Afshani, P., de Berg, M., Buchin, K., Gao, J., Löffler, M., Nayyeri, A., Raichel, B., Sarkar, R., Wang, H. & Yang, H. T. (2022).
On Cyclic Solutions to the Min-Max Latency Multi-Robot Patrolling Problem. In X. Goaoc & M. Kerber (Eds.),
38th International Symposium on Computational Geometry, SoCG 2022 Article 2 Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.SoCG.2022.2
Afshani, P., Cheng, P., Basu Roy, A. & Wei, Z. (2023).
On Range Summary Queries. In K. Etessami, U. Feige & G. Puppis (Eds.),
50th International Colloquium on Automata, Languages, and Programming (ICALP 2023) (pp. 7:1-7:17). Article 7 Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik GmbH.
https://doi.org/10.4230/LIPIcs.ICALP.2023.7
Aehnelt, M.
, Schulz, H.-J. & Urban, B. (2013).
Towards a Contextualized Visual Analysis of Heterogeneous Manufacturing Data. In
Advances in Visual Computing : 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part II (pp. 76-85). Springer.
https://doi.org/10.1007/978-3-642-41939-3_8
Adolf, J.
, Kán, P., Feuchtner, T., Adolfová, B., Doležal, J. & Lhotská, L. (2024).
Offistretch: camera-based real-time feedback for daily stretching exercises.
Visual Computer.
https://doi.org/10.1007/s00371-024-03450-y
Adamsen, C. Q., Møller, A., Karim, R., Sridharan, M., Tip, F. & Sen, K. (2017).
Repairing Event Race Errors by Controlling Nondeterminism. In
Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017 (pp. 289-299). Article 7985670 IEEE Press.
https://doi.org/10.1109/ICSE.2017.34
Adams, M. D., Keep, A. W.
, Midtgaard, J., Might, M., Chauhan, A. & Dybvig, R. K. (2011).
Flow-sensitive type recovery in linear-log time. In
Proceedings of the 2011 ACM international Conference on Object Oriented Programming Systems Languages and Applications: OOPSLA '11 (pp. 483-498). Association for Computing Machinery.
https://doi.org/10.1145/2048066.2048105
Ackerman, M., Ben-David, S.
, Branzei, S. & Loker, D. (2012).
Weighted Clustering. In
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence (pp. 858-863). AAAI Press.
Aceto, L.
, Damgård, I. B., Goldberg, L. A., Halldórsson, M. M., Ingólfsdóttir, A. & Walukiewicz, I. (2008).
Automata, Languages and Programming: 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II. Springer. Lecture Notes in Computer Science Vol. 5126
https://doi.org/10.1007/978-3-540-70583-3
Abspoel, M., Cramer, R.
, Damgård, I. B., Escudero Ospina, D. E. & Yuan, C. (2019).
Efficient Information-Theoretic Secure Multiparty Computation over Z/p^k Z via Galois Rings. In D. Hofheinz & A. Rosen (Eds.),
Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings: Proceedings (Vol. Part 1, pp. 471-501). Springer.
https://doi.org/10.1007/978-3-030-36030-6_19
Abspoel, M., Cramer, R.
, Damgård, I., Escudero, D., Rambaud, M., Xing, C. & Yuan, C. (2020).
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/pkZ. In S. Moriai & H. Wang (Eds.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings (Vol. III, pp. 151-180). Springer.
https://doi.org/10.1007/978-3-030-64840-4_6
Abspoel, M., Dalskov, A.
, Escudero Ospina, D. E. & Nof, A. (2021).
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings. In K. Sako & N. O. Tippenhauer (Eds.),
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Proceedings: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings (Vol. II, pp. 122-154). Springer.
https://doi.org/10.1007/978-3-030-78375-4_6
Abram, D., Beimel, A., Ishai, Y., Kushilevitz, E. & Narayanan, V. (2023).
Cryptography from Planted Graphs: Security with Logarithmic-Size Messages. Paper presented at Theory of Cryptography. TCC 2023, Taipei, Taiwan.
Abel, A., Cockx, J., Devriese, D.
, Timany, A. & Wadler, P. (2020).
Leibniz equality is isomorphic to Martin-Löf identity, parametrically.
Journal of Functional Programming,
30, Article e17.
https://doi.org/10.1017/S0956796820000155
Abe, M., Chase, M.
, David, B., Kohlweiss, M., Nishimaki, R. & Ohkubo, M. (2016).
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Journal of Cryptology,
29(4), 1-46.
https://doi.org/10.1007/s00145-015-9211-7
Abdul, A.
, Vermeulen, J., Wang, D., Lim, B. Y. & Kankanhalli, M. (2018).
Trends and Trajectories for Explainable, Accountable and Intelligible Systems: An HCI Research Agenda. In R. Mandryk & M. Hancock (Eds.),
CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI (pp. 582:1-582:18). Association for Computing Machinery.
https://doi.org/10.1145/3173574.3174156
Abdrabou, Y., Schütte, J., Shams, A.
, Pfeuffer, K., Buschek, D., Khamis, M. & Alt, F. (2022).
"Your Eyes Tell You Have Used This Password Before": Identifying Password Reuse from Gaze and Keystroke Dynamics. In
CHI 2022 - Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems Article 400 Association for Computing Machinery.
https://doi.org/10.1145/3491102.3517531
Abdrabou, Y., Mecke, L., Rivu, R., Prange, S., Nguyen, Q. D., Voigt, V., Alt, F.
& Pfeuffer, K. (2023).
How Unique do we Move? Understanding the Human Body and Context Factors for User Identification. In M. Stolze, F. Loch, M. Baldauf, F. Alt, C. Schneegass, T. Kosch, T. Hirzle, S. Sadeghian, F. Draxler, K. Bektas, K. Lohan & P. Knierim (Eds.),
Proceedings of Mensch Und Computer 2023 (pp. 127-137). Association for Computing Machinery.
https://doi.org/10.1145/3603555.3603574
Abdolmaleki, B.
, Khoshakhlagh, H. & Lipmaa, H. (2021).
Smooth Zero-Knowledge Hash Functions. In A. Adhikari, R. Küsters & B. Preneel (Eds.),
Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings: 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings (pp. 510-535). Springer.
https://doi.org/10.1007/978-3-030-92518-5_23
Abboud, A., Backurs, A.
, Hansen, T. D., Williams, V. V. & Zamir, O. (2016).
Subtree isomorphism revisited. In
27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016 (Vol. 2, pp. 1256-1271). Association for Computing Machinery.
Abate, C.
, Haselwarter, P. G., Rivas, E., Muylder, A. V., Winterhalter, T., Hriţcu, C., Maillard, K.
& Spitters, B. (2021).
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq. In
Proceedings - 2021 IEEE 34th Computer Security Foundations Symposium, CSF 2021 IEEE.
https://doi.org/10.1109/CSF51468.2021.00048