Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Durkota, K., Lisý, W., Kiekintveld, C. & Bosansky, B. (2015). Optimal Network Security Hardening Using Attack Graph Games. In N. Criado, M. Rehak, J. M. Such & L. Vercouter (Eds.), 2nd International Workshop on Agents and Cybersecurity, ACySE 2015: Workshop Notes at AAMAS 2015 (pp. 7-14). Lancaster University. http://www.lancaster.ac.uk/staff/suchj/acyse2015-proceedings/ACySE2015_proceedings.pdf#page=14
Micenková, B. (2015). Outlier Detection and Explanation for Domain Experts. Department of Computer Science, University of Aarhus.
Bødker, S. & Zander, P.-O. (2015). Participation in design between public sector and local communities. In B. Begole & J. Kim (Eds.), Proceedings of the 7th International Conference on Communities and Technologies, C&T '15 Association for Computing Machinery. https://doi.org/10.1145/2768545.2768546
Nielsen, M. & Grønbæk, K. (2015). PivotViz: Interactive Visual Analysis of Multidimensional Library Transaction Data. In Proceedings of the 15th ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL '15 : Large, Dynamic and Ubiquitous –The Era of the Digital Library (pp. 139-142). Association for Computing Machinery. https://doi.org/10.1145/2756406.2756937
Feldthaus, A. (2015). Pointer Analysis for JavaScript Programming Tools. Department of Computer Science, Aarhus University.
Jakobsen, T. P. (2015). Practical Aspects of Secure Multiparty Computation. Department of Computer Science, Aarhus University.
Nüchel, J., Bøcher, P. K. & Svenning, J.-C. (2015). Present and potential distribution of Snub-nosed Monkey. Poster session presented at International Biogeography Society: 7th Biennial Conference, Bayreuth, Germany.
Meiklejohn, S. & Orlandi, C. (2015). Privacy-enhancing overlays in bitcoin. In M. Brenner , N. Christin , B. Johnson & K. Rohloff (Eds.), Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Vol. 8976, pp. 127-141). Springer. https://doi.org/10.1007/978-3-662-48051-9_10
Frederiksen, T. K., Nielsen, J. B. & Orlandi, C. (2015). Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. In E. Oswald & M. Fischlin (Eds.), Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (pp. 191-219). Springer VS. https://doi.org/10.1007/978-3-662-46803-6_7
Clouston, R., Bizjak, A., Grathwohl, H. B. & Birkedal, L. (2015). Programming and reasoning with guarded recursion for coinductive types. In A. Pitts (Ed.), Foundations of Software Science and Computation Structures: 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (pp. 305-316). Springer VS. https://doi.org/10.1007/978-3-662-46678-0_26
Mukherjee, P. (2015). Protecting Cryptographic Memory against Tampering Attack. Department of Computer Science, Aarhus University.
Midtgaard, J. & Møller, A. (2015). QuickChecking Static Analysis Properties. In 8th IEEE International Conference on Software Testing, Verification and Validation (ICST), 2015 (pp. 1-10). IEEE. https://doi.org/10.1109/ICST.2015.7102603
Fang, W., Filos-Ratsikas, A., Frederiksen, S. K. S., Tang, P. & Zuo, S. (2015). Randomized Assignments for Barter Exchanges: Fairness vs Efficiency. In T. Walsh (Ed.), Algorithmic Decision Theory: 4th International Conference, ADT 2015, Lexington, KY, USA, September 27-30, 2015, Proceedings (pp. 537-552). Springer VS. https://doi.org/10.1007/978-3-319-23114-3_32
Wilkinson, B. T. (2015). Revisiting visibility in the plane. Paper presented at International Symposium on Computational Geometry, Eindhoven, Netherlands. http://www.madalgo.au.dk/~bw/papers/2015W.pdf
Bhattacharya, S., Blunck, H., Kjaergaard, M. B. & Nurmi, P. (2015). Robust and Energy-Efficient Trajectory Tracking for Mobile Devices. I E E E Transactions on Mobile Computing, 14(2), 430-443. https://doi.org/10.1109/TMC.2014.2318712
Basile, D., Galletta, L. & Mezzetti, G. (2015). Safe Adaptation Through Implicit Effect Coercion. In C. Bodei, G.-L. Ferrari & C. Priami (Eds.), Programming Languages with Applications to Biology and Security: Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday (Vol. 9465, pp. 122-141). Springer Publishing Company. https://doi.org/10.1007/978-3-319-25527-9_10
Chester, S., Sidlauskas, D., Assent, I. & Bøgh, K. S. (2015). Scalable Parallelization of Skyline Computation for Multi-core Processors. In 31st IEEE International Conference on Data Engineering (ICDE 2015) (pp. 1083 - 1094). IEEE Computer Society Press. https://doi.org/10.1109/ICDE.2015.7113358
Skovsgaard, A. & Jensen, C. S. (2015). Scalable Spatio-Textual Region Querying in Key-Value Stores. Paper presented at ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Dallas, United States. http://sigspatial2014.sigspatial.org/
Giacomelli, I., Olimid, R. & Ranellucci, S. (2015). Security of Linear Secret-Sharing Schemes Against Mass Surveillance. In M. Reiter & D. Naccache (Eds.), Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Vol. 9476, pp. 43-58). Springer. https://doi.org/10.1007/978-3-319-26823-1
Aronov, B., Driemel, A., Van Kreveld, M., Löffler, M. & Staals, F. (2015). Segmentation of trajectories on nonmonotone criteria. A C M Transactions on Algorithms, 12(2), Article 26. https://doi.org/10.1145/2660772
Nunes, F., Verdezoto, N., Fitzpatrick, G., Kyng, M., Grönvall, E. & Storni, C. (2015). Self-Care Technologies in HCI: Trends, Tensions, and Opportunities. ACM Transactions on Computer-Human Interaction, 22(6), Article 33. https://doi.org/10.1145/2803173
Frederiksen, S. K. S. (2015). Semi-algebraic Geometry for Stochastic Games. Department of Computer Science, Aarhus University.
