Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

9084 Publications


2011 | Journal Article | IST-REx-ID: 2897
T. Paixao and R. Azevedo, “Redundancy and the Evolution of Cis Regulatory Element Multiplicity,” PLoS Computational Biology, vol. 6, no. 7. Public Library of Science, 2011.
View | DOI
 

2011 | Book Chapter | IST-REx-ID: 2922
S. Vicente, V. Kolmogorov, and C. Rother, “Graph-cut Based Image Segmentation with Connectivity Priors,” in Markov Random Fields for Vision and Image Processing, A. Blake, P. Kohli, and C. Rother, Eds. Massachusetts Institute of Technology Press, 2011.
View
 

2011 | Book Chapter | IST-REx-ID: 2923
M. P. Kumar, V. Kolmogorov, and P. Torr, “Analyzing Convex Relaxations for MAP Estimation,” in Markov Random Fields for Vision and Image Processing, A. Blake, P. Kohli, and C. Rother, Eds. Massachusetts Institute of Technology Press, 2011.
View
 

2011 | Book Chapter | IST-REx-ID: 2924
A. Criminisi, G. Cross, A. Blake, and V. Kolmogorov, “Bilayer Segmentation of Video,” in Markov Random Fields for Vision and Image Processing, A. Blake, P. Kohli, and C. Rother, Eds. Massachusetts Institute of Technology Press, 2011.
View
 

2011 | Book Chapter | IST-REx-ID: 2925
C. Rother, V. Kolmogorov, Y. Boykov, and A. Blake, “Interactive Foreground Extraction using graph cut,” in Markov Random Fields for Vision and Image Processing, A. Blake, P. Kohli, and C. Rother, Eds. Massachusetts Institute of Technology Press, 2011.
View
 

2011 | Book Chapter | IST-REx-ID: 2935
Y. Boykov and V. Kolmogorov, “Basic graph cut algorithms,” in Markov Random Fields for Vision and Image Processing, A. Blake, P. Kohli, and C. Rother, Eds. Massachusetts Institute of Technology Press, 2011, pp. 31–50.
View
 

2011 | Journal Article | IST-REx-ID: 2961 | OA
A. Malaspinas and C. Uhler, “Detecting epistasis via Markov bases,” Journal of Algebraic Statistics, vol. 2, no. 1. Public Knowledge Project, pp. 36–53, 2011.
View | DOI | Download (ext.)
 

2011 | Conference Paper | IST-REx-ID: 2960
S. Fienberg, A. Slavkovic, and C. Uhler, “Privacy Preserving GWAS Data Sharing,” presented at the Proceedings of the 11th IEEE International Conference on Data Mining, 2011.
View | DOI
 

2011 | Conference Paper | IST-REx-ID: 2975
J. Camenisch, S. Krenn, and V. Shoup, “A Framework for Practical Universally Composable Zero-Knowledge Protocols,” presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, 2011, vol. 7073, pp. 449–467.
View | DOI | Download (ext.)
 

2011 | Conference Paper | IST-REx-ID: 2977
E. Bangerter, S. Krenn, M. Seifriz, and U. Ultes Nitsche, “cPLC - A Cryptographic Programming Language and Compiler,” presented at the ISSA: Information Security South Africa, 2011.
View | DOI
 

Search

Filter Publications