Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5388 Publications


2014 | Draft | Working Paper | IST-REx-ID: 7038 | OA
K. Huszár and M. Rolinek, Playful Math - An introduction to mathematical games. IST Austria.
[Published Version] View | Files available
 

2014 | Published | Journal Article | IST-REx-ID: 2852
M. Fischlin, A. Lehmann, and K. Z. Pietrzak, “Robust multi-property combiners for hash functions,” Journal of Cryptology, vol. 27, no. 3. Springer, pp. 397–428, 2014.
View | Files available | DOI
 

2014 | Published | Conference Paper | IST-REx-ID: 2905 | OA
H. Edelsbrunner and D. Morozovy, “Persistent homology: Theory and practice,” presented at the ECM: European Congress of Mathematics, Kraków, Poland, 2014, pp. 31–50.
[Submitted Version] View | Files available | DOI
 

2014 | Published | Journal Article | IST-REx-ID: 3263 | OA
G. Tkačik, A. Ghosh, E. Schneidman, and R. Segev, “Adaptation to changes in higher-order stimulus statistics in the salamander retina,” PLoS One, vol. 9, no. 1. Public Library of Science, 2014.
[Published Version] View | Files available | DOI
 

2014 | Published | Conference Paper | IST-REx-ID: 2027 | OA
T. Brázdil et al., “Verification of markov decision processes using learning algorithms,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Sydney, Australia, 2014, vol. 8837, pp. 98–114.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 | Published | Conference Paper | IST-REx-ID: 1870 | OA
T. A. Henzinger, J. Otop, and R. Samanta, “Lipschitz robustness of finite-state transducers,” in Leibniz International Proceedings in Informatics, LIPIcs, Delhi, India, 2014, vol. 29, pp. 431–443.
[Published Version] View | Files available | DOI
 

2014 | Published | Conference Paper | IST-REx-ID: 2026
Z. Komárková and J. Kretinsky, “Rabinizer 3: Safraless translation of ltl to small deterministic automata,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Sydney, Australia, 2014, vol. 8837, pp. 235–241.
View | DOI
 

2014 | Published | Conference Paper | IST-REx-ID: 1869
G. Hofferek and A. Gupta, “Suraq - a controller synthesis tool using uninterpreted functions,” in HVC 2014, Haifa, Israel, 2014, vol. 8855, pp. 68–74.
View | DOI
 

2014 | Published | Conference Paper | IST-REx-ID: 1702 | OA
A. Gupta, C. Popeea, and A. Rybalchenko, “Generalised interpolation by solving recursion free-horn clauses,” in Electronic Proceedings in Theoretical Computer Science, EPTCS, Vienna, Austria, 2014, vol. 169, pp. 31–38.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 | Published | Conference Paper | IST-REx-ID: 1853
S. Jha, S. Tripakis, S. Seshia, and K. Chatterjee, “Game theoretic secure localization in wireless sensor networks,” presented at the IOT: Internet of Things, Cambridge, USA, 2014, pp. 85–90.
View | DOI
 

2014 | Published | Conference Paper | IST-REx-ID: 2236 | OA
D. Jetchev and K. Z. Pietrzak, “How to fake auxiliary input,” presented at the TCC: Theory of Cryptography Conference, San Diego, USA, 2014, vol. 8349, pp. 566–590.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2014 | Published | Conference Paper | IST-REx-ID: 2054
K. Chatterjee, “Qualitative concurrent parity games: Bounded rationality,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Rome, Italy, 2014, vol. 8704, pp. 544–559.
View | Files available | DOI
 

2014 | Published | Conference Paper | IST-REx-ID: 2053 | OA
H. Hermanns, J. Krčál, and J. Kretinsky, “Probabilistic bisimulation: Naturally on distributions,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Rome, Italy, 2014, vol. 8704, pp. 249–265.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 | Published | Journal Article | IST-REx-ID: 2225 | OA
A. Bloemendal, L. Erdös, A. Knowles, H. Yau, and J. Yin, “Isotropic local laws for sample covariance and generalized Wigner matrices,” Electronic Journal of Probability, vol. 19. Institute of Mathematical Statistics, 2014.
[Published Version] View | Files available | DOI
 

2014 | Published | Conference Paper | IST-REx-ID: 2052
B. Aminof, T. Kotek, S. Rubin, F. Spegni, and H. Veith, “Parameterized model checking of rendezvous systems,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Rome, Italy, 2014, vol. 8704, pp. 109–124.
View | DOI
 

2014 | Published | Journal Article | IST-REx-ID: 2232 | OA
B. Song and B. Hof, “Deterministic and stochastic aspects of the transition to turbulence,” Journal of Statistical Mechanics Theory and Experiment, vol. 2014, no. 2. IOP Publishing, 2014.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | arXiv
 

2014 | Published | Conference Paper | IST-REx-ID: 2190 | OA
J. Esparza and J. Kretinsky, “From LTL to deterministic automata: A safraless compositional approach,” presented at the CAV: Computer Aided Verification, 2014, vol. 8559, pp. 192–208.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 | Published | Conference Paper | IST-REx-ID: 2218 | OA
P. Cerny, T. A. Henzinger, A. Radhakrishna, L. Ryzhyk, and T. Tarrach, “Regression-free synthesis for concurrency,” presented at the CAV: Computer Aided Verification, Vienna, Austria, 2014, vol. 8559, pp. 568–584.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2014 | Published | Conference Paper | IST-REx-ID: 2162 | OA
K. Chatterjee and R. Ibsen-Jensen, “The complexity of ergodic mean payoff games,” presented at the ICST: International Conference on Software Testing, Verification and Validation, Copenhagen, Denmark, 2014, vol. 8573, no. Part 2, pp. 122–133.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2014 | Published | Conference Paper | IST-REx-ID: 2163 | OA
K. Chatterjee and L. Doyen, “Games with a weak adversary,” in Lecture Notes in Computer Science, Copenhagen, Denmark, 2014, vol. 8573, no. Part 2, pp. 110–121.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 

Filters and Search Terms

department=IST

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed