Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

3014 Publications


2013 | Journal Article | IST-REx-ID: 2256 | OA
Danowski, P., Goldfarb, D., Schaffner, V., & Seidler, W. (2013). Linked (Open) Data - Bibliographische Daten im Semantic Web. VÖB Mitteilungen, 66(3/4), 559–587.
View | Files available
 

2013 | Conference Paper | IST-REx-ID: 2258 | OA
Kiltz, E., Pietrzak, K. Z., & Szegedy, M. (2013). Digital signatures with minimal overhead from indifferentiable random invertible functions. Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States: Springer. https://doi.org/10.1007/978-3-642-40041-4_31
View | Files available | DOI
 

2013 | Conference Paper | IST-REx-ID: 2259 | OA
Alwen, J. F., Krenn, S., Pietrzak, K. Z., & Wichs, D. (2013). Learning with rounding, revisited: New reduction properties and applications. Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States: Springer. https://doi.org/10.1007/978-3-642-40041-4_4
View | Files available | DOI
 

2013 | Conference Paper | IST-REx-ID: 2260 | OA
Bernhard, D., Fuchsbauer, G., & Ghadafi, E. (2013). Efficient signatures of knowledge and DAA in the standard model. Presented at the ACNS: Applied Cryptography and Network Security, Banff, AB, Canada: Springer. https://doi.org/10.1007/978-3-642-38980-1_33
View | DOI | Download Submitted Version (ext.)
 

2013 | Journal Article | IST-REx-ID: 2264 | OA
Liang, H., Xiao, G., Yin, H., Hippenmeyer, S., Horowitz, J., & Ghashghaei, T. (2013). Neural development is dependent on the function of specificity protein 2 in cell cycle progression. Development, 140(3), 552–561. https://doi.org/10.1242/dev.085621
View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 

2013 | Conference Paper | IST-REx-ID: 2270 | OA
Bachrach, Y., Kohli, P., Kolmogorov, V., & Zadimoghaddam, M. (2013). Optimal Coalition Structures in Cooperative Graph Games (pp. 81–87). Presented at the AAAI: Conference on Artificial Intelligence, Bellevue, WA, United States: AAAI Press.
View | Download None (ext.) | arXiv
 

2013 | Conference Paper | IST-REx-ID: 2272 | OA
Takhanov, R., & Kolmogorov, V. (2013). Inference algorithms for pattern-based CRFs on sequence data. In ICML’13 Proceedings of the 30th International Conference on International (Vol. 28, pp. 145–153). Atlanta, GA, USA: International Machine Learning Society.
View | Files available | Download Submitted Version (ext.)
 

2013 | Report | IST-REx-ID: 2273 | OA
Kolmogorov, V. (2013). Reweighted message passing revisited. IST Austria.
View | Download (ext.)
 

2013 | Report | IST-REx-ID: 2274 | OA
Dziembowski, S., Faust, S., Kolmogorov, V., & Pietrzak, K. Z. (2013). Proofs of Space. IST Austria.
View | Files available
 

2013 | Conference Paper | IST-REx-ID: 2276 | OA
Gridchyn, I., & Kolmogorov, V. (2013). Potts model, parametric maxflow and k-submodular functions (pp. 2320–2327). Presented at the ICCV: International Conference on Computer Vision, Sydney, Australia: IEEE. https://doi.org/10.1109/ICCV.2013.288
View | DOI | Download Preprint (ext.) | arXiv
 

2013 | Journal Article | IST-REx-ID: 2277 | OA
Simmons, K., Prentice, J., Tkačik, G., Homann, J., Yee, H., Palmer, S., … Balasubramanian, V. (2013). Transformation of stimulus correlations by the retina. PLoS Computational Biology, 9(12). https://doi.org/10.1371/journal.pcbi.1003344
View | Files available | DOI
 

2013 | Conference Paper | IST-REx-ID: 2279 | OA
Chatterjee, K., Doyen, L., Randour, M., & Raskin, J. (2013). Looking at mean-payoff and total-payoff through windows. Presented at the ATVA: Automated Technology for Verification and Analysis, Hanoi, Vietnam: Springer. https://doi.org/10.1007/978-3-319-02444-8_10
View | Files available | DOI | Download Preprint (ext.)
 

2013 | Journal Article | IST-REx-ID: 2280 | OA
Uhler, C., & Wright, S. (2013). Packing ellipsoids with overlap. SIAM Review, 55(4), 671–706. https://doi.org/10.1137/120872309
View | DOI | Download Preprint (ext.) | arXiv
 

2013 | Journal Article | IST-REx-ID: 2282 | OA
Campinho, P., Behrndt, M., Ranft, J., Risler, T., Minc, N., & Heisenberg, C.-P. J. (2013). Tension-oriented cell divisions limit anisotropic tissue tension in epithelial spreading during zebrafish epiboly. Nature Cell Biology, 15, 1405–1414. https://doi.org/10.1038/ncb2869
View | Files available | DOI | Download Submitted Version (ext.)
 

2013 | Journal Article | IST-REx-ID: 2284 | OA
Tragust, S., Ugelvig, L. V., Chapuisat, M., Heinze, J., & Cremer, S. (2013). Pupal cocoons affect sanitary brood care and limit fungal infections in ant colonies. BMC Evolutionary Biology, 13(1). https://doi.org/10.1186/1471-2148-13-225
View | Files available | DOI
 

2013 | Journal Article | IST-REx-ID: 2286 | OA
Campinho, P., & Heisenberg, C.-P. J. (2013). The force and effect of cell proliferation. EMBO Journal, 32(21), 2783–2784. https://doi.org/10.1038/emboj.2013.225
View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 

2013 | Journal Article | IST-REx-ID: 2287 | OA
Pickup, M., & Barrett, S. (2013). The influence of demography and local mating environment on sex ratios in a wind-pollinated dioecious plant. Ecology and Evolution, 3(3), 629–639. https://doi.org/10.1002/ece3.465
View | Files available | DOI
 

2013 | Journal Article | IST-REx-ID: 2289 | OA
Henzinger, T. A. (2013). Quantitative reactive modeling and verification. Computer Science Research and Development, 28(4), 331–344. https://doi.org/10.1007/s00450-013-0251-7
View | Files available | DOI
 

2013 | Journal Article | IST-REx-ID: 2290 | OA
Boutté, Y., Jonsson, K., Mcfarlane, H., Johnson, E., Gendre, D., Swarup, R., … Bhalerao, R. (2013). ECHIDNA mediated post Golgi trafficking of auxin carriers for differential cell elongation. PNAS, 110(40), 16259–16264. https://doi.org/10.1073/pnas.1309057110
View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 

2013 | Conference Paper | IST-REx-ID: 2291 | OA
Ferrara, A., Fuchsbauer, G., & Warinschi, B. (2013). Cryptographically enforced RBAC (pp. 115–129). Presented at the CSF: Computer Security Foundations, New Orleans, LA, United States: IEEE. https://doi.org/10.1109/CSF.2013.15
View | DOI | Download Submitted Version (ext.)
 

Filters and Search Terms

oa=1

Search

Filter Publications