Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

4977 Publications


2012 | Conference Paper | IST-REx-ID: 2048 | OA
Faust S, Pietrzak KZ, Schipper J. Practical leakage-resilient symmetric cryptography. In: Conference Proceedings CHES 2012. Vol 7428. Springer; 2012:213-232. doi:10.1007/978-3-642-33027-8_13
[Preprint] View | DOI | Download Preprint (ext.)
 

2012 | Conference Paper | IST-REx-ID: 2049 | OA
Heyse S, Kiltz E, Lyubashevsky V, Paar C, Pietrzak KZ. Lapin: An efficient authentication protocol based on ring-LPN. In: Conference Proceedings FSE 2012. Vol 7549. Springer; 2012:346-365. doi:10.1007/978-3-642-34047-5_20
[Preprint] View | DOI | Download Preprint (ext.)
 

2012 | Journal Article | IST-REx-ID: 2263 | OA
Liang H, Hippenmeyer S, Ghashghaei H. A Nestin-cre transgenic mouse is insufficient for recombination in early embryonic neural progenitors. Biology open. 2012;1(12):1200-1203. doi:10.1242/bio.20122287
[Published Version] View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 2302
Henzinger TA, Mateescu M. The propagation approach for computing biochemical reaction networks. IEEE ACM Transactions on Computational Biology and Bioinformatics. 2012;10(2):310-322. doi:10.1109/TCBB.2012.91
View | DOI | PubMed | Europe PMC
 

2012 | Journal Article | IST-REx-ID: 2318 | OA
Seiringer R. Absence of bound states implies non-negativity of the scattering length. Journal of Spectral Theory. 2012;2(3):321-328. doi:10.4171/JST/31
[Preprint] View | DOI | Download Preprint (ext.)
 

2012 | Journal Article | IST-REx-ID: 2411 | OA
Ebersberger I, De Matos Simoes R, Kupczok A, et al. A consistent phylogenetic backbone for the fungi. Molecular Biology and Evolution. 2012;29(5):1319-1334. doi:10.1093/molbev/msr285
[Published Version] View | Files available | DOI
 

2012 | Conference Paper | IST-REx-ID: 2715 | OA
Chatterjee K, Joglekar M, Shah N. Average case analysis of the classical algorithm for Markov decision processes with Büchi objectives. In: Vol 18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2012:461-473. doi:10.4230/LIPIcs.FSTTCS.2012.461
[Published Version] View | Files available | DOI
 

2012 | Conference Paper | IST-REx-ID: 10904
Chatterjee K, Randour M, Raskin J-F. Strategy synthesis for multi-dimensional quantitative objectives. In: Koutny M, Ulidowski I, eds. CONCUR 2012 - Concurrency Theory. Vol 7454. Berlin, Heidelberg: Springer; 2012:115-131. doi:10.1007/978-3-642-32940-1_10
[Preprint] View | Files available | DOI | arXiv
 

2012 | Conference Paper | IST-REx-ID: 2825
Lampert C. Dynamic pruning of factor graphs for maximum marginal prediction. In: Vol 1. Neural Information Processing Systems; 2012:82-90.
View
 

2012 | Journal Article | IST-REx-ID: 2848 | OA
Chatterjee K, Zufferey D, Nowak M. Evolutionary game dynamics in populations with different learners. Journal of Theoretical Biology. 2012;301:161-173. doi:10.1016/j.jtbi.2012.02.021
[Submitted Version] View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 

2012 | Journal Article | IST-REx-ID: 2849 | OA
Edelsbrunner H, Strelkova N. On the configuration space of Steiner minimal trees. Russian Mathematical Surveys. 2012;67(6):1167-1168. doi:10.1070/RM2012v067n06ABEH004820
[Submitted Version] View | Files available | DOI
 

2012 | Conference Paper | IST-REx-ID: 2891 | OA
Boker U, Henzinger TA. Approximate determinization of quantitative automata. In: Leibniz International Proceedings in Informatics. Vol 18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2012:362-373. doi:10.4230/LIPIcs.FSTTCS.2012.362
[Published Version] View | Files available | DOI
 

2012 | Conference Paper | IST-REx-ID: 2890
Cerny P, Gopi S, Henzinger TA, Radhakrishna A, Totla N. Synthesis from incompatible specifications. In: Proceedings of the Tenth ACM International Conference on Embedded Software. ACM; 2012:53-62. doi:10.1145/2380356.2380371
View | DOI
 

2012 | Conference Paper | IST-REx-ID: 2888
Henzinger TA. Quantitative reactive models. In: Conference Proceedings MODELS 2012. Vol 7590. Springer; 2012:1-2. doi:10.1007/978-3-642-33666-9_1
View | DOI
 

2012 | Conference Paper | IST-REx-ID: 2903 | OA
Edelsbrunner H, Symonova O. The adaptive topology of a digital image. In: IEEE; 2012:41-48. doi:10.1109/ISVD.2012.11
[Submitted Version] View | Files available | DOI
 

2012 | Conference Paper | IST-REx-ID: 2916 | OA
Cerny P, Chmelik M, Henzinger TA, Radhakrishna A. Interface Simulation Distances. In: Electronic Proceedings in Theoretical Computer Science. Vol 96. EPTCS; 2012:29-42. doi:10.4204/EPTCS.96.3
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.) | arXiv
 

2012 | Journal Article | IST-REx-ID: 2917
de Vladar H. The game of active search for extra terrestrial intelligence Breaking the Great Silence . International Journal of Astrobiology. 2012;12(1):53-62. doi:10.1017/S1473550412000407
View | DOI
 

2012 | Conference Paper | IST-REx-ID: 2930 | OA
Huber A, Kolmogorov V. Towards minimizing k-submodular functions. In: Vol 7422. Springer; 2012:451-462. doi:10.1007/978-3-642-32147-4_40
[Preprint] View | DOI | Download Preprint (ext.)
 

2012 | Preprint | IST-REx-ID: 2928 | OA
Kolmogorov V, Schoenemann T. Generalized sequential tree-reweighted message passing. arXiv. 2012.
[Preprint] View | Download Preprint (ext.) | arXiv
 

2012 | Conference Paper | IST-REx-ID: 2937 | OA
Almeida J, Barbosa M, Bangerter E, Barthe G, Krenn S, Béguelin S. Full proof cryptography: Verifiable compilation of efficient zero-knowledge protocols. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM; 2012:488-500. doi:10.1145/2382196.2382249
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

Filters and Search Terms

extern<>1

Search

Filter Publications