Gröschel, C.
, Dalsgaard, P., Klokmose, C. N., Korsgaard, H., Eriksson, E., Bats, R., Tabard, A., Ducros, A. & Serholt, S. (2018).
PARTICIPATE: Capturing Knowledge in Public Library Activities. I
CHI EA '18 : Proceedings of the 2018 CHI Conference Extended Abstracts on Human Factors in Computing Systems Artikel LBW060
https://doi.org/10.1145/3170427.3188605
Lindahl, C.
, Wagner, S., Uldbjerg, N., Schlütter, J. M., Bertelsen, O. W. & Sandager, P. (2018).
Patient acceptance of blood pressure self-measurement equipment using context-aware patient guidance. I N. Minsky & V. Osmani (red.),
Proceedings of the 12th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2018 (s. 318-326). Association for Computing Machinery.
https://doi.org/10.1145/3240925.3240963
Tsourakakis, C. E., Mitzenmacher, M.
, Larsen, K. G., Blasiok, J., Lawson, B., Nakkiran, P. & Nakos, V. (2018).
Predicting Positive and Negative Links with Noisy Queries: Theory Practice. arxiv.org.
http://arxiv.org/abs/1709.07308
Saleem, M. A., Soares da Costa, F., Dolog, P.
, Karras, P., Pedersen, T. B. & Calders, T. (2018).
Predicting Visitors Using Location-Based Social Networks. I
Proceedings - 2018 IEEE 19th International Conference on Mobile Data Management, MDM 2018 (s. 245-250). IEEE.
https://doi.org/10.1109/MDM.2018.00043
Baena, J., Cabarcas, D., Escudero, D. E., Khathuria, K. & Verbel, J. (2018).
Rank Analysis of Cubic Multivariate Cryptosystems. I T. Lange & R. Steinwandt (red.),
Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings (Bind 10786, s. 355-374). Springer VS.
https://doi.org/10.1007/978-3-319-79063-3_17
Skorstengaard, L., Devriese, D.
& Birkedal, L. (2018).
Reasoning About a Machine with Local Capabilities: Provably Safe Stack and Return Pointer Management. I A. Ahmed (red.),
Programming Languages and Systems - 27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Bind 10801, s. 475-501). Springer VS.
https://doi.org/10.1007/978-3-319-89884-1_17
Aguirre, A., Barthe, G.
, Birkedal, L., Bizjak, A., Gaboardi, M. & Garg, D. (2018).
Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus. I A. Ahmed (red.),
Programming Languages and Systems - 27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (s. 214-241). Springer VS.
https://doi.org/10.1007/978-3-319-89884-1_8
San-Segundo, R., Blunck, H., Moreno-Pimentel, J., Stisen, A. & Gil-Martín, M. (2018).
Robust Human Activity Recognition using smartwatches and smartphones.
Engineering Applications of Artificial Intelligence,
72(6), 190-202.
https://doi.org/10.1016/j.engappai.2018.04.002
Mic, V., Novak, D., Vadicamo, L. & Zezula, P. (2018).
Selecting Sketches for Similarity Search. I A. Benczur, T. Horvath & B. Thalheim (red.),
Advances in Databases and Information Systems - 22nd European Conference, ADBIS 2018, Proceedings (s. 127-141). Springer Verlag.
https://doi.org/10.1007/978-3-319-98398-1_9
Thomas, V., Brueggemann, M. J., Wang, D., Gaytán-Lugo, L. S. & Bidwell, N. J. (2018).
Silent SIG: Reflection in action at CHI. I R. Mandryk, M. Hancock, M. Perry & A. Cox (red.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Bind 2018-April, s. 1-4). Artikel SIG16 Association for Computing Machinery.
https://doi.org/10.1145/3170427.3185362
Cramer, R.
, Damgård, I., Escudero, D.
, Scholl, P. & Xing, C. (2018).
SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority. I H. Shacham & A. Boldyreva (red.),
Advances in Cryptology - CRYPTO 2018 (Bind 10992, s. 769-798). Springer VS.
https://doi.org/10.1007/978-3-319-96881-0_26
Remy, C., Bates, O., Thomas, V. J. & Broadbent, M. (2018).
"Sustainability... it's just not important": The Challenges of Academic Engagement with Diverse Stakeholders. I B. Penzenstadler, S. Easterbrook, C. Venters & S. I. Ahmed (red.),
ICT4S2018. 5th International Conference on Information and Communication Technology for Sustainability (Bind 52, s. 316-331). easychair.
https://doi.org/10.29007/kln5
Wang, X., Deng, K., Li, J., Yu, J. X., Jensen, C. S. & Yang, X. (2018).
Targeted influence minimization in social networks. I G. I. Webb, D. Phung, M. Ganji, L. Rashidi, V. S. Tseng & B. Ho (red.),
Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings (s. 689-700). Springer.
https://doi.org/10.1007/978-3-319-93040-4_54
Bandini, F., Olesen, D., Jakobsen, J., Marie Margaretha Kittel, C.
, Wang, S., Garcia, M. & Bauer-Gottwein, P. (2018).
Technical note: Bathymetry observations of inland water bodies using a tethered single-beam sonar controlled by an unmanned aerial vehicle.
Hydrology and Earth System Sciences,
22(8), 4165-4181.
https://doi.org/10.5194/hess-22-4165-2018
Jensen, C. (red.), Lind Olsen, E. (red.)
, Mikkelsen, G. L., Syberg , L.
, Nielsen, L. L., Hansen, M. A. E., Hjortlund, M.
, Madsen, O. L., Høngaard Andersen, P. & Duvold, T. (2018).
The future market for cybersecurity in Denmark.
Bates, O., Thomas, V., Remy, C., Nathan, L. P., Mann, S. & Friday, A. (2018).
The future of HCI and sustainability: Championing environmental and social justice. I R. Mandryk & M. Hancock (red.),
CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Bind 2018-April). Artikel SIG01 Association for Computing Machinery.
https://doi.org/10.1145/3170427.3185365
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
TinyKeys: A New Approach to Efficient Multi-Party Computation. I H. Shacham & A. Boldyreva (red.),
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Bind 10993, s. 3-33). Springer VS.
https://doi.org/10.1007/978-3-319-96878-0_1
LaVigne, R., Liu-Zhang, C.-D., Maurer, U. M., Moran, T., Mularczyk, M. & Tschudi, D. (2018).
Topology-Hiding Computation Beyond Semi-Honest Adversaries. I A. Beimel & S. Dziembowski (red.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings: Theory of Cryptography (Bind 11240, s. 3-35). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_1
Baum, C., Lin, H. & Oechsner, S. (2018).
Towards Practical Lattice-Based One-Time Linkable Ring Signatures. I D. Naccache, S. Xu, S. Qing, P. Samarati, G. Blanc, R. Lu, Z. Zhang & A. Meddahi (red.),
Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings: ICICS 2018 (Bind 11149, s. 303-322). Springer VS.
https://doi.org/10.1007/978-3-030-01950-1_18
Abdul, A., Vermeulen, J., Wang, D., Lim, B. Y. & Kankanhalli, M. (2018).
Trends and Trajectories for Explainable, Accountable and Intelligible Systems: An HCI Research Agenda. I R. Mandryk & M. Hancock (red.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. 582:1-582:18). Association for Computing Machinery.
https://doi.org/10.1145/3173574.3174156
Bandini, F., Lopez-Tamayo, A., Merediz-Alonso, G., Olesen, D., Jakobsen, J.
, Wang, S., Garcia, M. & Bauer-Gottwein, P. (2018).
Unmanned aerial vehicle observations of water surface elevation and bathymetry in the cenotes and lagoons of the Yucatan Peninsula, Mexico.
Hydrogeology Journal,
26(7), 2213-2228.
https://doi.org/10.1007/s10040-018-1755-9