Ben-Sasson, E., Ben-Tov, I.
, Damgård, I., Ishai, Y. & Ron-Zewi, N. (2016).
On public key encryption from noisy codewords. I
Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings (Bind 9615, s. 417-446). Springer VS.
https://doi.org/10.1007/978-3-662-49387-8_16
Bennedsen, J.
& Caspersen, M. E. (2005).
Revealing the programming process. I W. Dann, T. L. Naps, P. T. Tymann & D. Baldwin (red.),
Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2005 (St. Louis, Missouri, USA, February 23-27, 2005) (s. 186-190). Association for Computing Machinery.
https://doi.org/10.1145/1047124.1047413
Bendtsen, C. N.
, Krink, T., Fogel, D. B. (red.), Yao, X. (red.), Greenwood, G. (red.), Iba, H. (red.), Marrow, P. (red.) & Shackleton, M. (red.) (2002).
Dynamic Memory Model for Non-Stationary Optimization. I
Proceedings of the 2002 Congress on Evolutionary Computation, 2002, CEC '02 (Bind 1, s. 145-150). IEEE Press.
Bendtsen, C. N.
, Krink, T., Fogel, D. B. (red.), Yao, X. (red.), Greenwood, G. (red.), Iba, H. (red.), Marrow, P. (red.) & Shackleton, M. (red.) (2002).
Phone Routing using the Dynamic Memory Model. I
Proceedings of the 2002 Congress on Evolutionary Computation: CEC '02 (Bind 1, s. 992-997). IEEE Press.
Bender, M. A.
, Brodal, G. S., Fagerberg, R., Ge, D., He, S., Hu, H., Iacono, J. & López-Ortiz, A. (2003).
The Cost of Cache-Oblivious Searching. I
Proc. 44th Annual IEEE Symposium on Foundations of Computer Science (FOCS): IEEE Computer Society Press, Washington D.C. (Bind Session 6, s. 271-282). IEEE Computer Society Press.
Bender, M. A.
, Brodal, G. S., Fagerberg, R., Jacob, R. & Vicari, E. (2010).
Optimal Sparse Matrix Dense Vector Multiplication in the I/O-Model.
Theory of Computing Systems,
47(4), 934-962.
https://doi.org/10.1007/s00224-010-9285-4
Bender, M. A.
, Brodal, G. S., Fagerberg, R., Ge, D., He, S., Hu, H., Iacono, J. & López-Ortiz, A. (2011).
The Cost of Cache-Oblivious Searching.
Algorithmica,
61(2), 463-505.
https://doi.org/10.1007/s00453-010-9394-0
Bender, E., Schaper, N.
, Caspersen, M. E., Margaritis, M. & Hubwieser, P. (2016).
Identifying and formulating teachers' beliefs and motivational orientations for computer science teacher education.
Studies in Higher Education,
41(11), 1958-1973.
https://doi.org/10.1080/03075079.2015.1004233
Benarroch, D.
, Campanelli, M., Fiore, D., Gurkan, K. & Kolonelos, D. (2021).
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular. I N. Borisov & C. Diaz (red.),
Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part I (s. 393-414). Springer.
https://doi.org/10.1007/978-3-662-64322-8_19
Bellatreche, L., Dumas, M.
, Karras, P., Matulevicius, R., Awad, A., Weidlich, M., Ivanovic, M. & Hartig, O. (red.) (2021).
New Trends in Database and Information Systems: ADBIS 2021 Short Papers, Doctoral Consortium and Workshops: DOING, SIMPDA, MADEISD, MegaData, CAoNS, Tartu, Estonia, August 24-26, 2021, Proceedings. Springer. Communications in Computer and Information Science Bind 1450
https://doi.org/10.1007/978-3-030-85082-1
Bellatreche, L., Dumas, M.
, Karras, P. & Matulevicius, R. (red.) (2021).
