Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
1621 Publications
2012 |Published| Conference Paper | IST-REx-ID: 3162 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Asarin E, Donzé A, Maler O, Nickovic D. 2012. Parametric identification of temporal properties. RV: Runtime Verification, LNCS, vol. 7186, 147–160.
[Submitted Version]
View
| Files available
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 3252 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Chatterjee K, Raman V. 2012. Synthesizing protocols for digital contract signing. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS, vol. 7148, 152–168.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |Published| Conference Paper | IST-REx-ID: 3255 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Chatterjee K, Doyen L. 2012. Games and Markov decision processes with mean payoff parity and energy parity objectives. MEMICS: Mathematical and Engineering Methods in Computer Science, LNCS, vol. 7119, 37–46.
[Submitted Version]
View
| Files available
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 3282 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Dodis Y, Pietrzak KZ, Kiltz E, Wichs D. 2012. Message authentication, revisited. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 7237, 355–374.
[Submitted Version]
View
| Files available
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 3280 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Pietrzak KZ. 2012. Subspace LWE. TCC: Theory of Cryptography Conference, LNCS, vol. 7194, 548–563.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2012 |Published| Conference Paper | IST-REx-ID: 3281
Pietrzak KZ, Rosen A, Segev G. 2012. Lossy functions do not amplify well. TCC: Theory of Cryptography Conference, LNCS, vol. 7194, 458–475.
View
| DOI
| Download None (ext.)
2012 |Published| Journal Article | IST-REx-ID: 387 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Alpichshev Z, Biswas R, Balatsky A, Analytis J, Chu J, Fisher I, Kapitulnik A. 2012. STM imaging of impurity resonances on Bi 2Se 3. Physical Review Letters. 108(20).
View
| DOI
| Download None (ext.)
2012 |Published| Journal Article | IST-REx-ID: 3110
Dai M, Zhang C, Kania U, Chen F, Xue Q, Mccray T, Li G, Qin G, Wakeley M, Terzaghi W, Wan J, Zhao Y, Xu J, Friml J, Deng X, Wang H. 2012. A PP6 type phosphatase holoenzyme directly regulates PIN phosphorylation and auxin efflux in Arabidopsis. Plant Cell. 24(6), 2497–2514.
View
| DOI
2012 |Published| Journal Article | IST-REx-ID: 3111
Lin D, Nagawa S, Chen J, Cao L, Chen X, Xu T, Li H, Dhonukshe P, Yamamuro C, Friml J, Scheres B, Fu Y, Yang Z. 2012. A ROP GTPase dependent auxin signaling pathway regulates the subcellular distribution of PIN2 in Arabidopsis roots. Current Biology. 22(14), 1319–1325.
View
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 3125 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Sharmanska V, Quadrianto N, Lampert C. 2012. Augmented attribute representations. ECCV: European Conference on Computer Vision, LNCS, vol. 7576, 242–255.
[Submitted Version]
View
| Files available
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 3129 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Busaryev O, Cabello S, Chen C, Dey T, Wang Y. 2012. Annotating simplices with a homology basis and its applications. SWAT: Symposium and Workshops on Algorithm Theory, LNCS, vol. 7357, 189–200.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2012 |Published| Conference Paper | IST-REx-ID: 3155 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Delahaye B, Fahrenberg U, Henzinger TA, Legay A, Nickovic D. 2012. Synchronous interface theories and time triggered scheduling. FORTE: Formal Techniques for Networked and Distributed Systems & FMOODS: Formal Methods for Open Object-Based Distributed Systems , LNCS, vol. 7273, 203–218.
[Submitted Version]
View
| Files available
| DOI
2012 |Published| Journal Article | IST-REx-ID: 3248 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Lampert C, Peters J. 2012. Real-time detection of colored objects in multiple camera streams with off-the-shelf hardware components. Journal of Real-Time Image Processing. 7(1), 31–41.
[Submitted Version]
View
| Files available
| DOI
2012 |Published| Conference Paper | IST-REx-ID: 3279
Jain A, Pietrzak KZ, Tentes A. 2012. Hardness preserving constructions of pseudorandom functions. TCC: Theory of Cryptography Conference, LNCS, vol. 7194, 369–382.
View
| DOI
| Download None (ext.)
2012 |Published| Journal Article | IST-REx-ID: 493 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Tangermann M, Müller K, Aertsen A, Birbaumer N, Braun C, Brunner C, Leeb R, Mehring C, Miller K, Müller Putz G, Nolte G, Pfurtscheller G, Preissl H, Schalk G, Schlögl A, Vidaurre C, Waldert S, Blankertz B. 2012. Review of the BCI competition IV. Frontiers in Neuroscience. 6, 55.
[Published Version]
View
| Files available
| DOI