Aranha, D. F., Berndt, S., Eisenbarth, T., Seker, O.
, Takahashi, A., Wilke, L. & Zaverucha, G. (2021).
Side-Channel Protections for Picnic Signatures.
IACR Transactions of Cryptographic Hardware and Embedded Systems,
2021(4), 239-282.
https://doi.org/10.46586/tches.v2021.i4.239-282
Gjerlufsen, T., Klokmose, C. N., Eagan, J., Pillias, C. & Beaudouin-Lafon, M. (2011).
Shared Substance: Developing Flexible Multi-Surface Applications. I D. S. Ten, S. Amershi, B. Begole, W. A. Kellogg & M. Tungare (red.),
Proceedings of the International Conference on Human Factors in Computing Systems, CHI 2011 (s. 3383-3392). Association for Computing Machinery.
https://doi.org/10.1145/1978942.1979446
Xu, Y., Johnson, P. M., Moore, C. A.
, Brewer, R. S. & Takayama, J. (2013).
SGSEAM: Assessing serious game frameworks from a stakeholder experience perspective. I
Gamification 2013: Proceedings of the First International Conference on Gameful Design, Research, and Applications Enterprice Gamification Consultancy.
http://csdl.ics.hawaii.edu/techreports/2013/13-03/13-03.pdf
Quercia, A., Morrison, A., Scharr, H.
& Assent, I. (2023).
SGD Biased towards Early Important Samples for Efficient Training. I G. Chen, L. Khan, X. Gao, M. Qiu, W. Pedrycz & X. Wu (red.),
IEEE International Conference on Data Mining, ICDM 2023, Shanghai, China, December 1-4, 2023 (s. 1289-1294). IEEE.
https://doi.org/10.1109/ICDM58522.2023.00163
Vermeulen, J., Vandriessche, Y., Clerckx, T., Luyten, K. & Coninx, K. (2007).
Service-Interaction Descriptions: Augmenting Services with User Interface Models. I
Engineering Interactive Systems - EIS 2007 Joint Working Conferences, EHCI 2007, DSV-IS 2007, HCSE 2007, Salamanca, Spain, March 22-24, 2007. Selected Papers (s. 447-464)
https://doi.org/10.1007/978-3-540-92698-6_27
Boudgoust, K. & Takahashi, A. (2024).
Sequential Half-Aggregation of Lattice-Based Signatures. I G. Tsudik, M. Conti, K. Liang & G. Smaragdakis (red.),
Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Bind 1, s. 270-289). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-031-50594-2_14
Clouston, R. & Goré, R. (2015).
Sequent Calculus in the Topos of Trees. I A. Pitts (red.),
Foundations of Software Science and Computation Structures : 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (Bind 9034, s. 133-147). Springer VS.
http://link.springer.com/chapter/10.1007/978-3-662-46678-0_9
Banerjee, A.
, Danvy, O., Doh, K.-G. & Hatcliff , J. (red.) (2013).
Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday : Festschrift for Dave Schmidt, Manhattan, Kansas, USA, 19-20th September 2013. http://published.eptcs.org/. Electronic Proceedings in Theoretical Computer Science Bind 129
https://doi.org/10.4204/EPTCS.129
Chen, P. P.
, Wang, Z. Y., Yu, S. W., Hong, J. M., Poulsen, P. R., Ji, Y. L., Miao, B. Y.
, Han, M. & Wang, G. H. (1998).
Self-organization of Te clusters in nanofilm by low energy beam deposition.
Physics Letters, Section A: General, Atomic and Solid State Physics,
244(5), 407-412.
https://doi.org/10.1016/S0375-9601(98)00346-6
Nunes, F.
, Verdezoto, N., Fitzpatrick, G.
, Kyng, M., Grönvall, E. & Storni, C. (2015).
Self-Care Technologies in HCI: Trends, Tensions, and Opportunities.
A C M Transactions on Computer - Human Interaction,
22(6), Artikel 33.
https://doi.org/10.1145/2803173
Neerbek, J., Dolog, P.
& Assent, I. (2019).
Selective Training: A Strategy for Fast Backpropagation on Sentence Embeddings. I Q. Yang, M.-L. Zhang, Z. Gong, S.-J. Huang & Z.-H. Zhou (red.),
Advances in Knowledge Discovery and Data Mining - 23rd Pacific-Asia Conference, PAKDD 2019, Proceedings: PAKDD '19 (s. 40-53). Springer.
https://doi.org/10.1007/978-3-030-16142-2_4
Mic, V., Novak, D., Vadicamo, L. & Zezula, P. (2018).
Selecting Sketches for Similarity Search. I A. Benczur, T. Horvath & B. Thalheim (red.),
Advances in Databases and Information Systems - 22nd European Conference, ADBIS 2018, Proceedings (s. 127-141). Springer Verlag.
https://doi.org/10.1007/978-3-319-98398-1_9
Aronov, B., Driemel, A., Van Kreveld, M., Löffler, M.
& Staals, F. (2015).
Segmentation of trajectories on nonmonotone criteria.
A C M Transactions on Algorithms,
12(2), Artikel 26.
https://doi.org/10.1145/2660772
Giacomelli, I., Olimid, R.
& Ranellucci, S. (2015).
Security of Linear Secret-Sharing Schemes Against Mass Surveillance. I M. Reiter & D. Naccache (red.),
Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Bind 9476, s. 43-58). Springer.
https://doi.org/10.1007/978-3-319-26823-1
Nelson, B. & Olovsson, T. (2016).
Security and privacy for big data: A systematic literature review. I R. Ak, G. Karypis, Y. Xia, X. T. Hu, P. S. Yu, J. Joshi, L. Ungar, L. Liu, A.-H. Sato, T. Suzumura, S. Rachuri, R. Govindaraju & W. Xu (red.),
Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016 (s. 3693-3702). Artikel 7841037 Institute of Electrical and Electronics Engineers Inc..
https://doi.org/10.1109/BigData.2016.7841037
Dalskov, A. P. K., Orlandi, C., Keller, M., Shrishak, K. & Shulman, H. (2020).
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. I L. Chen, S. Schneider, N. Li & K. Liang (red.),
European Symposium on Research in Computer Security : Computer Security – ESORICS 2020 (Bind I, s. 654-673). Springer.
https://doi.org/10.1007/978-3-030-59013-0_32