Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
2013 | Journal Article | IST-REx-ID: 2850 |
G. Tkacik, O. Marre, T. Mora, D. Amodei, M. Berry, and W. Bialek, “The simplest maximum entropy model for collective behavior in a neural network,” Journal of Statistical Mechanics Theory and Experiment, vol. 2013, no. 3, p. P03011, 2013.View | DOI | Download Preprint (ext.) | arXiv
2013 | Journal Article | IST-REx-ID: 2853 |
D. Refardt, T. Bergmiller, and R. Kümmerli, “Altruism can evolve when relatedness is low: Evidence from bacteria committing suicide upon phage infection,” Proceedings of the Royal Society of London Series B Biological Sciences, vol. 280, no. 1759, 2013.View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
2013 | Journal Article | IST-REx-ID: 2882 |
C. Löfke, M. Zwiewka, I. Heilmann, M. Van Montagu, T. Teichmann, and J. Friml, “Asymmetric gibberellin signaling regulates vacuolar trafficking of PIN auxin transporters during root gravitropism,” PNAS, vol. 110, no. 9, pp. 3627–3632, 2013.View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
2013 | Conference Paper | IST-REx-ID: 2901 |
C. Chen, V. Kolmogorov, Z. Yan, D. Metaxas, and C. Lampert, “Computing the M most probable modes of a graphical model,” presented at the AISTATS: Conference on Uncertainty in Artificial Intelligence, Scottsdale, AZ, United States, 2013, vol. 31, pp. 161–169.View | Download None (ext.)
2013 | Conference Paper | IST-REx-ID: 2940 |
S. Krenn, K. Z. Pietrzak, and A. Wadia, “A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it,” presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan, 2013, vol. 7785, pp. 23–39.View | Files available | DOI