Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

6502 Publications


2007 | Journal Article | IST-REx-ID: 3029
L. Laplaze et al., “Cytokinins act directly on lateral root founder cells to inhibit root initiation,” Plant Cell, vol. 19, no. 12. American Society of Plant Biologists, pp. 3889–3900, 2007.
View | DOI
 

2007 | Journal Article | IST-REx-ID: 3144
S. Hippenmeyer, R. Huber, D. Ladle, K. Murphy, and S. Arber, “ETS transcription factor Erm controls subsynaptic gene expression in skeletal muscles,” Neuron, vol. 55, no. 5. Elsevier, pp. 726–740, 2007.
View | DOI
 

2007 | Journal Article | IST-REx-ID: 3187
A. Blake, A. Criminisi, G. Cross, V. Kolmogorov, and C. Rother, “Fusion of stereo colour and contrast,” Springer Tracts in Advanced Robotics, vol. 28. Springer, pp. 295–304, 2007.
View | DOI | Download (ext.)
 

2007 | Conference Paper | IST-REx-ID: 3191
V. Kolmogorov, Y. Boykov, and C. Rother, “Applications of parametric maxflow in computer vision,” presented at the ICCV: International Conference on Computer Vision, 2007.
View | DOI | Download (ext.)
 

2007 | Conference Paper | IST-REx-ID: 3192
C. Rother, V. Kolmogorov, V. Lempitsky, and M. Szummer, “Optimizing binary MRFs via extended roof duality,” presented at the CVPR: Computer Vision and Pattern Recognition, 2007.
View | DOI | Download (ext.)
 

2007 | Journal Article | IST-REx-ID: 3193
V. Kolmogorov and C. Rother, “Minimizing nonsubmodular functions with graph cuts - A review,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 7. IEEE, pp. 1274–1279, 2007.
View | DOI
 

2007 | Conference Paper | IST-REx-ID: 3218
K. Z. Pietrzak, “Non-trivial black-box combiners for collision-resistant hash-functions don’t exist,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, 2007, vol. 4515, pp. 23–33.
View | DOI
 

2007 | Conference Paper | IST-REx-ID: 3219
U. Maurer, K. Z. Pietrzak, and R. Renner, “Indistinguishability amplification,” presented at the CRYPTO: International Cryptology Conference, 2007, vol. 4622, pp. 130–149.
View | DOI
 

2007 | Conference Paper | IST-REx-ID: 3220
S. Dziembowski and K. Z. Pietrzak, “Intrusion resilient secret sharing,” presented at the FOCS: Foundations of Computer Science, 2007, pp. 227–237.
View | DOI
 

2007 | Conference Paper | IST-REx-ID: 3221
K. Z. Pietrzak and J. Sjödin, “Range extension for weak PRFs the good the bad and the ugly,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, 2007, vol. 4515, pp. 517–533.
View | DOI
 

Search

Filter Publications