Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
11357 Publications
2012 |
Published |
Journal Article |
IST-REx-ID: 3274
G. Rieckh, W. Kreuzer, H. Waubke, and P. Balazs, “A 2.5D-Fourier-BEM model for vibrations in a tunnel running through layered anisotropic soil,” Engineering Analysis with Boundary Elements, vol. 36, no. 6. Elsevier, pp. 960–967, 2012.
View
| DOI
| WoS
2012 |
Published |
Conference Paper |
IST-REx-ID: 3279
A. Jain, K. Z. Pietrzak, and A. Tentes, “Hardness preserving constructions of pseudorandom functions,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 369–382.
View
| DOI
| Download None (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 3280 |
K. Z. Pietrzak, “Subspace LWE,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 548–563.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 3281
K. Z. Pietrzak, A. Rosen, and G. Segev, “Lossy functions do not amplify well,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 458–475.
View
| DOI
| Download None (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 3282 |
Y. Dodis, K. Z. Pietrzak, E. Kiltz, and D. Wichs, “Message authentication, revisited,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Cambridge, UK, 2012, vol. 7237, pp. 355–374.
[Submitted Version]
View
| Files available
| DOI
2012 |
Published |
Conference Paper |
IST-REx-ID: 3284 |
V. Kolmogorov and S. Živný, “The complexity of conservative valued CSPs,” presented at the SODA: Symposium on Discrete Algorithms, 2012, pp. 750–759.
View
| Download (ext.)
2012 |
Published |
Journal Article |
IST-REx-ID: 3289 |
A. Pereira et al., “A vaccinia virus-driven interplay between the MKK4/7-JNK1/2 pathway and cytoskeleton reorganization,” Journal of Virology, vol. 86, no. 1. ASM, pp. 172–184, 2012.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
| PubMed | Europe PMC
2012 |
Published |
Journal Article |
IST-REx-ID: 3310 |
P. Bendich, S. Cabello, and H. Edelsbrunner, “A point calculus for interlevel set homology,” Pattern Recognition Letters, vol. 33, no. 11. Elsevier, pp. 1436–1444, 2012.
[Submitted Version]
View
| Files available
| DOI
| WoS
2012 |
Published |
Journal Article |
IST-REx-ID: 3317 |
E. Eggermann, I. Bucurenciu, S. Goswami, and P. M. Jonas, “Nanodomain coupling between Ca(2+) channels and sensors of exocytosis at fast mammalian synapses,” Nature Reviews Neuroscience, vol. 13, no. 1. Nature Publishing Group, pp. 7–21, 2012.
[Submitted Version]
View
| Files available
| DOI
| WoS
2012 |
Published |
Journal Article |
IST-REx-ID: 3331 |
M. Kerber and M. Sagraloff, “A worst case bound for topology computation of algebraic curves,” Journal of Symbolic Computation, vol. 47, no. 3. Elsevier, pp. 239–258, 2012.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2012 |
Published |
Conference Paper |
IST-REx-ID: 3341 |
K. Chatterjee, “Robustness of structurally equivalent concurrent parity games,” presented at the FoSSaCS: Foundations of Software Science and Computation Structures, Tallinn, Estonia, 2012, vol. 7213, pp. 270–285.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
2012 |
Published |
Journal Article |
IST-REx-ID: 13407
O. Chovnik, R. Balgley, J. R. Goldman, and R. Klajn, “Dynamically self-assembling carriers enable guiding of diamagnetic particles by weak magnets,” Journal of the American Chemical Society, vol. 134, no. 48. American Chemical Society, pp. 19564–19567, 2012.
[Published Version]
View
| DOI
| PubMed | Europe PMC
2012 |
Published |
Journal Article |
IST-REx-ID: 13408
Y. Ridelman, G. Singh, R. Popovitz-Biro, S. G. Wolf, S. Das, and R. Klajn, “Metallic nanobowls by galvanic replacement reaction on heterodimeric nanoparticles,” Small, vol. 8, no. 5. Wiley, pp. 654–660, 2012.
View
| DOI
| PubMed | Europe PMC
2012 |
Published |
Conference Paper |
IST-REx-ID: 1384 |
D. Beyer, T. A. Henzinger, M. Keremoglu, and P. Wendler, “Conditional model checking: A technique to pass information between verifiers,” in Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, Cary, NC, USA, 2012.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv