@article{3862,
abstract = {Quantitative generalizations of classical languages, which assign to each word a real number instead of a Boolean value, have applications in modeling resource-constrained computation. We use weighted automata (finite automata with transition weights) to define several natural classes of quantitative languages over finite and infinite words; in particular, the real value of an infinite run is computed as the maximum, limsup, liminf, limit average, or discounted sum of the transition weights. We define the classical decision problems of automata theory (emptiness, universality, language inclusion, and language equivalence) in the quantitative setting and study their computational complexity. As the decidability of the language-inclusion problem remains open for some classes of weighted automata, we introduce a notion of quantitative simulation that is decidable and implies language inclusion. We also give a complete characterization of the expressive power of the various classes of weighted automata. In particular, we show that most classes of weighted automata cannot be determinized.},
author = {Chatterjee, Krishnendu and Doyen, Laurent and Henzinger, Thomas A},
journal = {ACM Transactions on Computational Logic (TOCL)},
number = {4},
publisher = {ACM},
title = {{Quantitative languages}},
doi = {10.1145/1805950.1805953},
volume = {11},
year = {2010},
}
@article{3863,
abstract = {We consider two-player parity games with imperfect information in which strategies rely on observations that provide imperfect information about the history of a play. To solve such games, i.e., to determine the winning regions of players and corresponding winning strategies, one can use the subset construction to build an equivalent perfect-information game. Recently, an algorithm that avoids the inefficient subset construction has been proposed. The algorithm performs a fixed-point computation in a lattice of antichains, thus maintaining a succinct representation of state sets. However, this representation does not allow to recover winning strategies. In this paper, we build on the antichain approach to develop an algorithm for constructing the winning strategies in parity games of imperfect information. One major obstacle in adapting the classical procedure is that the complementation of attractor sets would break the invariant of downward-closedness on which the antichain representation relies. We overcome this difficulty by decomposing problem instances recursively into games with a combination of reachability, safety, and simpler parity conditions. We also report on an experimental implementation of our algorithm: to our knowledge, this is the first implementation of a procedure for solving imperfect-information parity games on graphs.},
author = {Berwanger, Dietmar and Chatterjee, Krishnendu and De Wulf, Martin and Doyen, Laurent and Henzinger, Thomas A},
journal = {Information and Computation},
number = {10},
pages = {1206 -- 1220},
publisher = {Elsevier},
title = {{Strategy construction for parity games with imperfect information}},
doi = {10.1016/j.ic.2009.09.006},
volume = {208},
year = {2010},
}
@inproceedings{3864,
abstract = {Often one has a preference order among the different systems that satisfy a given specification. Under a probabilistic assumption about the possible inputs, such a preference order is naturally expressed by a weighted automaton, which assigns to each word a value, such that a system is preferred if it generates a higher expected value. We solve the following optimal-synthesis problem: given an omega-regular specification, a Markov chain that describes the distribution of inputs, and a weighted automaton that measures how well a system satisfies the given specification tinder the given input assumption, synthesize a system that optimizes the measured value. For safety specifications and measures that are defined by mean-payoff automata, the optimal-synthesis problem amounts to finding a strategy in a Markov decision process (MDP) that is optimal for a long-run average reward objective, which can be done in polynomial time. For general omega-regular specifications, the solution rests on a new, polynomial-time algorithm for computing optimal strategies in MDPs with mean-payoff parity objectives. We present some experimental results showing optimal systems that were automatically generated in this way.},
author = {Chatterjee, Krishnendu and Henzinger, Thomas A and Jobstmann, Barbara and Singh, Rohit},
location = {Edinburgh, United Kingdom},
pages = {380 -- 395},
publisher = {Springer},
title = {{Measuring and synthesizing systems in probabilistic environments}},
doi = {10.1007/978-3-642-14295-6_34},
volume = {6174},
year = {2010},
}
@inproceedings{3866,
abstract = {Systems ought to behave reasonably even in circumstances that are not anticipated in their specifications. We propose a definition of robustness for liveness specifications which prescribes, for any number of environment assumptions that are violated, a minimal number of system guarantees that must still be fulfilled. This notion of robustness can be formulated and realized using a Generalized Reactivity formula. We present an algorithm for synthesizing robust systems from such formulas. For the important special case of Generalized Reactivity formulas of rank 1, our algorithm improves the complexity of [PPS06] for large specifications with a small number of assumptions and guarantees.},
author = {Bloem, Roderick and Chatterjee, Krishnendu and Greimel, Karin and Henzinger, Thomas A and Jobstmann, Barbara},
editor = {Touili, Tayssir and Cook, Byron and Jackson, Paul},
location = {Edinburgh, UK},
pages = {410 -- 424},
publisher = {Springer},
title = {{Robustness in the presence of liveness}},
doi = {10.1007/978-3-642-14295-6_36},
volume = {6174},
year = {2010},
}
@article{3867,
abstract = {Weighted automata are nondeterministic automata with numerical weights on transitions. They can define quantitative languages L that assign to each word w a real number L(w). In the case of infinite words, the value of a run is naturally computed as the maximum, limsup, liminf, limit-average, or discounted-sum of the transition weights. The value of a word w is the supremum of the values of the runs over w. We study expressiveness and closure questions about these quantitative languages. We first show that the set of words with value greater than a threshold can be omega-regular for deterministic limit-average and discounted-sum automata, while this set is always omega-regular when the threshold is isolated (i.e., some neighborhood around the threshold contains no word). In the latter case, we prove that the omega-regular language is robust against small perturbations of the transition weights. We next consider automata with transition weights 0 or 1 and show that they are as expressive as general weighted automata in the limit-average case, but not in the discounted-sum case. Third, for quantitative languages L-1 and L-2, we consider the operations max(L-1, L-2), min(L-1, L-2), and 1 - L-1, which generalize the boolean operations on languages, as well as the sum L-1 + L-2. We establish the closure properties of all classes of quantitative languages with respect to these four operations.},
author = {Chatterjee, Krishnendu and Doyen, Laurent and Henzinger, Thomas A},
journal = {Logical Methods in Computer Science},
number = {3},
pages = {1 -- 23},
publisher = {International Federation of Computational Logic},
title = {{Expressiveness and closure properties for quantitative languages}},
doi = {10.2168/LMCS-6(3:10)2010},
volume = {6},
year = {2010},
}
@article{3868,
