Andersen, M. S. & Kjærgaard, M. B. (2012).
Towards a New Classification of Location Privacy Methods in Pervasive Computing. In A. Puiatti & T. Gu (Eds.),
Mobile and Ubiquitous Systems: Computing, Networking, and Services : 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers (Vol. 104, pp. 150-161). Springer.
https://doi.org/10.1007/978-3-642-30973-1_13
Kaspersen, M. H., Graungaard, D., Bouvin, N. O., Petersen, M. G. & Eriksson, E. (2021).
Towards a model of progression in computational empowerment in education.
International Journal of Child - Computer Interaction,
29, Article 100302.
https://doi.org/10.1016/j.ijcci.2021.100302
Nielsen, M., Krukow, K. K. & Sassone, V. (2007).
Towards a Formal Framework for Computational Trust. In F. S. de Boer, M. M. Bonsangue, S. Graf & W.-P. de Roever (Eds.),
Formal Methods for Components and Objects: 5th International Symposium, FMCO 2006, Amsterdam, The Netherlands, November 7-10, 2006, Revised Lectures (pp. 175-184). Springer.
https://doi.org/10.1007/978-3-540-74792-5_8
Aehnelt, M.
, Schulz, H.-J. & Urban, B. (2013).
Towards a Contextualized Visual Analysis of Heterogeneous Manufacturing Data. In
Advances in Visual Computing : 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part II (pp. 76-85). Springer.
https://doi.org/10.1007/978-3-642-41939-3_8
Schäfer, Z., Mathisen, A., Svendsen, K., Engberg, S., Rolighed Thomsen, T. & Kirketerp-Møller, K. (2021).
Toward Machine-Learning-Based Decision Support in Diabetes Care: A Risk Stratification Study on Diabetic Foot Ulcer and Amputation.
Frontiers in medicine,
7, Article 601602.
https://doi.org/10.3389/fmed.2020.601602
Pagnin, E., Gunnarsson, G., Talebi, P.
, Orlandi, C. & Sabelfeld, A. (2019).
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.
Proceedings on Privacy Enhancing Technologies,
2019(4), 93-111.
https://doi.org/10.2478/popets-2019-0060
LaVigne, R., Liu-Zhang, C.-D., Maurer, U. M., Moran, T., Mularczyk, M.
& Tschudi, D. (2018).
Topology-Hiding Computation Beyond Semi-Honest Adversaries. In A. Beimel & S. Dziembowski (Eds.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings: Theory of Cryptography (Vol. 11240, pp. 3-35). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_1
Moeslund, J. E., Arge, L., Bøcher, P. K., Dalgaard, T. & Svenning, J.-C. (2013).
Topography as a driver of local terrestrial vascular plant diversity patterns.
Nordic Journal of Botany,
31(2), 129-144.
https://doi.org/10.1111/j.1756-1051.2013.00082.x
Moeslund, J. E., Arge, L., Bøcher, P. K., Dalgaard, T., Odgaard, M. V., Nygaard, B. & Svenning, J.-C. (2013).
Topographically controlled soil moisture is the primary driver of local vegetation patterns across a lowland region.
Ecosphere (Washington, D.C.),
4(7), Article 91.
https://doi.org/10.1890/ES13-00134.1
Moeslund, J. E., Arge, L., Bøcher, P. K., Dalgaard, T., Ejrnæs, R., Odgaard, M. V. & Svenning, J.-C. (2013).
Topographically controlled soil moisture drives plant diversity patterns within grasslands.
Biodiversity and Conservation,
22(10), 2151-2166.
https://doi.org/10.1007/s10531-013-0442-3
Munro, J. I., Navarro, G.
, Nielsen, J. S., Shah, R. & Thankachan, S. V. (2017).
Top-k Term-Proximity in Succinct Space.
Algorithmica,
78(2), 379-393.
https://doi.org/10.1007/s00453-016-0167-2
Andersen, C. J.
, Hansen, K. M., Sandvad, E. S., Thomsen, M. & Tyrsted, M. (2000).
Tool Support for Iterative System Development Activities: Issues and Experiences. In K. A. Mughal, A. L. Opdahl & D. I. K. Sjøberg (Eds.),
Proceedings of NWPER'2000: Nordic Workshop on Programming Environment Research http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.38.4642