@article{456,
abstract = {Inhibition of the endoplasmic reticulum stress pathway may hold the key to Zika virus-associated microcephaly treatment. },
author = {Novarino, Gaia},
journal = {Science Translational Medicine},
number = {423},
publisher = {American Association for the Advancement of Science},
title = {{Zika-associated microcephaly: Reduce the stress and race for the treatment}},
doi = {10.1126/scitranslmed.aar7514},
volume = {10},
year = {2018},
}
@article{457,
abstract = {Temperate bacteriophages integrate in bacterial genomes as prophages and represent an important source of genetic variation for bacterial evolution, frequently transmitting fitness-augmenting genes such as toxins responsible for virulence of major pathogens. However, only a fraction of bacteriophage infections are lysogenic and lead to prophage acquisition, whereas the majority are lytic and kill the infected bacteria. Unless able to discriminate lytic from lysogenic infections, mechanisms of immunity to bacteriophages are expected to act as a double-edged sword and increase the odds of survival at the cost of depriving bacteria of potentially beneficial prophages. We show that although restriction-modification systems as mechanisms of innate immunity prevent both lytic and lysogenic infections indiscriminately in individual bacteria, they increase the number of prophage-acquiring individuals at the population level. We find that this counterintuitive result is a consequence of phage-host population dynamics, in which restriction-modification systems delay infection onset until bacteria reach densities at which the probability of lysogeny increases. These results underscore the importance of population-level dynamics as a key factor modulating costs and benefits of immunity to temperate bacteriophages},
author = {Pleska, Maros and Lang, Moritz and Refardt, Dominik and Levin, Bruce and Guet, Calin C},
journal = {Nature Ecology and Evolution},
number = {2},
pages = {359 -- 366},
publisher = {Springer Nature},
title = {{Phage-host population dynamics promotes prophage acquisition in bacteria with innate immunity}},
doi = {10.1038/s41559-017-0424-z},
volume = {2},
year = {2018},
}
@article{458,
abstract = {We consider congruences of straight lines in a plane with the combinatorics of the square grid, with all elementary quadrilaterals possessing an incircle. It is shown that all the vertices of such nets (we call them incircular or IC-nets) lie on confocal conics. Our main new results are on checkerboard IC-nets in the plane. These are congruences of straight lines in the plane with the combinatorics of the square grid, combinatorially colored as a checkerboard, such that all black coordinate quadrilaterals possess inscribed circles. We show how this larger class of IC-nets appears quite naturally in Laguerre geometry of oriented planes and spheres and leads to new remarkable incidence theorems. Most of our results are valid in hyperbolic and spherical geometries as well. We present also generalizations in spaces of higher dimension, called checkerboard IS-nets. The construction of these nets is based on a new 9 inspheres incidence theorem.},
author = {Akopyan, Arseniy and Bobenko, Alexander},
journal = {Transactions of the American Mathematical Society},
number = {4},
pages = {2825 -- 2854},
publisher = {American Mathematical Society},
title = {{Incircular nets and confocal conics}},
doi = {10.1090/tran/7292},
volume = {370},
year = {2018},
}
@article{46,
abstract = {We analyze a disordered central spin model, where a central spin interacts equally with each spin in a periodic one-dimensional (1D) random-field Heisenberg chain. If the Heisenberg chain is initially in the many-body localized (MBL) phase, we find that the coupling to the central spin suffices to delocalize the chain for a substantial range of coupling strengths. We calculate the phase diagram of the model and identify the phase boundary between the MBL and ergodic phase. Within the localized phase, the central spin significantly enhances the rate of the logarithmic entanglement growth and its saturation value. We attribute the increase in entanglement entropy to a nonextensive enhancement of magnetization fluctuations induced by the central spin. Finally, we demonstrate that correlation functions of the central spin can be utilized to distinguish between MBL and ergodic phases of the 1D chain. Hence, we propose the use of a central spin as a possible experimental probe to identify the MBL phase.},
