_id,doi,title
634,10.1007/978-3-319-52498-6_10,Genetic and pharmacological reversibility of phenotypes in mouse models of autism spectrum disorder
635,10.1007/978-3-319-56617-7_2,Scrypt is maximally memory hard
636,10.1007/978-3-319-65765-3_11,On the quantitative semantics of regular expressions over real-valued signals
637,10.1007/978-3-319-63688-7_5,Be adaptive avoid overcommitting
638,10.1007/978-3-319-54292-8,Numerical Software Verification
639,10.1007/978-3-319-63390-9_3,Non-polynomial worst case analysis of recursive programs
640,10.1007/978-3-319-56617-7_1,Depth-robust graphs and their cumulative memory complexity
641,10.1007/978-3-319-58771-4_26,Graphical model parameter learning by inverse linear programming
642,10.1090/mcom/3201,Localization errors in solving stochastic partial differential equations in the whole space
6426,10.15479/AT:IST-2018-853-v2-2,Synchronizing the asynchronous
643,10.4077/CJP.2017.BAF469,Effects of B vitamins overload on plasma insulin level and hydrogen peroxide generation in rats
644,10.1137/16M1091836,The complexity of general-valued CSPs
645,10.1007/978-3-319-63387-9_10,Value iteration for long run average reward in markov decision processes
646,10.1007/978-3-319-58771-4_19,A novel convex relaxation for non binary discrete tomography
647,10.1007/978-3-319-65765-3_7,Conic abstractions for hybrid systems
648,10.1007/978-3-319-55911-7_43,On the complexity of breaking pseudoentropy
649,10.1007/978-3-319-58002-9_5,Entropic Ricci curvature for discrete spaces
650,10.1007/978-3-319-55911-7_42,A cryptographic view of regularity lemmas: Simpler unified proofs and refined bounds
651,10.1038/541161a,Fluid dynamics: Water flows out of touch
6517,10.4230/LIPICS.ISAAC.2017.34,Embedding graphs into embedded graphs
