Xue, H., Kelmann, P., Inati, S.
, Sørensen, T. S. & Hansen, M. (2014).
3D High Resolution l1-SPIRiT Reconstruction on Gadgetron based Cloud: no. 1882. Abstract from Joint Annual Meeting ISMRM-ESMRMB, Milan, Italy.
http://www.ismrm.org/14/
Prentow, T. S., Blunck, H., Stisen, A., Kjærgaard, M. B. & Grønbæk, K. (2014).
Accurate estimation of indoor travel times: learned unsupervised from position traces. In M. Youssef , C. Mascolo & F. Kawsar (Eds.),
MOBIQUITOUS '14. Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 90-99). Association for Computing Machinery.
https://doi.org/10.4108/icst.mobiquitous.2014.258020
Damgård, I. B. & Nielsen, J. B. (2014).
Adaptive versus static security in the UC Model. In S. S. M. Chow , J. K. Liu, L. C. K. Hui & S. M. Yiu (Eds.),
Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (pp. 10-28). Springer VS.
https://doi.org/10.1007/978-3-319-12475-9_2
Bizjak, A., Birkedal, L. & Miculan, M. (2014).
A model of countable nondeterminism in guarded type theory. In G. Dowek (Ed.),
Rewriting and Typed Lambda Calculi: Joint International Conference, RTA-TLCA 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014. Proceedings (pp. 108-123). Springer VS.
https://doi.org/10.1007/978-3-319-08918-8_8
Damgård, I. B., Lauritsen, R. & Toft, T. (2014).
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation. In M. Abdalla & R. D. Prisco (Eds.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (pp. 398-415 ). Springer.
https://doi.org/10.1007/978-3-319-10879-7_23
Klokmose, C. N., Kristensen, J. B., Bagge, R. & Halskov, K. (2014).
BullsEye: High-Precision Fiducial Tracking for Table-based Tangible Interaction. In R. Dachselt, N. Graham, K. Hornbæk & M. Nacenta (Eds.),
Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces, ITS '14 (pp. 269-278 ). Association for Computing Machinery.
https://doi.org/10.1145/2669485.2669503
Grönvall, E.
, Kinch, S., Petersen, M. G. & Rasmussen, M. K. (2014).
Causing Commotion with a Shape-changing Bench: Experiencing Shape-Changing Interfaces in Use. In M. Jones, P. Palanque, A. Schmidt & T. Grossman (Eds.),
CHI'14, SIGCHIConference on Human Factors in Computing Systems : Proceedings (pp. 2559-2568). Association for Computing Machinery.
https://doi.org/10.1145/2556288.2557360
Hansen, K. A., Komarath, B., Sarma M. N., J.
, Talebanfard, N. & Skyum, S. (2014).
Circuit Complexity of Properties of Graphs with Constant Planar Cutwidth. In E. Csuhaj-Varjú, M. Dietzfelbinger & Z. Ésik (Eds.),
Mathematical Foundations of Computer Science 2014: 39th International Symposium, MFCS 2014, Budapest, Hungary, August 25-29, 2014. Proceedings, Part II (pp. 336-347 ). Springer VS.
https://doi.org/10.1007/978-3-662-44465-8_29
Damgård, I. B., David, B. M., Giacomelli, I. & Nielsen, J. B. (2014).
Compact VSS and Efficient Homomorphic UC Commitments. In P. Sarkar & T. Iwata (Eds.),
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (pp. 213-232 ). Springer VS.
https://doi.org/10.1007/978-3-662-45608-8_12
Abam, M. A., Daneshpajouh, S.
, Deleuran, L., Ehsani, S. & Ghodsi, M. (2014).
Computing homotopic line simplification.
Computational Geometry,
47(7), 728-739.
https://doi.org/10.1016/j.comgeo.2014.02.002
Faust, S., Mukherjee, P., Nielsen, J. B. & Venturi, D. (2014).
Continuous Non-malleable Codes. In Y. Lindell (Ed.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings (pp. 465-488). Springer.
https://doi.org/10.1007/978-3-642-54242-8_20
Verdezoto, N., Nunes, F.
, Grönvall, E., Fitzpatrick, G., Storni, C.
& Kyng, M. (2014).
Designing self-care for everyday life. In V. Roto & J. Häkkilä (Eds.),
NordiCHI '14, Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational (pp. 821-824 ). Association for Computing Machinery.
https://doi.org/10.1145/2639189.2654837
Dalsgaard, B., Carstensen, D. W., Fjeldså, J., Maruyama, P., Rahbek, C.
, Sandel, B. S., Sonne, J.
, Svenning, J.-C., Wang, Z. & Sutherland, W. (2014).
Determinants of bird species richness, endemism, and island network roles in Wallacea and the West Indies: is geography sufficient or does current and historical climate matter? Ecology and Evolution,
4(20), 4019-4031.
https://doi.org/10.1002/ece3.1276
Afshani, P., Chan, T. M. & Tsakalidis, K. (2014).
Deterministic Rectangle Enclosure and Offline Dominance Reporting on the RAM. In J. Esparza , P. Fraigniaud, T. Husfeldt & E. Koutsoupias (Eds.),
Automata, Languages, and Programming: 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part I (pp. 77-88 ). Springer VS.
https://doi.org/10.1007/978-3-662-43948-7_7
Xue, H., Kelmann, P., Inati, S.
, Sørensen, T. S. & Hansen, M. (2014).
Distributed Computing on Gadgetron: A new paradigm for MRI reconstruction: no. 1579. Poster session presented at Joint Annual Meeting ISMRM-ESMRMB, Milan, Italy.
http://www.ismrm.org/14/program_files/TP05.htm