Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
6293 Publications
2013 |
Published |
Journal Article |
IST-REx-ID: 2919 |
P. Baster et al., “SCF^TIR1 AFB-auxin signalling regulates PIN vacuolar trafficking and auxin fluxes during root gravitropism,” EMBO Journal, vol. 32, no. 2. Wiley-Blackwell, pp. 260–274, 2013.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
| PubMed | Europe PMC
2013 |
Published |
Journal Article |
IST-REx-ID: 2920 |
J. Compagnon and C.-P. J. Heisenberg, “Neurulation coordinating cell polarisation and lumen formation,” EMBO Journal, vol. 32, no. 1. Wiley-Blackwell, pp. 1–3, 2013.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
| PubMed | Europe PMC
2013 |
Published |
Journal Article |
IST-REx-ID: 2926
S. Tragust, B. Mitteregger, V. Barone, M. Konrad, L. V. Ugelvig, and S. Cremer, “Ants disinfect fungus-exposed brood by oral uptake and spread of their poison,” Current Biology, vol. 23, no. 1. Cell Press, pp. 76–82, 2013.
View
| Files available
| DOI
| WoS
2013 |
Published |
Journal Article |
IST-REx-ID: 2939
C. Chen and M. Kerber, “An output sensitive algorithm for persistent homology,” Computational Geometry: Theory and Applications, vol. 46, no. 4. Elsevier, pp. 435–447, 2013.
View
| Files available
| DOI
| WoS
2013 |
Published |
Conference Paper |
IST-REx-ID: 2940 |
S. Krenn, K. Z. Pietrzak, and A. Wadia, “A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it,” presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan, 2013, vol. 7785, pp. 23–39.
[Submitted Version]
View
| Files available
| DOI
2013 |
Published |
Journal Article |
IST-REx-ID: 2944
S. Aeschbacher, A. Futschik, and M. Beaumont, “Approximate Bayesian computation for modular inference problems with many parameters: the example of migration rates. ,” Molecular Ecology, vol. 22, no. 4. Wiley-Blackwell, pp. 987–1002, 2013.
View
| Files available
| DOI
| WoS
2013 |
Published |
Conference Paper |
IST-REx-ID: 2948 |
T. Tommasi, N. Quadrianto, B. Caputo, and C. Lampert, “Beyond dataset bias: Multi-task unaligned shared knowledge transfer,” vol. 7724. Springer, pp. 1–15, 2013.
[Submitted Version]
View
| Files available
| DOI
2013 |
Published |
Journal Article |
IST-REx-ID: 3261 |
J. Dubuis, G. Tkačik, E. Wieschaus, T. Gregor, and W. Bialek, “Positional information, in bits,” PNAS, vol. 110, no. 41. National Academy of Sciences, pp. 16301–16308, 2013.
[Published Version]
View
| Files available
| DOI
| WoS
| PubMed | Europe PMC
2013 |
Published |
Conference Paper |
IST-REx-ID: 1374 |
K. Chatterjee and N. Fijalkow, “Infinite-state games with finitary conditions,” in 22nd EACSL Annual Conference on Computer Science Logic, Torino, Italy, 2013, vol. 23, pp. 181–196.
[Published Version]
View
| Files available
| DOI
2013 |
Published |
Conference Paper |
IST-REx-ID: 1376 |
K. Chatterjee, T. A. Henzinger, J. Otop, and A. Pavlogiannis, “Distributed synthesis for LTL fragments,” in 13th International Conference on Formal Methods in Computer-Aided Design, Portland, OR, United States, 2013, pp. 18–25.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
2013 |
Published |
Conference Paper |
IST-REx-ID: 1385 |
G. Hofferek, A. Gupta, B. Könighofer, J. Jiang, and R. Bloem, “Synthesizing multiple boolean functions using interpolation on a single proof,” in 2013 Formal Methods in Computer-Aided Design, Portland, OR, United States, 2013, pp. 77–84.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2013 |
Published |
Conference Paper |
IST-REx-ID: 1387 |
U. Boker, D. Kuperberg, O. Kupferman, and M. Skrzypczak, “Nondeterminism in the presence of a diverse or unknown future,” vol. 7966, no. PART 2. Springer, pp. 89–100, 2013.
[Submitted Version]
View
| Files available
| DOI
2013 |
Published |
Thesis | PhD |
IST-REx-ID: 1405 |
D. Zufferey, “Analysis of dynamic message passing programs,” Institute of Science and Technology Austria, 2013.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
2013 |
Published |
Thesis | PhD |
IST-REx-ID: 1406
P. Campinho, “Mechanics of zebrafish epiboly: Tension-oriented cell divisions limit anisotropic tissue tension in epithelial spreading,” Institute of Science and Technology Austria, 2013.
View
2013 |
Published |
Conference Paper |
IST-REx-ID: 19995 |
K. Chatterjee and R. Ibsen-Jensen, “Strategy complexity of finite-horizon Markov decision processes and simple stochastic games,” in Mathematical and Engineering Methods in Computer Science, Znojmo, Czech Republic, 2013, vol. 7721, pp. 106–117.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2013 |
Published |
Conference Paper |
IST-REx-ID: 2000 |
J. Reiter, I. Božić, K. Chatterjee, and M. Nowak, “TTP: Tool for tumor progression,” in Proceedings of 25th Int. Conf. on Computer Aided Verification, St. Petersburg, Russia, 2013, vol. 8044, pp. 101–106.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
2013 |
Published |
Journal Article |
IST-REx-ID: 2009 |
C. Uhler, A. Slavkovic, and S. Fienberg, “Privacy-preserving data sharing for genome-wide association studies,” Journal of Privacy and Confidentiality , vol. 5, no. 1. Carnegie Mellon University, pp. 137–166, 2013.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2013 |
Published |
Journal Article |
IST-REx-ID: 2010 |
C. Uhler, G. Raskutti, P. Bühlmann, and B. Yu, “Geometry of the faithfulness assumption in causal inference,” The Annals of Statistics, vol. 41, no. 2. Institute of Mathematical Statistics, pp. 436–463, 2013.
[Published Version]
View
| DOI
| Download Published Version (ext.)
| WoS
| arXiv