Bardam, S. K.
, Mathisen, A., Rädle, R., Klokmose, C. N. & Elmqvist, N. (2019).
Vistrates: A Component Model for Ubiquitous Analytics.
IEEE Transactions on Visualization and Computer Graphics,
25(1), 586-596. Artikel 8440803.
https://doi.org/10.1109/TVCG.2018.2865144
Eriksson, E., Iversen, O. S., Baykal, G. E., Van Mechelen, M., Smith, R. C., Wagner, M.-L., Fog, B. V., Klokmose, C. N., Cumbo, B., Hjorth, H. A., Musaeus, L. H., Petersen, M. G. & Bouvin, N. O. (2019).
Widening the Scope of FabLearn Research: Integrating Computational Thinking, Design and Making. Afhandling præsenteret på Fablearn Europe 2019, Oulu, Finland.
https://doi.org/10.1145/3335055.3335070
Jordan, V. E., Walker, J. A., Beckstrom, T. O., Steely, C. J., McDaniel, C. L., St Romain, C. P., The Baboon Genome Analysis Consortium, Worley, K. C., Phillips-Conroy, J., Jolly, C. J., Rogers, J., Konkel, M. K. & Batzer, M. A. (2018).
A computational reconstruction of Papio phylogeny using Alu insertion polymorphisms.
Mobile DNA,
9(1), Artikel 13.
https://doi.org/10.1186/s13100-018-0118-3
Afshani, P., De Berg, M., Casanova, H., Karsin, B., Lambrechts, C.
, Sitchinava, N. & Tsirogiannis, C. (2018).
An efficient algorithm for the 1D total visibility-index problem and its parallelization.
ACM Journal of Experimental Algorithmics,
23, Artikel 2.3.
https://doi.org/10.1145/3209685
Bertelsen, O. W., Bødker, S., Eriksson, E., Hoggan, E. & Vermeulen, J. (2018).
Beyond Generalization: Research for the Very Particular.
interactions,
26(1), 34-38.
https://doi.org/10.1145/3289425
Badertscher, C., Garay, J., Maurer, U.
, Tschudi, D. & Zikas, V. (2018).
But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin. I J. Buus Nielsen (red.),
Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings (Bind 10821, s. 34-65). Springer VS.
https://doi.org/10.1007/978-3-319-78375-8_2
Engemann, K., Pedersen, C. B., Arge, L., Tsirogiannis, C., Mortensen, P. B. & Svenning, J.-C. (2018).
Childhood exposure to green space - A novel risk-decreasing mechanism for schizophrenia? Schizophrenia Research,
199, 142-148.
https://doi.org/10.1016/j.schres.2018.03.026
Damgård, I., Luo, J.
, Oechsner, S., Scholl, P. & Simkin, M. (2018).
Compact Zero-Knowledge Proofs of Small Hamming Weight. I M. Abdalla & R. Dahab (red.),
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Bind 10770, s. 530-560). Springer VS.
https://doi.org/10.1007/978-3-319-76581-5_18
Karbyshev, A., Svendsen, K., Askarov, A. & Birkedal, L. (2018).
Compositional Non-interference for Concurrent Programs via Separation and Framing. I L. Bauer & R. Küsters (red.),
Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Bind 10804, s. 53-78). Springer VS.
https://doi.org/10.1007/978-3-319-89722-6_3
Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018).
Computer-Aided Proofs for Multiparty Computation with Active Security. I
Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Bind 2018, s. 119-131). Artikel 8429300 IEEE.
https://doi.org/10.1109/CSF.2018.00016
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). I T. Peyrin & S. Galbraith (red.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Bind 11274, s. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4
Faonio, A.
, Nielsen, J. B., Simkin, M. & Venturi, D. (2018).
Continuously Non-malleable Codes with Split-State Refresh. I B. Preneel & F. Vercauteren (red.),
Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Bind 10892, s. 121-139). Springer VS.
https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Kazana, T.
, Obremski, M., Raj, V. & Siniscalchi, L. (2018).
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. I A. Beimel & S. Dziembowski (red.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Bind 11240, s. 225-254). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_9
Knudsen, S.
, Vermeulen, J., Kosminsky, D., Walny, J., West, M., Frisson, C., Adriel Aseniero, B.
, MacDonald Vermeulen, L., Perin, C., Quach, L., Buk, P., Tabuli, K., Chopra, S., Willett, W. & Carpendale, S. (2018).
Democratizing Open Energy Data for Public Discourse Using Visualization. I R. Mandryk & M. Hancock (red.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. D406:1-D406:4). Association for Computing Machinery.
https://doi.org/10.1145/3170427.3186539
Neerbek, J., Assent, I. & Dolog, P. (2018).
Detecting Complex Sensitive Information via Phrase Structure in Recursive Neural Networks. I D. Phung, V. S. Tseng, G. I. Webb, B. Ho, M. Ganji & L. Rashidi (red.),
Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings: PAKDD '18 (Bind 10939, s. 373-385). Springer VS.
https://doi.org/10.1007/978-3-319-93040-4_30
Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D.
& Simkin, M. (2018).
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.
IET Information Security,
12(3), 166-183.
https://doi.org/10.1049/iet-ifs.2017.0041
Höök, K., Caramiaux, B., Erkut, C., Forlizzi, J., Hajinejad, N., Haller, M., Hummels, C., Isbister, K., Jonsson, M., Khut, G., Loke, L., Lottridge, D., Marti, P., Melcer, E., Müller, F.
, Petersen, M. G., Schiphorst, T., Segura, E. M., Ståhl, A. ... Tobiasson, H. (2018).
Embracing First-Person Perspectives in Soma-Based Design.
Informatics,
5/1(8), 1-26. Artikel 2018,5,8.
https://doi.org/10.3390/informatics5010008