Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

332 Publications


2012 | Journal Article | IST-REx-ID: 3132
Konrad M, Pamminger T, Foitzik S. 2012. Two pathways ensuring social harmony. Naturwissenschaften. 99(8), 627–636.
View | DOI
 

2012 | Journal Article | IST-REx-ID: 3161 | OA
Vyleta M, Wong J, Magun B. 2012. Suppression of ribosomal function triggers innate immune signaling through activation of the NLRP3 inflammasome. PLoS One. 7(5), e36044.
[Published Version] View | Files available | DOI
 

2012 | Conference Paper | IST-REx-ID: 3162 | OA
Asarin E, Donzé A, Maler O, Nickovic D. 2012. Parametric identification of temporal properties. RV: Runtime Verification, LNCS, vol. 7186, 147–160.
[Submitted Version] View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 3160
Pantazis P, Bollenbach MT. 2012. Transcription factor kinetics and the emerging asymmetry in the early mammalian embryo. Cell Cycle. 11(11), 2055–2058.
View | DOI
 

2012 | Journal Article | IST-REx-ID: 3164
Blaschko M, Lampert C. 2012. Guest editorial: Special issue on structured prediction and inference. International Journal of Computer Vision. 99(3), 257–258.
View | DOI
 

2012 | Journal Article | IST-REx-ID: 3166 | OA
de Vladar H. 2012. Amino acid fermentation at the origin of the genetic code. Biology Direct. 7, 6.
[Published Version] View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 3167
Weber M. 2012. NextGen speaks 13 . Science. 336(6077), 32–34.
View | DOI | PubMed | Europe PMC
 

2012 | Journal Article | IST-REx-ID: 3241
Pietrzak KZ, Wikström D. 2012. Parallel repetition of computationally sound protocols revisited. Journal of Cryptology. 25(1), 116–135.
View | DOI
 

2012 | Conference Paper | IST-REx-ID: 3252 | OA
Chatterjee K, Raman V. 2012. Synthesizing protocols for digital contract signing. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS, vol. 7148, 152–168.
[Preprint] View | DOI | Download Preprint (ext.)
 

2012 | Conference Paper | IST-REx-ID: 3255 | OA
Chatterjee K, Doyen L. 2012. Games and Markov decision processes with mean payoff parity and energy parity objectives. MEMICS: Mathematical and Engineering Methods in Computer Science, LNCS, vol. 7119, 37–46.
[Submitted Version] View | Files available | DOI
 

2012 | Conference Paper | IST-REx-ID: 3250
Pietrzak KZ. 2012. Cryptography from learning parity with noise. SOFSEM: Current Trends in Theory and Practice of Computer Science, LNCS, vol. 7147, 99–114.
View | DOI
 

2012 | Journal Article | IST-REx-ID: 3256 | OA
Edelsbrunner H, Kerber M. 2012. Dual complexes of cubical subdivisions of ℝn. Discrete & Computational Geometry. 47(2), 393–414.
[Submitted Version] View | Files available | DOI
 

2012 | Journal Article | IST-REx-ID: 3254
Chatterjee K. 2012. The complexity of stochastic Müller games. Information and Computation. 211, 29–48.
View | DOI | Download None (ext.)
 

2012 | Conference Paper | IST-REx-ID: 3253
Bouajjani A, Dragoi C, Enea C, Sighireanu M. 2012. Abstract domains for automated reasoning about list manipulating programs with infinite data. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS, vol. 7148, 1–22.
View | DOI
 

2012 | Conference Paper | IST-REx-ID: 3265
Ion A, Carreira J, Sminchisescu C. 2012. Image segmentation by figure-ground composition into maximal cliques. ICCV: International Conference on Computer Vision, 6126486.
View | DOI
 

2012 | Conference Paper | IST-REx-ID: 3282 | OA
Dodis Y, Pietrzak KZ, Kiltz E, Wichs D. 2012. Message authentication, revisited. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 7237, 355–374.
[Submitted Version] View | Files available | DOI
 

2012 | Conference Paper | IST-REx-ID: 3280 | OA
Pietrzak KZ. 2012. Subspace LWE. TCC: Theory of Cryptography Conference, LNCS, vol. 7194, 548–563.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2012 | Conference Paper | IST-REx-ID: 3281
Pietrzak KZ, Rosen A, Segev G. 2012. Lossy functions do not amplify well. TCC: Theory of Cryptography Conference, LNCS, vol. 7194, 458–475.
View | DOI | Download None (ext.)
 

2012 | Conference Paper | IST-REx-ID: 3284 | OA
Kolmogorov V, Živný S. 2012. The complexity of conservative valued CSPs. SODA: Symposium on Discrete Algorithms, 750–759.
View | Download (ext.)
 

2012 | Journal Article | IST-REx-ID: 330
Shavel A, Cadavid D, Ibáñez M, Carrete A, Cabot A. 2012. Continuous production of Cu inf 2 inf ZnSnS inf 4 inf nanocrystals in a flow reactor. Journal of the American Chemical Society. 134(3), 1438–1441.
View | DOI
 

Filters and Search Terms

year=2012

Search

Filter Publications