author = {Hetterich, Daniel and Yao, Norman and Serbyn, Maksym and Pollmann, Frank and Trauzettel, Björn},
journal = {Physical Review B},
number = {16},
publisher = {American Physical Society},
title = {{Detection and characterization of many-body localization in central spin models}},
doi = {10.1103/PhysRevB.98.161122},
volume = {98},
year = {2018},
}
@inproceedings{299,
abstract = {We introduce in this paper AMT 2.0 , a tool for qualitative and quantitative analysis of hybrid continuous and Boolean signals that combine numerical values and discrete events. The evaluation of the signals is based on rich temporal specifications expressed in extended Signal Temporal Logic (xSTL), which integrates Timed Regular Expressions (TRE) within Signal Temporal Logic (STL). The tool features qualitative monitoring (property satisfaction checking), trace diagnostics for explaining and justifying property violations and specification-driven measurement of quantitative features of the signal.},
author = {Nickovic, Dejan and Lebeltel, Olivier and Maler, Oded and Ferrere, Thomas and Ulus, Dogan},
editor = {Beyer, Dirk and Huisman, Marieke},
location = {Thessaloniki, Greece},
pages = {303 -- 319},
publisher = {Springer},
title = {{AMT 2.0: Qualitative and quantitative trace analysis with extended signal temporal logic}},
doi = {10.1007/978-3-319-89963-3_18},
volume = {10806},
year = {2018},
}
@article{3,
abstract = {SETD5 gene mutations have been identified as a frequent cause of idiopathic intellectual disability. Here we show that Setd5-haploinsufficient mice present developmental defects such as abnormal brain-to-body weight ratios and neural crest defect-associated phenotypes. Furthermore, Setd5-mutant mice show impairments in cognitive tasks, enhanced long-term potentiation, delayed ontogenetic profile of ultrasonic vocalization, and behavioral inflexibility. Behavioral issues are accompanied by abnormal expression of postsynaptic density proteins previously associated with cognition. Our data additionally indicate that Setd5 regulates RNA polymerase II dynamics and gene transcription via its interaction with the Hdac3 and Paf1 complexes, findings potentially explaining the gene expression defects observed in Setd5-haploinsufficient mice. Our results emphasize the decisive role of Setd5 in a biological pathway found to be disrupted in humans with intellectual disability and autism spectrum disorder.},
author = {Deliu, Elena and Arecco, Niccoló and Morandell, Jasmin and Dotter, Christoph and Contreras, Ximena and Girardot, Charles and Käsper, Eva and Kozlova, Alena and Kishi, Kasumi and Chiaradia, Ilaria and Noh, Kyung and Novarino, Gaia},
journal = {Nature Neuroscience},
number = {12},
pages = {1717 -- 1727},
publisher = {Nature Publishing Group},
title = {{Haploinsufficiency of the intellectual disability gene SETD5 disturbs developmental gene expression and cognition}},
doi = {10.1038/s41593-018-0266-2},
volume = {21},
year = {2018},
}
@inproceedings{300,
abstract = {We introduce a formal quantitative notion of “bit security” for a general type of cryptographic games (capturing both decision and search problems), aimed at capturing the intuition that a cryptographic primitive with k-bit security is as hard to break as an ideal cryptographic function requiring a brute force attack on a k-bit key space. Our new definition matches the notion of bit security commonly used by cryptographers and cryptanalysts when studying search (e.g., key recovery) problems, where the use of the traditional definition is well established. However, it produces a quantitatively different metric in the case of decision (indistinguishability) problems, where the use of (a straightforward generalization of) the traditional definition is more problematic and leads to a number of paradoxical situations or mismatches between theoretical/provable security and practical/common sense intuition. Key to our new definition is to consider adversaries that may explicitly declare failure of the attack. We support and justify the new definition by proving a number of technical results, including tight reductions between several standard cryptographic problems, a new hybrid theorem that preserves bit security, and an application to the security analysis of indistinguishability primitives making use of (approximate) floating point numbers. This is the first result showing that (standard precision) 53-bit floating point numbers can be used to achieve 100-bit security in the context of cryptographic primitives with general indistinguishability-based security definitions. Previous results of this type applied only to search problems, or special types of decision problems.},
