Avdic, M. & Vermeulen, J. (2020).
Intelligibility Issues Faced by Smart Speaker Enthusiasts in Understanding What Their Devices Do and Why. In N. Ahmadpour, T. Leong, B. Ploderer, C. Parker, S. Webber, D. Munoz, L. Loke & M. Tomitsch (Eds.),
Proceedings of the 32nd Australian Computer-Human Interaction Conference, OzCHI 2020 (pp. 314-328). Association for Computing Machinery.
https://doi.org/10.1145/3441000.3441068
Jetter, H.-C.
, Rädle, R., Feuchtner, T., Anthes, C., Friedl, J.
& Klokmose, C. N. (2020).
“In VR, everything is possible!”: Sketching and Simulating Spatially-Aware Interactive Spaces in Virtual Reality. In
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Article 523 Association for Computing Machinery.
https://doi.org/10.1145/3313831.3376652
Abel, A., Cockx, J., Devriese, D.
, Timany, A. & Wadler, P. (2020).
Leibniz equality is isomorphic to Martin-Löf identity, parametrically.
Journal of Functional Programming,
30, Article e17.
https://doi.org/10.1017/S0956796820000155
Deuber, D., Döttling, N.
, Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020).
Minting Mechanism for Proof of Stake Blockchains. In M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (Eds.),
Applied Cryptography and Network Security (pp. 315-334). Springer.
https://doi.org/10.1007/978-3-030-57808-4_16
Birkedal, L., Clouston, R., Mannaa, B., Ejlers Møgelberg, R., Pitts, A. M.
& Spitters, B. (2020).
Modal dependent type theory and dependent right adjoints.
Mathematical Structures in Computer Science,
30(2), 118-138.
https://doi.org/10.1017/S0960129519000197
Engemann, K., Svenning, J.-C., Arge, L., Brandt, J., Geels, C., Mortensen, P. B., Plana-Ripoll, O., Tsirogiannis, C. & Pedersen, C. B. (2020).
Natural surroundings in childhood are associated with lower schizophrenia rates.
Schizophrenia Research,
216, 488-495.
https://doi.org/10.1016/j.schres.2019.10.012
Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R.
& Pavlogiannis, A. (2020).
Optimal and Perfectly Parallel Algorithms for On-demand Data-Flow Analysis. In P. Müller (Ed.),
Programming Languages and Systems- 29th European Symposium on Programming, ESOP 2020 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings (pp. 112-140). Springer.
https://doi.org/10.1007/978-3-030-44914-8_5
Brandt, M.
, Orlandi, C., Shrishak, K. & Shulman, H. (2020).
Optimal Transport Layer for Secure Computation. In P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (Eds.),
ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Vol. Volume 3: SECRYPT, pp. 130-141). SCITEPRESS Digital Library.
https://doi.org/10.5220/0009826801300141
Baum, C., Frederiksen, T. K., Hesse, J., Lehmann, A. & Yanai, A. (2020).
Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. In
Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 (pp. 587-606). Article 9230400 IEEE.
https://doi.org/10.1109/EuroSP48549.2020.00044
Grønbæk, J. E., Knudsen, M., O'Hara, K.
, Krogh, P. G., Vermeulen, J. & Petersen, M. G. (2020).
Proxemics Beyond Proximity: Designing for Flexible Social Interaction Through Cross-Device Interaction. In
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Article 3376379 Association for Computing Machinery.
https://doi.org/10.1145/3313831.3376379
Rossitto, C., Lampinen, A.
, Bødker, S., Light, A., Berns, K. & Hui, J. (2020).
Reconsidering scale and scaling in CSCW research. In
CSCW '20 : Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing (pp. 493-501). Association for Computing Machinery.
https://doi.org/10.1145/3406865.3419409