Prentow, T. S., Blunck, H., Kjærgaard, M. B. & Stisen, A. (2015).
Towards Indoor Transportation Mode Detection using Mobile Sensing. In S. Sigg , P. Nurmi & F. Salim (Eds.),
Mobile Computing, Applications, and Services : 7th International Conference, MobiCASE 2015, Berlin, Germany, November 12-13, 2015, Revised Selected Papers (Vol. 162). Springer.
https://doi.org/10.1007/978-3-319-29003-4
Blevis, E., Koskinen, I. K., Lee, K.-P.
, Bødker, S., Chen, L.-L., Lim, Y., Wei, H. & Wakkary, R. (2015).
Transdisciplinary Interaction Design in Design Education. In B. Begole & J. Kim (Eds.),
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (pp. 833-838). Association for Computing Machinery.
https://doi.org/10.1145/2702613.2724726
Garg, S.
& Polychroniadou, A. (2015).
Two-round adaptively secure MPC from indistinguishability obfuscation. In Y. Dodis & J. Buus Nielsen (Eds.),
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (pp. 614-637). Springer VS.
https://doi.org/10.1007/978-3-662-46497-7_24
David, B. M., Dowsley, R., van der Graaf, J., Marques, D., Nascimento, A. C. A. & Pinto, A. (2015).
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra.
I E E E Transactions on Information Forensics and Security,
11(1), 59 - 73 .
https://doi.org/10.1109/TIFS.2015.2476783
Saad-Sulonen, J., Halskov, K., Eriksson, E., Vines, J., Huybrechts, L. & Karasti, T. H. (2015).
Unfolding Participation: What do we mean by participation – conceptually and in practice.
Aarhus Series on Human Centered Computing ,
1(1).
https://doi.org/10.7146/aahcc.v1i1.21324
Xue, H., Kelmann, P., Inati, S.
, Sørensen, T. S. & Hansen, M. (2014).
3D High Resolution l1-SPIRiT Reconstruction on Gadgetron based Cloud: no. 1882. Abstract from Joint Annual Meeting ISMRM-ESMRMB, Milan, Italy.
http://www.ismrm.org/14/
Prentow, T. S., Blunck, H., Stisen, A., Kjærgaard, M. B. & Grønbæk, K. (2014).
Accurate estimation of indoor travel times: learned unsupervised from position traces. In M. Youssef , C. Mascolo & F. Kawsar (Eds.),
MOBIQUITOUS '14. Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 90-99). Association for Computing Machinery.
https://doi.org/10.4108/icst.mobiquitous.2014.258020
Damgård, I. B. & Nielsen, J. B. (2014).
Adaptive versus static security in the UC Model. In S. S. M. Chow , J. K. Liu, L. C. K. Hui & S. M. Yiu (Eds.),
Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (pp. 10-28). Springer VS.
https://doi.org/10.1007/978-3-319-12475-9_2
Bizjak, A., Birkedal, L. & Miculan, M. (2014).
A model of countable nondeterminism in guarded type theory. In G. Dowek (Ed.),
Rewriting and Typed Lambda Calculi: Joint International Conference, RTA-TLCA 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014. Proceedings (pp. 108-123). Springer VS.
https://doi.org/10.1007/978-3-319-08918-8_8
Damgård, I. B., Lauritsen, R. & Toft, T. (2014).
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation. In M. Abdalla & R. D. Prisco (Eds.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (pp. 398-415 ). Springer.
https://doi.org/10.1007/978-3-319-10879-7_23
Klokmose, C. N., Kristensen, J. B., Bagge, R. & Halskov, K. (2014).
BullsEye: High-Precision Fiducial Tracking for Table-based Tangible Interaction. In R. Dachselt, N. Graham, K. Hornbæk & M. Nacenta (Eds.),
Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces, ITS '14 (pp. 269-278 ). Association for Computing Machinery.
https://doi.org/10.1145/2669485.2669503
Grönvall, E.
, Kinch, S., Petersen, M. G. & Rasmussen, M. K. (2014).
Causing Commotion with a Shape-changing Bench: Experiencing Shape-Changing Interfaces in Use. In M. Jones, P. Palanque, A. Schmidt & T. Grossman (Eds.),
CHI'14, SIGCHIConference on Human Factors in Computing Systems : Proceedings (pp. 2559-2568). Association for Computing Machinery.
https://doi.org/10.1145/2556288.2557360
Hansen, K. A., Komarath, B., Sarma M. N., J.
, Talebanfard, N. & Skyum, S. (2014).
Circuit Complexity of Properties of Graphs with Constant Planar Cutwidth. In E. Csuhaj-Varjú, M. Dietzfelbinger & Z. Ésik (Eds.),
Mathematical Foundations of Computer Science 2014: 39th International Symposium, MFCS 2014, Budapest, Hungary, August 25-29, 2014. Proceedings, Part II (pp. 336-347 ). Springer VS.
https://doi.org/10.1007/978-3-662-44465-8_29
Damgård, I. B., David, B. M., Giacomelli, I. & Nielsen, J. B. (2014).
Compact VSS and Efficient Homomorphic UC Commitments. In P. Sarkar & T. Iwata (Eds.),
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II (pp. 213-232 ). Springer VS.
https://doi.org/10.1007/978-3-662-45608-8_12
Abam, M. A., Daneshpajouh, S.
, Deleuran, L., Ehsani, S. & Ghodsi, M. (2014).
Computing homotopic line simplification.
Computational Geometry,
47(7), 728-739.
https://doi.org/10.1016/j.comgeo.2014.02.002
Faust, S., Mukherjee, P., Nielsen, J. B. & Venturi, D. (2014).
Continuous Non-malleable Codes. In Y. Lindell (Ed.),
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings (pp. 465-488). Springer.
https://doi.org/10.1007/978-3-642-54242-8_20