Abe, M., Chase, M.
, David, B., Kohlweiss, M., Nishimaki, R. & Ohkubo, M. (2016).
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Journal of Cryptology,
29(4), 1-46.
https://doi.org/10.1007/s00145-015-9211-7
van Hellemond, I. E. G., Bouwmeester, S., Olson, C. W.
, Bøtker, H. E., Kaltoft, A. K., Nielsen, S. S., Terkelsen, C. J., Maynard, C., Andersen, M. P., Gorgels, A. P. M. & Wagner, G. S. (2011).
Consideration of QRS complex in addition to ST-segment abnormalities in the estimated "risk region" during acute anterior myocardial infarction.
Journal of Electrocardiology,
44(3), 370-6.
https://doi.org/10.1016/j.jelectrocard.2011.01.004
Beer, A., Draganov, A., Hohma, E., Jahn, P., Frey, C. M. M.
& Assent, I. (2023).
Connecting the Dots: Density-Connectivity Distance unifies DBSCAN, k-Center and Spectral Clustering. I
KDD 2023 : Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (s. 80-92). Association for Computing Machinery.
https://doi.org/10.1145/3580305.3599283
Rasmusson, A., Sørensen, T. S. & Ziegler, G. (2013).
Connected Components Labeling on the GPU with Generalization to Voronoi Diagrams and Signed Distance Fields. I G. Bebis et al. (red.),
Advances in Visual Computing: 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part I (s. 206-215). Springer VS.
https://doi.org/10.1007/978-3-642-41914-0_21
Damgård, I., Damgård, K., Nielsen, K.
, Nordholt, P. S. & Toft, T. (2017).
Confidential benchmarking based on multiparty computation. I J. Grossklags & B. Preneel (red.),
Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers (Bind 9603 LNCS, s. 169-187). Springer VS.
https://doi.org/10.1007/978-3-662-54970-4_10
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). I T. Peyrin & S. Galbraith (red.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Bind 11274, s. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4
Gronvall, E.
, Verdezoto, N., Bagalkot, N. L. & Sokoler, T. (2015).
Concordance: A Critical Participatory Alternative in Healthcare IT. I O. W. Bertelsen & K. Halskov (red.),
Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers. Department of Computer Science, Aarhus University.
https://doi.org/10.7146/aahcc.v1i1.21315
Jansson, J.
, Mampentzidis, K., Rajaby, R. & Sung, W.-K. (2019).
Computing the Rooted Triplet Distance between Phylogenetic Networks. I C. J. Colbourn, R. Grossi & N. Pisanti (red.),
Combinatorial Algorithms - 30th International Workshop, IWOCA 2019, Proceedings (s. 290-303). Springer.