author = {Micciancio, Daniele and Walter, Michael},
location = {Tel Aviv, Israel},
pages = {3 -- 28},
publisher = {Springer},
title = {{On the bit security of cryptographic primitives}},
doi = {10.1007/978-3-319-78381-9_1},
volume = {10820},
year = {2018},
}
@inproceedings{302,
abstract = {At ITCS 2013, Mahmoody, Moran and Vadhan [MMV13] introduce and construct publicly verifiable proofs of sequential work, which is a protocol for proving that one spent sequential computational work related to some statement. The original motivation for such proofs included non-interactive time-stamping and universally verifiable CPU benchmarks. A more recent application, and our main motivation, are blockchain designs, where proofs of sequential work can be used – in combination with proofs of space – as a more ecological and economical substitute for proofs of work which are currently used to secure Bitcoin and other cryptocurrencies. The construction proposed by [MMV13] is based on a hash function and can be proven secure in the random oracle model, or assuming inherently sequential hash-functions, which is a new standard model assumption introduced in their work. In a proof of sequential work, a prover gets a “statement” χ, a time parameter N and access to a hash-function H, which for the security proof is modelled as a random oracle. Correctness requires that an honest prover can make a verifier accept making only N queries to H, while soundness requires that any prover who makes the verifier accept must have made (almost) N sequential queries to H. Thus a solution constitutes a proof that N time passed since χ was received. Solutions must be publicly verifiable in time at most polylogarithmic in N. The construction of [MMV13] is based on “depth-robust” graphs, and as a consequence has rather poor concrete parameters. But the major drawback is that the prover needs not just N time, but also N space to compute a proof. In this work we propose a proof of sequential work which is much simpler, more efficient and achieves much better concrete bounds. Most importantly, the space required can be as small as log (N) (but we get better soundness using slightly more memory than that). An open problem stated by [MMV13] that our construction does not solve either is achieving a “unique” proof, where even a cheating prover can only generate a single accepting proof. This property would be extremely useful for applications to blockchains.},
author = {Cohen, Bram and Pietrzak, Krzysztof Z},
location = {Tel Aviv, Israel},
pages = {451 -- 467},
publisher = {Springer},
title = {{Simple proofs of sequential work}},
doi = {10.1007/978-3-319-78375-8_15},
volume = {10821},
year = {2018},
}
@article{303,
abstract = {The theory of tropical series, that we develop here, firstly appeared in the study of the growth of pluriharmonic functions. Motivated by waves in sandpile models we introduce a dynamic on the set of tropical series, and it is experimentally observed that this dynamic obeys a power law. So, this paper serves as a compilation of results we need for other articles and also introduces several objects interesting by themselves.},
author = {Kalinin, Nikita and Shkolnikov, Mikhail},
journal = {Discrete and Continuous Dynamical Systems- Series A},
number = {6},
pages = {2827 -- 2849},
publisher = {AIMS},
title = {{Introduction to tropical series and wave dynamic on them}},
doi = {10.3934/dcds.2018120},
volume = {38},
year = {2018},
}
@article{304,
abstract = {Additive manufacturing has recently seen drastic improvements in resolution, making it now possible to fabricate features at scales of hundreds or even dozens of nanometers, which previously required very expensive lithographic methods.
As a result, additive manufacturing now seems poised for optical applications, including those relevant to computer graphics, such as material design, as well as display and imaging applications.
In this work, we explore the use of additive manufacturing for generating structural colors, where the structures are designed using a fabrication-aware optimization process.
This requires a combination of full-wave simulation, a feasible parameterization of the design space, and a tailored optimization procedure.
Many of these components should be re-usable for the design of other optical structures at this scale.
We show initial results of material samples fabricated based on our designs.
While these suffer from the prototype character of state-of-the-art fabrication hardware, we believe they clearly demonstrate the potential of additive nanofabrication for structural colors and other graphics applications.},
author = {Auzinger, Thomas and Heidrich, Wolfgang and Bickel, Bernd},
journal = {ACM Transactions on Graphics},
number = {4},
publisher = {ACM},
title = {{Computational design of nanostructural color for additive manufacturing}},
doi = {10.1145/3197517.3201376},
volume = {37},
year = {2018},
}
@article{305,
abstract = {The hanging-drop network (HDN) is a technology platform based on a completely open microfluidic network at the bottom of an inverted, surface-patterned substrate. The platform is predominantly used for the formation, culturing, and interaction of self-assembled spherical microtissues (spheroids) under precisely controlled flow conditions. Here, we describe design, fabrication, and operation of microfluidic hanging-drop networks.},
author = {Misun, Patrick and Birchler, Axel and Lang, Moritz and Hierlemann, Andreas and Frey, Olivier},
journal = {Methods in Molecular Biology},
pages = {183 -- 202},
publisher = {Springer},
title = {{Fabrication and operation of microfluidic hanging drop networks}},
doi = {10.1007/978-1-4939-7792-5_15},
volume = {1771},
year = {2018},
}
@article{306,
abstract = {A cornerstone of statistical inference, the maximum entropy framework is being increasingly applied to construct descriptive and predictive models of biological systems, especially complex biological networks, from large experimental data sets. Both its broad applicability and the success it obtained in different contexts hinge upon its conceptual simplicity and mathematical soundness. Here we try to concisely review the basic elements of the maximum entropy principle, starting from the notion of ‘entropy’, and describe its usefulness for the analysis of biological systems. As examples, we focus specifically on the problem of reconstructing gene interaction networks from expression data and on recent work attempting to expand our system-level understanding of bacterial metabolism. Finally, we highlight some extensions and potential limitations of the maximum entropy approach, and point to more recent developments that are likely to play a key role in the upcoming challenges of extracting structures and information from increasingly rich, high-throughput biological data.},
author = {De Martino, Andrea and De Martino, Daniele},
journal = {Heliyon},
number = {4},
publisher = {Elsevier},
title = {{An introduction to the maximum entropy approach and its application to inference problems in biology}},
doi = {10.1016/j.heliyon.2018.e00596},
volume = {4},
year = {2018},
}
@article{307,
abstract = {Spontaneous emission spectra of two initially excited closely spaced identical atoms are very sensitive to the strength and the direction of the applied magnetic field. We consider the relevant schemes that ensure the determination of the mutual spatial orientation of the atoms and the distance between them by entirely optical means. A corresponding theoretical description is given accounting for the dipole-dipole interaction between the two atoms in the presence of a magnetic field and for polarizations of the quantum field interacting with magnetic sublevels of the two-atom system. },
author = {Redchenko, Elena and Makarov, Alexander and Yudson, Vladimir},
journal = { Physical Review A - Atomic, Molecular, and Optical Physics},
number = {4},
publisher = {American Physical Society},
title = {{Nanoscopy of pairs of atoms by fluorescence in a magnetic field}},
doi = {10.1103/PhysRevA.97.043812},
volume = {97},
year = {2018},
}
@article{308,
abstract = {Migrating cells penetrate tissue barriers during development, inflammatory responses, and tumor metastasis. We study if migration in vivo in such three-dimensionally confined environments requires changes in the mechanical properties of the surrounding cells using embryonic Drosophila melanogaster hemocytes, also called macrophages, as a model. We find that macrophage invasion into the germband through transient separation of the apposing ectoderm and mesoderm requires cell deformations and reductions in apical tension in the ectoderm. Interestingly, the genetic pathway governing these mechanical shifts acts downstream of the only known tumor necrosis factor superfamily member in Drosophila, Eiger, and its receptor, Grindelwald. Eiger-Grindelwald signaling reduces levels of active Myosin in the germband ectodermal cortex through the localization of a Crumbs complex component, Patj (Pals-1-associated tight junction protein). We therefore elucidate a distinct molecular pathway that controls tissue tension and demonstrate the importance of such regulation for invasive migration in vivo.},
author = {Ratheesh, Aparna and Biebl, Julia and Smutny, Michael and Veselá, Jana and Papusheva, Ekaterina and Krens, Gabriel and Kaufmann, Walter and György, Attila and Casano, Alessandra M and Siekhaus, Daria E},
journal = {Developmental Cell},
number = {3},
pages = {331 -- 346},
publisher = {Elsevier},
