Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

6063 Publications


2005 | Journal Article | IST-REx-ID: 1447 | OA
Hausel T. 2005. Quaternionic geometry of matroids. Open Mathematics. 3(1), 26–38.
View | DOI | Download (ext.)
 

2005 | Journal Article | IST-REx-ID: 1463 | OA
Hausel T, Proudfoot N. 2005. Abelianization for hyperkähler quotients. Topology. 44(1), 231–248.
View | DOI | Download (ext.)
 

2005 | Conference Paper | IST-REx-ID: 3175
Rother C, Kumar S, Kolmogorov V, Blake A. 2005. Digital tapestry. CVPR: Computer Vision and Pattern Recognition vol. 1. 589–596.
View | DOI | Download (ext.)
 

2005 | Conference Paper | IST-REx-ID: 3176
Kolmogorov V, Criminisi A, Blake A, Cross G, Rother C. 2005. Bi-layer segmentation of binocular stereo video. CVPR: Computer Vision and Pattern Recognition 1186–1186.
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3181
Kolmogorov V, Wainwright M. 2005. On the optimality of tree reweighted max product message passing. UAI: Uncertainty in Artificial Intelligence 316–323.
View | Download (ext.)
 

2005 | Conference Paper | IST-REx-ID: 3182
Kolmogorov V, Boykov Y. 2005. What metrics can be approximated by geo cuts or global optimization of length area and flux. ICCV: International Conference on Computer Vision vol. 1. 564–571.
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3183
Kolmogorov V, Criminisi A, Blake A, Cross G, Rother C. 2005. Bi-layer segmentation of binocular stereo video. CVPR: Computer Vision and Pattern Recognition vol. 2. 407–414.
View | DOI | Download (ext.)
 

2005 | Conference Paper | IST-REx-ID: 3211
Bellare M, Pietrzak KZ, Rogaway P. 2005. Improved security analyses for CBC MACs. CRYPTO: International Cryptology Conference, LNCS, vol. 3621. 527–545.
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3212
Dodis Y, Oliveira R, Pietrzak KZ. 2005. On the generic insecurity of the full domain hash. CRYPTO: International Cryptology Conference, LNCS, vol. 3621. 449–466.
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3213
Pietrzak KZ. 2005. Composition does not imply adaptive security. CRYPTO: International Cryptology Conference, LNCS, vol. 3621. 55–65.
View | DOI
 

Search

Filter Publications