Bellatreche, L., Dumas, M.
, Karras, P. & Matulevicius, R. (red.) (2021).
Advances in Databases and Information Systems: 25th European Conference, ADBIS 2021, Tartu, Estonia, August 24–26, 2021, Proceedings. Springer. Lecture Notes in Computer Science (LNCS) Bind 12843
https://doi.org/10.1007/978-3-030-82472-3
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I (Bind 10210). Springer VS.
https://doi.org/10.1007/978-3-319-56620-7
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II (Bind 10211). Springer VS.
https://doi.org/10.1007/978-3-319-56614-6
Coron, J.-S.
& Nielsen, J. B. (red.) (2017).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. I J.-S. Coron & J. Buus Nielsen (red.),
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III (Bind 10212). Springer VS.
https://doi.org/10.1007/978-3-319-56617-7
Johansen, K. E., Jørgensen, U. L., Nielsen, S. H., Nielsen, S. E.
& Skyum, S. (1988).
A distributed spanning tree algorithm. I J. van Leeuwen (red.),
Distributed Algorithms: 2nd International Workshop Amsterdam, The Netherlands, July 8–10, 1987 Proceedings (s. 1-12). Springer.
https://doi.org/10.1007/BFb0019790
Sølvsten, S. C., de Pol, J. V., Jakobsen, A. B. & Thomasen, M. W. B. (2022).
Adiar Binary Decision Diagrams in External Memory. I D. Fisman & G. Rosu (red.),
Tools and Algorithms for the Construction and Analysis of Systems - 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Proceedings (s. 295-313). Springer.
https://doi.org/10.1007/978-3-030-99527-0_16
Sølvsten, S. & van de Pol, J. (2023).
Adiar 1.1: Zero-Suppressed Decision Diagrams in External Memory. I K. Y. Rozier & S. Chaudhuri (red.),
NASA Formal Methods: 15th International Symposium, NFM 2023, Houston, TX, USA, May 16–18, 2023, Proceedings (s. 464-471). Springer.
https://doi.org/10.1007/978-3-031-33170-1_28
Filinski, A.
, Rohde, H. K. & Walukiewicz, I. (red.) (2004).
A Denotational Account of Untyped Normalization by Evaluation. I
Foundations of Software Science and Computation Structures: Proceedings of the 7th International Conference, FOSSACS 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004 (2987 udg., Bind Lecture Notes in Computer Science, s. 167-181). Springer.
Truica, C.-O., Apostol, E. S., Stefu, T.
& Karras, P. (2021).
A Deep Learning Architecture for Audience Interest Prediction of News Topic on Social Media. I Y. Velegrakis, D. Zeinalipour-Yazti, P. K. Chrysanthis & F. Guerra (red.),
Advances in Database Technology - EDBT 2021: 24th International Conference on Extending Database Technology, Proceedings (s. 588-599). openproceedings.org.
https://doi.org/10.5441/002/edbt.2021.69
Grønbæk, K., Reich, S., Wiil, U. K., Nürnberg, P. J., Anderson, K. M., Millard, D. E., Haake, J. M. & Davis, H. C. (1999).
Addressing Interoperability in Open Hypermedia: The Design of the Open Hypermedia Protocol.
New Review of Hypermedia and Multimedia,
5(1), 207-248.
https://doi.org/10.1080/13614569908914714
Cascudo Pueyo, I., Damgård, I. B., David, B. M., Giacomelli, I., Nielsen, J. B. & Trifiletti, R. (2015).
Additively Homomorphic UC commitments with Optimal Amortized Overhead. I J. Katz (red.),
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30-April 1, 2015, Proceedings (s. 495–515). Springer.
https://doi.org/10.1007/978-3-662-46447-2_22
Torgersen, M., Hansen, C. P.
, Ernst, E., Ahé, P. V. D., Bracha, G. & Gafter, N. M. (2004).
Adding Wildcards to the Java Programming Language. I
Proceedings of the 2004 ACM Symposium on Applied Computing (Bind 104042, s. 1289-1296). Association for Computing Machinery.
https://doi.org/10.1145/967900.968162
Torgersen, M., Hansen, C. P.
, Ernst, E., von der Ahé, P., Bracha, G. & Gafter, N. M. (2004).
Adding Wildcards to the Java Programming Language.
Journal of Object Technology,
3(11), 97-116.
https://doi.org/10.5381/jot.2004.3.11.a5
Allan, C., Avgustinov, P.
, Christensen, A. S., Hendren, L., Kuzins, S., Lhot´ak, O., de Moor, O., Sereni, D., Sittampalam, G. & Tibble, J. (2005).
Adding Trace Matching with Free Variables to AspectJ. I
Proc. 20th International Conference on Object-Oriented Programming Systems, Languages and Applications, OOPSLA 2005 (s. 345-364)
Nonnemann, L.
, Hogräfer, M., Röhlig, M., Schumann, H., Urban, B.
& Schulz, H.-J. (2022).
A Data-Driven Platform for the Coordination of Independent Visual Analytics Tools.
Computers & Graphics,
106, 152-160.
https://doi.org/10.1016/j.cag.2022.05.023
Damgård, I. B. & Nielsen, J. B. (2014).
Adaptive versus static security in the UC Model. I S. S. M. Chow , J. K. Liu, L. C. K. Hui & S. M. Yiu (red.),
Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (s. 10-28). Springer VS.
https://doi.org/10.1007/978-3-319-12475-9_2
Canetti, R.
, Damgård, I. B., Dziembowski, S., Ishai, Y. & Malkin, T. (2004).
Adaptive versus Non-Adaptive Security of Multi-Party Protocols.
Journal of Cryptology,
17(3), 153-207.
https://doi.org/10.1007/s00145-004-0135-x