Afshani, P., de Berg, M., Buchin, K., Gao, J., Löffler, M., Nayyeri, A., Raichel, B., Sarkar, R., Wang, H. & Yang, H. T. (2022).
On Cyclic Solutions to the Min-Max Latency Multi-Robot Patrolling Problem. I X. Goaoc & M. Kerber (red.),
38th International Symposium on Computational Geometry, SoCG 2022 Artikel 2 Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.SoCG.2022.2
Esteves, A., Bouquet, E.
, Pfeuffer, K. & Alt, F. (2022).
One-handed Input for Mobile Devices via Motion Matching and Orbits Controls.
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies,
6(2), 1-24. Artikel 51.
https://doi.org/10.1145/3534624
Orlandi, C., Ravi, D. & Scholl, P. (2022).
On the Bottleneck Complexity of MPC with Correlated Randomness. I G. Hanaoka, J. Shikata & Y. Watanabe (red.),
Public-Key Cryptography – PKC 2022: 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I (s. 194-220). Springer.
https://doi.org/10.1007/978-3-030-97121-2_8
Aggarwal, D.
, Obremski, M., Ribeiro, J.
, Simkin, M. & Siniscalchi, L. (2022).
Privacy Amplification with Tamperable Memory via Non-Malleable Two-Source Extractors.
IEEE Transactions on Information Theory,
68(8), 5475-5495.
https://doi.org/10.1109/TIT.2022.3167404
Strydonck, T. V.
, Georges, A. L., Guéneau, A., Trieu, A., Timany, A., Piessens, F.
, Birkedal, L. & Devriese, D. (2022).
Proving full-system security properties under multiple attacker models on capability machines. I
Proceedings - 2022 IEEE 35th Computer Security Foundations Symposium, CSF 2022 (s. 80-95). IEEE.
https://doi.org/10.1109/CSF54842.2022.9919645
Ganardi, M., Majumdar, R.
, Pavlogiannis, A., Schütze, L. & Zetzsche, G. (2022).
Reachability in Bidirected Pushdown VASS. I M. Bojanczyk, E. Merelli & D. P. Woodruff (red.),
49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022 Artikel 124 Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.ICALP.2022.124
Caragiannis, I., Gravin, N., Lu, P. & Wang, Z. (2022).
Relaxing the Independence Assumption in Sequential Posted Pricing, Prophet Inequality, and Random Bipartite Matching. I M. Feldman, H. Fu & I. Talgam-Cohen (red.),
Web and Internet Economics : 17th International Conference, WINE 2021 (s. 131-148). Springer.
https://doi.org/10.1007/978-3-030-94676-0_8
Seisenberger, M., ter Beek, M. H., Fan, X., Ferrari, A., Haxthausen, A. E., James, P., Lawrence, A., Luttik, B.
, van de Pol, J. & Wimmer, S. (2022).
Safe and Secure Future AI-Driven Railway Technologies: Challenges for Formal Methods in Railway. I T. Margaria & B. Steffen (red.),
Leveraging Applications of Formal Methods, Verification and Validation. Practice - 11th International Symposium, ISoLA 2022, Proceedings (s. 246-268). Springer.
https://doi.org/10.1007/978-3-031-19762-8_20
Chillotti, I., Orsini, E.
, Scholl, P., Smart, N. P. & Leeuwen, B. V. (2022).
Scooby: Improved Multi-party Homomorphic Secret Sharing Based on FHE. I C. Galdi & S. Jarecki (red.),
Security and Cryptography for Networks - 13th International Conference, SCN 2022, Proceedings (s. 540-563). Springer.
https://doi.org/10.1007/978-3-031-14791-3_24
Skitsas, K., Papageorgiou, I. G., Talebi, M. S., Kantere, V., Katehakis, M. N.
& Karras, P. (2022).
SIFTER: Space-Efficient Value Iteration for Finite-Horizon MDPs.
Proceedings of the VLDB Endowment,
16(1), 90-98.
https://doi.org/10.14778/3561261.3561269