Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Nielsen, M. & Grønbæk, K. (2015). Towards highly affine visualizations of consumption data from buildings. In IVAPP 2015 - 6th International Conference on Information Visualization Theory and Applications; VISIGRAPP, Proceedings (pp. 247-255). SCITEPRESS Digital Library.
Prentow, T. S., Blunck, H., Kjærgaard, M. B. & Stisen, A. (2015). Towards Indoor Transportation Mode Detection using Mobile Sensing. In S. Sigg , P. Nurmi & F. Salim (Eds.), Mobile Computing, Applications, and Services : 7th International Conference, MobiCASE 2015, Berlin, Germany, November 12-13, 2015, Revised Selected Papers (Vol. 162). Springer. https://doi.org/10.1007/978-3-319-29003-4
Blevis, E., Koskinen, I. K., Lee, K.-P., Bødker, S., Chen, L.-L., Lim, Y., Wei, H. & Wakkary, R. (2015). Transdisciplinary Interaction Design in Design Education. In B. Begole & J. Kim (Eds.), Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (pp. 833-838). Association for Computing Machinery. https://doi.org/10.1145/2702613.2724726
Derczynski, L., Chester, S. & Bøgh, K. S. (2015). Tune Your Brown Clustering, Please. In G. A. Angelova, K. Bontcheva & R. Mitkov (Eds.), International Conference Recent Advances in Natural Language Processing ’2015 Proceedings (pp. 110–117). INCOMA Ltd. http://lml.bas.bg/ranlp2015/docs/RANLP_main.pdf
Garg, S. & Polychroniadou, A. (2015). Two-round adaptively secure MPC from indistinguishability obfuscation. In Y. Dodis & J. Buus Nielsen (Eds.), Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (pp. 614-637). Springer VS. https://doi.org/10.1007/978-3-662-46497-7_24
David, B. M., Dowsley, R., van der Graaf, J., Marques, D., Nascimento, A. C. A. & Pinto, A. (2015). Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra. I E E E Transactions on Information Forensics and Security, 11(1), 59 - 73 . https://doi.org/10.1109/TIFS.2015.2476783
Saad-Sulonen, J., Halskov, K., Eriksson, E., Vines, J., Huybrechts, L. & Karasti, T. H. (2015). Unfolding Participation: What do we mean by participation – conceptually and in practice. Aarhus Series on Human Centered Computing , 1(1). https://doi.org/10.7146/aahcc.v1i1.21324
de Montjoye, Y.-A., Radaelli, L., Singh, V. K. & Pentland, A. S. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 347(6221), 536-539. https://doi.org/10.1126/science.1256297
Branzei, S. & Procaccia, A. D. (2015). Verifiably Truthful Mechanisms. In T. Roughgarden (Ed.), Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS '15 (pp. 297-306 ). Association for Computing Machinery. https://doi.org/10.1145/2688073.2688098
Christensen, L. R. & Bertelsen, O. W. (2015). View of Causation for CSCW: Manipulation and Control in the Material Field of Work. In V. Wulf, K. Schmidt & D. Randall (Eds.), Designing Socially Embedded Technologies in the Real-World, Part II (pp. 151-169). Springer. https://doi.org/10.1007/978-1-4471-6720-4_8
Klokmose, C. N., Eagan, J. R., Baader, S., Mackay, W. & Beaudouin-Lafon, M. (2015). Webstrates: Shareable Dynamic Media. In UIST'15 Proceedings of the 28th annual ACM symposium on User interface software and technology (UIST '15) Association for Computing Machinery. https://doi.org/10.1145/2807442.2807446
Hornbæk, K., Oulasvirta, A., Reeves, S. & Bødker, S. (2015). What to Study in HCI? In B. Begole & J. Kim (Eds.), Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (pp. 2385-2388). Association for Computing Machinery. https://doi.org/10.1145/2702613.2702648
Botero, A., Van Amste, F., Seravalli, A. & Saad-Sulonen, J. (2015). WS co-designing and commoning. Nordic Design Research, 2015(6). http://www.nordes.org/opj/index.php/n13/article/view/422
Xue, H., Kelmann, P., Inati, S., Sørensen, T. S. & Hansen, M. (2014). 3D High Resolution l1-SPIRiT Reconstruction on Gadgetron based Cloud: no. 1882. Abstract from Joint Annual Meeting ISMRM-ESMRMB, Milan, Italy. http://www.ismrm.org/14/
