Sand, A., Pedersen, C. N. S., Mailund, T., Brodal, G. S. & Fagerberg, R. (2013).
A practical O(n log2 n) time algorithm for computing the triplet distance on binary trees.
B M C Bioinformatics,
14(Suppl 2), S18.
https://doi.org/10.1186/1471-2105-14-S2-S18
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2013).
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier. In K. Sako & P. Sarkar (Eds.),
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II (pp. 140-160 ). Springer VS.
https://doi.org/10.1007/978-3-642-42045-0_8
Sükösd, Z., Knudsen, B., Anderson, J. WJ., Novák, A.
, Kjems, J. & Pedersen, C. N. S. (2013).
Characterising RNA secondary structure space using information entropy.
B M C Bioinformatics,
14 (Suppl 2), 1-9. Article S22.
https://doi.org/10.1186/1471-2105-14-S2-S22
Blunck, H., Bouvin, N. O., Entwistle, J. M., Grønbæk, K., Kjærgaard, M. B., Nielsen, M., Petersen, M. G., Rasmussen, M. & Wüstenberg, M. (2013).
Computational environmental ethnography: combining collective sensing and ethnographic inquiries to advance means for reducing environmental footprints. In D. Culler & C. Rosenberg (Eds.),
e-Energy 2013 - Proceedings of the 4th ACM International Conference on Future Energy Systems (pp. 87-98). Association for Computing Machinery.
https://doi.org/10.1145/2487166.2487176
Rasmusson, A., Sørensen, T. S. & Ziegler, G. (2013).
Connected Components Labeling on the GPU with Generalization to Voronoi Diagrams and Signed Distance Fields. In G. Bebis et al. (Ed.),
Advances in Visual Computing: 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part I (pp. 206-215). Springer VS.
https://doi.org/10.1007/978-3-642-41914-0_21
Sandager, P., Lindahl, C., Schlütter, J. M., Uldbjerg, N., Wagner, S. R., Toftegaard, T. S. & Bertelsen, O. W. (2013).
Context-aware patient guidance during blood pressure self-measurement. In
Proceedings of the IADIS International Conference e-Health 2013, EH 2013 (pp. 153-157). University of Twente.
http://www.scopus.com/record/display.url?view=basic&eid=2-s2.0-84886912072&origin=resultslist
Moreira, J. M. M.
, Jensen, C. S., Dias, P. & Mesquita, P. (2013).
Creating data representations for moving objects with extent from images. In
Presented at the COST MOVE Workshop at Moving Objects at Sea, Brest, France, June 28–29, 2013
Brodal, G. S., Fagerberg, R.
, Mailund, T., Pedersen, C. N. S. & Sand, A. (2013).
Efficient Algorithms for Computing the Triplet and Quartet Distance Between Trees of Arbitrary Degree.
The Annual A C M - S I A M Symposium on Discrete Algorithms. Proceedings,
24, 1814-1832.
http://knowledgecenter.siam.org/0236-000098/0236-000098/1
Feldthaus, A., Schäfer, M., Sridharan, M., Dolby, J. & Tip, F. (2013).
Efficient construction of approximate call graphs for JavaScript IDE services. In D. Notkin, B. H. C. Cheng & K. Pohl (Eds.),
Proceedings of the 2013 International Conference on Software Engineering, ICSE '13 (pp. 752-761 ). IEEE Communications Society.
http://dl.acm.org.ez.statsbiblioteket.dk:2048/citation.cfm?id=2486887&CFID=280253056&CFTOKEN=11487082
Agarwal, P. K.
, Yang, J., Arge, L., Govindarajan, S. & Yi, K. (2013).
Efficient external memory structures for range-aggregate queries.
Computational Geometry,
46(3), 358-370.
https://doi.org/10.1016/j.comgeo.2012.10.003
Cohen, G.
, Damgård, I. B., Ishai, Y.
, Kölker, J., Miltersen, P. B., Raz, R. & Rothblum, R. D. (2013).
Efficient multiparty protocols via log-depth threshold formulae. In R. Canetti & J. A. Garay (Eds.),
Advances in Cryptology – CRYPTO 2013: 33rd Annual Conference. Proceedings, Part II (pp. 185-202). Springer VS.
https://doi.org/10.1007/978-3-642-40084-1_11
Cohen, G.
, Damgård, I. B., Ishai, Y.
, Kölker, J., Miltersen, P. B., Raz, R. & Rothblum, R. (2013).
Efficient Multiparty Protocols via Log-Depth Threshold Formulae Contact Add Comment RSS-Feed.
Electronic Colloquium on Computational Complexity, (TR13-107).
http://eccc.hpi-web.de/report/2013/107/