Giarrusso, P. G., Stefanesco, L.
, Timany, A., Birkedal, L. & Krebbers, R. (2020).
Scala step-by-step: Soundness for DOT with step-indexed logical relations in Iris.
Proceedings of the ACM on Programming Languages ,
4(ICFP), Artikel 114.
https://doi.org/10.1145/3408996
Damgård, I. B., Krøigaard, M., Ishai, Y.
, Nielsen, J. B. & Smith, A. (2008).
Scalable Multiparty Computation with Nearly Optimal Work and Resilience.
Lecture Notes in Computer Science,
5157, 241-261.
https://doi.org/10.1007/978-3-540-85174-5_14
Son, M. T., Amer-Yahia, S.
, Assent, I., Birk, M., Storgaard Dieu, M., Jacobsen, J. & Kristensen, J. (2019).
Scalable Interactive Dynamic Graph Clustering on Multicore CPUs.
IEEE Transactions on Knowledge and Data Engineering,
31(7), 1239-1252. Artikel 8340880.
https://doi.org/10.1109/TKDE.2018.2828086
Mai, S. T., Dieu, M. S.
, Assent, I., Jacobsen, J.
, Kristensen, J. & Birk, M. (2017).
Scalable and interactive graph clustering algorithm on multicore CPUs. I
2017 IEEE 33rd International Conference on Data Engineering (ICDE) (s. 349-360). IEEE Computer Society Press.
https://doi.org/10.1109/ICDE.2017.94
Blazy, O., Bossuat, A., Bultel, X., Fouque, P. A., Onete, C.
& Pagnin, E. (2019).
SAID: Reshaping signal into an identity-based asynchronous messaging protocol with authenticated ratcheting. I
Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019 (s. 294-309). Artikel 8806729 IEEE.
https://doi.org/10.1109/EuroSP.2019.00030
Bussard, L., Carver, L.
, Ernst, E., Jung, M., Robillard, M. & Speck, A. (2000).
Safe Aspect Composition. I G. Goos, J. Hartmanis, J. van Leeuwen, J. Malenfant, S. Moisan & A. Moreira (red.),
Object-Oriented Technology: ECOOP 2000 Workshop Reader ECOOP 2000 Workshops, Panels, and Posters Sophia Antipolis and Cannes, France, June 12–16, 2000 Proceedings (s. 205-210). Springer.
https://doi.org/10.1007/3-540-44555-2_16
Seisenberger, M., ter Beek, M. H., Fan, X., Ferrari, A., Haxthausen, A. E., James, P., Lawrence, A., Luttik, B.
, van de Pol, J. & Wimmer, S. (2022).
Safe and Secure Future AI-Driven Railway Technologies: Challenges for Formal Methods in Railway. I T. Margaria & B. Steffen (red.),
Leveraging Applications of Formal Methods, Verification and Validation. Practice - 11th International Symposium, ISoLA 2022, Proceedings (s. 246-268). Springer.
https://doi.org/10.1007/978-3-031-19762-8_20
Fitzi, M., Garay, J. A., Gollakota, S., Rangan, C. P. & Srinathan, K. (2006).
Round-optimal and Efficient Verifiable Secret Sharing. I S. Halevi & T. Rabin (red.),
Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006 Proceedings (s. 329-342). Springer.
https://doi.org/10.1007/11681878_17
Andersen, E. S., Contera, S. A.
, Knudsen, B., Damgaard, C. K., Besenbacher, F. & Kjems, J. (2004).
Role of the trans-activation response element in dimerization of HIV-1 RNA.
Journal of Biological Chemistry,
279(21), 22243-22249.
https://doi.org/10.1074/jbc.M314326200
Moon, B., Jun, J. Y., Lee, J., Kim, K.
, Hachisuka, T. & Yoon , S. E. (2013).
Robust Image Denoising using a Virtual Flash Image for Monte Carlo Ray Tracing.
Computer Graphics Forum,
32(1), 139–151.
https://doi.org/10.1111/cgf.12004
San-Segundo, R.
, Blunck, H., Moreno-Pimentel, J.
, Stisen, A. & Gil-Martín, M. (2018).
Robust Human Activity Recognition using smartwatches and smartphones.
Engineering Applications of Artificial Intelligence,
72(6), 190-202.
https://doi.org/10.1016/j.engappai.2018.04.002