_id,doi,title
3901,10.1109/TVCG.2010.139,Computing robustness and persistence for images
3962,,﻿﻿Dendritic cell migration across basement membranes in the skin
4134,10.1111/j.1461-0248.2010.01442.x,Why is adaptation prevented at ecological margins? New insights from individual-based simulations
4157,10.1038/emboj.2010.182,Spatial organization of adhesion: force-dependent regulation and function in tissue morphogenesis
4243,10.1214/EJP.v15-741,A new model for evolution in a spatial continuum
4339,10.1515/9783110232103,"Ist Bibliothek 2.0 überhaupt noch relevant? – Eine Einleitung in das Handbuch"
4346,10.1515/9783110232103,Handbuch Bibliothek 2.0
4361,10.1007/978-3-642-12032-9_8,Forward analysis of depth-bounded processes
4362,10.1007/978-3-642-16612-9_32,Runtime verification for software transactional memories
4369,10.1007/978-3-642-15297-9_13,From MTL to deterministic timed automata
4378,10.1007/978-3-642-11319-2_6,Building a calculus of data structures
4380,10.1145/1879021.1879022,A marketplace for cloud resources
4381,10.1109/CLOUD.2010.71,FlexPRICE: Flexible provisioning of resources in a cloud environment
4382,10.1145/1810479.1810529,Transactions in the jungle
4388,10.1007/978-3-642-14295-6_57,GIST: A solver for probabilistic games
4389,10.1109/ACSD.2010.26,Robustness of sequential circuits
4390,10.1007/978-3-642-14295-6_41,Model checking of linearizability of concurrent list implementations
4392,10.1007/978-3-642-13754-9_3,Quantitative Simulation Games
4393,10.1007/978-3-642-15375-4_18,Simulation distances
4396,10.1007/978-3-642-12029-9_19,Shape refinement through explicit heap analysis
