Arge, L., Fischer, J., Sanders, P. & Sitchinava, N. (2013).
On (dynamic) range minimum queries in external memory. In F. Dehne, R. Solis-Oba & J.-R. Sack (Eds.),
Algorithms and Data Structures: 13th International Symposium, WADS 2013, London, ON, Canada, August 12-14, 2013. Proceedings (pp. 37-48). Springer VS.
https://doi.org/10.1007/978-3-642-40104-6_4
Blunck, H., Bouvin, N. O., Franke, T.
, Grønbæk, K., Kjærgaard, M. B., Lukowicz, P.
& Wüstenberg, M. (2013).
On Heterogeneity in Mobile Sensing Applications Aiming at Representative Data Collection. In F. Mattern & S. Santini (Eds.),
Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication, UbiComp '13 Adjunct (pp. 1087-1098 ). Association for Computing Machinery.
https://doi.org/10.1145/2494091.2499576
Müller-Lennert, M.
, Dupont-Dupuis, F., Szehr, O., Fehr, S. & Tomamichel, M. (2013).
On quantum Rényi entropies: A new generalization and some properties.
Journal of Mathematical Physics,
54(12), Article 122203.
https://doi.org/10.1063/1.4838856
Scheder, D. & Tan, L. Y. (2013).
On the average sensitivity and density of k-CNF formulas. In P. Prasad , S. Raskhodnikova, K. Jansen & J. D. P. Rolim (Eds.),
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques: 16th International Workshop, APPROX 2013, and 17th International Workshop, RANDOM 2013, Berkeley, CA, USA, August 21-23, 2013. Proceedings (pp. 683-698). Springer VS.
https://doi.org/10.1007/978-3-642-40328-6_47
Dang, X.-H., Micenková, B., Assent, I. & Ng, R. T. (2013).
Outlier Detection with Space Transformation and Spectral Analysis. In C. Kamath, J. Dy, Z. Obradovic, J. Ghosh, S. Parthasarathy & Z.-H. Zhou (Eds.),
Proceedings of the 2013 SIAM International Conference on Data Mining, SDM (pp. 225-233). Society for Industrial and Applied Mathematics.
https://doi.org/10.1137/1.9781611972832.25
Faust, S., Hazay, C.
& Venturi, D. (2013).
Outsourced pattern matching. In F. V. Fomin (Ed.),
Automata, Languages, and Programming: 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II (pp. 545-556). Springer VS.
https://doi.org/10.1007/978-3-642-39212-2_48
Anderson, J. W. J., Haas, P. A., Mathieson, L.-A., Volynkin, V., Lyngsø, R.
, Tataru, P. & Hein, J. (2013).
Oxfold: Kinetic Folding of RNA using Stochastic Context-Free Grammars and Evolutionary Information.
Bioinformatics,
29(6), 704-710.
https://doi.org/10.1093/bioinformatics/btt050
Magnani, M. & Rossi, L. (2013).
Pareto distance for multi-layer network analysis. In A. M. Greenberg, W. G. Kennedy & N. D. Bos (Eds.),
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013. Proceedings (pp. 249-256). Springer VS.
https://doi.org/10.1007/978-3-642-37210-0_27
Damgård, I. B., Keller, M., Larraia , E.
, Pastro, V., Scholl, P. & Smart, N. P. (2013).
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits. In J. Crampton , S. Jajodia & K. Mayes (Eds.),
Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings (pp. 1-18 ). Springer VS.
https://doi.org/10.1007/978-3-642-40203-6_1
Assent, I., Domeniconi, C., Gullo, F., Tagarelli, A. & Zimek, A. (Eds.) (2013).
Proceedings of the 4th MultiClust Workshop on Multiple Clusterings, Multi-view Data, and Multi-source Knowledge-driven Clustering. Association for Computing Machinery.
http://dl.acm.org.ez.statsbiblioteket.dk:2048/citation.cfm?id=2501006&coll=DL&dl=ACM
Arge, L. & Thorup, M. (2013).
RAM-Efficient External Memory Sorting. In L. Cai, S.-W. Cheng & T.-W. Lam (Eds.),
Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (pp. 491-501 ). Springer VS.
https://doi.org/10.1007/978-3-642-45030-3_46
Dagdelen, Ö., Mohassel, P.
& Venturi, D. (2013).
Rate-limited secure function evaluation: Definitions and constructions. In K. Kurosawa & G. Hanaoka (Eds.),
Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings (Vol. 7778 LNCS, pp. 461-478). Springer VS.
https://doi.org/10.1007/978-3-642-36362-7_28
Brucato, M., Derczynski, L., Llorens, H., Bontcheva, K.
& Jensen, C. S. (2013).
Recognising and Interpreting Named Temporal Expressions. In G. Angelova, K. Bontcheva & R. Mitkov (Eds.),
Proceedings of Recent Advances in Natural Language Processing (pp. 113-122). INCOMA Ltd.
http://lml.bas.bg/ranlp2013/history.php
Thomsen, J. G., Clausen, C.
, Andersen, K. J., Danaher, J.
& Ernst, E. (2013).
Reducing Lookups for Invariant Checking. In G. Castagna (Ed.),
ECOOP 2013 – Object-Oriented Programming : 27th European Conference, Montpellier, France, July 1-5, 2013. Proceedings (pp. 426-450). Springer VS.
https://doi.org/10.1007/978-3-642-39038-8_18
Moon, B., Jun, J. Y., Lee, J., Kim, K.
, Hachisuka, T. & Yoon , S. E. (2013).
Robust Image Denoising using a Virtual Flash Image for Monte Carlo Ray Tracing.
Computer Graphics Forum,
32(1), 139–151.
https://doi.org/10.1111/cgf.12004
Lipmaa, H.
& Toft, T. (2013).
Secure equality and greater-than tests with sublinear online complexity. In F. V. Fomin , R. Freivalds, M. Kwiatkowska & D. Peleg (Eds.),
Automata, Languages, and Programming: Proceedings, 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Part II (pp. 645-656). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-39212-2_56
Banerjee, A.
, Danvy, O., Doh, K.-G. & Hatcliff , J. (Eds.) (2013).
Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday : Festschrift for Dave Schmidt, Manhattan, Kansas, USA, 19-20th September 2013. http://published.eptcs.org/. Electronic Proceedings in Theoretical Computer Science Vol. 129
https://doi.org/10.4204/EPTCS.129