Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Cascudo, I., Damgård, I., Lacerda, F. & Ranellucci, S. (2016). Oblivious transfer from any non-trivial elastic noisy channel via secret key agreement. In Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings (Vol. 9985, pp. 204-234). Springer VS. https://doi.org/10.1007/978-3-662-53641-4_9
Baum, C. (2016). On Garbling Schemes with and Without Privacy. In V. Zikas & R. De Prisco (Eds.), Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings: International Conference on Security and Cryptography for Networks (Vol. 9841, pp. 468-485). Springer VS. https://doi.org/10.1007/978-3-319-44618-9
Ben-Sasson, E., Ben-Tov, I., Damgård, I., Ishai, Y. & Ron-Zewi, N. (2016). On public key encryption from noisy codewords. In Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings (Vol. 9615, pp. 417-446). Springer VS. https://doi.org/10.1007/978-3-662-49387-8_16
Jakobsen, J. & Orlandi, C. (2016). On the CCA (in)security of MTProto. In Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices: SPSM '16 (pp. 113-116). Association for Computing Machinery. https://doi.org/10.1145/2994459.2994468
Damgård, I. B., Nielsen, J. B., Polychroniadou, A. & Raskin, M. (2016). On the Communication Required for Unconditionally Secure Multiplication. In Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Vol. 9815, pp. 459-488). Springer VS. https://doi.org/10.1007/978-3-662-53008-5_16
Trifiletti, R., Nielsen, J. B., Frederiksen, T. K. & Jakobsen, T. P. (2016). On the Complexity of Additively Homomorphic UC Commitments. In E. Kushilevitz & T. Malkin (Eds.), Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings (Vol. 9562, pp. 542-565). Springer VS. https://doi.org/10.1007/978-3-662-49096-9
Kostitsyna, I., Löffler, M., Polishchuk, V. & Staals, F. (2016). On the complexity of minimum-link path problems. In S. Fekete & A. Lubiw (Eds.), 32nd International Symposium on Computational Geometry, SoCG 2016 (Vol. 51, pp. 49.1-49.16). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.SoCG.2016.49
Campos, G. O., Zimek, A., Sander, J., Campello, R. J. G. B., Micenkova, B., Schubert, E., Assent, I. & Houle, M. E. (2016). On the Evaluation of Outlier Detection: Measures, Datasets, and an Empirical Study Continued. In R. Krestel, D. Mottin & E. Müller (Eds.), Proceedings of the Conference "Lernen, Wissen, Daten, Analysen" (Vol. 1670, pp. 1). CEUR Workshop Proceedings. http://ceur-ws.org/Vol-1670/paper-55.pdf
Campos, G. O., Zimek, A., Sander, J., Campello, R. J. G. B., Micenková, B., Schubert, E., Assent, I. & Houle, M. E. (2016). On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study. Data Mining and Knowledge Discovery, 30(4), 891-927. https://doi.org/10.1007/s10618-015-0444-8
Papakonstantinou, P. A., Xu, J. & Yang, G. (2016). On the power and limits of distance-based learning. In M.-F. Balcan & K. Q. Weinberger (Eds.), Proceedings of the 33nd International Conference on Machine Learning, {ICML} 2016, New York City, NY, USA, June 19-24, 2016 (Vol. 48, pp. 2263-2271). JMLR.org.
Chatterjee, K., Ibsen-Jensen, R. R. & Pavlogiannis, A. (2016). Optimal Reachability and a Space-Time Tradeoff for Distance Queries in Constant-Treewidth Graphs. In 24th Annual European Symposium on Algorithms (ESA 2016) (pp. 28:1-28:17). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.ESA.2016.28
Lanng, H., Lykkegaard, A., Thornholm, S., Tzannis, P. & Verdezoto, N. (2016). PeaceKeeper: Augmenting the Awareness and Communication of Noise Pollution in Student Dormitories. In Proceedings of the 7th Augmented Human International Conference, AH 2016: AH '16 Article 39 Association for Computing Machinery. https://doi.org/10.1145/2875194.2875218
Kunkel, A., Rheinländer, A., Schiefer, C., Helmer, S., Bouros, P. & Leser, U. (2016). PIEJoin: Towards Parallel Set Containment Joins. In P. Baumann, I. Manolescu-Goujot, L. Trani, Y. Ioannidis, G. G. Barnaföldi, L. Dobos & E. Bányai (Eds.), Scientific and Statistical Database Management: 28th International Conference, SSDBM 2016 - Proceedings Article 11 Association for Computing Machinery. https://doi.org/10.1145/2949689.2949694
Zakarias, R. W. (2016). Practical Secure Computation with Pre-Processing. Department of Computer Science, Aarhus University.
