Frederiksen, T. K., Jakobsen, T. P., Nielsen, J. B., Nordholt, P. S. & Orlandi, C. (2013).
MiniLEGO: Efficient secure two-party computation from general assumptions. I T. Johansson & P. Q. Nguyen (red.),
Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (s. 537-556). Springer VS.
https://doi.org/10.1007/978-3-642-38348-9_32
Sergey, I., Devriese, D., Might, M.
, Midtgaard, J., Darais, D., Clarke, D. & Piessens, F. (2013).
Monadic abstract interpreters. I H.-J. Boehm (red.),
Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '13 (s. 399-410). Association for Computing Machinery.
https://doi.org/10.1145/2491956.2491979
Alamdari, S., Angelini, P., Chan, T. M., Di Battista, G., Frati, F., Lubiw, A., Patrignani, M., Roselli, V., Singla, S.
& Wilkinson, B. T. (2013).
Morphing Planar Graph Drawings with a Polynomial Number of Steps.
The Annual A C M - S I A M Symposium on Discrete Algorithms. Proceedings,
24, 1656-1667.
http://knowledgecenter.siam.org/0236-000137/0236-000137/1
Arge, L., Fischer, J., Sanders, P. & Sitchinava, N. (2013).
On (dynamic) range minimum queries in external memory. I F. Dehne, R. Solis-Oba & J.-R. Sack (red.),
Algorithms and Data Structures: 13th International Symposium, WADS 2013, London, ON, Canada, August 12-14, 2013. Proceedings (s. 37-48). Springer VS.
https://doi.org/10.1007/978-3-642-40104-6_4
Blunck, H., Bouvin, N. O., Franke, T.
, Grønbæk, K., Kjærgaard, M. B., Lukowicz, P.
& Wüstenberg, M. (2013).
On Heterogeneity in Mobile Sensing Applications Aiming at Representative Data Collection. I F. Mattern & S. Santini (red.),
Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication, UbiComp '13 Adjunct (s. 1087-1098 ). Association for Computing Machinery.
https://doi.org/10.1145/2494091.2499576
Müller-Lennert, M.
, Dupont-Dupuis, F., Szehr, O., Fehr, S. & Tomamichel, M. (2013).
On quantum Rényi entropies: A new generalization and some properties.
Journal of Mathematical Physics,
54(12), Artikel 122203.
https://doi.org/10.1063/1.4838856
Scheder, D. & Tan, L. Y. (2013).
On the average sensitivity and density of k-CNF formulas. I P. Prasad , S. Raskhodnikova, K. Jansen & J. D. P. Rolim (red.),
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques: 16th International Workshop, APPROX 2013, and 17th International Workshop, RANDOM 2013, Berkeley, CA, USA, August 21-23, 2013. Proceedings (s. 683-698). Springer VS.
https://doi.org/10.1007/978-3-642-40328-6_47
Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013).
Outlier Detection with Space Transformation and Spectral Analysis. I C. Kamath, J. Dy, Z. Obradovic, J. Ghosh, S. Parthasarathy & Z.-H. Zhou (red.),
Proceedings of the 2013 SIAM International Conference on Data Mining, SDM (s. 225-233). Society for Industrial and Applied Mathematics.
https://doi.org/10.1137/1.9781611972832.25
Faust, S., Hazay, C.
& Venturi, D. (2013).
Outsourced pattern matching. I F. V. Fomin (red.),
Automata, Languages, and Programming: 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II (s. 545-556). Springer VS.
https://doi.org/10.1007/978-3-642-39212-2_48
Anderson, J. W. J., Haas, P. A., Mathieson, L.-A., Volynkin, V., Lyngsø, R.
, Tataru, P. & Hein, J. (2013).
Oxfold: Kinetic Folding of RNA using Stochastic Context-Free Grammars and Evolutionary Information.
Bioinformatics,
29(6), 704-710.
https://doi.org/10.1093/bioinformatics/btt050
Magnani, M. & Rossi, L. (2013).
Pareto distance for multi-layer network analysis. I A. M. Greenberg, W. G. Kennedy & N. D. Bos (red.),
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013. Proceedings (s. 249-256). Springer VS.
https://doi.org/10.1007/978-3-642-37210-0_27
Damgård, I. B., Keller, M., Larraia , E.
, Pastro, V., Scholl, P. & Smart, N. P. (2013).
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits. I J. Crampton , S. Jajodia & K. Mayes (red.),
Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings (s. 1-18 ). Springer VS.
https://doi.org/10.1007/978-3-642-40203-6_1
Assent, I., Domeniconi, C., Gullo, F., Tagarelli, A. & Zimek, A. (red.) (2013).
Proceedings of the 4th MultiClust Workshop on Multiple Clusterings, Multi-view Data, and Multi-source Knowledge-driven Clustering. Association for Computing Machinery.
http://dl.acm.org.ez.statsbiblioteket.dk:2048/citation.cfm?id=2501006&coll=DL&dl=ACM
Arge, L. & Thorup, M. (2013).
RAM-Efficient External Memory Sorting. I L. Cai, S.-W. Cheng & T.-W. Lam (red.),
Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (s. 491-501 ). Springer VS.
https://doi.org/10.1007/978-3-642-45030-3_46
Dagdelen, Ö., Mohassel, P.
& Venturi, D. (2013).
Rate-limited secure function evaluation: Definitions and constructions. I K. Kurosawa & G. Hanaoka (red.),
Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings (Bind 7778 LNCS, s. 461-478). Springer VS.
https://doi.org/10.1007/978-3-642-36362-7_28