Thiel, S.-K., Remy, C., Roque, L., Orji, R.
, Dalsgaard, P., Latulipe, C. & Sarcar, S. (2019).
Towards a Research Agenda for Gameful Creativity. I
DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (s. 393-396). Association for Computing Machinery.
https://doi.org/10.1145/3301019.3320003
Bardam, S. K.
, Mathisen, A., Rädle, R., Klokmose, C. N. & Elmqvist, N. (2019).
Vistrates: A Component Model for Ubiquitous Analytics.
IEEE Transactions on Visualization and Computer Graphics,
25(1), 586-596. Artikel 8440803.
https://doi.org/10.1109/TVCG.2018.2865144
Eriksson, E., Iversen, O. S., Baykal, G. E., Van Mechelen, M., Smith, R. C., Wagner, M.-L., Fog, B. V., Klokmose, C. N., Cumbo, B., Hjorth, H. A., Musaeus, L. H., Petersen, M. G. & Bouvin, N. O. (2019).
Widening the Scope of FabLearn Research: Integrating Computational Thinking, Design and Making. Afhandling præsenteret på Fablearn Europe 2019, Oulu, Finland.
https://doi.org/10.1145/3335055.3335070
Jordan, V. E., Walker, J. A., Beckstrom, T. O., Steely, C. J., McDaniel, C. L., St Romain, C. P., The Baboon Genome Analysis Consortium, Worley, K. C., Phillips-Conroy, J., Jolly, C. J., Rogers, J., Konkel, M. K. & Batzer, M. A. (2018).
A computational reconstruction of Papio phylogeny using Alu insertion polymorphisms.
Mobile DNA,
9(1), Artikel 13.
https://doi.org/10.1186/s13100-018-0118-3
Afshani, P., De Berg, M., Casanova, H., Karsin, B., Lambrechts, C.
, Sitchinava, N. & Tsirogiannis, C. (2018).
An efficient algorithm for the 1D total visibility-index problem and its parallelization.
ACM Journal of Experimental Algorithmics,
23, Artikel 2.3.
https://doi.org/10.1145/3209685
Bertelsen, O. W., Bødker, S., Eriksson, E., Hoggan, E. & Vermeulen, J. (2018).
Beyond Generalization: Research for the Very Particular.
interactions,
26(1), 34-38.
https://doi.org/10.1145/3289425
Badertscher, C., Garay, J., Maurer, U.
, Tschudi, D. & Zikas, V. (2018).
But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin. I J. Buus Nielsen (red.),
Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings (Bind 10821, s. 34-65). Springer VS.
https://doi.org/10.1007/978-3-319-78375-8_2
Engemann, K., Pedersen, C. B., Arge, L., Tsirogiannis, C., Mortensen, P. B. & Svenning, J.-C. (2018).
Childhood exposure to green space - A novel risk-decreasing mechanism for schizophrenia? Schizophrenia Research,
199, 142-148.
https://doi.org/10.1016/j.schres.2018.03.026
Damgård, I., Luo, J.
, Oechsner, S., Scholl, P. & Simkin, M. (2018).
Compact Zero-Knowledge Proofs of Small Hamming Weight. I M. Abdalla & R. Dahab (red.),
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Bind 10770, s. 530-560). Springer VS.
https://doi.org/10.1007/978-3-319-76581-5_18
Karbyshev, A., Svendsen, K., Askarov, A. & Birkedal, L. (2018).
Compositional Non-interference for Concurrent Programs via Separation and Framing. I L. Bauer & R. Küsters (red.),
Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Bind 10804, s. 53-78). Springer VS.
https://doi.org/10.1007/978-3-319-89722-6_3
Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018).
Computer-Aided Proofs for Multiparty Computation with Active Security. I
Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Bind 2018, s. 119-131). Artikel 8429300 IEEE.
https://doi.org/10.1109/CSF.2018.00016
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). I T. Peyrin & S. Galbraith (red.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Bind 11274, s. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4
Faonio, A.
, Nielsen, J. B., Simkin, M. & Venturi, D. (2018).
Continuously Non-malleable Codes with Split-State Refresh. I B. Preneel & F. Vercauteren (red.),
Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings (Bind 10892, s. 121-139). Springer VS.
https://doi.org/10.1007/978-3-319-93387-0_7
Damgård, I., Kazana, T.
, Obremski, M., Raj, V. & Siniscalchi, L. (2018).
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. I A. Beimel & S. Dziembowski (red.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings (Bind 11240, s. 225-254). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_9
Knudsen, S.
, Vermeulen, J., Kosminsky, D., Walny, J., West, M., Frisson, C., Adriel Aseniero, B.
, MacDonald Vermeulen, L., Perin, C., Quach, L., Buk, P., Tabuli, K., Chopra, S., Willett, W. & Carpendale, S. (2018).
Democratizing Open Energy Data for Public Discourse Using Visualization. I R. Mandryk & M. Hancock (red.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. D406:1-D406:4). Association for Computing Machinery.
https://doi.org/10.1145/3170427.3186539
Neerbek, J., Assent, I. & Dolog, P. (2018).
Detecting Complex Sensitive Information via Phrase Structure in Recursive Neural Networks. I D. Phung, V. S. Tseng, G. I. Webb, B. Ho, M. Ganji & L. Rashidi (red.),
Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings: PAKDD '18 (Bind 10939, s. 373-385). Springer VS.
https://doi.org/10.1007/978-3-319-93040-4_30