Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

4963 Publications


2013 | Published | Journal Article | IST-REx-ID: 2919 | OA
P. Baster et al., “SCF^TIR1 AFB-auxin signalling regulates PIN vacuolar trafficking and auxin fluxes during root gravitropism,” EMBO Journal, vol. 32, no. 2. Wiley-Blackwell, pp. 260–274, 2013.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 

2013 | Published | Journal Article | IST-REx-ID: 2920 | OA
J. Compagnon and C.-P. J. Heisenberg, “Neurulation coordinating cell polarisation and lumen formation,” EMBO Journal, vol. 32, no. 1. Wiley-Blackwell, pp. 1–3, 2013.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 

2013 | Published | Journal Article | IST-REx-ID: 2926
S. Tragust, B. Mitteregger, V. Barone, M. Konrad, L. V. Ugelvig, and S. Cremer, “Ants disinfect fungus-exposed brood by oral uptake and spread of their poison,” Current Biology, vol. 23, no. 1. Cell Press, pp. 76–82, 2013.
View | Files available | DOI
 

2013 | Published | Journal Article | IST-REx-ID: 2939
C. Chen and M. Kerber, “An output sensitive algorithm for persistent homology,” Computational Geometry: Theory and Applications, vol. 46, no. 4. Elsevier, pp. 435–447, 2013.
View | Files available | DOI
 

2013 | Published | Conference Paper | IST-REx-ID: 2940 | OA
S. Krenn, K. Z. Pietrzak, and A. Wadia, “A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it,” presented at the TCC: Theory of Cryptography Conference, Tokyo, Japan, 2013, vol. 7785, pp. 23–39.
[Submitted Version] View | Files available | DOI
 

2013 | Published | Journal Article | IST-REx-ID: 2944
S. Aeschbacher, A. Futschik, and M. Beaumont, “Approximate Bayesian computation for modular inference problems with many parameters: the example of migration rates. ,” Molecular Ecology, vol. 22, no. 4. Wiley-Blackwell, pp. 987–1002, 2013.
View | Files available | DOI
 

2013 | Published | Conference Paper | IST-REx-ID: 2948 | OA
T. Tommasi, N. Quadrianto, B. Caputo, and C. Lampert, “Beyond dataset bias: Multi-task unaligned shared knowledge transfer,” vol. 7724. Springer, pp. 1–15, 2013.
[Submitted Version] View | Files available | DOI
 

2013 | Published | Journal Article | IST-REx-ID: 3116
K. Chatterjee, L. De Alfaro, M. Faella, R. Majumdar, and V. Raman, “Code aware resource management,” Formal Methods in System Design, vol. 42, no. 2. Springer, pp. 142–174, 2013.
View | DOI
 

2013 | Published | Journal Article | IST-REx-ID: 3261 | OA
J. Dubuis, G. Tkačik, E. Wieschaus, T. Gregor, and W. Bialek, “Positional information, in bits,” PNAS, vol. 110, no. 41. National Academy of Sciences, pp. 16301–16308, 2013.
[Published Version] View | Files available | DOI | PubMed | Europe PMC
 

2013 | Published | Encyclopedia Article | IST-REx-ID: 3321
N. Quadrianto and C. Lampert, “Kernel based learning,” in Encyclopedia of Systems Biology, vol. 3, W. Dubitzky, O. Wolkenhauer, K. Cho, and H. Yokota, Eds. Springer, 2013, pp. 1069–1069.
View | DOI
 

2013 | Published | Journal Article | IST-REx-ID: 10895 | OA
S. Vanneste and J. Friml, “Calcium: The missing link in auxin action,” Plants, vol. 2, no. 4. MDPI, pp. 650–675, 2013.
[Published Version] View | Files available | DOI | PubMed | Europe PMC
 

2013 | Published | Conference Paper | IST-REx-ID: 10897
H. Edelsbrunner, “Persistent homology in image processing,” in Graph-Based Representations in Pattern Recognition, Vienna, Austria, 2013, vol. 7877, pp. 182–183.
View | DOI
 

2013 | Published | Conference Paper | IST-REx-ID: 10898
A. Haas et al., “Distributed queues in shared memory: Multicore performance and scalability through quantitative relaxation,” in Proceedings of the ACM International Conference on Computing Frontiers - CF ’13, Ischia, Italy, 2013, no. 5.
View | DOI
 

2013 | Published | Book Chapter | IST-REx-ID: 10899
N. H. Barton, “Differentiation,” in Encyclopedia of Biodiversity, 2nd ed., Elsevier, 2013, pp. 508–515.
View | DOI
 

2013 | Published | Book Chapter | IST-REx-ID: 10900
M. Weber and M. K. Sixt, “Live Cell Imaging of Chemotactic Dendritic Cell Migration in Explanted Mouse Ear Preparations,” in Chemokines, vol. 1013, A. Cardona and E. Ubogu, Eds. Totowa, NJ: Humana Press, 2013, pp. 215–226.
View | DOI | PubMed | Europe PMC
 

2013 | Published | Conference Paper | IST-REx-ID: 10902
K. Chatterjee, S. Chaubal, and S. Rubin, “How to travel between languages,” in 7th International Conference on Language and Automata Theory and Applications, Bilbao, Spain, 2013, vol. 7810, pp. 214–225.
View | DOI
 

2013 | Published | Journal Article | IST-REx-ID: 827 | OA
J. O’Brien and E. Benková, “Cytokinin cross talking during biotic and abiotic stress responses,” Frontiers in Plant Science, vol. 4. Frontiers Research Foundation, 2013.
[Published Version] View | Files available | DOI
 

2013 | Published | Journal Article | IST-REx-ID: 828 | OA
C. Cuesta, K. T. Wabnik, and E. Benková, “Systems approaches to study root architecture dynamics,” Frontiers in Plant Science, vol. 4. Frontiers Research Foundation, 2013.
[Published Version] View | Files available | DOI
 

2013 | Published | Conference Paper | IST-REx-ID: 2000 | OA
J. Reiter, I. Božić, K. Chatterjee, and M. Nowak, “TTP: Tool for tumor progression,” in Proceedings of 25th Int. Conf. on Computer Aided Verification, St. Petersburg, Russia, 2013, vol. 8044, pp. 101–106.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2013 | Published | Journal Article | IST-REx-ID: 2009 | OA
C. Uhler, A. Slavkovic, and S. Fienberg, “Privacy-preserving data sharing for genome-wide association studies,” Journal of Privacy and Confidentiality , vol. 5, no. 1. Carnegie Mellon University, pp. 137–166, 2013.
[Published Version] View | DOI | Download Published Version (ext.)
 

Filters and Search Terms

department=IST

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed