_id,doi,title
2884,10.1051/medsci/2013292011,Cell adhesion mechanics of zebrafish gastrulation
2885,10.1007/978-3-642-36046-6,Mathematical and Engineering Methods in Computer Science
2886,10.1007/978-3-642-36046-6_12,Controllable-choice message sequence graphs
2887,10.1073/pnas.1222821110,Genotypic recognition and spatial responses by rice roots
2901,,Computing the M most probable modes of a graphical model
2906,10.1137/1.9781611972931.6,3D kinetic alpha complexes and their implementation
2907,,Recombination and sex
2908,10.1111/jeb.12015,Does hybridisation influence speciation?  
2909,10.1088/1742-5468/2013/01/P01002,Modelling evolution in a spatial continuum
2910,10.1093/bioinformatics/btt067,Coalescent simulation in continuous space
2913,10.1103/PhysRevLett.110.058104,Retinal metric: a stimulus distance measure derived from population neural responses
2914,10.1103/PhysRevLett.110.018701,Statistical thermodynamics of natural images
2918,10.1038/ncb2632,Anthrax toxin receptor 2a controls mitotic spindle positioning
2919,10.1038/emboj.2012.310,SCF^TIR1 AFB-auxin signalling regulates PIN vacuolar trafficking and auxin fluxes during root gravitropism
2920,10.1038/emboj.2012.325,Neurulation coordinating cell polarisation and lumen formation
2926,10.1016/j.cub.2012.11.034,Ants disinfect fungus-exposed brood by oral uptake and spread of their poison
2939,10.1016/j.comgeo.2012.02.010,An output sensitive algorithm for persistent homology
2940,10.1007/978-3-642-36594-2_2,"A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it"
2944,10.1111/mec.12165,Approximate Bayesian computation for modular inference problems with many parameters: the example of migration rates. 
2948,10.1007/978-3-642-37331-2_1,Beyond dataset bias: Multi-task unaligned shared knowledge transfer
