Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




3060 Publications

2013 | Conference Paper | IST-REx-ID: 2940 | OA
Krenn, S., Pietrzak, K. Z., & Wadia, A. (2013). A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it. In A. Sahai (Ed.) (Vol. 7785, pp. 23–39). Presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan: Springer. https://doi.org/10.1007/978-3-642-36594-2_2
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 2944
Aeschbacher, S., Futschik, A., & Beaumont, M. (2013). Approximate Bayesian computation for modular inference problems with many parameters: the example of migration rates. . Molecular Ecology. Wiley-Blackwell. https://doi.org/10.1111/mec.12165
View | DOI
 
2013 | Conference Paper | IST-REx-ID: 2948 | OA
Tommasi, T., Quadrianto, N., Caputo, B., & Lampert, C. (2013). Beyond dataset bias: Multi-task unaligned shared knowledge transfer. Presented at the ACCV: Asian Conference on Computer Vision, Daejeon, Korea: Springer. https://doi.org/10.1007/978-3-642-37331-2_1
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 827 | OA
O’Brien, J., & Benková, E. (2013). Cytokinin cross talking during biotic and abiotic stress responses. Frontiers in Plant Science. Frontiers Research Foundation. https://doi.org/10.3389/fpls.2013.00451
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 828 | OA
Cuesta, C., Wabnik, K. T., & Benková, E. (2013). Systems approaches to study root architecture dynamics. Frontiers in Plant Science. Frontiers Research Foundation. https://doi.org/10.3389/fpls.2013.00537
View | Files available | DOI
 
2013 | Conference Paper | IST-REx-ID: 2000 | OA
Reiter, J., Božić, I., Chatterjee, K., & Nowak, M. (2013). TTP: Tool for tumor progression. In Proceedings of 25th Int. Conf. on Computer Aided Verification (Vol. 8044, pp. 101–106). St. Petersburg, Russia: Springer. https://doi.org/10.1007/978-3-642-39799-8_6
View | Files available | DOI | Download Preprint (ext.) | arXiv
 
2013 | Journal Article | IST-REx-ID: 2009 | OA
Uhler, C., Slavkovic, A., & Fienberg, S. (2013). Privacy-preserving data sharing for genome-wide association studies. Journal of Privacy and Confidentiality . Carnegie Mellon University. https://doi.org/10.29012/jpc.v5i1.629
View | DOI | Download Published Version (ext.)
 
2013 | Journal Article | IST-REx-ID: 2010 | OA
Uhler, C., Raskutti, G., Bühlmann, P., & Yu, B. (2013). Geometry of the faithfulness assumption in causal inference. The Annals of Statistics. Institute of Mathematical Statistics. https://doi.org/10.1214/12-AOS1080
View | DOI | Download Published Version (ext.) | arXiv
 
2013 | Conference Paper | IST-REx-ID: 2181 | OA
Henzinger, T. A., Kirsch, C., Payer, H., Sezgin, A., & Sokolova, A. (2013). Quantitative relaxation of concurrent data structures. In Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming language (pp. 317–328). Rome, Italy: ACM. https://doi.org/10.1145/2429069.2429109
View | Files available | DOI
 
2013 | Conference Paper | IST-REx-ID: 2182
Cerny, P., Henzinger, T. A., & Radhakrishna, A. (2013). Quantitative abstraction refinement. In Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming language (pp. 115–128). Rome, Italy: ACM. https://doi.org/10.1145/2429069.2429085
View | DOI
 

Search

Filter Publications