@article{1153,
abstract = {Differential cell growth enables flexible organ bending in the presence of environmental signals such as light or gravity. A prominent example of the developmental processes based on differential cell growth is the formation of the apical hook that protects the fragile shoot apical meristem when it breaks through the soil during germination. Here, we combined in silico and in vivo approaches to identify a minimal mechanism producing auxin gradient-guided differential growth during the establishment of the apical hook in the model plant Arabidopsis thaliana. Computer simulation models based on experimental data demonstrate that asymmetric expression of the PIN-FORMED auxin efflux carrier at the concave (inner) versus convex (outer) side of the hook suffices to establish an auxin maximum in the epidermis at the concave side of the apical hook. Furthermore, we propose a mechanism that translates this maximum into differential growth, and thus curvature, of the apical hook. Through a combination of experimental and in silico computational approaches, we have identified the individual contributions of differential cell elongation and proliferation to defining the apical hook and reveal the role of auxin-ethylene crosstalk in balancing these two processes. © 2016 American Society of Plant Biologists. All rights reserved.},
author = {Žádníková, Petra and Wabnik, Krzysztof T and Abuzeineh, Anas and Gallemí, Marçal and Van Der Straeten, Dominique and Smith, Richard and Inze, Dirk and Friml, Jirí and Prusinkiewicz, Przemysław and Benková, Eva},
journal = {Plant Cell},
number = {10},
pages = {2464 -- 2477},
publisher = {American Society of Plant Biologists},
title = {{A model of differential growth guided apical hook formation in plants}},
doi = {10.1105/tpc.15.00569},
volume = {28},
year = {2016},
}
@article{1154,
abstract = {Cellular locomotion is a central hallmark of eukaryotic life. It is governed by cell-extrinsic molecular factors, which can either emerge in the soluble phase or as immobilized, often adhesive ligands. To encode for direction, every cue must be present as a spatial or temporal gradient. Here, we developed a microfluidic chamber that allows measurement of cell migration in combined response to surface immobilized and soluble molecular gradients. As a proof of principle we study the response of dendritic cells to their major guidance cues, chemokines. The majority of data on chemokine gradient sensing is based on in vitro studies employing soluble gradients. Despite evidence suggesting that in vivo chemokines are often immobilized to sugar residues, limited information is available how cells respond to immobilized chemokines. We tracked migration of dendritic cells towards immobilized gradients of the chemokine CCL21 and varying superimposed soluble gradients of CCL19. Differential migratory patterns illustrate the potential of our setup to quantitatively study the competitive response to both types of gradients. Beyond chemokines our approach is broadly applicable to alternative systems of chemo- and haptotaxis such as cells migrating along gradients of adhesion receptor ligands vs. any soluble cue.
},
author = {Schwarz, Jan and Bierbaum, Veronika and Merrin, Jack and Frank, Tino and Hauschild, Robert and Bollenbach, Mark Tobias and Tay, Savaş and Sixt, Michael K and Mehling, Matthias},
journal = {Scientific Reports},
publisher = {Nature Publishing Group},
title = {{A microfluidic device for measuring cell migration towards substrate bound and soluble chemokine gradients}},
doi = {10.1038/srep36440},
volume = {6},
year = {2016},
}
@article{1157,
abstract = {We consider sample covariance matrices of the form Q = ( σ1/2X)(σ1/2X)∗, where the sample X is an M ×N random matrix whose entries are real independent random variables with variance 1/N and whereσ is an M × M positive-definite deterministic matrix. We analyze the asymptotic fluctuations of the largest rescaled eigenvalue of Q when both M and N tend to infinity with N/M →d ϵ (0,∞). For a large class of populations σ in the sub-critical regime, we show that the distribution of the largest rescaled eigenvalue of Q is given by the type-1 Tracy-Widom distribution under the additional assumptions that (1) either the entries of X are i.i.d. Gaussians or (2) that σ is diagonal and that the entries of X have a sub-exponential decay.},
author = {Lee, Ji and Schnelli, Kevin},
journal = {Annals of Applied Probability},
number = {6},
pages = {3786 -- 3839},
publisher = {Institute of Mathematical Statistics},
title = {{Tracy-widom distribution for the largest eigenvalue of real sample covariance matrices with general population}},
doi = {10.1214/16-AAP1193},
volume = {26},
year = {2016},
}
@article{1158,
abstract = {Speciation results from the progressive accumulation of mutations that decrease the probability of mating between parental populations or reduce the fitness of hybrids—the so-called species barriers. The speciation genomic literature, however, is mainly a collection of case studies, each with its own approach and specificities, such that a global view of the gradual process of evolution from one to two species is currently lacking. Of primary importance is the prevalence of gene flow between diverging entities, which is central in most species concepts and has been widely discussed in recent years. Here, we explore the continuum of speciation thanks to a comparative analysis of genomic data from 61 pairs of populations/species of animals with variable levels of divergence. Gene flow between diverging gene pools is assessed under an approximate Bayesian computation (ABC) framework. We show that the intermediate "grey zone" of speciation, in which taxonomy is often controversial, spans from 0.5% to 2% of net synonymous divergence, irrespective of species life history traits or ecology. Thanks to appropriate modeling of among-locus variation in genetic drift and introgression rate, we clarify the status of the majority of ambiguous cases and uncover a number of cryptic species. Our analysis also reveals the high incidence in animals of semi-isolated species (when some but not all loci are affected by barriers to gene flow) and highlights the intrinsic difficulty, both statistical and conceptual, of delineating species in the grey zone of speciation.},
