Brewer, R. S., Verdezoto, N., Rasmussen, M. K., Entwistle, J. M., Grønbæk, K., Blunck, H. & Holst, T. (2015).
Challenge: Getting Residential Users to Shift Their Electricity Usage Patterns. I S. Kalyanaraman, D. P. Seetharam & R. Shorey (red.),
The sixth ACM International Conference on Future Energy Systems (ACM e-Energy) (s. 83-88). Association for Computing Machinery.
https://doi.org/10.1145/2768510.2770934
Branzei, S., Hosseini, H.
& Miltersen, P. B. (2015).
Characterization and Computation of Equilibria for Indivisible Goods. I
Algorithmic Game Theory: 8th International Symposium, SAGT 2015, Saarbrücken, Germany, September 28–30, 2015, Proceedings (s. 244-255). Springer VS.
https://doi.org/10.1007/978-3-662-48433-3_19
Huang, Z., Radunović, B., Vojnović, M.
& Zhang, Q. (2015).
Communication complexity of approximate matching in distributed graphs. I
32nd International Symposium on Theoretical Aspects of Computer Science: STACS’15, March 4–7, 2015, Garching, Germany (s. 460-473). Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.STACS.2015.460
Bosansky, B., Branzei, S., Hansen, K. A., Miltersen, P. B. & Sørensen , T. B. (2015).
Computation of Stackelberg Equilibria of Finite Sequential Games. I E. Markakis & G. Schäfer (red.),
Web and Internet Economics: 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015, Proceedings (Bind 9470, s. 201-215). Springer VS.
http://arxiv.org/abs/1507.07677
Alexander, C.
, Arge, L., Bøcher, P. K., Revsbæik, M.
, Sandel, B. S., Svenning, J.-C., Tsirogiannis, C. & Yang, J. (2015).
Computing River Floods Using Massive Terrain Data. I
Proceedings. Workshop on Massive Data Algorithmics (MASSIVE) (s. 67-85)
Gronvall, E.
, Verdezoto, N., Bagalkot, N. L. & Sokoler, T. (2015).
Concordance: A Critical Participatory Alternative in Healthcare IT. I O. W. Bertelsen & K. Halskov (red.),
Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers. Department of Computer Science, Aarhus University.
https://doi.org/10.7146/aahcc.v1i1.21315
Bardzell, S.
, Bødker, S., Iversen, O. S., Klokmose, C. N. & Korsgaard, H. (red.) (2015).
Critical Alternatives: Proceedings of The Fifth Decennial Aarhus Conference 17- 21 August 2015, Aarhus, Denmark. Department of Computer Science, Aarhus University.
http://cs.au.dk/~hko/Aarhus2015ProceedingsVolumeI.pdf
Pold, S., Bertelsen, O. W., Koefoed Hansen, L., Andersen, C. U., Bardzell, S. & Bardzell, J. (2015).
Criticism – for Computational Alternatives. I O. Bertelsen & K. Halskov (red.),
Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers Department of Computer Science, Aarhus University.
https://doi.org/10.7146/aahcc.v1i1.21621
Kirkegaard, K. K., Fredsted, P. V., Jensen, J. M., Hindkjær, J. J., Kølvraa, S.
, Ingerslev, H. J. & Lykke-Hartmann, K. (2015).
Distinct differences in global gene expression profiles in non-implanted blastocysts and blastocysts resulting in live birth.
Gene,
571(2), 212-220.
https://doi.org/10.1016/j.gene.2015.06.057
Xue, H., Inati, S.
, Sangild, T., Kellman, P. & Hansen, M. (2015).
Distributed MRI Reconstruction using Gadgetron based Cloud Computing.
Magnetic Resonance in Medicine,
73(3), 1015–1025.
https://doi.org/10.1002/mrm.25213
Blevis, E.
, Bødker, S., Flach, J., Forlizzi, J., Jung , H., Kaptelinin, V., Nardi, B. & Rizzo, A. (2015).
Ecological Perspectives in HCI: Promise, Problems, and Potential. Abstract fra CHI Workshop on Ecological Perspectives in HCI, Sydkorea.
https://doi.org/10.1145/2702613.2702634
Andrychowicz, M.
, Damgård, I. B., Dziembowski, S.
, Faust, S. & Polychroniadou, A. (2015).
Efficient leakage resilient circuit compilers. I K. Nyberg (red.),
Topics in Cryptology - CT-RSA 2015: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (s. 311-329). Springer VS.
https://doi.org/10.1007/978-3-319-16715-2_17
Genkin, D., Ishai , Y.
& Polychroniadou, A. (2015).
Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits. I R. Gennaro & M. Robshaw (red.),
Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II (s. 721-741). Springer VS.
https://doi.org/10.1007/978-3-662-48000-7_35
Döttling, N. M. & Schröder, D. (2015).
Efficient Pseudorandom Functions via On-the-Fly Adaptation. I R. Gennaro & M. Robshaw (red.),
Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I (s. 329-350). Springer VS.
https://doi.org/10.1007/978-3-662-47989-6_16
David, B., Dowsley, R., Katti, R. & Nascimento, A. C. A. (2015).
Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols. I M.-H. Au & A. Miyaji (red.),
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings (Bind 9451, s. 354-367). Springer VS.
https://doi.org/10.1007/978-3-319-26059-4_20
Li, S., Crouser, R. J., Griffin, G., Gramazio, C.
, Schulz, H.-J., Childs, H. & Chang, R. (2015).
Exploring hierarchical visualization designs using phylogenetic trees. I D. L. Kao, M. C. Hao, M. A. Livingston & T. Wischgoll (red.),
Proceedings of the Conference on Visualization and Data Analysis VDA 2015 SPIE - International Society for Optical Engineering.
https://doi.org/10.1117/12.2078857
Zhang, Y., Chong, M. K.
, Müller, J., Bulling, A. & Gellersen, H. (2015).
Eye tracking for public displays in the wild.
Personal and Ubiquitous Computing,
19(5-6), 967-981.
https://doi.org/10.1007/s00779-015-0866-8