Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

1790 Publications


2014 |Published| Journal Article | IST-REx-ID: 2022 | OA
P. Gao et al., “Deterministic progenitor behavior and unitary production of neurons in the neocortex,” Cell, vol. 159, no. 4. Cell Press, pp. 775–788, 2014.
[Published Version] View | Files available | DOI
 

2014 |Published| Journal Article | IST-REx-ID: 2021 | OA
J. William, S. Hippenmeyer, and L. Luo, “Dendrite morphogenesis depends on relative levels of NT-3/TrkC signaling,” Science, vol. 346, no. 6209. American Association for the Advancement of Science, pp. 626–629, 2014.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 |Published| Conference Paper | IST-REx-ID: 2027 | OA
T. Brázdil et al., “Verification of markov decision processes using learning algorithms,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Sydney, Australia, 2014, vol. 8837, pp. 98–114.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 |Published| Journal Article | IST-REx-ID: 2024 | OA
J. Toshima et al., “Bifurcation of the endocytic pathway into Rab5-dependent and -independent transport to the vacuole,” Nature Communications, vol. 5. Nature Publishing Group, 2014.
[Submitted Version] View | Files available | DOI
 

2014 |Published| Journal Article | IST-REx-ID: 2028 | OA
K. Bodova, D. Paydarfar, and D. Forger, “Characterizing spiking in noisy type II neurons,” Journal of Theoretical Biology, vol. 365. Academic Press, pp. 40–54, 2014.
[Published Version] View | Files available | DOI
 

2014 |Published| Conference Paper | IST-REx-ID: 2026
Z. Komárková and J. Kretinsky, “Rabinizer 3: Safraless translation of ltl to small deterministic automata,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Sydney, Australia, 2014, vol. 8837, pp. 235–241.
View | DOI
 

2014 |Published| Conference Paper | IST-REx-ID: 2045 | OA
D. Dachman Soled, G. Fuchsbauer, P. Mohassel, and A. O’Neill, “Enhanced chosen-ciphertext security and applications,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Buenos Aires, Argentina, 2014, vol. 8383, pp. 329–344.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 |Published| Book Chapter | IST-REx-ID: 2044 | OA
U. Bauer, M. Kerber, and J. Reininghaus, “Clear and Compress: Computing Persistent Homology in Chunks,” in Topological Methods in Data Analysis and Visualization III, P.-T. Bremer, I. Hotz, V. Pascucci, and R. Peikert, Eds. Springer, 2014, pp. 103–117.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 |Published| Conference Paper | IST-REx-ID: 2047 | OA
F. Yu, M. Rybar, C. Uhler, and S. Fienberg, “Differentially-private logistic regression for detecting multiple-SNP association in GWAS databases,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Ibiza, Spain, 2014, vol. 8744, pp. 170–184.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | arXiv
 

2014 |Published| Conference Paper | IST-REx-ID: 2053 | OA
H. Hermanns, J. Krčál, and J. Kretinsky, “Probabilistic bisimulation: Naturally on distributions,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Rome, Italy, 2014, vol. 8704, pp. 249–265.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 |Published| Conference Paper | IST-REx-ID: 2052
B. Aminof, T. Kotek, S. Rubin, F. Spegni, and H. Veith, “Parameterized model checking of rendezvous systems,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Rome, Italy, 2014, vol. 8704, pp. 109–124.
View | DOI
 

2014 |Published| Conference Paper | IST-REx-ID: 2046 | OA
M. Bellare and G. Fuchsbauer, “Policy-based signatures,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Buenos Aires, Argentina, 2014, vol. 8383, pp. 520–537.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 |Published| Conference Paper | IST-REx-ID: 2057 | OA
E. Morvant, A. Habrard, and S. Ayache, “Majority vote of diverse classifiers for late fusion,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Joensuu, Finland, 2014, vol. 8621, pp. 153–162.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2014 |Published| Journal Article | IST-REx-ID: 2064 | OA
M. Rubio, Y. Fukazawa, N. Kamasawa, C. Clarkson, E. Molnár, and R. Shigemoto, “Target- and input-dependent organization of AMPA and NMDA receptors in synaptic connections of the cochlear nucleus,” Journal of Comparative Neurology, vol. 522, no. 18. Wiley-Blackwell, pp. 4023–4042, 2014.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 |Published| Conference Paper | IST-REx-ID: 2153 | OA
U. Bauer and M. Lesnick, “Induced matchings of barcodes and the algebraic stability of persistence,” in Proceedings of the Annual Symposium on Computational Geometry, Kyoto, Japan, 2014, pp. 355–364.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 |Published| Conference Paper | IST-REx-ID: 2171 | OA
A. Kolesnikov, M. Guillaumin, V. Ferrari, and C. Lampert, “Closed-form approximate CRF training for scalable image segmentation,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Zurich, Switzerland, 2014, vol. 8691, no. PART 3, pp. 550–565.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 |Published| Journal Article | IST-REx-ID: 2178 | OA
D. Haws, A. Martin del Campo Sanchez, A. Takemura, and R. Yoshida, “Markov degree of the three-state toric homogeneous Markov chain model,” Beitrage zur Algebra und Geometrie, vol. 55, no. 1. Springer, pp. 161–188, 2014.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 |Published| Conference Paper | IST-REx-ID: 2185 | OA
Y. Dodis, K. Z. Pietrzak, and D. Wichs, “Key derivation without entropy waste,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, 2014, vol. 8441, pp. 93–110.
[Submitted Version] View | Files available | DOI
 

2014 |Published| Conference Paper | IST-REx-ID: 2190 | OA
J. Esparza and J. Kretinsky, “From LTL to deterministic automata: A safraless compositional approach,” presented at the CAV: Computer Aided Verification, 2014, vol. 8559, pp. 192–208.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2014 |Published| Conference Paper | IST-REx-ID: 2219 | OA
E. Kiltz, D. Masny, and K. Z. Pietrzak, “Simple chosen-ciphertext security from low noise LPN,” presented at the IACR: International Conference on Practice and Theory in Public-Key Cryptography, 2014, vol. 8383, pp. 1–18.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

Filters and Search Terms

isbn%3D978-3-642-40707-9

Search

Filter Publications