Doughty, C. E., Wolf, A.
, Holme, N. M., Jørgensen, P. M.
, Sandel, B. S., Violle, C., Boyle, B., Kraft, N. J. B., Peet, R. K., Enquist, B. J.
, Svenning, J.-C., Blake, S. & Galetti, M. (2016).
Megafauna extinction, tree species range reduction, and carbon storage in Amazonian forests.
Ecography,
39(2), 194-203.
https://doi.org/10.1111/ecog.01587
Kalvisa, A.
, Tsirogiannis, C., Silamikelis, I., Skenders, G., Broka, L., Zirnitis, A., Jansone, I. & Ranka, R. (2016).
MIRU-VNTR genotype diversity and indications of homoplasy in M. avium strains isolated from humans and slaughter pigs in Latvia.
Infection, Genetics and Evolution,
43(September), 15-21.
https://doi.org/10.1016/j.meegid.2016.05.013
Da Rocha Pinto, P.
, Dinsdale-Young, T., Gardner, P. & Sutherland, J. (2016).
Modular termination verification for non-blocking concurrency. In P. Thiemann (Ed.),
Programming Languages and Systems - 25th European Symposium on Programming, ESOP 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Proceedings (Vol. 9632, pp. 176-201). Springer.
https://doi.org/10.1007/978-3-662-49498-1_8
Höök, K. H., Jonsson, M., Ståhl, A., Tholander, J., Robertson, T., Marti, P., Svanæs, D.
, Petersen, M. G., Forlizzi, J., Schiphorst, T., Isbister, K., Hummels, C., Klooster, S., Loke, L. & Khut, G. P. (2016).
Move to Be Moved. In
CHI EA 2016: #chi4good - Extended Abstracts, 34th Annual CHI Conference on Human Factors in Computing Systems (pp. 3301-3308). Association for Computing Machinery.
https://doi.org/10.1145/2851581.2856470
Bai, G.
, Damgård, I., Orlandi, C. & Xia, Y. (2016).
Non-Interactive Verifiable Secret Sharing for Monotone Circuits. In D. Pointcheval, A. Nitaj & T. Rachidi (Eds.),
Progress in Cryptology – AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Proceedings (Vol. 9646, pp. 225-244). Springer VS.
https://doi.org/10.1007/978-3-319-31517-1_12
Ben-Sasson, E., Ben-Tov, I.
, Damgård, I., Ishai, Y. & Ron-Zewi, N. (2016).
On public key encryption from noisy codewords. In
Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings (Vol. 9615, pp. 417-446). Springer VS.
https://doi.org/10.1007/978-3-662-49387-8_16
Polychroniadou, A., Damgård, I. B., Garg, S., Mukherjee, P.
, Nielsen, J. B. & Pandey, O. (2016).
On the Communication and Round Complexity of Secure Computation. Institut for Datalogi, Aarhus Universitet.
http://cs.au.dk/fileadmin/user_upload/IvanFest_AP.pdf
Trifiletti, R., Nielsen, J. B., Frederiksen, T. K. & Jakobsen, T. P. (2016).
On the Complexity of Additively Homomorphic UC Commitments. In E. Kushilevitz & T. Malkin (Eds.),
Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings (Vol. 9562, pp. 542-565). Springer VS.
https://doi.org/10.1007/978-3-662-49096-9
Campos, G. O., Zimek, A., Sander, J., Campello, R. J. G. B.
, Micenkova, B., Schubert, E.
, Assent, I. & Houle, M. E. (2016).
On the Evaluation of Outlier Detection: Measures, Datasets, and an Empirical Study Continued. In R. Krestel, D. Mottin & E. Müller (Eds.),
Proceedings of the Conference "Lernen, Wissen, Daten, Analysen" (Vol. 1670, pp. 1). ceur workshop proceedings.
http://ceur-ws.org/Vol-1670/paper-55.pdf
Campos, G. O., Zimek, A., Sander, J., Campello, R. J. G. B.
, Micenková, B., Schubert, E.
, Assent, I. & Houle, M. E. (2016).
On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study.
Data Mining and Knowledge Discovery,
30(4), 891-927.
https://doi.org/10.1007/s10618-015-0444-8
Papakonstantinou, P. A., Xu, J.
& Yang, G. (2016).
On the power and limits of distance-based learning. In M.-F. Balcan & K. Q. Weinberger (Eds.),
Proceedings of the 33nd International Conference on Machine Learning, {ICML} 2016, New York City, NY, USA, June 19-24, 2016 (Vol. 48, pp. 2263-2271). JMLR.org.
Kunkel, A., Rheinländer, A., Schiefer, C., Helmer, S.
, Bouros, P. & Leser, U. (2016).
PIEJoin: Towards Parallel Set Containment Joins. In P. Baumann, I. Manolescu-Goujot, L. Trani, Y. Ioannidis, G. G. Barnaföldi, L. Dobos & E. Bányai (Eds.),
Scientific and Statistical Database Management: 28th International Conference, SSDBM 2016 - Proceedings Article 11 Association for Computing Machinery.
https://doi.org/10.1145/2949689.2949694
Cascudo, I.
, Damgård, I., David, B. M., Döttling, N. & Nielsen, J. B. (2016).
Rate-1, linear time and additively homomorphic UC commitments. In M. Robshaw & J. Katz (Eds.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings (Vol. 9816, pp. 179-207). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_7
Østergaard Laursen, C., Pedersen, S.
, Merritt, T. R. & Caprani, O. (2016).
Robot-Supported Food Experiences: Exploring Aesthetic Plating with Design Prototypes. In J. T.K.V.Koh, B. J. Dunstan, D. Silvera-Tawil & M. Velonaki (Eds.),
Cultural Robotics - 1st International Workshop, CR 2015 and Held as Part of IEEE RO-MAN 2015, Revised Selected Papers: First International Workshop, CR 2015, Held as Part of IEEE RO-MAN 2015, Kobe, Japan, August 31, 2015. Revised Selected Papers (Vol. 9549, pp. 107-130). Springer.
https://doi.org/10.1007/978-3-319-42945-8_10
Faust, S., Hazay, C.
, Nielsen, J. B., Nordholt, P. S. & Zottarel, A. (2016).
Signature Schemes Secure Against Hard-to-Invert Leakage.
Journal of Cryptology,
29(2), 422-455.
https://doi.org/10.1007/s00145-015-9197-1