Tsourakakis, C. E., Mitzenmacher, M.
, Larsen, K. G., Blasiok, J., Lawson, B., Nakkiran, P. & Nakos, V. (2018).
Predicting Positive and Negative Links with Noisy Queries: Theory Practice. arxiv.org.
http://arxiv.org/abs/1709.07308
Saleem, M. A., Soares da Costa, F., Dolog, P.
, Karras, P., Pedersen, T. B. & Calders, T. (2018).
Predicting Visitors Using Location-Based Social Networks. In
Proceedings - 2018 IEEE 19th International Conference on Mobile Data Management, MDM 2018 (pp. 245-250). IEEE.
https://doi.org/10.1109/MDM.2018.00043
Xu, Z.
, Anderson, K., Lawson, R.
, Brooks, D. J. & Pavese, N. (2018).
Progression of sleep disorders spectrum in Parkinson's Disease: A 5 year clinical longitudinal study.
Movement Disorders,
33, S761-S762.
Baena, J., Cabarcas, D.
, Escudero, D. E., Khathuria, K. & Verbel, J. (2018).
Rank Analysis of Cubic Multivariate Cryptosystems. In T. Lange & R. Steinwandt (Eds.),
Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings (Vol. 10786, pp. 355-374). Springer VS.
https://doi.org/10.1007/978-3-319-79063-3_17
Skorstengaard, L., Devriese, D.
& Birkedal, L. (2018).
Reasoning About a Machine with Local Capabilities: Provably Safe Stack and Return Pointer Management. In A. Ahmed (Ed.),
Programming Languages and Systems - 27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Vol. 10801, pp. 475-501). Springer VS.
https://doi.org/10.1007/978-3-319-89884-1_17
Aguirre, A., Barthe, G.
, Birkedal, L., Bizjak, A., Gaboardi, M. & Garg, D. (2018).
Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus. In A. Ahmed (Ed.),
Programming Languages and Systems - 27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (pp. 214-241). Springer VS.
https://doi.org/10.1007/978-3-319-89884-1_8
San-Segundo, R.
, Blunck, H., Moreno-Pimentel, J.
, Stisen, A. & Gil-Martín, M. (2018).
Robust Human Activity Recognition using smartwatches and smartphones.
Engineering Applications of Artificial Intelligence,
72(6), 190-202.
https://doi.org/10.1016/j.engappai.2018.04.002
Thomas, V., Brueggemann, M. J., Wang, D., Gaytán-Lugo, L. S. & Bidwell, N. J. (2018).
Silent SIG: Reflection in action at CHI. In R. Mandryk, M. Hancock, M. Perry & A. Cox (Eds.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Vol. 2018-April, pp. 1-4). Article SIG16 Association for Computing Machinery.
https://doi.org/10.1145/3170427.3185362
Cramer, R.
, Damgård, I., Escudero, D., Scholl, P. & Xing, C. (2018).
SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority. In H. Shacham & A. Boldyreva (Eds.),
Advances in Cryptology - CRYPTO 2018 (Vol. 10992, pp. 769-798). Springer VS.
https://doi.org/10.1007/978-3-319-96881-0_26
Remy, C., Bates, O.
, Thomas, V. J. & Broadbent, M. (2018).
"Sustainability... it's just not important": The Challenges of Academic Engagement with Diverse Stakeholders. In B. Penzenstadler, S. Easterbrook, C. Venters & S. I. Ahmed (Eds.),
ICT4S2018. 5th International Conference on Information and Communication Technology for Sustainability (Vol. 52, pp. 316-331). easychair.
https://doi.org/10.29007/kln5
Wang, X., Deng, K., Li, J., Yu, J. X.
, Jensen, C. S. & Yang, X. (2018).
Targeted influence minimization in social networks. In G. I. Webb, D. Phung, M. Ganji, L. Rashidi, V. S. Tseng & B. Ho (Eds.),
Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings (pp. 689-700). Springer.
https://doi.org/10.1007/978-3-319-93040-4_54
Jensen, C. (Ed.), Lind Olsen, E. (Ed.)
, Mikkelsen, G. L., Syberg , L.
, Nielsen, L. L., Hansen, M. A. E., Hjortlund, M.
, Madsen, O. L., Høngaard Andersen, P. & Duvold, T. (2018).
The future market for cybersecurity in Denmark.
Bates, O.
, Thomas, V., Remy, C., Nathan, L. P., Mann, S. & Friday, A. (2018).
The future of HCI and sustainability: Championing environmental and social justice. In R. Mandryk & M. Hancock (Eds.),
CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Vol. 2018-April). Article SIG01 Association for Computing Machinery.
https://doi.org/10.1145/3170427.3185365
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
TinyKeys: A New Approach to Efficient Multi-Party Computation. In H. Shacham & A. Boldyreva (Eds.),
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Vol. 10993, pp. 3-33). Springer VS.
https://doi.org/10.1007/978-3-319-96878-0_1
LaVigne, R., Liu-Zhang, C.-D., Maurer, U. M., Moran, T., Mularczyk, M.
& Tschudi, D. (2018).
Topology-Hiding Computation Beyond Semi-Honest Adversaries. In A. Beimel & S. Dziembowski (Eds.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings: Theory of Cryptography (Vol. 11240, pp. 3-35). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_1
Baum, C., Lin, H.
& Oechsner, S. (2018).
Towards Practical Lattice-Based One-Time Linkable Ring Signatures. In D. Naccache, S. Xu, S. Qing, P. Samarati, G. Blanc, R. Lu, Z. Zhang & A. Meddahi (Eds.),
Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings: ICICS 2018 (Vol. 11149, pp. 303-322). Springer VS.
https://doi.org/10.1007/978-3-030-01950-1_18
Abdul, A.
, Vermeulen, J., Wang, D., Lim, B. Y. & Kankanhalli, M. (2018).
Trends and Trajectories for Explainable, Accountable and Intelligible Systems: An HCI Research Agenda. In R. Mandryk & M. Hancock (Eds.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (pp. 582:1-582:18). Association for Computing Machinery.
https://doi.org/10.1145/3173574.3174156
Fuchsbauer, G., Gay, R., Kowalczyk, L.
& Orlandi, C. (2017).
Access Control Encryption for Equality, Comparison, and More. In S. Fehr (Ed.),
Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II (Vol. 10175, pp. 88-118). Springer VS.
https://doi.org/10.1007/978-3-662-54388-7_4