Zhang, K., Zhou, J., Tao, D.
, Karras, P., Li, Q.
& Xiong, H. (2020).
Geodemographic Influence Maximization. I
KDD '20: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (s. 2764-2774). Association for Computing Machinery.
https://doi.org/10.1145/3394486.3403327
Campanelli, M., Fiore, D., Greco, N., Kolonelos, D. & Nizzardo, L. (2020).
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage. I S. Moriai & H. Wang (red.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (s. 3-35). Springer.
https://doi.org/10.1007/978-3-030-64834-3_1
Avdic, M. & Vermeulen, J. (2020).
Intelligibility Issues Faced by Smart Speaker Enthusiasts in Understanding What Their Devices Do and Why. I N. Ahmadpour, T. Leong, B. Ploderer, C. Parker, S. Webber, D. Munoz, L. Loke & M. Tomitsch (red.),
Proceedings of the 32nd Australian Computer-Human Interaction Conference, OzCHI 2020 (s. 314-328). Association for Computing Machinery.
https://doi.org/10.1145/3441000.3441068
Jetter, H.-C.
, Rädle, R., Feuchtner, T., Anthes, C., Friedl, J.
& Klokmose, C. N. (2020).
“In VR, everything is possible!”: Sketching and Simulating Spatially-Aware Interactive Spaces in Virtual Reality. I
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Artikel 523 Association for Computing Machinery.
https://doi.org/10.1145/3313831.3376652
Abel, A., Cockx, J., Devriese, D.
, Timany, A. & Wadler, P. (2020).
Leibniz equality is isomorphic to Martin-Löf identity, parametrically.
Journal of Functional Programming,
30, Artikel e17.
https://doi.org/10.1017/S0956796820000155
Deuber, D., Döttling, N.
, Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020).
Minting Mechanism for Proof of Stake Blockchains. I M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (red.),
Applied Cryptography and Network Security (s. 315-334). Springer.
https://doi.org/10.1007/978-3-030-57808-4_16
Birkedal, L., Clouston, R., Mannaa, B., Ejlers Møgelberg, R., Pitts, A. M.
& Spitters, B. (2020).
Modal dependent type theory and dependent right adjoints.
Mathematical Structures in Computer Science,
30(2), 118-138.
https://doi.org/10.1017/S0960129519000197
Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R.
& Pavlogiannis, A. (2020).
Optimal and Perfectly Parallel Algorithms for On-demand Data-Flow Analysis. I P. Müller (red.),
Programming Languages and Systems- 29th European Symposium on Programming, ESOP 2020 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings (s. 112-140). Springer.
https://doi.org/10.1007/978-3-030-44914-8_5
Brandt, M.
, Orlandi, C., Shrishak, K. & Shulman, H. (2020).
Optimal Transport Layer for Secure Computation. I P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (red.),
ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Bind Volume 3: SECRYPT, s. 130-141). SCITEPRESS Digital Library.
https://doi.org/10.5220/0009826801300141
Baum, C., Frederiksen, T. K., Hesse, J., Lehmann, A. & Yanai, A. (2020).
Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. I
Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 (s. 587-606). Artikel 9230400 IEEE.
https://doi.org/10.1109/EuroSP48549.2020.00044
Higuchi, N., Imamura, Y.
, Mic, V., Shinohara, T., Hirata, K. & Kuboyama, T. (2020).
Pivot selection for narrow sketches by optimization algorithms. I S. Satoh, L. Vadicamo, F. Carrara, A. Zimek, I. Bartolini, M. Aumüller, B. P. Jonsson & R. Pagh (red.),
Similarity Search and Applications - 13th International Conference, SISAP 2020, Proceedings (s. 33-46). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-030-60936-8_3