Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
1966 Publications
2010 | Published | Journal Article | IST-REx-ID: 2763
L. Erdös, J. Ramírez, B. Schlein, T. Tao, V. Van, and H. Yau, “Bulk universality for Wigner Hermitian matrices with subexponential decay,” Mathematical Research Letters, vol. 17, no. 4. International Press, pp. 667–674, 2010.
View
2010 | Published | Conference Paper | IST-REx-ID: 2978 |
E. Bangerter, J. Camenisch, and S. Krenn, “Efficiency Limitations for Σ-Protocols for Group Homomorphisms,” presented at the TCC: Theory of Cryptography Conference, 2010, vol. 5978, pp. 553–571.
View
| DOI
| Download (ext.)
2010 | Published | Conference Paper | IST-REx-ID: 2979 |
J. Almeida, E. Bangerter, M. Barbosa, S. Krenn, A. Sadeghi, and T. Schneider, “A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols,” presented at the ESORICS: European Symposium on Research in Computer Security, 2010, vol. 6345, pp. 151–167.
View
| DOI
| Download (ext.)
2010 | Published | Conference Paper | IST-REx-ID: 2980 |
E. Bangerter, T. Briner, W. Henecka, S. Krenn, A. Sadeghi, and T. Schneider, “Automatic Generation of Sigma-Protocols,” presented at the EuroPKI: Public Key Infrastructures, Services and Applications, 2010, vol. 6391, pp. 67–82.
View
| DOI
| Download (ext.)
2010 | Published | Conference Paper | IST-REx-ID: 4378 |
V. Kuncak, R. Piskac, P. Suter, and T. Wies, “Building a calculus of data structures,” presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, Madrid, Spain, 2010, vol. 5944, pp. 26–44.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2010 | Published | Conference Paper | IST-REx-ID: 4389 |
L. Doyen, T. A. Henzinger, A. Legay, and D. Nickovic, “Robustness of sequential circuits,” presented at the ACSD: Application of Concurrency to System Design, 2010, pp. 77–84.
[Submitted Version]
View
| Files available
| DOI
2010 | Published | Conference Paper | IST-REx-ID: 4390 |
P. Cerny, A. Radhakrishna, D. Zufferey, S. Chaudhuri, and R. Alur, “Model checking of linearizability of concurrent list implementations,” presented at the CAV: Computer Aided Verification, Edinburgh, UK, 2010, vol. 6174, pp. 465–479.
[Submitted Version]
View
| Files available
| DOI
2010 | Published | Journal Article | IST-REx-ID: 1465 |
T. Hausel, “Kac’s conjecture from Nakajima quiver varieties,” Inventiones Mathematicae, vol. 181, no. 1. Springer, pp. 21–37, 2010.
View
| DOI
| Download (ext.)
2010 | Published | Book Chapter | IST-REx-ID: 14983
A. Schlögl, C. Vidaurre, and K.-R. Müller, “Adaptive Methods in BCI Research - An Introductory Tutorial,” in Brain-Computer Interfaces, 1st ed., B. Graimann, G. Pfurtscheller, and B. Allison, Eds. Berlin, Heidelberg: Springer, 2010, pp. 331–355.
View
| DOI
2010 | Published | Conference Paper | IST-REx-ID: 755
D.-A. Alistarh, S. Gilbert, R. Guerraoui, and M. Zadimoghaddam, “How efficient can gossip be? (On the cost of resilient information exchange),” presented at the ICALP: International Colloquium on Automota, Languages and Programming, 2010, vol. 6199 LNCS, no. PART 2, pp. 115–126.
View
| DOI