Sandager, P., Lindahl, C., Schlütter, J. M., Uldbjerg, N., Wagner, S. R., Toftegaard, T. S. & Bertelsen, O. W. (2013).
Context-aware patient guidance during blood pressure self-measurement. In
Proceedings of the IADIS International Conference e-Health 2013, EH 2013 (pp. 153-157). University of Twente.
http://www.scopus.com/record/display.url?view=basic&eid=2-s2.0-84886912072&origin=resultslist
Moreira, J. M. M.
, Jensen, C. S., Dias, P. & Mesquita, P. (2013).
Creating data representations for moving objects with extent from images. In
Presented at the COST MOVE Workshop at Moving Objects at Sea, Brest, France, June 28–29, 2013
Brodal, G. S., Fagerberg, R.
, Mailund, T., Pedersen, C. N. S. & Sand, A. (2013).
Efficient Algorithms for Computing the Triplet and Quartet Distance Between Trees of Arbitrary Degree.
The Annual A C M - S I A M Symposium on Discrete Algorithms. Proceedings,
24, 1814-1832.
http://knowledgecenter.siam.org/0236-000098/0236-000098/1
Feldthaus, A., Schäfer, M., Sridharan, M., Dolby, J. & Tip, F. (2013).
Efficient construction of approximate call graphs for JavaScript IDE services. In D. Notkin, B. H. C. Cheng & K. Pohl (Eds.),
Proceedings of the 2013 International Conference on Software Engineering, ICSE '13 (pp. 752-761 ). IEEE Communications Society.
http://dl.acm.org.ez.statsbiblioteket.dk:2048/citation.cfm?id=2486887&CFID=280253056&CFTOKEN=11487082
Agarwal, P. K.
, Yang, J., Arge, L., Govindarajan, S. & Yi, K. (2013).
Efficient external memory structures for range-aggregate queries.
Computational Geometry,
46(3), 358-370.
https://doi.org/10.1016/j.comgeo.2012.10.003
Cohen, G.
, Damgård, I. B., Ishai, Y.
, Kölker, J., Miltersen, P. B., Raz, R. & Rothblum, R. D. (2013).
Efficient multiparty protocols via log-depth threshold formulae. In R. Canetti & J. A. Garay (Eds.),
Advances in Cryptology – CRYPTO 2013: 33rd Annual Conference. Proceedings, Part II (pp. 185-202). Springer VS.
https://doi.org/10.1007/978-3-642-40084-1_11
Cohen, G.
, Damgård, I. B., Ishai, Y.
, Kölker, J., Miltersen, P. B., Raz, R. & Rothblum, R. (2013).
Efficient Multiparty Protocols via Log-Depth Threshold Formulae Contact Add Comment RSS-Feed.
Electronic Colloquium on Computational Complexity, (TR13-107).
http://eccc.hpi-web.de/report/2013/107/
Micenková, B., Ng, R. T.
, Dang, X.-H. & Assent, I. (2013).
Explaining outliers by subspace separability. In H. Xiong, G. Karypis, B. Thuraisingham, D. Cook & X. Wu (Eds.),
Proceedings, IEEE 13th International Conference on Data Mining (ICDM 2013) (pp. 518 - 527 ). IEEE Press.
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6724379
Jensen, M. M., Rasmussen, M. & Grønbæk, K. (2013).
Exploring Opponent Formats: Game Mechanics for Computer-Supported Physical Games. In J. C. Anacleto, E. W. G. Clua, F. S. Correa da Silva, S. Fels & H. S. Yang (Eds.),
Entertainment Computing - ICEC 2013: 12th International Conference, ICEC 2013, São Paulo, Brazil, October 16-18, 2013. Proceedings (Vol. 8215, pp. 48-60). Springer VS.
https://doi.org/10.1007/978-3-642-41106-9_6
Pettie, S. & Su, H.-H. (2013).
Fast distributed coloring algorithms for triangle-free graphs. In F. Fomin, R. Freivalds, M. Kwiatkowska & D. Peleg (Eds.),
Automata, Languages, and Programming: 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II (pp. 681-693). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-39212-2_59
Magnani, M. & Rossi, L. (2013).
Formation of multiple networks. In A. M. Greenberg , W. G. Kennedy & N. D. Bos (Eds.),
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013. Proceedings (pp. 257-264). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-37210-0_28
Bødker, S. & Klokmose, C. N. (2013).
From Persona to Techsona. In P. Kotzé, G. Marsden , G. Lindgaard, J. Wesson & M. Winckler (Eds.),
Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part IV (pp. 842-349). Springer VS.
https://doi.org/10.1007/978-3-642-40498-6_26
Lindell, Y., Nissim, K.
& Orlandi, C. (2013).
Hiding the Input-Size in Secure Two-Party Computation. In K. Sako & P. Sarkar (Eds.),
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (Vol. 8197, pp. 421-440). Springer VS.
https://doi.org/10.1007/978-3-642-41019-2_6