Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013).
Outlier Detection with Space Transformation and Spectral Analysis. I C. Kamath, J. Dy, Z. Obradovic, J. Ghosh, S. Parthasarathy & Z.-H. Zhou (red.),
Proceedings of the 2013 SIAM International Conference on Data Mining, SDM (s. 225-233). Society for Industrial and Applied Mathematics.
https://doi.org/10.1137/1.9781611972832.25
Brandt, M.
, Orlandi, C., Shrishak, K. & Shulman, H. (2020).
Optimal Transport Layer for Secure Computation. I P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (red.),
ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Bind Volume 3: SECRYPT, s. 130-141). SCITEPRESS Digital Library.
https://doi.org/10.5220/0009826801300141
Mai, T., Munteanu, A., Musco, C., Rao, A. B.
, Schwiegelshohn, C. & Woodruff, D. P. (2023).
Optimal Sketching Bounds for Sparse Linear Regression.
Proceedings of Machine Learning Research,
206, 11288-11316.
https://proceedings.mlr.press/v206/mai23a.html
Tunç, H. C., Abdulla, P. A., Chakraborty, S., Krishna, S., Mathur, U.
& Pavlogiannis, A. (2023).
Optimal Reads-From Consistency Checking for C11-Style Memory Models.
Proceedings of the ACM on Programming Languages ,
7(PLDI), 761–785. Artikel 137.
https://doi.org/10.1145/3591251
Durkota, K., Lisý, W., Kiekintveld, C.
& Bosansky, B. (2015).
Optimal Network Security Hardening Using Attack Graph Games. I N. Criado, M. Rehak, J. M. Such & L. Vercouter (red.),
2nd International Workshop on Agents and Cybersecurity, ACySE 2015: Workshop Notes at AAMAS 2015 (s. 7-14). Lancaster University.
http://www.lancaster.ac.uk/staff/suchj/acyse2015-proceedings/ACySE2015_proceedings.pdf#page=14
Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R.
& Pavlogiannis, A. (2020).
Optimal and Perfectly Parallel Algorithms for On-demand Data-Flow Analysis. I P. Müller (red.),
Programming Languages and Systems- 29th European Symposium on Programming, ESOP 2020 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings (s. 112-140). Springer.
https://doi.org/10.1007/978-3-030-44914-8_5
Houben, S., Marquardt, N.
, Vermeulen, J. K., Klokmose, C. N., Schöning, J., Reiterer, H. & Holz, C. (2017).
Opportunities and challenges for cross-device interactions in the wild.
interactions,
24(5), 58-63.
https://doi.org/10.1145/3121348
Dalsgaard, P., Pedersen, B. P., Dimke, H., Møller, N. M.
, Normand, S., Bjørk, R., Bille, M.
& Larsen, K. G. (2018).
Opholdskrav i skatteaftale hæmmer dansk forskning.
Politiken, (Sektion 2 (Kultur)), 7.
Sørensen, T. S., Körperich, H., Greil, G. F., Eichhorn, J., Barth, P., Meyer, H.
, Pedersen, E. M. & Beerbaum, P. (2004).
Operator-independent isotropic three-dimensional magnetic resonance imaging for morphology in congenital heart disease: a validation study.
Circulation,
110(2), 163-9.
https://doi.org/10.1161/01.CIR.0000134282.35183.AD
Hu, E.
, Grønbæk, J. E., Houck, A. & Heo, S. (2023).
OpenMic: Utilizing Proxemic Metaphors for Conversational Floor Transitions in Multiparty Video Meetings. I A. Schmidt, K. Väänänen, T. Goyal, P. O. Kristensson, A. Peters, S. Mueller, J. R. Williamson & M. L. Wilson (red.),
CHI'23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems Artikel 793 Association for Computing Machinery.
https://doi.org/10.1145/3544548.3581013
Orlandi, C., Ravi, D. & Scholl, P. (2022).
On the Bottleneck Complexity of MPC with Correlated Randomness. I G. Hanaoka, J. Shikata & Y. Watanabe (red.),
Public-Key Cryptography – PKC 2022: 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I (s. 194-220). Springer.
https://doi.org/10.1007/978-3-030-97121-2_8
Papakonstantinou, P. A., Xu, J.
& Yang, G. (2016).
On the power and limits of distance-based learning. I M.-F. Balcan & K. Q. Weinberger (red.),
Proceedings of the 33nd International Conference on Machine Learning, {ICML} 2016, New York City, NY, USA, June 19-24, 2016 (Bind 48, s. 2263-2271). JMLR.org.