Korsgaard, H., Lewkowicz, M., Boden, A.
, Bødker, S. & Avram, G. (2020).
ECSCW Workshop: Studying Technical Mechanisms for Supporting Sharing Communities. Abstract from The 18th European Virtual Conference on
Computer-Supported Cooperative Work, Siegen, Germany.
https://cio.cs.au.dk/ecscw-workshop/pdfs/eCSCW_workshop__Technical_Mechanisms_for_supporting_sharing_communities.pdf
Korsgaard, H., Lyle, P. J., Saad-Sulonen, J.
, Klokmose, C. N., Nouwens, M. & Bødker, S. (2022).
Collectives and Their Artifact Ecologies.
Proceedings of the ACM on Human-Computer Interaction,
6(CSCW2), Article 432.
https://doi.org/10.1145/3555533
Kopple, J. D., Cheung, A. K.
, Christiansen, J. S., Djurhuus, C. B., El Nahas, M., Feldt-Rasmussen, B.
, Lange, M., Mitch, W. E., Wanner, C., Wiedemann, J. & Ikizler, T. A. (2008).
OPPORTUNITY: a randomized clinical trial of growth hormone on outcome in hemodialysis patients.
Clinical Journal of American Society of Nephrology. ,
3(6), 1741-51.
https://doi.org/10.2215/CJN.02760608
Kondi, Y., Orlandi, C. & Roy, L. (2023).
Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions. In H. Handschuh & A. Lysyanskaya (Eds.),
Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part I (pp. 646-677). Springer.
https://doi.org/10.1007/978-3-031-38557-5_21
Kolyaie, S., Treier, U., Bøcher, P. K., Tsirogiannis, C., Kania, A.
, Nabe-Nielsen, J. & Normand, S. (2020).
Arctic vegetation mapping using ultra-high resolution images. Poster session presented at Nordic Oikos conference 2020
, Reykjavík, Iceland.
Kolstad, H. A., Stokholm, Z. A., Jensen, C. S., Frederiksen, T. W. & Bonde, J. P. (2011).
Are occupational noise-exposure levels declining? In
10th International Congress on Noise as a Public Health Problem 2011, ICBEN 2011 - Proceedings of the Institute of Acoustics (PART 3 ed., Vol. 33 1, pp. 148-151)
Kohlweiss , M., Maurer , U., Onete , C., Tackmann , B.
& Venturi, D. (2013).
Anonymity-Preserving Public-Key Encryption: A Constructive Approach. In E. De Cristofaro & M. Wright (Eds.),
Privacy Enhancing Technologies: 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings (pp. 19-39). Springer VS.
https://doi.org/10.1007/978-3-642-39077-7_2
Kohlweiss, M.
, Pancholi, M. R. & Takahashi, A. (2023).
How to Compile Polynomial IOP into Simulation-Extractable SNARKs: A Modular Approach. In G. Rothblum & H. Wee (Eds.),
Theory of Cryptography: Book Subtitle 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part III (pp. 486–512). Springer.
https://doi.org/10.1007/978-3-031-48621-0_17
Koester, T., Jakobsen, J., Brøsted, J. E., Bach, K.
, Petersen, O. B., Kyng, M. & Rasch, S. M. (2015).
Mental Models and Deliberate Manipulation of Data. In
Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 2015 (1 ed., Vol. 4, pp. 62-69)
https://doi.org/10.1177/2327857915041021
Knudsen, M., Søndergaard, D. A., Tofting-Olesen, C., Hansen, F. T., Brodersen, D. E. & Pedersen, C. S. (2016).
Computational discovery of specificity-conferring sites in non-ribosomal peptide synthetases.
Bioinformatics,
32(3), 325-329.
https://doi.org/10.1093/bioinformatics/btv600
Knudsen, S.
, Vermeulen, J., Kosminsky, D., Walny, J., West, M., Frisson, C., Adriel Aseniero, B.
, MacDonald Vermeulen, L., Perin, C., Quach, L., Buk, P., Tabuli, K., Chopra, S., Willett, W. & Carpendale, S. (2018).
Democratizing Open Energy Data for Public Discourse Using Visualization. In R. Mandryk & M. Hancock (Eds.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (pp. D406:1-D406:4). Association for Computing Machinery.
https://doi.org/10.1145/3170427.3186539