Banerjee, A.
, Danvy, O., Doh, K.-G. & Hatcliff , J. (red.) (2013).
Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday : Festschrift for Dave Schmidt, Manhattan, Kansas, USA, 19-20th September 2013. http://published.eptcs.org/. Electronic Proceedings in Theoretical Computer Science Bind 129
https://doi.org/10.4204/EPTCS.129
Chen, P. P.
, Wang, Z. Y., Yu, S. W., Hong, J. M., Poulsen, P. R., Ji, Y. L., Miao, B. Y.
, Han, M. & Wang, G. H. (1998).
Self-organization of Te clusters in nanofilm by low energy beam deposition.
Physics Letters, Section A: General, Atomic and Solid State Physics,
244(5), 407-412.
https://doi.org/10.1016/S0375-9601(98)00346-6
Nunes, F.
, Verdezoto, N., Fitzpatrick, G.
, Kyng, M., Grönvall, E. & Storni, C. (2015).
Self-Care Technologies in HCI: Trends, Tensions, and Opportunities.
A C M Transactions on Computer - Human Interaction,
22(6), Artikel 33.
https://doi.org/10.1145/2803173
Neerbek, J., Dolog, P.
& Assent, I. (2019).
Selective Training: A Strategy for Fast Backpropagation on Sentence Embeddings. I Q. Yang, M.-L. Zhang, Z. Gong, S.-J. Huang & Z.-H. Zhou (red.),
Advances in Knowledge Discovery and Data Mining - 23rd Pacific-Asia Conference, PAKDD 2019, Proceedings: PAKDD '19 (s. 40-53). Springer.
https://doi.org/10.1007/978-3-030-16142-2_4
Mic, V., Novak, D., Vadicamo, L. & Zezula, P. (2018).
Selecting Sketches for Similarity Search. I A. Benczur, T. Horvath & B. Thalheim (red.),
Advances in Databases and Information Systems - 22nd European Conference, ADBIS 2018, Proceedings (s. 127-141). Springer Verlag.
https://doi.org/10.1007/978-3-319-98398-1_9
Aronov, B., Driemel, A., Van Kreveld, M., Löffler, M.
& Staals, F. (2015).
Segmentation of trajectories on nonmonotone criteria.
A C M Transactions on Algorithms,
12(2), Artikel 26.
https://doi.org/10.1145/2660772
Giacomelli, I., Olimid, R.
& Ranellucci, S. (2015).
Security of Linear Secret-Sharing Schemes Against Mass Surveillance. I M. Reiter & D. Naccache (red.),
Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Bind 9476, s. 43-58). Springer.
https://doi.org/10.1007/978-3-319-26823-1
Nelson, B. & Olovsson, T. (2016).
Security and privacy for big data: A systematic literature review. I R. Ak, G. Karypis, Y. Xia, X. T. Hu, P. S. Yu, J. Joshi, L. Ungar, L. Liu, A.-H. Sato, T. Suzumura, S. Rachuri, R. Govindaraju & W. Xu (red.),
Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016 (s. 3693-3702). Artikel 7841037 Institute of Electrical and Electronics Engineers Inc..
https://doi.org/10.1109/BigData.2016.7841037
Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020).
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. I L. Chen, S. Schneider, N. Li & K. Liang (red.),
European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Bind I, s. 654-673). Springer.
https://doi.org/10.1007/978-3-030-59013-0_32
Choudhury, A.
, Patra, A., Ashwinkumar, B. V., Srinathan, K. & Pandu Rangan, C. (2011).
Secure message transmission in asynchronous networks.
Journal of Parallel and Distributed Computing,
71(8), 1067-1074.
https://doi.org/10.1016/j.jpdc.2011.03.004
Damgård, I. B., Jakobsen, T. P., Nielsen, J. B. & Pagter, J. I. (2013).
Secure Key Management in the Cloud. I M. Stam (red.),
Cryptography and Coding: 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings (s. 270-289 ). Springer VS.
https://doi.org/10.1007/978-3-642-45239-0_16
Lipmaa, H.
& Toft, T. (2013).
Secure equality and greater-than tests with sublinear online complexity. I F. V. Fomin , R. Freivalds, M. Kwiatkowska & D. Peleg (red.),
Automata, Languages, and Programming: Proceedings, 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Part II (s. 645-656). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-39212-2_56
Applebaum, B.
, Damgård, I., Ishai, Y.
, Nielsen, M. & Zichron, L. (2017).
Secure Arithmetic Computation with Constant Computational Overhead. I H. Shacham & J. Katz (red.),
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings (Bind 10401, s. 223-254). Springer VS.
https://doi.org/10.1007/978-3-319-63688-7_8
Schnell, I. B., Thomsen, P. F., Wilkinson, N.
, Rasmussen, M., Jensen, L. R. D., Willerslev, E.
, Bertelsen, M. F. & Gilbert, M. T. P. (2012).
Screening mammal biodiversity using DNA from leeches.
Current Biology,
22(8), R262-R263.
https://doi.org/10.1016/j.cub.2012.02.058
Chillotti, I., Orsini, E.
, Scholl, P., Smart, N. P. & Leeuwen, B. V. (2022).
Scooby: Improved Multi-party Homomorphic Secret Sharing Based on FHE. I C. Galdi & S. Jarecki (red.),
Security and Cryptography for Networks - 13th International Conference, SCN 2022, Proceedings (s. 540-563). Springer.
https://doi.org/10.1007/978-3-031-14791-3_24
Berger, C. P., Lutze, M. C. D., Elmqvist, N., Madsen, M. & Klokmose, C. N. (2024).
Scientists and Code: Programming as a Tool. Afhandling præsenteret på PLATEAU, Berkeley, California, USA.
https://kilthub.cmu.edu/articles/conference_contribution/Scientists_and_Code_Programming_as_a_Tool/25587726?backTo=/collections/PLATEAU_2024/7093870
Chaugule, P., Kumar, M., Limaye, N., Mohapatra, C. K., She, A.
& Srinivasan, S. (2023).
Schur Polynomials Do Not Have Small Formulas If the Determinant does not.
Computational Complexity,
32(1), Artikel 3.
https://doi.org/10.1007/s00037-023-00236-x