Křivánek, J., Georgiev, I.
, Hachisuka, T., Vévoda, P., Šik, M., Nowrouzezahrai, D. & Jarosz, W. (2014).
Unifying Points, Beams, and Paths in Volumetric Light Transport Simulation.
A C M Transactions on Graphics,
33(4), Artikel 13.
https://doi.org/10.1145/2601097.2601219
Saad-Sulonen, J., Halskov, K., Eriksson, E., Vines, J., Huybrechts, L. & Karasti, T. H. (2015).
Unfolding Participation: What do we mean by participation – conceptually and in practice.
Aarhus Series on Human Centered Computing ,
1(1).
https://doi.org/10.7146/aahcc.v1i1.21324
Chundury, P., Thakkar, U., Reyazuddin, Y., Jordan, J. B.
, Elmqvist, N. & Lazar, J. (2024).
Understanding the Visualization and Analytics Needs of Blind and Low-Vision Professionals. I
ASSETS 2024 - Proceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility Artikel 111 Association for Computing Machinery.
https://doi.org/10.1145/3663548.3688496
David, B. M., Dowsley, R., van der Graaf, J., Marques, D., Nascimento, A. C. A. & Pinto, A. (2015).
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra.
I E E E Transactions on Information Forensics and Security,
11(1), 59 - 73 .
https://doi.org/10.1109/TIFS.2015.2476783
Kondi, Y., Orlandi, C. & Roy, L. (2023).
Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions. I H. Handschuh & A. Lysyanskaya (red.),
Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part I (s. 646-677). Springer.
https://doi.org/10.1007/978-3-031-38557-5_21
Damgård, I. B., Orlandi, C., Takahashi, A. & Tibouchi, M. (2021).
Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. I J. A. Garay (red.),
Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings: 24rd IACR International Conference on Practice and Theory of Public-Key Cryptography, proceedings part 1 (s. 99-130). Springer.
https://doi.org/10.1007/978-3-030-75245-3_5
Garg, S.
& Polychroniadou, A. (2015).
Two-round adaptively secure MPC from indistinguishability obfuscation. I Y. Dodis & J. Buus Nielsen (red.),
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (s. 614-637). Springer VS.
https://doi.org/10.1007/978-3-662-46497-7_24
Jespersen, SM., Hansen, ES., Hoy, K., Christensen, KO., Lindblad, BE., Ahrensberg, J. & Bunger, C. (1995).
Two-level spinal stenosis in minipigs - Hemodynamic effects of exercise.
Spine,
20(24), 2765-2773.
https://doi.org/10.1097/00007632-199512150-00020
Brodal, G. S., Davoodi, P., Lewenstein, M., Raman, R. & Rao, S. S. (2012).
Two Dimensional Range Minimum Queries and Fibonacci Lattices.
Lecture Notes in Computer Science,
7501, 217-228 .
https://doi.org/10.1007/978-3-642-33090-2_20