Zhang, K., Zhou, J., Tao, D.
, Karras, P., Li, Q.
& Xiong, H. (2020).
Geodemographic Influence Maximization. In
KDD '20: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (pp. 2764-2774). Association for Computing Machinery.
https://doi.org/10.1145/3394486.3403327
Campanelli, M., Fiore, D., Greco, N., Kolonelos, D. & Nizzardo, L. (2020).
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage. In S. Moriai & H. Wang (Eds.),
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (pp. 3-35). Springer. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 12492 LNCS
https://doi.org/10.1007/978-3-030-64834-3_1
Abel, A., Cockx, J., Devriese, D.
, Timany, A. & Wadler, P. (2020).
Leibniz equality is isomorphic to Martin-Löf identity, parametrically.
Journal of Functional Programming,
30, [e17].
https://doi.org/10.1017/S0956796820000155
Deuber, D., Döttling, N.
, Magri, B., Malavolta, G. & Thyagarajan, S. A. K. (2020).
Minting Mechanism for Proof of Stake Blockchains. In M. Conti, J. Zhou, E. Casalicchio & A. Spognardi (Eds.),
Applied Cryptography and Network Security (pp. 315-334). Springer. Lecture Notes in Computer Science Vol. 12146
https://doi.org/10.1007/978-3-030-57808-4_16
Birkedal, L., Clouston, R., Mannaa, B., Ejlers Møgelberg, R., Pitts, A. M.
& Spitters, B. (2020).
Modal dependent type theory and dependent right adjoints.
Mathematical Structures in Computer Science,
30(2), 118-138.
https://doi.org/10.1017/S0960129519000197
Engemann, K., Svenning, J-C., Arge, L., Brandt, J., Geels, C., Mortensen, P. B., Plana-Ripoll, O., Tsirogiannis, C. & Pedersen, C. B. (2020).
Natural surroundings in childhood are associated with lower schizophrenia rates.
Schizophrenia Research,
216, 488-495.
https://doi.org/10.1016/j.schres.2019.10.012
Brandt, M.
, Orlandi, C., Shrishak, K. & Shulman, H. (2020).
Optimal Transport Layer for Secure Computation. In P. Samarati, S. D. C. D. Vimercati, M. S. Obaidat & J. Ben-Othman (Eds.),
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 (Vol. Volume 3: SECRYPT, pp. 130-141). SCITEPRESS Digital Library.
https://doi.org/10.5220/0009826801300141
Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R.
& Pavlogiannis, A. (2020).
Optimal and Perfectly Parallel Algorithms for On-demand Data-Flow Analysis. In P. Müller (Ed.),
Programming Languages and Systems- 29th European Symposium on Programming, ESOP 2020 held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings (pp. 112-140). Springer. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 12075
https://doi.org/10.1007/978-3-030-44914-8_5