Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
5146 Publications
2015 |Published| Conference Paper | IST-REx-ID: 1636 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
V. Kolmogorov, M. Rolinek, and R. Takhanov, “Effectiveness of structural restrictions for hybrid CSPs,” in 26th International Symposium, Nagoya, Japan, 2015, vol. 9472, pp. 566–577.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2015 |Published| Conference Paper | IST-REx-ID: 1632 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
R. Ando, N. Thuerey, and C. Wojtan, “A stream function solver for liquid simulations,” presented at the SIGGRAPH: Special Interest Group on Computer Graphics and Interactive Techniques, Los Angeles, CA, USA, 2015, vol. 34, no. 4.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1630 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
P. Guerrero, S. Jeschke, M. Wimmer, and P. Wonka, “Learning shape placements by example,” presented at the SIGGRAPH: Special Interest Group on Computer Graphics and Interactive Techniques, Los Angeles, CA, United States, 2015, vol. 34, no. 4.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Journal Article | IST-REx-ID: 1640 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
M. Šimášková et al., “Cytokinin response factors regulate PIN-FORMED auxin transporters,” Nature Communications, vol. 6. Nature Publishing Group, 2015.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Journal Article | IST-REx-ID: 1642 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
R. Fulek, J. Kynčl, I. Malinovič, and D. Pálvölgyi, “Clustered planarity testing revisited,” Electronic Journal of Combinatorics, vol. 22, no. 4. Electronic Journal of Combinatorics, 2015.
[Published Version]
View
| Files available
| DOI
| arXiv
2015 |Published| Journal Article | IST-REx-ID: 1639 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
J. Maas, M. Rumpf, C. Schönlieb, and S. Simon, “A generalized model for optimal transport of images including dissipation and density modulation,” ESAIM: Mathematical Modelling and Numerical Analysis, vol. 49, no. 6. EDP Sciences, pp. 1745–1769, 2015.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2015 |Published| Conference Paper | IST-REx-ID: 1646 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
A. Banerjee, G. Fuchsbauer, C. Peikert, K. Z. Pietrzak, and S. Stevens, “Key-homomorphic constrained pseudorandom functions,” in 12th Theory of Cryptography Conference, Warsaw, Poland, 2015, vol. 9015, pp. 31–60.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1648 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
G. Fuchsbauer, Z. Jafargholi, and K. Z. Pietrzak, “A quasipolynomial reduction for generalized selective decryption on trees,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, USA, 2015, vol. 9215, pp. 601–620.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1649 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
F. Benhamouda, S. Krenn, V. Lyubashevsky, and K. Z. Pietrzak, “Efficient zero-knowledge proofs for commitments from learning with errors over rings,” vol. 9326. Springer, pp. 305–325, 2015.
[Published Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1644 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
G. Demay, P. Gazi, U. Maurer, and B. Tackmann, “Query-complexity amplification for random oracles,” presented at the ICITS: International Conference on Information Theoretic Security, Lugano, Switzerland, 2015, vol. 9063, pp. 159–180.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1647 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
G. Fuchsbauer, C. Hanser, and D. Slamanig, “Practical round-optimal blind signatures in the standard model,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States, 2015, vol. 9216, pp. 233–253.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1654 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
P. Gazi, K. Z. Pietrzak, and S. Tessaro, “Generic security of NMAC and HMAC with input whitening,” vol. 9453. Springer, pp. 85–109, 2015.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1650 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
M. Skórski, A. Golovnev, and K. Z. Pietrzak, “Condensed unpredictability ,” presented at the ICALP: Automata, Languages and Programming, Kyoto, Japan, 2015, vol. 9134, pp. 1046–1057.
[Published Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1651 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
F. Baldimtsi, M. Chase, G. Fuchsbauer, and M. Kohlweiss, “Anonymous transferable e-cash,” in Public-Key Cryptography - PKC 2015, Gaithersburg, MD, United States, 2015, vol. 9020, pp. 101–124.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1652 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
J. F. Alwen and V. Serbinenko, “High parallel complexity graphs and memory-hard functions,” in Proceedings of the 47th annual ACM symposium on Theory of computing, Portland, OR, United States, 2015, pp. 595–603.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1658
S. Bogomolov, T. A. Henzinger, A. Podelski, J. Ruess, and C. Schilling, “Adaptive moment closure for parameter inference of biochemical reaction networks,” vol. 9308. Springer, pp. 77–89, 2015.
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1660 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
T. Brázdil, S. Kiefer, A. Kučera, and P. Novotný, “Long-run average behaviour of probabilistic vector addition systems,” presented at the LICS: Logic in Computer Science, Kyoto, Japan, 2015, pp. 44–55.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2015 |Published| Journal Article | IST-REx-ID: 1665 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Landau D, Tausch E, Taylor Weiner A, Stewart C, Reiter J, Bahlo J, Kluth S, Božić I, Lawrence M, Böttcher S, Carter S, Cibulskis K, Mertens D, Sougnez C, Rosenberg M, Hess J, Edelmann J, Kless S, Kneba M, Ritgen M, Fink A, Fischer K, Gabriel S, Lander E, Nowak M, Döhner H, Hallek M, Neuberg D, Getz G, Stilgenbauer S, Wu C. 2015. Mutations driving CLL and their evolution in progression and relapse. Nature. 526(7574), 525–530.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| PubMed | Europe PMC