Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

1966 Publications


2010 | Published | Conference Paper | IST-REx-ID: 18339
N. J. Mitra, A. M. Bronstein, and M. Bronstein, “Intrinsic regularity detection in 3D geometry,” in 11th European Conference on Computer Vision, Heraklion, Greece, 2010, vol. 6313, pp. 398–410.
View | DOI
 

2010 | Published | Journal Article | IST-REx-ID: 18359
D. Raviv, A. M. Bronstein, M. M. Bronstein, and R. Kimmel, “Full and partial symmetries of non-rigid shapes,” International Journal of Computer Vision, vol. 89. Springer Nature, pp. 18–39, 2010.
View | DOI
 

2010 | Published | Journal Article | IST-REx-ID: 7078 | OA
E. K. H. Salje et al., “Tin telluride: A weakly co-elastic metal,” Physical Review B, vol. 82, no. 18. APS, 2010.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2010 | Published | Journal Article | IST-REx-ID: 3146
S. Hippenmeyer et al., “Genetic mosaic dissection of Lis1 and Ndel1 in neuronal migration,” Neuron, vol. 68, no. 4. Elsevier, pp. 695–709, 2010.
View | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3201
S. Vicente, V. Kolmogorov, and C. Rother, “Cosegmentation revisited: Models and optimization,” presented at the ECCV: European Conference on Computer Vision, 2010, vol. 6312, pp. 465–479.
View | DOI | Download (ext.)
 

2010 | Published | Conference Paper | IST-REx-ID: 3233
J. Håstad, R. Pass, D. Wikström, and K. Z. Pietrzak, “An efficient parallel repetition theorem,” presented at the TCC: Theory of Cryptography Conference, 2010, vol. 5978, pp. 1–18.
View | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3234
S. Faust, E. Kiltz, K. Z. Pietrzak, and G. Rothblum, “Leakage resilient signatures,” presented at the TCC: Theory of Cryptography Conference, 2010, vol. 5978, pp. 343–360.
View | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3235
Y. Dodis and K. Z. Pietrzak, “Leakage resilient pseudorandom functions and side channel attacks on feistel networks,” presented at the CRYPTO: International Cryptology Conference, 2010, vol. 6223, pp. 21–40.
View | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3237
E. Kiltz and K. Z. Pietrzak, “Leakage resilient ElGamal encryption,” presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, 2010, vol. 6477, pp. 595–612.
View | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3782
C. Chen and D. Freedman, “Topology noise removal for curve  and surface evolution,” in Conference proceedings MCV 2010, Beijing, China, 2010, vol. 6533, pp. 31–42.
View | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3793 | OA
S. Nowozin, P. Gehler, and C. Lampert, “On parameter learning in CRF-based approaches to object class image segmentation,” presented at the ECCV: European Conference on Computer Vision, Heraklion, Crete, Greece, 2010, vol. 6316, pp. 98–111.
[Submitted Version] View | Files available | DOI
 

2010 | Published | Book Chapter | IST-REx-ID: 3795 | OA
H. Edelsbrunner, D. Morozov, and A. Patel, “The stability of the apparent contour of an orientable 2-manifold,” in Topological Data Analysis and Visualization: Theory, Algorithms and Applications, Springer, 2010, pp. 27–42.
[Submitted Version] View | Files available | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3839 | OA
T. A. Henzinger, T. Hottelier, L. Kovács, and A. Voronkov, “Invariant and type inference for matrices,” presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, Madrid, Spain, 2010, vol. 5944, pp. 163–179.
[Submitted Version] View | Files available | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3848
P. Bendich, H. Edelsbrunner, D. Morozov, and A. Patel, “The robustness of level sets,” presented at the ESA: European Symposium on Algorithms, Liverpool, UK, 2010, vol. 6346, pp. 1–10.
View | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3849 | OA
P. Bendich, H. Edelsbrunner, M. Kerber, and A. Patel, “Persistent homology under non-uniform error,” presented at the MFCS: Mathematical Foundations of Computer Science, Brno, Czech Republic, 2010, vol. 6281, pp. 12–23.
[Submitted Version] View | Files available | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3854
K. Chatterjee, F. Horn, and C. Löding, “Obliging games,” presented at the CONCUR: Concurrency Theory, Paris, France, 2010, vol. 6269, pp. 284–296.
View | DOI
 

2010 | Published | Conference (Editor) | IST-REx-ID: 3859
K. Chatterjee and T. A. Henzinger, Eds., Formal modeling and analysis of timed systems, vol. 6246. Springer, 2010.
View | Files available | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 18338
A. M. Bronstein and M. M. Bronstein, “Spatially-sensitive affine-invariant image descriptors,” in 11th European Conference on Computer Vision, Heraklion, Greece, 2010, vol. 6312, pp. 197–208.
View | DOI
 

2010 | Published | Book Chapter | IST-REx-ID: 8506
B. R. Hunt and V. Kaloshin, “Prevalence,” in Handbook of Dynamical Systems, vol. 3, Elsevier, 2010, pp. 43–87.
View | DOI
 

2010 | Published | Journal Article | IST-REx-ID: 862
M. Meer, A. Kondrashov, Y. Artzy Randrup, and F. Kondrashov, “Compensatory evolution in mitochondrial tRNAs navigates valleys of low fitness,” Nature, vol. 464, no. 7286. Nature Publishing Group, pp. 279–282, 2010.
View | DOI
 

Filters and Search Terms

isbn%3D978-364254630-3

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed