Rasmussen, M. K., Grönvall, E., Kinch, S. & Petersen, M. G. (2013).
It’s alive, it’s magic, it’s in love with you: Opportunities, Challenges and Open Questions for Actuated Interfaces. In H. Shen, R. Smith, J. Paay, P. Calder & T. Wyeld (Eds.),
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration. OzCHI '13 (pp. 63-72). Association for Computing Machinery.
https://doi.org/10.1145/2541016.2541033
Georgiev, I., Křivánek, J.
, Hachisuka, T., Nowrouzezahrai , D. & Jarosz, W. (2013).
Joint importance sampling of low-order volumetric scattering.
A C M Transactions on Graphics, (6), Article 164 .
https://doi.org/10.1145/2508363.2508411
Hazay, C., López-Alt, A., Wee, H.
& Wichs, D. (2013).
Leakage-resilient cryptography from minimal assumptions. In T. Johansson & P. Nguyen (Eds.),
Leakage-Resilient Cryptography from Minimal Assumptions: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (pp. 160-176). Springer VS.
https://doi.org/10.1007/978-3-642-38348-9_10
Hubacek, P., Nielsen, J. B. & Rosen, A. (2013).
Limits on the Power of Cryptographic Cheap Talk. In R. Canetti & J. A. Garay (Eds.),
Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I (pp. 277-297 ). Springer VS.
https://doi.org/10.1007/978-3-642-40041-4_16
Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013).
Local Outlier Detection with Interpretation. In H. Blockeel, K. Kersting , S. Nijssen & F. Železný (Eds.),
Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2013, Prague, Czech Republic, September 23-27, 2013, Proceedings, Part III (pp. 304-320 ). Springer VS.
https://doi.org/10.1007/978-3-642-40994-3_20
Johnson, P. M., Xu, Y.
, Brewer, R. S., Moore, C. A., Lee, G. E. & Connell, A. (2013).
Makahiki+WattDepot: An open source software stack for next generation energy research and education. In L. M. Hilty, B. Aebischer, G. Andersson & W. Lohmann (Eds.),
Proceedings of the First Interntional Conference on Information and Communication Technologies for Sustainability (ICT4S) Akademia.edu.
http://www.academia.edu/2911805/ICT4S_2013_Proceedings_of_the_First_International_Conference_on_Information_and_Communication_Technologies_for_Sustainability_ETH_Zurich_February_14-16_2013
Sandom, C. J., Dalby, L., Fløjgaard, C., Kissling, W. D., Lenoir, J., Sandel, B. S., Nielsen, K. T., Ejrnæs, R. & Svenning, J.-C. (2013).
Mammal predator and prey species richness are strongly linked at macroscales.
Ecology,
94(5), 1112-1122.
https://doi.org/10.1890/12-1342.1
Branzei, S., Michalak, T., Rahwan, T., Larson, K. & Jennings, N. (2013).
Matchings with Externalities and Attitudes. In M. Gina & O. Shehory (Eds.),
International Conference on Autonomous Agents and Multi-agent Systems, AAMAS '13 (pp. 295-302 ). Association for Computing Machinery.
http://dl.acm.org/citation.cfm?id=2484969&CFID=340403434&CFTOKEN=84711969
Wagner, S., Buus, N. H., Jespersen, B., Ahrendt, P., Bertelsen, O. W. & Toftegaard, T. S. (2013).
Measurement adherence in the blood pressure self-measurement room.
Telemedicine and e-Health,
19(11), 826-33.
https://doi.org/10.1089/tmj.2013.0032
Agarwal , P. K., Graham , G.
, Huang, Z., Phillips, J.
, Wei, Z. & Yi, K. (2013).
Mergeable summaries.
A C M Transactions on Database Systems,
38(4), Article 26 .
https://doi.org/10.1145/2500128
Jensen, C. S. (Ed.), Jermaine, C., Zhou, X. (Ed.), Kotagiri, R. (Ed.) & Ooi, B. C. (Ed.) (2013).
Message from the ICDE 2013 Program Committee and General. In
2013 IEEE 29th International Conference on Data Engineering (ICDE), : Australia, April 8–11, 2013 (pp. i-ii). IEEE Communications Society.
