Tsourakakis, C. E., Mitzenmacher, M.
, Larsen, K. G., Blasiok, J., Lawson, B., Nakkiran, P. & Nakos, V. (2018).
Predicting Positive and Negative Links with Noisy Queries: Theory Practice. arxiv.org.
http://arxiv.org/abs/1709.07308
Damgård, I. B., Keller, M., Larraia , E.
, Pastro, V., Scholl, P. & Smart, N. P. (2013).
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits. I J. Crampton , S. Jajodia & K. Mayes (red.),
Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings (s. 1-18 ). Springer VS.
https://doi.org/10.1007/978-3-642-40203-6_1
Chase, M., Derler, D., Goldfeder, S.
, Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G. (2017).
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. I
CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (s. 1825-1842). Association for Computing Machinery.
https://doi.org/10.1145/3133956.3133997
Kjærgaard, M. B. & Weckemann, K. (2012).
PosQ : Unsupervised Fingerprinting and Visualization of GPS Positioning Quality. I M. Gris & G. Yang (red.),
Mobile Computing, Applications, and Services: Second International ICST Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28, 2010, Revised Selected Papers (s. 176-194 ). Springer.
https://doi.org/10.1007/978-3-642-29336-8_10
Airiau, S., Aziz, H.
, Caragiannis, I., Kruger, J., Lang, J. & Peters, D. (2023).
Portioning using ordinal preferences: Fairness and efficiency.
Artificial Intelligence,
314, Artikel 103809.
https://doi.org/10.1016/j.artint.2022.103809
Higuchi, N., Imamura, Y.
, Mic, V., Shinohara, T., Hirata, K. & Kuboyama, T. (2020).
Pivot selection for narrow sketches by optimization algorithms. I S. Satoh, L. Vadicamo, F. Carrara, A. Zimek, I. Bartolini, M. Aumüller, B. P. Jonsson & R. Pagh (red.),
Similarity Search and Applications - 13th International Conference, SISAP 2020, Proceedings (s. 33-46). Springer Science and Business Media Deutschland GmbH.
https://doi.org/10.1007/978-3-030-60936-8_3
Kunkel, A., Rheinländer, A., Schiefer, C., Helmer, S.
, Bouros, P. & Leser, U. (2016).
PIEJoin: Towards Parallel Set Containment Joins. I P. Baumann, I. Manolescu-Goujot, L. Trani, Y. Ioannidis, G. G. Barnaföldi, L. Dobos & E. Bányai (red.),
Scientific and Statistical Database Management: 28th International Conference, SSDBM 2016 - Proceedings Artikel 11 Association for Computing Machinery.
https://doi.org/10.1145/2949689.2949694
Baum, C., Frederiksen, T. K., Hesse, J., Lehmann, A. & Yanai, A. (2020).
Pesto: Proactively secure distributed single sign-on, or how to trust a hacked server. I
Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020 (s. 587-606). Artikel 9230400 IEEE.
https://doi.org/10.1109/EuroSP48549.2020.00044
Safavi, T., Belth, C., Faber, L.
, Mottin, D., Müller, E. & Koutra, D. (2019).
Personalized Knowledge Graph Summarization: From the Cloud to Your Pocket. 528-537. Afhandling præsenteret på IEEE International Conference on Data Mining, Beijing, Kina.
https://web.eecs.umich.edu/~dkoutra/papers/19_ICDM_GLIMPSE-CR.pdf
Piras, E. M., Cabitza, F., Lewkowicz, M.
& Bannon, L. (2019).
Personal Health Records and Patient-Oriented Infrastructures: Building Technology, Shaping (New) Patients, and Healthcare Practitioners.
Computer Supported Cooperative Work: CSCW: An International Journal,
28(6), 1001-1009.
https://doi.org/10.1007/s10606-019-09364-x