Xue, H., Kelmann, P., Inati, S.
, Sørensen, T. S. & Hansen, M. (2014).
3D High Resolution l1-SPIRiT Reconstruction on Gadgetron based Cloud: no. 1882. Abstract fra Joint Annual Meeting ISMRM-ESMRMB, Milan, Italien.
http://www.ismrm.org/14/
Prentow, T. S., Blunck, H., Stisen, A., Kjærgaard, M. B. & Grønbæk, K. (2014).
Accurate estimation of indoor travel times: learned unsupervised from position traces. I M. Youssef , C. Mascolo & F. Kawsar (red.),
MOBIQUITOUS '14. Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (s. 90-99). Association for Computing Machinery.
https://doi.org/10.4108/icst.mobiquitous.2014.258020
Damgård, I. B. & Nielsen, J. B. (2014).
Adaptive versus static security in the UC Model. I S. S. M. Chow , J. K. Liu, L. C. K. Hui & S. M. Yiu (red.),
Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (s. 10-28). Springer VS.
https://doi.org/10.1007/978-3-319-12475-9_2
Bønnelykke, K., Sleiman, P.
, Nielsen, K., Kreiner-Møller, E., Mercader, J. M., Belgrave, D., Den Dekker, H. T., Husby, A., Sevelsted, A., Faura-Tellez, G., Mortensen, L. J., Paternoster, L., Flaaten, R., Mølgaard, A., Smart, D. E.
, Thomsen, P. F., Rasmussen, M. A., Bonàs-Guarch, S., Holst, C. ... Bisgaard, H. (2014).
A genome-wide association study identifies CDHR3 as a susceptibility locus for early childhood asthma with severe exacerbations.
Nature Genetics,
46(1), 51-55.
https://doi.org/10.1038/ng.2830
Bizjak, A., Birkedal, L. & Miculan, M. (2014).
A model of countable nondeterminism in guarded type theory. I G. Dowek (red.),
Rewriting and Typed Lambda Calculi: Joint International Conference, RTA-TLCA 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014. Proceedings (s. 108-123). Springer VS.
https://doi.org/10.1007/978-3-319-08918-8_8
Damgård, I. B., Lauritsen, R. & Toft, T. (2014).
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation. I M. Abdalla & R. D. Prisco (red.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 398-415 ). Springer.
https://doi.org/10.1007/978-3-319-10879-7_23
Klokmose, C. N., Kristensen, J. B., Bagge, R. & Halskov, K. (2014).
BullsEye: High-Precision Fiducial Tracking for Table-based Tangible Interaction. I R. Dachselt, N. Graham, K. Hornbæk & M. Nacenta (red.),
Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces, ITS '14 (s. 269-278 ). Association for Computing Machinery.
https://doi.org/10.1145/2669485.2669503
Grönvall, E.
, Kinch, S., Petersen, M. G. & Rasmussen, M. K. (2014).
Causing Commotion with a Shape-changing Bench: Experiencing Shape-Changing Interfaces in Use. I M. Jones, P. Palanque, A. Schmidt & T. Grossman (red.),
CHI'14, SIGCHIConference on Human Factors in Computing Systems : Proceedings (s. 2559-2568). Association for Computing Machinery.
https://doi.org/10.1145/2556288.2557360
Hansen, K. A., Komarath, B., Sarma M. N., J.
, Talebanfard, N. & Skyum, S. (2014).
Circuit Complexity of Properties of Graphs with Constant Planar Cutwidth. I E. Csuhaj-Varjú, M. Dietzfelbinger & Z. Ésik (red.),
Mathematical Foundations of Computer Science 2014: 39th International Symposium, MFCS 2014, Budapest, Hungary, August 25-29, 2014. Proceedings, Part II (s. 336-347 ). Springer VS.
https://doi.org/10.1007/978-3-662-44465-8_29
Damgård, I. B., David, B. M., Giacomelli, I. & Nielsen, J. B. (2014).
Compact VSS and Efficient Homomorphic UC Commitments. I P. Sarkar & T. Iwata (red.),
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (s. 213-232 ). Springer VS.
https://doi.org/10.1007/978-3-662-45608-8_12
Abam, M. A., Daneshpajouh, S.
, Deleuran, L., Ehsani, S. & Ghodsi, M. (2014).
Computing homotopic line simplification.
Computational Geometry,
47(7), 728-739.
https://doi.org/10.1016/j.comgeo.2014.02.002
Faust, S., Mukherjee, P., Nielsen, J. B. & Venturi, D. (2014).
Continuous Non-malleable Codes. I Y. Lindell (red.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings (s. 465-488). Springer.
https://doi.org/10.1007/978-3-642-54242-8_20
Verdezoto, N., Nunes, F.
, Grönvall, E., Fitzpatrick, G., Storni, C.
& Kyng, M. (2014).
Designing self-care for everyday life. I V. Roto & J. Häkkilä (red.),
NordiCHI '14, Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational (s. 821-824 ). Association for Computing Machinery.
https://doi.org/10.1145/2639189.2654837
Afshani, P., Chan, T. M. & Tsakalidis, K. (2014).
Deterministic Rectangle Enclosure and Offline Dominance Reporting on the RAM. I J. Esparza , P. Fraigniaud, T. Husfeldt & E. Koutsoupias (red.),
Automata, Languages, and Programming: 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part I (s. 77-88 ). Springer VS.
https://doi.org/10.1007/978-3-662-43948-7_7
Xue, H., Kelmann, P., Inati, S.
, Sørensen, T. S. & Hansen, M. (2014).
Distributed Computing on Gadgetron: A new paradigm for MRI reconstruction: no. 1579. Poster session præsenteret på Joint Annual Meeting Ismrm-Esmrmb, Milan, Italien.
http://www.ismrm.org/14/program_files/TP05.htm
Stølting Brodal, G., Kaporis, A. C., Papadopoulos, A. N., Sioutas, S., Tsakalidis, K. & Tsichlas, K. (2014).
Dynamic 3-sided planar range queries with expected doubly-logarithmic time.
Theoretical Computer Science,
526(March), 58-74.
https://doi.org/10.1016/j.tcs.2014.01.014