Faonio, A., Nielsen, J. B. & Venturi, D. (2015).
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. I M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (red.),
Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Bind Part 1, s. 456-468). Springer VS.
https://doi.org/10.1007/978-3-662-47672-7_37
Sieczkowski, F., Bizjak, A. & Birkedal, L. (2015).
ModuRes: A Coq Library for Modular Reasoning About Concurrent Higher-Order Imperative Programming Languages. I C. Urban & X. Zhang (red.),
Interactive Theorem Proving: 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings (s. 375-390). Springer.
https://doi.org/10.1007/978-3-319-22102-1_25
Müller, E.
, Assent, I., Günnemann, S., Seidl, T. & Dy, J. (2015).
MultiClust special issue on discovering, summarizing and using multiple clusterings.
Machine Learning,
98(1-2), 1-5.
https://doi.org/10.1007/s10994-014-5445-0
Cascudo Pueyo, I., Cramer, R., Mirandola, D., Padró, C. & Xing, C. (2015).
On Secret Sharing with Nonlinear Product Reconstruction.
S I A M Journal on Discrete Mathematics,
29(2), 1114-1131.
https://doi.org/10.1137/130931886
Durkota, K., Lisý, W., Kiekintveld, C.
& Bosansky, B. (2015).
Optimal Network Security Hardening Using Attack Graph Games. I N. Criado, M. Rehak, J. M. Such & L. Vercouter (red.),
2nd International Workshop on Agents and Cybersecurity, ACySE 2015: Workshop Notes at AAMAS 2015 (s. 7-14). Lancaster University.
http://www.lancaster.ac.uk/staff/suchj/acyse2015-proceedings/ACySE2015_proceedings.pdf#page=14
Meiklejohn, S.
& Orlandi, C. (2015).
Privacy-enhancing overlays in bitcoin. I M. Brenner , N. Christin , B. Johnson & K. Rohloff (red.),
Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Bind 8976, s. 127-141). Springer.
https://doi.org/10.1007/978-3-662-48051-9_10
Frederiksen, T. K., Nielsen, J. B. & Orlandi, C. (2015).
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. I E. Oswald & M. Fischlin (red.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (s. 191-219). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_7
Clouston, R., Bizjak, A., Grathwohl, H. B. & Birkedal, L. (2015).
Programming and reasoning with guarded recursion for coinductive types. I A. Pitts (red.),
Foundations of Software Science and Computation Structures: 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (s. 305-316). Springer VS.
https://doi.org/10.1007/978-3-662-46678-0_26
Vermeulen, J., Luyten, K., Coninx, K., Marquardt, N. & Bird, J. (2015).
Proxemic Flow: Dynamic Peripheral Floor Visualizations for Revealing and Mediating Large Surface Interactions. I J. Abascal, S. Barbosa, M. Fetter, T. Gross, P. Palanque & M. Winckler (red.),
Human-Computer Interaction -- INTERACT 2015 (s. 264-281). Springer International Publishing Switzerland.
Fang, W.
, Filos-Ratsikas, A., Frederiksen, S. K. S., Tang, P. & Zuo, S. (2015).
Randomized Assignments for Barter Exchanges: Fairness vs Efficiency. I T. Walsh (red.),
Algorithmic Decision Theory: 4th International Conference, ADT 2015, Lexington, KY, USA, September 27-30, 2015, Proceedings (s. 537-552). Springer VS.
https://doi.org/10.1007/978-3-319-23114-3_32
Nocke, T., Buschmann, S., Donges, J. F., Marwan, N.
, Schulz, H.-J. & Tominski, C. (2015).
Review: Visual Analytics of climate networks.
Nonlinear Processes in Geophysics,
22, 545-570.
https://doi.org/10.5194/npg-22-545-2015
Abel, P., Fox, M., Potts, R., Hemment, D., Thomson, C., Gajdos, P., Li, S., Vazquez, A. D., Barraclough, R., Schliwa, G., Lindley, J., Turner, S., Devitt, J., MacDonald, J., Lee, A., Trueblood, C., Maxwell, D., Mehrpouya, H., Woods, M. ... Monsen, K. (2015).
Re-writing the City: Negotiating and Reflecting on Data Streams.
https://doi.org/10.1145/2783446.2783562
Giacomelli, I., Olimid, R.
& Ranellucci, S. (2015).
Security of Linear Secret-Sharing Schemes Against Mass Surveillance. I M. Reiter & D. Naccache (red.),
Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Bind 9476, s. 43-58). Springer.
https://doi.org/10.1007/978-3-319-26823-1
Aronov, B., Driemel, A., Van Kreveld, M., Löffler, M.
& Staals, F. (2015).
Segmentation of trajectories on nonmonotone criteria.
A C M Transactions on Algorithms,
12(2), Artikel 26.
https://doi.org/10.1145/2660772
Nunes, F.
, Verdezoto, N., Fitzpatrick, G.
, Kyng, M., Grönvall, E. & Storni, C. (2015).
Self-Care Technologies in HCI: Trends, Tensions, and Opportunities.
A C M Transactions on Computer - Human Interaction,
22(6), Artikel 33.
https://doi.org/10.1145/2803173