Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Bosansky, B., Xin Jiang, A., Tambe, M. & Kiekintveld, C. (2015). Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies. In Proceedings of the twenty-ninth AAAI Conference on Artificial Intelligence and the twenty-seventh Innovative Applications of Artificial Intelligence Conference (pp. 812-818). AAAI Press. http://www.aaai.org/ocs/index.php/AAAI/AAAI15/paper/view/9824/9373
Bosansky, B., Xin Jiang, A., Tambe, M. & Kiekintveld, C. (2015). Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies. In AAAI'15: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (pp. 812-818) http://teamcore.usc.edu/papers/2015/bosansky_1567.pdf
Huang, Z., Radunović, B., Vojnović, M. & Zhang, Q. (2015). Communication complexity of approximate matching in distributed graphs. In 32nd International Symposium on Theoretical Aspects of Computer Science: STACS’15, March 4–7, 2015, Garching, Germany (pp. 460-473). Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.STACS.2015.460
Branzei, S. (2015). Computational Fair Division. Department of Computer Science, Aarhus University.
Bosansky, B., Branzei, S., Hansen, K. A., Miltersen, P. B. & Sørensen , T. B. (2015). Computation of Stackelberg Equilibria of Finite Sequential Games. In E. Markakis & G. Schäfer (Eds.), Web and Internet Economics: 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015, Proceedings (Vol. 9470, pp. 201-215). Springer VS. http://arxiv.org/abs/1507.07677
Alexander, C., Arge, L., Bøcher, P. K., Revsbæik, M., Sandel, B. S., Svenning, J.-C., Tsirogiannis, C. & Yang, J. (2015). Computing River Floods Using Massive Terrain Data. In Proceedings. Workshop on Massive Data Algorithmics (MASSIVE) (pp. 67-85)
Gronvall, E., Verdezoto, N., Bagalkot, N. L. & Sokoler, T. (2015). Concordance: A Critical Participatory Alternative in Healthcare IT. In O. W. Bertelsen & K. Halskov (Eds.), Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers. Department of Computer Science, Aarhus University. https://doi.org/10.7146/aahcc.v1i1.21315
Fender, A., Müller, J. & Lindlbauer, D. (2015). Creature Teacher: A Performance-Based Animation System for Creating Cyclic Movements. In Proceedings of the 3rd ACM Symposium on Spatial User Interaction, SUI '15 (pp. 113-122). Association for Computing Machinery. https://doi.org/10.1145/2788940.2788944
Pold, S., Bertelsen, O. W., Koefoed Hansen, L., Andersen, C. U., Bardzell, S. & Bardzell, J. (2015). Criticism – for Computational Alternatives. In O. Bertelsen & K. Halskov (Eds.), Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers Department of Computer Science, Aarhus University. https://doi.org/10.7146/aahcc.v1i1.21621
Askarov, A., Moore, S., Dimoulas, C. & Chong, S. (2015). Cryptographic Enforcement of Language-Based Information Erasure. In L. Viganò (Ed.), 28th IEEE Computer Security Foundations Symposium CSF 2015 : Proceedings (pp. 334-348). IEEE Computer Society Press. https://doi.org/10.1109/CSF.2015.30
Spitters, B. (2015). Cubical sets as a classifying topos. Abstract from 21st International Conference on Types for Proofs and Programs, , Tallinn, Estonia.
Brodal, G. S., Sioutas, S., Pantazos, K. & Zaroliagis, C. D. (2015). D2-tree: A new overlay with deterministic bounds. Algorithmica, 72(3), 860-883. https://doi.org/10.1007/s00453-014-9878-4
Sonne, T. & Grønbæk, K. (2015). Designing Assistive Technologies for the ADHD Domain. Paper presented at 5th EAI International Symposium on Pervasive Computing Paradigms for Mental Health, Milan, Italy.
