Tsourakakis, C. E., Mitzenmacher, M.
, Larsen, K. G., Blasiok, J., Lawson, B., Nakkiran, P. & Nakos, V. (2018).
Predicting Positive and Negative Links with Noisy Queries: Theory Practice. arxiv.org.
http://arxiv.org/abs/1709.07308
Saleem, M. A., Soares da Costa, F., Dolog, P.
, Karras, P., Pedersen, T. B. & Calders, T. (2018).
Predicting Visitors Using Location-Based Social Networks. I
Proceedings - 2018 IEEE 19th International Conference on Mobile Data Management, MDM 2018 (s. 245-250). IEEE.
https://doi.org/10.1109/MDM.2018.00043
Baena, J., Cabarcas, D.
, Escudero, D. E., Khathuria, K. & Verbel, J. (2018).
Rank Analysis of Cubic Multivariate Cryptosystems. I T. Lange & R. Steinwandt (red.),
Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings (Bind 10786, s. 355-374). Springer VS.
https://doi.org/10.1007/978-3-319-79063-3_17
Skorstengaard, L., Devriese, D.
& Birkedal, L. (2018).
Reasoning About a Machine with Local Capabilities: Provably Safe Stack and Return Pointer Management. I A. Ahmed (red.),
Programming Languages and Systems - 27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (Bind 10801, s. 475-501). Springer VS.
https://doi.org/10.1007/978-3-319-89884-1_17
Aguirre, A., Barthe, G.
, Birkedal, L., Bizjak, A., Gaboardi, M. & Garg, D. (2018).
Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus. I A. Ahmed (red.),
Programming Languages and Systems - 27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings (s. 214-241). Springer VS.
https://doi.org/10.1007/978-3-319-89884-1_8
San-Segundo, R.
, Blunck, H., Moreno-Pimentel, J.
, Stisen, A. & Gil-Martín, M. (2018).
Robust Human Activity Recognition using smartwatches and smartphones.
Engineering Applications of Artificial Intelligence,
72(6), 190-202.
https://doi.org/10.1016/j.engappai.2018.04.002
Thomas, V., Brueggemann, M. J., Wang, D., Gaytán-Lugo, L. S. & Bidwell, N. J. (2018).
Silent SIG: Reflection in action at CHI. I R. Mandryk, M. Hancock, M. Perry & A. Cox (red.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Bind 2018-April, s. 1-4). Artikel SIG16 Association for Computing Machinery.
https://doi.org/10.1145/3170427.3185362
Cramer, R.
, Damgård, I., Escudero, D., Scholl, P. & Xing, C. (2018).
SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority. I H. Shacham & A. Boldyreva (red.),
Advances in Cryptology - CRYPTO 2018 (Bind 10992, s. 769-798). Springer VS.
https://doi.org/10.1007/978-3-319-96881-0_26
Remy, C., Bates, O.
, Thomas, V. J. & Broadbent, M. (2018).
"Sustainability... it's just not important": The Challenges of Academic Engagement with Diverse Stakeholders. I B. Penzenstadler, S. Easterbrook, C. Venters & S. I. Ahmed (red.),
ICT4S2018. 5th International Conference on Information and Communication Technology for Sustainability (Bind 52, s. 316-331). easychair.
https://doi.org/10.29007/kln5
Wang, X., Deng, K., Li, J., Yu, J. X.
, Jensen, C. S. & Yang, X. (2018).
Targeted influence minimization in social networks. I G. I. Webb, D. Phung, M. Ganji, L. Rashidi, V. S. Tseng & B. Ho (red.),
Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings (s. 689-700). Springer.
https://doi.org/10.1007/978-3-319-93040-4_54
Jensen, C. (red.), Lind Olsen, E. (red.)
, Mikkelsen, G. L., Syberg , L.
, Nielsen, L. L., Hansen, M. A. E., Hjortlund, M.
, Madsen, O. L., Høngaard Andersen, P. & Duvold, T. (2018).
The future market for cybersecurity in Denmark.
Bates, O.
, Thomas, V., Remy, C., Nathan, L. P., Mann, S. & Friday, A. (2018).
The future of HCI and sustainability: Championing environmental and social justice. I R. Mandryk & M. Hancock (red.),
CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Bind 2018-April). Artikel SIG01 Association for Computing Machinery.
https://doi.org/10.1145/3170427.3185365
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
TinyKeys: A New Approach to Efficient Multi-Party Computation. I H. Shacham & A. Boldyreva (red.),
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Bind 10993, s. 3-33). Springer VS.
https://doi.org/10.1007/978-3-319-96878-0_1
LaVigne, R., Liu-Zhang, C.-D., Maurer, U. M., Moran, T., Mularczyk, M.
& Tschudi, D. (2018).
Topology-Hiding Computation Beyond Semi-Honest Adversaries. I A. Beimel & S. Dziembowski (red.),
Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings: Theory of Cryptography (Bind 11240, s. 3-35). Springer VS.
https://doi.org/10.1007/978-3-030-03810-6_1
Baum, C., Lin, H.
& Oechsner, S. (2018).
Towards Practical Lattice-Based One-Time Linkable Ring Signatures. I D. Naccache, S. Xu, S. Qing, P. Samarati, G. Blanc, R. Lu, Z. Zhang & A. Meddahi (red.),
Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings: ICICS 2018 (Bind 11149, s. 303-322). Springer VS.
https://doi.org/10.1007/978-3-030-01950-1_18
Abdul, A.
, Vermeulen, J., Wang, D., Lim, B. Y. & Kankanhalli, M. (2018).
Trends and Trajectories for Explainable, Accountable and Intelligible Systems: An HCI Research Agenda. I R. Mandryk & M. Hancock (red.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. 582:1-582:18). Association for Computing Machinery.
https://doi.org/10.1145/3173574.3174156
Fuchsbauer, G., Gay, R., Kowalczyk, L.
& Orlandi, C. (2017).
Access Control Encryption for Equality, Comparison, and More. I S. Fehr (red.),
Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II (Bind 10175, s. 88-118). Springer VS.
https://doi.org/10.1007/978-3-662-54388-7_4