Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

2975 Publications


2013 | Journal Article | IST-REx-ID: 2918
Castanon, I., Abrami, L., Holtzer, L., Heisenberg, C.-P. J., Van Der Goot, F., & González Gaitán, M. (2013). Anthrax toxin receptor 2a controls mitotic spindle positioning. Nature Cell Biology, 15(1), 28–39. https://doi.org/10.1038/ncb2632
View | DOI
 

2013 | Journal Article | IST-REx-ID: 2919 | OA
Baster, P., Robert, S., Kleine Vehn, J., Vanneste, S., Kania, U., Grunewald, W., … Friml, J. (2013). SCF^TIR1 AFB-auxin signalling regulates PIN vacuolar trafficking and auxin fluxes during root gravitropism. EMBO Journal, 32(2), 260–274. https://doi.org/10.1038/emboj.2012.310
View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 

2013 | Journal Article | IST-REx-ID: 2920 | OA
Compagnon, J., & Heisenberg, C.-P. J. (2013). Neurulation coordinating cell polarisation and lumen formation. EMBO Journal, 32(1), 1–3. https://doi.org/10.1038/emboj.2012.325
View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 

2013 | Journal Article | IST-REx-ID: 2926
Tragust, S., Mitteregger, B., Barone, V., Konrad, M., Ugelvig, L. V., & Cremer, S. (2013). Ants disinfect fungus-exposed brood by oral uptake and spread of their poison. Current Biology, 23(1), 76–82. https://doi.org/10.1016/j.cub.2012.11.034
View | Files available | DOI
 

2013 | Journal Article | IST-REx-ID: 2939
Chen, C., & Kerber, M. (2013). An output sensitive algorithm for persistent homology. Computational Geometry: Theory and Applications, 46(4), 435–447. https://doi.org/10.1016/j.comgeo.2012.02.010
View | Files available | DOI
 

2013 | Conference Paper | IST-REx-ID: 2940 | OA
Krenn, S., Pietrzak, K. Z., & Wadia, A. (2013). A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it. In A. Sahai (Ed.) (Vol. 7785, pp. 23–39). Presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan: Springer. https://doi.org/10.1007/978-3-642-36594-2_2
View | Files available | DOI
 

2013 | Journal Article | IST-REx-ID: 2944
Aeschbacher, S., Futschik, A., & Beaumont, M. (2013). Approximate Bayesian computation for modular inference problems with many parameters: the example of migration rates. . Molecular Ecology, 22(4), 987–1002. https://doi.org/10.1111/mec.12165
View | DOI
 

2013 | Conference Paper | IST-REx-ID: 2948 | OA
Tommasi, T., Quadrianto, N., Caputo, B., & Lampert, C. (2013). Beyond dataset bias: Multi-task unaligned shared knowledge transfer. Presented at the ACCV: Asian Conference on Computer Vision, Daejeon, Korea: Springer. https://doi.org/10.1007/978-3-642-37331-2_1
View | Files available | DOI
 

2013 | Journal Article | IST-REx-ID: 3116
Chatterjee, K., De Alfaro, L., Faella, M., Majumdar, R., & Raman, V. (2013). Code aware resource management. Formal Methods in System Design, 42(2), 142–174. https://doi.org/10.1007/s10703-012-0170-4
View | DOI
 

2013 | Technical Report | IST-REx-ID: 6440 | OA
Henzinger, T. A., Payer, H., & Sezgin, A. (2013). Replacing competition with cooperation to achieve scalable lock-free FIFO queues . IST Austria. https://doi.org/10.15479/AT:IST-2013-124-v1-1
View | Files available | DOI
 

Filters and Search Terms

extern<>1

Search

Filter Publications