Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
1790 Publications
2012 |Published| Journal Article | IST-REx-ID: 2946 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
A. Dueck, C. Ziegler, A. Eichner, E. Berezikov, and G. Meister, “MicroRNAs associated with the different human Argonaute proteins,” Nucleic Acids Research, vol. 40, no. 19. Oxford University Press, pp. 9850–9862, 2012.
[Published Version]
View
| Files available
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 2947 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
K. Chatterjee, M. Chmelik, and R. Majumdar, “Equivalence of games with probabilistic uncertainty and partial observation games,” presented at the ATVA: Automated Technology for Verification and Analysis, Thiruvananthapuram, India, 2012, vol. 7561, pp. 385–399.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |Published| Journal Article | IST-REx-ID: 2962 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
S. Aeschbacher, M. Beaumont, and A. Futschik, “A novel approach for choosing summary statistics in approximate Bayesian computation,” Genetics, vol. 192, no. 3. Genetics Society of America, pp. 1027–1047, 2012.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| PubMed | Europe PMC
2012 |Published| Conference Paper | IST-REx-ID: 2974 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
A. Jain, S. Krenn, K. Z. Pietrzak, and A. Tentes, “Commitments and efficient zero knowledge proofs from learning parity with noise,” presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Beijing, China, 2012, vol. 7658, pp. 663–680.
[Submitted Version]
View
| Files available
| DOI
2012 |Published| Journal Article | IST-REx-ID: 3120 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
G. Brown, M. Kerber, and M. Reid, “Fano 3 folds in codimension 4 Tom and Jerry Part I,” Compositio Mathematica, vol. 148, no. 4. Cambridge University Press, pp. 1171–1194, 2012.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |Published| Conference Paper | IST-REx-ID: 3136
C. C. Guet, A. Gupta, T. A. Henzinger, M. Mateescu, and A. Sezgin, “Delayed continuous time Markov chains for genetic regulatory circuits,” presented at the CAV: Computer Aided Verification, Berkeley, CA, USA, 2012, vol. 7358, pp. 294–309.
View
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 3135 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
B. Brázdil, K. Chatterjee, A. Kučera, and P. Novotný, “Efficient controller synthesis for consumption games with multiple resource types,” presented at the CAV: Computer Aided Verification, Berkeley, CA, USA, 2012, vol. 7358, pp. 23–38.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |Published| Conference Paper | IST-REx-ID: 3162 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
E. Asarin, A. Donzé, O. Maler, and D. Nickovic, “Parametric identification of temporal properties,” presented at the RV: Runtime Verification, San Francisco, CA, United States, 2012, vol. 7186, pp. 147–160.
[Submitted Version]
View
| Files available
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 3252 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
K. Chatterjee and V. Raman, “Synthesizing protocols for digital contract signing,” presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, Philadelphia, PA, USA, 2012, vol. 7148, pp. 152–168.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |Published| Conference Paper | IST-REx-ID: 3255 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
K. Chatterjee and L. Doyen, “Games and Markov decision processes with mean payoff parity and energy parity objectives,” presented at the MEMICS: Mathematical and Engineering Methods in Computer Science, Lednice, Czech Republic, 2012, vol. 7119, pp. 37–46.
[Submitted Version]
View
| Files available
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 3253
A. Bouajjani, C. Dragoi, C. Enea, and M. Sighireanu, “Abstract domains for automated reasoning about list manipulating programs with infinite data,” presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, Philadelphia, PA, USA, 2012, vol. 7148, pp. 1–22.
View
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 3282 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Y. Dodis, K. Z. Pietrzak, E. Kiltz, and D. Wichs, “Message authentication, revisited,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Cambridge, UK, 2012, vol. 7237, pp. 355–374.
[Submitted Version]
View
| Files available
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 3280 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
K. Z. Pietrzak, “Subspace LWE,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 548–563.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2012 |Published| Conference Paper | IST-REx-ID: 3281
K. Z. Pietrzak, A. Rosen, and G. Segev, “Lossy functions do not amplify well,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 458–475.
View
| DOI
| Download None (ext.)
2012 |Published| Journal Article | IST-REx-ID: 387 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Z. Alpichshev et al., “STM imaging of impurity resonances on Bi 2Se 3,” Physical Review Letters, vol. 108, no. 20. American Physical Society, 2012.
View
| DOI
| Download None (ext.)