Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

309 Publications


2011 | Book Chapter | IST-REx-ID: 2922
S. Vicente, V. Kolmogorov, and C. Rother, “Graph-cut Based Image Segmentation with Connectivity Priors,” in Markov Random Fields for Vision and Image Processing, A. Blake, P. Kohli, and C. Rother, Eds. Massachusetts Institute of Technology Press, 2011.
View
 

2011 | Book Chapter | IST-REx-ID: 2923
M. P. Kumar, V. Kolmogorov, and P. Torr, “Analyzing Convex Relaxations for MAP Estimation,” in Markov Random Fields for Vision and Image Processing, A. Blake, P. Kohli, and C. Rother, Eds. Massachusetts Institute of Technology Press, 2011.
View
 

2011 | Book Chapter | IST-REx-ID: 2924
A. Criminisi, G. Cross, A. Blake, and V. Kolmogorov, “Bilayer Segmentation of Video,” in Markov Random Fields for Vision and Image Processing, A. Blake, P. Kohli, and C. Rother, Eds. Massachusetts Institute of Technology Press, 2011.
View
 

2011 | Book Chapter | IST-REx-ID: 2925
C. Rother, V. Kolmogorov, Y. Boykov, and A. Blake, “Interactive Foreground Extraction using graph cut,” in Markov Random Fields for Vision and Image Processing, A. Blake, P. Kohli, and C. Rother, Eds. Massachusetts Institute of Technology Press, 2011.
View
 

2011 | Book Chapter | IST-REx-ID: 2935
Y. Boykov and V. Kolmogorov, “Basic graph cut algorithms,” in Markov Random Fields for Vision and Image Processing, A. Blake, P. Kohli, and C. Rother, Eds. Massachusetts Institute of Technology Press, 2011, pp. 31–50.
View
 

2011 | Journal Article | IST-REx-ID: 2961 | OA
A. Malaspinas and C. Uhler, “Detecting epistasis via Markov bases,” Journal of Algebraic Statistics, vol. 2, no. 1. Public Knowledge Project, pp. 36–53, 2011.
View | DOI | Download (ext.)
 

2011 | Conference Paper | IST-REx-ID: 2960
S. Fienberg, A. Slavkovic, and C. Uhler, “Privacy Preserving GWAS Data Sharing,” presented at the Proceedings of the 11th IEEE International Conference on Data Mining, 2011.
View | DOI
 

2011 | Conference Paper | IST-REx-ID: 2975
J. Camenisch, S. Krenn, and V. Shoup, “A Framework for Practical Universally Composable Zero-Knowledge Protocols,” presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, 2011, vol. 7073, pp. 449–467.
View | DOI | Download (ext.)
 

2011 | Conference Paper | IST-REx-ID: 2977
E. Bangerter, S. Krenn, M. Seifriz, and U. Ultes Nitsche, “cPLC - A Cryptographic Programming Language and Compiler,” presented at the ISSA: Information Security South Africa, 2011.
View | DOI
 

2011 | Conference Paper | IST-REx-ID: 2976
D. Gullasch, E. Bangerter, and S. Krenn, “Cache Games - Bringing Access-Based Cache Attacks on AES to Practice,” presented at the S&P: IEEE Symposium on Security and Privacy, 2011, pp. 490–505.
View | DOI | Download (ext.)
 

Filters and Search Terms

year=2011

Search

Filter Publications