Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




3387 Publications

2013 | Journal Article | IST-REx-ID: 2918
I. Castanon, L. Abrami, L. Holtzer, C.-P. J. Heisenberg, F. Van Der Goot, and M. González Gaitán, “Anthrax toxin receptor 2a controls mitotic spindle positioning,” Nature Cell Biology, vol. 15, no. 1. Nature Publishing Group, pp. 28–39, 2013.
View | DOI
 
2013 | Journal Article | IST-REx-ID: 2919 | OA
P. Baster et al., “SCF^TIR1 AFB-auxin signalling regulates PIN vacuolar trafficking and auxin fluxes during root gravitropism,” EMBO Journal, vol. 32, no. 2. Wiley-Blackwell, pp. 260–274, 2013.
View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 
2013 | Journal Article | IST-REx-ID: 2920 | OA
J. Compagnon and C.-P. J. Heisenberg, “Neurulation coordinating cell polarisation and lumen formation,” EMBO Journal, vol. 32, no. 1. Wiley-Blackwell, pp. 1–3, 2013.
View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 
2013 | Journal Article | IST-REx-ID: 2939
C. Chen and M. Kerber, “An output sensitive algorithm for persistent homology,” Computational Geometry: Theory and Applications, vol. 46, no. 4. Elsevier, pp. 435–447, 2013.
View | Files available | DOI
 
2013 | Conference Paper | IST-REx-ID: 2940 | OA
S. Krenn, K. Z. Pietrzak, and A. Wadia, “A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it,” presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan, 2013, vol. 7785, pp. 23–39.
View | Files available | DOI
 
2013 | Conference Paper | IST-REx-ID: 2948 | OA
T. Tommasi, N. Quadrianto, B. Caputo, and C. Lampert, “Beyond dataset bias: Multi-task unaligned shared knowledge transfer,” vol. 7724. Springer, pp. 1–15, 2013.
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 827 | OA
J. O’Brien and E. Benková, “Cytokinin cross talking during biotic and abiotic stress responses,” Frontiers in Plant Science, vol. 4. Frontiers Research Foundation, 2013.
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 828 | OA
C. Cuesta, K. T. Wabnik, and E. Benková, “Systems approaches to study root architecture dynamics,” Frontiers in Plant Science, vol. 4. Frontiers Research Foundation, 2013.
View | Files available | DOI
 
2013 | Conference Paper | IST-REx-ID: 2000 | OA
J. Reiter, I. Božić, K. Chatterjee, and M. Nowak, “TTP: Tool for tumor progression,” in Proceedings of 25th Int. Conf. on Computer Aided Verification, St. Petersburg, Russia, 2013, vol. 8044, pp. 101–106.
View | Files available | DOI | Download Preprint (ext.) | arXiv
 
2013 | Journal Article | IST-REx-ID: 2009 | OA
C. Uhler, A. Slavkovic, and S. Fienberg, “Privacy-preserving data sharing for genome-wide association studies,” Journal of Privacy and Confidentiality , vol. 5, no. 1. Carnegie Mellon University, pp. 137–166, 2013.
View | DOI | Download Published Version (ext.)
 
2013 | Journal Article | IST-REx-ID: 2010 | OA
C. Uhler, G. Raskutti, P. Bühlmann, and B. Yu, “Geometry of the faithfulness assumption in causal inference,” The Annals of Statistics, vol. 41, no. 2. Institute of Mathematical Statistics, pp. 436–463, 2013.
View | DOI | Download Published Version (ext.) | arXiv
 
2013 | Conference Paper | IST-REx-ID: 2181 | OA
T. A. Henzinger, C. Kirsch, H. Payer, A. Sezgin, and A. Sokolova, “Quantitative relaxation of concurrent data structures,” in Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming language, Rome, Italy, 2013, pp. 317–328.
View | Files available | DOI
 
2013 | Conference Paper | IST-REx-ID: 2182
P. Cerny, T. A. Henzinger, and A. Radhakrishna, “Quantitative abstraction refinement,” in Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming language, Rome, Italy, 2013, pp. 115–128.
View | DOI
 
2013 | Conference Paper | IST-REx-ID: 2209
T. Biedl, M. Held, and S. Huber, “Recognizing straight skeletons and Voronoi diagrams and reconstructing their input,” presented at the ISVD: Voronoi Diagrams in Science and Engineering, St. Petersburg, Russia, 2013, pp. 37–46.
View | DOI
 
2013 | Conference Paper | IST-REx-ID: 2210 | OA
T. Biedl, M. Held, and S. Huber, “Reconstructing polygons from embedded straight skeletons,” in 29th European Workshop on Computational Geometry, Braunschweig, Germany, 2013, pp. 95–98.
View | Download Submitted Version (ext.)
 
2013 | Conference Paper | IST-REx-ID: 2237 | OA
R. Blanc, A. Gupta, L. Kovács, and B. Kragl, “Tree interpolation in Vampire,” vol. 8312. Springer, pp. 173–181, 2013.
View | Files available | DOI
 
2013 | Conference Paper | IST-REx-ID: 2238
K. Chatterjee, V. Forejt, and D. Wojtczak, “Multi-objective discounted reward verification in graphs and MDPs,” vol. 8312. Springer, pp. 228–242, 2013.
View | DOI
 
2013 | Conference Paper | IST-REx-ID: 2243 | OA
J. Michaliszyn and J. Otop, “Elementary modal logics over transitive structures,” vol. 23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, pp. 563–577, 2013.
View | Files available | DOI
 
2013 | Conference Paper | IST-REx-ID: 2244 | OA
J. Matoušek, E. Sedgwick, M. Tancer, and U. Wagner, “Untangling two systems of noncrossing curves,” vol. 8242. Springer, pp. 472–483, 2013.
View | Files available | DOI | Download Preprint (ext.) | arXiv
 
2013 | Conference Paper | IST-REx-ID: 2258 | OA
E. Kiltz, K. Z. Pietrzak, and M. Szegedy, “Digital signatures with minimal overhead from indifferentiable random invertible functions,” vol. 8042. Springer, pp. 571–588, 2013.
View | Files available | DOI
 

Search

Filter Publications