Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

9078 Publications


2013 | Conference Paper | IST-REx-ID: 2940 | OA
Krenn, Stephan, Krzysztof Z Pietrzak, and Akshay Wadia. “A Counterexample to the Chain Rule for Conditional HILL Entropy, and What Deniable Encryption Has to Do with It.” edited by Amit Sahai, 7785:23–39. Springer, 2013. https://doi.org/10.1007/978-3-642-36594-2_2.
[Submitted Version] View | Files available | DOI
 

2013 | Conference Paper | IST-REx-ID: 2948 | OA
Tommasi, Tatiana, Novi Quadrianto, Barbara Caputo, and Christoph Lampert. “Beyond Dataset Bias: Multi-Task Unaligned Shared Knowledge Transfer.” Lecture Notes in Computer Science. Springer, 2013. https://doi.org/10.1007/978-3-642-37331-2_1.
[Submitted Version] View | Files available | DOI
 

2013 | Conference Paper | IST-REx-ID: 2973 | OA
Bangerter, Endre, Stefania Barzan, Stephan Krenn, Ahmad Sadeghi, Thomas Schneider, and Joe Tsay. “Bringing Zero-Knowledge Proofs of Knowledge to Practice.” edited by Bruce Christianson, James Malcolm, Vashek Matyas, and Michael Roe, 7028:51–62. Springer, 2013. https://doi.org/10.1007/978-3-642-36213-2_9.
View | DOI | Download (ext.)
 

2013 | Journal Article | IST-REx-ID: 3116
Chatterjee, Krishnendu, Luca De Alfaro, Marco Faella, Ritankar Majumdar, and Vishwanath Raman. “Code Aware Resource Management.” Formal Methods in System Design. Springer, 2013. https://doi.org/10.1007/s10703-012-0170-4.
View | DOI
 

2013 | Journal Article | IST-REx-ID: 2815 | OA
Edelsbrunner, Herbert, Brittany Terese Fasy, and Günter Rote. “Add Isotropic Gaussian Kernels at Own Risk: More and More Resilient Modes in Higher Dimensions.” Discrete & Computational Geometry. Springer, 2013. https://doi.org/10.1007/s00454-013-9517-x.
[Published Version] View | Files available | DOI | Download Published Version (ext.)
 

Search

Filter Publications