Schäfer, Z., Mathisen, A., Svendsen, K., Engberg, S., Rolighed Thomsen, T. & Kirketerp-Møller, K. (2021).
Toward Machine-Learning-Based Decision Support in Diabetes Care: A Risk Stratification Study on Diabetic Foot Ulcer and Amputation.
Frontiers in medicine,
7, Artikel 601602.
https://doi.org/10.3389/fmed.2020.601602
Pagnin, E., Gunnarsson, G., Talebi, P.
, Orlandi, C. & Sabelfeld, A. (2019).
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.
Proceedings on Privacy Enhancing Technologies,
2019(4), 93-111.
https://doi.org/10.2478/popets-2019-0060
LaVigne, R., Liu-Zhang, C.-D., Maurer, U. M., Moran, T., Mularczyk, M.
& Tschudi, D. (2018).
Topology-Hiding Computation Beyond Semi-Honest Adversaries. I A. Beimel & S. Dziembowski (red.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings: Theory of Cryptography (Bind 11240, s. 3-35). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_1
Moeslund, J. E., Arge, L., Bøcher, P. K., Dalgaard, T., Odgaard, M. V., Nygaard, B. & Svenning, J.-C. (2013).
Topographically controlled soil moisture is the primary driver of local vegetation patterns across a lowland region.
Ecosphere (Washington, D.C.),
4(7), Artikel 91.
https://doi.org/10.1890/ES13-00134.1
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
TinyKeys: A New Approach to Efficient Multi-Party Computation. I H. Shacham & A. Boldyreva (red.),
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Bind 10993, s. 3-33). Springer VS.
https://doi.org/10.1007/978-3-319-96878-0_1
Kjærgaard, M. B., Blunck, H., Wüstenberg, M., Grønbæk, K., Wirz, M., Roggen, D. & Tröster, G. (2013).
Time-lag Method for Detecting Following and Leadership Behavior of Pedestrians from Mobile Sensing Data. I
IEEE International Conference on Pervasive Computing and Communications (PerCom), 2013 (s. 56 - 64 ). IEEE.
https://doi.org/10.1109/PerCom.2013.6526714
Gal, A.
, Hansen, K. A., Koucky, M., Pudlak, P. & Viola, E. (2013).
Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates.
I E E E Transactions on Information Theory,
59(10), 6611-6627.
https://doi.org/10.1109/TIT.2013.2270275
Brewer, R. S., Xu, Y., Lee, G. E., Katchuck, M., Moore, C. A. & Johnson, P. M. (2013).
Three Principles for the Design of Energy Feedback Visualizations.
International Journal On Advances in Intelligent Systems,
6(3 & 4), 188-198.
http://csdl.ics.hawaii.edu/techreports/2013/13-05/13-05.pdf
Hu, E.
, Grønbæk, J. E., Ying, W., Du, R. & Heo, S. (2023).
ThingShare: Ad-Hoc Digital Copies of Physical Objects for Sharing Things in Video Meetings. I A. Schmidt, K. Väänänen, T. Goyal, P. O. Kristensson, A. Peters, S. Mueller, J. R. Williamson & M. L. Wilson (red.),
CHI'23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems Artikel 365 Association for Computing Machinery.
https://doi.org/10.1145/3544548.3581148
Damgård, I., Nielsen, J. B., Nielsen, M. & Ranellucci, S. (2017).
The tinytable protocol for 2-party secure computation, or: Gate-scrambling revisited. I J. Katz & H. Shacham (red.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Bind 10401, s. 167-187). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_6