Hansen, T. D. & Ibsen-Jensen, R. (2013).
The complexity of interior point methods for solving discounted turn-based stochastic games. I
The Nature of Computation, Logic, Algorithms, Applications: 9th Conference on Computability in Europe, CiE 2013, Milan, Italy, July 1-5, 2013. Proceedings (s. 252-262). Springer VS.
https://doi.org/10.1007/978-3-642-39053-1_29
Brodal, G. S., Fagerberg, R.
, Pedersen, C. N. S., Östlin, A., Orejas, F. (red.), Spirakis, P. G. (red.) & Leeuwen, J. V. (red.) (2001).
The Complexity of Constructing Evolutionary Trees Using Experiments. I
Lecture Notes In Computer Science; Vol. 2076: Proceedings of the 28th International Colloquium on Automata, Languages and Programming (2076 of Lecture Notes in Computer Science udg., Bind 2076/2001, s. 140-151). Springer.
Etessami, K.
, Hansen, K. A., Miltersen, P. B. & Sørensen , T. B. (2014).
The Complexity of Approximating a Trembling Hand Perfect Equilibrium of a Multi-player Game in Strategic Form. I R. Lavi (red.),
Algorithmic Game Theory: 7th International Symposium, SAGT 2014, Haifa, Israel, September 30 – October 2, 2014. Proceedings (s. 231-243 ). Springer VS.
https://doi.org/10.1007/978-3-662-44803-8_20
Ghosh, S. & Simkin, M. (2019).
The Communication Complexity of Threshold Private Set Intersection. I A. Boldyreva & D. Micciancio (red.),
Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings (Bind II, s. 3-29). Springer.
https://doi.org/10.1007/978-3-030-26951-7_1
Satyanarayan, A., Strazzulla, D.
, Klokmose, C. N., Beaudouin-Lafon, M. & Mackay, W. (2013).
The CHI 2013 interactive schedule. I W. E. Mackay, S. Brewster & S. Brewster (red.),
CHI EA '13 CHI '13 Extended Abstracts on Human Factors in Computing Systems (s. 2987-2990). Association for Computing Machinery.
https://doi.org/10.1145/2468356.2479591
Damgård, I. B., Faust, S., Mukherjee, P. & Venturi, D. (2015).
The Chaining Lemma and its application. I A. Lehmann & S. Wolf (red.),
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (s. 181-196). Springer VS.
https://doi.org/10.1007/978-3-319-17470-9_11
Buemann, B., Schierning, B., Toubro, S.
, Bibby, B. M., Sørensen, T., Dalgaard, L., Pedersen, O. & Astrup, A. (2001).
The association between the val/ala-55 polymorphism of the uncoupling protein 2 gene and exercise efficiency.
International Journal of Obesity,
25(4), 467-471.
https://doi.org/10.1038/sj.ijo.0801564
Garavel, H., ter Beek, M. H.
& van de Pol, J. (2020).
The 2020 Expert Survey on Formal Methods. I M. H. ter Beek & D. Nickovic (red.),
Formal Methods for Industrial Critical Systems - 25th International Conference, FMICS 2020, Proceedings: FMICS 2020, Vienna, Austria, September 2-3, 2020, Proceedings (s. 3-69). Springer.
https://doi.org/10.1007/978-3-030-58298-2_1
Pauli, A. B., Pablos Sarabia, R., Derczynski, L.
& Assent, I. (2023).
TeamAmpa at SemEval-2023 Task 3: Exploring Multilabel and Multilingual RoBERTa Models for Persuasion and Framing Detection. I A. K. Ojha, A. S. Doğruöz, G. Da San Martino, H. Tayyar Madabushi, R. Kumar & E. Sartori (red.),
Proceedings of the 17th International Workshop on Semantic Evaluation (SemEval-2023) (s. 847–855). Association for Computational Linguistics.
https://doi.org/10.18653/v1/2023.semeval-1.117
Stisen, A., Mathisen, A., Krogh, S., Blunck, H., Kjærgaard, M. B. & Prentow, T. S. (2016).
Task Phase Recognition for Highly Mobile Workers in Large Building Complexes. I
2016 IEEE International Conference on Pervasive Computing and Communications, PerCom 2016 Artikel 7456504 IEEE.
https://doi.org/10.1109/PERCOM.2016.7456504
Stisen, A., Blunck, H., Kjærgaard, M. B., Prentow, T. S., Mathisen, A., Krogh , S. & Grønbæk, K. (2017).
Task phase recognition and task progress estimation for highly mobile workers in large building complexes.
Pervasive and Mobile Computing,
38(2), 418-429.
https://doi.org/10.1016/j.pmcj.2016.08.016
Wang, X., Deng, K., Li, J., Yu, J. X.
, Jensen, C. S. & Yang, X. (2018).
Targeted influence minimization in social networks. I G. I. Webb, D. Phung, M. Ganji, L. Rashidi, V. S. Tseng & B. Ho (red.),
Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings (s. 689-700). Springer.
https://doi.org/10.1007/978-3-319-93040-4_54
Canetti, R.
, Kolby, S., Ravi, D., Soria Vazquez, E.
& Yakoubov, S. (2023).
Taming Adaptivity in YOSO Protocols: The Modular Way. I G. Rothblum & H. Wee (red.),
Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023, Proceedings, Part II (Bind 2, s. 33-62). Springer.
https://doi.org/10.1007/978-3-031-48618-0_2