Lindell, Y., Nissim, K.
& Orlandi, C. (2013).
Hiding the Input-Size in Secure Two-Party Computation. I K. Sako & P. Sarkar (red.),
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (Bind 8197, s. 421-440). Springer VS.
https://doi.org/10.1007/978-3-642-41019-2_6
Lindahl, C., Wagner, S. R., Bertelsen, O. W., Schlütter, J. M., Uldbjerg, N. & Sandager, P. (2017).
Effects of context-aware patient guidance on blood pressure selfmeasurement adherence levels.
Health Informatics Journal,
25(2), 417-428.
https://doi.org/10.1177/1460458217717073
Lindahl, C., Wagner, S., Uldbjerg, N., Schlütter, J. M., Bertelsen, O. W. & Sandager, P. (2018).
Patient acceptance of blood pressure self-measurement equipment using context-aware patient guidance. I N. Minsky & V. Osmani (red.),
Proceedings of the 12th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2018 (s. 318-326). Association for Computing Machinery.
https://doi.org/10.1145/3240925.3240963
Lindahl, C., Wagner, S., Uldbjerg, N., Schlütter, J. M., Bertelsen, O. & Sandager, P. (2019).
Effects of context-aware patient guidance on blood pressure self-measurement adherence levels.
Health Informatics Journal,
25(2), 417-428.
https://doi.org/10.1177/1460458217717073
Lin, D.
, Jensen, C. S., Zhang, R., Xiao, L. & Lu, J. (2011).
A Moving-Object Index for Efficient Query Processing with PeerWise Location Privacy.
Proceedings of the VLDB Endowment,
5(1), 37-48.
http://www.vldb.org/pvldb/vol5/p037_danlin_vldb2012.pdf
Light, A.
, Bardzell, J., Bardzell, S., Cox, G., Fritsch, J.
& Koefoed Hansen, L. (2015).
Making “World Machines”: Discourse, Design and Global Technologies for Greater-than-self Issues.
Aarhus Series on Human Centered Computing,
1(1).
http://ojs.statsbiblioteket.dk/index.php/ashcc/article/view/21326/18796
Lie, M. A., Thomsen, R., Pedersen, C. N. S., Schiøtt, B. & Christensen, M. H. (2011).
Molecular Docking with Ligand Attached Water Molecules.
Journal of Chemical Information and Modeling,
51(4), 909-917.
https://doi.org/10.1021/ci100510m
Liboriussen, P.
, Pedersen, B. P., Ifrim, G., Nissen, P. & Pedersen, C. S. (2009).
Automatic classification of P-Type ATPases using SLR. Poster session præsenteret på 17th Annual International Conference on Intelligent Systems for Molecular Biology (ISMB) & 8th European Conference on Computational Biology (ECCB), Stockholm, Sverige.
Li, Y., Li, X.
, Sandel, B., Blank, D., Liu, Z., Liu, X. & Yan, S. (2016).
Climate and topography explain range sizes of terrestrial vertebrates.
Nature Climate Change,
6(5), 498-502.
https://doi.org/10.1038/nclimate2895
Leiva, G., Grønbæk, J. E., Klokmose, C. N., Nguyen, C., Kazi, R. H. & Asente, P. (2021).
Rapido: Prototyping Interactive AR Experiences through Programming by Demonstration. I
UIST 2021 - Proceedings of the 34th Annual ACM Symposium on User Interface Software and Technology (s. 626-637). Association for Computing Machinery.
https://doi.org/10.1145/3472749.3474774
Lee, H. S., Weidner, F., Sidenmark, L.
& Gellersen, H. (2024).
Snap, Pursuit and Gain: Virtual Reality Viewport Control by Gaze. I F. F. Mueller, P. Kyburz, J. R. Williamson, C. Sas, M. L. Wilson, P. T. Dugas & I. Shklovski (red.),
CHI '24: Proceedings of the CHI Conference on Human Factors in Computing Systems Association for Computing Machinery.
https://doi.org/10.1145/3613904.3642838
Ledo, D., Houben, S.
, Vermeulen, J., Marquardt, N., Oehlberg, L. & Greenberg, S. (2018).
Evaluation Strategies for HCI Toolkit Research. I R. Mandryk & M. Hancock (red.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. 36:1-36:17). Association for Computing Machinery.
https://doi.org/10.1145/3173574.3173610
Ledo, D.
, Vermeulen, J., Carpendale, S., Greenberg, S., Oehlberg, L. & Boring, S. (2019).
Astral: prototyping mobile and smart object interactive behaviours using familiar applications. I
DIS 2019 - Proceedings of the 2019 ACM Designing Interactive Systems Conference (s. 711-724). Association for Computing Machinery.
https://doi.org/10.1145/3322276.3322329
Le, T., Dietz, F.
, Pfeuffer, K. & Alt, F. (2022).
A Practical Method to Eye-Tracking on the Phone: Toolkit, Accuracy and Precision. I T. Doring, S. Boll, A. Colley, A. Esteves & J. Guerreiro (red.),
Proceedings of MUM 2022, the 21st International Conference on Mobile and Ubiquitous Multimedia (s. 182-188). Association for Computing Machinery.
https://doi.org/10.1145/3568444.3568463
LaVigne, R., Liu-Zhang, C.-D., Maurer, U. M., Moran, T., Mularczyk, M.
& Tschudi, D. (2018).
Topology-Hiding Computation Beyond Semi-Honest Adversaries. I A. Beimel & S. Dziembowski (red.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings: Theory of Cryptography (Bind 11240, s. 3-35). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_1