title = {{Drosophila TNF modulates tissue tension in the embryo to facilitate macrophage invasive migration}},
doi = {10.1016/j.devcel.2018.04.002},
volume = {45},
year = {2018},
}
@inproceedings{309,
abstract = {We present an efficient algorithm for a problem in the interface between clustering and graph embeddings. An embedding ' : G ! M of a graph G into a 2manifold M maps the vertices in V (G) to distinct points and the edges in E(G) to interior-disjoint Jordan arcs between the corresponding vertices. In applications in clustering, cartography, and visualization, nearby vertices and edges are often bundled to a common node or arc, due to data compression or low resolution. This raises the computational problem of deciding whether a given map ' : G ! M comes from an embedding. A map ' : G ! M is a weak embedding if it can be perturbed into an embedding ψ: G ! M with k' "k < " for every " > 0. A polynomial-time algorithm for recognizing weak embeddings was recently found by Fulek and Kyncl [14], which reduces to solving a system of linear equations over Z2. It runs in O(n2!) O(n4:75) time, where 2:373 is the matrix multiplication exponent and n is the number of vertices and edges of G. We improve the running time to O(n log n). Our algorithm is also conceptually simpler than [14]: We perform a sequence of local operations that gradually "untangles" the image '(G) into an embedding (G), or reports that ' is not a weak embedding. It generalizes a recent technique developed for the case that G is a cycle and the embedding is a simple polygon [1], and combines local constraints on the orientation of subgraphs directly, thereby eliminating the need for solving large systems of linear equations.},
author = {Akitaya, Hugo and Fulek, Radoslav and Tóth, Csaba},
location = {New Orleans, LA, USA},
pages = {274 -- 292},
publisher = {ACM},
title = {{Recognizing weak embeddings of graphs}},
doi = {10.1137/1.9781611975031.20},
year = {2018},
}
@article{31,
abstract = {Correlations in sensory neural networks have both extrinsic and intrinsic origins. Extrinsic or stimulus correlations arise from shared inputs to the network and, thus, depend strongly on the stimulus ensemble. Intrinsic or noise correlations reflect biophysical mechanisms of interactions between neurons, which are expected to be robust to changes in the stimulus ensemble. Despite the importance of this distinction for understanding how sensory networks encode information collectively, no method exists to reliably separate intrinsic interactions from extrinsic correlations in neural activity data, limiting our ability to build predictive models of the network response. In this paper we introduce a general strategy to infer population models of interacting neurons that collectively encode stimulus information. The key to disentangling intrinsic from extrinsic correlations is to infer the couplings between neurons separately from the encoding model and to combine the two using corrections calculated in a mean-field approximation. We demonstrate the effectiveness of this approach in retinal recordings. The same coupling network is inferred from responses to radically different stimulus ensembles, showing that these couplings indeed reflect stimulus-independent interactions between neurons. The inferred model predicts accurately the collective response of retinal ganglion cell populations as a function of the stimulus.},
author = {Ferrari, Ulisse and Deny, Stephane and Chalk, Matthew J and Tkacik, Gasper and Marre, Olivier and Mora, Thierry},
issn = {24700045},
journal = {Physical Review E},
number = {4},
publisher = {American Physical Society},
title = {{Separating intrinsic interactions from extrinsic correlations in a network of sensory neurons}},
doi = {10.1103/PhysRevE.98.042410},
volume = {98},
year = {2018},
}
@inproceedings{310,
abstract = {A model of computation that is widely used in the formal analysis of reactive systems is symbolic algorithms. In this model the access to the input graph is restricted to consist of symbolic operations, which are expensive in comparison to the standard RAM operations. We give lower bounds on the number of symbolic operations for basic graph problems such as the computation of the strongly connected components and of the approximate diameter as well as for fundamental problems in model checking such as safety, liveness, and coliveness. Our lower bounds are linear in the number of vertices of the graph, even for constant-diameter graphs. For none of these problems lower bounds on the number of symbolic operations were known before. The lower bounds show an interesting separation of these problems from the reachability problem, which can be solved with O(D) symbolic operations, where D is the diameter of the graph. Additionally we present an approximation algorithm for the graph diameter which requires Õ(n/D) symbolic steps to achieve a (1 +ϵ)-approximation for any constant > 0. This compares to O(n/D) symbolic steps for the (naive) exact algorithm and O(D) symbolic steps for a 2-approximation. Finally we also give a refined analysis of the strongly connected components algorithms of [15], showing that it uses an optimal number of symbolic steps that is proportional to the sum of the diameters of the strongly connected components.},
