Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Damgård, I. B., Funder, J., Nielsen, J. B. & Salvail, L. (2014). Superposition attacks on cryptographic protocols. In C. Padró (Ed.), Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (pp. 142-161). Springer. https://doi.org/10.1007/978-3-319-04268-8_9
Andreasen, E., Li, G. & Ghosh, I. (2014). SymJS: Automatic Symbolic Testing of JavaScript Web Applications. In S.-C. Cheung , A. Orso & M.-A. Storey (Eds.), Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014 (pp. 449-459 ). Association for Computing Machinery.
Midtgaard, J., Brabrand, C. & Wasowski , A. (2014). Systematic Derivation of Static Analyses for Software Product Lines. In W. Binder (Ed.), MODULARITY '14 Proceedings of the 13th international conference on Modularity (pp. 181-192 ). Association for Computing Machinery. https://doi.org/10.1145/2577080.2577091
Da Rocha Pinto, P., Dinsdale-Young, T. & Gardner, P. (2014). TaDA: A logic for time and data abstraction. In R. Jones (Ed.), ECOOP 2014 – Object-Oriented Programming: 28th European Conference, Uppsala, Sweden, July 28 – August 1, 2014. Proceedings (pp. 207-231). Springer. https://doi.org/10.1007/978-3-662-44202-9_9
Wang, Q., Kaul, M., Long, C. & Wong, R. (2014). Terrain-Toolkit: A Multi-Functional Tool for Terrain Data. Proceedings of the VLDB Endowment, 7(13), 1645 - 1648. http://www.vldb.org/pvldb/vol7/p1645-wang.pdf
Ackerman, M. & Branzei, S. (2014). The Authorship Dilemma: Alphabetical or Contribution? In A. Bazzan & M. Huhns (Eds.), Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems : AAMAS '14 (pp. 1487-1488). Association for Computing Machinery. http://dl.acm.org/citation.cfm?id=2616025&bnc=1
Huang, Z. & Yi, K. (2014). The communication complexity of distributed epsilon-approximations. In D. Shmoys (Ed.), 2014 IEEE 55th Annual Symposium on Foundations of Computer Science (FOCS) Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS (pp. 591-600). IEEE Computer Society Press. https://doi.org/10.1109/FOCS.2014.69
Etessami, K., Hansen, K. A., Miltersen, P. B. & Sørensen , T. B. (2014). The Complexity of Approximating a Trembling Hand Perfect Equilibrium of a Multi-player Game in Strategic Form. In R. Lavi (Ed.), Algorithmic Game Theory: 7th International Symposium, SAGT 2014, Haifa, Israel, September 30 – October 2, 2014. Proceedings (pp. 231-243 ). Springer VS. https://doi.org/10.1007/978-3-662-44803-8_20
Gambs, S., Ranellucci, S. & Tapp, A. (2014). The Crypto-democracy and the Trustworthy. Paper presented at Data Privacy Management, Wroclaw, Poland. http://arxiv.org/pdf/1409.2432v1.pdf
Branzei, S., Chen, Y., Deng, X., Filos-Ratsikas, A., Frederiksen, S. K. S. & Zhang, J. (2014). The Fisher Market Game: Equilibrium and Welfare. In Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence (pp. 587-593). AAAI Press. http://www.aaai.org/Library/AAAI/aaai14contents.php
Zerny, I. (2014). The interpretation and inter-derivation of small-step and big-step specifications. Department of Computer Science, University of Aarhus.
