Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5995 Publications


2022 | Published | Conference Paper | IST-REx-ID: 11775 | OA
Henzinger TA, Mazzocchi NA, Sarac NE. 2022. Abstract monitors for quantitative specifications. 22nd International Conference on Runtime Verification. RV: Runtime Verification, LNCS, vol. 13498, 200–220.
[Published Version] View | Files available | DOI | WoS
 

2022 | Published | Journal Article | IST-REx-ID: 11442 | OA | PlanS
Piovarci M, Foshey M, Xu J, Erps T, Babaei V, Didyk P, Rusinkiewicz S, Matusik W, Bickel B. 2022. Closed-loop control of direct ink writing via reinforcement learning. ACM Transactions on Graphics. 41(4), 112.
[Submitted Version] View | Files available | DOI | WoS | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12010 | OA
Brunnbauer A, Berducci L, Brandstatter A, Lechner M, Hasani R, Rus D, Grosu R. 2022. Latent imagination facilitates zero-shot transfer in autonomous racing. 2022 International Conference on Robotics and Automation. ICRA: International Conference on Robotics and Automation, 7513–7520.
[Preprint] View | DOI | Download Preprint (ext.) | WoS | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 11839 | OA
Prach B, Lampert C. 2022. Almost-orthogonal layers for efficient general-purpose Lipschitz networks. Computer Vision – ECCV 2022. ECCV: European Conference on Computer Vision, LNCS, vol. 13681, 350–365.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | WoS | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 11185 | OA
Arroyo Guevara AM, Felsner S. 2022. Approximating the bundled crossing number. WALCOM 2022: Algorithms and Computation. WALCOM: Algorithms and ComputationLNCS vol. 13174, 383–395.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | WoS | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12011 | OA
Zhang Y, Jaggi S, Langberg M, Sarwate AD. 2022. The capacity of causal adversarial channels. 2022 IEEE International Symposium on Information Theory. ISIT: International Symposium on Information Theory vol. 2022, 2523–2528.
[Preprint] View | DOI | Download Preprint (ext.) | WoS | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12135 | OA
Chen B, Piovarci M, Wang C, Seidel H-P, Didyk P, Myszkowski K, Serrano A. 2022. Gloss management for consistent reproduction of real and virtual objects. SIGGRAPH Asia 2022 Conference Papers. SIGGRAPH: Computer Graphics and Interactive Techniques Conference vol. 2022, 35.
[Published Version] View | Files available | DOI | WoS
 

2022 | Published | Conference Paper | IST-REx-ID: 12017
Yadav AK, Alimohammadi M, Zhang Y, Budkuley AJ, Jaggi S. 2022. New results on AVCs with omniscient and myopic adversaries. 2022 IEEE International Symposium on Information Theory. ISIT: Internation Symposium on Information Theory vol. 2022, 2535–2540.
View | DOI | WoS
 

2022 | Published | Conference Paper | IST-REx-ID: 12013
Joshi P, Purkayastha A, Zhang Y, Budkuley AJ, Jaggi S. 2022. On the capacity of additive AVCs with feedback. 2022 IEEE International Symposium on Information Theory. ISIT: International Symposium on Information Theory vol. 2022, 504–509.
View | DOI | WoS
 

2022 | Published | Conference Paper | IST-REx-ID: 12016 | OA
Fathollahi D, Mondelli M. 2022. Polar coded computing: The role of the scaling exponent. 2022 IEEE International Symposium on Information Theory. ISIT: International Symposium on Information Theory vol. 2022, 2154–2159.
[Preprint] View | DOI | Download Preprint (ext.) | WoS | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12012 | OA
Torkamani S, Ebrahimi JB, Sadeghi P, D’Oliveira RGL, Médard M. 2022. Heterogeneous differential privacy via graphs. 2022 IEEE International Symposium on Information Theory. ISIT: International Symposium on Information Theory vol. 2022, 1623–1628.
[Preprint] View | DOI | Download Preprint (ext.) | WoS | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12018
Zhang Y, Vatedka S. 2022. Lower bounds on list decoding capacity using error exponents. 2022 IEEE International Symposium on Information Theory. ISIT: International Symposium on Information Theory vol. 2022, 1324–1329.
View | DOI | WoS
 

2022 | Published | Conference Paper | IST-REx-ID: 12015
Zhang Y, Vatedka S. 2022. Lower bounds for multiple packing. 2022 IEEE International Symposium on Information Theory. ISIT: International Symposium on Information Theory vol. 2022, 3085–3090.
View | DOI | WoS
 

2022 | Published | Conference Paper | IST-REx-ID: 12014
Zhang Y, Vatedka S. 2022. List-decodability of Poisson Point Processes. 2022 IEEE International Symposium on Information Theory. ISIT: International Symposium on Information Theory vol. 2022, 2559–2564.
View | DOI | WoS
 

2022 | Published | Conference Paper | IST-REx-ID: 12019
Polyanskii N, Zhang Y. 2022. List-decodable zero-rate codes for the Z-channel. 2022 IEEE International Symposium on Information Theory. ISIT: International Symposium on Information Theory vol. 2022, 2553–2558.
View | DOI | WoS
 

2022 | Published | Conference Paper | IST-REx-ID: 12298 | OA
Gelashvili R, Kokoris Kogias E, Sonnino A, Spiegelman A, Xiang Z. 2022. Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback. Financial Cryptography and Data Security. FC: Financial Cryptography, LNCS, vol. 13411, 296–315.
[Preprint] View | DOI | Download Preprint (ext.) | WoS | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12171 | OA
Garcia Soto M, Henzinger TA, Schilling C. 2022. Synthesis of parametric hybrid automata from time series. 20th International Symposium on Automated Technology for Verification and Analysis. ATVA: Automated Technology for Verification and Analysis, LNCS, vol. 13505, 337–353.
[Preprint] View | DOI | Download Preprint (ext.) | WoS | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12168 | OA
Cohen S, Gelashvili R, Kokoris Kogias E, Li Z, Malkhi D, Sonnino A, Spiegelman A. 2022. Be aware of your leaders. International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography and Data Security, LNCS, vol. 13411, 279–295.
[Preprint] View | DOI | Download Preprint (ext.) | WoS | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12167 | OA
Avarikioti G, Pietrzak KZ, Salem I, Schmid S, Tiwari S, Yeo MX. 2022. Hide & Seek: Privacy-preserving rebalancing on payment channel networks. Financial Cryptography and Data Security. FC: Financial Cryptography and Data Security, LNCS, vol. 13411, 358–373.
[Preprint] View | DOI | Download Preprint (ext.) | WoS | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12170
Meggendorfer T. 2022. PET – A partial exploration tool for probabilistic verification. 20th International Symposium on Automated Technology for Verification and Analysis. ATVA: Automated Technology for Verification and Analysis, LNCS, vol. 13505, 320–326.
View | DOI | WoS
 

Filters and Search Terms

extern<>1

Search

Filter Publications

Display / Sort

Citation Style: ISTA Annual Report

Export / Embed