Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




4043 Publications

2013 | Journal Article | IST-REx-ID: 2910 | OA
J. Kelleher, N. H. Barton, and A. Etheridge, “Coalescent simulation in continuous space,” Bioinformatics, vol. 29, no. 7. Oxford University Press, pp. 955–956, 2013.
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 2913 | OA
G. Tkačik, E. Granot Atedgi, R. Segev, and E. Schneidman, “Retinal metric: a stimulus distance measure derived from population neural responses,” Physical Review Letters, vol. 110, no. 5. American Physical Society, 2013.
View | DOI | Download Preprint (ext.)
 
2013 | Journal Article | IST-REx-ID: 2914 | OA
G. Stephens, T. Mora, G. Tkačik, and W. Bialek, “Statistical thermodynamics of natural images,” Physical Review Letters, vol. 110, no. 1. American Physical Society, 2013.
View | Files available | DOI | Download Published Version (ext.) | arXiv
 
2013 | Journal Article | IST-REx-ID: 2918
I. Castanon, L. Abrami, L. Holtzer, C.-P. J. Heisenberg, F. Van Der Goot, and M. González Gaitán, “Anthrax toxin receptor 2a controls mitotic spindle positioning,” Nature Cell Biology, vol. 15, no. 1. Nature Publishing Group, pp. 28–39, 2013.
View | DOI
 
2013 | Journal Article | IST-REx-ID: 2919 | OA
P. Baster et al., “SCF^TIR1 AFB-auxin signalling regulates PIN vacuolar trafficking and auxin fluxes during root gravitropism,” EMBO Journal, vol. 32, no. 2. Wiley-Blackwell, pp. 260–274, 2013.
View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 
2013 | Journal Article | IST-REx-ID: 2920 | OA
J. Compagnon and C.-P. J. Heisenberg, “Neurulation coordinating cell polarisation and lumen formation,” EMBO Journal, vol. 32, no. 1. Wiley-Blackwell, pp. 1–3, 2013.
View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 
2013 | Journal Article | IST-REx-ID: 2939
C. Chen and M. Kerber, “An output sensitive algorithm for persistent homology,” Computational Geometry: Theory and Applications, vol. 46, no. 4. Elsevier, pp. 435–447, 2013.
View | Files available | DOI
 
2013 | Conference Paper | IST-REx-ID: 2940 | OA
S. Krenn, K. Z. Pietrzak, and A. Wadia, “A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it,” presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan, 2013, vol. 7785, pp. 23–39.
View | Files available | DOI
 
2013 | Conference Paper | IST-REx-ID: 2948 | OA
T. Tommasi, N. Quadrianto, B. Caputo, and C. Lampert, “Beyond dataset bias: Multi-task unaligned shared knowledge transfer,” vol. 7724. Springer, pp. 1–15, 2013.
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 3116
K. Chatterjee, L. De Alfaro, M. Faella, R. Majumdar, and V. Raman, “Code aware resource management,” Formal Methods in System Design, vol. 42, no. 2. Springer, pp. 142–174, 2013.
View | DOI
 

Search

Filter Publications