Afshani, P., de Berg, M., Buchin, K., Gao, J., Löffler, M., Nayyeri, A., Raichel, B., Sarkar, R., Wang, H. & Yang, H. T. (2022).
On Cyclic Solutions to the Min-Max Latency Multi-Robot Patrolling Problem. In X. Goaoc & M. Kerber (Eds.),
38th International Symposium on Computational Geometry, SoCG 2022 Article 2 Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.SoCG.2022.2
Miltersen, P. B., Radhakrishnan, J. & Wegener, I. (2003).
On converting CNF to DNF. In B. Rovan & P. Vojtás (Eds.),
Mathematical Foundations of Computer Science 2003: 28th International Symposium, MFCS 2003, Bratislava, Slovakia, August 25-29, 2003, Proceedings (pp. 612-621). Springer.
https://doi.org/10.1007/978-3-540-45138-9_55
Klinc, D.
, Hazay, C., Jagmohan, A., Krawczyk, H. & Rabin, T. (2012).
On compression of data encrypted with block ciphers.
I E E E Transactions on Information Theory,
58(11), 6989-7001.
https://doi.org/10.1109/TIT.2012.2210752
Moad, S.
, Hansen, M. T., Jurdak, R., Kusy, B., Bouabdallah, N. & Ksentini, A. (2012).
On balancing between minimum energy and minimum delay with radio diversity for wireless sensor networks. In
2012 IFIP Wireless Days (WD) (pp. 1 - 6 ). IEEE Press.
https://doi.org/10.1109/WD.2012.6402840
Canetti, R.
, Damgård, I. B., Dziembowski, S., Ishai, Y. & Malkin, T. (2001).
On Adaptive vs. Non-adaptive Security of Multiparty Protocols. In B. Pfitzmann (Ed.),
Advances in Cryptology --- EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6-10, 2001 Proceedings (pp. 262-279). Springer.
https://doi.org/10.1007/3-540-44987-6_17
Adolf, J.
, Kán, P., Feuchtner, T., Adolfová, B., Doležal, J. & Lhotská, L. (2024).
Offistretch: camera-based real-time feedback for daily stretching exercises.
Visual Computer.
https://doi.org/10.1007/s00371-024-03450-y
Eskildsen, S., Iranzo, A.
, Stokholm, M., Staer, K., Ostergaard, K., Eroles, M.
, Otto, M., Svendsen, K., Pla, A., Vilas, D.
, Borghammer, P., Santamaria, J.
, Moller, A., Gaig, C.
, Brooks, D., Tolosa, E.
, Ostergaard, L. & Pavese, N. (2019).
Occurrence of brain capillary dysfunction in patients with REM sleep behavior disorder. S786-S787. Abstract from International Congress of Parkinson's Disease and Movement Disorders, Nice, France.
Mailund, T.
& Westergaard, M. (2004).
Obtaining Memory-Efficient Reachability Graph. In K. Jensen & A. Podelski (Eds.),
Tools and Algorithms for the Construction and Analysis of Systems: 10th International Conference, TACAS 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29 - April 2, 2004. Proceedings (pp. 177-191). Springer.
Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N.
& Scholl, P. (2023).
Oblivious Transfer with Constant Computational Overhead. In C. Hazay & M. Stam (Eds.),
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I (pp. 271-302). Springer.
https://doi.org/10.1007/978-3-031-30545-0_10
Damgård, I. B., Fehr, S.
, Salvail, L. & Schaffner, C. (2006).
Oblivious Transfer and Linear Functions. In C. Dwork (Ed.),
Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedings (pp. 427-444). Springer.
https://doi.org/10.1007/11818175_26