Shao, J., Tan, Y., Gao, L., Yang, Q., Plant, C.
& Assent, I. (2019).
Synchronization-based clustering on evolving data stream.
Information Sciences,
501, 573-587.
https://doi.org/10.1016/j.ins.2018.09.035
Rasmussen, T. A. & Grønbæk, K. (2019).
Tailorable remote assistance with RemoteAssistKit: A study of and design response to remote assistance in the manufacturing industry. In H. Nakanishi, H. Egi, I.-A. Chounta, H. Takada, S. Ichimura & U. Hoppe (Eds.),
Collaboration Technologies and Social Computing - 25th International Conference, CRIWG+CollabTech 2019, Proceedings: 25th International Conference, CRIWG+CollabTech 2019 Kyoto, Japan, September 4–6, 2019 Proceedings (pp. 80-95). Springer.
https://doi.org/10.1007/978-3-030-28011-6_6
McFadden, I. R.
, Sandel, B., Tsirogiannis, C., Morueta-Holme, N.
, Svenning, J. C., Enquist, B. J. & Kraft, N. J. B. (2019).
Temperature shapes opposing latitudinal gradients of plant taxonomic and phylogenetic β diversity.
Ecology Letters,
22(7), 1126-1135.
https://doi.org/10.1111/ele.13269
Ghosh, S. & Simkin, M. (2019).
The Communication Complexity of Threshold Private Set Intersection. In A. Boldyreva & D. Micciancio (Eds.),
Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Vol. II, pp. 3-29). Springer.
https://doi.org/10.1007/978-3-030-26951-7_1
Vermeulen, J., Lim, B. Y.
, Avdic, M., Wang, D. & Abdul, A. (2019).
The Curious Case of Providing Intelligibility for Smart Speakers. Abstract from The 2019 ACM CHI Conference on Human Factors in Computing Systems (CHI'19), Glasgow, United Kingdom.
Micallef, L.
, Schulz, H.-J., Angelini, M., Aupetit, M., Chang, R., Kohlhammer, J., Perer, A. & Santucci, G. (2019).
The Human User in Progressive Visual Analytics. In
EuroVis 2019 - Short Papers (pp. 19-23). Eurographics Association.
https://doi.org/10.2312/evs.20191164
Afshani, P., Agrawal, M., Doerr, B., Doerr, C.
, Larsen, K. G. & Mehlhorn, K. (2019).
The query complexity of a permutation-based variant of Mastermind.
Discrete Applied Mathematics,
260, 28-50.
https://doi.org/10.1016/j.dam.2019.01.007
Pagnin, E., Gunnarsson, G., Talebi, P.
, Orlandi, C. & Sabelfeld, A. (2019).
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.
Proceedings on Privacy Enhancing Technologies,
2019(4), 93-111.
https://doi.org/10.2478/popets-2019-0060
Thiel, S.-K., Remy, C., Roque, L., Orji, R.
, Dalsgaard, P., Latulipe, C. & Sarcar, S. (2019).
Towards a Research Agenda for Gameful Creativity. In
DIS 2019 Companion - Companion Publication of the 2019 ACM Designing Interactive Systems Conference (pp. 393-396). Association for Computing Machinery.
https://doi.org/10.1145/3301019.3320003
Jordan, V. E., Walker, J. A., Beckstrom, T. O., Steely, C. J., McDaniel, C. L., St Romain, C. P., The Baboon Genome Analysis Consortium, Worley, K. C., Phillips-Conroy, J., Jolly, C. J., Rogers, J., Konkel, M. K. & Batzer, M. A. (2018).
A computational reconstruction of Papio phylogeny using Alu insertion polymorphisms.
Mobile DNA,
9(1), Article 13.
https://doi.org/10.1186/s13100-018-0118-3
Afshani, P., De Berg, M., Casanova, H., Karsin, B., Lambrechts, C.
, Sitchinava, N. & Tsirogiannis, C. (2018).
An efficient algorithm for the 1D total visibility-index problem and its parallelization.
ACM Journal of Experimental Algorithmics,
23, Article 2.3.
https://doi.org/10.1145/3209685
Bertelsen, O. W., Bødker, S., Eriksson, E., Hoggan, E. & Vermeulen, J. (2018).
Beyond Generalization: Research for the Very Particular.
interactions,
26(1), 34-38.
https://doi.org/10.1145/3289425
Badertscher, C., Garay, J., Maurer, U.
, Tschudi, D. & Zikas, V. (2018).
But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin. In J. Buus Nielsen (Ed.),
Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings (Vol. 10821, pp. 34-65). Springer VS.
https://doi.org/10.1007/978-3-319-78375-8_2
Engemann, K., Pedersen, C. B., Arge, L., Tsirogiannis, C., Mortensen, P. B. & Svenning, J.-C. (2018).
Childhood exposure to green space - A novel risk-decreasing mechanism for schizophrenia? Schizophrenia Research,
199, 142-148.
https://doi.org/10.1016/j.schres.2018.03.026
Damgård, I., Luo, J.
, Oechsner, S., Scholl, P. & Simkin, M. (2018).
Compact Zero-Knowledge Proofs of Small Hamming Weight. In M. Abdalla & R. Dahab (Eds.),
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (Vol. 10770, pp. 530-560). Springer VS.
https://doi.org/10.1007/978-3-319-76581-5_18
Karbyshev, A., Svendsen, K., Askarov, A. & Birkedal, L. (2018).
Compositional Non-interference for Concurrent Programs via Separation and Framing. In L. Bauer & R. Küsters (Eds.),
Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Vol. 10804, pp. 53-78). Springer VS.
https://doi.org/10.1007/978-3-319-89722-6_3
Haagh, H., Karbyshev, A., Oechsner, S., Spitters, B. & Strub, P. (2018).
Computer-Aided Proofs for Multiparty Computation with Active Security. In
Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018 (Vol. 2018, pp. 119-131). Article 8429300 IEEE.
https://doi.org/10.1109/CSF.2018.00016
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). In T. Peyrin & S. Galbraith (Eds.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. 11274, pp. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4