Kuutti, K. & Bannon, L. J. (2014). The turn to practice in HCI: Towards a research agenda. In M. Jones , P. Palanque, A. Schmidt & T. Grossman (Eds.), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '14 (pp. 3543-3552). Association for Computing Machinery. https://doi.org/10.1145/2556288.2557111
Jørgensen, A. G. & Pettie, S. (2014). Threesomes, Degenerates, and Love Triangles. In B. Barak (Ed.), 2014 IEEE 55th Annual Symposium on Foundations of Computer Science, FOCS (pp. 621-630). IEEE Computer Society Press. https://doi.org/10.1109/FOCS.2014.72
Skovsgaard, A. & Jensen, C. S. (2014). Top-k point of interest retrieval using standard indexes. In Y. Huang & M. Schneider (Eds.), Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL '14 (pp. 173-182 ). Association for Computing Machinery. https://doi.org/10.1145/2666310.2666399
Munro, J. I., Navarro, G., Nielsen, J. A. S. & ShaH, R. (2014). Top- k Term-Proximity in Succinct Space. In H.-K. Ahn & C.-S. Shin (Eds.), Algorithms and Computation: 25th International Symposium, ISAAC 2014, Proceedings (pp. 169-180 ). Springer VS. https://doi.org/10.1007/978-3-319-13075-0_14
Nielsen, M. (2014). Trust in Event Structures. Theoretical Computer Science, 546(August), 3-6. https://doi.org/10.1016/j.tcs.2014.02.039
Filos-Ratsikas, A. & Miltersen, P. B. (2014). Truthful Approximations to Range Voting. In T.-Y. Liu, Q. Qi & Y. Ye (Eds.), Web and Internet Economics : 10th Workshop of Internet and Web Economics (WINE), proceedings (pp. 175-188 ). Springer VS. https://doi.org/10.1007/978-3-319-13129-0_13
Křivánek, J., Georgiev, I., Hachisuka, T., Vévoda, P., Šik, M., Nowrouzezahrai, D. & Jarosz, W. (2014). Unifying Points, Beams, and Paths in Volumetric Light Transport Simulation. A C M Transactions on Graphics, 33(4), Article 13. https://doi.org/10.1145/2601097.2601219
David, B. M., Dowsley, R. & Nascimento, A. C. A. (2014). Universally composable oblivious transfer based on a variant of lPN. In D. Gritzalis, A. Kiayias & I. Askoxylakis (Eds.), Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings (pp. 143-158). Springer. https://doi.org/10.1007/978-3-319-12280-9_10
Dahl, M. & Damgård, I. B. (2014). Universally composable symbolic analysis for two-party protocols based on homomorphic encryption. In P. Q. Nguyen & E. Oswald (Eds.), Advances in Cryptology – EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings (pp. 695-712). Springer VS. https://doi.org/10.1007/978-3-642-55220-5_38
Radaelli, L., Moses, Y. & Jensen, C. S. (2014). Using cameras to improve Wi-Fi based indoor positioning. In D. Pfoser & K.-J. Li (Eds.), Web and Wireless Geographical Information Systems: 13th International Symposium, W2GIS 2014, Seoul, South Korea, May 29-30, 2014. Proceedings (pp. 166-183). Springer VS. https://doi.org/10.1007/978-3-642-55334-9-11
Yang, B., Kaul, M. & Jensen, C. S. (2014). Using Incomplete Information for Complete Weight Annotation of Road Networks. I E E E Transactions on Knowledge & Data Engineering, 26(5), 1267-1279. https://doi.org/10.1109/TKDE.2013.89
Winge, K., Haugaard, R. & Merritt, T. R. (2014). VAL: Visually Augmented Laser cutting to enhance and support creativity. In IEEE International Symposium on Mixed and Augmented Reality - Media, Arts, Social Science, Humanities and Design, ISMAR 2014, Proceedings (pp. 31-34). Article 6935435 IEEE. https://doi.org/10.1109/ISMAR-AMH.2014.6935435
Sørensen, T. S., Mosegaard, J., Kislinskiy, S. & Greil, G. (2014). Virtual Surgery in Congenital Heart Disease. In F. Saremi (Ed.), Cardiac CT and MR for Adult Congenital Heart Disease (pp. 515-523). Springer. https://doi.org/10.1007/978-1-4614-8875-0_23
Klokmose, C. N., Korn, M. & Blunck, H. (2014). WiFi proximity detection in mobile web applications. In EICS 2014 - Proceedings of the 2014 ACM SIGCHI Symposium on Engineering Interactive Computing Systems (pp. 123-128). Association for Computing Machinery. https://doi.org/10.1145/2607023.2610281
