Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

1621 Publications


2010 |Published| Conference Paper | IST-REx-ID: 3237
Kiltz E, Pietrzak KZ. 2010. Leakage resilient ElGamal encryption. ASIACRYPT: Theory and Application of Cryptology and Information Security, LNCS, vol. 6477, 595–612.
View | DOI
 

2010 |Published| Conference Paper | IST-REx-ID: 3235
Dodis Y, Pietrzak KZ. 2010. Leakage resilient pseudorandom functions and side channel attacks on feistel networks. CRYPTO: International Cryptology Conference, LNCS, vol. 6223, 21–40.
View | DOI
 

2010 |Published| Conference Paper | IST-REx-ID: 3234
Faust S, Kiltz E, Pietrzak KZ, Rothblum G. 2010. Leakage resilient signatures. TCC: Theory of Cryptography Conference, LNCS, vol. 5978, 343–360.
View | DOI
 

2010 |Published| Conference Paper | IST-REx-ID: 3233
Håstad J, Pass R, Wikström D, Pietrzak KZ. 2010. An efficient parallel repetition theorem. TCC: Theory of Cryptography Conference, LNCS, vol. 5978, 1–18.
View | DOI
 

2010 |Published| Journal Article | IST-REx-ID: 3774
Senn H, Swanson G, Goodman S, Barton NH, Pemberton J. 2010. Phenotypic correlates of hybridisation between red and sika deer (genus Cervus). Journal of Animal Ecology. 79(2), 414–425.
View | DOI | PubMed | Europe PMC
 

2010 |Published| Conference Paper | IST-REx-ID: 3793 | OA
Nowozin S, Gehler P, Lampert C. 2010. On parameter learning in CRF-based approaches to object class image segmentation. ECCV: European Conference on Computer Vision, LNCS, vol. 6316, 98–111.
[Submitted Version] View | Files available | DOI
 

2010 |Published| Conference Paper | IST-REx-ID: 3839 | OA
Henzinger TA, Hottelier T, Kovács L, Voronkov A. 2010. Invariant and type inference for matrices. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS, vol. 5944, 163–179.
[Submitted Version] View | Files available | DOI
 

2010 |Published| Conference Paper | IST-REx-ID: 3853 | OA
Chatterjee K, Doyen L, Edelsbrunner H, Henzinger TA, Rannou P. 2010. Mean-payoff automaton expressions. CONCUR: Concurrency Theory, LNCS, vol. 6269, 269–283.
[Submitted Version] View | Files available | DOI
 

2010 |Published| Conference Paper | IST-REx-ID: 3849 | OA
Bendich P, Edelsbrunner H, Kerber M, Patel A. 2010. Persistent homology under non-uniform error. MFCS: Mathematical Foundations of Computer Science, LNCS, vol. 6281, 12–23.
[Submitted Version] View | Files available | DOI
 

2010 |Published| Conference Paper | IST-REx-ID: 3854
Chatterjee K, Horn F, Löding C. 2010. Obliging games. CONCUR: Concurrency Theory, LNCS, vol. 6269, 284–296.
View | DOI
 

2010 |Published| Conference Paper | IST-REx-ID: 3851 | OA
Chatterjee K, Doyen L. 2010. Energy parity games. ICALP: Automata, Languages and Programming, 37th International Colloquium, LNCS, vol. 6199, 599–610.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2010 |Published| Conference Paper | IST-REx-ID: 3864 | OA
Chatterjee K, Henzinger TA, Jobstmann B, Singh R. 2010. Measuring and synthesizing systems in probabilistic environments. CAV: Computer Aided Verification, LNCS, vol. 6174, 380–395.
[Preprint] View | Files available | DOI | Download Preprint (ext.)
 

2010 |Published| Conference Paper | IST-REx-ID: 3865
Chatterjee K, De Alfaro L, Raman V, Sánchez C. 2010. Analyzing the impact of change in multi-threaded programs. FASE: Fundamental Approaches To Software Engineering, LNCS, vol. 6013, 293–307.
View | DOI
 

2010 |Published| Journal Article | IST-REx-ID: 3901 | OA
Bendich P, Edelsbrunner H, Kerber M. 2010. Computing robustness and persistence for images. IEEE Transactions of Visualization and Computer Graphics. 16(6), 1251–1260.
[Submitted Version] View | Files available | DOI
 

2010 |Published| Journal Article | IST-REx-ID: 4221
Arboleda Estudillo Y, Krieg M, Stuehmer J, Licata N, Mueller D, Heisenberg C-PJ. 2010. Movement directionality in collective migration of germ layer progenitors. Current Biology. 20(2), 161–169.
View | DOI
 

2010 |Published| Conference Paper | IST-REx-ID: 4362
Singh V. 2010. Runtime verification for software transactional memories. RV: International Conference on Runtime Verification, LNCS, vol. 6418, 421–435.
View | DOI
 

2010 |Published| Conference Paper | IST-REx-ID: 4378 | OA
Kuncak V, Piskac R, Suter P, Wies T. 2010. Building a calculus of data structures. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS, vol. 5944, 26–44.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2010 |Published| Conference Paper | IST-REx-ID: 4389 | OA
Doyen L, Henzinger TA, Legay A, Nickovic D. 2010. Robustness of sequential circuits. ACSD: Application of Concurrency to System Design, 77–84.
[Submitted Version] View | Files available | DOI
 

2010 |Published| Book Chapter | IST-REx-ID: 4392
Cerny P, Henzinger TA, Radhakrishna A. 2010.Quantitative Simulation Games. In: Time For Verification: Essays in Memory of Amir Pnueli. LNCS, vol. 6200, 42–60.
View | DOI
 

2010 |Published| Conference Paper | IST-REx-ID: 4396 | OA
Beyer D, Henzinger TA, Théoduloz G, Zufferey D. 2010. Shape refinement through explicit heap analysis. FASE: Fundamental Approaches To Software Engineering, LNCS, vol. 6013, 263–277.
[Submitted Version] View | Files available | DOI
 

Filters and Search Terms

isbn%3D978-364254630-3

Search

Filter Publications