Evangelista Belo, J. M., Feuchtner, T., Hwang, C., Lunding, R. S., Lystbæk, M. N., Pfeuffer, K. & Rasmussen, T. A. (2021).
Challenges of XR Transitional Interfaces in Industry 4.0. I H.-C. Jetter, J.-H. Schröder, J. Gugenheimer, M. Billinghurst, C. Anthes, M. Khamis & T. Feuchtner (red.),
ISS'21 Workshop Proceedings: Transitional Interfaces in Mixed and Cross-Reality: A new frontier? https://doi.org/10.18148/kops/352-2-1jsg9yzf5d0qs0
Evangelista Belo, J. M., Lystbæk, M. N., Feit, A. M.
, Pfeuffer, K., Kán, P., Oulasvirta, A.
& Grønbæk, K. (2022).
AUIT – the Adaptive User Interfaces Toolkit for Designing XR Applications. I
UIST '22: Proceedings of the 35th Annual ACM Symposium on User Interface Software and Technology Artikel 48 Association for Computing Machinery.
https://doi.org/10.1145/3526113.3545651
Etessami, K.
, Hansen, K. A., Miltersen, P. B. & Sørensen , T. B. (2014).
The Complexity of Approximating a Trembling Hand Perfect Equilibrium of a Multi-player Game in Strategic Form. I R. Lavi (red.),
Algorithmic Game Theory: 7th International Symposium, SAGT 2014, Haifa, Israel, September 30 – October 2, 2014. Proceedings (s. 231-243 ). Springer VS.
https://doi.org/10.1007/978-3-662-44803-8_20
Esteves, A., Bouquet, E.
, Pfeuffer, K. & Alt, F. (2022).
One-handed Input for Mobile Devices via Motion Matching and Orbits Controls.
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies,
6(2), 1-24. Artikel 51.
https://doi.org/10.1145/3534624
Espitau, T.
, Takahashi, A., Tibouchi, M. & Wallet, A. (2021).
Mitaka: A simpler, parallelizable, maskable variant of Falcon. Afhandling præsenteret på Third PQC Standardization Conference, Washington, USA.
https://csrc.nist.gov/CSRC/media/Events/third-pqc-standardization-conference/documents/accepted-papers/espitau-mitaka-pqc2021.pdf
Espitau, T., Fouque, P.-A., Gérard, F., Rossi, M.
, Takahashi, A., Tibouchi, M., Wallet, A. & Yu, Y. (2022).
MITAKA: A Simpler, Parallelizable, Maskable Variant of Falcon. I O. Dunkelman & S. Dziembowski (red.),
Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings (Bind 3, s. 222-253). Springer.
https://doi.org/10.1007/978-3-031-07082-2_9
Eskildsen, S., Iranzo, A.
, Stokholm, M., Staer, K., Ostergaard, K., Eroles, M.
, Otto, M., Svendsen, K., Pla, A., Vilas, D.
, Borghammer, P., Santamaria, J.
, Moller, A., Gaig, C.
, Brooks, D., Tolosa, E.
, Ostergaard, L. & Pavese, N. (2019).
Occurrence of brain capillary dysfunction in patients with REM sleep behavior disorder. S786-S787. Abstract fra International Congress of Parkinson's Disease and Movement Disorders, Nice, Frankrig.
Eriksson, E., Iversen, O. S., Baykal, G. E., Van Mechelen, M., Smith, R. C., Wagner, M.-L., Fog, B. V., Klokmose, C. N., Cumbo, B., Hjorth, H. A., Musaeus, L. H., Petersen, M. G. & Bouvin, N. O. (2019).
Widening the Scope of FabLearn Research: Integrating Computational Thinking, Design and Making. Afhandling præsenteret på Fablearn Europe 2019, Oulu, Finland.
https://doi.org/10.1145/3335055.3335070
Entwistle, J. M., Rasmussen, M. K., Verdezoto, N., Brewer, R. S. & Andersen, M. S. (2015).
Beyond the Individual: The Contextual Wheel of Practice as a Research Framework for Sustainable HCI. I B. Begole & J. Kim (red.),
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15 (s. 1125-1134 ). Association for Computing Machinery.
https://doi.org/10.1145/2702123.2702232
Engeström, Y., Sannino, A., Fischer, G., Mørch, A. I.
& Bertelsen, O. W. (2010).
Grand challenges for future HCI research: Cultures of participation, interfaces supporting learning, and expansive learning. I
NordiCHI 2010: Extending Boundaries - Proceedings of the 6th Nordic Conference on Human-Computer Interaction (s. 863-866)
https://doi.org/10.1145/1868914.1869049
Engemann, K., Pedersen, C. B., Arge, L., Tsirogiannis, C., Mortensen, P. B. & Svenning, J.-C. (2018).
Childhood exposure to green space - A novel risk-decreasing mechanism for schizophrenia? Schizophrenia Research,
199, 142-148.
https://doi.org/10.1016/j.schres.2018.03.026
Engemann, K., Svenning, J. C., Arge, L., Brandt, J., Erikstrup, C., Geels, C., Hertel, O., Mortensen, P. B., Plana-Ripoll, O., Tsirogiannis, C., Sabel, C. E., Sigsgaard, T. & Pedersen, C. B. (2020).
Associations between growing up in natural environments and subsequent psychiatric disorders in Denmark.
Environmental Research,
188, Artikel 109788.
https://doi.org/10.1016/j.envres.2020.109788
Engelmann, F. T., Müller, L., Peter, A., Kargl, F. & Bösch, C. (2021).
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges.
Proceedings on Privacy Enhancing Technologies,
2021(4), 270-290.
https://doi.org/10.2478/popets-2021-0070
Egger, M. K., Ma, W., Mottin, D., Karras, P., Bordino, I., Gullo, F. & Anagnostopoulos, A. (2024).
ReliK: A Reliability Measure for Knowledge Graph Embeddings. I
WWW '24 : Proceedings of the ACM Web Conference (s. 2009-2019). Association for Computing Machinery.
https://doi.org/10.1145/3589334.3645430
Eerikson, H.
, Keller, M., Orlandi, C., Pullonen, P., Puura, J.
& Simkin, M. (2020).
Use your brain! Arithmetic 3PC for any modulus with active security. I Y. T. Kalai, A. D. Smith & D. Wichs (red.),
1st Conference on Information-Theoretic Cryptography (ITC 2020) Artikel 5 Schloss Dagstuhl--Leibniz-Zentrum für Informatik.
https://doi.org/10.4230/LIPIcs.ITC.2020.5
Durkota, K., Lisý, W., Kiekintveld, C.
& Bosansky, B. (2015).
Optimal Network Security Hardening Using Attack Graph Games. I N. Criado, M. Rehak, J. M. Such & L. Vercouter (red.),
2nd International Workshop on Agents and Cybersecurity, ACySE 2015: Workshop Notes at AAMAS 2015 (s. 7-14). Lancaster University.
http://www.lancaster.ac.uk/staff/suchj/acyse2015-proceedings/ACySE2015_proceedings.pdf#page=14