Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

365 Publications


2015 | Conference Paper | IST-REx-ID: 1630 | OA
P. Guerrero, S. Jeschke, M. Wimmer, and P. Wonka, “Learning shape placements by example,” presented at the SIGGRAPH: Special Interest Group on Computer Graphics and Interactive Techniques, Los Angeles, CA, United States, 2015, vol. 34, no. 4.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1632 | OA
R. Ando, N. Thuerey, and C. J. Wojtan, “A stream function solver for liquid simulations,” presented at the SIGGRAPH: Special Interest Group on Computer Graphics and Interactive Techniques, Los Angeles, CA, USA, 2015, vol. 34, no. 4.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1633 | OA
D. Hahn and C. J. Wojtan, “High-resolution brittle fracture simulation with boundary elements,” presented at the SIGGRAPH: Special Interest Group on Computer Graphics and Interactive Techniques, Los Angeles, CA, United States, 2015, vol. 34, no. 4.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1634 | OA
F. Da, C. Batty, C. J. Wojtan, and E. Grinspun, “Double bubbles sans toil and trouble: discrete circulation-preserving vortex sheets for soap films and foams,” presented at the SIGGRAPH: Special Interest Group on Computer Graphics and Interactive Techniques, Los Angeles, CA, United States, 2015, vol. 34, no. 4.
View | Files available | DOI
 

2015 | Journal Article | IST-REx-ID: 1635 | OA
M. Erbar, J. Maas, and P. Tetali, “Discrete Ricci curvature bounds for Bernoulli-Laplace and random transposition models,” Annales de la faculté des sciences de Toulouse, vol. 24, no. 4, pp. 781–800, 2015.
View | DOI | Download Preprint (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1636 | OA
V. Kolmogorov, M. Rolinek, and R. Takhanov, “Effectiveness of structural restrictions for hybrid CSPs,” vol. 9472. Springer, pp. 566–577, 2015.
View | DOI | Download Preprint (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1637 | OA
V. Kolmogorov, A. Krokhin, and M. Rolinek, “The complexity of general-valued CSPs,” presented at the FOCS: Foundations of Computer Science, Berkeley, CA, United States, 2015, pp. 1246–1258.
View | Files available | DOI | Download Preprint (ext.)
 

2015 | Journal Article | IST-REx-ID: 1638
L. A. Sazanov, “A giant molecular proton pump: structure and mechanism of respiratory complex I,” Nature Reviews Molecular Cell Biology, vol. 16, no. 6, pp. 375–388, 2015.
View | DOI
 

2015 | Journal Article | IST-REx-ID: 1639 | OA
J. Maas, M. Rumpf, C. Schönlieb, and S. Simon, “A generalized model for optimal transport of images including dissipation and density modulation,” ESAIM: Mathematical Modelling and Numerical Analysis, vol. 49, no. 6, pp. 1745–1769, 2015.
View | DOI | Download Preprint (ext.) | arXiv
 

2015 | Journal Article | IST-REx-ID: 1640 | OA
M. Šimášková et al., “Cytokinin response factors regulate PIN-FORMED auxin transporters,” Nature Communications, vol. 6, 2015.
View | Files available | DOI
 

2015 | Journal Article | IST-REx-ID: 1642 | OA
R. Fulek, J. Kynčl, I. Malinovič, and D. Pálvölgyi, “Clustered planarity testing revisited,” Electronic Journal of Combinatorics, vol. 22, no. 4, 2015.
View | Files available
 

2015 | Conference Paper | IST-REx-ID: 1644 | OA
G. Demay, P. Gazi, U. Maurer, and B. Tackmann, “Query-complexity amplification for random oracles,” presented at the ICITS: International Conference on Information Theoretic Security, Lugano, Switzerland, 2015, vol. 9063, pp. 159–180.
View | DOI | Download Submitted Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1645
P. Gazi and S. Tessaro, “Secret-key cryptography from ideal primitives: A systematic verview,” in 2015 IEEE Information Theory Workshop, Jerusalem, Israel, 2015.
View | DOI
 

2015 | Conference Paper | IST-REx-ID: 1646 | OA
A. Banerjee, G. Fuchsbauer, C. Peikert, K. Z. Pietrzak, and S. Stevens, “Key-homomorphic constrained pseudorandom functions,” vol. 9015. Springer, pp. 31–60, 2015.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1647 | OA
G. Fuchsbauer, C. Hanser, and D. Slamanig, “Practical round-optimal blind signatures in the standard model,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States, 2015, vol. 9216, pp. 233–253.
View | Files available | DOI | Download Submitted Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1648 | OA
G. Fuchsbauer, Z. Jafargholi, and K. Z. Pietrzak, “A quasipolynomial reduction for generalized selective decryption on trees,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, USA, 2015, vol. 9215, pp. 601–620.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1649 | OA
F. Benhamouda, S. Krenn, V. Lyubashevsky, and K. Z. Pietrzak, “Efficient zero-knowledge proofs for commitments from learning with errors over rings,” vol. 9326. Springer, pp. 305–325, 2015.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1650 | OA
M. Skórski, A. Golovnev, and K. Z. Pietrzak, “Condensed unpredictability ,” presented at the ICALP: Automata, Languages and Programming, Kyoto, Japan, 2015, vol. 9134, pp. 1046–1057.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1651
F. Baldimtsi, M. Chase, G. Fuchsbauer, and M. Kohlweiss, “Anonymous transferable e-cash,” presented at the PKC: Public Key Crypography, Gaithersburg, MD, USA, 2015, vol. 9020, pp. 101–124.
View | DOI
 

2015 | Conference Paper | IST-REx-ID: 1652 | OA
J. F. Alwen and V. Serbinenko, “High parallel complexity graphs and memory-hard functions,” in Proceedings of the 47th annual ACM symposium on Theory of computing, Portland, OR, United States, 2015, pp. 595–603.
View | DOI | Download Submitted Version (ext.)
 

Filters and Search Terms

year=2015

Search

Filter Publications