Bosansky, B. & Cemak, J. (2015). Sequence-Form Algorithm for Computing Stackelberg Equilibria in Extensive-Form Games. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (pp. 805-811). AAAI Press. http://www.aaai.org/ocs/index.php/AAAI/AAAI15/paper/view/9610
Clouston, R. & Goré, R. (2015). Sequent Calculus in the Topos of Trees. In A. Pitts (Ed.), Foundations of Software Science and Computation Structures : 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (Vol. 9034, pp. 133-147). Springer VS. http://link.springer.com/chapter/10.1007/978-3-662-46678-0_9
Pettie, S. (2015). Sharp Bounds on Formation-free Sequences. In P. Indyk (Ed.), Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '15 (pp. 592-604 ). Society for Industrial and Applied Mathematics. http://dl.acm.org/citation.cfm?id=2722155
Baader, S. & Bødker, S. (2015). SketchCode – an extensible code editor for crafting software. In End-User Development: 5th International Symposium, IS-EUD 2015, Madrid, Spain, May 26-29, 2015. Proceedings (Vol. 9083, pp. 211-216). Springer. https://doi.org/10.1007/978-3-319-18425-8_18
Møller, A. & Naik, M. (2015). SOAP'15: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. In Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis Association for Computing Machinery. http://dl.acm.org/citation.cfm?id=2771284
Filos-Ratsikas, A. (2015). Social Welfare in Algorithmic Mechanism Design Without Money. Department of Computer Science, Aarhus University.
Afshani, P. & Sitchinava , N. (2015). Sorting and Permuting without Bank Conflicts on GPUs. In N. Bansal & I. Finocchi (Eds.), Algorithms – ESA 2015: 23rd Annual European Symposium, Patras, Greece, September 14–16, 2015, Proceedings (pp. 13-24). Springer VS. https://doi.org/10.1007/978-3-662-48350-3_2
Truelsen, J. (2015). Space Efficient Data Structures and External Terrain Algorithms. Department of Computer Science, Aarhus University.
Cascudo Pueyo, I., Cramer, R., Mirandola, D. & Zémor, G. (2015). Squares of Random Linear Codes. I E E E Transactions on Information Theory, 61(3), 1159-1173. https://doi.org/10.1109/TIT.2015.2393251
Jensen, C. S., Møller, A., Raychev, V., Dimitrov, D. & Vechev, M. (2015). Stateless Model Checking of Event-Driven Applications. In OOPSLA 2015 : Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (pp. 57-73). Association for Computing Machinery. https://doi.org/10.1145/2814270.2814282
Madsen, M. (2015). Static Analysis of Dynamic Languages. Department of Computer Science, Aarhus University.
Bizjak, A. & Birkedal, L. (2015). Step-indexed logical relations for probability. In A. Pitts (Ed.), Foundations of Software Science and Computation Structures: 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (pp. 279-294 ). Springer VS. https://doi.org/10.1007/978-3-662-46678-0_18
Da Rocha Pinto, P., Dinsdale-Young, T. & Gardner, P. (2015). Steps in Modular Specifications for Concurrent Modules: (Invited Tutorial Paper). Electronic Notes in Theoretical Computer Science, 319, 3-18. https://doi.org/10.1016/j.entcs.2015.12.002
Cermak, J., Bosansky, B. & Gatti, N. (2015). Strategy Effectiveness of Game-Theoretical Solution Concepts in Extensive-Form General-Sum Games. Abstract from International Conference on Autonomous Agents and Multiagent Systems, Istanbul, Turkey. http://dl.acm.org/citation.cfm?id=2773450&CFID=719158965&CFTOKEN=25615646
Son, W. & Afshani, P. (2015). Streaming Algorithms for Smallest Intersecting Ball of Disjoint Balls. In R. Jain, S. Jain & F. Stephan (Eds.), Theory and Applications of Models of Computation: 12th Annual Conference, TAMC 2015, Singapore, May 18-20, 2015, Proceedings (pp. 189-199 ). Springer VS. https://doi.org/10.1007/978-3-319-17142-5
Brodal, G. S., Nielsen, J. A. S. & Truelsen, J. (2015). Strictly Implicit Priority Queues: On the Number of Moves and Worst-Case Time. In F. Dehne, J.-R. Sack & U. Stege (Eds.), Algorithms and Data Structures: 14th International Symposium, WADS 2015, Proceedings (pp. 91-102). Springer VS. https://doi.org/10.1007/978-3-319-21840-3_8