Skorstengaard, L., Devriese, D.
& Birkedal, L. (2018).
Reasoning About a Machine with Local Capabilities: Provably Safe Stack and Return Pointer Management. I A. Ahmed (red.),
Programming Languages and Systems - 27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Bind 10801, s. 475-501). Springer VS.
https://doi.org/10.1007/978-3-319-89884-1_17
Lunding, M. S., Grønbæk, J. E., Grymer, N., Wells, T., Houben, S.
& Petersen, M. G. (2023).
Reality and Beyond: Proxemics as a Lens for Designing Handheld Collaborative Augmented Reality.
Proceedings of the ACM on Human-Computer Interaction,
7(ISS), 21-40. Artikel 427.
https://doi.org/10.1145/3626463
Ganardi, M., Majumdar, R.
, Pavlogiannis, A., Schütze, L. & Zetzsche, G. (2022).
Reachability in Bidirected Pushdown VASS. I M. Bojanczyk, E. Merelli & D. P. Woodruff (red.),
49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022 Artikel 124 Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.ICALP.2022.124
Ma, W., Egger, M. K., Pavlogiannis, A., Li, Y.
& Karras, P. (2024).
Reachability-Aware Fair Influence Maximization. I W. Zhang, Z. Yang, X. Wang, A. Tung, Z. Zheng & H. Guo (red.),
Web and Big Data - 8th International Joint Conference, APWeb-WAIM 2024, Proceedings: 8th International Joint Conference, APWeb-WAIM 2024, Jinhua, China, August 30 – September 1, 2024, Proceedings, Part III (s. 342-359). BMJ, Springer Nature.
https://doi.org/10.1007/978-981-97-7238-4_22
Dagdelen, Ö., Mohassel, P.
& Venturi, D. (2013).
Rate-limited secure function evaluation: Definitions and constructions. I K. Kurosawa & G. Hanaoka (red.),
Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings (Bind 7778 LNCS, s. 461-478). Springer VS.
https://doi.org/10.1007/978-3-642-36362-7_28
Cascudo, I.
, Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016).
Rate-1, linear time and additively homomorphic UC commitments. I M. Robshaw & J. Katz (red.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Bind 9816, s. 179-207). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_7
Leiva, G., Grønbæk, J. E., Klokmose, C. N., Nguyen, C., Kazi, R. H. & Asente, P. (2021).
Rapido: Prototyping Interactive AR Experiences through Programming by Demonstration. I
UIST 2021 - Proceedings of the 34th Annual ACM Symposium on User Interface Software and Technology (s. 626-637). Association for Computing Machinery.
https://doi.org/10.1145/3472749.3474774
Baena, J., Cabarcas, D.
, Escudero, D. E., Khathuria, K. & Verbel, J. (2018).
Rank Analysis of Cubic Multivariate Cryptosystems. I T. Lange & R. Steinwandt (red.),
Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings (Bind 10786, s. 355-374). Springer VS.
https://doi.org/10.1007/978-3-319-79063-3_17
Fang, W.
, Filos-Ratsikas, A., Frederiksen, S. K. S., Tang, P. & Zuo, S. (2015).
Randomized Assignments for Barter Exchanges: Fairness vs Efficiency. I T. Walsh (red.),
Algorithmic Decision Theory: 4th International Conference, ADT 2015, Lexington, KY, USA, September 27-30, 2015, Proceedings (s. 537-552). Springer VS.
https://doi.org/10.1007/978-3-319-23114-3_32
Gentry, C., Halevi, S.
, Magri, B., Nielsen, J. B. & Yakoubov, S. (2021).
Random-Index PIR and Applications. I K. Nissim & B. Waters (red.),
Theory of Cryptography : 19th International Conference, TCC 2021, Proceedings (s. 32-61). Springer.
https://doi.org/10.1007/978-3-030-90456-2_2
Sølvsten, S., Rysgaard, C. M. & van de Pol, J. (2025).
Random Access on Narrow Decision Diagrams in External Memory. I T. Neele & A. Wijs (red.),
Model Checking Software: 30th International Symposium, SPIN 2024, Luxembourg City, Luxembourg, April 8–9, 2024, Proceedings (s. 137–145). Springer.
https://doi.org/10.1007/978-3-031-66149-5_7
Arge, L. & Thorup, M. (2013).
RAM-Efficient External Memory Sorting. I L. Cai, S.-W. Cheng & T.-W. Lam (red.),
Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (s. 491-501 ). Springer VS.
https://doi.org/10.1007/978-3-642-45030-3_46
Spiel, K., Walker, A. M., DeVito, M. A., Birnholtz, J., Barlas, P., Ahmed, A., Brubaker, J. R., Keyes, O., Brulé, E., Light, A., Hardy, J., Rode, J. A.
& Kannabiran, G. (2019).
Queer(ing) HCI: Moving forward in theory and practice. I
CHI EA 2019 - Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems Artikel 3311750 Association for Computing Machinery.
https://doi.org/10.1145/3290607.3311750
Krauter, H.
, Sherson, J. F., Jensen, K., Fernholz, T., Neergaard-Nielsen, J. S., Nielsen, B. M., Oblak, D., Windpassinger, P.
, Kjærgaard, N., Hilliard, A. J., Olausson, C.
, Müller, J. H. & Polzik, E. S. (2008).
Quantum interface between light and atomic ensembles. I
Proceedings of the 18th International Conference on Laser Spectroscopy, ICOLS 2007 (s. 113-124). World Scientific Publishing Co. Pte Ltd.
Høyer, P.
, Neerbek, J. & Shi, Y. (2001).
Quantum complexities of ordered searching, sorting, and element distinctness. I
International Colloquium on Automata, Languages, and Programming: 28th International Colloquium, ICALP 2001 (Bind 2076, s. 346-357)
https://doi.org/10.1007/3-540-48224-5_29
Iivari, N.
, Iversen, O. S., Kafai, Y. B., Antle, A. N.
, Petersen, M. G., Kinnula, M.
, Dindler, C., Kayali, F., Bonsignore, E., Monga, C.
, Schaper, M.-M. & Sharma, S. (Accepteret/In press).
Pushing the Boundaries of Computational Empowerment of Children. I
IDC '25: Interaction Design and Children Conference https://interact.oulu.fi/idc-2025