Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
2013 | Journal Article | IST-REx-ID: 2882
C. Löfke, M. Zwiewka, I. Heilmann, M. Van Montagu, T. Teichmann, and J. Friml, “Asymmetric gibberellin signaling regulates vacuolar trafficking of PIN auxin transporters during root gravitropism,” PNAS, vol. 110, no. 9, pp. 3627–3632, 2013.View | DOI | Download (ext.) | PubMed | Europe PMC
2013 | Conference Paper | IST-REx-ID: 2940
S. Krenn, K. Z. Pietrzak, and A. Wadia, “A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it,” presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan, 2013, vol. 7785, pp. 23–39.View | Files available | DOI
2013 | Journal Article | IST-REx-ID: 450
M. Pickup, D. Field, D. Rowell, and A. Young, “Source population characteristics affect heterosis following genetic rescue of fragmented plant populations,” Proceedings of the Royal Society of London Series B Biological Sciences, vol. 280, no. 1750, 2013.View | DOI | Download (ext.) | PubMed | Europe PMC
2013 | Conference Paper | IST-REx-ID: 2445
P. Cerny, T. A. Henzinger, A. Radhakrishna, L. Ryzhyk, and T. Tarrach, “Efficient synthesis for concurrency by semantics-preserving transformations,” presented at the CAV: Computer Aided Verification, St. Petersburg, Russia, 2013, vol. 8044, pp. 951–967.View | Files available | DOI