_id,doi,title
3331,10.1016/j.jsc.2011.11.001,A worst case bound for topology computation of algebraic curves
3341,10.1007/978-3-642-28729-9_18,Robustness of structurally equivalent concurrent parity games
10896,10.1007/978-1-4614-3903-5_6,The double-edged sword: Gaining Adenosine at the expense of ATP. How to balance the books
10903,10.1007/978-3-642-33386-6_14,Accurate invariant checking for programs manipulating lists and arrays with infinite data
10904,10.1007/978-3-642-32940-1_10,Strategy synthesis for multi-dimensional quantitative objectives
10905,10.1007/978-3-642-33090-2_27,Polynomial-time algorithms for energy games with special weight structures
10906,10.1007/978-3-642-28756-5_46,HSF(C): A software verifier based on Horn clauses
2048,10.1007/978-3-642-33027-8_13,Practical leakage-resilient symmetric cryptography
2049,10.1007/978-3-642-34047-5_20,Lapin: An efficient authentication protocol based on ring-LPN
2263,10.1242/bio.20122287,A Nestin-cre transgenic mouse is insufficient for recombination in early embryonic neural progenitors
2302,10.1109/TCBB.2012.91,The propagation approach for computing biochemical reaction networks
2318,10.4171/JST/31,Absence of bound states implies non-negativity of the scattering length
2411,10.1093/molbev/msr285,A consistent phylogenetic backbone for the fungi
493,10.3389/fnins.2012.00055,Review of the BCI competition IV
494,10.1145/2362355.2362357,"Translating to Co-Büchi made tight, unified, and useful"
495,10.4204/EPTCS.96.18,A Myhill Nerode theorem for automata with advice
496,10.1109/LICS.2012.65,Interpretations in trees with countably many branches
497,10.4230/LIPIcs.CSL.2012.167,Faster algorithms for alternating refinement relations
498,10.1111/j.1752-4571.2012.00284.x,Predicting local adaptation in fragmented plant populations: Implications for restoration genetics
506,10.1083/jcb.201204039,Cell migration: Fibroblasts find a new way to get ahead
