Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
1481 Publications
2014 |Published| Journal Article | IST-REx-ID: 1920 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
W. Wang et al., “Distinct cerebellar engrams in short-term and long-term motor learning,” PNAS, vol. 111, no. 1. National Academy of Sciences, pp. E188–E193, 2014.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Journal Article | IST-REx-ID: 1935 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
A. Giuliani, É. Lieb, and R. Seiringer, “Formation of stripes and slabs near the ferromagnetic transition,” Communications in Mathematical Physics, vol. 331. Springer, pp. 333–350, 2014.
[Published Version]
View
| Files available
| DOI
| arXiv
2014 |Published| Journal Article | IST-REx-ID: 2019 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
L. Erdös and D. J. Schröder, “Phase transition in the density of states of quantum spin glasses,” Mathematical Physics, Analysis and Geometry, vol. 17, no. 3–4. Springer, pp. 441–464, 2014.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Journal Article | IST-REx-ID: 2031 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
itaru Arai and P. M. Jonas, “Nanodomain coupling explains Ca^2+ independence of transmitter release time course at a fast central synapse,” eLife, vol. 3. eLife Sciences Publications, 2014.
[Submitted Version]
View
| Files available
| DOI
2014 |Published| Journal Article | IST-REx-ID: 2028 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
K. Bodova, D. Paydarfar, and D. Forger, “Characterizing spiking in noisy type II neurons,” Journal of Theoretical Biology, vol. 365. Academic Press, pp. 40–54, 2014.
[Published Version]
View
| Files available
| DOI
2014 |Published| Conference Paper | IST-REx-ID: 2045 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
D. Dachman Soled, G. Fuchsbauer, P. Mohassel, and A. O’Neill, “Enhanced chosen-ciphertext security and applications,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Buenos Aires, Argentina, 2014, vol. 8383, pp. 329–344.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Conference Paper | IST-REx-ID: 2046 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
M. Bellare and G. Fuchsbauer, “Policy-based signatures,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Buenos Aires, Argentina, 2014, vol. 8383, pp. 520–537.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Journal Article | IST-REx-ID: 2050 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
J. Kühnen, M. Holzner, B. Hof, and H. Kuhlmann, “Experimental investigation of transitional flow in a toroidal pipe,” Journal of Fluid Mechanics, vol. 738. Cambridge University Press, pp. 463–491, 2014.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| arXiv
2014 |Published| Journal Article | IST-REx-ID: 2133 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
E. Carlen and J. Maas, “An analog of the 2-Wasserstein metric in non-commutative probability under which the fermionic Fokker-Planck equation is gradient flow for the entropy,” Communications in Mathematical Physics, vol. 331, no. 3. Springer, pp. 887–926, 2014.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Journal Article | IST-REx-ID: 2154 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
J. Matoušek and U. Wagner, “On Gromov’s method of selecting heavily covered points,” Discrete & Computational Geometry, vol. 52, no. 1. Springer, pp. 1–33, 2014.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Journal Article | IST-REx-ID: 2174 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
H. De Vladar and N. H. Barton, “Stability and response of polygenic traits to stabilizing selection and mutation,” Genetics, vol. 197, no. 2. Genetics Society of America, pp. 749–767, 2014.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Conference Paper | IST-REx-ID: 2185 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Y. Dodis, K. Z. Pietrzak, and D. Wichs, “Key derivation without entropy waste,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, 2014, vol. 8441, pp. 93–110.
[Submitted Version]
View
| Files available
| DOI
2014 |Published| Journal Article | IST-REx-ID: 2184 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
M. Čadek, M. Krcál, J. Matoušek, F. Sergeraert, L. Vokřínek, and U. Wagner, “Computing all maps into a sphere,” Journal of the ACM, vol. 61, no. 3. ACM, 2014.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2014 |Published| Journal Article | IST-REx-ID: 2186 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
T. Chen, C. Hainzl, N. Pavlović, and R. Seiringer, “On the well-posedness and scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti,” Letters in Mathematical Physics, vol. 104, no. 7. Springer, pp. 871–891, 2014.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Journal Article | IST-REx-ID: 2229 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
N. Vyleta and P. M. Jonas, “Loose coupling between Ca^2+ channels and release sensors at a plastic hippocampal synapse,” Science, vol. 343, no. 6171. American Association for the Advancement of Science, pp. 665–670, 2014.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Conference Paper | IST-REx-ID: 2236 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
D. Jetchev and K. Z. Pietrzak, “How to fake auxiliary input,” presented at the TCC: Theory of Cryptography Conference, San Diego, USA, 2014, vol. 8349, pp. 566–590.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)