Blevis, E.
, Bødker, S., Flach, J., Forlizzi, J., Jung , H., Kaptelinin, V., Nardi, B. & Rizzo, A. (2015).
Ecological Perspectives in HCI: Promise, Problems, and Potential. Abstract from CHI Workshop on Ecological Perspectives in HCI, Korea, Republic of.
https://doi.org/10.1145/2702613.2702634
Andrychowicz, M.
, Damgård, I. B., Dziembowski, S.
, Faust, S. & Polychroniadou, A. (2015).
Efficient leakage resilient circuit compilers. In K. Nyberg (Ed.),
Topics in Cryptology - CT-RSA 2015: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (pp. 311-329). Springer VS.
https://doi.org/10.1007/978-3-319-16715-2_17
Genkin, D., Ishai , Y.
& Polychroniadou, A. (2015).
Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits. In R. Gennaro & M. Robshaw (Eds.),
Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II (pp. 721-741). Springer VS.
https://doi.org/10.1007/978-3-662-48000-7_35
Döttling, N. M. & Schröder, D. (2015).
Efficient Pseudorandom Functions via On-the-Fly Adaptation. In R. Gennaro & M. Robshaw (Eds.),
Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I (pp. 329-350). Springer VS.
https://doi.org/10.1007/978-3-662-47989-6_16
David, B., Dowsley, R., Katti, R. & Nascimento, A. C. A. (2015).
Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols. In M.-H. Au & A. Miyaji (Eds.),
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings (Vol. 9451, pp. 354-367). Springer VS.
https://doi.org/10.1007/978-3-319-26059-4_20
Zhang, Y., Chong, M. K.
, Müller, J., Bulling, A. & Gellersen, H. (2015).
Eye tracking for public displays in the wild.
Personal and Ubiquitous Computing,
19(5-6), 967-981.
https://doi.org/10.1007/s00779-015-0866-8
Donnez, J., Dolmans, M.-M., Pellicer, A., Diaz-Garcia, C.
, Ernst, E., Macklon, K. T.
& Andersen, C. Y. (2015).
Fertility preservation for age-related fertility decline.
Lancet,
385(9967), 506-7.
https://doi.org/10.1016/S0140-6736(15)60198-2
Bertelsen, O. W., Halskov, K., Bardzell, S. (Ed.)
, Bødker, S. (Ed.), Iversen, O. S. (Ed.), Klokmose, C. N. (Ed.) & Korsgaard, H. (Ed.) (2015).
Foreword. In
Critical Alternatives: Proceedings of The Fifth Decennial Aarhus Conference 17- 21 August 2015, Aarhus, Denmark (pp. ii). Department of Computer Science, Aarhus University.
http://cs.au.dk/~hko/Aarhus2015ProceedingsVolumeI.pdf
Miruchna , V., Walter , R., Lindlbauer , D., Lehmann , M., Klitzing, R. V.
& Müller, J. (2015).
GelTouch: Localized Tactile Feedback Through Thin, Programmable Gel. In
UIST '15 Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology (pp. 3-10 ). Association for Computing Machinery.
https://doi.org/10.1145/2807442.2807487
David, B. M., Nishimaki, R.
, Ranellucci, S. & Tapp, A. (2015).
Generalizing Efficient Multiparty Computation. In A. Lehmann & S. Wolf (Eds.),
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (pp. 15-32 ). Springer VS.
https://doi.org/10.1007/978-3-319-17470-9_2
Döttling, N., Kraschewski, D., Müller-Quade, J. & Nilges, T. (2015).
General statistically secure computation with bounded-resettable hardware tokens. In Y. Dodis & J. Buus Nielsen (Eds.),
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I (pp. 319-344). Springer VS.
https://doi.org/10.1007/978-3-662-46494-6_14
Burra, S. S., Larraia, E.
, Nielsen, J. B., Nordholt, P. S., Orlandi, C., Orsini, E., Scholl, P. & Smart, N. P. (2015).
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
http://eprint.iacr.org/2015/472
Hansen, T. D., Kaplan, H., Tarjan, R. E. & Zwick, U. (2015).
Hollow Heaps. In M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (Eds.),
Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Vol. Part 1, pp. 689-700). Springer VS.
https://doi.org/10.1007/978-3-662-47672-7_56
Livshits, B., Sridharan, M., Smaragdakis, Y., Lhoták, O., Amaral, J. N., Chang, B.-Y. E., Guyer, S. Z., Khedker, U. P.
, Møller, A. & Vardoulakis, D. (2015).
In Defense of Soundiness: A Manifesto.
Communications of the A C M,
58(2).
https://doi.org/10.1145/2644805
Bataillon, T., Duan, J., Hvilsom, C., Jin, X., Li, Y.
, Skov, L., Glemin, S.
, Munch, K., Jiang, T.
, Qian, Y., Hobolth, A., Wang, J.
, Mailund, T., Siegismund, H. R.
& Schierup, M. H. (2015).
Inference of purifying and positive selection in three subspecies of chimpanzees (Pan troglodytes) from exome sequencing.
Genome Biology and Evolution,
7(4), 1122-32.
https://doi.org/10.1093/gbe/evv058
Jung, R., Swasey, D.
, Sieczkowski, F., Svendsen, K., Turon, A.
, Birkedal, L. & Dreyer, D. (2015).
Iris: Monoids and invariants as an orthogonal basis for concurrent reasoning. In S. Rajamani (Ed.),
Conference Record of the Annual ACM Symposium on Principles of Programming Languages (pp. 637-650). Association for Computing Machinery.
https://doi.org/10.1145/2676726.2676980
Engemann, K., Enquist, B. J.
, Sandel, B. S., Boyle, B., Jørgensen, P. M., Morueta-Holme, N., Peet, R. K., Violle, C.
& Svenning, J.-C. (2015).
Limited sampling hampers “big data” estimation of species richness in a tropical biodiversity hotspot: Sampling Hampers Species Richness Estimation.
Ecology and Evolution,
5(3), 807-820.
https://doi.org/10.1002/ece3.1405
Cramer, R.
, Damgård, I. B., Döttling, N. M., Fehr, S. & Spini, G. (2015).
Linear secret sharing schemes from error correcting codes and universal hash functions. In E. Oswald & M. F. Fischlin (Eds.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (pp. 313-336). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_11