abstract = {Simulation and bisimulation metrics for stochastic systems provide a quantitative generalization of the classical simulation and bisimulation relations. These metrics capture the similarity of states with respect to quantitative specifications written in the quantitative mu-calculus and related probabilistic logics. We first show that the metrics provide a bound for the difference in long-run average and discounted average behavior across states, indicating that the metrics can be used both in system verification, and in performance evaluation. For turn-based games and MDPs, we provide a polynomial-time algorithm for the computation of the one-step metric distance between states. The algorithm is based on linear programming; it improves on the previous known exponential-time algorithm based on a reduction to the theory of reals. We then present PSPACE algorithms for both the decision problem and the problem of approximating the metric distance between two states, matching the best known algorithms for Markov chains. For the bisimulation kernel of the metric our algorithm works in time O(n(4)) for both turn-based games and MDPs; improving the previously best known O(n(9).log(n)) time algorithm for MDPs. For a concurrent game G, we show that computing the exact distance be tween states is at least as hard as computing the value of concurrent reachability games and the square-root-sum problem in computational geometry. We show that checking whether the metric distance is bounded by a rational r, can be done via a reduction to the theory of real closed fields, involving a formula with three quantifier alternations, yielding O(vertical bar G vertical bar(O(vertical bar G vertical bar 5))) time complexity, improving the previously known reduction, which yielded O(vertical bar G vertical bar(O(vertical bar G vertical bar 7))) time complexity. These algorithms can be iterated to approximate the metrics using binary search},
author = {Chatterjee, Krishnendu and De Alfaro, Luca and Majumdar, Ritankar and Raman, Vishwanath},
journal = {Logical Methods in Computer Science},
number = {3},
pages = {1 -- 27},
publisher = {International Federation of Computational Logic},
title = {{Algorithms for game metrics}},
doi = {10.2168/LMCS-6(3:13)2010},
volume = {6},
year = {2010},
}
@article{3901,
abstract = {We are interested in 3-dimensional images given as arrays of voxels with intensity values. Extending these values to acontinuous function, we study the robustness of homology classes in its level and interlevel sets, that is, the amount of perturbationneeded to destroy these classes. The structure of the homology classes and their robustness, over all level and interlevel sets, can bevisualized by a triangular diagram of dots obtained by computing the extended persistence of the function. We give a fast hierarchicalalgorithm using the dual complexes of oct-tree approximations of the function. In addition, we show that for balanced oct-trees, thedual complexes are geometrically realized in $R^3$ and can thus be used to construct level and interlevel sets. We apply these tools tostudy 3-dimensional images of plant root systems.},
author = {Bendich, Paul and Edelsbrunner, Herbert and Kerber, Michael},
journal = {IEEE Transactions of Visualization and Computer Graphics},
number = {6},
pages = {1251 -- 1260},
publisher = {IEEE},
title = {{Computing robustness and persistence for images}},
doi = {10.1109/TVCG.2010.139},
volume = {16},
year = {2010},
}
@article{3904,
abstract = {Social organisms are constantly exposed to infectious agents via physical contact with conspecifics. While previous work has shown that disease susceptibility at the individual and group level is influenced by gen- etic diversity within and between group members, it remains poorly understood how group-level resistance to pathogens relates directly to individual physiology, defence behaviour and social interactions. We investigated the effects of high versus low genetic diversity on both the individual and collective disease defences in the ant Cardiocondyla obscurior. We compared the antiseptic behaviours (grooming and hygienic behaviour) of workers from genetically homogeneous and diverse colonies after exposure of their brood to the entomopathogenic fungus Metarhizium anisopliae. While workers from diverse colonies performed intensive allogrooming and quickly removed larvae covered with live fungal spores from the nest, workers from homogeneous colonies only removed sick larvae late after infection. This difference was not caused by a reduced repertoire of antiseptic behaviours or a generally decreased brood care activity in ants from homogeneous colonies. Our data instead suggest that reduced genetic diversity compromises the ability of Cardiocondyla colonies to quickly detect or react to the presence of pathogenic fungal spores before an infection is established, thereby affecting the dynamics of social immunity in the colony.},
author = {Ugelvig, Line V and Kronauer, Daniel and Schrempf, Alexandra and Heinze, Jürgen and Cremer, Sylvia},
journal = {Proceedings of the Royal Society of London Series B Biological Sciences},
number = {1695},
pages = {2821 -- 2828},
publisher = {Royal Society, The},
title = {{Rapid anti-pathogen response in ant societies relies on high genetic diversity}},
doi = {10.1098/rspb.2010.0644},
volume = {277},
year = {2010},
}
@article{3960,
abstract = {When lymphocytes follow chemotactic cues, they can adopt different migratory modes depending on the geometry and molecular composition of their extracellular environment. In this issue of The EMBO Journal, Klemke et al (2010) describe a novel Ras-dependent chemokine receptor signalling pathway that leads to activation of cofilin, which in turn amplifies actin turnover. This signalling module is exclusively required for lymphocyte migration in three-dimensional (3D) environments, but not for locomotion on two-dimensional (2D) surfaces.},
author = {Michele Weber and Michael Sixt},
journal = {EMBO Journal},
number = {17},
pages = {2861 -- 2863},
publisher = {Wiley-Blackwell},
title = {{MEK signalling tunes actin treadmilling for interstitial lymphocyte migration}},
doi = {10.1038/emboj.2010.183},
volume = {29},
year = {2010},
}
@article{4157,
abstract = {Integrin- and cadherin-mediated adhesion is central for cell and tissue morphogenesis, allowing cells and tissues to change shape without loosing integrity. Studies predominantly in cell culture showed that mechanosensation through adhesion structures is achieved by force-mediated modulation of their molecular composition. The specific molecular composition of adhesion sites in turn determines their signalling activity and dynamic reorganization. Here, we will review how adhesion sites respond to mecanical stimuli, and how spatially and temporally regulated signalling from different adhesion sites controls cell migration and tissue morphogenesis.},
author = {Papusheva, Ekaterina and Heisenberg, Carl-Philipp J},
journal = {EMBO Journal},
number = {16},
pages = {2753 -- 2768},
publisher = {Wiley-Blackwell},
title = {{Spatial organization of adhesion: force-dependent regulation and function in tissue morphogenesis}},
doi = {10.1038/emboj.2010.182},
volume = {29},
year = {2010},
}
@article{4243,
abstract = {We investigate a new model for populations evolving in a spatial continuum. This model can be thought of as a spatial version of the Lambda-Fleming-Viot process. It explicitly incorporates both small scale reproduction events and large scale extinction-recolonisation events. The lineages ancestral to a sample from a population evolving according to this model can be described in terms of a spatial version of the Lambda-coalescent. Using a technique of Evans (1997), we prove existence and uniqueness in law for the model. We then investigate the asymptotic behaviour of the genealogy of a finite number of individuals sampled uniformly at random (or more generally `far enough apart') from a two-dimensional torus of sidelength L as L tends to infinity. Under appropriate conditions (and on a suitable timescale) we can obtain as limiting genealogical processes a Kingman coalescent, a more general Lambda-coalescent or a system of coalescing Brownian motions (with a non-local coalescence mechanism).},
author = {Barton, Nicholas H and Etheridge, Alison and Véber, Amandine},
journal = {Electronic Journal of Probability},
