Kirkegaard, K. K., Fredsted, P. V., Jensen, J. M., Hindkjær, J. J., Kølvraa, S.
, Ingerslev, H. J. & Lykke-Hartmann, K. (2015).
Distinct differences in global gene expression profiles in non-implanted blastocysts and blastocysts resulting in live birth.
Gene,
571(2), 212-220.
https://doi.org/10.1016/j.gene.2015.06.057
Xue, H., Inati, S.
, Sangild, T., Kellman, P. & Hansen, M. (2015).
Distributed MRI Reconstruction using Gadgetron based Cloud Computing.
Magnetic Resonance in Medicine,
73(3), 1015–1025.
https://doi.org/10.1002/mrm.25213
Blevis, E.
, Bødker, S., Flach, J., Forlizzi, J., Jung , H., Kaptelinin, V., Nardi, B. & Rizzo, A. (2015).
Ecological Perspectives in HCI: Promise, Problems, and Potential. Abstract fra CHI Workshop on Ecological Perspectives in HCI, Sydkorea.
https://doi.org/10.1145/2702613.2702634
Andrychowicz, M.
, Damgård, I. B., Dziembowski, S.
, Faust, S. & Polychroniadou, A. (2015).
Efficient leakage resilient circuit compilers. I K. Nyberg (red.),
Topics in Cryptology - CT-RSA 2015: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (s. 311-329). Springer VS.
https://doi.org/10.1007/978-3-319-16715-2_17
Genkin, D., Ishai , Y.
& Polychroniadou, A. (2015).
Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits. I R. Gennaro & M. Robshaw (red.),
Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II (s. 721-741). Springer VS.
https://doi.org/10.1007/978-3-662-48000-7_35
Döttling, N. M. & Schröder, D. (2015).
Efficient Pseudorandom Functions via On-the-Fly Adaptation. I R. Gennaro & M. Robshaw (red.),
Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I (s. 329-350). Springer VS.
https://doi.org/10.1007/978-3-662-47989-6_16
David, B., Dowsley, R., Katti, R. & Nascimento, A. C. A. (2015).
Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols. I M.-H. Au & A. Miyaji (red.),
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings (Bind 9451, s. 354-367). Springer VS.
https://doi.org/10.1007/978-3-319-26059-4_20
Li, S., Crouser, R. J., Griffin, G., Gramazio, C.
, Schulz, H.-J., Childs, H. & Chang, R. (2015).
Exploring hierarchical visualization designs using phylogenetic trees. I D. L. Kao, M. C. Hao, M. A. Livingston & T. Wischgoll (red.),
Proceedings of the Conference on Visualization and Data Analysis VDA 2015 SPIE - International Society for Optical Engineering.
https://doi.org/10.1117/12.2078857
Zhang, Y., Chong, M. K.
, Müller, J., Bulling, A. & Gellersen, H. (2015).
Eye tracking for public displays in the wild.
Personal and Ubiquitous Computing,
19(5-6), 967-981.
https://doi.org/10.1007/s00779-015-0866-8
Bertelsen, O. W., Halskov, K., Bardzell, S. (red.)
, Bødker, S. (red.), Iversen, O. S. (red.), Klokmose, C. N. (red.) & Korsgaard, H. (red.) (2015).
Foreword. I
Critical Alternatives: Proceedings of The Fifth Decennial Aarhus Conference 17- 21 August 2015, Aarhus, Denmark (s. ii). Department of Computer Science, Aarhus University.
http://cs.au.dk/~hko/Aarhus2015ProceedingsVolumeI.pdf
Miruchna , V., Walter , R., Lindlbauer , D., Lehmann , M., Klitzing, R. V.
& Müller, J. (2015).
GelTouch: Localized Tactile Feedback Through Thin, Programmable Gel. I
UIST '15 Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology (s. 3-10 ). Association for Computing Machinery.
https://doi.org/10.1145/2807442.2807487
David, B. M., Nishimaki, R.
, Ranellucci, S. & Tapp, A. (2015).
Generalizing Efficient Multiparty Computation. I A. Lehmann & S. Wolf (red.),
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (s. 15-32 ). Springer VS.
https://doi.org/10.1007/978-3-319-17470-9_2
Döttling, N., Kraschewski, D., Müller-Quade, J. & Nilges, T. (2015).
General statistically secure computation with bounded-resettable hardware tokens. I Y. Dodis & J. Buus Nielsen (red.),
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I (s. 319-344). Springer VS.
https://doi.org/10.1007/978-3-662-46494-6_14
Burra, S. S., Larraia, E.
, Nielsen, J. B., Nordholt, P. S., Orlandi, C., Orsini, E., Scholl, P. & Smart, N. P. (2015).
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
http://eprint.iacr.org/2015/472
Hansen, T. D., Kaplan, H., Tarjan, R. E. & Zwick, U. (2015).
Hollow Heaps. I M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (red.),
Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Bind Part 1, s. 689-700). Springer VS.
https://doi.org/10.1007/978-3-662-47672-7_56
Livshits, B., Sridharan, M., Smaragdakis, Y., Lhoták, O., Amaral, J. N., Chang, B.-Y. E., Guyer, S. Z., Khedker, U. P.
, Møller, A. & Vardoulakis, D. (2015).
In Defense of Soundiness: A Manifesto.
Communications of the A C M,
58(2).
https://doi.org/10.1145/2644805
Bataillon, T., Duan, J., Hvilsom, C., Jin, X., Li, Y.
, Skov, L., Glemin, S.
, Munch, K., Jiang, T.
, Qian, Y., Hobolth, A., Wang, J.
, Mailund, T., Siegismund, H. R.
& Schierup, M. H. (2015).
Inference of purifying and positive selection in three subspecies of chimpanzees (Pan troglodytes) from exome sequencing.
Genome Biology and Evolution,
7(4), 1122-32.
https://doi.org/10.1093/gbe/evv058