_id,doi,title
626,10.1016/j.tpb.2017.06.001,The infinitesimal model: Definition derivation and implications
627,10.18632/oncotarget.20540,"Dietary menthol-induced TRPM8 activation enhances WAT “browning” and ameliorates diet-induced obesity"
628,10.1007/978-3-319-63387-9_6,Automated recurrence analysis for almost linear expected runtime bounds
6287,10.15479/AT:ISTA:th_873,Discrete Morse theory for random complexes 
629,10.1007/978-3-319-53047-5_15,Reconstitution of protein dynamics involved in bacterial cell division
6291,,Bacterial herd and social immunity to phages
630,10.3233/978-1-61499-759-7-356,Biosignals standards and FHIR: The way to go
631,10.1007/978-3-662-54577-5_34,Counterexample guided refinement of template polyhedra
632,10.1090/proc/13468,A note on 2D focusing many boson systems
633,10.1007/978-3-319-63501-9_6,Challenges and tool implementation of hybrid rapidly exploring random trees
634,10.1007/978-3-319-52498-6_10,Genetic and pharmacological reversibility of phenotypes in mouse models of autism spectrum disorder
635,10.1007/978-3-319-56617-7_2,Scrypt is maximally memory hard
636,10.1007/978-3-319-65765-3_11,On the quantitative semantics of regular expressions over real-valued signals
637,10.1007/978-3-319-63688-7_5,Be adaptive avoid overcommitting
638,10.1007/978-3-319-54292-8,Numerical Software Verification
639,10.1007/978-3-319-63390-9_3,Non-polynomial worst case analysis of recursive programs
640,10.1007/978-3-319-56617-7_1,Depth-robust graphs and their cumulative memory complexity
641,10.1007/978-3-319-58771-4_26,Graphical model parameter learning by inverse linear programming
642,10.1090/mcom/3201,Localization errors in solving stochastic partial differential equations in the whole space
6426,10.15479/AT:IST-2018-853-v2-2,Synchronizing the asynchronous
