Brueggemann, M. J., Strohmayer, A., Marshall, M., Birbeck, N.
& Thomas, V. (2017).
Reflexive Practices for the Future of Design Education: An Exercise in Ethno-Empathy.
Information Design Journal,
20(sup1), S1260-S1269.
https://doi.org/10.1080/14606925.2017.1352655
Obremski, M. & Skorski, M. (2017).
Renyi Entropy Estimation Revisited. In J. D. P. Rolim, K. Jansen, D. P. Williamson & S. S. Vempala (Eds.),
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 20th International Workshop, APPROX 2017 and 21st International Workshop, RANDOM 2017 (Vol. 81, pp. 20:1-20:15). Article 20 Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.APPROX-RANDOM.2017.20
Adamsen, C. Q., Møller, A., Karim, R., Sridharan, M., Tip, F. & Sen, K. (2017).
Repairing Event Race Errors by Controlling Nondeterminism. In
Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017 (pp. 289-299). Article 7985670 IEEE Press.
https://doi.org/10.1109/ICSE.2017.34
Cascudo, I., Damgård, I., Farràs, O.
& Ranellucci, S. (2017).
Resource-Efficient OT Combiners with Active Security. In Y. Kalai & L. Reyzin (Eds.),
Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings (Vol. 10678, pp. 461-486). Springer VS.
https://doi.org/10.1007/978-3-319-70503-3_15
Haagh, H., Ji, Y., Li, C.
, Orlandi, C. & Song, Y. (2017).
Revealing Encryption for Partial Ordering. In M. O’Neill (Ed.),
Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings (pp. 3-22). Springer VS.
https://doi.org/10.1007/978-3-319-71045-7_1
Mai, S. T., Dieu, M. S.
, Assent, I., Jacobsen, J.
, Kristensen, J. & Birk, M. (2017).
Scalable and interactive graph clustering algorithm on multicore CPUs. In
2017 IEEE 33rd International Conference on Data Engineering (ICDE) (pp. 349-360). IEEE Computer Society Press.
https://doi.org/10.1109/ICDE.2017.94
Applebaum, B.
, Damgård, I., Ishai, Y.
, Nielsen, M. & Zichron, L. (2017).
Secure Arithmetic Computation with Constant Computational Overhead. In H. Shacham & J. Katz (Eds.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Vol. 10401, pp. 223-254). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_8
McMillan, D., Brown, B., Lampinen, A., McGregor, M.
, Hoggan, E. & Pizza, S. (2017).
Situating Wearables: Smartwatch Use in Context. In
CHI 2017 - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire (pp. 3582-3594). Association for Computing Machinery.
https://doi.org/10.1145/3025453.3025993
Höök, K., Hummels, C., Isbister, K., Marti, P., Márquez Segura, E., Jonsson, M., Mueller, F. F., Sanches, P. A. N., Schiphorst, T., Ståhl, A., Svanaes, D., Trotto, A.
, Petersen, M. G. & Lim, Y. (2017).
Soma-Based Design Theory. In
CHI 2017 Extended Abstracts - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire (pp. 550-557). Association for Computing Machinery.
https://doi.org/10.1145/3027063.3027082
Valsted, F. M., Nielsen, C. V. H., Jensen, J. Q., Sonne, T.
& Jensen, M. M. (2017).
Strive: Exploring Assistive Haptic Feedback on the Run. In M. Brereton, D. Vyas, A. Soro, B. Ploderer, J. Waycott & A. Morrison (Eds.),
Proceedings of the 29th Australian Computer-Human Interaction Conference: Human-Nature, OzCHI 2017 (pp. 275-284). Association for Computing Machinery.
https://doi.org/10.1145/3152771.3152801
Stisen, A., Blunck, H., Kjærgaard, M. B., Prentow, T. S., Mathisen, A., Krogh , S. & Grønbæk, K. (2017).
Task phase recognition and task progress estimation for highly mobile workers in large building complexes.
Pervasive and Mobile Computing,
38(2), 418-429.
https://doi.org/10.1016/j.pmcj.2016.08.016
Krebbers, R., Jung, R.
, Bizjak, A., Jourdan, J.-H., Dreyer, D.
& Birkedal, L. (2017).
The Essence of Higher-Order Concurrent Separation Logic. In H. Yang (Ed.),
Programming Languages and Systems - 26th European Symposium on Programming, ESOP 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings (pp. 696-723). Springer VS.
https://doi.org/10.1007/978-3-662-54434-1_26
Bauer, A., Gross, J., Lumsdaine, P. L., Shulman, M., Sozeau, M.
& Spitters, B. (2017).
The HoTT Library: A Formalization of Homotopy Type Theory in Coq. In Y. Bertot & V. Vafeiadis (Eds.),
CPP 2017 - Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs, co-located with POPL 2017: CPP 2017 (pp. 164-172). Association for Computing Machinery.
https://doi.org/10.1145/3018610.3018615
Damgård, I., Nielsen, J. B., Nielsen, M. & Ranellucci, S. (2017).
The tinytable protocol for 2-party secure computation, or: Gate-scrambling revisited. In J. Katz & H. Shacham (Eds.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Vol. 10401, pp. 167-187). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_6
Munro, J. I., Navarro, G.
, Nielsen, J. S., Shah, R. & Thankachan, S. V. (2017).
Top-k Term-Proximity in Succinct Space.
Algorithmica,
78(2), 379-393.
https://doi.org/10.1007/s00453-016-0167-2
Brânzei, S.
, Filos-Ratsikas, A., Miltersen, P. B. & Zeng, Y. (2017).
Walrasian pricing in multi-unit auctions. In K. G. Larsen, H. L. Bodlaender & J.-F. Raskin (Eds.),
42nd International Symposium on Mathematical Foundations of Computer Science, MFCS 2017 (Vol. 83, pp. 80:1-80:14). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.MFCS.2017.80
Mathisen, A., Krogh, S., Stisen, A., Blunck, H. & Grønbæk, K. (2016).
A comparative analysis of Indoor WiFi Positioning at a large building complex. In J. J. G. Domínguez, Á. H. Alonso & J. Ureña Ureña (Eds.),
2016 International Conference on Indoor Positioning and Indoor Navigation, IPIN 2016 Article 7743666 IEEE Press.
https://doi.org/10.1109/IPIN.2016.7743666
Blunck, H., Bhattacharya, S.
, Stisen, A., Prentow, T. S., Kjærgaard, M. B., Dey, A.
, Jensen, M. M. & Sonne, T. (2016).
Activity Recognition on Smart Devices: Dealing with diversity in the wild.
GetMobile: Mobile Computing and Communications,
20(1), 34-38.
https://doi.org/10.1145/2972413.2972425