Prentow, T. S., Blunck, H., Stisen, A., Kjærgaard, M. B. & Grønbæk, K. (2014). Accurate estimation of indoor travel times: learned unsupervised from position traces. In M. Youssef , C. Mascolo & F. Kawsar (Eds.), MOBIQUITOUS '14. Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 90-99). Association for Computing Machinery. https://doi.org/10.4108/icst.mobiquitous.2014.258020
Clausen, C., Danvy, O. & Masuko, M. (2014). A Characterization of Moessner's Sieve. Theoretical Computer Science, 546(August), 244–256. https://doi.org/10.1016/j.tcs.2014.03.012
Skovsgaard, A., Sidlauskas, D. & Jensen, C. S. (2014). A Clustering Approach to the Discovery of Points of Interest from Geo-Tagged Microblog Posts. In J. E. Guerrero (Ed.), 15th IEEE International Conference on Mobile Data Management (MDM), 2014 : Proceedings (pp. 178-189 (vol. 1)). IEEE Computer Society Press. https://doi.org/10.1109/MDM.2014.28
Damgård, I. B. & Nielsen, J. B. (2014). Adaptive versus static security in the UC Model. In S. S. M. Chow , J. K. Liu, L. C. K. Hui & S. M. Yiu (Eds.), Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (pp. 10-28). Springer VS. https://doi.org/10.1007/978-3-319-12475-9_2
Dupont-Dupuis, F., Szehr, O. & Tomamichel, M. (2014). A decoupling approach to classical data transmission over quantum channels. I E E E Transactions on Information Theory, 60(3), 1562 - 1572 . https://doi.org/10.1109/TIT.2013.2295330
Bizjak, A., Birkedal, L. & Miculan, M. (2014). A model of countable nondeterminism in guarded type theory. In G. Dowek (Ed.), Rewriting and Typed Lambda Calculi: Joint International Conference, RTA-TLCA 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014. Proceedings (pp. 108-123). Springer VS. https://doi.org/10.1007/978-3-319-08918-8_8
Wilkinson, B. T. (2014). Amortized bounds for dynamic orthogonal range reporting. In A. S. Schulz & D. Wagner (Eds.), Algorithms - ESA 2014: 22th Annual European Symposium, Wroclaw, Poland, September 8-10, 2014. Proceedings (pp. 842-856). Springer. https://doi.org/10.1007/978-3-662-44777-2_69
Ruiz-Ruiz, A., Blunck, H., Prentow, T. S., Stisen, A. & Kjærgaard, M. B. (2014). Analysis Methods for Extracting Knowledge from Large-Scale WiFi Monitoring to Inform Building Facility Planning. In G. Záruba & K. Farkas (Eds.), Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom 2013) (pp. 130 - 138 ). IEEE Communications Society. https://doi.org/10.1109/PerCom.2014.6813953
Damgård, I. B., Lauritsen, R. & Toft, T. (2014). An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation. In M. Abdalla & R. D. Prisco (Eds.), Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (pp. 398-415 ). Springer. https://doi.org/10.1007/978-3-319-10879-7_23
Gupta, V. (2014). Applied bioinformatics: Genome annotation and transcriptome analysis. Department of Computer Science, Aarhus University.
Toft, T. (2014). A secure priority queue; or: On secure datastructures from multiparty computation. In H.-S. Lee & D.-G. Han (Eds.), Information Security and Cryptology -- ICISC 2013: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers (Vol. 8565, pp. 20-33). Springer. https://doi.org/10.1007/978-3-319-12160-4_2
Møller, A. & Schwarz, M. R. (2014). Automated Detection of Client-State Manipulation Vulnerabilities. A C M Transactions on Software Engineering and Methodology, 23/4, Article 29. https://doi.org/10.1145/2531921
Bødker, S. & Polli, A. M. (2014). Between initial familiarity and future use – a case of Collocated Collaborative Writing. In C. Rossitta, L. Ciolfi, D. M. & B. Conein (Eds.), COOP 2014 - Proceedings of the 11th International Conference on the Design of Cooperative Systems, 27-30 May 2014, Nice (France) Springer. http://www.springer.com/computer/hci/book/978-3-319-06497-0
Wriedt Larsen, R., Obel, C., Skovgård Jensen, T. & Grønbæk, K. (2014). Big data giver gladere børn og bedre busruter. Videnskab.dk [online].
