Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
1850 Publications
2010 |Published| Conference Paper | IST-REx-ID: 10908 |
Blanc R, Henzinger TA, Hottelier T, Kovács L. 2010. ABC: Algebraic Bound Computation for loops. Logic for Programming, Artificial Intelligence, and Reasoning. LPAR: Conference on Logic for Programming, Artificial Intelligence and ReasoningLNCS vol. 6355, 103–118.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2010 |Published| Conference Paper | IST-REx-ID: 11754
Lang SB, Lashley JC, Modic KA, Fisher RA, Zhu WM, Ye ZG. 2010. Specific heat of a ferroelectric PZT ceramic at the morphotropic phase boundary. 15th IEEE Mediterranean Electrotechnical Conference. MELECON: Mediterranean Electrotechnical Conference, 5476345.
View
| Files available
| DOI
2010 |Published| Conference Paper | IST-REx-ID: 11797 |
Feldman J, Henzinger MH, Korula N, Mirrokni VS, Stein C. 2010. Online stochastic packing applied to display ad allocation. 18th Annual European Symposium on Algorithms. ESA: European Symposium on Algorithms, LNCS, vol. 6346, 182–194.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2010 |Published| Conference Paper | IST-REx-ID: 11838 |
Dütting P, Henzinger MH, Weber I. 2010. Sponsored search, market equilibria, and the Hungarian Method. 27th International Symposium on Theoretical Aspects of Computer Science. STACS: Symposium on Theoretical Aspects of Computer Science, LIPIcs, vol. 5, 287–298.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
| arXiv
2010 |Published| Journal Article | IST-REx-ID: 1465 |
Hausel T. 2010. Kac’s conjecture from Nakajima quiver varieties. Inventiones Mathematicae. 181(1), 21–37.
View
| DOI
| Download (ext.)
2010 |Published| Journal Article | IST-REx-ID: 1753 |
Songmuang R, Katsaros G, Monroy E, Spathis P, Bougerol C, Mongillo M, De Franceschi S. 2010. Quantum transport in GaN/AlN double-barrier heterostructure nanowires. Nano Letters. 10(9), 3545–3550.
View
| DOI
| Download (ext.)
2010 |Published| Journal Article | IST-REx-ID: 2311
Rickheit G, Wartosch L, Schaffer S, Stobrawa S, Novarino G, Weinert S, Jentsch T. 2010. Role of ClC-5 in renal endocytosis is unique among ClC exchangers and does not require PY-motif-dependent ubiquitylation. Journal of Biological Chemistry. 285(23), 17595–17603.
View
| DOI
2010 |Published| Journal Article | IST-REx-ID: 2508
Atherton J, Kitano K, Baufreton J, Fan K, Wokosin D, Tkatch T, Shigemoto R, Surmeier J, Bevan M. 2010. Selective participation of somatodendritic HCN channels in inhibitory but not excitatory synaptic integration in neurons of the subthalamic nucleus. Journal of Neuroscience. 30(47), 16025–16040.
View
| DOI
2010 |Published| Journal Article | IST-REx-ID: 2701 |
Erdös L, Schlein B, Yau H. 2010. Wegner estimate and level repulsion for Wigner random matrices. International Mathematics Research Notices. (3), 436–479.
View
| DOI
| Download (ext.)
2010 |Published| Journal Article | IST-REx-ID: 2763
Erdös L, Ramírez J, Schlein B, Tao T, Van V, Yau H. 2010. Bulk universality for Wigner Hermitian matrices with subexponential decay. Mathematical Research Letters. 17(4), 667–674.
View
2010 |Published| Conference Paper | IST-REx-ID: 2979 |
Almeida J, Bangerter E, Barbosa M, Krenn S, Sadeghi A, Schneider T. 2010. A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. ESORICS: European Symposium on Research in Computer Security, LNCS, vol. 6345, 151–167.
View
| DOI
| Download (ext.)
2010 |Published| Conference Paper | IST-REx-ID: 2980 |
Bangerter E, Briner T, Henecka W, Krenn S, Sadeghi A, Schneider T. 2010. Automatic Generation of Sigma-Protocols. EuroPKI: Public Key Infrastructures, Services and Applications, LNCS, vol. 6391, 67–82.
View
| DOI
| Download (ext.)
2010 |Published| Conference Paper | IST-REx-ID: 2978 |
Bangerter E, Camenisch J, Krenn S. 2010. Efficiency Limitations for Σ-Protocols for Group Homomorphisms. TCC: Theory of Cryptography Conference, LNCS, vol. 5978, 553–571.
View
| DOI
| Download (ext.)