Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

2497 Publications


2012 | Journal Article | IST-REx-ID: 3166   OA
Vladar H. 2012. Amino acid fermentation at the origin of the genetic code. Biology Direct. 7.
View | Files available | DOI
 

2012 | Conference Paper | IST-REx-ID: 3135   OA
Brázdil B, Chatterjee K, Kučera A, Novotny P. 2012. Efficient controller synthesis for consumption games with multiple resource types. CAV: Computer Aided Verification, LNCS, vol. 7358. 23–38.
View | DOI | Download (ext.)
 

2012 | Journal Article | IST-REx-ID: 3248   OA
Lampert C, Peters J. 2012. Real-time detection of colored objects in multiple camera streams with off-the-shelf hardware components. Journal of Real-Time Image Processing. 7(1), 31–41.
View | Files available | DOI
 

2012 | Conference Paper | IST-REx-ID: 3255
Chatterjee K, Doyen L. 2012. Games and Markov decision processes with mean payoff parity and energy parity objectives. MEMICS: Mathematical and Engineering Methods in Computer Science, LNCS, vol. 7119. 37–46.
View | DOI
 

2012 | Journal Article | IST-REx-ID: 3243
Danowski P. 2012. Zwischen Technologie und Information. Büchereiperspektiven. 1/2012, 11.
View | Download (ext.)
 

2012 | Journal Article | IST-REx-ID: 3262   OA
Tkacik G, Walczak A, Bialek W. 2012. Optimizing information flow in small genetic networks. III. A self-interacting gene. Physical Review E statistical nonlinear and soft matter physics . 85(4).
View | DOI | Download (ext.)
 

2012 | Journal Article | IST-REx-ID: 3274
Rieckh G, Kreuzer W, Waubke H, Balazs P. 2012. A 2.5D-Fourier-BEM model for vibrations in a tunnel running through layered anisotropic soil. Engineering Analysis with Boundary Elements. 36(6), 960–967.
View | DOI
 

2012 | Conference Paper | IST-REx-ID: 3279
Jain A, Pietrzak KZ, Tentes A. 2012. Hardness preserving constructions of pseudorandom functions. TCC: Theory of Cryptography Conference, LNCS, vol. 7194. 369–382.
View | DOI | Download (ext.)
 

2012 | Conference Paper | IST-REx-ID: 3281
Pietrzak KZ, Rosen A, Segev G. 2012. Lossy functions do not amplify well. TCC: Theory of Cryptography Conference, LNCS, vol. 7194. 458–475.
View | DOI | Download (ext.)
 

2012 | Conference Paper | IST-REx-ID: 495   OA
Kruckman A, Rubin S, Sheridan J, Zax B. 2012. A Myhill Nerode theorem for automata with advice. Proceedings GandALF 2012. GandALF: Games, Automata, Logics and Formal Verification, EPTCS, vol. 96. 238–246.
View | Files available | DOI
 

Filters and Search Terms

extern<>1

Search

Filter Publications

Display / Sort

Citation Style: IST Annual Report

Export / Embed