Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Blonder, B., Nogués-Bravo, D., Borregaard, M. K., Donoghue II, J. C., Jørgensen, P. M., Kraft, N. J. B., Lessard, J.-P., Morueta-Holme, N., Sandel, B. S., Svenning, J.-C., Violle, C., Rahbek, C. & Enquist, B. J. (2015). Linking environmental filtering and disequilibrium to biogeography with a community climate framework. Ecology, 96(4), 972-985. https://doi.org/10.1890/14-0589.1
Döttling, N. M. (2015). Low noise LPN: KDM secure public key encryption and sample amplification. In J. Katz (Ed.), Public-Key Cryptography -- PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (Vol. 9020, pp. 604-626). Springer VS. https://doi.org/10.1007/978-3-662-46447-2_27
Agarwal, P. K., Mølhave, T., Revsbæk, M., Safa, I., Wang, Y. & Yang, J. (2015). Maintaining Contour Trees of Dynamic Terrains. In L. Arge & J. Pach (Eds.), 31st International Symposium on Computational Geometry (SoCG 2015) (pp. 796-811) https://doi.org/10.4230/LIPIcs.SOCG.2015.796
Prentow, T. S., Thom, A., Blunck, H. & Vahrenhold, J. (2015). Making Sense of Trajectory Data in Indoor Spaces. In Proceedings of the 16th IEEE International Conference on Mobile Data Management, vol.1 (pp. 116-121). IEEE. https://doi.org/10.1109/MDM.2015.44
Bødker, S., Bertelsen, O. W., Bannon, L. J., De Souza, C., Barbosa, S. & Prates, R. (2015). Mediation and Meaning in HCI. In Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part IV (pp. 667-668). Springer. https://doi.org/10.1007/978-3-319-22723-8_93
Koester, T., Jakobsen, J., Brøsted, J. E., Bach, K., Petersen, O. B., Kyng, M. & Rasch, S. M. (2015). Mental Models and Deliberate Manipulation of Data. In Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 2015 (1 ed., Vol. 4, pp. 62-69) https://doi.org/10.1177/2327857915041021
Faonio, A., Nielsen, J. B. & Venturi, D. (2015). Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. In M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (Eds.), Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Vol. Part 1, pp. 456-468). Springer VS. https://doi.org/10.1007/978-3-662-47672-7_37
Sieczkowski, F., Bizjak, A. & Birkedal, L. (2015). ModuRes: A Coq Library for Modular Reasoning About Concurrent Higher-Order Imperative Programming Languages. In C. Urban & X. Zhang (Eds.), Interactive Theorem Proving: 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings (pp. 375-390). Springer. https://doi.org/10.1007/978-3-319-22102-1_25
Antoy, S., Johannsen, J. & Libby, S. (2015). Needed computations shortcutting needed steps. In Electronic Proceedings in Theoretical Computer Science, EPTCS (Vol. 183, pp. 18-32). Open Publishing Association. https://doi.org/10.4204/EPTCS.183.2
Clifford, R., Jørgensen, A. G. & Larsen, K. G. (2015). New Unconditional Hardness Results for Dynamic and Online Problems. In 56th IEEE Symposium on Foundations of Computer Science (FOCS) Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS IEEE Computer Society Press. http://arxiv.org/pdf/1504.01836v1.pdf
Bhattacharyya, R. & Mukherjee, P. (2015). Non-adaptive programmability of random oracle. Theoretical Computer Science, 592, 97-114. https://doi.org/10.1016/j.tcs.2015.05.026
Østerby, O. (2015). Numerical Solution of Parabolic Equations. Department of Computer Science, Aarhus University. https://doi.org/10.7146/aul.5.5
Johannsen, J. (2015). On Computational Small Steps and Big Steps: Refocusing for Outermost Reduction. Department of Computer Science, Aarhus University.
