Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
9113 Publications
2013 | Conference Paper | IST-REx-ID: 2940 |
A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it
S. Krenn, K.Z. Pietrzak, A. Wadia, in:, A. Sahai (Ed.), Springer, 2013, pp. 23–39.
[Submitted Version]
View
| Files available
| DOI
S. Krenn, K.Z. Pietrzak, A. Wadia, in:, A. Sahai (Ed.), Springer, 2013, pp. 23–39.
2013 | Conference Paper | IST-REx-ID: 2948 |
Beyond dataset bias: Multi-task unaligned shared knowledge transfer
T. Tommasi, N. Quadrianto, B. Caputo, C. Lampert, 7724 (2013) 1–15.
[Submitted Version]
View
| Files available
| DOI
T. Tommasi, N. Quadrianto, B. Caputo, C. Lampert, 7724 (2013) 1–15.
2013 | Conference Paper | IST-REx-ID: 2973 |
Bringing Zero-Knowledge Proofs of Knowledge to Practice
E. Bangerter, S. Barzan, S. Krenn, A. Sadeghi, T. Schneider, J. Tsay, in:, B. Christianson, J. Malcolm, V. Matyas, M. Roe (Eds.), Springer, 2013, pp. 51–62.
View
| DOI
| Download (ext.)
E. Bangerter, S. Barzan, S. Krenn, A. Sadeghi, T. Schneider, J. Tsay, in:, B. Christianson, J. Malcolm, V. Matyas, M. Roe (Eds.), Springer, 2013, pp. 51–62.
2013 | Journal Article | IST-REx-ID: 3116
Code aware resource management
K. Chatterjee, L. De Alfaro, M. Faella, R. Majumdar, V. Raman, Formal Methods in System Design 42 (2013) 142–174.
View
| DOI
K. Chatterjee, L. De Alfaro, M. Faella, R. Majumdar, V. Raman, Formal Methods in System Design 42 (2013) 142–174.
2013 | Journal Article | IST-REx-ID: 2815 |
Add isotropic Gaussian kernels at own risk: More and more resilient modes in higher dimensions
H. Edelsbrunner, B.T. Fasy, G. Rote, Discrete & Computational Geometry 49 (2013) 797–822.
[Published Version]
View
| Files available
| DOI
| Download Published Version (ext.)
H. Edelsbrunner, B.T. Fasy, G. Rote, Discrete & Computational Geometry 49 (2013) 797–822.