Advances in Databases and Information Systems: 25th European Conference, ADBIS 2021, Tartu, Estonia, August 24–26, 2021, Proceedings. Springer. Lecture Notes in Computer Science (LNCS) Bind 12843
https://doi.org/10.1007/978-3-030-82472-3
Beldiceanu, N.
, Katriel, I. & Lorca, X. (2006).
Undirected Forest Constraints. I
Integration of AI and OR techniques in Constraint Programming for Combinatorial Optimization Problems (CPAIOR 2006) (Bind LNCS 3990, s. 29-43). Springer.
Beer, A., Draganov, A., Hohma, E., Jahn, P., Frey, C. M. M.
& Assent, I. (2023).
Connecting the Dots: Density-Connectivity Distance unifies DBSCAN, k-Center and Spectral Clustering. I
KDD 2023 : Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (s. 80-92). Association for Computing Machinery.
https://doi.org/10.1145/3580305.3599283
Becker, L.
, Blunck, H., Hinrichs, K. & Vahrenhold, J. (2004).
A Framework for Representing Moving Objects. I F. Galindo, M. Takizawa & R. Traunmüller (red.),
Database and Expert Systems Applications: 15th International Conference, DEXA 2004, Zaragoza, Spain, August 30-September 3, 2004. Proceedings (s. 854-863). Springer.
https://doi.org/10.1007/978-3-540-30075-5_82
Beaudouin-Lafon, M., Chapuis, O., Eagan, J. R.
, Gjerlufsen, T., Huot, S.
, Klokmose, C. N., Mackay, W., Nancel, M., Pietriga, E., Pillias, C., Primet, R. & Wagner, J. (2012).
Multi-surface Interaction in the WILD Room.
Computer,
45(4), 48-56.
https://doi.org/10.1109/MC.2012.110
Baumeister, H., Cerioli, M., Haxthausen, A., Mossakowski, T.
, Mosses, P. D., Sannella, D., Tarlecki, A.
& Mosses, P. D. (red.) (2004).
Casl Semantics. I
Casl Reference Manual, The Complete Documentation of the Common Algebraic Specification Language (2960 i Lecture Notes in Computer Science udg., s. 115-271). Springer.
Baumann, P., Nyman, J.
, Høyer, M., Gagliardi, G., Lax, I., Wennberg, B., Drugge, N., Ekberg, L., Friesland, S., Johansson, K.-A., Lund, J.-S., Morhed, E., Nilsson, K. K., Levin, N.
, Paludan, M., Sederholm, C.
, Hansen, A. T., Wittgren, L. & Lewensohn, R. (2008).
Stereotactic body radiotherapy for medically inoperable patients with stage I non-small cell lung cancer - a first report of toxicity related to COPD/CVD in a non-randomized prospective phase II study.
Radiotherapy & Oncology,
88(3), 359-367.
https://doi.org/10.1016/j.radonc.2008.07.019
Baum, C., Damgård, I. B. & Orlandi, C. (2014).
Publicly Auditable Secure Multi-Party Computation. I M. Abdalla & R. D. Prisco (red.),
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (s. 175-196 ). Springer VS.
https://doi.org/10.1007/978-3-319-10879-7_11
Baum, C., Damgård, I. B., Toft, T. & Zakarias, R. W. (2016).
Better Preprocessing for Secure Multiparty Computation. I M. Manulis, A.-R. Sadeghi & S. Schneider (red.),
Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings: 14th International Conference on Applied Cryptography and Network Security (Bind 9696, s. 327-345). Springer VS.
https://doi.org/10.1007/978-3-319-39555-5_18
Baum, C., Damgård, I. B., Larsen, K. G. & Nielsen, M. (2016).
How to prove knowledge of small secrets. I J. Katz & M. Robshaw (red.),
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings: CRYPTO 2016: Advances in Cryptology – CRYPTO 2016 (Bind 9816, s. 478-498). Springer VS.
https://doi.org/10.1007/978-3-662-53015-3_17