Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
6326 Publications
2012 |
Published |
Journal Article |
IST-REx-ID: 3310 |
Bendich P, Cabello S, Edelsbrunner H. 2012. A point calculus for interlevel set homology. Pattern Recognition Letters. 33(11), 1436–1444.
[Submitted Version]
View
| Files available
| DOI
| WoS
2012 |
Published |
Journal Article |
IST-REx-ID: 3317 |
Eggermann E, Bucurenciu I, Goswami S, Jonas PM. 2012. Nanodomain coupling between Ca(2+) channels and sensors of exocytosis at fast mammalian synapses. Nature Reviews Neuroscience. 13(1), 7–21.
[Submitted Version]
View
| Files available
| DOI
| WoS
2012 |
Published |
Journal Article |
IST-REx-ID: 3331 |
Kerber M, Sagraloff M. 2012. A worst case bound for topology computation of algebraic curves. Journal of Symbolic Computation. 47(3), 239–258.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2012 |
Published |
Conference Paper |
IST-REx-ID: 3341 |
Chatterjee K. 2012. Robustness of structurally equivalent concurrent parity games. FoSSaCS: Foundations of Software Science and Computation Structures, LNCS, vol. 7213, 270–285.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
2012 |
Published |
Conference Paper |
IST-REx-ID: 1384 |
Beyer D, Henzinger TA, Keremoglu M, Wendler P. 2012. Conditional model checking: A technique to pass information between verifiers. Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering. FSE: Foundations of Software Engineering, 57.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2012 |
Research Data Reference |
IST-REx-ID: 13075 |
Lohse K, Barton NH, Stone G, Melika G. 2012. Data from: A likelihood-based comparison of population histories in a parasitoid guild, Dryad, 10.5061/DRYAD.0G0FS.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 2048 |
Faust S, Pietrzak KZ, Schipper J. 2012. Practical leakage-resilient symmetric cryptography. Conference proceedings CHES 2012. CHES: Cryptographic Hardware and Embedded Systems, LNCS, vol. 7428, 213–232.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 2049 |
Heyse S, Kiltz E, Lyubashevsky V, Paar C, Pietrzak KZ. 2012. Lapin: An efficient authentication protocol based on ring-LPN. Conference proceedings FSE 2012. FSE: Fast Software Encryption, LNCS, vol. 7549, 346–365.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 10903
Bouajjani A, Dragoi C, Enea C, Sighireanu M. 2012. Accurate invariant checking for programs manipulating lists and arrays with infinite data. Automated Technology for Verification and Analysis. ATVA: Automated Technology for Verification and AnalysisLNCS, LNCS, vol. 7561, 167–182.
View
| DOI
2012 |
Published |
Conference Paper |
IST-REx-ID: 10904 |
Chatterjee K, Randour M, Raskin J-F. 2012. Strategy synthesis for multi-dimensional quantitative objectives. CONCUR 2012 - Concurrency Theory. CONCUR: Conference on Concurrency Theory, LNCS, vol. 7454, 115–131.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
2012 |
Published |
Conference Paper |
IST-REx-ID: 10905 |
Chatterjee K, Henzinger M, Krinninger S, Nanongkai D. 2012. Polynomial-time algorithms for energy games with special weight structures. Algorithms – ESA 2012. ESA: European Symposium on Algorithms, LNCS, vol. 7501, 301–312.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
2012 |
Published |
Conference Paper |
IST-REx-ID: 10906 |
Grebenshchikov S, Gupta A, Lopes NP, Popeea C, Rybalchenko A. 2012. HSF(C): A software verifier based on Horn clauses. Tools and Algorithms for the Construction and Analysis of Systems. TACAS: Tools and Algorithms for the Construction and Analysis of SystemsLNCS, LNCS, vol. 7214, 549–551.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2012 |
Published |
Journal Article |
IST-REx-ID: 2263 |
Liang H, Hippenmeyer S, Ghashghaei H. 2012. A Nestin-cre transgenic mouse is insufficient for recombination in early embryonic neural progenitors. Biology open. 1(12), 1200–1203.
[Published Version]
View
| Files available
| DOI
| WoS
2012 |
Published |
Journal Article |
IST-REx-ID: 2302
Henzinger TA, Mateescu M. 2012. The propagation approach for computing biochemical reaction networks. IEEE ACM Transactions on Computational Biology and Bioinformatics. 10(2), 310–322.
View
| DOI
| WoS
| PubMed | Europe PMC
2012 |
Published |
Journal Article |
IST-REx-ID: 2318 |
Seiringer R. 2012. Absence of bound states implies non-negativity of the scattering length. Journal of Spectral Theory. 2(3), 321–328.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2012 |
Published |
Journal Article |
IST-REx-ID: 2411 |
Ebersberger I, De Matos Simoes R, Kupczok A, Gube M, Kothe E, Voigt K, Von Haeseler A. 2012. A consistent phylogenetic backbone for the fungi. Molecular Biology and Evolution. 29(5), 1319–1334.
[Published Version]
View
| Files available
| DOI
| WoS
2012 |
Research Data Reference |
IST-REx-ID: 9755 |
Konrad M, Vyleta M, Theis F, Stock M, Klatt M, Drescher V, Marr C, Ugelvig LV, Cremer S. 2012. Data from: Social transfer of pathogenic fungus promotes active immunisation in ant colonies, Dryad, 10.5061/dryad.sv37s.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
2012 |
Research Data Reference |
IST-REx-ID: 9757 |
Tragust S, Mitteregger B, Barone V, Konrad M, Ugelvig LV, Cremer S. 2012. Data from: Ants disinfect fungus-exposed brood by oral uptake and spread of their poison, Dryad, 10.5061/dryad.61649.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)