Andreasen, E. S., Gordon, C. S., Chandra, S., Sridharan, M., Tip, F. & Sen, K. (2016).
Trace Typing: An Approach for Evaluating Retrofitted Type Systems. In S. Krishnamurthi & B. S. Lerner (Eds.),
30th European Conference on Object-Oriented Programming (ECOOP 2016) (pp. 231-239, 2310-2328). Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.ECOOP.2016.1
Caragiannis, I., Filos-Ratsikas, A.
, Frederiksen, S. K. S., Hansen, K. A. & Tan, Z. (2016).
Truthful facility assignment with resource augmentation: An exact analysis of serial dictatorship. In
Web and Internet Economics - 12th International Conference, WINE 2016, Proceedings (Vol. 10123, pp. 236-250). Springer VS.
https://doi.org/10.1007/978-3-662-54110-4_17
Stølting Brodal, G., Davoodi, P., Lewenstein, M., Raman, R.
& Satti, S. R. (2016).
Two dimensional range minimum queries and Fibonacci lattices.
Theoretical Computer Science,
638, 33-43.
https://doi.org/10.1016/j.tcs.2016.02.016
Dodds, M., Jagannathan, S., Parkinson, M. J.
, Svendsen, K. & Birkedal, L. (2016).
Verifying custom synchronisation constructs using higher-order separation logic.
ACM Transactions on Programming Languages and Systems,
38/2(2), 4:1 - 4:72. Article 4.
https://doi.org/10.1145/2818638
Zagermann, J., Pfeil, U., Rädle, R., Jetter, H.-C.
, Klokmose, C. N. & Reiterer, H. (2016).
When Tablets meet Tabletops: The Effect of Tabletop Size on Around-the-Table Collaboration with Personal Tablets. In
CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (pp. 5470-5481). Association for Computing Machinery.
https://doi.org/10.1145/2858036.2858224
Cascudo Pueyo, I., Damgård, I. B., David, B. M., Giacomelli, I., Nielsen, J. B. & Trifiletti, R. (2015).
Additively Homomorphic UC commitments with Optimal Amortized Overhead. In J. Katz (Ed.),
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30-April 1, 2015, Proceedings (pp. 495–515). Springer.
https://doi.org/10.1007/978-3-662-46447-2_22
Faust, S.
, Mukherjee, P., Nielsen, J. B. & Venturi, D. (2015).
A Tamper and Leakage Resilient von Neumann Architecture. In J. Katz (Ed.),
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (pp. 579-603). Springer VS.
https://doi.org/10.1007/978-3-662-46447-2_26
Entwistle, J. M., Rasmussen, M. K., Verdezoto, N., Brewer, R. S. & Andersen, M. S. (2015).
Beyond the Individual: The Contextual Wheel of Practice as a Research Framework for Sustainable HCI. In B. Begole & J. Kim (Eds.),
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15 (pp. 1125-1134 ). Association for Computing Machinery.
https://doi.org/10.1145/2702123.2702232
Brewer, R. S., Verdezoto, N., Rasmussen, M. K., Entwistle, J. M., Grønbæk, K., Blunck, H. & Holst, T. (2015).
Challenge: Getting Residential Users to Shift Their Electricity Usage Patterns. In S. Kalyanaraman, D. P. Seetharam & R. Shorey (Eds.),
The sixth ACM International Conference on Future Energy Systems (ACM e-Energy) (pp. 83-88). Association for Computing Machinery.
https://doi.org/10.1145/2768510.2770934
Branzei, S., Hosseini, H.
& Miltersen, P. B. (2015).
Characterization and Computation of Equilibria for Indivisible Goods. In
Algorithmic Game Theory: 8th International Symposium, SAGT 2015, Saarbrücken, Germany, September 28–30, 2015, Proceedings (pp. 244-255). Springer VS.
https://doi.org/10.1007/978-3-662-48433-3_19