Hansen, T. D., Kaplan, H., Tarjan, R. E. & Zwick, U. (2015).
Hollow Heaps. In M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (Eds.),
Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Vol. Part 1, pp. 689-700). Springer VS.
https://doi.org/10.1007/978-3-662-47672-7_56
Livshits, B., Sridharan, M., Smaragdakis, Y., Lhoták, O., Amaral, J. N., Chang, B.-Y. E., Guyer, S. Z., Khedker, U. P.
, Møller, A. & Vardoulakis, D. (2015).
In Defense of Soundiness: A Manifesto.
Communications of the A C M,
58(2).
https://doi.org/10.1145/2644805
Bataillon, T., Duan, J., Hvilsom, C., Jin, X., Li, Y.
, Skov, L., Glemin, S.
, Munch, K., Jiang, T.
, Qian, Y., Hobolth, A., Wang, J.
, Mailund, T., Siegismund, H. R.
& Schierup, M. H. (2015).
Inference of purifying and positive selection in three subspecies of chimpanzees (Pan troglodytes) from exome sequencing.
Genome Biology and Evolution,
7(4), 1122-32.
https://doi.org/10.1093/gbe/evv058
Jung, R., Swasey, D.
, Sieczkowski, F., Svendsen, K., Turon, A.
, Birkedal, L. & Dreyer, D. (2015).
Iris: Monoids and invariants as an orthogonal basis for concurrent reasoning. In S. Rajamani (Ed.),
Conference Record of the Annual ACM Symposium on Principles of Programming Languages (pp. 637-650). Association for Computing Machinery.
https://doi.org/10.1145/2676726.2676980
Engemann, K., Enquist, B. J.
, Sandel, B. S., Boyle, B., Jørgensen, P. M., Morueta-Holme, N., Peet, R. K., Violle, C.
& Svenning, J.-C. (2015).
Limited sampling hampers “big data” estimation of species richness in a tropical biodiversity hotspot: Sampling Hampers Species Richness Estimation.
Ecology and Evolution,
5(3), 807-820.
https://doi.org/10.1002/ece3.1405
Cramer, R.
, Damgård, I. B., Döttling, N. M., Fehr, S. & Spini, G. (2015).
Linear secret sharing schemes from error correcting codes and universal hash functions. In E. Oswald & M. F. Fischlin (Eds.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (pp. 313-336). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_11
Blonder, B., Nogués-Bravo, D., Borregaard, M. K., Donoghue II, J. C., Jørgensen, P. M., Kraft, N. J. B., Lessard, J.-P.
, Morueta-Holme, N., Sandel, B. S., Svenning, J.-C., Violle, C., Rahbek, C. & Enquist, B. J. (2015).
Linking environmental filtering and disequilibrium to biogeography with a community climate framework.
Ecology,
96(4), 972-985.
https://doi.org/10.1890/14-0589.1
Agarwal, P. K., Mølhave, T.
, Revsbæk, M., Safa, I., Wang, Y.
& Yang, J. (2015).
Maintaining Contour Trees of Dynamic Terrains. In L. Arge & J. Pach (Eds.),
31st International Symposium on Computational Geometry (SoCG 2015) (pp. 796-811)
https://doi.org/10.4230/LIPIcs.SOCG.2015.796
Light, A.
, Bardzell, J., Bardzell, S., Cox, G., Fritsch, J.
& Koefoed Hansen, L. (2015).
Making “World Machines”: Discourse, Design and Global Technologies for Greater-than-self Issues.
Aarhus Series on Human Centered Computing,
1(1).
http://ojs.statsbiblioteket.dk/index.php/ashcc/article/view/21326/18796
Bødker, S., Bertelsen, O. W., Bannon, L. J., De Souza, C., Barbosa, S. & Prates, R. (2015).
Mediation and Meaning in HCI. In
Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part IV (pp. 667-668). Springer.
https://doi.org/10.1007/978-3-319-22723-8_93
Petersen, O. B., Rasch, S. M., Bach, K., Holst, L.
& Kyng, M. (2015).
Meningsfuld telemedicinsk hjemmemonitorering for både klinikere og patienter skabes gennem forhandling og involvering. Abstract from E-Sundhedsobservatoriets årskonference 2015, Nyborg, Denmark.
http://2015.e-sundhedsobservatoriet.dk/forslag/evaluering-af-e-sundhedsprojekter/meningsfuld-telemedicinsk-hjemmemonitorering-b-de
Koester, T., Jakobsen, J., Brøsted, J. E., Bach, K.
, Petersen, O. B., Kyng, M. & Rasch, S. M. (2015).
Mental Models and Deliberate Manipulation of Data. In
Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 2015 (1 ed., Vol. 4, pp. 62-69)
https://doi.org/10.1177/2327857915041021
Faonio, A., Nielsen, J. B. & Venturi, D. (2015).
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. In M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (Eds.),
Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Vol. Part 1, pp. 456-468). Springer VS.
https://doi.org/10.1007/978-3-662-47672-7_37
Sieczkowski, F., Bizjak, A. & Birkedal, L. (2015).
ModuRes: A Coq Library for Modular Reasoning About Concurrent Higher-Order Imperative Programming Languages. In C. Urban & X. Zhang (Eds.),
Interactive Theorem Proving: 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings (pp. 375-390). Springer.
https://doi.org/10.1007/978-3-319-22102-1_25
Müller, E.
, Assent, I., Günnemann, S., Seidl, T. & Dy, J. (2015).
MultiClust special issue on discovering, summarizing and using multiple clusterings.
Machine Learning,
98(1-2), 1-5.
https://doi.org/10.1007/s10994-014-5445-0
Cascudo Pueyo, I., Cramer, R., Mirandola, D., Padró, C. & Xing, C. (2015).
On Secret Sharing with Nonlinear Product Reconstruction.
S I A M Journal on Discrete Mathematics,
29(2), 1114-1131.
https://doi.org/10.1137/130931886
Durkota, K., Lisý, W., Kiekintveld, C.
& Bosansky, B. (2015).
Optimal Network Security Hardening Using Attack Graph Games. In N. Criado, M. Rehak, J. M. Such & L. Vercouter (Eds.),
2nd International Workshop on Agents and Cybersecurity, ACySE 2015: Workshop Notes at AAMAS 2015 (pp. 7-14). Lancaster University.
http://www.lancaster.ac.uk/staff/suchj/acyse2015-proceedings/ACySE2015_proceedings.pdf#page=14