Damgård, I. B., Keller, M., Larraia , E.
, Pastro, V., Scholl, P. & Smart, N. P. (2013).
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits. In J. Crampton , S. Jajodia & K. Mayes (Eds.),
Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings (pp. 1-18 ). Springer VS.
https://doi.org/10.1007/978-3-642-40203-6_1
Assent, I., Domeniconi, C., Gullo, F., Tagarelli, A. & Zimek, A. (Eds.) (2013).
Proceedings of the 4th MultiClust Workshop on Multiple Clusterings, Multi-view Data, and Multi-source Knowledge-driven Clustering. Association for Computing Machinery.
http://dl.acm.org.ez.statsbiblioteket.dk:2048/citation.cfm?id=2501006&coll=DL&dl=ACM
Arge, L. & Thorup, M. (2013).
RAM-Efficient External Memory Sorting. In L. Cai, S.-W. Cheng & T.-W. Lam (Eds.),
Algorithms and Computation: 24th International Symposium, ISAAC 2013, Hong Kong, China, December 16-18, 2013, Proceedings (pp. 491-501 ). Springer VS.
https://doi.org/10.1007/978-3-642-45030-3_46
Dagdelen, Ö., Mohassel, P.
& Venturi, D. (2013).
Rate-limited secure function evaluation: Definitions and constructions. In K. Kurosawa & G. Hanaoka (Eds.),
Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings (Vol. 7778 LNCS, pp. 461-478). Springer VS.
https://doi.org/10.1007/978-3-642-36362-7_28
Brucato, M., Derczynski, L., Llorens, H., Bontcheva, K.
& Jensen, C. S. (2013).
Recognising and Interpreting Named Temporal Expressions. In G. Angelova, K. Bontcheva & R. Mitkov (Eds.),
Proceedings of Recent Advances in Natural Language Processing (pp. 113-122). INCOMA Ltd.
http://lml.bas.bg/ranlp2013/history.php
Thomsen, J. G., Clausen, C.
, Andersen, K. J., Danaher, J.
& Ernst, E. (2013).
Reducing Lookups for Invariant Checking. In G. Castagna (Ed.),
ECOOP 2013 – Object-Oriented Programming : 27th European Conference, Montpellier, France, July 1-5, 2013. Proceedings (pp. 426-450). Springer VS.
https://doi.org/10.1007/978-3-642-39038-8_18
Moon, B., Jun, J. Y., Lee, J., Kim, K.
, Hachisuka, T. & Yoon , S. E. (2013).
Robust Image Denoising using a Virtual Flash Image for Monte Carlo Ray Tracing.
Computer Graphics Forum,
32(1), 139–151.
https://doi.org/10.1111/cgf.12004
Lipmaa, H.
& Toft, T. (2013).
Secure equality and greater-than tests with sublinear online complexity. In F. V. Fomin , R. Freivalds, M. Kwiatkowska & D. Peleg (Eds.),
Automata, Languages, and Programming: Proceedings, 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Part II (pp. 645-656). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-39212-2_56
Banerjee, A.
, Danvy, O., Doh, K.-G. & Hatcliff , J. (Eds.) (2013).
Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday : Festschrift for Dave Schmidt, Manhattan, Kansas, USA, 19-20th September 2013. http://published.eptcs.org/. Electronic Proceedings in Theoretical Computer Science Vol. 129
https://doi.org/10.4204/EPTCS.129
Xu, Y., Johnson, P. M., Moore, C. A.
, Brewer, R. S. & Takayama, J. (2013).
SGSEAM: Assessing serious game frameworks from a stakeholder experience perspective. In
Gamification 2013: Proceedings of the First International Conference on Gameful Design, Research, and Applications Enterprice Gamification Consultancy.
http://csdl.ics.hawaii.edu/techreports/2013/13-03/13-03.pdf
Andersen, E. S.
, Noe, K. Ø., Sørensen, T. S., Nielsen, S. K., LU, F., Paludan, M., Lindegaard, J. C. & Tanderup, K. (2013).
Simple DVH parameter addition as compared to deformable registration for bladder dose accumulation in cervix cancer brachytherapy.
Radiotherapy & Oncology,
107(1), 52-57.
https://doi.org/10.1016/j.radonc.2013.01.013
Magnani, M.
, Assent, I., Hornbæk, K., Jakobsen, M. R. & Larsen, K. F. (2013).
SkyView: a user evaluation of the skyline operator. In Q. He & A. Iyengar (Eds.),
Proceedings of the 22nd ACM International Conference on Information & Knowledge Management, CIKM '13 (pp. 2249-2254 ). Association for Computing Machinery.
https://doi.org/10.1145/2505515.2505739
Cozza, V., Messina, A., Montesi, D., Arietta, L.
& Magnani, M. (2013).
Spatio-temporal keyword queries in social networks. In B. Catania, G. Guerrini & J. Pokorný (Eds.),
Advances in Databases and Information Systems: 17th East European Conference, ADBIS 2013, Genoa, Italy, September 1-4, 2013. Proceedings (pp. 70-83). Springer Publishing Company.
https://doi.org/10.1007/978-3-642-40683-6_6
Hachisuka, T., Jarosz, W., Georgiev, I., Kaplanyan, A., Nowrouzezahrai, D. & Spencer, B. (2013).
State of the Art in Photon-Density Estimation: Course notes. In
Proceeding, SA '13 SIGGRAPH Asia 2013 Courses Association for Computing Machinery.
https://doi.org/10.1145/2542266.2542281
Ibsen-Jensen, R. & Chatterjee , K. (2013).
Strategy Complexity of Finite-Horizon Markov Decision Processes and Simple Stochastic Games. In A. Kučera , T. A. Henzinger, J. Nešetřil, T. Vojnar & D. Antoš (Eds.),
Mathematical and Engineering Methods in Computer Science: 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, 2012, Revised Selected Papers (pp. 106-117). Springer VS.
https://doi.org/10.1007/978-3-642-36046-6_11
Satyanarayan, A., Strazzulla, D.
, Klokmose, C. N., Beaudouin-Lafon, M. & Mackay, W. (2013).
The CHI 2013 interactive schedule. In W. E. Mackay, S. Brewster & S. Brewster (Eds.),
CHI EA '13 CHI '13 Extended Abstracts on Human Factors in Computing Systems (pp. 2987-2990). Association for Computing Machinery.
https://doi.org/10.1145/2468356.2479591
Hansen, T. D. & Ibsen-Jensen, R. (2013).
The complexity of interior point methods for solving discounted turn-based stochastic games. In
The Nature of Computation, Logic, Algorithms, Applications: 9th Conference on Computability in Europe, CiE 2013, Milan, Italy, July 1-5, 2013. Proceedings (pp. 252-262). Springer VS.
https://doi.org/10.1007/978-3-642-39053-1_29