Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
263 Publications
2018 | Journal Article | IST-REx-ID: 58 |
Counting blanks in polygonal arrangements
A. Akopyan, E. Segal Halevi, SIAM Journal on Discrete Mathematics 32 (2018) 2242–2257.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
A. Akopyan, E. Segal Halevi, SIAM Journal on Discrete Mathematics 32 (2018) 2242–2257.
2018 | Journal Article | IST-REx-ID: 458 |
Incircular nets and confocal conics
A. Akopyan, A. Bobenko, Transactions of the American Mathematical Society 370 (2018) 2825–2854.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
A. Akopyan, A. Bobenko, Transactions of the American Mathematical Society 370 (2018) 2825–2854.
2018 | Journal Article | IST-REx-ID: 106 |
Long geodesics on convex surfaces
A. Akopyan, A. Petrunin, Mathematical Intelligencer 40 (2018) 26–31.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
A. Akopyan, A. Petrunin, Mathematical Intelligencer 40 (2018) 26–31.
2018 | Journal Article | IST-REx-ID: 530 |
Multiple covers with balls I: Inclusion–exclusion
H. Edelsbrunner, M. Iglesias Ham, Computational Geometry: Theory and Applications 68 (2018) 119–133.
[Preprint]
View
| Files available
| DOI
| WoS
H. Edelsbrunner, M. Iglesias Ham, Computational Geometry: Theory and Applications 68 (2018) 119–133.
2018 | Conference Paper | IST-REx-ID: 193 |
On the memory hardness of data independent password hashing functions
J.F. Alwen, P. Gazi, C. Kamath Hosdurg, K. Klein, G.F. Osang, K.Z. Pietrzak, L. Reyzin, M. Rolinek, M. Rybar, in:, Proceedings of the 2018 on Asia Conference on Computer and Communication Security, ACM, 2018, pp. 51–65.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
J.F. Alwen, P. Gazi, C. Kamath Hosdurg, K. Klein, G.F. Osang, K.Z. Pietrzak, L. Reyzin, M. Rolinek, M. Rybar, in:, Proceedings of the 2018 on Asia Conference on Computer and Communication Security, ACM, 2018, pp. 51–65.