Sonne, T., Obel, C. & Grønbæk, K. (2015). Designing Real Time Assistive Technologies: A Study of Children with ADHD. In OzCHI '15: Proceedings of the Annual Meeting of the Australian Special Interest Group for Computer Human Interaction (pp. 34-38). Association for Computing Machinery. https://doi.org/10.1145/2838739.2838815
Xue, H., Inati, S., Sangild, T., Kellman, P. & Hansen, M. (2015). Distributed MRI Reconstruction using Gadgetron based Cloud Computing. Magnetic Resonance in Medicine, 73(3), 1015–1025. https://doi.org/10.1002/mrm.25213
Skovgaard, C., Thomsen, J. R., Verdezoto, N. & Vestergaard, D. (2015). DogPulse: Augmenting the Coordination of Dog Walking through an Ambient Awareness System at Home. In S. Nanayakkara & E. Y.-L. Do (Eds.), AH '15, Proceedings of the 6th Augmented Human International Conference: SIGCHI ACM. (pp. 41-44). Association for Computing Machinery. https://doi.org/10.1145/2735711.2735825
Nielsen, N., Pedersen, S. B., Sørensen, J. A., Verdezoto, N. & Øllegaard, N. (2015). EcoBears: Augmenting Everyday Appliances with Symbolic and Peripheral Feedback. In S. Nanayakkara & E. Y.-L. Do (Eds.), AH '15 Proceedings of the 6th Augmented Human International Conference. SIGCHI ACM. (pp. 155-156). Association for Computing Machinery. https://doi.org/10.1145/2735711.2735817
Blevis, E., Bødker, S., Flach, J., Forlizzi, J., Jung , H., Kaptelinin, V., Nardi, B. & Rizzo, A. (2015). Ecological Perspectives in HCI: Promise, Problems, and Potential. Abstract from CHI Workshop on Ecological Perspectives in HCI, Korea, Republic of. https://doi.org/10.1145/2702613.2702634
Yang, J. (2015). Efficient Algorithms for HandlingMassive Terrains. Department of Computer Science, University of Aarhus.
Mortensen, M. L., Chester, S., Assent, I. & Magnani, M. (2015). Efficient caching for constrained skyline queries. In International Conference on Extending Database Technology (EDBT 2015) (pp. 337-348). openproceedings.org. https://doi.org/10.5441/002/edbt.2015.30
Andrychowicz, M., Damgård, I. B., Dziembowski, S., Faust, S. & Polychroniadou, A. (2015). Efficient leakage resilient circuit compilers. In K. Nyberg (Ed.), Topics in Cryptology - CT-RSA 2015: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (pp. 311-329). Springer VS. https://doi.org/10.1007/978-3-319-16715-2_17
Genkin, D., Ishai , Y. & Polychroniadou, A. (2015). Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits. In R. Gennaro & M. Robshaw (Eds.), Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II (pp. 721-741). Springer VS. https://doi.org/10.1007/978-3-662-48000-7_35
Döttling, N. M. & Schröder, D. (2015). Efficient Pseudorandom Functions via On-the-Fly Adaptation. In R. Gennaro & M. Robshaw (Eds.), Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I (pp. 329-350). Springer VS. https://doi.org/10.1007/978-3-662-47989-6_16
David, B., Dowsley, R., Katti, R. & Nascimento, A. C. A. (2015). Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols. In M.-H. Au & A. Miyaji (Eds.), Provable Security: 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings (Vol. 9451, pp. 354-367). Springer VS. https://doi.org/10.1007/978-3-319-26059-4_20
Ateniese, G., Dagdelen, Ö., Damgård, I. B. & Venturi, D. (2015). Entangled Encodings and Data Entanglement. In SCC '15: Proceedings of the 3rd International Workshop on Security in Cloud Computing (pp. 3-12). Association for Computing Machinery. https://doi.org/10.1145/2732516.2732524
Dupont-Dupuis, F., Fawzi, O. & Wehner, S. (2015). Entanglement sampling and applications. I E E E Transactions on Information Theory, 61(2), 1093-1112. Article 6967820. https://doi.org/10.1109/TIT.2014.2371464
Dicke, C. & Müller, J. (2015). Evaluating Mid-air List Interaction for Spatial Audio Interfaces. In Proceedings of the 3rd ACM Symposium on Spatial User Interaction, SUI '15 (pp. 24-33). Association for Computing Machinery. https://doi.org/10.1145/2788940.2788945
Chester, S. & Assent, I. (2015). Explanations for Skyline Query Results. In International Conference on Extending Database Technology (EDBT 2015) (pp. 349-360). openproceedings.org. https://doi.org/10.5441/002/edbt.2015.31
Verdezoto, N. (2015). Exploring Challenges and Opportunities for Eco-Feedback Technology. Paper presented at Workshop on Expanding the Boundaries: A SIGCHI HCI & Sustainability , Seoul, Korea, Republic of. http://wp.lancs.ac.uk/chi15sust/files/2015/04/pp_verdezoto.pdf
Wilkinson, B. T. (2015). Exploring the Problem Space of Orthogonal Range Searching. Department of Computer Science, Aarhus University.
Zhang, Y., Chong, M. K., Müller, J., Bulling, A. & Gellersen, H. (2015). Eye tracking for public displays in the wild. Personal and Ubiquitous Computing, 19(5-6), 967-981. https://doi.org/10.1007/s00779-015-0866-8
Filos-Ratsikas, A., Li, M., Zhang, J. & Zhang, Q. (2015). Facility Location with Double-peaked Preferences. In Proceedings of the 29th International AAAI Conference on Artificial Intelligence, and the 27th Innovative Applications of Artificial Intelligence Conference, vol. 2 (pp. 893-899). AAAI Press. http://www.aaai.org/ocs/index.php/AAAI/AAAI15/paper/view/9379/9385
de Berg, M., Tsirogiannis, C. & Wilkinson, B. T. (2015). Fast computation of categorical richness on raster data sets and related problems. In GIS '15: Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems Article 18 https://doi.org/10.1145/2820783.2820825
de Berg, M., Tsirogiannis, C. & Wilkinson, B. (2015). Fast Computation of Categorical Richness on Raster Data Sets and Related Problems. In Proceedings. Workshop on Massive Data Algorithmics (MASSIVE) (pp. 86-107)
Donnez, J., Dolmans, M.-M., Pellicer, A., Diaz-Garcia, C., Ernst, E., Macklon, K. T. & Andersen, C. Y. (2015). Fertility preservation for age-related fertility decline. Lancet, 385(9967), 506-7. https://doi.org/10.1016/S0140-6736(15)60198-2
Bertelsen, O. W., Halskov, K., Bardzell, S. (Ed.), Bødker, S. (Ed.), Iversen, O. S. (Ed.), Klokmose, C. N. (Ed.) & Korsgaard, H. (Ed.) (2015). Foreword. In Critical Alternatives: Proceedings of The Fifth Decennial Aarhus Conference 17- 21 August 2015, Aarhus, Denmark (pp. ii). Department of Computer Science, Aarhus University. http://cs.au.dk/~hko/Aarhus2015ProceedingsVolumeI.pdf
Petersen, M. G., Rasmussen, M. K. & Jakobsen, K. (2015). Framing open-ended and constructive play with emerging interactive materials. In Proceedings of the 14th International Conference on Interaction Design and Children , IDC '15 (pp. 150-159 ). Association for Computing Machinery. https://doi.org/10.1145/2771839.2771855
Durkota, K., Lisy, V., Kiekintveld, C. & Bosansky, B. (2015). Game-Theoretic Algorithms for Optimal Nework Security Hardening Using Attack Graphs. Abstract from International Conference on Autonomous Agents and Multiagent Systems, Istanbul, Turkey. http://www.aamas2015.com/en/AAMAS_2015_USB/aamas/p1773.pdf
Miruchna , V., Walter , R., Lindlbauer , D., Lehmann , M., Klitzing, R. V. & Müller, J. (2015). GelTouch: Localized Tactile Feedback Through Thin, Programmable Gel. In UIST '15 Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology (pp. 3-10 ). Association for Computing Machinery. https://doi.org/10.1145/2807442.2807487
David, B. M., Nishimaki, R., Ranellucci, S. & Tapp, A. (2015). Generalizing Efficient Multiparty Computation. In A. Lehmann & S. Wolf (Eds.), Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (pp. 15-32 ). Springer VS. https://doi.org/10.1007/978-3-319-17470-9_2
Döttling, N., Kraschewski, D., Müller-Quade, J. & Nilges, T. (2015). General statistically secure computation with bounded-resettable hardware tokens. In Y. Dodis & J. Buus Nielsen (Eds.), Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I (pp. 319-344). Springer VS. https://doi.org/10.1007/978-3-662-46494-6_14
Son, W., Bae, S. W. & Ahn, H. K. (2015). Group nearest neighbor queries in the L1 plane. Theoretical Computer Science, 592, 39–48. https://doi.org/10.1016/j.tcs.2015.05.011