Burkhardt, J., Caragiannis, I., Fehrs, K., Russo, M.
, Schwiegelshohn, C. & Shyam, S. (2024).
Low-Distortion Clustering with Ordinal and Limited Cardinal Information. I M. Wooldridge, J. Dy & S. Natarajan (red.),
Technical Tracks 14 (9 udg., s. 9555-9563). Association for the Advancement of Artificial Intelligence.
https://doi.org/10.1609/aaai.v38i9.28811
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L.
& Scholl, P. (2021).
Low-Complexity Weak Pseudorandom Functions in textdollartextbackslashmathtt AC0[textbackslashmathtt MOD2]textdollar. I T. Malkin & C. Peikert (red.),
Advances in Cryptology – CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part IV (s. 487-516). Springer.
https://doi.org/10.1007/978-3-030-84259-8_17
Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013).
Local Outlier Detection with Interpretation. I H. Blockeel, K. Kersting , S. Nijssen & F. Železný (red.),
Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2013, Prague, Czech Republic, September 23-27, 2013, Proceedings, Part III (s. 304-320 ). Springer VS.
https://doi.org/10.1007/978-3-642-40994-3_20
Moad, S.
, Hansen, M. T., Jurdak, R., Kusy, B. & Bouabdallah, N. (2011).
Load Balancing Metric with Diversity for Energy Efficient Routing in Wireless Sensor Networks.
Procedia Computer Science,
5, 804-811.
https://doi.org/10.1016/j.procs.2011.07.110
Cramer, R.
, Damgård, I., Döttling, N., Giacomelli, I. & Xing, C. (2017).
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. I J. Shikata (red.),
Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings (Bind 10681, s. 1-25). Springer VS.
https://doi.org/10.1007/978-3-319-72089-0_1
Chan, T. M., Durocher, S.
, Larsen, K. G., Morrison, J.
& Wilkinson, B. T. (2012).
Linear-Space Data Structures for Range Mode Query in Arrays.
Leibniz International Proceedings in Informatics,
14, 290-301.
https://doi.org/10.4230/LIPIcs.STACS.2012.290
Chan, T. M., Durocher, S.
, Larsen, K. G., Morrison, J. & Wilkinson, B. T. (2014).
Linear-Space Data Structures for Range Mode Query in Arrays.
Theory of Computing Systems,
55(4), 719-741.
https://doi.org/10.1007/s00224-013-9455-2
Cramer, R.
, Damgård, I. B., Döttling, N. M., Fehr, S. & Spini, G. (2015).
Linear secret sharing schemes from error correcting codes and universal hash functions. I E. Oswald & M. F. Fischlin (red.),
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (s. 313-336). Springer VS.
https://doi.org/10.1007/978-3-662-46803-6_11
Hubacek, P., Nielsen, J. B. & Rosen, A. (2013).
Limits on the Power of Cryptographic Cheap Talk. I R. Canetti & J. A. Garay (red.),
Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I (s. 277-297 ). Springer VS.
https://doi.org/10.1007/978-3-642-40041-4_16
Schulz, H.-J., Röhlig, M., Nonnemann, L., Aehnelt, M., Diener, H., Urban, B. & Schumann, H. (2019).
Lightweight Coordination of Multiple Independent Visual Analytics Tools. I A. Kerren, C. Hurter & J. Braz (red.),
VISIGRAPP 2019 - Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (Bind 2, s. 106-117). SCITEPRESS Digital Library.
https://doi.org/10.5220/0007571101060117