Barthe, G., Blazy, S., Grégoire, B., Hutin, R., Laporte, V., Pichardie, D.
& Trieu, A. (2020).
Formal Verification of a Constant-Time Preserving C Compiler.
Proceedings of the ACM on Programming Languages ,
4(POPL), Artikel 7.
https://doi.org/10.1145/3371075
Zhang, K., Zhou, J., Tao, D.
, Karras, P., Li, Q.
& Xiong, H. (2020).
Geodemographic Influence Maximization. I
KDD '20: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (s. 2764-2774). Association for Computing Machinery.
https://doi.org/10.1145/3394486.3403327
Campanelli, M., Fiore, D., Greco, N., Kolonelos, D. & Nizzardo, L. (2020).
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage. I S. Moriai & H. Wang (red.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (s. 3-35). Springer.
https://doi.org/10.1007/978-3-030-64834-3_1
Avdic, M. & Vermeulen, J. (2020).
Intelligibility Issues Faced by Smart Speaker Enthusiasts in Understanding What Their Devices Do and Why. I N. Ahmadpour, T. Leong, B. Ploderer, C. Parker, S. Webber, D. Munoz, L. Loke & M. Tomitsch (red.),
Proceedings of the 32nd Australian Computer-Human Interaction Conference, OzCHI 2020 (s. 314-328). Association for Computing Machinery.
https://doi.org/10.1145/3441000.3441068
Jetter, H.-C.
, Rädle, R., Feuchtner, T., Anthes, C., Friedl, J.
& Klokmose, C. N. (2020).
“In VR, everything is possible!”: Sketching and Simulating Spatially-Aware Interactive Spaces in Virtual Reality. I
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems Artikel 523 Association for Computing Machinery.
https://doi.org/10.1145/3313831.3376652
Abel, A., Cockx, J., Devriese, D.
, Timany, A. & Wadler, P. (2020).
Leibniz equality is isomorphic to Martin-Löf identity, parametrically.
Journal of Functional Programming,
30, Artikel e17.
https://doi.org/10.1017/S0956796820000155
Deuber, D., Döttling, N.
, Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020).
Minting Mechanism for Proof of Stake Blockchains. I M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (red.),
Applied Cryptography and Network Security (s. 315-334). Springer.
https://doi.org/10.1007/978-3-030-57808-4_16
Birkedal, L., Clouston, R., Mannaa, B., Ejlers Møgelberg, R., Pitts, A. M.
& Spitters, B. (2020).
Modal dependent type theory and dependent right adjoints.
Mathematical Structures in Computer Science,
30(2), 118-138.
https://doi.org/10.1017/S0960129519000197
Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R.
& Pavlogiannis, A. (2020).
Optimal and Perfectly Parallel Algorithms for On-demand Data-Flow Analysis. I P. Müller (red.),
Programming Languages and Systems- 29th European Symposium on Programming, ESOP 2020 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings (s. 112-140). Springer.
https://doi.org/10.1007/978-3-030-44914-8_5
Brandt, M.
, Orlandi, C., Shrishak, K. & Shulman, H. (2020).
Optimal Transport Layer for Secure Computation. I P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (red.),
ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Bind Volume 3: SECRYPT, s. 130-141). SCITEPRESS Digital Library.
https://doi.org/10.5220/0009826801300141