Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

204 Publications


2006 | Journal Article | IST-REx-ID: 3152
Kunwar, P., Siekhaus, D. E., & Lehmann, R. (2006). In vivo migration A germ cell perspective. Annual Review of Cell and Developmental Biology. Annual Reviews. https://doi.org/10.1146/annurev.cellbio.22.010305.103337
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3189
Criminisi, A., Cross, G., Blake, A., & Kolmogorov, V. (2006). Bilayer segmentation of live video (Vol. 1, pp. 53–60). Presented at the CVPR: Computer Vision and Pattern Recognition, IEEE. https://doi.org/10.1109/CVPR.2006.69
View | DOI | Download (ext.)
 

2006 | Journal Article | IST-REx-ID: 3190
Kolmogorov, V. (2006). Convergent tree reweighted message passing for energy minimization. IEEE Transactions on Pattern Analysis and Machine Intelligence. IEEE. https://doi.org/10.1109/TPAMI.2006.200
View | DOI | Download (ext.)
 

2006 | Conference Paper | IST-REx-ID: 3188
Rother, C., Kolmogorov, V., Minka, T., & Blake, A. (2006). Cosegmentation of image pairs by histogram matching - Incorporating a global constraint into MRFs (pp. 993–1000). Presented at the CVPR: Computer Vision and Pattern Recognition, IEEE. https://doi.org/10.1109/CVPR.2006.91
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3214
Maurer, U., Oswald, Y., Pietrzak, K. Z., & Sjödin, J. (2006). Luby Rackoff ciphers from weak round functions (Vol. 4004, pp. 391–408). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/11761679_24
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3215
Dodis, Y., Pietrzak, K. Z., & Przydatek, B. (2006). Separating sources for encryption and secret sharing (Vol. 3876, pp. 601–616). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/11681878_31
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3217
Pietrzak, K. Z. (2006). Composition implies adaptive security in minicrypt (Vol. 4004, pp. 328–338). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/11761679_20
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3216
Pietrzak, K. Z. (2006). A tight bound for EMAC (Vol. 4052, pp. 168–179). Presented at the ICALP: Automata, Languages and Programming, Springer. https://doi.org/10.1007/11787006_15
View | DOI
 

2006 | Journal Article | IST-REx-ID: 3522
O’Neill, J., Senior, T., & Csicsvari, J. L. (2006). Place-selective firing of CA1 pyramidal cells during sharp wave/ripple network patterns in exploratory behavior. Neuron. Elsevier. https://doi.org/10.1016/j.neuron.2005.10.037
View | DOI
 

2006 | Journal Article | IST-REx-ID: 3607
Turelli, M., & Barton, N. H. (2006). Will population bottlenecks and multilocus epistasis increase additive genetic variance? Evolution; International Journal of Organic Evolution. Wiley-Blackwell. https://doi.org/10.1111/j.0014-3820.2006.tb00521.x
View | DOI
 

Filters and Search Terms

year=2006

Search

Filter Publications