Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




6436 Publications

2012 | Published | Journal Article | IST-REx-ID: 3262 | OA
Tkačik G, Walczak A, Bialek W. 2012. Optimizing information flow in small genetic networks. III. A self-interacting gene. Physical Review E statistical nonlinear and soft matter physics . 85(4), 041903.
[Preprint] View | DOI | Download Preprint (ext.) | WoS | arXiv
 
2012 | Published | Conference Paper | IST-REx-ID: 3265
Ion A, Carreira J, Sminchisescu C. 2012. Image segmentation by figure-ground composition into maximal cliques. ICCV: International Conference on Computer Vision, 6126486.
View | DOI
 
2012 | Published | Journal Article | IST-REx-ID: 3274
Rieckh G, Kreuzer W, Waubke H, Balazs P. 2012. A 2.5D-Fourier-BEM model for vibrations in a tunnel running through layered anisotropic soil. Engineering Analysis with Boundary Elements. 36(6), 960–967.
View | DOI | WoS
 
2012 | Published | Book Chapter | IST-REx-ID: 3277
de Vladar H, Chela Flores J. 2012.Can the evolution of multicellularity be anticipated in the exploration of the solar system? In: Life on Earth and other planetary bodies. Cellular Origin, Life in Extreme Habitats and Astrobiology, vol. 24, 387–405.
View | DOI
 
2012 | Published | Conference Paper | IST-REx-ID: 3279
Jain A, Pietrzak KZ, Tentes A. 2012. Hardness preserving constructions of pseudorandom functions. TCC: Theory of Cryptography Conference, LNCS, vol. 7194, 369–382.
View | DOI | Download None (ext.)
 
2012 | Published | Conference Paper | IST-REx-ID: 3280 | OA
Pietrzak KZ. 2012. Subspace LWE. TCC: Theory of Cryptography Conference, LNCS, vol. 7194, 548–563.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2012 | Published | Conference Paper | IST-REx-ID: 3281
Pietrzak KZ, Rosen A, Segev G. 2012. Lossy functions do not amplify well. TCC: Theory of Cryptography Conference, LNCS, vol. 7194, 458–475.
View | DOI | Download None (ext.)
 
2012 | Published | Conference Paper | IST-REx-ID: 3282 | OA
Dodis Y, Pietrzak KZ, Kiltz E, Wichs D. 2012. Message authentication, revisited. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 7237, 355–374.
[Submitted Version] View | Files available | DOI
 
2012 | Published | Journal Article | IST-REx-ID: 3289 | OA
Pereira A, Leite F, Brasil B, Soares Martins J, Torres A, Pimenta P, Souto Padrón T, Tranktman P, Ferreira P, Kroon E, Bonjardim C. 2012. A vaccinia virus-driven interplay between the MKK4/7-JNK1/2 pathway and cytoskeleton reorganization. Journal of Virology. 86(1), 172–184.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | WoS | PubMed | Europe PMC
 
2012 | Published | Journal Article | IST-REx-ID: 3310 | OA
Bendich P, Cabello S, Edelsbrunner H. 2012. A point calculus for interlevel set homology. Pattern Recognition Letters. 33(11), 1436–1444.
[Submitted Version] View | Files available | DOI | WoS
 
2012 | Published | Journal Article | IST-REx-ID: 3314
Chatterjee K, Majumdar R. 2012. Discounting and averaging in games across time scales. International Journal of Foundations of Computer Science. 23(3), 609–625.
View | DOI | WoS
 
2012 | Published | Journal Article | IST-REx-ID: 3317 | OA
Eggermann E, Bucurenciu I, Goswami S, Jonas PM. 2012. Nanodomain coupling between Ca(2+) channels and sensors of exocytosis at fast mammalian synapses. Nature Reviews Neuroscience. 13(1), 7–21.
[Submitted Version] View | Files available | DOI | WoS
 
2012 | Published | Journal Article | IST-REx-ID: 3331 | OA
Kerber M, Sagraloff M. 2012. A worst case bound for topology computation of algebraic curves. Journal of Symbolic Computation. 47(3), 239–258.
[Preprint] View | DOI | Download Preprint (ext.) | WoS | arXiv
 
2012 | Published | Conference Paper | IST-REx-ID: 3341 | OA
Chatterjee K. 2012. Robustness of structurally equivalent concurrent parity games. FoSSaCS: Foundations of Software Science and Computation Structures, LNCS, vol. 7213, 270–285.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 
2012 | Published | Conference Paper | IST-REx-ID: 1384 | OA
Beyer D, Henzinger TA, Keremoglu M, Wendler P. 2012. Conditional model checking: A technique to pass information between verifiers. Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering. FSE: Foundations of Software Engineering, 57.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 
2012 | Research Data Reference | IST-REx-ID: 13075 | OA
Lohse K, Barton NH, Stone G, Melika G. 2012. Data from: A likelihood-based comparison of population histories in a parasitoid guild, Dryad, 10.5061/DRYAD.0G0FS.
[Published Version] View | Files available | DOI | Download Published Version (ext.)
 
2012 | Published | Conference Paper | IST-REx-ID: 2048 | OA
Faust S, Pietrzak KZ, Schipper J. 2012. Practical leakage-resilient symmetric cryptography. Conference proceedings CHES 2012. CHES: Cryptographic Hardware and Embedded Systems, LNCS, vol. 7428, 213–232.
[Preprint] View | DOI | Download Preprint (ext.)
 
2012 | Published | Conference Paper | IST-REx-ID: 2049 | OA
Heyse S, Kiltz E, Lyubashevsky V, Paar C, Pietrzak KZ. 2012. Lapin: An efficient authentication protocol based on ring-LPN. Conference proceedings FSE 2012. FSE: Fast Software Encryption, LNCS, vol. 7549, 346–365.
[Preprint] View | DOI | Download Preprint (ext.)
 
2012 | Published | Book Chapter | IST-REx-ID: 10896
zur Nedden S, Doney AS, Frenguelli BG. 2012.The double-edged sword: Gaining Adenosine at the expense of ATP. How to balance the books. In: Adenosine. , 109–129.
View | DOI
 
2012 | Published | Conference Paper | IST-REx-ID: 10903
Bouajjani A, Dragoi C, Enea C, Sighireanu M. 2012. Accurate invariant checking for programs manipulating lists and arrays with infinite data. Automated Technology for Verification and Analysis. ATVA: Automated Technology for Verification and AnalysisLNCS, LNCS, vol. 7561, 167–182.
View | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: ISTA Annual Report

Export / Embed