Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

2595 Publications


2012 | Conference Paper | IST-REx-ID: 2048   OA
S. Faust, K. Z. Pietrzak, and J. Schipper, “Practical leakage-resilient symmetric cryptography,” in Conference proceedings CHES 2012, Leuven, Belgium, 2012, vol. 7428, pp. 213–232.
View | DOI | Download (ext.)
 

2012 | Journal Article | IST-REx-ID: 2411   OA
I. Ebersberger et al., “A consistent phylogenetic backbone for the fungi,” Molecular Biology and Evolution, vol. 29, no. 5, pp. 1319–1334, 2012.
View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 2904   OA
F. Pausinger, “Weak multipliers for generalized van der Corput sequences,” Journal de Theorie des Nombres des Bordeaux, vol. 24, no. 3, pp. 729–749, 2012.
View | DOI | Download (ext.)
 

2012 | Preprint | IST-REx-ID: 2928   OA
V. Kolmogorov and T. Schoenemann, “Generalized sequential tree-reweighted message passing,” arXiv. ArXiv, 2012.
View | Download (ext.) | arXiv
 

2012 | Conference Paper | IST-REx-ID: 2930   OA
A. Huber and V. Kolmogorov, “Towards minimizing k-submodular functions,” presented at the ISCO: International Symposium on Combinatorial Optimization, Athens, Greece, 2012, vol. 7422, pp. 451–462.
View | DOI | Download (ext.)
 

2012 | Journal Article | IST-REx-ID: 2959   OA
C. Uhler, “Geometry of maximum likelihood estimation in Gaussian graphical models,” Annals of Statistics, vol. 40, no. 1, pp. 238–261, 2012.
View | DOI | Download (ext.)
 

2012 | Journal Article | IST-REx-ID: 2954   OA
A. Pernia-Andrade, S. Goswami, Y. Stickler, U. Fröbe, A. Schlögl, and P. M. Jonas, “A deconvolution based method with high sensitivity and temporal resolution for detection of spontaneous synaptic currents in vitro and in vivo,” Biophysical Journal, vol. 103, no. 7, pp. 1429–1439, 2012.
View | DOI | Download (ext.) | PubMed | Europe PMC
 

2012 | Journal Article | IST-REx-ID: 2966   OA
S. Cremer, M. Suefuji, A. Schrempf, and J. Heinze, “The dynamics of male-male competition in Cardiocondyla obscurior ants,” BMC Ecology, vol. 12, 2012.
View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 3159   OA
Y. Mileyko, H. Edelsbrunner, C. Price, and J. Weitz, “Hierarchical ordering of reticular networks,” PLoS One, vol. 7, no. 6, 2012.
View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 3161   OA
M. Vyleta, J. Wong, and B. Magun, “Suppression of ribosomal function triggers innate immune signaling through activation of the NLRP3 inflammasome,” PLoS One, vol. 7, no. 5, 2012.
View | Files available | DOI
 

2012 | Conference Paper | IST-REx-ID: 3123   OA
J. Yu, C. J. Wojtan, G. Turk, and C. Yap, “Explicit mesh surfaces for particle based fluids,” in Computer Graphics Forum, Cagliari, Sardinia, Italy, 2012, vol. 31, no. 2, pp. 815–824.
View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 3130   OA
T. Bergmiller, M. Ackermann, and O. Silander, “Patterns of evolutionary conservation of essential genes correlate with their compensability,” PLoS Genetics, vol. 8, no. 6, 2012.
View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 3166   OA
H. Vladar, “Amino acid fermentation at the origin of the genetic code,” Biology Direct, vol. 7, 2012.
View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 3262   OA
G. Tkacik, A. Walczak, and W. Bialek, “Optimizing information flow in small genetic networks. III. A self-interacting gene,” Physical Review E statistical nonlinear and soft matter physics , vol. 85, no. 4, 2012.
View | DOI | Download (ext.)
 

2012 | Journal Article | IST-REx-ID: 3274
G. Rieckh, W. Kreuzer, H. Waubke, and P. Balazs, “A 2.5D-Fourier-BEM model for vibrations in a tunnel running through layered anisotropic soil,” Engineering Analysis with Boundary Elements, vol. 36, no. 6, pp. 960–967, 2012.
View | DOI
 

2012 | Conference Paper | IST-REx-ID: 3279
A. Jain, K. Z. Pietrzak, and A. Tentes, “Hardness preserving constructions of pseudorandom functions,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 369–382.
View | DOI | Download (ext.)
 

2012 | Conference Paper | IST-REx-ID: 3281
K. Z. Pietrzak, A. Rosen, and G. Segev, “Lossy functions do not amplify well,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 458–475.
View | DOI | Download (ext.)
 

2012 | Conference Paper | IST-REx-ID: 3250
K. Z. Pietrzak, “Cryptography from learning parity with noise,” presented at the SOFSEM: Current Trends in Theory and Practice of Computer Science, Špindlerův Mlýn, Czech Republic, 2012, vol. 7147, pp. 99–114.
View | DOI
 

2012 | Journal Article | IST-REx-ID: 3248   OA
C. Lampert and J. Peters, “Real-time detection of colored objects in multiple camera streams with off-the-shelf hardware components,” Journal of Real-Time Image Processing, vol. 7, no. 1, pp. 31–41, 2012.
View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 3243
P. Danowski, “Zwischen Technologie und Information,” Büchereiperspektiven, vol. 1/2012, p. 11, 2012.
View | Download (ext.)
 

Filters and Search Terms

extern<>1

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed