Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

6016 Publications


2005 | Conference Paper | IST-REx-ID: 3175
C. Rother, S. Kumar, V. Kolmogorov, and A. Blake, “Digital tapestry,” presented at the CVPR: Computer Vision and Pattern Recognition, 2005, vol. 1, pp. 589–596.
View | DOI | Download (ext.)
 

2005 | Conference Paper | IST-REx-ID: 3176
V. Kolmogorov, A. Criminisi, A. Blake, G. Cross, and C. Rother, “Bi-layer segmentation of binocular stereo video,” presented at the CVPR: Computer Vision and Pattern Recognition, 2005, pp. 1186–1186.
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3181
V. Kolmogorov and M. Wainwright, “On the optimality of tree reweighted max product message passing,” presented at the UAI: Uncertainty in Artificial Intelligence, 2005, pp. 316–323.
View | Download (ext.)
 

2005 | Conference Paper | IST-REx-ID: 3182
V. Kolmogorov and Y. Boykov, “What metrics can be approximated by geo cuts or global optimization of length area and flux,” presented at the ICCV: International Conference on Computer Vision, 2005, vol. 1, pp. 564–571.
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3183
V. Kolmogorov, A. Criminisi, A. Blake, G. Cross, and C. Rother, “Bi-layer segmentation of binocular stereo video,” presented at the CVPR: Computer Vision and Pattern Recognition, 2005, vol. 2, pp. 407–414.
View | DOI | Download (ext.)
 

2005 | Conference Paper | IST-REx-ID: 3211
M. Bellare, K. Z. Pietrzak, and P. Rogaway, “Improved security analyses for CBC MACs,” presented at the CRYPTO: International Cryptology Conference, 2005, vol. 3621, pp. 527–545.
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3212
Y. Dodis, R. Oliveira, and K. Z. Pietrzak, “On the generic insecurity of the full domain hash,” presented at the CRYPTO: International Cryptology Conference, 2005, vol. 3621, pp. 449–466.
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3213
K. Z. Pietrzak, “Composition does not imply adaptive security,” presented at the CRYPTO: International Cryptology Conference, 2005, vol. 3621, pp. 55–65.
View | DOI
 

2005 | Journal Article | IST-REx-ID: 3416 | OA
H. L. Janovjak, T. Sapra, and D. Mueller, “Complex stability of single proteins explored by forced unfolding experiments,” Biophysical Journal, vol. 88, no. 5, pp. 37–39, 2005.
View | DOI | Download (ext.)
 

2005 | Journal Article | IST-REx-ID: 3417
M. Kuhn, H. L. Janovjak, M. Hubain, and D. Mueller, “Automated alignment and pattern recognition of single-molecule force spectroscopy data,” Journal of Microscopy, vol. 218, no. 2, pp. 125–132, 2005.
View | DOI
 

Search

Filter Publications