Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
1953 Publications
2014 |Published| Journal Article | IST-REx-ID: 1935 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Giuliani A, Lieb É, Seiringer R. 2014. Formation of stripes and slabs near the ferromagnetic transition. Communications in Mathematical Physics. 331, 333–350.
[Published Version]
View
| Files available
| DOI
| arXiv
2014 |Published| Journal Article | IST-REx-ID: 2019 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Erdös L, Schröder DJ. 2014. Phase transition in the density of states of quantum spin glasses. Mathematical Physics, Analysis and Geometry. 17(3–4), 441–464.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Journal Article | IST-REx-ID: 2022 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Gao P, Postiglione MP, Krieger T, Hernandez L, Wang C, Han Z, Streicher C, Papusheva E, Insolera R, Chugh K, Kodish O, Huang K, Simons B, Luo L, Hippenmeyer S, Shi S. 2014. Deterministic progenitor behavior and unitary production of neurons in the neocortex. Cell. 159(4), 775–788.
[Published Version]
View
| Files available
| DOI
2014 |Published| Journal Article | IST-REx-ID: 2021 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
William J, Hippenmeyer S, Luo L. 2014. Dendrite morphogenesis depends on relative levels of NT-3/TrkC signaling. Science. 346(6209), 626–629.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Conference Paper | IST-REx-ID: 2027 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Brázdil T, Chatterjee K, Chmelik M, Forejt V, Kretinsky J, Kwiatkowska M, Parker D, Ujma M. 2014. Verification of markov decision processes using learning algorithms. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). ALENEX: Algorithm Engineering and Experiments, LNCS, vol. 8837, 98–114.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Journal Article | IST-REx-ID: 2024 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Toshima J, Nishinoaki S, Sato Y, Yamamoto W, Furukawa D, Siekhaus DE, Sawaguchi A, Toshima J. 2014. Bifurcation of the endocytic pathway into Rab5-dependent and -independent transport to the vacuole. Nature Communications. 5, 3498.
[Submitted Version]
View
| Files available
| DOI
2014 |Published| Journal Article | IST-REx-ID: 2028 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Bodova K, Paydarfar D, Forger D. 2014. Characterizing spiking in noisy type II neurons. Journal of Theoretical Biology. 365, 40–54.
[Published Version]
View
| Files available
| DOI
2014 |Published| Conference Paper | IST-REx-ID: 2026
Komárková Z, Kretinsky J. 2014. Rabinizer 3: Safraless translation of ltl to small deterministic automata. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). ATVA: Automated Technology for Verification and Analysis, LNCS, vol. 8837, 235–241.
View
| DOI
2014 |Published| Conference Paper | IST-REx-ID: 2045 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Dachman Soled D, Fuchsbauer G, Mohassel P, O’Neill A. 2014. Enhanced chosen-ciphertext security and applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PKC: Public Key Crypography, LNCS, vol. 8383, 329–344.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Book Chapter | IST-REx-ID: 2044 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Bauer U, Kerber M, Reininghaus J. 2014.Clear and Compress: Computing Persistent Homology in Chunks. In: Topological Methods in Data Analysis and Visualization III. , 103–117.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Conference Paper | IST-REx-ID: 2047 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Yu F, Rybar M, Uhler C, Fienberg S. 2014. Differentially-private logistic regression for detecting multiple-SNP association in GWAS databases. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PSD: Privacy in Statistical Databases, LNCS, vol. 8744, 170–184.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| arXiv
2014 |Published| Conference Paper | IST-REx-ID: 2053 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Hermanns H, Krčál J, Kretinsky J. 2014. Probabilistic bisimulation: Naturally on distributions. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). CONCUR: Concurrency Theory, LNCS, vol. 8704, 249–265.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Conference Paper | IST-REx-ID: 2052
Aminof B, Kotek T, Rubin S, Spegni F, Veith H. 2014. Parameterized model checking of rendezvous systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). CONCUR: Concurrency Theory, LNCS, vol. 8704, 109–124.
View
| DOI
2014 |Published| Conference Paper | IST-REx-ID: 2046 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Bellare M, Fuchsbauer G. 2014. Policy-based signatures. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PKC: Public Key Crypography, LNCS, vol. 8383, 520–537.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Conference Paper | IST-REx-ID: 2057 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Morvant E, Habrard A, Ayache S. 2014. Majority vote of diverse classifiers for late fusion. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). IAPR: International Workshop on Structural, Syntactic, and Statistical Pattern Recognition, LNCS, vol. 8621, 153–162.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2014 |Published| Journal Article | IST-REx-ID: 2064 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Rubio M, Fukazawa Y, Kamasawa N, Clarkson C, Molnár E, Shigemoto R. 2014. Target- and input-dependent organization of AMPA and NMDA receptors in synaptic connections of the cochlear nucleus. Journal of Comparative Neurology. 522(18), 4023–4042.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Conference Paper | IST-REx-ID: 2171 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Kolesnikov A, Guillaumin M, Ferrari V, Lampert C. 2014. Closed-form approximate CRF training for scalable image segmentation. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). ECCV: European Conference on Computer Vision, LNCS, vol. 8691, 550–565.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Journal Article | IST-REx-ID: 2178 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Haws D, Martin del Campo Sanchez A, Takemura A, Yoshida R. 2014. Markov degree of the three-state toric homogeneous Markov chain model. Beitrage zur Algebra und Geometrie. 55(1), 161–188.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 |Published| Conference Paper | IST-REx-ID: 2185 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Dodis Y, Pietrzak KZ, Wichs D. 2014. Key derivation without entropy waste. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 8441, 93–110.
[Submitted Version]
View
| Files available
| DOI
2014 |Published| Conference Paper | IST-REx-ID: 2190 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Esparza J, Kretinsky J. 2014. From LTL to deterministic automata: A safraless compositional approach. CAV: Computer Aided Verification, LNCS, vol. 8559, 192–208.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)