Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




3060 Publications

2013 | Conference Paper | IST-REx-ID: 2940 | OA
Krenn, S., Pietrzak, K. Z., & Wadia, A. (2013). A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it. In A. Sahai (Ed.) (Vol. 7785, pp. 23–39). Presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan: Springer. https://doi.org/10.1007/978-3-642-36594-2_2
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 2944
Aeschbacher, S., Futschik, A., & Beaumont, M. (2013). Approximate Bayesian computation for modular inference problems with many parameters: the example of migration rates. . Molecular Ecology. Wiley-Blackwell. https://doi.org/10.1111/mec.12165
View | DOI
 
2013 | Conference Paper | IST-REx-ID: 2948 | OA
Tommasi, T., Quadrianto, N., Caputo, B., & Lampert, C. (2013). Beyond dataset bias: Multi-task unaligned shared knowledge transfer. Presented at the ACCV: Asian Conference on Computer Vision, Daejeon, Korea: Springer. https://doi.org/10.1007/978-3-642-37331-2_1
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 827 | OA
O’Brien, J., & Benková, E. (2013). Cytokinin cross talking during biotic and abiotic stress responses. Frontiers in Plant Science. Frontiers Research Foundation. https://doi.org/10.3389/fpls.2013.00451
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 828 | OA
Cuesta, C., Wabnik, K. T., & Benková, E. (2013). Systems approaches to study root architecture dynamics. Frontiers in Plant Science. Frontiers Research Foundation. https://doi.org/10.3389/fpls.2013.00537
View | Files available | DOI
 

Search

Filter Publications