Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
3752 Publications
2012 | Journal Article | IST-REx-ID: 498 |

Pickup M, Field D, Rowell D, Young A. 2012. Predicting local adaptation in fragmented plant populations: Implications for restoration genetics. Evolutionary Applications. 5(8), 913–924.
View
| Files available
| DOI
2012 | Journal Article | IST-REx-ID: 506 |

Sixt MK. 2012. Cell migration: Fibroblasts find a new way to get ahead. Journal of Cell Biology. 197(3), 347–349.
View
| Files available
| DOI
2012 | Technical Report | IST-REx-ID: 5377 |

Chatterjee K, Velner Y. 2012. Mean-payoff pushdown games, IST Austria, 33p.
View
| Files available
| DOI
2012 | Technical Report | IST-REx-ID: 5378 |

Chatterjee K, Chaubal S, Kamath P. 2012. Faster algorithms for alternating refinement relations, IST Austria, 21p.
View
| Files available
| DOI
2012 | Technical Report | IST-REx-ID: 5396 |

Korc F, Kolmogorov V, Lampert C. 2012. Approximating marginals using discrete energy minimization, IST Austria, 13p.
View
| Files available
| DOI
2012 | Book Chapter | IST-REx-ID: 5745 |

Gupta A. 2012.Improved Single Pass Algorithms for Resolution Proof Reduction. In: Automated Technology for Verification and Analysis. vol. 7561, 107–121.
View
| Files available
| DOI
2012 | Journal Article | IST-REx-ID: 6588 |

Pausinger F. 2012. Elementary solutions of the Bernstein problem on two intervals. Journal of Mathematical Physics, Analysis, Geometry. 8(1), 63–78.
View
| Download Published Version (ext.)
| WoS
2012 | Conference Paper | IST-REx-ID: 1384 |

Beyer D, Henzinger TA, Keremoglu M, Wendler P. 2012. Conditional model checking: A technique to pass information between verifiers. Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering. FSE: Foundations of Software Engineering, 57.
View
| DOI
| Download Preprint (ext.)
2012 | Conference Paper | IST-REx-ID: 2048 |

Faust S, Pietrzak KZ, Schipper J. 2012. Practical leakage-resilient symmetric cryptography. Conference proceedings CHES 2012. CHES: Cryptographic Hardware and Embedded Systems, LNCS, vol. 7428, 213–232.
View
| DOI
| Download Preprint (ext.)
2012 | Conference Paper | IST-REx-ID: 2049 |

Heyse S, Kiltz E, Lyubashevsky V, Paar C, Pietrzak KZ. 2012. Lapin: An efficient authentication protocol based on ring-LPN. Conference proceedings FSE 2012. FSE: Fast Software Encryption, LNCS, vol. 7549, 346–365.
View
| DOI
| Download Preprint (ext.)