Hansen, K. M. & Yndigegn, C. (1999).
Typed links in Webvise. Computer programme
Danvy, O. (1996).
Type-Directed Partial Evaluation. In
Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Papers Presented at the Symposium (pp. 242-257). Association for Computing Machinery.
Kondi, Y., Orlandi, C. & Roy, L. (2023).
Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions. In H. Handschuh & A. Lysyanskaya (Eds.),
Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part I (pp. 646-677). Springer.
https://doi.org/10.1007/978-3-031-38557-5_21
Damgård, I. B., Orlandi, C., Takahashi, A. & Tibouchi, M. (2021).
Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. In J. A. Garay (Ed.),
Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings: 24rd IACR International Conference on Practice and Theory of Public-Key Cryptography, proceedings part 1 (pp. 99-130). Springer.
https://doi.org/10.1007/978-3-030-75245-3_5
Garg, S.
& Polychroniadou, A. (2015).
Two-round adaptively secure MPC from indistinguishability obfuscation. In Y. Dodis & J. Buus Nielsen (Eds.),
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (pp. 614-637). Springer VS.
https://doi.org/10.1007/978-3-662-46497-7_24
Brodal, G. S., Davoodi, P., Lewenstein, M., Raman, R. & Rao, S. S. (2012).
Two Dimensional Range Minimum Queries and Fibonacci Lattices.
Lecture Notes in Computer Science,
7501, 217-228 .
https://doi.org/10.1007/978-3-642-33090-2_20
Stølting Brodal, G., Davoodi, P., Lewenstein, M., Raman, R.
& Satti, S. R. (2016).
Two dimensional range minimum queries and Fibonacci lattices.
Theoretical Computer Science,
638, 33-43.
https://doi.org/10.1016/j.tcs.2016.02.016
Boudol, G., Castellani, I., Hennessy, M.
, Nielsen, M. & Winskel, G. (2008).
Twenty Years on: Reflections on the CEDISYS Project: Combining True Concurrency with Process Algebra.
Lecture Notes in Computer Science,
5065, 757-777.
https://doi.org/10.1007/978-3-540-68679-8_47
Aarhus, R., Grönvall, E., Larsen, S. B. & Wollsen, S. (2011).
Turning training into play: embodied gaming, seniors, physical training and motivation.
Gerontechnology,
10(2), 110-120.
https://doi.org/10.4017/gt.2011.10.2.005.00
Caragiannis, I., Filos-Ratsikas, A.
, Frederiksen, S. K. S., Hansen, K. A. & Tan, Z. (2016).
Truthful facility assignment with resource augmentation: An exact analysis of serial dictatorship. In
Web and Internet Economics - 12th International Conference, WINE 2016, Proceedings (Vol. 10123, pp. 236-250). Springer VS.
https://doi.org/10.1007/978-3-662-54110-4_17
Caragiannis, I., Filos-Ratsikas, A., Frederiksen, S. K. S., Hansen, K. A. & Tan, Z. (2024).
Truthful facility assignment with resource augmentation: an exact analysis of serial dictatorship.
Mathematical Programming,
203(1-2), 901-930.
https://doi.org/10.1007/S10107-022-01902-8