Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

4872 Publications


2019 | Conference Paper | IST-REx-ID: 7640 | OA
Kolesnikov, A., Kuznetsova, A., Lampert, C., & Ferrari, V. (2019). Detecting visual relationships using box attention. In Proceedings of the 2019 International Conference on Computer Vision Workshop. Seoul, South Korea: IEEE. https://doi.org/10.1109/ICCVW.2019.00217
[Preprint] View | DOI | Download Preprint (ext.) | WoS | arXiv
 

2019 | Conference Paper | IST-REx-ID: 7639
Rannen-Triki, A., Berman, M., Kolmogorov, V., & Blaschko, M. B. (2019). Function norms for neural networks. In Proceedings of the 2019 International Conference on Computer Vision Workshop. Seoul, South Korea: IEEE. https://doi.org/10.1109/ICCVW.2019.00097
View | DOI | WoS
 

2019 | Book Chapter | IST-REx-ID: 8281
Barton, N. H., & Etheridge, A. (2019). Mathematical models in population genetics. In D. Balding, I. Moltke, & J. Marioni (Eds.), Handbook of statistical genomics (4th ed., pp. 115–144). Wiley. https://doi.org/10.1002/9781119487845.ch4
View | DOI | WoS
 

2019 | Preprint | IST-REx-ID: 8184 | OA
Avvakumov, S., Karasev, R., & Skopenkov, A. (n.d.). Stronger counterexamples to the topological Tverberg conjecture. arXiv. arXiv.
[Preprint] View | Files available | Download Preprint (ext.) | WoS | arXiv
 

2019 | Conference Paper | IST-REx-ID: 6430 | OA
Fuchsbauer, G., Kamath Hosdurg, C., Klein, K., & Pietrzak, K. Z. (2019). Adaptively secure proxy re-encryption (Vol. 11443, pp. 317–346). Presented at the PKC: Public-Key Cryptograhy, Beijing, China: Springer Nature. https://doi.org/10.1007/978-3-030-17259-6_11
[Preprint] View | Files available | DOI | Download Preprint (ext.)
 

Filters and Search Terms

extern<>1

Search

Filter Publications