Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

307 Publications


2010 | Published | Journal Article | IST-REx-ID: 3146
S. Hippenmeyer et al., “Genetic mosaic dissection of Lis1 and Ndel1 in neuronal migration,” Neuron, vol. 68, no. 4. Elsevier, pp. 695–709, 2010.
View | DOI
 

2010 | Published | Journal Article | IST-REx-ID: 3153
D. E. Siekhaus, M. Haesemeyer, O. Moffitt, and R. Lehmann, “RhoL controls invasion and Rap1 localization during immune cell transmigration in Drosophila,” Nature Cell Biology, vol. 12, no. 6. Nature Publishing Group, pp. 605–610, 2010.
View | Download (ext.)
 

2010 | Published | Conference Paper | IST-REx-ID: 3201
S. Vicente, V. Kolmogorov, and C. Rother, “Cosegmentation revisited: Models and optimization,” presented at the ECCV: European Conference on Computer Vision, 2010, vol. 6312, pp. 465–479.
View | DOI | Download (ext.)
 

2010 | Published | Journal Article | IST-REx-ID: 3202
V. Kolmogorov, “A faster algorithm for computing the principal sequence of partitions of a graph,” Algorithmica, vol. 56, no. 4. Springer, pp. 394–412, 2010.
View | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3233
J. Håstad, R. Pass, D. Wikström, and K. Z. Pietrzak, “An efficient parallel repetition theorem,” presented at the TCC: Theory of Cryptography Conference, 2010, vol. 5978, pp. 1–18.
View | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3234
S. Faust, E. Kiltz, K. Z. Pietrzak, and G. Rothblum, “Leakage resilient signatures,” presented at the TCC: Theory of Cryptography Conference, 2010, vol. 5978, pp. 343–360.
View | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3235
Y. Dodis and K. Z. Pietrzak, “Leakage resilient pseudorandom functions and side channel attacks on feistel networks,” presented at the CRYPTO: International Cryptology Conference, 2010, vol. 6223, pp. 21–40.
View | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3237
E. Kiltz and K. Z. Pietrzak, “Leakage resilient ElGamal encryption,” presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, 2010, vol. 6477, pp. 595–612.
View | DOI
 

2010 | Published | Journal Article | IST-REx-ID: 3294
A. Iyengar, S. Chakraborty Tuhin, S. Goswami, C. Wu, and O. Siddiqi, “Post eclosion odor experience modifies olfactory receptor neuron coding in Drosophila,” PNAS, vol. 107, no. 21. National Academy of Sciences, pp. 9855–60, 2010.
View | DOI
 

2010 | Published | Thesis | IST-REx-ID: 3296
C. Wojtan, “Animating physical phenomena with embedded surface meshes,” Georgia Institute of Technology, 2010.
View | Download None (ext.)
 

2010 | Published | Journal Article | IST-REx-ID: 3303 | OA
D. Weissman, M. Feldman, and D. Fisher, “The rate of fitness-valley crossing in sexual populations,” Genetics, vol. 186, no. 4. Genetics Society of America, pp. 1389–1410, 2010.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2010 | Published | Journal Article | IST-REx-ID: 3306 | OA
S. Evans, B. Sturmfels, and C. Uhler, “Commuting birth and death processes,” The Annals of Applied Probability, vol. 20. Institute of Mathematical Statistics, pp. 238–266, 2010.
View | DOI | Download (ext.)
 

2010 | Published | Journal Article | IST-REx-ID: 3308 | OA
B. Sturmfels and C. Uhler, “Multivariate Gaussians, semidefinite matrix completion, and convex algebraic geometry,” Annals of the Institute of Statistical Mathematics, vol. 62, no. 4. Springer, pp. 603–638, 2010.
View | DOI | Download (ext.)
 

2010 | Published | Journal Article | IST-REx-ID: 3402
R. Guerraoui, T. A. Henzinger, and V. Singh, “Model checking transactional memories,” Distributed Computing, vol. 22, no. 3. Springer, pp. 129–145, 2010.
View | DOI | Download (ext.)
 

2010 | Published | Book Review | IST-REx-ID: 3403
B. Pleydell Bouverie and J. L. Csicsvari, “Rate remapping: When the code goes beyond space (preview),” Neuron, vol. 68, no. 6. Elsevier, pp. 1015–1016, 2010.
View | DOI
 

2010 | Published | Book Review | IST-REx-ID: 3406
P. Stawski, H. L. Janovjak, and D. Trauner, “Pharmacology of ionotropic glutamate receptors: a structural perspective,” Bioorganic and Medicinal Chemistry, vol. 18, no. 22. Elsevier, pp. 7759–7772, 2010.
View | DOI
 

2010 | Published | Journal Article | IST-REx-ID: 3407
H. L. Janovjak, S. Szobota, C. Wyart, D. Trauner, and E. Isacoff, “A light-gated, potassium-selective glutamate receptor for the optical inhibition of neuronal firing,” Nature Neuroscience, vol. 13. Nature Publishing Group, pp. 1027–1032, 2010.
View | DOI
 

2010 | Published | Conference Paper | IST-REx-ID: 3430 | OA
G. Tkačik, “Lecture notes for 2010 summer school on Quantitative Evolutionary and Comparative Genomics,” presented at the Summer School on Quantitative Evolutionary and Comparative Genomics, 2010.
View | Download (ext.)
 

2010 | Published | Journal Article | IST-REx-ID: 3441
D. Dupret, J. O’Neill, B. Pleydell Bouverie, and J. L. Csicsvari, “The reorganization and reactivation of hippocampal maps predict spatial memory performance,” Nature Neuroscience, vol. 13, no. 8. Nature Publishing Group, pp. 995–1002, 2010.
View | DOI
 

2010 | Published | Journal Article | IST-REx-ID: 3442
J. O’Neill, B. Pleydell Bouverie, D. Dupret, and J. L. Csicsvari, “Play it again: reactivation of waking experience and memory,” Trends in Neurosciences, vol. 33, no. 5. Elsevier, pp. 220–229, 2010.
View | DOI
 

Filters and Search Terms

year=2010

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed