Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
4466 Publications
2014 | Research Data Reference | IST-REx-ID: 9741 |
Lagator M, Colegrave N, Neve P. 2014. Data from: Selection history and epistatic interactions impact dynamics of adaptation to novel environmental stresses, Dryad, 10.5061/dryad.85dn7.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
2014 | Research Data Reference | IST-REx-ID: 9747 |
Lagator M, Morgan A, Neve P, Colegrave N. 2014. Data from: Role of sex and migration in adaptation to sink environments, Dryad, 10.5061/dryad.s42n1.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
2014 | Research Data Reference | IST-REx-ID: 9752 |
Simmons K, Prentice J, Tkačik G, Homann J, Yee H, Palmer S, Nelson P, Balasubramanian V. 2014. Data from: Transformation of stimulus correlations by the retina, Dryad, 10.5061/dryad.246qg.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
2014 | Research Data Reference | IST-REx-ID: 9753 |
Tragust S, Ugelvig LV, Chapuisat M, Heinze J, Cremer S. 2014. Data from: Pupal cocoons affect sanitary brood care and limit fungal infections in ant colonies, Dryad, 10.5061/dryad.nc0gc.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 8044 |
Seiringer R. 2014. Structure of the excitation spectrum for many-body quantum systems. Proceeding of the International Congress of Mathematicans. ICM: International Congress of Mathematicans vol. 3, 1175–1194.
[Published Version]
View
| Download Published Version (ext.)
2014 | Published | Journal Article | IST-REx-ID: 10815 |
Hashimoto M, Morita H, Ueno N. 2014. Molecular and cellular mechanisms of development underlying congenital diseases. Congenital Anomalies. 54(1), 1–7.
View
| DOI
| Download None (ext.)
| PubMed | Europe PMC
2014 | Published | Conference Paper | IST-REx-ID: 10884 |
Aminof B, Jacobs S, Khalimov A, Rubin S. 2014. Parameterized model checking of token-passing systems. Verification, Model Checking, and Abstract Interpretation. VMCAI: Verifcation, Model Checking, and Abstract Interpretation, LNCS, vol. 8318, 262–281.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2014 | Published | Conference Paper | IST-REx-ID: 1507 |
Erdös L. 2014. Random matrices, log-gases and Hölder regularity. Proceedings of the International Congress of Mathematicians. ICM: International Congress of Mathematicians vol. 3, 214–236.
[Submitted Version]
View
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 1516 |
Bräunlich G, Hainzl C, Seiringer R. 2014. On the BCS gap equation for superfluid fermionic gases. Proceedings of the QMath12 Conference. QMath: Mathematical Results in Quantum Physics, 127–137.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2014 | Published | Journal Article | IST-REx-ID: 1629 |
Guerrero P, Jeschke S, Wimmer M, Wonka P. 2014. Edit propagation using geometric relationship functions. ACM Transactions on Graphics. 33(2), 15.
[Submitted Version]
View
| Files available
| DOI
2014 | Published | Journal Article | IST-REx-ID: 1375 |
Chatterjee K, Henzinger MH, Krinninger S, Loitzenbauer V, Raskin M. 2014. Approximating the minimum cycle mean. Theoretical Computer Science. 547(C), 104–116.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2014 | Published | Conference Paper | IST-REx-ID: 1392 |
Dragoi C, Henzinger TA, Veith H, Widder J, Zufferey D. 2014. A logic-based framework for verifying consensus algorithms. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS, vol. 8318, 161–181.
[Submitted Version]
View
| Files available
| DOI
2014 | Published | Conference Paper | IST-REx-ID: 1393 |
Gordon A, Henzinger TA, Nori A, Rajamani S. 2014. Probabilistic programming. Proceedings of the on Future of Software Engineering. FOSE: Future of Software Engineering, 167–181.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2014 | Draft | Working Paper | IST-REx-ID: 7038 |
Huszár K, Rolinek M. Playful Math - An introduction to mathematical games, IST Austria, 5p.
[Published Version]
View
| Files available
2014 | Published | Conference Paper | IST-REx-ID: 2905 |
Edelsbrunner H, Morozovy D. 2014. Persistent homology: Theory and practice. ECM: European Congress of Mathematics, 31–50.
[Submitted Version]
View
| Files available
| DOI
2014 | Published | Journal Article | IST-REx-ID: 3263 |
Tkačik G, Ghosh A, Schneidman E, Segev R. 2014. Adaptation to changes in higher-order stimulus statistics in the salamander retina. PLoS One. 9(1), e85841.
[Published Version]
View
| Files available
| DOI
2014 | Published | Conference Paper | IST-REx-ID: 2027 |
Brázdil T, Chatterjee K, Chmelik M, Forejt V, Kretinsky J, Kwiatkowska M, Parker D, Ujma M. 2014. Verification of markov decision processes using learning algorithms. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). ALENEX: Algorithm Engineering and Experiments, LNCS, vol. 8837, 98–114.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 1870 |
Henzinger TA, Otop J, Samanta R. 2014. Lipschitz robustness of finite-state transducers. Leibniz International Proceedings in Informatics, LIPIcs. FSTTCS: Foundations of Software Technology and Theoretical Computer Science, LIPIcs, vol. 29, 431–443.
[Published Version]
View
| Files available
| DOI
2014 | Published | Conference Paper | IST-REx-ID: 1702 |
Gupta A, Popeea C, Rybalchenko A. 2014. Generalised interpolation by solving recursion free-horn clauses. Electronic Proceedings in Theoretical Computer Science, EPTCS. HCVS: Horn Clauses for Verification and Synthesis, EPTCS, vol. 169, 31–38.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 2236 |
Jetchev D, Pietrzak KZ. 2014. How to fake auxiliary input. TCC: Theory of Cryptography Conference, LNCS, vol. 8349, 566–590.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)