author = {Roux, Camille and Fraisse, Christelle and Romiguier, Jonathan and Anciaux, Youann and Galtier, Nicolas and Bierne, Nicolas},
journal = {PLoS Biology},
number = {12},
publisher = {Public Library of Science},
title = {{Shedding light on the grey zone of speciation along a continuum of genomic divergence}},
doi = {10.1371/journal.pbio.2000234},
volume = {14},
year = {2016},
}
@inproceedings{1164,
abstract = {A drawing of a graph G is radial if the vertices of G are placed on concentric circles C1, … , Ck with common center c, and edges are drawn radially: every edge intersects every circle centered at c at most once. G is radial planar if it has a radial embedding, that is, a crossing-free radial drawing. If the vertices of G are ordered or partitioned into ordered levels (as they are for leveled graphs), we require that the assignment of vertices to circles corresponds to the given ordering or leveling. A pair of edges e and f in a graph is independent if e and f do not share a vertex. We show that a graph G is radial planar if G has a radial drawing in which every two independent edges cross an even number of times; the radial embedding has the same leveling as the radial drawing. In other words, we establish the strong Hanani-Tutte theorem for radial planarity. This characterization yields a very simple algorithm for radial planarity testing.},
author = {Fulek, Radoslav and Pelsmajer, Michael and Schaefer, Marcus},
location = {Athens, Greece},
pages = {468 -- 481},
publisher = {Springer},
title = {{Hanani-Tutte for radial planarity II}},
doi = {10.1007/978-3-319-50106-2_36},
volume = {9801},
year = {2016},
}
@inproceedings{1165,
abstract = {We show that c-planarity is solvable in quadratic time for flat clustered graphs with three clusters if the combinatorial embedding of the underlying graph is fixed. In simpler graph-theoretical terms our result can be viewed as follows. Given a graph G with the vertex set partitioned into three parts embedded on a 2-sphere, our algorithm decides if we can augment G by adding edges without creating an edge-crossing so that in the resulting spherical graph the vertices of each part induce a connected sub-graph. We proceed by a reduction to the problem of testing the existence of a perfect matching in planar bipartite graphs. We formulate our result in a slightly more general setting of cyclic clustered graphs, i.e., the simple graph obtained by contracting each cluster, where we disregard loops and multi-edges, is a cycle.},
author = {Fulek, Radoslav},
location = {Athens, Greece},
pages = {94 -- 106},
publisher = {Springer},
title = {{C-planarity of embedded cyclic c-graphs}},
doi = {10.1007/978-3-319-50106-2_8},
volume = {9801 },
year = {2016},
}
@article{1167,
abstract = {Evolutionary pathways describe trajectories of biological evolution in the space of different variants of organisms (genotypes). The probability of existence and the number of evolutionary pathways that lead from a given genotype to a better-adapted genotype are important measures of accessibility of local fitness optima and the reproducibility of evolution. Both quantities have been studied in simple mathematical models where genotypes are represented as binary sequences of two types of basic units, and the network of permitted mutations between the genotypes is a hypercube graph. However, it is unclear how these results translate to the biologically relevant case in which genotypes are represented by sequences of more than two units, for example four nucleotides (DNA) or 20 amino acids (proteins), and the mutational graph is not the hypercube. Here we investigate accessibility of the best-adapted genotype in the general case of K > 2 units. Using computer generated and experimental fitness landscapes we show that accessibility of the global fitness maximum increases with K and can be much higher than for binary sequences. The increase in accessibility comes from the increase in the number of indirect trajectories exploited by evolution for higher K. As one of the consequences, the fraction of genotypes that are accessible increases by three orders of magnitude when the number of units K increases from 2 to 16 for landscapes of size N ∼ 106genotypes. This suggests that evolution can follow many different trajectories on such landscapes and the reconstruction of evolutionary pathways from experimental data might be an extremely difficult task.},
author = {Zagórski, Marcin P and Burda, Zdzisław and Wacław, Bartłomiej},
journal = {PLoS Computational Biology},
number = {12},
publisher = {Public Library of Science},
title = {{Beyond the hypercube evolutionary accessibility of fitness landscapes with realistic mutational networks}},
doi = {10.1371/journal.pcbi.1005218},
volume = {12},
year = {2016},
}
@article{1172,
abstract = {A central issue in cell biology is the physico-chemical basis of organelle biogenesis in intracellular trafficking pathways, its most impressive manifestation being the biogenesis of Golgi cisternae. At a basic level, such morphologically and chemically distinct compartments should arise from an interplay between the molecular transport and chemical maturation. Here, we formulate analytically tractable, minimalist models, that incorporate this interplay between transport and chemical progression in physical space, and explore the conditions for de novo biogenesis of distinct cisternae. We propose new quantitative measures that can discriminate between the various models of transport in a qualitative manner-this includes measures of the dynamics in steady state and the dynamical response to perturbations of the kind amenable to live-cell imaging.},
author = {Sachdeva, Himani and Barma, Mustansir and Rao, Madan},
journal = {Scientific Reports},
publisher = {Nature Publishing Group},
title = {{Nonequilibrium description of de novo biogenesis and transport through Golgi-like cisternae}},
doi = {10.1038/srep38840},
volume = {6},
year = {2016},
}
@article{1177,
abstract = {Boldyreva, Palacio and Warinschi introduced a multiple forking game as an extension of general forking. The notion of (multiple) forking is a useful abstraction from the actual simulation of cryptographic scheme to the adversary in a security reduction, and is achieved through the intermediary of a so-called wrapper algorithm. Multiple forking has turned out to be a useful tool in the security argument of several cryptographic protocols. However, a reduction employing multiple forking incurs a significant degradation of (Formula presented.) , where (Formula presented.) denotes the upper bound on the underlying random oracle calls and (Formula presented.) , the number of forkings. In this work we take a closer look at the reasons for the degradation with a tighter security bound in mind. We nail down the exact set of conditions for success in the multiple forking game. A careful analysis of the cryptographic schemes and corresponding security reduction employing multiple forking leads to the formulation of ‘dependence’ and ‘independence’ conditions pertaining to the output of the wrapper in different rounds. Based on the (in)dependence conditions we propose a general framework of multiple forking and a General Multiple Forking Lemma. Leveraging (in)dependence to the full allows us to improve the degradation factor in the multiple forking game by a factor of (Formula presented.). By implication, the cost of a single forking involving two random oracles (augmented forking) matches that involving a single random oracle (elementary forking). Finally, we study the effect of these observations on the concrete security of existing schemes employing multiple forking. We conclude that by careful design of the protocol (and the wrapper in the security reduction) it is possible to harness our observations to the full extent.},
author = {Kamath Hosdurg, Chethan and Chatterjee, Sanjit},
journal = {Algorithmica},
number = {4},
pages = {1321 -- 1362},
publisher = {Springer},
title = {{A closer look at multiple-forking: Leveraging (in)dependence for a tighter bound}},
doi = {10.1007/s00453-015-9997-6},
volume = {74},
year = {2016},
}
@inproceedings{1179,
abstract = {Computational notions of entropy have recently found many applications, including leakage-resilient cryptography, deterministic encryption or memory delegation. The two main types of results which make computational notions so useful are (1) Chain rules, which quantify by how much the computational entropy of a variable decreases if conditioned on some other variable (2) Transformations, which quantify to which extend one type of entropy implies another.
Such chain rules and transformations typically lose a significant amount in quality of the entropy, and are the reason why applying these results one gets rather weak quantitative security bounds. In this paper we for the first time prove lower bounds in this context, showing that existing results for transformations are, unfortunately, basically optimal for non-adaptive black-box reductions (and it’s hard to imagine how non black-box reductions or adaptivity could be useful here.)
A variable X has k bits of HILL entropy of quality (ϵ,s)
if there exists a variable Y with k bits min-entropy which cannot be distinguished from X with advantage ϵ
by distinguishing circuits of size s. A weaker notion is Metric entropy, where we switch quantifiers, and only require that for every distinguisher of size s, such a Y exists.
We first describe our result concerning transformations. By definition, HILL implies Metric without any loss in quality. Metric entropy often comes up in applications, but must be transformed to HILL for meaningful security guarantees. The best known result states that if a variable X has k bits of Metric entropy of quality (ϵ,s)
, then it has k bits of HILL with quality (2ϵ,s⋅ϵ2). We show that this loss of a factor Ω(ϵ−2)
in circuit size is necessary. In fact, we show the stronger result that this loss is already necessary when transforming so called deterministic real valued Metric entropy to randomised boolean Metric (both these variants of Metric entropy are implied by HILL without loss in quality).
The chain rule for HILL entropy states that if X has k bits of HILL entropy of quality (ϵ,s)
, then for any variable Z of length m, X conditioned on Z has k−m bits of HILL entropy with quality (ϵ,s⋅ϵ2/2m). We show that a loss of Ω(2m/ϵ) in circuit size necessary here. Note that this still leaves a gap of ϵ between the known bound and our lower bound.},
author = {Pietrzak, Krzysztof Z and Maciej, Skorski},
location = {Beijing, China},
pages = {183 -- 203},
publisher = {Springer},
title = {{Pseudoentropy: Lower-bounds for chain rules and transformations}},
doi = {10.1007/978-3-662-53641-4_8},
volume = {9985},
year = {2016},
}