Bates, O.
, Thomas, V., Remy, C., Nathan, L. P., Mann, S. & Friday, A. (2018).
The future of HCI and sustainability: Championing environmental and social justice. I R. Mandryk & M. Hancock (red.),
CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Bind 2018-April). Artikel SIG01 Association for Computing Machinery.
https://doi.org/10.1145/3170427.3185365
Jensen, C. (red.), Lind Olsen, E. (red.)
, Mikkelsen, G. L., Syberg , L.
, Nielsen, L. L., Hansen, M. A. E., Hjortlund, M.
, Madsen, O. L., Høngaard Andersen, P. & Duvold, T. (2018).
The future market for cybersecurity in Denmark.
Branzei, S., Chen, Y., Deng, X.
, Filos-Ratsikas, A., Frederiksen, S. K. S. & Zhang, J. (2014).
The Fisher Market Game: Equilibrium and Welfare. I
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence (s. 587-593). AAAI Press.
http://www.aaai.org/Library/AAAI/aaai14contents.php
Krebbers, R., Jung, R.
, Bizjak, A., Jourdan, J.-H., Dreyer, D.
& Birkedal, L. (2017).
The Essence of Higher-Order Concurrent Separation Logic. I H. Yang (red.),
Programming Languages and Systems - 26th European Symposium on Programming, ESOP 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings (s. 696-723). Springer VS.
https://doi.org/10.1007/978-3-662-54434-1_26
Liao, D., Yang, J., Zhao, J., Zeng, Y.
, Vinter-Jensen, L. & Gregersen, H. (2003).
The effect of epidermal growth factor on the incremental Young's moduli in the rat small intestine.
Medical Engineering & Physics,
25(5), 413-8.
Boring, S., Greenberg, S.
, Vermeulen, J., Dostal, J. & Marquardt, N. (2014).
The Dark Patterns of Proxemic Sensing.
Computer,
47(8), 56-60.
https://doi.org/10.1109/MC.2014.223
Vermeulen, J., Lim, B. Y.
, Avdic, M., Wang, D. & Abdul, A. (2019).
The Curious Case of Providing Intelligibility for Smart Speakers. Abstract fra The 2019 ACM CHI Conference on Human Factors in Computing Systems (CHI'19), Glasgow, Storbritannien.
Gambs, S.
, Ranellucci, S. & Tapp, A. (2015).
The crypto-democracy and the trustworthy (position paper). I
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (Bind 8872, s. 58-76). Springer VS.
https://doi.org/10.1007/978-3-319-17016-9_5
Bender, M. A.
, Brodal, G. S., Fagerberg, R., Ge, D., He, S., Hu, H., Iacono, J. & López-Ortiz, A. (2011).
The Cost of Cache-Oblivious Searching.
Algorithmica,
61(2), 463-505.
https://doi.org/10.1007/s00453-010-9394-0
Hansen, T. D. & Ibsen-Jensen, R. (2013).
The complexity of interior point methods for solving discounted turn-based stochastic games. I
The Nature of Computation, Logic, Algorithms, Applications: 9th Conference on Computability in Europe, CiE 2013, Milan, Italy, July 1-5, 2013. Proceedings (s. 252-262). Springer VS.
https://doi.org/10.1007/978-3-642-39053-1_29
Brodal, G. S., Fagerberg, R.
, Pedersen, C. N. S., Östlin, A., Orejas, F. (red.), Spirakis, P. G. (red.) & Leeuwen, J. V. (red.) (2001).
The Complexity of Constructing Evolutionary Trees Using Experiments. I
Lecture Notes In Computer Science; Vol. 2076: Proceedings of the 28th International Colloquium on Automata, Languages and Programming (2076 of Lecture Notes in Computer Science udg., Bind 2076/2001, s. 140-151). Springer.
Etessami, K.
, Hansen, K. A., Miltersen, P. B. & Sørensen , T. B. (2014).
The Complexity of Approximating a Trembling Hand Perfect Equilibrium of a Multi-player Game in Strategic Form. I R. Lavi (red.),
Algorithmic Game Theory: 7th International Symposium, SAGT 2014, Haifa, Israel, September 30 – October 2, 2014. Proceedings (s. 231-243 ). Springer VS.
https://doi.org/10.1007/978-3-662-44803-8_20
Ghosh, S. & Simkin, M. (2019).
The Communication Complexity of Threshold Private Set Intersection. I A. Boldyreva & D. Micciancio (red.),
Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Bind II, s. 3-29). Springer.
https://doi.org/10.1007/978-3-030-26951-7_1
Satyanarayan, A., Strazzulla, D.
, Klokmose, C. N., Beaudouin-Lafon, M. & Mackay, W. (2013).
The CHI 2013 interactive schedule. I W. E. Mackay, S. Brewster & S. Brewster (red.),
CHI EA '13 CHI '13 Extended Abstracts on Human Factors in Computing Systems (s. 2987-2990). Association for Computing Machinery.
https://doi.org/10.1145/2468356.2479591
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2015).
The Chaining Lemma and its application. I A. Lehmann & S. Wolf (red.),
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (s. 181-196). Springer VS.
https://doi.org/10.1007/978-3-319-17470-9_11
Buemann, B., Schierning, B., Toubro, S.
, Bibby, B. M., Sørensen, T., Dalgaard, L., Pedersen, O. & Astrup, A. (2001).
The association between the val/ala-55 polymorphism of the uncoupling protein 2 gene and exercise efficiency.
International Journal of Obesity,
25(4), 467-471.
https://doi.org/10.1038/sj.ijo.0801564
Garavel, H., ter Beek, M. H.
& van de Pol, J. (2020).
The 2020 Expert Survey on Formal Methods. I M. H. ter Beek & D. Nickovic (red.),
Formal Methods for Industrial Critical Systems - 25th International Conference, FMICS 2020, Proceedings: FMICS 2020, Vienna, Austria, September 2-3, 2020, Proceedings (s. 3-69). Springer.
https://doi.org/10.1007/978-3-030-58298-2_1