Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

9113 Publications


2013 | Conference Paper | IST-REx-ID: 2940 | OA
A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it
S. Krenn, K.Z. Pietrzak, A. Wadia, in:, A. Sahai (Ed.), Springer, 2013, pp. 23–39.
[Submitted Version] View | Files available | DOI
 

2013 | Conference Paper | IST-REx-ID: 2948 | OA
Beyond dataset bias: Multi-task unaligned shared knowledge transfer
T. Tommasi, N. Quadrianto, B. Caputo, C. Lampert, 7724 (2013) 1–15.
[Submitted Version] View | Files available | DOI
 

2013 | Conference Paper | IST-REx-ID: 2973 | OA
Bringing Zero-Knowledge Proofs of Knowledge to Practice
E. Bangerter, S. Barzan, S. Krenn, A. Sadeghi, T. Schneider, J. Tsay, in:, B. Christianson, J. Malcolm, V. Matyas, M. Roe (Eds.), Springer, 2013, pp. 51–62.
View | DOI | Download (ext.)
 

2013 | Journal Article | IST-REx-ID: 3116
Code aware resource management
K. Chatterjee, L. De Alfaro, M. Faella, R. Majumdar, V. Raman, Formal Methods in System Design 42 (2013) 142–174.
View | DOI
 

2013 | Journal Article | IST-REx-ID: 2815 | OA
Add isotropic Gaussian kernels at own risk: More and more resilient modes in higher dimensions
H. Edelsbrunner, B.T. Fasy, G. Rote, Discrete & Computational Geometry 49 (2013) 797–822.
[Published Version] View | Files available | DOI | Download Published Version (ext.)
 

Search

Filter Publications