Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
9789 Publications
2015 | Published | Technical Report | IST-REx-ID: 5430 |
K. Chatterjee, R. Ibsen-Jensen, and A. Pavlogiannis, Faster algorithms for quantitative verification in constant treewidth graphs. IST Austria, 2015.
[Published Version]
View
| Files available
| DOI
2015 | Published | Technical Report | IST-REx-ID: 5431 |
K. Chatterjee, R. Ibsen-Jensen, and K. Hansen, The patience of concurrent stochastic games with safety and reachability objectives. IST Austria, 2015.
[Published Version]
View
| Files available
| DOI
2015 | Published | Technical Report | IST-REx-ID: 5432 |
K. Chatterjee, R. Ibsen-Jensen, and M. Nowak, The complexity of evolutionary games on graphs. IST Austria, 2015.
[Published Version]
View
| Files available
| DOI
2015 | Published | Technical Report | IST-REx-ID: 5434 |
1 Anonymous and 2 Anonymous, Optimal cost indefinite-horizon reachability in goal DEC-POMDPs. IST Austria, 2015.
[Published Version]
View
| Files available
2015 | Published | Technical Report | IST-REx-ID: 5437 |
K. Chatterjee, R. Ibsen-Jensen, and A. Pavlogiannis, Faster algorithms for quantitative verification in constant treewidth graphs. IST Austria, 2015.
[Published Version]
View
| Files available
| DOI
2015 | Published | Technical Report | IST-REx-ID: 5440 |
K. Chatterjee, R. Ibsen-Jensen, and M. Nowak, The complexity of evolutionary games on graphs. IST Austria, 2015.
[Published Version]
View
| Files available
| DOI
2015 | Published | Technical Report | IST-REx-ID: 5441 |
K. Chatterjee, R. Ibsen-Jensen, A. K. Goharshady, and A. Pavlogiannis, Algorithms for algebraic path properties in concurrent systems of constant treewidth components. IST Austria, 2015.
[Published Version]
View
| Files available
| DOI
2015 | Published | Technical Report | IST-REx-ID: 5442 |
1 Anonymous, 2 Anonymous, 3 Anonymous, and 4 Anonymous, Algorithms for algebraic path properties in concurrent systems of constant treewidth components. IST Austria, 2015.
[Published Version]
View
| Files available
2015 | Published | Technical Report | IST-REx-ID: 5443 |
K. Chatterjee, M. Chmelik, and J. Davies, A symbolic SAT-based algorithm for almost-sure reachability with small strategies in POMDPs. IST Austria, 2015.
[Published Version]
View
| Files available
| DOI
2015 | Published | Technical Report | IST-REx-ID: 5444 |
J. Reiter et al., Reconstructing robust phylogenies of metastatic cancers. IST Austria, 2015.
[Published Version]
View
| Files available
| DOI
2015 | Published | Journal Article | IST-REx-ID: 1639 |
J. Maas, M. Rumpf, C. Schönlieb, and S. Simon, “A generalized model for optimal transport of images including dissipation and density modulation,” ESAIM: Mathematical Modelling and Numerical Analysis, vol. 49, no. 6. EDP Sciences, pp. 1745–1769, 2015.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2015 | Published | Journal Article | IST-REx-ID: 1640 |
M. Šimášková et al., “Cytokinin response factors regulate PIN-FORMED auxin transporters,” Nature Communications, vol. 6. Nature Publishing Group, 2015.
[Submitted Version]
View
| Files available
| DOI
2015 | Published | Journal Article | IST-REx-ID: 1642 |
R. Fulek, J. Kynčl, I. Malinovič, and D. Pálvölgyi, “Clustered planarity testing revisited,” Electronic Journal of Combinatorics, vol. 22, no. 4. Electronic Journal of Combinatorics, 2015.
[Published Version]
View
| Files available
| DOI
| arXiv
2015 | Published | Conference Paper | IST-REx-ID: 1644 |
G. Demay, P. Gazi, U. Maurer, and B. Tackmann, “Query-complexity amplification for random oracles,” presented at the ICITS: International Conference on Information Theoretic Security, Lugano, Switzerland, 2015, vol. 9063, pp. 159–180.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2015 | Published | Conference Paper | IST-REx-ID: 1646 |
A. Banerjee, G. Fuchsbauer, C. Peikert, K. Z. Pietrzak, and S. Stevens, “Key-homomorphic constrained pseudorandom functions,” in 12th Theory of Cryptography Conference, Warsaw, Poland, 2015, vol. 9015, pp. 31–60.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)