Valsted, F. M., Nielsen, C. V. H., Jensen, J. Q., Sonne, T.
& Jensen, M. M. (2017).
Strive: Exploring Assistive Haptic Feedback on the Run. I M. Brereton, D. Vyas, A. Soro, B. Ploderer, J. Waycott & A. Morrison (red.),
Proceedings of the 29th Australian Computer-Human Interaction Conference: Human-Nature, OzCHI 2017 (s. 275-284). Association for Computing Machinery.
https://doi.org/10.1145/3152771.3152801
Stisen, A., Blunck, H., Kjærgaard, M. B., Prentow, T. S., Mathisen, A., Krogh , S. & Grønbæk, K. (2017).
Task phase recognition and task progress estimation for highly mobile workers in large building complexes.
Pervasive and Mobile Computing,
38(2), 418-429.
https://doi.org/10.1016/j.pmcj.2016.08.016
Krebbers, R., Jung, R.
, Bizjak, A., Jourdan, J.-H., Dreyer, D.
& Birkedal, L. (2017).
The Essence of Higher-Order Concurrent Separation Logic. I H. Yang (red.),
Programming Languages and Systems - 26th European Symposium on Programming, ESOP 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings (s. 696-723). Springer VS.
https://doi.org/10.1007/978-3-662-54434-1_26
Bauer, A., Gross, J., Lumsdaine, P. L., Shulman, M., Sozeau, M.
& Spitters, B. (2017).
The HoTT Library: A Formalization of Homotopy Type Theory in Coq. I Y. Bertot & V. Vafeiadis (red.),
CPP 2017 - Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs, co-located with POPL 2017: CPP 2017 (s. 164-172). Association for Computing Machinery.
https://doi.org/10.1145/3018610.3018615
Damgård, I., Nielsen, J. B., Nielsen, M. & Ranellucci, S. (2017).
The tinytable protocol for 2-party secure computation, or: Gate-scrambling revisited. I J. Katz & H. Shacham (red.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Bind 10401, s. 167-187). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_6
Brânzei, S.
, Filos-Ratsikas, A., Miltersen, P. B. & Zeng, Y. (2017).
Walrasian pricing in multi-unit auctions. I K. G. Larsen, H. L. Bodlaender & J.-F. Raskin (red.),
42nd International Symposium on Mathematical Foundations of Computer Science, MFCS 2017 (Bind 83, s. 80:1-80:14). Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.MFCS.2017.80
Mathisen, A., Krogh, S., Stisen, A., Blunck, H. & Grønbæk, K. (2016).
A comparative analysis of Indoor WiFi Positioning at a large building complex. I J. J. G. Domínguez, Á. H. Alonso & J. Ureña Ureña (red.),
2016 International Conference on Indoor Positioning and Indoor Navigation, IPIN 2016 Artikel 7743666 IEEE Press.
https://doi.org/10.1109/IPIN.2016.7743666
Blunck, H., Bhattacharya, S.
, Stisen, A., Prentow, T. S., Kjærgaard, M. B., Dey, A.
, Jensen, M. M. & Sonne, T. (2016).
Activity Recognition on Smart Devices: Dealing with diversity in the wild.
GetMobile: Mobile Computing and Communications,
20(1), 34-38.
https://doi.org/10.1145/2972413.2972425
Biniaz, A., Bose, P.
, van Duijn, I., Maheshwari, A. & Smid, M. (2016).
A Faster Algorithm for the Minimum Red-Blue-Purple Spanning Graph Problem for Points on a Circle. I T. C. Shermer (red.),
Proceedings of the 28th Canadian Conference on Computational Geometry (s. 140-146). Simon Fraser University. Vancouver, British Columbia Canada.
http://people.scs.carleton.ca/~michiel/RedBluePurpleCCCG16.pdf
Fetzer, V., Müller-Quade, J.
& Nilges, T. (2016).
A Formal Treatment of Privacy in Video Data. I I. Askoxylakis, S. Ioannidis, S. Katsikas & C. Meadows (red.),
Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings (Bind 9879, s. 406-424). Springer VS.
https://doi.org/10.1007/978-3-319-45741-3_21
Thai Son, M., Assent, I. & Le, A. T. (2016).
Anytime OPTICS: An efficient approach for hierarchical density-based clustering. I S. B. Navathe, W. Wu, S. Shekhar, X. Du, X. Sean Wang & H. Xiong (red.),
Database Systems for Advanced Applications - 21st International Conference, DASFAA 2016, Proceedings (Bind 9642, s. 164-179). Springer VS.
https://doi.org/10.1007/978-3-319-32025-0_11
Baum, C., Damgård, I. B., Toft, T. & Zakarias, R. W. (2016).
Better Preprocessing for Secure Multiparty Computation. I M. Manulis, A.-R. Sadeghi & S. Schneider (red.),
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings: 14th International Conference on Applied Cryptography and Network Security (Bind 9696, s. 327-345). Springer VS.
https://doi.org/10.1007/978-3-319-39555-5_18
Snow, S., Vyas, D.
, Lyle, P., Mallett, M. & Brereton, M. (2016).
Building Connections: Technology Design for Living on a Low Income. I A. M. Kanstrup, J. Vines, L. Huybrechts, R. C. Smith, K. Bodker & C. Bossen (red.),
PDC 2016: Proceedings of the 14th Participatory Design Conference: Short Papers, Interactive Exhibitions, Workshops - Volume 2 (s. 1-4). Association for Computing Machinery.
https://doi.org/10.1145/2948076.2948091