McMillan, D., Brown, B., Lampinen, A., McGregor, M.
, Hoggan, E. & Pizza, S. (2017).
Situating Wearables: Smartwatch Use in Context. I
CHI 2017 - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire (s. 3582-3594). Association for Computing Machinery.
https://doi.org/10.1145/3025453.3025993
Arge, L., Deleuran, L. K., Mølhave, T., Revsbæk, M. & Truelsen, J. (2012).
Simplifying Massive Contour Maps.
Lecture Notes in Computer Science,
7501, 96-107.
https://doi.org/10.1007/978-3-642-33090-2_10
Andersen, E. S.
, Noe, K. Ø., Sørensen, T. S., Nielsen, S. K., LU, F., Paludan, M., Lindegaard, J. C. & Tanderup, K. (2013).
Simple DVH parameter addition as compared to deformable registration for bladder dose accumulation in cervix cancer brachytherapy.
Radiotherapy & Oncology,
107(1), 52-57.
https://doi.org/10.1016/j.radonc.2013.01.013
Thomas, V., Brueggemann, M. J., Wang, D., Gaytán-Lugo, L. S. & Bidwell, N. J. (2018).
Silent SIG: Reflection in action at CHI. I R. Mandryk, M. Hancock, M. Perry & A. Cox (red.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (Bind 2018-April, s. 1-4). Artikel SIG16 Association for Computing Machinery.
https://doi.org/10.1145/3170427.3185362
Faust, S., Hazay, C.
, Nielsen, J. B., Nordholt, P. S. & Zottarel, A. (2016).
Signature Schemes Secure Against Hard-to-Invert Leakage.
Journal of Cryptology,
29(2), 422-455.
https://doi.org/10.1007/s00145-015-9197-1
Faust, S., Hazay, C.
, Nielsen, J. B., Nordholt, P. S. & Zottarel, A. (2012).
Signature Schemes Secure against Hard-to-Invert Leakage.
Lecture Notes in Computer Science,
7658, 98-115.
https://doi.org/10.1007/978-3-642-34961-4_8
Skitsas, K., Papageorgiou, I. G., Talebi, M. S., Kantere, V., Katehakis, M. N.
& Karras, P. (2022).
SIFTER: Space-Efficient Value Iteration for Finite-Horizon MDPs.
Proceedings of the VLDB Endowment,
16(1), 90-98.
https://doi.org/10.14778/3561261.3561269
Aranha, D. F., Berndt, S., Eisenbarth, T., Seker, O.
, Takahashi, A., Wilke, L. & Zaverucha, G. (2021).
Side-Channel Protections for Picnic Signatures. Abstract fra Third PQC Standardization Conference, Washington, USA.
Aranha, D. F., Berndt, S., Eisenbarth, T., Seker, O.
, Takahashi, A., Wilke, L. & Zaverucha, G. (2021).
Side-Channel Protections for Picnic Signatures.
IACR Transactions of Cryptographic Hardware and Embedded Systems,
2021(4), 239-282.
https://doi.org/10.46586/tches.v2021.i4.239-282
Gjerlufsen, T., Klokmose, C. N., Eagan, J., Pillias, C. & Beaudouin-Lafon, M. (2011).
Shared Substance: Developing Flexible Multi-Surface Applications. I D. S. Ten, S. Amershi, B. Begole, W. A. Kellogg & M. Tungare (red.),
Proceedings of the International Conference on Human Factors in Computing Systems, CHI 2011 (s. 3383-3392). Association for Computing Machinery.
https://doi.org/10.1145/1978942.1979446
Xu, Y., Johnson, P. M., Moore, C. A.
, Brewer, R. S. & Takayama, J. (2013).
SGSEAM: Assessing serious game frameworks from a stakeholder experience perspective. I
Gamification 2013: Proceedings of the First International Conference on Gameful Design, Research, and Applications Enterprice Gamification Consultancy.
http://csdl.ics.hawaii.edu/techreports/2013/13-03/13-03.pdf
Quercia, A., Morrison, A., Scharr, H.
& Assent, I. (2023).
SGD Biased towards Early Important Samples for Efficient Training. I G. Chen, L. Khan, X. Gao, M. Qiu, W. Pedrycz & X. Wu (red.),
IEEE International Conference on Data Mining, ICDM 2023, Shanghai, China, December 1-4, 2023 (s. 1289-1294). IEEE.
https://doi.org/10.1109/ICDM58522.2023.00163
Vermeulen, J., Vandriessche, Y., Clerckx, T., Luyten, K. & Coninx, K. (2007).
Service-Interaction Descriptions: Augmenting Services with User Interface Models. I
Engineering Interactive Systems - EIS 2007 Joint Working Conferences, EHCI 2007, DSV-IS 2007, HCSE 2007, Salamanca, Spain, March 22-24, 2007. Selected Papers (s. 447-464)
https://doi.org/10.1007/978-3-540-92698-6_27
Boudgoust, K. & Takahashi, A. (2024).
Sequential Half-Aggregation of Lattice-Based Signatures. I G. Tsudik, M. Conti, K. Liang & G. Smaragdakis (red.),
Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Bind 1, s. 270-289). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-031-50594-2_14
Clouston, R. & Goré, R. (2015).
Sequent Calculus in the Topos of Trees. I A. Pitts (red.),
Foundations of Software Science and Computation Structures : 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (Bind 9034, s. 133-147). Springer VS.
http://link.springer.com/chapter/10.1007/978-3-662-46678-0_9