Höök, K. H., Jonsson, M., Ståhl, A., Tholander, J., Robertson, T., Marti, P., Svanæs, D.
, Petersen, M. G., Forlizzi, J., Schiphorst, T., Isbister, K., Hummels, C., Klooster, S., Loke, L. & Khut, G. P. (2016).
Move to Be Moved. I
CHI EA 2016: #chi4good - Extended Abstracts, 34th Annual CHI Conference on Human Factors in Computing Systems (s. 3301-3308). Association for Computing Machinery.
https://doi.org/10.1145/2851581.2856470
Bai, G.
, Damgård, I., Orlandi, C. & Xia, Y. (2016).
Non-Interactive Verifiable Secret Sharing for Monotone Circuits. I D. Pointcheval, A. Nitaj & T. Rachidi (red.),
Progress in Cryptology – AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Proceedings (Bind 9646, s. 225-244). Springer VS.
https://doi.org/10.1007/978-3-319-31517-1_12
Ben-Sasson, E., Ben-Tov, I.
, Damgård, I., Ishai, Y. & Ron-Zewi, N. (2016).
On public key encryption from noisy codewords. I
Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings (Bind 9615, s. 417-446). Springer VS.
https://doi.org/10.1007/978-3-662-49387-8_16
Polychroniadou, A., Damgård, I. B., Garg, S., Mukherjee, P.
, Nielsen, J. B. & Pandey, O. (2016).
On the Communication and Round Complexity of Secure Computation. Institut for Datalogi, Aarhus Universitet.
http://cs.au.dk/fileadmin/user_upload/IvanFest_AP.pdf
Trifiletti, R., Nielsen, J. B., Frederiksen, T. K. & Jakobsen, T. P. (2016).
On the Complexity of Additively Homomorphic UC Commitments. I E. Kushilevitz & T. Malkin (red.),
Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings (Bind 9562, s. 542-565). Springer VS.
https://doi.org/10.1007/978-3-662-49096-9
Campos, G. O., Zimek, A., Sander, J., Campello, R. J. G. B.
, Micenkova, B., Schubert, E.
, Assent, I. & Houle, M. E. (2016).
On the Evaluation of Outlier Detection: Measures, Datasets, and an Empirical Study Continued. I R. Krestel, D. Mottin & E. Müller (red.),
Proceedings of the Conference "Lernen, Wissen, Daten, Analysen" (Bind 1670, s. 1). ceur workshop proceedings.
http://ceur-ws.org/Vol-1670/paper-55.pdf
Campos, G. O., Zimek, A., Sander, J., Campello, R. J. G. B.
, Micenková, B., Schubert, E.
, Assent, I. & Houle, M. E. (2016).
On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study.
Data Mining and Knowledge Discovery,
30(4), 891-927.
https://doi.org/10.1007/s10618-015-0444-8
Papakonstantinou, P. A., Xu, J.
& Yang, G. (2016).
On the power and limits of distance-based learning. I M.-F. Balcan & K. Q. Weinberger (red.),
Proceedings of the 33nd International Conference on Machine Learning, {ICML} 2016, New York City, NY, USA, June 19-24, 2016 (Bind 48, s. 2263-2271). JMLR.org.
Kunkel, A., Rheinländer, A., Schiefer, C., Helmer, S.
, Bouros, P. & Leser, U. (2016).
PIEJoin: Towards Parallel Set Containment Joins. I P. Baumann, I. Manolescu-Goujot, L. Trani, Y. Ioannidis, G. G. Barnaföldi, L. Dobos & E. Bányai (red.),
Scientific and Statistical Database Management: 28th International Conference, SSDBM 2016 - Proceedings Artikel 11 Association for Computing Machinery.
https://doi.org/10.1145/2949689.2949694
Cascudo, I.
, Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016).
Rate-1, linear time and additively homomorphic UC commitments. I M. Robshaw & J. Katz (red.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Bind 9816, s. 179-207). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_7
Østergaard Laursen, C., Pedersen, S.
, Merritt, T. R. & Caprani, O. (2016).
Robot-Supported Food Experiences: Exploring Aesthetic Plating with Design Prototypes. I J. T.K.V.Koh, B. J. Dunstan, D. Silvera-Tawil & M. Velonaki (red.),
Cultural Robotics - 1st International Workshop, CR 2015 and Held as Part of IEEE RO-MAN 2015, Revised Selected Papers: First International Workshop, CR 2015, Held as Part of IEEE RO-MAN 2015, Kobe, Japan, August 31, 2015. Revised Selected Papers (Bind 9549, s. 107-130). Springer.
https://doi.org/10.1007/978-3-319-42945-8_10
Faust, S., Hazay, C.
, Nielsen, J. B., Nordholt, P. S. & Zottarel, A. (2016).
Signature Schemes Secure Against Hard-to-Invert Leakage.
Journal of Cryptology,
29(2), 422-455.
https://doi.org/10.1007/s00145-015-9197-1
Rasmussen, M. K., Troiano, G. M.
, Petersen, M. G., Simonsen, J. G. & Hornbæk, K. (2016).
Sketching Shape-changing Interfaces: Exploring Vocabulary, Metaphor Use, and Affordances. I
CHI 2016 - Proceedings, 34th Annual CHI Conference on Human Factors in Computing Systems: CHI'16 (Bind 2016, s. 2740-2751). Association for Computing Machinery.
https://doi.org/10.1145/2858036.2858183
Christodoulou, G., Filos-Ratsikas, A.
, Frederiksen, S. K. S., Goldberg, P. W., Zhang, J. & Zhang, J. (2016).
Social Welfare in One-Sided Matching Mechanisms. I N. Osman & C. Sierra (red.),
Autonomous Agents and Multiagent Systems, IFAAMAS 2016 Workshops, Best Papers, Revised Selected Papers: AAMAS 2016 Workshops, Best Papers (Bind 10002, s. 30-50). Springer VS.
https://doi.org/10.1007/978-3-319-46882-2_3
Abboud, A., Backurs, A.
, Hansen, T. D., Williams, V. V. & Zamir, O. (2016).
Subtree isomorphism revisited. I
27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016 (Bind 2, s. 1256-1271). Association for Computing Machinery.
Stisen, A., Mathisen, A., Krogh, S., Blunck, H., Kjærgaard, M. B. & Prentow, T. S. (2016).
Task Phase Recognition for Highly Mobile Workers in Large Building Complexes. I
2016 IEEE International Conference on Pervasive Computing and Communications, PerCom 2016 Artikel 7456504 IEEE.
https://doi.org/10.1109/PERCOM.2016.7456504
Dithmer, M., Rasmussen, J. O., Grönvall, E.
, Spindler, H., Hansen, J., Nielsen, G., Sørensen, S. B. & Dinesen, B. (2016).
"The Heart Game": Using Gamification as Part of a Telerehabilitation Program for Heart Patients.
Games for Health,
5(1), 27-33.
https://doi.org/10.1089/g4h.2015.0001