, H. L. Bodlaender & J.-F. Raskin (Eds.), 42nd International Symposium on Mathematical Foundations of Computer Science, MFCS 2017 (Vol. 83, pp. 80:1-80:14). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.MFCS.2017.80
Scholl, P., Smart, N. P. & Wood, T. (2017). When It’s All Just Too Much: Outsourcing MPC-Preprocessing. In M. O'Neill (Ed.), Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings (Vol. 10655, pp. 77-99). Springer VS. https://doi.org/10.1007/978-3-319-71045-7_4
Damgård, I. B., Haagh, H. F. & Orlandi, C. (2016). Access Control Encryption: Enforcing Information Flow with Cryptography. In M. Hirt & A. Smith (Eds.), Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings (Vol. 9986, pp. 547-576). Springer VS. https://doi.org/10.1007/978-3-662-53644-5_21
Stisen, A., Verdezoto, N., Blunck, H., Kjærgaard, M. B. & Grønbæk, K. (2016). Accounting for the Invisible Work of Hospital Orderlies: Designing for Local and Global Coordination. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work and Social Computing, CSCW 2016: CSCW '16 (pp. 980-992). Association for Computing Machinery. https://doi.org/10.1145/2818048.2820006
Mathisen, A., Krogh, S., Stisen, A., Blunck, H. & Grønbæk, K. (2016). A comparative analysis of Indoor WiFi Positioning at a large building complex. In J. J. G. Domínguez, Á. H. Alonso & J. Ureña Ureña (Eds.), 2016 International Conference on Indoor Positioning and Indoor Navigation, IPIN 2016 Article 7743666 IEEE Press. https://doi.org/10.1109/IPIN.2016.7743666
Blunck, H., Bhattacharya, S., Stisen, A., Prentow, T. S., Kjærgaard, M. B., Dey, A., Jensen, M. M. & Sonne, T. (2016). Activity Recognition on Smart Devices: Dealing with diversity in the wild. GetMobile: Mobile Computing and Communications, 20(1), 34-38. https://doi.org/10.1145/2972413.2972425
Chan, T. M. & Wilkinson, B. T. (2016). Adaptive and approximate orthogonal range counting. ACM Transactions on Algorithms, 12(4), 45:1-45:15. Article 45. https://doi.org/10.1145/2830567
Damgård, I. B., Polychroniadou, A. & Rao, V. (2016). Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE). In Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings (Vol. 9615 , pp. 208-233). Springer VS. https://doi.org/10.1007/978-3-662-49387-8_9
Bødker, S., Dindler, C., Halskov, K. & Iversen, O. S. (2016). Advances in Participatory Design. In CHI EA 2016: #chi4good - Extended Abstracts, 34th Annual CHI Conference on Human Factors in Computing Systems (pp. 984-987). Association for Computing Machinery. http://10.1145/2851581.2856688
Bødker, S., Korsgaard, H. & Saad-Sulonen, J. (2016). 'A Farmer, a Place and at least 20 Members': The Development of Artifact Ecologies in Volunteer-based Communities. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work and Social Computing, CSCW 2016 (pp. 1142-1156). Association for Computing Machinery. https://doi.org/10.1145/2818048.2820029
Biniaz, A., Bose, P., van Duijn, I., Maheshwari, A. & Smid, M. (2016). A Faster Algorithm for the Minimum Red-Blue-Purple Spanning Graph Problem for Points on a Circle. In T. C. Shermer (Ed.), Proceedings of the 28th Canadian Conference on Computational Geometry (pp. 140-146). Simon Fraser University. Vancouver, British Columbia Canada. http://people.scs.carleton.ca/~michiel/RedBluePurpleCCCG16.pdf
Sonne, T., Marshall, P., Müller, J., Obel, C. & Grønbæk, K. (2016). A Follow-up Study of a Successful Assistive Technology for Children with ADHD and Their Families. In Proceedings of IDC 2016 - The 15th International Conference on Interaction Design and Children (pp. 400-407). https://doi.org/10.1145/2930674.2930704
Fetzer, V., Müller-Quade, J. & Nilges, T. (2016). A Formal Treatment of Privacy in Video Data. In I. Askoxylakis, S. Ioannidis, S. Katsikas & C. Meadows (Eds.), Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings (Vol. 9879, pp. 406-424). Springer VS. https://doi.org/10.1007/978-3-319-45741-3_21
Adamsen, C. Q., Mezzetti, G. & Møller, A. (2016). Analyzing Test Completeness for Dynamic Languages. In ISSTA 2016 - Proceedings of the 25th International Symposium on Software Testing and Analysis: ISSTA 2016 (pp. 142-153). Association for Computing Machinery. https://doi.org/10.1145/2931037.2931059
Sonne, T., Marshall, P., Obel, C., Thomsen, P. H. & Grønbæk, K. (2016). An Assistive Technology Design Framework for ADHD. In C. Parker (Ed.), Proceedings of the 28th Australian Computer-Human Interaction Conference, OzCHI 2016: OzCHI '16 (pp. 60-70). Association for Computing Machinery. https://doi.org/10.1145/3010915.3010925
Mann, W., Augsten, N. & Bouros, P. (2016). An Empirical Evaluation of Set Similarity Join Techniques. Proceedings of the VLDB Endowment, 9(9), 636-647. https://doi.org/10.14778/2947618.2947620