Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

9471 Publications


2013 |Published| Book Chapter | IST-REx-ID: 2907 | OA
Barton NH. 2013.Recombination and sex. In: The Princeton Guide to Evolution. , 328–333.
[Submitted Version] View | Files available
 

2013 |Published| Journal Article | IST-REx-ID: 2913 | OA
Tkačik G, Granot Atedgi E, Segev R, Schneidman E. 2013. Retinal metric: a stimulus distance measure derived from population neural responses. Physical Review Letters. 110(5), 058104.
[Preprint] View | DOI | Download Preprint (ext.)
 

2013 |Published| Journal Article | IST-REx-ID: 2918
Castanon I, Abrami L, Holtzer L, Heisenberg C-PJ, Van Der Goot F, González Gaitán M. 2013. Anthrax toxin receptor 2a controls mitotic spindle positioning. Nature Cell Biology. 15(1), 28–39.
View | DOI
 

2013 |Published| Journal Article | IST-REx-ID: 2919 | OA
Baster P, Robert S, Kleine Vehn J, Vanneste S, Kania U, Grunewald W, De Rybel B, Beeckman T, Friml J. 2013. SCF^TIR1 AFB-auxin signalling regulates PIN vacuolar trafficking and auxin fluxes during root gravitropism. EMBO Journal. 32(2), 260–274.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 

2013 |Published| Journal Article | IST-REx-ID: 2920 | OA
Compagnon J, Heisenberg C-PJ. 2013. Neurulation coordinating cell polarisation and lumen formation. EMBO Journal. 32(1), 1–3.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 

2013 |Published| Conference Paper | IST-REx-ID: 2940 | OA
Krenn S, Pietrzak KZ, Wadia A. 2013. A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it. TCC: Theory of Cryptography Conference, LNCS, vol. 7785, 23–39.
[Submitted Version] View | Files available | DOI
 

2013 |Published| Conference Paper | IST-REx-ID: 2948 | OA
Tommasi T, Quadrianto N, Caputo B, Lampert C. 2013. Beyond dataset bias: Multi-task unaligned shared knowledge transfer. 7724, 1–15.
[Submitted Version] View | Files available | DOI
 

2013 |Published| Conference Paper | IST-REx-ID: 2973 | OA
Bangerter E, Barzan S, Krenn S, Sadeghi A, Schneider T, Tsay J. 2013. Bringing Zero-Knowledge Proofs of Knowledge to Practice. SPW: Security Protocols Workshop, LNCS, vol. 7028, 51–62.
View | DOI | Download (ext.)
 

2013 |Published| Journal Article | IST-REx-ID: 3116
Chatterjee K, De Alfaro L, Faella M, Majumdar R, Raman V. 2013. Code aware resource management. Formal Methods in System Design. 42(2), 142–174.
View | DOI
 

2013 |Published| Journal Article | IST-REx-ID: 2815 | OA
Edelsbrunner H, Fasy BT, Rote G. 2013. Add isotropic Gaussian kernels at own risk: More and more resilient modes in higher dimensions. Discrete & Computational Geometry. 49(4), 797–822.
[Published Version] View | Files available | DOI | Download Published Version (ext.)
 

Search

Filter Publications