Birkedal, L. (2016). Preface. Electronic Notes in Theoretical Computer Science, 325, 1-2. https://doi.org/10.1016/j.entcs.2016.09.028
Hansen, T. D. & Zwick, U. (2016). Random-Edge Is Slower Than Random-Facet on Abstract Cubes. Leibniz International Proceedings in Informatics, 55, 51:1-51:14. https://doi.org/10.4230/LIPIcs.ICALP.2016.51
Cascudo, I., Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016). Rate-1, linear time and additively homomorphic UC commitments. In M. Robshaw & J. Katz (Eds.), Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Vol. 9816, pp. 179-207). Springer VS. https://doi.org/10.1007/978-3-662-53015-3_7
Nielsen, J. B. & Ranellucci, S. (2016). Reactive garbling: Foundation, instantiation, application. In J. H. Cheon & T. Takagi (Eds.), Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. 10032, pp. 1022-1052). Springer VS. https://doi.org/10.1007/978-3-662-53890-6_34
Devriese, D., Birkedal, L. & Piessens, F. (2016). Reasoning about object capabilities with logical relations and effect parametricity. In 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016 (pp. 147-162). Article 7467352 IEEE Press. https://doi.org/10.1109/EuroSP.2016.22
Østergaard Laursen, C., Pedersen, S., Merritt, T. R. & Caprani, O. (2016). Robot-Supported Food Experiences: Exploring Aesthetic Plating with Design Prototypes. In J. T.K.V.Koh, B. J. Dunstan, D. Silvera-Tawil & M. Velonaki (Eds.), Cultural Robotics - 1st International Workshop, CR 2015 and Held as Part of IEEE RO-MAN 2015, Revised Selected Papers: First International Workshop, CR 2015, Held as Part of IEEE RO-MAN 2015, Kobe, Japan, August 31, 2015. Revised Selected Papers (Vol. 9549, pp. 107-130). Springer. https://doi.org/10.1007/978-3-319-42945-8_10
Nielsen, M., Elmqvist, N. & Grønbæk, K. (2016). Scribble query: fluid touch brushing for multivariate data visualization. In C. Parker (Ed.), Proceedings of the 28th Australian Computer-Human Interaction Conference, OzCHI 2016 (pp. 381-390). Association for Computing Machinery. https://doi.org/10.1145/3010915.3010951
Tomlein, M. & Grønbæk, K. (2016). Semantic Model of Variability and Capabilities of IoT Applications for Embedded Software Ecosystems. In Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 (pp. 247-252). Article 7516835 IEEE Press. https://doi.org/10.1109/WICSA.2016.17
Bouros, P., Mamoulis, N., Ge, S. & Terrovitis, M. (2016). Set Containment Join Revisited. Knowledge and Information Systems, 49(1), 375-402. https://doi.org/10.1007/s10115-015-0895-7
Abboud, A., Hansen, T. D., Williams, V. V. & Williams, R. (2016). Simulating Branching Programs with Edit Distance and Friends: Or: a Polylog Shaved is a Lower Bound Made. In STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing (pp. 375-388). Association for Computing Machinery. https://doi.org/10.1145/2897518.2897653
Rasmussen, M. K., Troiano, G. M., Petersen, M. G., Simonsen, J. G. & Hornbæk, K. (2016). Sketching Shape-changing Interfaces: Exploring Vocabulary, Metaphor Use, and Affordances. In CHI 2016 - Proceedings, 34th Annual CHI Conference on Human Factors in Computing Systems: CHI'16 (Vol. 2016, pp. 2740-2751). Association for Computing Machinery. https://doi.org/10.1145/2858036.2858183
Christodoulou, G., Filos-Ratsikas, A., Frederiksen, S. K. S., Goldberg, P. W., Zhang, J. & Zhang, J. (2016). Social Welfare in One-Sided Matching Mechanisms. In N. Osman & C. Sierra (Eds.), Autonomous Agents and Multiagent Systems, IFAAMAS 2016 Workshops, Best Papers, Revised Selected Papers: AAMAS 2016 Workshops, Best Papers (Vol. 10002, pp. 30-50). Springer VS. https://doi.org/10.1007/978-3-319-46882-2_3
Abboud, A., Backurs, A., Hansen, T. D., Williams, V. V. & Zamir, O. (2016). Subtree isomorphism revisited. In 27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016 (Vol. 2, pp. 1256-1271). Association for Computing Machinery. https://doi.org/10.1137/1.9781611974331.ch88
Nielsen, M., Brewer, R. S. & Grønbæk, K. (2016). Supporting interactive visual analytics of energy behavior in buildings through affine visualizations. In C. Parker (Ed.), Proceedings of the 28th Australian Computer-Human Interaction Conference, OzCHI 2016 (pp. 238-247). Association for Computing Machinery. https://doi.org/10.1145/3010915.3010950
Christensen, H. B. (2016). Teaching DevOps and Cloud Computing using a Cognitive Apprenticeship and Story-Telling Approach. In ITiCSE 2016 - Proceedings of the 2016 ACM Conference on Innovation and Technology in Computer Science Education (pp. 174-179). Association for Computing Machinery. https://doi.org/10.1145/2899415.2899426
Hansen, K. A., Ibsen-Jensen, R. & Koucký, M. (2016). The big match in small space. In M. Gairing & R. Savani (Eds.), Algorithmic Game Theory - 9th International Symposium, SAGT 2016, Proceedings (Vol. 9928, pp. 64-76). Springer VS. https://doi.org/10.1007/978-3-662-53354-3_6
Garg, S., Mukherjee, P., Pandey, O. & Polychroniadou, A. (2016). The Exact Round Complexity of Secure Computation. In M. Fischlin & J.-S. Coron (Eds.), Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (pp. 448 - 476). Springer VS. https://doi.org/10.1007/978-3-662-49896-5
Bauer, A., Gross, J., Lumsdaine, P. L., Shulman, M., Sozeau, M. & Spitters, B. (2016). The HoTT Library: A formalization of homotopy type theory in Coq. http://arxiv.org/abs/1610.04591
Larsen, K. G. & Nelson, J. (2016). The Johnson-Lindenstrauss Lemma Is Optimal for Linear Dimensionality Reduction. Leibniz International Proceedings in Informatics, 55, 82:1 - 82:11. https://doi.org/10.4230/LIPIcs.ICALP.2016.82
Brody, J. E., Buhrman, H., Koucký, M., Loff, B. & Speelman, F. (2016). Towards a Reverse Newman's Theorem in Interactive Information Complexity. Algorithmica, 76(3), 749-781. https://doi.org/10.1007/s00453-015-0112-9
Baum, C. (2016). Towards More Efficient Secure Multiparty Computation in the Preprocessing Model. Department of Computer Science, Aarhus University.