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6530811
Frederiksen, T. K., Jakobsen, T. P., Nielsen, J. B., Nordholt, P. S. & Orlandi, C. (2013).
MiniLEGO: Efficient secure two-party computation from general assumptions. In T. Johansson & P. Q. Nguyen (Eds.),
Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (pp. 537-556). Springer VS.
https://doi.org/10.1007/978-3-642-38348-9_32
Sergey, I., Devriese, D., Might, M.
, Midtgaard, J., Darais, D., Clarke, D. & Piessens, F. (2013).
Monadic abstract interpreters. In H.-J. Boehm (Ed.),
Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '13 (pp. 399-410). Association for Computing Machinery.
https://doi.org/10.1145/2491956.2491979
Alamdari, S., Angelini, P., Chan, T. M., Di Battista, G., Frati, F., Lubiw, A., Patrignani, M., Roselli, V., Singla, S.
& Wilkinson, B. T. (2013).
Morphing Planar Graph Drawings with a Polynomial Number of Steps.
The Annual A C M - S I A M Symposium on Discrete Algorithms. Proceedings,
24, 1656-1667.
http://knowledgecenter.siam.org/0236-000137/0236-000137/1
Arge, L., Fischer, J., Sanders, P. & Sitchinava, N. (2013).
On (dynamic) range minimum queries in external memory. In F. Dehne, R. Solis-Oba & J.-R. Sack (Eds.),
Algorithms and Data Structures: 13th International Symposium, WADS 2013, London, ON, Canada, August 12-14, 2013. Proceedings (pp. 37-48). Springer VS.
https://doi.org/10.1007/978-3-642-40104-6_4
Blunck, H., Bouvin, N. O., Franke, T.
, Grønbæk, K., Kjærgaard, M. B., Lukowicz, P.
& Wüstenberg, M. (2013).
On Heterogeneity in Mobile Sensing Applications Aiming at Representative Data Collection. In F. Mattern & S. Santini (Eds.),
Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication, UbiComp '13 Adjunct (pp. 1087-1098 ). Association for Computing Machinery.
https://doi.org/10.1145/2494091.2499576
Müller-Lennert, M.
, Dupont-Dupuis, F., Szehr, O., Fehr, S. & Tomamichel, M. (2013).
On quantum Rényi entropies: A new generalization and some properties.
Journal of Mathematical Physics,
54(12), Article 122203.
https://doi.org/10.1063/1.4838856
Scheder, D. & Tan, L. Y. (2013).
On the average sensitivity and density of k-CNF formulas. In P. Prasad , S. Raskhodnikova, K. Jansen & J. D. P. Rolim (Eds.),
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques: 16th International Workshop, APPROX 2013, and 17th International Workshop, RANDOM 2013, Berkeley, CA, USA, August 21-23, 2013. Proceedings (pp. 683-698). Springer VS.
https://doi.org/10.1007/978-3-642-40328-6_47
Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013).
Outlier Detection with Space Transformation and Spectral Analysis. In C. Kamath, J. Dy, Z. Obradovic, J. Ghosh, S. Parthasarathy & Z.-H. Zhou (Eds.),
Proceedings of the 2013 SIAM International Conference on Data Mining, SDM (pp. 225-233). Society for Industrial and Applied Mathematics.
https://doi.org/10.1137/1.9781611972832.25
Faust, S., Hazay, C.
& Venturi, D. (2013).
Outsourced pattern matching. In F. V. Fomin (Ed.),
Automata, Languages, and Programming: 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II (pp. 545-556). Springer VS.
https://doi.org/10.1007/978-3-642-39212-2_48
Anderson, J. W. J., Haas, P. A., Mathieson, L.-A., Volynkin, V., Lyngsø, R.
, Tataru, P. & Hein, J. (2013).
Oxfold: Kinetic Folding of RNA using Stochastic Context-Free Grammars and Evolutionary Information.
Bioinformatics,
29(6), 704-710.
https://doi.org/10.1093/bioinformatics/btt050
Magnani, M. & Rossi, L. (2013).
Pareto distance for multi-layer network analysis. In A. M. Greenberg, W. G. Kennedy & N. D. Bos (Eds.),
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013. Proceedings (pp. 249-256). Springer VS.
https://doi.org/10.1007/978-3-642-37210-0_27