number = {7},
pages = {162 -- 216},
publisher = {Institute of Mathematical Statistics},
title = {{A new model for evolution in a spatial continuum}},
doi = {10.1214/EJP.v15-741},
volume = {15},
year = {2010},
}
@inbook{4339,
abstract = {Mit diesem Buch möchten wir einen Überblick der aktuellen Diskussion zum Thema Bibliothek 2.0 geben und den Stand der tatsächlichen Umsetzung der Web 2.0-Ansätze in deutschsprachigen Bibliotheken beleuchten. An dieser Stelle ist die Frage erlaubt, warum es zu einer Zeit, in der es bereits die ersten "Web 3.0"- Konferenzen gibt, eines Handbuches der Bibliothek 2.0 noch bedarf. Und warum es überhaupt ein deutschsprachiges Handbuch zur Bibliothek 2.0 braucht, wo es doch bereits verschiedenste Publikationen zu diesem Thema aus anderen Ländern, insbesondere des angloamerikanischen Raums gibt. Ist dazu nicht bereits alles gesagt?},
author = {Bergmann, Julia and Danowski, Patrick},
booktitle = {Handbuch Bibliothek 2.0},
editor = {Bergmann, Julia and Danowski, Patrick},
pages = {5 -- 20},
publisher = {De Gruyter},
title = {{Ist Bibliothek 2.0 überhaupt noch relevant? – Eine Einleitung in das Handbuch}},
doi = {10.1515/9783110232103},
year = {2010},
}
@misc{4340,
abstract = {More and more libraries starting semantic web projects. The question about the license of the data
is not discussed or the discussion is deferred to the end of project. in this paper is discussed why
the question of the license is so important in context of the semantic web that is should be one of the
first aspects in a semantic web project. Also it will be shown why a public domain weaver is the
only solution that fulfill the the special requirements of the semantic web and that guaranties the
reuseablitly of semantic library data for a sustainability of the projects. },
author = {Danowski, Patrick},
booktitle = {European Library Automation Group (ELAG) 2010},
publisher = {Elsevier},
title = {{Open bibliographic data}},
year = {2010},
}
@book{4346,
abstract = {With the term "Library 2.0" the editors mean an institution which applies the principles of the Web 2.0 such as openness, re-use, collaboration and interaction in the entire organization. Libraries are extending their service offerings and work processes to include the potential of Web 2.0 technologies. This changes the job description and self-image of librarians. The collective volume offers a complete overview of the topic Library 2.0 and the current state of developments from a technological, sociological, information theoretical and practice-oriented perspective.},
author = {Danowski, Patrick and Bergmann, Julia},
publisher = {De Gruyter},
title = {{Handbuch Bibliothek 2.0}},
year = {2010},
}
@inproceedings{4369,
abstract = {In this paper we propose a novel technique for constructing timed automata from properties expressed in the logic mtl, under bounded-variability assumptions. We handle full mtl and include all future operators. Our construction is based on separation of the continuous time monitoring of the input sequence and discrete predictions regarding the future. The separation of the continuous from the discrete allows us to determinize our automata in an exponential construction that does not increase the number of clocks. This leads to a doubly exponential construction from mtl to deterministic timed automata, compared with triply exponential using existing approaches. We offer an alternative to the existing approach to linear real-time model checking, which has never been implemented. It further offers a unified framework for model checking, runtime monitoring, and synthesis, in an approach that can reuse tools, implementations, and insights from the discrete setting.},
author = {Nickovic, Dejan and Piterman, Nir},
editor = {Henzinger, Thomas A. and Chatterjee, Krishnendu},
location = {Klosterneuburg, Austria},
pages = {152 -- 167},
publisher = {Springer},
title = {{From MTL to deterministic timed automata}},
doi = {10.1007/978-3-642-15297-9_13},
volume = {6246},
year = {2010},
}
@inproceedings{4378,
abstract = {Techniques such as verification condition generation, predicate abstraction, and expressive type systems reduce software verification to proving formulas in expressive logics. Programs and their specifications often make use of data structures such as sets, multisets, algebraic data types, or graphs. Consequently, formulas generated from verification also involve such data structures. To automate the proofs of such formulas we propose a logic (a “calculus”) of such data structures. We build the calculus by starting from decidable logics of individual data structures, and connecting them through functions and sets, in ways that go beyond the frameworks such as Nelson-Oppen. The result are new decidable logics that can simultaneously specify properties of different kinds of data structures and overcome the limitations of the individual logics. Several of our decidable logics include abstraction functions that map a data structure into its more abstract view (a tree into a multiset, a multiset into a set), into a numerical quantity (the size or the height), or into the truth value of a candidate data structure invariant (sortedness, or the heap property). For algebraic data types, we identify an asymptotic many-to-one condition on the abstraction function that guarantees the existence of a decision procedure. In addition to the combination based on abstraction functions, we can combine multiple data structure theories if they all reduce to the same data structure logic. As an instance of this approach, we describe a decidable logic whose formulas are propositional combinations of formulas in: weak monadic second-order logic of two successors, two-variable logic with counting, multiset algebra with Presburger arithmetic, the Bernays-Schönfinkel-Ramsey class of first-order logic, and the logic of algebraic data types with the set content function. The subformulas in this combination can share common variables that refer to sets of objects along with the common set algebra operations. Such sound and complete combination is possible because the relations on sets definable in the component logics are all expressible in Boolean Algebra with Presburger Arithmetic. Presburger arithmetic and its new extensions play an important role in our decidability results. In several cases, when we combine logics that belong to NP, we can prove the satisfiability for the combined logic is still in NP.},
author = {Kuncak, Viktor and Piskac, Ruzica and Suter, Philippe and Wies, Thomas},
editor = {Barthe, Gilles and Hermenegildo, Manuel},
location = {Madrid, Spain},
pages = {26 -- 44},
publisher = {Springer},
title = {{Building a calculus of data structures}},
doi = {10.1007/978-3-642-11319-2_6},
volume = {5944},
year = {2010},
}
@article{4379,
abstract = {The formal specification component of verification can be exported to simulation through the idea of property checkers. The essence of this approach is the automatic construction of an observer from the specification in the form of a program that can be interfaced with a simulator and alert the user if the property is violated by a simulation trace. Although not complete, this lighter approach to formal verification has been effectively used in software and digital hardware to detect errors. Recently, the idea of property checkers has been extended to analog and mixed-signal systems.
In this paper, we apply the property-based checking methodology to an industrial and realistic example of a DDR2 memory interface. The properties describing the DDR2 analog behavior are expressed in the formal specification language stl/psl in form of assertions. The simulation traces generated from an actual DDR2 interface design are checked with respect to the stl/psl assertions using the amt tool. The focus of this paper is on the translation of the official (informal and descriptive) specification of two non-trivial DDR2 properties into stl/psl assertions. We study both the benefits and the current limits of such approach.
