Jensen, C. S. (Ed.), Jermaine, C., Zhou, X. (Ed.), Kotagiri, R. (Ed.) & Ooi, B. C. (Ed.) (2013).
Message from the ICDE 2013 Program Committee and General. In
2013 IEEE 29th International Conference on Data Engineering (ICDE), : Australia, April 8–11, 2013 (pp. i-ii). IEEE Communications Society.
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6530811
Frederiksen, T. K., Jakobsen, T. P., Nielsen, J. B., Nordholt, P. S. & Orlandi, C. (2013).
MiniLEGO: Efficient secure two-party computation from general assumptions. In T. Johansson & P. Q. Nguyen (Eds.),
Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (pp. 537-556). Springer VS.
https://doi.org/10.1007/978-3-642-38348-9_32
Sergey, I., Devriese, D., Might, M.
, Midtgaard, J., Darais, D., Clarke, D. & Piessens, F. (2013).
Monadic abstract interpreters. In H.-J. Boehm (Ed.),
Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '13 (pp. 399-410). Association for Computing Machinery.
https://doi.org/10.1145/2491956.2491979
Alamdari, S., Angelini, P., Chan, T. M., Di Battista, G., Frati, F., Lubiw, A., Patrignani, M., Roselli, V., Singla, S.
& Wilkinson, B. T. (2013).
Morphing Planar Graph Drawings with a Polynomial Number of Steps.
The Annual A C M - S I A M Symposium on Discrete Algorithms. Proceedings,
24, 1656-1667.
http://knowledgecenter.siam.org/0236-000137/0236-000137/1
Arge, L., Fischer, J., Sanders, P. & Sitchinava, N. (2013).
On (dynamic) range minimum queries in external memory. In F. Dehne, R. Solis-Oba & J.-R. Sack (Eds.),
Algorithms and Data Structures: 13th International Symposium, WADS 2013, London, ON, Canada, August 12-14, 2013. Proceedings (pp. 37-48). Springer VS.
https://doi.org/10.1007/978-3-642-40104-6_4
Blunck, H., Bouvin, N. O., Franke, T.
, Grønbæk, K., Kjærgaard, M. B., Lukowicz, P.
& Wüstenberg, M. (2013).
On Heterogeneity in Mobile Sensing Applications Aiming at Representative Data Collection. In F. Mattern & S. Santini (Eds.),
Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication, UbiComp '13 Adjunct (pp. 1087-1098 ). Association for Computing Machinery.
https://doi.org/10.1145/2494091.2499576
Müller-Lennert, M.
, Dupont-Dupuis, F., Szehr, O., Fehr, S. & Tomamichel, M. (2013).
On quantum Rényi entropies: A new generalization and some properties.
Journal of Mathematical Physics,
54(12), Article 122203.
https://doi.org/10.1063/1.4838856
Scheder, D. & Tan, L. Y. (2013).
On the average sensitivity and density of k-CNF formulas. In P. Prasad , S. Raskhodnikova, K. Jansen & J. D. P. Rolim (Eds.),
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques: 16th International Workshop, APPROX 2013, and 17th International Workshop, RANDOM 2013, Berkeley, CA, USA, August 21-23, 2013. Proceedings (pp. 683-698). Springer VS.
https://doi.org/10.1007/978-3-642-40328-6_47
Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013).
Outlier Detection with Space Transformation and Spectral Analysis. In C. Kamath, J. Dy, Z. Obradovic, J. Ghosh, S. Parthasarathy & Z.-H. Zhou (Eds.),
Proceedings of the 2013 SIAM International Conference on Data Mining, SDM (pp. 225-233). Society for Industrial and Applied Mathematics.
https://doi.org/10.1137/1.9781611972832.25
Faust, S., Hazay, C.
& Venturi, D. (2013).
Outsourced pattern matching. In F. V. Fomin (Ed.),
Automata, Languages, and Programming: 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II (pp. 545-556). Springer VS.
https://doi.org/10.1007/978-3-642-39212-2_48
Anderson, J. W. J., Haas, P. A., Mathieson, L.-A., Volynkin, V., Lyngsø, R.
, Tataru, P. & Hein, J. (2013).
Oxfold: Kinetic Folding of RNA using Stochastic Context-Free Grammars and Evolutionary Information.
Bioinformatics,
29(6), 704-710.
https://doi.org/10.1093/bioinformatics/btt050
Magnani, M. & Rossi, L. (2013).
Pareto distance for multi-layer network analysis. In A. M. Greenberg, W. G. Kennedy & N. D. Bos (Eds.),
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013. Proceedings (pp. 249-256). Springer VS.
https://doi.org/10.1007/978-3-642-37210-0_27
Damgård, I. B., Keller, M., Larraia , E.
, Pastro, V., Scholl, P. & Smart, N. P. (2013).
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits. In J. Crampton , S. Jajodia & K. Mayes (Eds.),
Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings (pp. 1-18 ). Springer VS.
https://doi.org/10.1007/978-3-642-40203-6_1
Assent, I., Domeniconi, C., Gullo, F., Tagarelli, A. & Zimek, A. (Eds.) (2013).
Proceedings of the 4th MultiClust Workshop on Multiple Clusterings, Multi-view Data, and Multi-source Knowledge-driven Clustering. Association for Computing Machinery.
http://dl.acm.org.ez.statsbiblioteket.dk:2048/citation.cfm?id=2501006&coll=DL&dl=ACM