Kaspersen, M. H., Bilstrup, K. E. K., Van Mechelen, M., Hjort, A.
, Bouvin, N. O. & Petersen, M. G. (2022).
High school students exploring machine learning and its societal implications: Opportunities and challenges.
International Journal of Child-Computer Interaction,
34, Article 100539.
https://doi.org/10.1016/j.ijcci.2022.100539
Feng, G., Mao, L.
, Sandel, B. S., Swenson, N. G.
& Svenning, J.-C. (2016).
High plant endemism in China is partially linked to reduced glacial-interglacial climate change.
Journal of Biogeography,
43(1), 145-154.
https://doi.org/10.1111/jbi.12613
Burra, S. S., Larraia, E.
, Nielsen, J. B., Nordholt, P. S., Orlandi, C., Orsini, E., Scholl, P. & Smart, N. P. (2015).
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
http://eprint.iacr.org/2015/472
Burra, S. S., Larraia, E.
, Nielsen, J. B., Nordholt, P. S.
, Orlandi, C., Orsini, E.
, Scholl, P. & Smart, N. P. (2021).
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer.
Journal of Cryptology,
34(3), Article 34.
https://doi.org/10.1007/s00145-021-09403-1
Jensen, K. (1983).
High-level Petri Nets. In A. Pagnoni & G. Rozenberg (Eds.),
Applications and Theory of Petri Nets: Selected Papers from the 3rd European Workshop on Applications and Theory of Petri Nets, Varenna, Italy, September 27-30, 1982 (Vol. 66, pp. 166-180). Springer.
Aguirre, A., Barthe, G., Gaboardi, M., Garg, D., Katsumata, S. Y. & Sato, T. (2021).
Higher-order probabilistic adversarial computations: categorical semantics and program logics.
Proceedings of the ACM on Programming Languages ,
5(ICFP), Article 93.
https://doi.org/10.1145/3473598
Houston, B.
, Nielsen, M. B., Batty, C., Nilsson, O. & Museth, K. (2006).
Hierarchical RLE Level Set: A Compact and Versatile Deformable Surface Representation.
A C M Transactions on Graphics,
25(1), 151-175.
Lindell, Y., Nissim, K.
& Orlandi, C. (2013).
Hiding the Input-Size in Secure Two-Party Computation. In K. Sako & P. Sarkar (Eds.),
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (Vol. 8197, pp. 421-440). Springer VS.
https://doi.org/10.1007/978-3-642-41019-2_6
Bertelsen, O. W., Bødker, S., McEwan, T., Procter, R. & Svanæs, D. (2006).
HCI Knowledge - Fit for Transfer, Share or Co-Construction. In
The 19th British HCI Group Annual Conference, Napier University. (pp. 341-343)