Mascheroni, G., Zaman, B.
, Eriksson, E., Cino, D., Brandsen, S.
& Bressa, N. A. (2022).
Towards Computational Empowerment of Disadvantaged Children and Youth in Non-Formal Learning Contexts. Abstract fra ICA annual conference, Paris, Frankrig.
Hubenschmid, S., Zagermann, J., Fink, D., Wieland, J.
, Feuchtner, T. & Reiterer, H. (2021).
Towards Asynchronous Hybrid User Interfaces for Cross-Reality Interaction. I H.-C. Jetter, J.-H. Schröder, J. Gugenheimer, M. Billinghurst, C. Anthes, M. Khamis & T. Feuchtner (red.),
ISS'21 Workshop Proceedings: Transitional Interfaces in Mixed and Cross-Reality: A new frontier? https://doi.org/10.18148/kops/352-2-84mm0sggczq02
Brody, J. E., Buhrman, H., Koucký, M., Loff, B. & Speelman, F. (2016).
Towards a Reverse Newman's Theorem in Interactive Information Complexity.
Algorithmica,
76(3), 749-781.
https://doi.org/10.1007/s00453-015-0112-9
Thiel, S.-K., Remy, C., Roque, L., Orji, R.
, Dalsgaard, P., Latulipe, C. & Sarcar, S. (2019).
Towards a Research Agenda for Gameful Creativity. I
DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (s. 393-396). Association for Computing Machinery.
https://doi.org/10.1145/3301019.3320003
Andersen, M. S. & Kjærgaard, M. B. (2012).
Towards a New Classification of Location Privacy Methods in Pervasive Computing. I A. Puiatti & T. Gu (red.),
Mobile and Ubiquitous Systems: Computing, Networking, and Services : 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers (Bind 104, s. 150-161). Springer.
https://doi.org/10.1007/978-3-642-30973-1_13
Kaspersen, M. H., Graungaard, D., Bouvin, N. O., Petersen, M. G. & Eriksson, E. (2021).
Towards a model of progression in computational empowerment in education.
International Journal of Child - Computer Interaction,
29, Artikel 100302.
https://doi.org/10.1016/j.ijcci.2021.100302
Aehnelt, M.
, Schulz, H.-J. & Urban, B. (2013).
Towards a Contextualized Visual Analysis of Heterogeneous Manufacturing Data. I
Advances in Visual Computing : 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part II (s. 76-85). Springer.
https://doi.org/10.1007/978-3-642-41939-3_8
Schäfer, Z., Mathisen, A., Svendsen, K., Engberg, S., Rolighed Thomsen, T. & Kirketerp-Møller, K. (2021).
Toward Machine-Learning-Based Decision Support in Diabetes Care: A Risk Stratification Study on Diabetic Foot Ulcer and Amputation.
Frontiers in medicine,
7, Artikel 601602.
https://doi.org/10.3389/fmed.2020.601602
Pagnin, E., Gunnarsson, G., Talebi, P.
, Orlandi, C. & Sabelfeld, A. (2019).
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.
Proceedings on Privacy Enhancing Technologies,
2019(4), 93-111.
https://doi.org/10.2478/popets-2019-0060
LaVigne, R., Liu-Zhang, C.-D., Maurer, U. M., Moran, T., Mularczyk, M.
& Tschudi, D. (2018).
Topology-Hiding Computation Beyond Semi-Honest Adversaries. I A. Beimel & S. Dziembowski (red.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings: Theory of Cryptography (Bind 11240, s. 3-35). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_1
Moeslund, J. E., Arge, L., Bøcher, P. K., Dalgaard, T., Odgaard, M. V., Nygaard, B. & Svenning, J.-C. (2013).
Topographically controlled soil moisture is the primary driver of local vegetation patterns across a lowland region.
Ecosphere (Washington, D.C.),
4(7), Artikel 91.
https://doi.org/10.1890/ES13-00134.1
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
TinyKeys: A New Approach to Efficient Multi-Party Computation. I H. Shacham & A. Boldyreva (red.),
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Bind 10993, s. 3-33). Springer VS.
https://doi.org/10.1007/978-3-319-96878-0_1
Kjærgaard, M. B., Blunck, H., Wüstenberg, M., Grønbæk, K., Wirz, M., Roggen, D. & Tröster, G. (2013).
Time-lag Method for Detecting Following and Leadership Behavior of Pedestrians from Mobile Sensing Data. I
IEEE International Conference on Pervasive Computing and Communications (PerCom), 2013 (s. 56 - 64 ). IEEE.
https://doi.org/10.1109/PerCom.2013.6526714
Gal, A.
, Hansen, K. A., Koucky, M., Pudlak, P. & Viola, E. (2013).
Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates.
I E E E Transactions on Information Theory,
59(10), 6611-6627.
https://doi.org/10.1109/TIT.2013.2270275
Melissaris Papanikolaou, N., Ravi, D.
& Yakoubov, S. (2024).
Threshold-Optimal MPC With Friends and Foes. I A. Chattopadhyay, S. Bhasin, S. Picek & C. Rebeiro (red.),
Progress in Cryptology – INDOCRYPT 2023: 24th International Conference on Cryptology in India, Goa, India, December 10–13, 2023, Proceedings, Part II (Bind 2, s. 3-24). Springer.
https://doi.org/10.1007/978-3-031-56235-8_1
Doerner, J.
, Kondi, Y., Lee, E., Shelat, A. & Tyner, L. (2023).
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. I
44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023 (s. 773-789). IEEE.
https://doi.org/10.1109/SP46215.2023.10179470
Brewer, R. S., Xu, Y., Lee, G. E., Katchuck, M., Moore, C. A. & Johnson, P. M. (2013).
Three Principles for the Design of Energy Feedback Visualizations.
International Journal On Advances in Intelligent Systems,
6(3 & 4), 188-198.
http://csdl.ics.hawaii.edu/techreports/2013/13-05/13-05.pdf