Bødker, S. & Klokmose, C. N. (2013).
From Persona to Techsona. I P. Kotzé, G. Marsden , G. Lindgaard, J. Wesson & M. Winckler (red.),
Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part IV (s. 842-349). Springer VS.
https://doi.org/10.1007/978-3-642-40498-6_26
Lindell, Y., Nissim, K.
& Orlandi, C. (2013).
Hiding the Input-Size in Secure Two-Party Computation. I K. Sako & P. Sarkar (red.),
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (Bind 8197, s. 421-440). Springer VS.
https://doi.org/10.1007/978-3-642-41019-2_6
Kjærgaard, M. B., Krarup, M. V., Stisen, A., Prentow, T. S., Blunck, H., Grønbæk, K. & Jensen, C. S. (2013).
Indoor Positioning using Wi-Fi: How Well Is the Problem Understood?. Afhandling præsenteret på International Conference on Indoor Positioning and Indoor Navigation, Montbéliard, Frankrig.
Athukorala, K.
, Hoggan, E., Lehtiö, A., Ruotsalo, T. & Jacucci, G. (2013).
Information-seeking behaviors of computer scientists: Challenges for electronic literature search tools.
Proceedings of the Association for Information Science and Technology,
50(1), 1-11.
Jensen, M. M., Grønbæk, K., Rasmussen, M. K., Thomassen, N.
, Andersen, J. & Nielsen, J. (2013).
Interactive football training based on rebounders with hit position sensing and audio/light feedback. Abstract fra International Symposium on Computer Science in Sports, Istanbul, Tyrkiet.
Brabrand, C., Ribeiro, M., Tolêdo, T.
, Winther, J. & Borba, P. (2013).
Intraprocedural dataflow analysis for software product lines. I G. T. Leavens , S. Chiba & É. Tanter (red.),
Transactions on Aspect-Oriented Software Development X (s. 73-108). Springer VS.
https://doi.org/10.1007/978-3-642-36964-3_3
Kejlberg-Rasmussen, C., Tao, Y., Tsakalidis, K., Tsichlas, K. & Yoon, J. (2013).
I/O-Efficient Planar Range Skyline and Attrition Priority Queues. I R. Hull & W. Fan (red.),
Proceedings of the 32nd symposium on Principles of database systems , PODS '13 (s. 103-114 ). Association for Computing Machinery.
https://doi.org/10.1145/2463664.2465225
Rasmussen, M. K., Grönvall, E., Kinch, S. & Petersen, M. G. (2013).
It’s alive, it’s magic, it’s in love with you: Opportunities, Challenges and Open Questions for Actuated Interfaces. I H. Shen, R. Smith, J. Paay, P. Calder & T. Wyeld (red.),
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration. OzCHI '13 (s. 63-72). Association for Computing Machinery.
https://doi.org/10.1145/2541016.2541033
Georgiev, I., Křivánek, J.
, Hachisuka, T., Nowrouzezahrai , D. & Jarosz, W. (2013).
Joint importance sampling of low-order volumetric scattering.
A C M Transactions on Graphics, (6), Artikel 164 .
https://doi.org/10.1145/2508363.2508411
Hazay, C., López-Alt, A., Wee, H.
& Wichs, D. (2013).
Leakage-resilient cryptography from minimal assumptions. I T. Johansson & P. Nguyen (red.),
Leakage-Resilient Cryptography from Minimal Assumptions: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (s. 160-176). Springer VS.
https://doi.org/10.1007/978-3-642-38348-9_10
Hubacek, P., Nielsen, J. B. & Rosen, A. (2013).
Limits on the Power of Cryptographic Cheap Talk. I R. Canetti & J. A. Garay (red.),
Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I (s. 277-297 ). Springer VS.
https://doi.org/10.1007/978-3-642-40041-4_16
Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013).
Local Outlier Detection with Interpretation. I H. Blockeel, K. Kersting , S. Nijssen & F. Železný (red.),
Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2013, Prague, Czech Republic, September 23-27, 2013, Proceedings, Part III (s. 304-320 ). Springer VS.
https://doi.org/10.1007/978-3-642-40994-3_20
Johnson, P. M., Xu, Y.
, Brewer, R. S., Moore, C. A., Lee, G. E. & Connell, A. (2013).
Makahiki+WattDepot: An open source software stack for next generation energy research and education. I L. M. Hilty, B. Aebischer, G. Andersson & W. Lohmann (red.),
Proceedings of the First Interntional Conference on Information and Communication Technologies for Sustainability (ICT4S) Akademia.edu.
http://www.academia.edu/2911805/ICT4S_2013_Proceedings_of_the_First_International_Conference_on_Information_and_Communication_Technologies_for_Sustainability_ETH_Zurich_February_14-16_2013
Branzei, S., Michalak, T., Rahwan, T., Larson, K. & Jennings, N. (2013).
Matchings with Externalities and Attitudes. I M. Gina & O. Shehory (red.),
International Conference on Autonomous Agents and Multi-agent Systems, AAMAS '13 (s. 295-302 ). Association for Computing Machinery.
http://dl.acm.org/citation.cfm?id=2484969&CFID=340403434&CFTOKEN=84711969
Wagner, S., Buus, N. H., Jespersen, B., Ahrendt, P., Bertelsen, O. W. & Toftegaard, T. S. (2013).
Measurement adherence in the blood pressure self-measurement room.
Telemedicine and e-Health,
19(11), 826-833.
https://doi.org/10.1089/tmj.2013.0032,
https://doi.org/10.1089/tmj.2013.0032
Agarwal , P. K., Graham , G.
, Huang, Z., Phillips, J.
, Wei, Z. & Yi, K. (2013).
Mergeable summaries.
A C M Transactions on Database Systems,
38(4), Artikel 26 .
https://doi.org/10.1145/2500128
Jensen, C. S. (red.), Jermaine, C., Zhou, X. (red.), Kotagiri, R. (red.) & Ooi, B. C. (red.) (2013).
Message from the ICDE 2013 Program Committee and General. I
2013 IEEE 29th International Conference on Data Engineering (ICDE), : Australia, April 8–11, 2013 (s. i-ii). IEEE Communications Society.
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6530811
Frederiksen, T. K., Jakobsen, T. P., Nielsen, J. B., Nordholt, P. S. & Orlandi, C. (2013).
MiniLEGO: Efficient secure two-party computation from general assumptions. I T. Johansson & P. Q. Nguyen (red.),
Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (s. 537-556). Springer VS.
https://doi.org/10.1007/978-3-642-38348-9_32
Sergey, I., Devriese, D., Might, M.
, Midtgaard, J., Darais, D., Clarke, D. & Piessens, F. (2013).
Monadic abstract interpreters. I H.-J. Boehm (red.),
Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '13 (s. 399-410). Association for Computing Machinery.
https://doi.org/10.1145/2491956.2491979