Kyng, M. (2015). On Creating and Sustaining Alternatives: The case of Danish Telehealth. In O. Bertelsen & K. Halskov (Eds.), Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers Department of Computer Science, Aarhus University. https://doi.org/10.7146/aahcc.v1i1.21297
Larsen, K. G., Munro, J. I., Nielsen, J. S. & Thankachan, S. V. (2015). On hardness of several string indexing problems. Theoretical Computer Science, 582, 74-82. https://doi.org/10.1016/j.tcs.2015.03.026
Verdezoto, N. & Grönvall, E. (2015). On preventive blood pressure self-monitoring at home. Cognition, Technology and Work, 18(2), 267-285. https://doi.org/10.1007/s10111-015-0358-7
Cascudo Pueyo, I., Cramer, R., Mirandola, D., Padró, C. & Xing, C. (2015). On Secret Sharing with Nonlinear Product Reconstruction. S I A M Journal on Discrete Mathematics, 29(2), 1114-1131. https://doi.org/10.1137/130931886
Hubacek, P. & Wichs, D. (2015). On the Communication Complexity of Secure Function Evaluation with Long Output. In T. Roughgarden (Ed.), Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS '15 (pp. 163-172 ). Association for Computing Machinery. https://doi.org/10.1145/2688073.2688105
Damgård, I. B., Dupont-Dupuis, F. & Nielsen, J. B. (2015). On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation. In Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (pp. 87-104). Springer VS. https://doi.org/10.1007/978-3-319-17470-9_6
Durkota, K., Lisý, W., Kiekintveld, C. & Bosansky, B. (2015). Optimal Network Security Hardening Using Attack Graph Games. In N. Criado, M. Rehak, J. M. Such & L. Vercouter (Eds.), 2nd International Workshop on Agents and Cybersecurity, ACySE 2015: Workshop Notes at AAMAS 2015 (pp. 7-14). Lancaster University. http://www.lancaster.ac.uk/staff/suchj/acyse2015-proceedings/ACySE2015_proceedings.pdf#page=14
Micenková, B. (2015). Outlier Detection and Explanation for Domain Experts. Department of Computer Science, University of Aarhus.
Bødker, S. & Zander, P.-O. (2015). Participation in design between public sector and local communities. In B. Begole & J. Kim (Eds.), Proceedings of the 7th International Conference on Communities and Technologies, C&T '15 Association for Computing Machinery. https://doi.org/10.1145/2768545.2768546
Nielsen, M. & Grønbæk, K. (2015). PivotViz: Interactive Visual Analysis of Multidimensional Library Transaction Data. In Proceedings of the 15th ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL '15 : Large, Dynamic and Ubiquitous –The Era of the Digital Library (pp. 139-142). Association for Computing Machinery. https://doi.org/10.1145/2756406.2756937
Feldthaus, A. (2015). Pointer Analysis for JavaScript Programming Tools. Department of Computer Science, Aarhus University.
Jakobsen, T. P. (2015). Practical Aspects of Secure Multiparty Computation. Department of Computer Science, Aarhus University.
Nüchel, J., Bøcher, P. K. & Svenning, J.-C. (2015). Present and potential distribution of Snub-nosed Monkey. Poster session presented at International Biogeography Society: 7th Biennial Conference, Bayreuth, Germany.
Meiklejohn, S. & Orlandi, C. (2015). Privacy-enhancing overlays in bitcoin. In M. Brenner , N. Christin , B. Johnson & K. Rohloff (Eds.), Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Vol. 8976, pp. 127-141). Springer. https://doi.org/10.1007/978-3-662-48051-9_10
Frederiksen, T. K., Nielsen, J. B. & Orlandi, C. (2015). Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. In E. Oswald & M. Fischlin (Eds.), Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (pp. 191-219). Springer VS. https://doi.org/10.1007/978-3-662-46803-6_7
Clouston, R., Bizjak, A., Grathwohl, H. B. & Birkedal, L. (2015). Programming and reasoning with guarded recursion for coinductive types. In A. Pitts (Ed.), Foundations of Software Science and Computation Structures: 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (pp. 305-316). Springer VS. https://doi.org/10.1007/978-3-662-46678-0_26
Mukherjee, P. (2015). Protecting Cryptographic Memory against Tampering Attack. Department of Computer Science, Aarhus University.
Midtgaard, J. & Møller, A. (2015). QuickChecking Static Analysis Properties. In 8th IEEE International Conference on Software Testing, Verification and Validation (ICST), 2015 (pp. 1-10). IEEE. https://doi.org/10.1109/ICST.2015.7102603
Fang, W., Filos-Ratsikas, A., Frederiksen, S. K. S., Tang, P. & Zuo, S. (2015). Randomized Assignments for Barter Exchanges: Fairness vs Efficiency. In T. Walsh (Ed.), Algorithmic Decision Theory: 4th International Conference, ADT 2015, Lexington, KY, USA, September 27-30, 2015, Proceedings (pp. 537-552). Springer VS. https://doi.org/10.1007/978-3-319-23114-3_32
Wilkinson, B. T. (2015). Revisiting visibility in the plane. Paper presented at International Symposium on Computational Geometry, Eindhoven, Netherlands. http://www.madalgo.au.dk/~bw/papers/2015W.pdf
Bhattacharya, S., Blunck, H., Kjaergaard, M. B. & Nurmi, P. (2015). Robust and Energy-Efficient Trajectory Tracking for Mobile Devices. I E E E Transactions on Mobile Computing, 14(2), 430-443. https://doi.org/10.1109/TMC.2014.2318712