Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




3060 Publications

2013 | Conference Paper | IST-REx-ID: 2940 | OA
S. Krenn, K. Z. Pietrzak, and A. Wadia, “A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it,” presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan, 2013, vol. 7785, pp. 23–39.
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 2944
S. Aeschbacher, A. Futschik, and M. Beaumont, “Approximate Bayesian computation for modular inference problems with many parameters: the example of migration rates. ,” Molecular Ecology, vol. 22, no. 4. Wiley-Blackwell, pp. 987–1002, 2013.
View | DOI
 
2013 | Conference Paper | IST-REx-ID: 2948 | OA
T. Tommasi, N. Quadrianto, B. Caputo, and C. Lampert, “Beyond dataset bias: Multi-task unaligned shared knowledge transfer,” vol. 7724. Springer, pp. 1–15, 2013.
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 827 | OA
J. O’Brien and E. Benková, “Cytokinin cross talking during biotic and abiotic stress responses,” Frontiers in Plant Science, vol. 4. Frontiers Research Foundation, 2013.
View | Files available | DOI
 
2013 | Journal Article | IST-REx-ID: 828 | OA
C. Cuesta, K. T. Wabnik, and E. Benková, “Systems approaches to study root architecture dynamics,” Frontiers in Plant Science, vol. 4. Frontiers Research Foundation, 2013.
View | Files available | DOI
 

Search

Filter Publications