Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

2645 Publications


2012 | Conference Paper | IST-REx-ID: 3123   OA
J. Yu, C. J. Wojtan, G. Turk, and C. Yap, “Explicit mesh surfaces for particle based fluids,” in Computer Graphics Forum, Cagliari, Sardinia, Italy, 2012, vol. 31, no. 2, pp. 815–824.
View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 3130   OA
T. Bergmiller, M. Ackermann, and O. Silander, “Patterns of evolutionary conservation of essential genes correlate with their compensability,” PLoS Genetics, vol. 8, no. 6, 2012.
View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 3166   OA
H. Vladar, “Amino acid fermentation at the origin of the genetic code,” Biology Direct, vol. 7, 2012.
View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 3262   OA
G. Tkacik, A. Walczak, and W. Bialek, “Optimizing information flow in small genetic networks. III. A self-interacting gene,” Physical Review E statistical nonlinear and soft matter physics , vol. 85, no. 4, 2012.
View | DOI | Download (ext.)
 

2012 | Journal Article | IST-REx-ID: 3274
G. Rieckh, W. Kreuzer, H. Waubke, and P. Balazs, “A 2.5D-Fourier-BEM model for vibrations in a tunnel running through layered anisotropic soil,” Engineering Analysis with Boundary Elements, vol. 36, no. 6, pp. 960–967, 2012.
View | DOI
 

2012 | Conference Paper | IST-REx-ID: 3279
A. Jain, K. Z. Pietrzak, and A. Tentes, “Hardness preserving constructions of pseudorandom functions,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 369–382.
View | DOI | Download (ext.)
 

2012 | Conference Paper | IST-REx-ID: 3281
K. Z. Pietrzak, A. Rosen, and G. Segev, “Lossy functions do not amplify well,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 458–475.
View | DOI | Download (ext.)
 

2012 | Conference Paper | IST-REx-ID: 3250
K. Z. Pietrzak, “Cryptography from learning parity with noise,” presented at the SOFSEM: Current Trends in Theory and Practice of Computer Science, Špindlerův Mlýn, Czech Republic, 2012, vol. 7147, pp. 99–114.
View | DOI
 

2012 | Journal Article | IST-REx-ID: 3248   OA
C. Lampert and J. Peters, “Real-time detection of colored objects in multiple camera streams with off-the-shelf hardware components,” Journal of Real-Time Image Processing, vol. 7, no. 1, pp. 31–41, 2012.
View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 3243
P. Danowski, “Zwischen Technologie und Information,” Büchereiperspektiven, vol. 1/2012, p. 11, 2012.
View | Download (ext.)
 

Filters and Search Terms

extern<>1

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed