Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

3471 Publications


2014 | Conference Paper | IST-REx-ID: 2033 | OA
Hernandez Lobato D, Sharmanska V, Kersting K, Lampert C, Quadrianto N. 2014. Mind the nuisance: Gaussian process classification using privileged noise. Advances in Neural Information Processing Systems. NIPS: Neural Information Processing Systems vol. 1, 837–845.
View | Download Submitted Version (ext.)
 

2014 | Journal Article | IST-REx-ID: 2038 | OA
Boker U, Chatterjee K, Henzinger TA, Kupferman O. 2014. Temporal specifications with accumulative values. ACM Transactions on Computational Logic (TOCL). 15(4), 27.
View | Files available | DOI
 

2014 | Journal Article | IST-REx-ID: 2040 | OA
Kicheva A, Bollenbach MT, Ribeiro A, Pérez Valle H, Lovell Badge R, Episkopou V, Briscoe J. 2014. Coordination of progenitor specification and growth in mouse and chick spinal cord. Science. 345(6204), 1254927.
View | DOI | Download Submitted Version (ext.)
 

2014 | Journal Article | IST-REx-ID: 2041 | OA
Jonas PM, Lisman J. 2014. Structure, function and plasticity of hippocampal dentate gyrus microcircuits. Frontiers in Neural Circuits. 8, 2p.
View | Files available | DOI
 

2014 | Journal Article | IST-REx-ID: 2042 | OA
Kupczok A, Bollback JP. 2014. Motif depletion in bacteriophages infecting hosts with CRISPR systems. BMC Genomics. 15(1), 663.
View | Files available | DOI
 

2014 | Conference Paper | IST-REx-ID: 2043 | OA
Bauer U, Kerber M, Reininghaus J. 2014. Distributed computation of persistent homology. Proceedings of the Workshop on Algorithm Engineering and Experiments. ALENEX: Algorithm Engineering and Experiments, 31–38.
View | DOI | Download Submitted Version (ext.)
 

2014 | Book Chapter | IST-REx-ID: 2044 | OA
Bauer U, Kerber M, Reininghaus J. 2014.Clear and Compress: Computing Persistent Homology in Chunks. In: Topological Methods in Data Analysis and Visualization III. , 103–117.
View | DOI | Download Submitted Version (ext.)
 

2014 | Conference Paper | IST-REx-ID: 2045 | OA
Dachman Soled D, Fuchsbauer G, Mohassel P, O’Neill A. 2014. Enhanced chosen-ciphertext security and applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PKC: Public Key Crypography, LNCS, vol. 8383, 329–344.
View | DOI | Download Submitted Version (ext.)
 

2014 | Conference Paper | IST-REx-ID: 2046 | OA
Bellare M, Fuchsbauer G. 2014. Policy-based signatures. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PKC: Public Key Crypography, LNCS, vol. 8383, 520–537.
View | DOI | Download Submitted Version (ext.)
 

2014 | Conference Paper | IST-REx-ID: 2047 | OA
Yu F, Rybar M, Uhler C, Fienberg S. 2014. Differentially-private logistic regression for detecting multiple-SNP association in GWAS databases. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PSD: Privacy in Statistical Databases, LNCS, vol. 8744, 170–184.
View | DOI | Download Submitted Version (ext.) | arXiv
 

Filters and Search Terms

oa=1

Search

Filter Publications