Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
1850 Publications
2013 |Published| Conference Paper | IST-REx-ID: 2517 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
S. Almagor, U. Boker, and O. Kupferman, “Formalizing and reasoning about quality,” vol. 7966, no. Part 2. Springer, pp. 15–27, 2013.
[Submitted Version]
View
| Files available
| DOI
2013 |Published| Conference Paper | IST-REx-ID: 2518 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
V. Kolmogorov, “The power of linear programming for finite-valued CSPs: A constructive characterization,” presented at the ICALP: Automata, Languages and Programming, Riga, Latvia, 2013, vol. 7965, no. 1, pp. 625–636.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
2013 |Published| Journal Article | IST-REx-ID: 2697 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
L. Erdös, A. Knowles, H. Yau, and J. Yin, “Delocalization and diffusion profile for random band matrices,” Communications in Mathematical Physics, vol. 323, no. 1. Springer, pp. 367–416, 2013.
View
| DOI
| Download (ext.)
2013 |Published| Journal Article | IST-REx-ID: 2781 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
L. Erdös, A. Knowles, H. Yau, and J. Yin, “Spectral statistics of Erdős-Rényi graphs I: Local semicircle law,” Annals of Probability, vol. 41, no. 3 B. Institute of Mathematical Statistics, pp. 2279–2375, 2013.
View
| DOI
| Download (ext.)
2013 |Published| Conference Paper | IST-REx-ID: 2819 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
K. Chatterjee and V. Prabhu, “Quantitative timed simulation functions and refinement metrics for real-time systems,” in Proceedings of the 16th International Conference on Hybrid Systems: Computation and Control, Philadelphia, PA USA, 2013, vol. 1, pp. 273–282.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2013 |Published| Journal Article | IST-REx-ID: 2837 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
L. Erdös, A. Knowles, H. Yau, and J. Yin, “The local semicircle law for a general class of random matrices,” Electronic Journal of Probability, vol. 18, no. 59. Institute of Mathematical Statistics, pp. 1–58, 2013.
[Published Version]
View
| Files available
| DOI
2013 |Published| Journal Article | IST-REx-ID: 2836 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
K. Chatterjee and V. Raman, “Assume-guarantee synthesis for digital contract signing,” Formal Aspects of Computing, vol. 26, no. 4. Springer, pp. 825–859, 2013.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2013 |Published| Conference Paper | IST-REx-ID: 2843
H. Edelsbrunner and F. Pausinger, “Stable length estimates of tube-like shapes,” in 17th IAPR International Conference on Discrete Geometry for Computer Imagery, Seville, Spain, 2013, vol. 7749, pp. XV–XIX.
View
| Files available
| DOI
2013 |Published| Conference Paper | IST-REx-ID: 2886 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
M. Chmelik and V. Řehák, “Controllable-choice message sequence graphs,” vol. 7721. Springer, pp. 118–130, 2013.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2013 |Published| Conference Paper | IST-REx-ID: 2940 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
S. Krenn, K. Z. Pietrzak, and A. Wadia, “A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it,” presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan, 2013, vol. 7785, pp. 23–39.
[Submitted Version]
View
| Files available
| DOI
2013 |Published| Conference Paper | IST-REx-ID: 2948 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
T. Tommasi, N. Quadrianto, B. Caputo, and C. Lampert, “Beyond dataset bias: Multi-task unaligned shared knowledge transfer,” vol. 7724. Springer, pp. 1–15, 2013.
[Submitted Version]
View
| Files available
| DOI
2013 |Published| Conference Paper | IST-REx-ID: 2973 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
E. Bangerter, S. Barzan, S. Krenn, A. Sadeghi, T. Schneider, and J. Tsay, “Bringing Zero-Knowledge Proofs of Knowledge to Practice,” presented at the SPW: Security Protocols Workshop, 2013, vol. 7028, pp. 51–62.
View
| DOI
| Download (ext.)
2013 |Published| Journal Article | IST-REx-ID: 352
D. Cadavid, M. Ibáñez, A. Shavel, O. Durá, M. López De La Torre, and A. Cabot, “Organic ligand displacement by metal salts to enhance nanoparticle functionality: Thermoelectric properties of Ag inf 2 inf Te,” Journal of Materials Chemistry A, vol. 1, no. 15. Royal Society of Chemistry, pp. 4864–4870, 2013.
View
| DOI
2013 |Published| Journal Article | IST-REx-ID: 501 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
M. Cozzuol et al., “A new species of tapir from the Amazon,” Journal of Mammalogy, vol. 94, no. 6. Oxford University Press, pp. 1331–1345, 2013.
[Published Version]
View
| Files available
| DOI