Madsen, O. L. (2014). Building Safe Concurrency Abstractions. In G. Agha, A. Igarashi, N. Kobayashi , H. Masuhara, S. Matsuoka , E. Shibayama & K. Taura (Eds.), Concurrent Objects and Beyond: Papers dedicated to Akinori Yonezawa on the Occasion of His 65th Birthday (pp. 66-104). Springer VS. https://doi.org/10.1007/978-3-662-44471-9_4
Klokmose, C. N., Kristensen, J. B., Bagge, R. & Halskov, K. (2014). BullsEye: High-Precision Fiducial Tracking for Table-based Tangible Interaction. In R. Dachselt, N. Graham, K. Hornbæk & M. Nacenta (Eds.), Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces, ITS '14 (pp. 269-278 ). Association for Computing Machinery. https://doi.org/10.1145/2669485.2669503
Pagh, R., Wei, Z., Yi, K. & Zhang , Q. (2014). Cache-Oblivious Hashing. Algorithmica, 69(4), 864-883. https://doi.org/10.1007/s00453-013-9763-6
Grönvall, E., Kinch, S., Petersen, M. G. & Rasmussen, M. K. (2014). Causing Commotion with a Shape-changing Bench: Experiencing Shape-Changing Interfaces in Use. In M. Jones, P. Palanque, A. Schmidt & T. Grossman (Eds.), CHI'14, SIGCHIConference on Human Factors in Computing Systems : Proceedings (pp. 2559-2568). Association for Computing Machinery. https://doi.org/10.1145/2556288.2557360
Feldthaus, A. & Møller, A. (2014). Checking Correctness of TypeScript Interfaces for JavaScript Libraries. In OOPSLA '14 Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications Association for Computing Machinery. https://doi.org/10.1145/2660193.2660215
Hansen, K. A., Komarath, B., Sarma M. N., J., Talebanfard, N. & Skyum, S. (2014). Circuit Complexity of Properties of Graphs with Constant Planar Cutwidth. In E. Csuhaj-Varjú, M. Dietzfelbinger & Z. Ésik (Eds.), Mathematical Foundations of Computer Science 2014: 39th International Symposium, MFCS 2014, Budapest, Hungary, August 25-29, 2014. Proceedings, Part II (pp. 336-347 ). Springer VS. https://doi.org/10.1007/978-3-662-44465-8_29
Korsgaard, H. & Brynskov, M. (2014). City Bug Report: Urban prototyping as participatory process and practice. In M. Brynskov, P. Dalsgaard & A. F. G. Schiec (Eds.), MAB14, Proceedings of the 2nd Media Architecture Biennale Conference : World Cities (pp. 21-29). Association for Computing Machinery. https://doi.org/10.1145/2682884.2682896
Huang, Z., Radunović, B., Vojnović, M. & Zhang, Q. (2014). Communication Complexity of Approximate Matching in Distributed Graphs. Paper presented at Symposium on Theoretical Aspects of Computer Science, München, Germany. http://www.cse.ust.hk/~huangzf/stacs15-matching.pdf
Damgård, I. B., David, B. M., Giacomelli, I. & Nielsen, J. B. (2014). Compact VSS and Efficient Homomorphic UC Commitments. In P. Sarkar & T. Iwata (Eds.), Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (pp. 213-232 ). Springer VS. https://doi.org/10.1007/978-3-662-45608-8_12
Abam, M. A., Daneshpajouh, S., Deleuran, L., Ehsani, S. & Ghodsi, M. (2014). Computing homotopic line simplification. Computational Geometry, 47(7), 728-739. https://doi.org/10.1016/j.comgeo.2014.02.002
Afshani, P., Sheng, C., Tao, Y. & Wilkinson, B. T. (2014). Concurrent range reporting in two-dimensional space. In C. Chekuri (Ed.), Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms: SODA 2014; Portland, OR; United States; 5 January 2014 through 7 January 2014 (pp. 983-994). Association for Computing Machinery. http://www.scopus.com/inward/record.url?scp=84902105500&partnerID=8YFLogxK