Dalgaard, L. G., Grönvall, E. & Verdezoto, N. (2013). Accounting for Medication Particularities: Designing for Everyday Medication Management. In V. Osman, A. Campbell & P. Lukowicz (Eds.), The 7th International Conference on Pervasive Computing Technologies for Healthcare (pp. 137-144). IEEE. https://doi.org/10.4108/pervasivehealth.2013.252058
Dupont-Dupuis, F., Fawzi, O. & Wehner, S. (2013). Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling. In R. Canetti & J. A. Garay (Eds.), Advances in Cryptology – CRYPTO 2013: 33rd Annual Conference. Proceedings, Part II (pp. 326-343 ). Springer VS. https://doi.org/10.1007/978-3-642-40084-1_19
Chan, T. M. & Wilkinson, B. T. (2013). Adaptive and Approximate Orthogonal Range Counting. In S. Khanna (Ed.), Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2013 (pp. 241-251). Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611973105.18
Kalkofen, D., Veas, E., Zollmann, S., Steinberger, M. & Schmalstieg, D. (2013). Adaptive ghosted views for Augmented Reality. In 2013 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2013 (pp. 1-9). Article 6671758 https://doi.org/10.1109/ISMAR.2013.6671758
Zhu, F., Zhang, Z. & Qu, Q. (2013). A direct mining approach to efficient constrained graph pattern discovery. Association for Computing Machinery. Special Interest Group on Management of Data. International Conference Proceedings, 821-832. https://doi.org/10.1145/2463676.2463723
Hansen, T. D., Ibsen-Jensen, R. & Miltersen, P. B. (2013). A Faster Algorithm for Solving One-Clock Priced Timed Games. In P. R. D*Argenio & H. Melgratti (Eds.), CONCUR 2013 – Concurrency Theory: 24th International Conference, CONCUR 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings (pp. 531-545). Springer VS. https://doi.org/10.1007/978-3-642-40184-8_37
Arge, L. & Tsirogiannis, C. (2013). Algorithms for Computing Prominence on Grid Terrains. In C. Knoblock, M. Schneider, P. Peer Kröger , J. Krumm & P. Widmayer (Eds.), Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS 2013) (pp. 254-263 ). Association for Computing Machinery. http://dl.acm.org/citation.cfm?id=2525314.2594229&coll=DL&dl=ACM&CFID=448731544&CFTOKEN=20995598
Olsen, M. & Revsbæk, M. (2013). Alliances and Bisection Width for Planar Graphs. In S. K. Ghosh & T. Tokuyama (Eds.), WALCOM: Algorithms and Computation: 7th International Workshop, WALCOM 2013, Kharagpur, India, February 14-16, 2013. Proceedings (pp. 206-216). Springer VS. https://doi.org/10.1007/978-3-642-36065-7_20
Simmons , R. J. & Zerny, I. (2013). A logical correspondence between natural semantics and abstract machines. In R. Peña & T. Schrijvers (Eds.), Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming, PPDP '13 (pp. 109-119 ). Association for Computing Machinery. https://doi.org/10.1145/2505879.2505899
Gutin, G., Jones, M., Scheder, D. & Yeo, A. (2013). A new bound for 3-satisfiable MaxSat and its algorithmic application. Information and Computation, 231(October), 117-124. https://doi.org/10.1016/j.ic.2013.08.008
Kohlweiss , M., Maurer , U., Onete , C., Tackmann , B. & Venturi, D. (2013). Anonymity-Preserving Public-Key Encryption: A Constructive Approach. In E. De Cristofaro & M. Wright (Eds.), Privacy Enhancing Technologies: 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings (pp. 19-39). Springer VS. https://doi.org/10.1007/978-3-642-39077-7_2
Arge, L., Brodal, G. S., Truelsen, J. & Tsirogiannis, C. (2013). An optimal and practical cache-oblivious algorithm for computing multiresolution rasters. In Algorithms – ESA 2013: 21st Annual European Symposium, Sophia Antipolis, France, September 2-4, 2013. Proceedings (pp. 61-72). Springer VS. https://doi.org/10.1007/978-3-642-40450-4_6