},
author = {Jones, Kevin D and Konrad,Victor and Dejan Nickovic},
journal = {Formal Methods in System Design},
number = {2},
pages = {114 -- 130},
publisher = {Springer},
title = {{Analog property checkers: a DDR2 case study}},
doi = {10.1007/s10703-009-0085-x},
volume = {36},
year = {2010},
}
@inproceedings{4380,
abstract = {Cloud computing is an emerging paradigm aimed to offer users pay-per-use computing resources, while leaving the burden of managing the computing infrastructure to the cloud provider. We present a new programming and pricing model that gives the cloud user the flexibility of trading execution speed and price on a per-job basis. We discuss the scheduling and resource management challenges for the cloud provider that arise in the implementation of this model. We argue that techniques from real-time and embedded software can be useful in this context.},
author = {Henzinger, Thomas A and Tomar, Anmol and Singh, Vasu and Wies, Thomas and Zufferey, Damien},
location = {Arizona, USA},
pages = {1 -- 8},
publisher = {ACM},
title = {{A marketplace for cloud resources}},
doi = {10.1145/1879021.1879022},
year = {2010},
}
@inproceedings{4381,
abstract = {Cloud computing aims to give users virtually unlimited pay-per-use computing resources without the burden of managing the underlying infrastructure. We claim that, in order to realize the full potential of cloud computing, the user must be presented with a pricing model that offers flexibility at the requirements level, such as a choice between different degrees of execution speed and the cloud provider must be presented with a programming model that offers flexibility at the execution level, such as a choice between different scheduling policies. In such a flexible framework, with each job, the user purchases a virtual computer with the desired speed and cost characteristics, and the cloud provider can optimize the utilization of resources across a stream of jobs from different users. We designed a flexible framework to test our hypothesis, which is called FlexPRICE (Flexible Provisioning of Resources in a Cloud Environment) and works as follows. A user presents a job to the cloud. The cloud finds different schedules to execute the job and presents a set of quotes to the user in terms of price and duration for the execution. The user then chooses a particular quote and the cloud is obliged to execute the job according to the chosen quote. FlexPRICE thus hides the complexity of the actual scheduling decisions from the user, but still provides enough flexibility to meet the users actual demands. We implemented FlexPRICE in a simulator called PRICES that allows us to experiment with our framework. We observe that FlexPRICE provides a wide range of execution options-from fast and expensive to slow and cheap-- for the whole spectrum of data-intensive and computation-intensive jobs. We also observe that the set of quotes computed by FlexPRICE do not vary as the number of simultaneous jobs increases.},
author = {Henzinger, Thomas A and Tomar, Anmol and Singh, Vasu and Wies, Thomas and Zufferey, Damien},
location = {Miami, USA},
pages = {83 -- 90},
publisher = {IEEE},
title = {{FlexPRICE: Flexible provisioning of resources in a cloud environment}},
doi = {10.1109/CLOUD.2010.71},
year = {2010},
}
@inproceedings{4382,
abstract = {Transactional memory (TM) has shown potential to simplify the task of writing concurrent programs. Inspired by classical work on databases, formal definitions of the semantics of TM executions have been proposed. Many of these definitions assumed that accesses to shared data are solely performed through transactions. In practice, due to legacy code and concurrency libraries, transactions in a TM have to share data with non-transactional operations. The semantics of such interaction, while widely discussed by practitioners, lacks a clear formal specification. Those interactions can vary, sometimes in subtle ways, between TM implementations and underlying memory models. We propose a correctness condition for TMs, parametrized opacity, to formally capture the now folklore notion of strong atomicity by stipulating the two following intuitive requirements: first, every transaction appears as if it is executed instantaneously with respect to other transactions and non-transactional operations, and second, non-transactional operations conform to the given underlying memory model. We investigate the inherent cost of implementing parametrized opacity. We first prove that parametrized opacity requires either instrumenting non-transactional operations (for most memory models) or writing to memory by transactions using potentially expensive read-modify-write instructions (such as compare-and-swap). Then, we show that for a class of practical relaxed memory models, parametrized opacity can indeed be implemented with constant-time instrumentation of non-transactional writes and no instrumentation of non-transactional reads. We show that, in practice, parametrizing the notion of correctness allows developing more efficient TM implementations.},
author = {Guerraoui, Rachid and Henzinger, Thomas A and Kapalka, Michal and Singh, Vasu},
location = {Santorini, Greece},
pages = {263 -- 272},
publisher = {ACM},
title = {{Transactions in the jungle}},
doi = {10.1145/1810479.1810529},
year = {2010},
}
@inproceedings{4388,
abstract = {GIST is a tool that (a) solves the qualitative analysis problem of turn-based probabilistic games with ω-regular objectives; and (b) synthesizes reasonable environment assumptions for synthesis of unrealizable specifications. Our tool provides the first and efficient implementations of several reduction-based techniques to solve turn-based probabilistic games, and uses the analysis of turn-based probabilistic games for synthesizing environment assumptions for unrealizable specifications.},
author = {Chatterjee, Krishnendu and Henzinger, Thomas A and Jobstmann, Barbara and Radhakrishna, Arjun},
location = {Edinburgh, UK},
pages = {665 -- 669},
publisher = {Springer},
title = {{GIST: A solver for probabilistic games}},
doi = {10.1007/978-3-642-14295-6_57},
volume = {6174},
year = {2010},
}
@inproceedings{4389,
abstract = {Digital components play a central role in the design of complex embedded systems. These components are interconnected with other, possibly analog, devices and the physical environment. This environment cannot be entirely captured and can provide inaccurate input data to the component. It is thus important for digital components to have a robust behavior, i.e. the presence of a small change in the input sequences should not result in a drastic change in the output sequences. In this paper, we study a notion of robustness for sequential circuits. However, since sequential circuits may have parts that are naturally discontinuous (e.g., digital controllers with switching behavior), we need a flexible framework that accommodates this fact and leaves discontinuous parts of the circuit out from the robustness analysis. As a consequence, we consider sequential circuits that have their input variables partitioned into two disjoint sets: control and disturbance variables. Our contributions are (1) a definition of robustness for sequential circuits as a form of continuity with respect to disturbance variables, (2) the characterization of the exact class of sequential circuits that are robust according to our definition, (3) an algorithm to decide whether a sequential circuit is robust or not.},
author = {Doyen, Laurent and Henzinger, Thomas A and Legay, Axel and Nickovic, Dejan},
pages = {77 -- 84},
publisher = {IEEE},
title = {{Robustness of sequential circuits}},
doi = {10.1109/ACSD.2010.26},
year = {2010},
}
@inproceedings{4390,
