Faust, S., Hazay, C.
, Nielsen, J. B., Nordholt, P. S. & Zottarel, A. (2012).
Signature Schemes Secure against Hard-to-Invert Leakage.
Lecture Notes in Computer Science,
7658, 98-115.
https://doi.org/10.1007/978-3-642-34961-4_8
Arge, L., Deleuran, L. K., Mølhave, T., Revsbæk, M. & Truelsen, J. (2012).
Simplifying Massive Contour Maps.
Lecture Notes in Computer Science,
7501, 96-107.
https://doi.org/10.1007/978-3-642-33090-2_10
Cao, X., Chen, L., Cong, G.
, Jensen, C. S., Qu, Q., Skovsgaard, A., Wu, D. & Yiu, M. L. (2012).
Spatial Keyword Querying: Invited Paper.
Lecture Notes in Computer Science,
7532, 16-29 .
https://doi.org/10.1007/978-3-642-34002-4_2
Schleuning, M., Fründ, J., Klein, A.-M., Abrahamczyk, S., Alarcón, R., Albrecht, M., Andersson, G. K. S., Bazarian, S., Blüthgen, N., Böhning-Gaese, K., Bommarco, R.
, Dalsgaard, B., Dehling, D. M., Dormann, C. F., Gotlieb, A.
, Hagen, M., Hickler, T., Holzschuh, A.
, Kaiser-Bunbury, C. N. ... Blüthgen, N. (2012).
Specialization of mutualistic interaction networks decreases toward tropical latitudes.
Current Biology,
22(20), 1925-1931.
https://doi.org/10.1016/j.cub.2012.08.015
Hachisuka, T., Jarosz, W., Bouchard , G., Christensen, P., Frisvad, J. R., Wenzel, J., Henrik Wann, J., Kaschalk, M., Knaus, C., Selle, A. & Spencer, B. (2012).
State of the Art in Photon-Density Estimation: Course notes. In
SIGGRAPH '12 ACM SIGGRAPH 2012 Courses Association for Computing Machinery.
https://doi.org/10.1145/2343483.2343489
Cao, X., Cong, G.
, Jensen, C. S., NG, J. J., Ooi, B. C., Phan, N.-T. & Wu, D. (2012).
SWORS: a system for the efficient retrieval of relevant spatial web objects.
Proceedings of the VLDB Endowment,
5(12), 1914-1917.
http://dl.acm.org/citation.cfm?id=2367536
Afshani, P., Afrawal, M., Benjamin, D.
, Larsen, K. G., Mehlhorn, K. & Winzen, C. (2012).
The Query Complexity of Finding a Hidden Permutation.
Electronic Colloquium on Computational Complexity, (TR12-087).
http://eccc.hpi-web.de/report/2012/087/
Andersen, M. S. & Kjærgaard, M. B. (2012).
Towards a New Classification of Location Privacy Methods in Pervasive Computing. In A. Puiatti & T. Gu (Eds.),
Mobile and Ubiquitous Systems: Computing, Networking, and Services : 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers (Vol. 104, pp. 150-161). Springer.
https://doi.org/10.1007/978-3-642-30973-1_13
Jensen, K., Aalst, W. M. V. D., Marsan, M. A., Franceschinis, G., Kleijn , J. & Kristensen, L. M. (Eds.) (2012).
Transactions on Petri Nets and Other Models of Concurrency VI: ToPNoC. Springer. Lecture Notes in Computer Science Vol. 7400
https://doi.org/10.1007/978-3-642-35179-2
Brodal, G. S., Davoodi, P., Lewenstein, M., Raman, R. & Rao, S. S. (2012).
Two Dimensional Range Minimum Queries and Fibonacci Lattices.
Lecture Notes in Computer Science,
7501, 217-228 .
https://doi.org/10.1007/978-3-642-33090-2_20
Kjærgaard, M. B. & Blunck, H. (2012).
Unsupervised Power Profiling for Mobile Devices. In A. Puiatti & T. Gu (Eds.),
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers (pp. 138-149). Springer.
https://doi.org/10.1007/978-3-642-30973-1_12
Andersen, M. S., Kjærgaard, M. B. & Grønbæk, K. (2012).
Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks. In A. U. Schmidt, G. Russello, I. Krontiris & S. Lian (Eds.),
Security and Privacy in Mobile Information and Communication Systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers (pp. 107-118). Springer.
https://doi.org/10.1007/978-3-642-33392-7_12
Sheng, Q. Z., Wang, G.
, Jensen, C. S. & Xu, G. (Eds.) (2012).
Web Technologies and Applications: 14th Asia-Pacific Web Conference, APWeb 2012, Kunming, China, April 11-13, 2012. Proceedings. Springer. Lecture Notes in Computer Science Vol. 7235
https://doi.org/10.1007/978-3-642-29253-8
Ackerman, M., Ben-David, S.
, Branzei, S. & Loker, D. (2012).
Weighted Clustering. In
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence (pp. 858-863). AAAI Press.