author = {Chatterjee, Krishnendu and Dvorák, Wolfgang and Henzinger, Monika and Loitzenbauer, Veronika},
location = {New Orleans, Louisiana, United States},
pages = {2341 -- 2356},
publisher = {ACM},
title = {{Lower bounds for symbolic computation on graphs: Strongly connected components, liveness, safety and diameter}},
doi = {10.1137/1.9781611975031.151},
year = {2018},
}
@article{312,
abstract = {Motivated by biological questions, we study configurations of equal spheres that neither pack nor cover. Placing their centers on a lattice, we define the soft density of the configuration by penalizing multiple overlaps. Considering the 1-parameter family of diagonally distorted 3-dimensional integer lattices, we show that the soft density is maximized at the FCC lattice.},
author = {Edelsbrunner, Herbert and Iglesias Ham, Mabel},
issn = {08954801},
journal = {SIAM J Discrete Math},
number = {1},
pages = {750 -- 782},
publisher = {Society for Industrial and Applied Mathematics },
title = {{On the optimality of the FCC lattice for soft sphere packing}},
doi = {10.1137/16M1097201},
volume = {32},
year = {2018},
}
@article{314,
abstract = {The interface of physics and biology pro-vides a fruitful environment for generatingnew concepts and exciting ways forwardto understanding living matter. Examplesof successful studies include the estab-lishment and readout of morphogen gra-dients during development, signal pro-cessing in protein and genetic networks,the role of ﬂuctuations in determining thefates of cells and tissues, and collectiveeffects in proteins and in tissues. It is nothard to envision that signiﬁcant further ad-vances will translate to societal beneﬁtsby initiating the development of new de-vices and strategies for curing disease.However, research at the interface posesvarious challenges, in particular for youngscientists, and current institutions arerarely designed to facilitate such scientiﬁcprograms. In this Letter, we propose aninternational initiative that addressesthese challenges through the establish-ment of a worldwide network of platformsfor cross-disciplinary training and incuba-tors for starting new collaborations.},
author = {Bauer, Guntram and Fakhri, Nikta and Kicheva, Anna and Kondev, Jané and Kruse, Karsten and Noji, Hiroyuki and Riveline, Daniel and Saunders, Timothy and Thatta, Mukund and Wieschaus, Eric},
issn = {2405-4712},
journal = {Cell Systems},
number = {4},
pages = {400 -- 402},
publisher = {Cell Press},
title = {{The science of living matter for tomorrow}},
doi = {10.1016/j.cels.2018.04.003},
volume = {6},
year = {2018},
}
@article{315,
abstract = {More than 100 years after Grigg’s influential analysis of species’ borders, the causes of limits to species’ ranges still represent a puzzle that has never been understood with clarity. The topic has become especially important recently as many scientists have become interested in the potential for species’ ranges to shift in response to climate change—and yet nearly all of those studies fail to recognise or incorporate evolutionary genetics in a way that relates to theoretical developments. I show that range margins can be understood based on just two measurable parameters: (i) the fitness cost of dispersal—a measure of environmental heterogeneity—and (ii) the strength of genetic drift, which reduces genetic diversity. Together, these two parameters define an ‘expansion threshold’: adaptation fails when genetic drift reduces genetic diversity below that required for adaptation to a heterogeneous environment. When the key parameters drop below this expansion threshold locally, a sharp range margin forms. When they drop below this threshold throughout the species’ range, adaptation collapses everywhere, resulting in either extinction or formation of a fragmented metapopulation. Because the effects of dispersal differ fundamentally with dimension, the second parameter—the strength of genetic drift—is qualitatively different compared to a linear habitat. In two-dimensional habitats, genetic drift becomes effectively independent of selection. It decreases with ‘neighbourhood size’—the number of individuals accessible by dispersal within one generation. Moreover, in contrast to earlier predictions, which neglected evolution of genetic variance and/or stochasticity in two dimensions, dispersal into small marginal populations aids adaptation. This is because the reduction of both genetic and demographic stochasticity has a stronger effect than the cost of dispersal through increased maladaptation. The expansion threshold thus provides a novel, theoretically justified, and testable prediction for formation of the range margin and collapse of the species’ range.},
author = {Polechova, Jitka},
issn = {15449173},
journal = {PLoS Biology},
number = {6},
publisher = {Public Library of Science},
title = {{Is the sky the limit? On the expansion threshold of a species’ range}},
doi = {10.1371/journal.pbio.2005372},
volume = {16},
year = {2018},
}