Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
4963 Publications
2012 |
Published |
Conference Paper |
IST-REx-ID: 3280 |
Pietrzak, K. Z. (2012). Subspace LWE (Vol. 7194, pp. 548–563). Presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy: Springer. https://doi.org/10.1007/978-3-642-28914-9_31
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 3281
Pietrzak, K. Z., Rosen, A., & Segev, G. (2012). Lossy functions do not amplify well (Vol. 7194, pp. 458–475). Presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy: Springer. https://doi.org/10.1007/978-3-642-28914-9_26
View
| DOI
| Download None (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 3282 |
Dodis, Y., Pietrzak, K. Z., Kiltz, E., & Wichs, D. (2012). Message authentication, revisited (Vol. 7237, pp. 355–374). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Cambridge, UK: Springer. https://doi.org/10.1007/978-3-642-29011-4_22
[Submitted Version]
View
| Files available
| DOI
2012 |
Published |
Journal Article |
IST-REx-ID: 3289 |
Pereira, A., Leite, F., Brasil, B., Soares Martins, J., Torres, A., Pimenta, P., … Bonjardim, C. (2012). A vaccinia virus-driven interplay between the MKK4/7-JNK1/2 pathway and cytoskeleton reorganization. Journal of Virology. ASM. https://doi.org/10.1128/JVI.05638-11
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| PubMed | Europe PMC
2012 |
Published |
Journal Article |
IST-REx-ID: 3310 |
Bendich, P., Cabello, S., & Edelsbrunner, H. (2012). A point calculus for interlevel set homology. Pattern Recognition Letters. Elsevier. https://doi.org/10.1016/j.patrec.2011.10.007
[Submitted Version]
View
| Files available
| DOI
2012 |
Published |
Journal Article |
IST-REx-ID: 3314
Chatterjee, K., & Majumdar, R. (2012). Discounting and averaging in games across time scales. International Journal of Foundations of Computer Science. World Scientific Publishing. https://doi.org/10.1142/S0129054112400308
View
| DOI
2012 |
Published |
Journal Article |
IST-REx-ID: 3317 |
Eggermann, E., Bucurenciu, I., Goswami, S., & Jonas, P. M. (2012). Nanodomain coupling between Ca(2+) channels and sensors of exocytosis at fast mammalian synapses. Nature Reviews Neuroscience. Nature Publishing Group. https://doi.org/10.1038/nrn3125
[Submitted Version]
View
| Files available
| DOI
2012 |
Published |
Journal Article |
IST-REx-ID: 3331 |
Kerber, M., & Sagraloff, M. (2012). A worst case bound for topology computation of algebraic curves. Journal of Symbolic Computation. Elsevier. https://doi.org/10.1016/j.jsc.2011.11.001
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 3341 |
Chatterjee, K. (2012). Robustness of structurally equivalent concurrent parity games (Vol. 7213, pp. 270–285). Presented at the FoSSaCS: Foundations of Software Science and Computation Structures, Tallinn, Estonia: Springer. https://doi.org/10.1007/978-3-642-28729-9_18
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
2012 |
Published |
Book Chapter |
IST-REx-ID: 10896
zur Nedden, S., Doney, A. S., & Frenguelli, B. G. (2012). The double-edged sword: Gaining Adenosine at the expense of ATP. How to balance the books. In S. Masino & D. Boison (Eds.), Adenosine (1st ed., pp. 109–129). New York: Springer. https://doi.org/10.1007/978-1-4614-3903-5_6
View
| DOI
2012 |
Published |
Conference Paper |
IST-REx-ID: 10903
Bouajjani, A., Dragoi, C., Enea, C., & Sighireanu, M. (2012). Accurate invariant checking for programs manipulating lists and arrays with infinite data. In Automated Technology for Verification and Analysis (Vol. 7561, pp. 167–182). Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-642-33386-6_14
View
| DOI
2012 |
Published |
Conference Paper |
IST-REx-ID: 10904
Chatterjee, K., Randour, M., & Raskin, J.-F. (2012). Strategy synthesis for multi-dimensional quantitative objectives. In M. Koutny & I. Ulidowski (Eds.), CONCUR 2012 - Concurrency Theory (Vol. 7454, pp. 115–131). Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-642-32940-1_10
[Preprint]
View
| Files available
| DOI
| arXiv
2012 |
Published |
Conference Paper |
IST-REx-ID: 10905 |
Chatterjee, K., Henzinger, M. H., Krinninger, S., & Nanongkai, D. (2012). Polynomial-time algorithms for energy games with special weight structures. In Algorithms – ESA 2012 (Vol. 7501, pp. 301–312). Ljubljana, Slovenia: Springer. https://doi.org/10.1007/978-3-642-33090-2_27
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
2012 |
Published |
Conference Paper |
IST-REx-ID: 10906 |
Grebenshchikov, S., Gupta, A., Lopes, N. P., Popeea, C., & Rybalchenko, A. (2012). HSF(C): A software verifier based on Horn clauses. In C. Flanagan & B. König (Eds.), Tools and Algorithms for the Construction and Analysis of Systems (Vol. 7214, pp. 549–551). Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-642-28756-5_46
[Published Version]
View
| DOI
| Download Published Version (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 2048 |
Faust, S., Pietrzak, K. Z., & Schipper, J. (2012). Practical leakage-resilient symmetric cryptography. In Conference proceedings CHES 2012 (Vol. 7428, pp. 213–232). Leuven, Belgium: Springer. https://doi.org/10.1007/978-3-642-33027-8_13
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 2049 |
Heyse, S., Kiltz, E., Lyubashevsky, V., Paar, C., & Pietrzak, K. Z. (2012). Lapin: An efficient authentication protocol based on ring-LPN. In Conference proceedings FSE 2012 (Vol. 7549, pp. 346–365). Washington, DC, USA: Springer. https://doi.org/10.1007/978-3-642-34047-5_20
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |
Published |
Journal Article |
IST-REx-ID: 2263 |
Liang, H., Hippenmeyer, S., & Ghashghaei, H. (2012). A Nestin-cre transgenic mouse is insufficient for recombination in early embryonic neural progenitors. Biology Open. The Company of Biologists. https://doi.org/10.1242/bio.20122287
[Published Version]
View
| Files available
| DOI
2012 |
Published |
Journal Article |
IST-REx-ID: 2302
Henzinger, T. A., & Mateescu, M. (2012). The propagation approach for computing biochemical reaction networks. IEEE ACM Transactions on Computational Biology and Bioinformatics. IEEE. https://doi.org/10.1109/TCBB.2012.91
View
| DOI
| PubMed | Europe PMC
2012 |
Published |
Journal Article |
IST-REx-ID: 2318 |
Seiringer, R. (2012). Absence of bound states implies non-negativity of the scattering length. Journal of Spectral Theory. European Mathematical Society. https://doi.org/10.4171/JST/31
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |
Published |
Journal Article |
IST-REx-ID: 2411 |
Ebersberger, I., De Matos Simoes, R., Kupczok, A., Gube, M., Kothe, E., Voigt, K., & Von Haeseler, A. (2012). A consistent phylogenetic backbone for the fungi. Molecular Biology and Evolution. Oxford University Press. https://doi.org/10.1093/molbev/msr285
[Published Version]
View
| Files available
| DOI