abstract = {Concurrent data structures with fine-grained synchronization are notoriously difficult to implement correctly. The difficulty of reasoning about these implementations does not stem from the number of variables or the program size, but rather from the large number of possible interleavings. These implementations are therefore prime candidates for model checking. We introduce an algorithm for verifying linearizability of singly-linked heap-based concurrent data structures. We consider a model consisting of an unbounded heap where each vertex stores an element from an unbounded data domain, with a restricted set of operations for testing and updating pointers and data elements. Our main result is that linearizability is decidable for programs that invoke a fixed number of methods, possibly in parallel. This decidable fragment covers many of the common implementation techniques — fine-grained locking, lazy synchronization, and lock-free synchronization. We also show how the technique can be used to verify optimistic implementations with the help of programmer annotations. We developed a verification tool CoLT and evaluated it on a representative sample of Java implementations of the concurrent set data structure. The tool verified linearizability of a number of implementations, found a known error in a lock-free implementation and proved that the corrected version is linearizable.},
author = {Cerny, Pavol and Radhakrishna, Arjun and Zufferey, Damien and Chaudhuri, Swarat and Alur, Rajeev},
location = {Edinburgh, UK},
pages = {465 -- 479},
publisher = {Springer},
title = {{Model checking of linearizability of concurrent list implementations}},
doi = {10.1007/978-3-642-14295-6_41},
volume = {6174},
year = {2010},
}
@inproceedings{4393,
abstract = {Boolean notions of correctness are formalized by preorders on systems. Quantitative measures of correctness can be formalized by real-valued distance functions between systems, where the distance between implementation and specification provides a measure of “fit” or “desirability.” We extend the simulation preorder to the quantitative setting, by making each player of a simulation game pay a certain price for her choices. We use the resulting games with quantitative objectives to define three different simulation distances. The correctness distance measures how much the specification must be changed in order to be satisfied by the implementation. The coverage distance measures how much the implementation restricts the degrees of freedom offered by the specification. The robustness distance measures how much a system can deviate from the implementation description without violating the specification. We consider these distances for safety as well as liveness specifications. The distances can be computed in polynomial time for safety specifications, and for liveness specifications given by weak fairness constraints. We show that the distance functions satisfy the triangle inequality, that the distance between two systems does not increase under parallel composition with a third system, and that the distance between two systems can be bounded from above and below by distances between abstractions of the two systems. These properties suggest that our simulation distances provide an appropriate basis for a quantitative theory of discrete systems. We also demonstrate how the robustness distance can be used to measure how many transmission errors are tolerated by error correcting codes.},
author = {Cerny, Pavol and Henzinger, Thomas A and Radhakrishna, Arjun},
location = {Paris, France},
pages = {235 -- 268},
publisher = {Schloss Dagstuhl - Leibniz-Zentrum für Informatik},
title = {{Simulation distances}},
doi = {10.1007/978-3-642-15375-4_18},
volume = {6269},
year = {2010},
}
@inproceedings{4396,
abstract = {Shape analysis is a promising technique to prove program properties about recursive data structures. The challenge is to automatically determine the data-structure type, and to supply the shape analysis with the necessary information about the data structure. We present a stepwise approach to the selection of instrumentation predicates for a TVLA-based shape analysis, which takes us a step closer towards the fully automatic verification of data structures. The approach uses two techniques to guide the refinement of shape abstractions: (1) during program exploration, an explicit heap analysis collects sample instances of the heap structures, which are used to identify the data structures that are manipulated by the program; and (2) during abstraction refinement along an infeasible error path, we consider different possible heap abstractions and choose the coarsest one that eliminates the infeasible path. We have implemented this combined approach for automatic shape refinement as an extension of the software model checker BLAST. Example programs from a data-structure library that manipulate doubly-linked lists and trees were successfully verified by our tool.},
author = {Beyer, Dirk and Henzinger, Thomas A and Théoduloz, Grégory and Zufferey, Damien},
editor = {Rosenblum, David and Taenzer, Gabriele},
location = {Paphos, Cyprus},
pages = {263 -- 277},
publisher = {Springer},
title = {{Shape refinement through explicit heap analysis}},
doi = {10.1007/978-3-642-12029-9_19},
volume = {6013},
year = {2010},
}
@inproceedings{2980,
abstract = {Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic
building blocks of many practical cryptographic applications such as
identification schemes, group signatures, and secure multi-party
computation (SMPC). Currently, first applications that essentially
rely on ZK-PoKs are being deployed in the real world. The most
prominent example is the Direct Anonymous Attestation (DAA)
protocol, which was adopted by the Trusted Computing Group (TCG)
and implemented as one of the functionalities of the cryptographic
chip Trusted Platform Module (TPM).
Implementing systems using ZK-PoK turns out to be challenging,
since ZK-PoK are significantly more complex than standard crypto
primitives (e.g., encryption and signature schemes). As a result,
the design-implementation cycles of ZK-PoK are time-consuming
and error-prone.
To overcome this, we present a compiler with corresponding languages
for the automatic generation of sound and efficient ZK-PoK based on
Σ-protocols. The protocol designer using our compiler formulates
the goal of a ZK-PoK proof in a high-level protocol specification language,
which abstracts away unnecessary technicalities from the designer. The
compiler then automatically generates the protocol implementation in
Java code; alternatively, the compiler can output a description of the
protocol in LaTeX which can be used for documentation or verification.},
author = {Bangerter, Endre and Briner, Thomas and Henecka, Wilko and Stephan Krenn and Sadeghi, Ahmad-Reza and Schneider, Thomas},
editor = {Martinelli, Fabio and Preneel, Bart},
pages = {67 -- 82},
publisher = {Springer},
title = {{Automatic Generation of Sigma-Protocols}},
doi = {10.1007/978-3-642-16441-5},
volume = {6391},
year = {2010},
}
@article{3072,
abstract = {Development of plants and their adaptive capacity towards ever‐changing environmental conditions largely depend on the spatial distribution of the plant hormone auxin. At the cellular level, various internal and external signals are translated into specific changes in the polar, subcellular localization of auxin transporters from the PIN family thereby directing and redirecting the intercellular fluxes of auxin. The current model of polar targeting of PIN proteins towards different plasma membrane domains encompasses apolar secretion of newly synthesized PINs followed by endocytosis and recycling back to the plasma membrane in a polarized manner. In this review, we follow the subcellular march of the PINs and highlight the cellular and molecular mechanisms behind polar foraging and subcellular trafficking pathways. Also, the entry points for different signals and regulations including by auxin itself will be discussed within the context of morphological and developmental consequences of polar targeting and subcellular trafficking.},
author = {Grunewald, Wim and Friml, Jirí},
journal = {EMBO Journal},
number = {16},
pages = {2700 -- 2714},
publisher = {Wiley-Blackwell},
title = {{The march of the PINs: Developmental plasticity by dynamic polar targeting in plant cells}},
doi = {10.1038/emboj.2010.181},
volume = {29},
year = {2010},
}
@article{3077,
author = {Friml, Jirí and Jones, Angharad},
journal = {Plant Physiology},
number = {2},
pages = {458 -- 462},
publisher = {American Society of Plant Biologists},
title = {{Endoplasmic reticulum: The rising compartment in auxin biology}},
doi = {10.1104/pp.110.161380},
volume = {154},
year = {2010},
}
@article{3303,
abstract = {Biological traits result in part from interactions between different genetic loci. This can lead to sign epistasis, in which a beneficial adaptation involves a combination of individually deleterious or neutral mutations; in this case, a population must cross a “fitness valley” to adapt. Recombination can assist this process by combining mutations from different individuals or retard it by breaking up the adaptive combination. Here, we analyze the simplest fitness valley, in which an adaptation requires one mutation at each of two loci to provide a fitness benefit. We present a theoretical analysis of the effect of recombination on the valley-crossing process across the full spectrum of possible parameter regimes. We find that low recombination rates can speed up valley crossing relative to the asexual case, while higher recombination rates slow down valley crossing, with the transition between the two regimes occurring when the recombination rate between the loci is approximately equal to the selective advantage provided by the adaptation. In large populations, if the recombination rate is high and selection against single mutants is substantial, the time to cross the valley grows exponentially with population size, effectively meaning that the population cannot acquire the adaptation. Recombination at the optimal (low) rate can reduce the valley-crossing time by up to several orders of magnitude relative to that in an asexual population. },
author = {Weissman, Daniel and Feldman, Marcus and Fisher, Daniel},
journal = {Genetics},
number = {4},
pages = {1389 -- 1410},
publisher = {Genetics Society of America},
title = {{The rate of fitness-valley crossing in sexual populations}},
doi = {10.1534/genetics.110.123240},
volume = {186},
year = {2010},
}
@article{3306,
abstract = {We use methods from combinatorics and algebraic statistics to study analogues of birth-and-death processes that have as their state space a finite subset of the m-dimensional lattice and for which the m matrices that record the transition probabilities in each of the lattice directions commute pairwise. One reason such processes are of interest is that the transition matrix is straightforward to diagonalize, and hence it is easy to compute n step transition probabilities. The set of commuting birth-and-death processes decomposes as a union of toric varieties, with the main component being the closure of all processes whose nearest neighbor transition probabilities are positive. We exhibit an explicit monomial parametrization for this main component, and we explore the boundary components using primary decomposition.},
author = {Evans, Steven N and Sturmfels, Bernd and Caroline Uhler},
journal = {The Annals of Applied Probability},
pages = {238 -- 266},
publisher = {Institute of Mathematical Statistics},
title = {{Commuting birth and death processes}},
doi = {10.1214/09-AAP615},
volume = {20},
year = {2010},
}
@article{3308,
abstract = {We study multivariate normal models that are described by linear constraints on the inverse of the covariance matrix. Maximum likelihood estimation for such models leads to the problem of maximizing the determinant function over a spectrahedron, and to the problem of characterizing the image of the positive definite cone under an arbitrary linear projection. These problems at the interface of statistics and optimization are here examined from the perspective of convex algebraic geometry.},
author = {Sturmfels, Bernd and Caroline Uhler},
journal = {Annals of the Institute of Statistical Mathematics},
number = {4},
pages = {603 -- 638},
publisher = {Springer},
title = {{Multivariate Gaussians, semidefinite matrix completion, and convex algebraic geometry}},
doi = {10.1007/s10463-010-0295-4},
volume = {62},
year = {2010},
}
@inproceedings{3430,
abstract = {These are notes for a set of 7 two-hour lectures given at the 2010 Summer School on Quantitative Evolutionary and Comparative Genomics at OIST, Okinawa, Japan. The emphasis is on understanding how biological systems process information. We take a physicist's approach of looking for simple phenomenological descriptions that can address the questions of biological function without necessarily modeling all (mostly unknown) microscopic details; the example that is developed throughout the notes is transcriptional regulation in genetic regulatory networks. We present tools from information theory and statistical physics that can be used to analyze noisy nonlinear biological networks, and build generative and predictive models of regulatory processes.},
author = {Gasper Tkacik},
publisher = {Elsevier},
title = {{Lecture notes for 2010 summer school on Quantitative Evolutionary and Comparative Genomics}},
year = {2010},
}
@article{3538,
abstract = {How seizures start is a major question in epilepsy research. Preictal EEG changes occur in both human patients and animal models, but their underlying mechanisms and relationship with seizure initiation remain unknown. Here we demonstrate the existence, in the hippocampal CA1 region, of a preictal state characterized by the progressive and global increase in neuronal activity associated with a widespread buildup of low-amplitude high-frequency activity (HFA) (> 100 Hz) and reduction in system complexity. HFA is generated by the firing of neurons, mainly pyramidal cells, at much lower frequencies. Individual cycles of HFA are generated by the near-synchronous (within similar to 5 ms) firing of small numbers of pyramidal cells. The presence of HFA in the low-calcium model implicates nonsynaptic synchronization; the presence of very similar HFA in the high-potassium model shows that it does not depend on an absence of synaptic transmission. Immediately before seizure onset, CA1 is in a state of high sensitivity in which weak depolarizing or synchronizing perturbations can trigger seizures. Transition to seizure is characterized by a rapid expansion and fusion of the neuronal populations responsible for HFA, associated with a progressive slowing of HFA, leading to a single, massive, hypersynchronous cluster generating the high-amplitude low-frequency activity of the seizure.},
author = {Jiruska, Premysl and Csicsvari, Jozsef L and Powell, Andrew and Fox, John and Chang, Wei and Vreugdenhil, Martin and Li, Xiaoli and Palus, Milan and Bujan, Alejandro and Dearden, Richard and Jefferys, John},
journal = {Journal of Neuroscience},
number = {16},
pages = {5690 -- 5701},
publisher = {Society for Neuroscience},
title = {{High-frequency network activity, global increase in neuronal activity, and synchrony expansion precede epileptic seizures in vitro}},
doi = {10.1523/JNEUROSCI.0535-10.2010},
volume = {30},
year = {2010},
}
@inproceedings{4361,
abstract = {Depth-bounded processes form the most expressive known fragment of the π-calculus for which interesting verification problems are still decidable. In this paper we develop an adequate domain of limits for the well-structured transition systems that are induced by depth-bounded processes. An immediate consequence of our result is that there exists a forward algorithm that decides the covering problem for this class. Unlike backward algorithms, the forward algorithm terminates even if the depth of the process is not known a priori. More importantly, our result suggests a whole spectrum of forward algorithms that enable the effective verification of a large class of mobile systems.},
author = {Wies, Thomas and Zufferey, Damien and Henzinger, Thomas A},
editor = {Ong, Luke},
location = {Paphos, Cyprus},
pages = {94 -- 108},
publisher = {Springer},
title = {{Forward analysis of depth-bounded processes}},
doi = {10.1007/978-3-642-12032-9_8},
volume = {6014},
year = {2010},
}
@article{9485,
abstract = {Cytosine methylation silences transposable elements in plants, vertebrates, and fungi but also regulates gene expression. Plant methylation is catalyzed by three families of enzymes, each with a preferred sequence context: CG, CHG (H = A, C, or T), and CHH, with CHH methylation targeted by the RNAi pathway. Arabidopsis thaliana endosperm, a placenta-like tissue that nourishes the embryo, is globally hypomethylated in the CG context while retaining high non-CG methylation. Global methylation dynamics in seeds of cereal crops that provide the bulk of human nutrition remain unknown. Here, we show that rice endosperm DNA is hypomethylated in all sequence contexts. Non-CG methylation is reduced evenly across the genome, whereas CG hypomethylation is localized. CHH methylation of small transposable elements is increased in embryos, suggesting that endosperm demethylation enhances transposon silencing. Genes preferentially expressed in endosperm, including those coding for major storage proteins and starch synthesizing enzymes, are frequently hypomethylated in endosperm, indicating that DNA methylation is a crucial regulator of rice endosperm biogenesis. Our data show that genome-wide reshaping of seed DNA methylation is conserved among angiosperms and has a profound effect on gene expression in cereal crops.},
author = {Zemach, Assaf and Kim, M. Yvonne and Silva, Pedro and Rodrigues, Jessica A. and Dotson, Bradley and Brooks, Matthew D. and ZILBERMAN, Daniel},
issn = {1091-6490},
journal = {Proceedings of the National Academy of Sciences},
number = {43},
pages = {18729--18734},
publisher = {National Academy of Sciences},
title = {{Local DNA hypomethylation activates genes in rice endosperm}},
doi = {10.1073/pnas.1009695107},
volume = {107},
year = {2010},
}
@article{9489,
abstract = {Cytosine methylation is an ancient process with conserved enzymology but diverse biological functions that include defense against transposable elements and regulation of gene expression. Here we will discuss the evolution and biological significance of eukaryotic DNA methylation, the likely drivers of that evolution, and major remaining mysteries.},
author = {Zemach, Assaf and ZILBERMAN, Daniel},
issn = {1879-0445},
journal = {Current Biology},
number = {17},
pages = {R780--R785},
publisher = {Elsevier},
title = {{Evolution of eukaryotic DNA methylation and the pursuit of safer sex}},
doi = {10.1016/j.cub.2010.07.007},
volume = {20},
year = {2010},
}
@article{228,
abstract = {Let X be a projective non-singular quartic hypersurface of dimension 39 or more, which is defined over . We show that X() is non-empty provided that X() is non-empty and X has p-adic points for every prime p.},
author = {Timothy Browning and Heath-Brown, Roger},
journal = {Journal fur die Reine und Angewandte Mathematik},
number = {629},
pages = {37 -- 88},
publisher = {Walter de Gruyter},
title = {{Rational points on quartic hypersurfaces}},
doi = {10.1515/CRELLE.2009.026},
year = {2009},
}
@article{229,
abstract = {An upper bound of the expected order of magnitude is established for the number of ℚ-rational points of bounded height on Châtelet surfaces defined over ℚ.},
author = {Timothy Browning},
journal = {Mathematische Annalen},
number = {1},
pages = {41 -- 50},
publisher = {Springer Nature},
title = {{Linear growth for Châtelet surfaces}},
doi = {10.1007/s00208-009-0383-z},
volume = {346},
year = {2009},
}
@article{2384,
abstract = {We prove the Lee-Huang-Yang formula for the ground state energy of the 3D Bose gas with repulsive interactions described by the exponential function, in a simultaneous limit of weak coupling and high density. In particular, we show that the Bogoliubov approximation is exact in an appropriate parameter regime, as far as the ground state energy is concerned.},
author = {Giuliani, Alessandro and Robert Seiringer},
journal = {Journal of Statistical Physics},
number = {5-6},
pages = {915 -- 934},
publisher = {Springer},
title = {{The ground state energy of the weakly interacting Bose gas at high density}},
doi = {10.1007/s10955-009-9718-0},
volume = {135},
year = {2009},
}
@article{2385,
abstract = {We consider an ultracold rotating Bose gas in a harmonic trap close to the critical angular velocity, so that the system can be considered to be confined to the lowest Landau level. With this assumption we prove that the Gross-Pitaevskii energy functional accurately describes the ground-state energy of the corresponding N -body Hamiltonian with contact interaction provided the total angular momentum L is much less than N2. While the Gross-Pitaevskii energy is always an obvious variational upper bound to the ground-state energy, a more refined analysis is needed to establish it as an exact lower bound. We also discuss the question of Bose-Einstein condensation in the parameter range considered. Coherent states together with inequalities in spaces of analytic functions are the main technical tools.},
author = {Lieb, Élliott H and Robert Seiringer and Yngvason, Jakob},
journal = {Physical Review A - Atomic, Molecular, and Optical Physics},
number = {6},
publisher = {American Physical Society},
title = {{Yrast line of a rapidly rotating Bose gas: Gross-Pitaevskii regime}},
doi = {10.1103/PhysRevA.79.063626},
volume = {79},
year = {2009},
}
@article{2386,
abstract = {We prove exponential decay of the off-diagonal correlation function in the two-dimensional homogeneous Bose gas when a2 ρ is small and the temperature T satisfies T> 4πρ ln | ln (a2 ρ) |. Here, a is the scattering length of the repulsive interaction potential and ρ is the density. To the leading order in a2 ρ, this bound agrees with the expected critical temperature for superfluidity. In the three-dimensional Bose gas, exponential decay is proved when T- Tc (0) Tc (0) >5 a ρ1/3, where Tc (0) is the critical temperature of the ideal gas. While this condition is not expected to be sharp, it gives a rigorous upper bound on the critical temperature for Bose-Einstein condensation.},
author = {Robert Seiringer and Ueltschi, Daniel},
journal = {Physical Review B - Condensed Matter and Materials Physics},
number = {1},
publisher = {American Physical Society},
title = {{Rigorous upper bound on the critical temperature of dilute Bose gases}},
doi = {10.1103/PhysRevB.80.014502},
volume = {80},
year = {2009},
}
@article{2387,
abstract = {We consider a system of trapped spinless bosons interacting with a repulsive potential and subject to rotation. In the limit of rapid rotation and small scattering length, we rigorously show that the ground state energy converges to that of a simplified model Hamiltonian with contact interaction projected onto the Lowest Landau Level. This effective Hamiltonian models the bosonic analogue of the Fractional Quantum Hall Effect (FQHE). For a fixed number of particles, we also prove convergence of states; in particular, in a certain regime we show convergence towards the bosonic Laughlin wavefunction. This is the first rigorous justification of the effective FQHE Hamiltonian for rapidly rotating Bose gases. We review previous results on this effective Hamiltonian and outline open problems.},
author = {Lewin, Mathieu and Robert Seiringer},
journal = {Journal of Statistical Physics},
number = {5},
pages = {1040 -- 1062},
publisher = {Springer},
title = {{Strongly correlated phases in rapidly rotating Bose gases}},
doi = {10.1007/s10955-009-9833-y},
volume = {137},
year = {2009},
}
@article{2388,
abstract = {This paper provides self-contained proof of a theorem relating probabilistic coherence of forecasts to their non-domination by rival forecasts with respect to any proper scoring rule. The theorem recapitulates insights achieved by other investigators, and clarifies the connection of coherence and proper scoring rules to Bregman divergence.},
author = {Predd, Joel B and Robert Seiringer and Lieb, Élliott H and Osherson, Daniel N and Poor, Harold V and Kulkarni, Sanjeev R},
journal = {IEEE Transactions on Information Theory},
number = {10},
pages = {4786 -- 4792},
publisher = {IEEE},
title = {{Probabilistic coherence and proper scoring rules}},
doi = {10.1109/TIT.2009.2027573},
volume = {55},
year = {2009},
}
@inproceedings{2433,
abstract = {Let EMBEDk→d be the following algorithmic problem: Given a finite simplicial complex K of dimension at most k, does there exist a (piecewise linear) embedding of K into ℝd? Known results easily imply polynomiality of EMBEDk→2 (k = 1, 2; the case k = 1, d = 2 is graph planarity) and of EMBEDk→2k for all k ≥ 3 (even if k is not considered fixed). We show that the celebrated result of Novikov on the algorithmic unsolvability of recognizing the 5-sphere implies that EMBED d→d and EMBED(d-1)→d are undecidable for each d ≥ 5. Our main result is NP-hardness of EMBED2→4 and, more generally, of EMBEDk→d for all k, d with d ≥ 4 and d ≥ k ≥ (2d - 2)/3.},
author = {Matoušek, Jiří and Martin Tancer and Uli Wagner},
pages = {855 -- 864},
publisher = {SIAM},
title = {{Hardness of embedding simplicial complexes in ℝd}},
year = {2009},
}
@article{2499,
abstract = {G protein-coupled receptors (GPCRs) have critical functions in intercellular communication. Although a wide range of different receptors have been identified in the same cells, the mechanism by which signals are integrated remains elusive. The ability of GPCRs to form dimers or larger hetero-oligomers is thought to generate such signal integration. We examined the molecular mechanisms responsible for the GABAB receptor-mediated potentiation of the mGlu receptor signalling reported in Purkinje neurons. We showed that this effect does not require a physical interaction between both receptors. Instead, it is the result of a more general mechanism in which the βγ subunits produced by the Gi-coupled GABAB receptor enhance the mGlu-mediated Gq response. Most importantly, this mechanism could be generally applied to other pairs of Gi- and Gq-coupled receptors and the signal integration varied depending on the time delay between activation of each receptor. Such a mechanism helps explain specific properties of cells expressing two different Gi- and Gq-coupled receptors activated by a single transmitter, or properties of GPCRs naturally coupled to both types of the G protein.},
author = {Rives, Marie L and Vol, Claire and Fukazawa, Yugo and Tinel, Norbert and Trinquet, Eric and Ayoub, Mohammed A and Ryuichi Shigemoto and Pin, Jean-Philippe and Prezèau, Laurent},
journal = {EMBO Journal},
number = {15},
pages = {2195 -- 2208},
publisher = {Wiley-Blackwell},
title = {{Crosstalk between GABAB and mGlu1a receptors reveals new insight into GPCR signal integration}},
doi = {10.1038/emboj.2009.177},
volume = {28},
year = {2009},
}
@article{8026,
abstract = {Recent theoretical work has provided a basic understanding of signal propagation in networks of spiking neurons, but mechanisms for gating and controlling these signals have not been investigated previously. Here we introduce an idea for the gating of multiple signals in cortical networks that combines principles of signal propagation with aspects of balanced networks. Specifically, we studied networks in which incoming excitatory signals are normally cancelled by locally evoked inhibition, leaving the targeted layer unresponsive. Transmission can be gated 'on' by modulating excitatory and inhibitory gains to upset this detailed balance. We illustrate gating through detailed balance in large networks of integrate-and-fire neurons. We show successful gating of multiple signals and study failure modes that produce effects reminiscent of clinically observed pathologies. Provided that the individual signals are detectable, detailed balance has a large capacity for gating multiple signals.},
author = {Vogels, Tim P and Abbott, L F},
issn = {1097-6256},
journal = {Nature Neuroscience},
number = {4},
pages = {483--491},
publisher = {Springer Nature},
title = {{Gating multiple signals through detailed balance of excitation and inhibition in spiking networks}},
doi = {10.1038/nn.2276},
volume = {12},
year = {2009},
}
@article{88,
abstract = {We have developed a tunable source of Mie scale microdroplet aerosols that can be used for the generation of energetic ions. To demonstrate this potential, a terawatt Ti: Al2 O3 laser focused to 2×10 19 W/cm2 was used to irradiate heavy water (D2 O) aerosols composed of micron-scale droplets. Energetic deuterium ions, which were generated in the laser-droplet interaction, produced deuterium-deuterium fusion with approximately 2×10^3 fusion neutrons measured per joule of incident laser energy. },
author = {Higginbotham, Andrew P and Semonin, Octavi and Bruce, S and Chan, C and Maindi, M and Donnelly, Tom and Maurer, M and Bang, Woosuk and Churina, I.V and Osterholz, Jens and Kim, I and Bernstein, Aaron and Ditmire, Todd},
journal = {Review of Scientific Instruments},
number = {6},
publisher = {American Institute of Physics},
title = {{Generation of Mie size microdroplet aerosols with applications in laser-driven fusion experiments}},
doi = {10.1063/1.3155302},
volume = {80},
year = {2009},
}
@article{1766,
abstract = {We demonstrate the time-resolved driving of two-photon blue sideband transitions between superconducting qubits and a transmission line resonator. As an example of using these sideband transitions for a two-qubit operation, we implement a pulse sequence that first entangles one qubit with the resonator and subsequently distributes the entanglement between two qubits. We show the generation of 75% fidelity Bell states by this method. The full density matrix of the two-qubit system is extracted using joint measurement and quantum state tomography and shows close agreement with numerical simulation.},
author = {Leek, Peter J and Filipp, Stefan and Maurer, Patrick and Baur, Matthias P and Bianchetti, R and Johannes Fink and Göppl, M and Steffen, L. Kraig and Wallraff, Andreas},
journal = {Physical Review B - Condensed Matter and Materials Physics},
number = {18},
publisher = {American Physical Society},
title = {{Using sideband transitions for two-qubit operations in superconducting circuits}},
doi = {10.1103/PhysRevB.79.180511},
volume = {79},
year = {2009},
}
@article{1767,
abstract = {We present spectroscopic measurements of the Autler-Townes doublet and the sidebands of the Mollow triplet in a driven superconducting qubit. The ground to first excited state transition of the qubit is strongly pumped while the resulting dressed qubit spectrum is probed with a weak tone. The corresponding transitions are detected using dispersive readout of the qubit coupled off resonantly to a microwave transmission line resonator. The observed frequencies of the Autler-Townes and Mollow spectral lines are in good agreement with a dispersive Jaynes-Cummings model taking into account higher excited qubit states and dispersive level shifts due to off-resonant drives.},
author = {Baur, Matthias P and Filipp, Stefan and Bianchetti, R and Johannes Fink and Göppl, M and Steffen, L. Kraig and Leek, Peter J and Blais, Alexandre and Wallraff, Andreas},
journal = {Physical Review Letters},
number = {24},
publisher = {American Physical Society},
title = {{Measurement of autler-townes and mollow transitions in a strongly driven superconducting qubit}},
doi = {10.1103/PhysRevLett.102.243602},
volume = {102},
year = {2009},
}
@article{1768,
abstract = {Quantum state tomography is an important tool in quantum information science for complete characterization of multiqubit states and their correlations. Here we report a method to perform a joint simultaneous readout of two superconducting qubits dispersively coupled to the same mode of a microwave transmission line resonator. The nonlinear dependence of the resonator transmission on the qubit state dependent cavity frequency allows us to extract the full two-qubit correlations without the need for single-shot readout of individual qubits. We employ standard tomographic techniques to reconstruct the density matrix of two-qubit quantum states.},
author = {Filipp, Stefan and Maurer, Patrick and Leek, Peter J and Baur, Matthias P and Bianchetti, R and Johannes Fink and Göppl, M and Steffen, L. Kraig and Gambetta, Jay M and Blais, Alexandre and Wallraff, Andreas},
journal = {Physical Review Letters},
number = {20},
publisher = {American Physical Society},
title = {{Two-qubit state tomography using a joint dispersive readout}},
doi = {10.1103/PhysRevLett.102.200402},
volume = {102},
year = {2009},
}