Afshani, P., de Berg, M., Buchin, K., Gao, J., Löffler, M., Nayyeri, A., Raichel, B., Sarkar, R., Wang, H. & Yang, H. T. (2022).
On Cyclic Solutions to the Min-Max Latency Multi-Robot Patrolling Problem. I X. Goaoc & M. Kerber (red.),
38th International Symposium on Computational Geometry, SoCG 2022 Artikel 2 Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.SoCG.2022.2
Afshani, P., Cheng, P., Basu Roy, A. & Wei, Z. (2023).
On Range Summary Queries. I K. Etessami, U. Feige & G. Puppis (red.),
50th International Colloquium on Automata, Languages, and Programming (ICALP 2023) (s. 7:1-7:17). Artikel 7 Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik GmbH.
https://doi.org/10.4230/LIPIcs.ICALP.2023.7
Aehnelt, M.
, Schulz, H.-J. & Urban, B. (2013).
Towards a Contextualized Visual Analysis of Heterogeneous Manufacturing Data. I
Advances in Visual Computing : 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part II (s. 76-85). Springer.
https://doi.org/10.1007/978-3-642-41939-3_8
Adolf, J.
, Kán, P., Feuchtner, T., Adolfová, B., Doležal, J. & Lhotská, L. (2024).
Offistretch: camera-based real-time feedback for daily stretching exercises.
Visual Computer.
https://doi.org/10.1007/s00371-024-03450-y
Adamsen, C. Q., Møller, A., Karim, R., Sridharan, M., Tip, F. & Sen, K. (2017).
Repairing Event Race Errors by Controlling Nondeterminism. I
Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017 (s. 289-299). Artikel 7985670 IEEE Press.
https://doi.org/10.1109/ICSE.2017.34
Adams, M. D., Keep, A. W.
, Midtgaard, J., Might, M., Chauhan, A. & Dybvig, R. K. (2011).
Flow-sensitive type recovery in linear-log time. I
Proceedings of the 2011 ACM international Conference on Object Oriented Programming Systems Languages and Applications: OOPSLA '11 (s. 483-498). Association for Computing Machinery.
https://doi.org/10.1145/2048066.2048105
Ackerman, M., Ben-David, S.
, Branzei, S. & Loker, D. (2012).
Weighted Clustering. I
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence (s. 858-863). AAAI Press.
Aceto, L.
, Damgård, I. B., Goldberg, L. A., Halldórsson, M. M., Ingólfsdóttir, A. & Walukiewicz, I. (2008).
Automata, Languages and Programming: 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II. Springer. Lecture Notes in Computer Science Bind 5126
https://doi.org/10.1007/978-3-540-70583-3
Abspoel, M., Cramer, R.
, Damgård, I. B., Escudero Ospina, D. E. & Yuan, C. (2019).
Efficient Information-Theoretic Secure Multiparty Computation over Z/p^k Z via Galois Rings. I D. Hofheinz & A. Rosen (red.),
Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings: Proceedings (Bind Part 1, s. 471-501). Springer.
https://doi.org/10.1007/978-3-030-36030-6_19
Abspoel, M., Cramer, R.
, Damgård, I., Escudero, D., Rambaud, M., Xing, C. & Yuan, C. (2020).
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/pkZ. I S. Moriai & H. Wang (red.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings (Bind III, s. 151-180). Springer.
https://doi.org/10.1007/978-3-030-64840-4_6
Abspoel, M., Dalskov, A.
, Escudero Ospina, D. E. & Nof, A. (2021).
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings. I K. Sako & N. O. Tippenhauer (red.),
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Proceedings: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings (Bind II, s. 122-154). Springer.
https://doi.org/10.1007/978-3-030-78375-4_6
Abram, D., Beimel, A., Ishai, Y., Kushilevitz, E. & Narayanan, V. (2023).
Cryptography from Planted Graphs: Security with Logarithmic-Size Messages. Afhandling præsenteret på Theory of Cryptography. TCC 2023, Taipei, Taiwan.
Abel, A., Cockx, J., Devriese, D.
, Timany, A. & Wadler, P. (2020).
Leibniz equality is isomorphic to Martin-Löf identity, parametrically.
Journal of Functional Programming,
30, Artikel e17.
https://doi.org/10.1017/S0956796820000155
Abe, M., Chase, M.
, David, B., Kohlweiss, M., Nishimaki, R. & Ohkubo, M. (2016).
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Journal of Cryptology,
29(4), 1-46.
https://doi.org/10.1007/s00145-015-9211-7
Abdul, A.
, Vermeulen, J., Wang, D., Lim, B. Y. & Kankanhalli, M. (2018).
Trends and Trajectories for Explainable, Accountable and Intelligible Systems: An HCI Research Agenda. I R. Mandryk & M. Hancock (red.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (s. 582:1-582:18). Association for Computing Machinery.
https://doi.org/10.1145/3173574.3174156
Abdrabou, Y., Schütte, J., Shams, A.
, Pfeuffer, K., Buschek, D., Khamis, M. & Alt, F. (2022).
"Your Eyes Tell You Have Used This Password Before": Identifying Password Reuse from Gaze and Keystroke Dynamics. I
CHI 2022 - Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems Artikel 400 Association for Computing Machinery.
https://doi.org/10.1145/3491102.3517531
Abdrabou, Y., Mecke, L., Rivu, R., Prange, S., Nguyen, Q. D., Voigt, V., Alt, F.
& Pfeuffer, K. (2023).
How Unique do we Move? Understanding the Human Body and Context Factors for User Identification. I M. Stolze, F. Loch, M. Baldauf, F. Alt, C. Schneegass, T. Kosch, T. Hirzle, S. Sadeghian, F. Draxler, K. Bektas, K. Lohan & P. Knierim (red.),
Proceedings of Mensch Und Computer 2023 (s. 127-137). Association for Computing Machinery.
https://doi.org/10.1145/3603555.3603574
Abdolmaleki, B.
, Khoshakhlagh, H. & Lipmaa, H. (2021).
Smooth Zero-Knowledge Hash Functions. I A. Adhikari, R. Küsters & B. Preneel (red.),
Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings: 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings (s. 510-535). Springer.
https://doi.org/10.1007/978-3-030-92518-5_23
Abboud, A., Backurs, A.
, Hansen, T. D., Williams, V. V. & Zamir, O. (2016).
Subtree isomorphism revisited. I
27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016 (Bind 2, s. 1256-1271). Association for Computing Machinery.
Abate, C.
, Haselwarter, P. G., Rivas, E., Muylder, A. V., Winterhalter, T., Hriţcu, C., Maillard, K.
& Spitters, B. (2021).
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq. I
Proceedings - 2021 IEEE 34th Computer Security Foundations Symposium, CSF 2021 IEEE.
https://doi.org/10.1109/CSF51468.2021.00048