Fang, W.
, Filos-Ratsikas, A., Frederiksen, S. K. S., Tang, P. & Zuo, S. (2015).
Randomized Assignments for Barter Exchanges: Fairness vs Efficiency. I T. Walsh (red.),
Algorithmic Decision Theory: 4th International Conference, ADT 2015, Lexington, KY, USA, September 27-30, 2015, Proceedings (s. 537-552). Springer VS.
https://doi.org/10.1007/978-3-319-23114-3_32
Nocke, T., Buschmann, S., Donges, J. F., Marwan, N.
, Schulz, H.-J. & Tominski, C. (2015).
Review: Visual Analytics of climate networks.
Nonlinear Processes in Geophysics,
22, 545-570.
https://doi.org/10.5194/npg-22-545-2015
Abel, P., Fox, M., Potts, R., Hemment, D., Thomson, C., Gajdos, P., Li, S., Vazquez, A. D., Barraclough, R., Schliwa, G., Lindley, J., Turner, S., Devitt, J., MacDonald, J., Lee, A., Trueblood, C., Maxwell, D., Mehrpouya, H., Woods, M. ... Monsen, K. (2015).
Re-writing the City: Negotiating and Reflecting on Data Streams.
https://doi.org/10.1145/2783446.2783562
Giacomelli, I., Olimid, R.
& Ranellucci, S. (2015).
Security of Linear Secret-Sharing Schemes Against Mass Surveillance. I M. Reiter & D. Naccache (red.),
Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Bind 9476, s. 43-58). Springer.
https://doi.org/10.1007/978-3-319-26823-1
Aronov, B., Driemel, A., Van Kreveld, M., Löffler, M.
& Staals, F. (2015).
Segmentation of trajectories on nonmonotone criteria.
A C M Transactions on Algorithms,
12(2), Artikel 26.
https://doi.org/10.1145/2660772
Nunes, F.
, Verdezoto, N., Fitzpatrick, G.
, Kyng, M., Grönvall, E. & Storni, C. (2015).
Self-Care Technologies in HCI: Trends, Tensions, and Opportunities.
A C M Transactions on Computer - Human Interaction,
22(6), Artikel 33.
https://doi.org/10.1145/2803173
Clouston, R. & Goré, R. (2015).
Sequent Calculus in the Topos of Trees. I A. Pitts (red.),
Foundations of Software Science and Computation Structures : 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (Bind 9034, s. 133-147). Springer VS.
http://link.springer.com/chapter/10.1007/978-3-662-46678-0_9
Stisen, A., Blunck, H., Bhattacharya, S.
, Prentow, T. S., Kjærgaard, M. B., Dey, A.
, Sonne, T. & Jensen, M. M. (2015).
Smart devices are different: Assessing and mitigating mobile sensing heterogeneities for activity recognition. I
Proceedings of the 13th ACM Conference on Embedded Network Sensor Systems: Sensys 2015
Prentow, T. S., Ruiz-Ruiz, A.
, Blunck, H., Stisen, A. & Kjærgaard, M. B. (2015).
Spatio-temporal Facility Utilization Analysis from Exhaustive WiFi Monitoring.
Pervasive and Mobile Computing,
16(B), 305–316.
https://doi.org/10.1016/j.pmcj.2014.12.006
Jensen, C. S., Møller, A., Raychev, V., Dimitrov, D. & Vechev, M. (2015).
Stateless Model Checking of Event-Driven Applications. I
OOPSLA 2015 : Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (s. 57-73). Association for Computing Machinery.
https://doi.org/10.1145/2814270.2814282
Bizjak, A. & Birkedal, L. (2015).
Step-indexed logical relations for probability. I A. Pitts (red.),
Foundations of Software Science and Computation Structures: 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (s. 279-294 ). Springer VS.
https://doi.org/10.1007/978-3-662-46678-0_18
Grønborg, T. K., Hansen, S. N., Nielsen, S., Skytthe, A.
& Parner, E. T. (2015).
Stoppage in Autism Spectrum Disorders.
Journal of Autism and Developmental Disorders,
45(11), 3509-3519.
https://doi.org/10.1007/s10803-015-2497-3
Schmidt, A., Kleemann, M.
, Merritt, T. & Selker, T. (2015).
Tactile Communication in Extreme Contexts: Exploring the Design Space Through Kiteboarding. I J. Abascal, S. Barbosa, M. Fetter, T. Gross, P. Palanque & M. Winckler (red.),
Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part IV (s. 37-54). Springer.
https://doi.org/10.1007/978-3-319-22723-8_4
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2015).
The Chaining Lemma and its application. I A. Lehmann & S. Wolf (red.),
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (s. 181-196). Springer VS.
https://doi.org/10.1007/978-3-319-17470-9_11
Gambs, S.
, Ranellucci, S. & Tapp, A. (2015).
The crypto-democracy and the trustworthy (position paper). I
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (Bind 8872, s. 58-76). Springer VS.
https://doi.org/10.1007/978-3-319-17016-9_5
Fuchsberger, V., Murer, M., Tscheligi, M., Lindtner, S., Reiter, A.
, Bardzell, S., Bardzell, J. & Bjørn, P. (2015).
The Future of Making: Where Industrial and Personal Fabrication Meet.
Aarhus Series on Human Centered Computing,
1(1).
http://ojs.statsbiblioteket.dk/index.php/ashcc/article/view/21394/18857