[{"page":"144","date_created":"2018-12-11T11:51:48Z","date_published":"2015-04-01T00:00:00Z","doi":"10.15479/at:ista:1401","year":"2015","has_accepted_license":"1","day":"01","oa":1,"publisher":"Institute of Science and Technology Austria","acknowledgement":"I would like to thank my supervisor, Christoph Lampert, for guidance throughout my studies and for patience in transforming me into a scientist, and my thesis committee, Chris Wojtan and Horst Bischof, for their help and advice. \r\n\r\nI would like to thank Elisabeth Hacker who perfectly assisted all my administrative needs and was always nice and friendly to me, and the campus team for making the IST Austria campus my second home. \r\nI was honored to collaborate with brilliant researchers and to learn from their experience. Undoubtedly, I learned most of all from Novi Quadrianto: brainstorming our projects and getting exciting results was the most enjoyable part of my work – thank you! I am also grateful to David Knowles, Zoubin Ghahramani, Daniel Hernández-Lobato, Kristian Kersting and Anastasia Pentina for the fantastic projects we worked on together, and to Kristen Grauman and Adriana Kovashka for the exceptional experience working with user studies. I would like to thank my colleagues at IST Austria and my office mates who shared their happy moods, scientific breakthroughs and thought-provoking conversations with me: Chao, Filip, Rustem, Asya, Sameh, Alex, Vlad, Mayu, Neel, Csaba, Thomas, Vladimir, Cristina, Alex Z., Avro, Amelie and Emilie, Andreas H. and Andreas E., Chris, Lena, Michael, Ali and Ipek, Vera, Igor, Katia. Special thanks to Morten for the countless games of table soccer we played together and the tournaments we teamed up for: we will definitely win next time:) A very warm hug to Asya for always being so inspiring and supportive to me, and for helping me to increase the proportion of female computer scientists in our group. ","article_processing_charge":"No","author":[{"first_name":"Viktoriia","id":"2EA6D09E-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-0192-9308","full_name":"Sharmanska, Viktoriia","last_name":"Sharmanska"}],"publist_id":"5806","title":"Learning with attributes for object recognition: Parametric and non-parametrics views","citation":{"apa":"Sharmanska, V. (2015). Learning with attributes for object recognition: Parametric and non-parametrics views. Institute of Science and Technology Austria. https://doi.org/10.15479/at:ista:1401","ama":"Sharmanska V. Learning with attributes for object recognition: Parametric and non-parametrics views. 2015. doi:10.15479/at:ista:1401","ieee":"V. Sharmanska, “Learning with attributes for object recognition: Parametric and non-parametrics views,” Institute of Science and Technology Austria, 2015.","short":"V. Sharmanska, Learning with Attributes for Object Recognition: Parametric and Non-Parametrics Views, Institute of Science and Technology Austria, 2015.","mla":"Sharmanska, Viktoriia. Learning with Attributes for Object Recognition: Parametric and Non-Parametrics Views. Institute of Science and Technology Austria, 2015, doi:10.15479/at:ista:1401.","ista":"Sharmanska V. 2015. Learning with attributes for object recognition: Parametric and non-parametrics views. Institute of Science and Technology Austria.","chicago":"Sharmanska, Viktoriia. “Learning with Attributes for Object Recognition: Parametric and Non-Parametrics Views.” Institute of Science and Technology Austria, 2015. https://doi.org/10.15479/at:ista:1401."},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","publication_status":"published","degree_awarded":"PhD","publication_identifier":{"issn":["2663-337X"]},"language":[{"iso":"eng"}],"file":[{"file_name":"2015_Thesis_Sharmanska.pdf","date_created":"2021-02-22T11:33:17Z","creator":"dernst","file_size":7964342,"date_updated":"2021-02-22T11:33:17Z","success":1,"checksum":"3605b402bb6934e09ae4cf672c84baf7","file_id":"9177","relation":"main_file","access_level":"open_access","content_type":"application/pdf"},{"file_size":7372241,"date_updated":"2021-11-17T13:47:24Z","creator":"cchlebak","file_name":"2015_Thesis_Sharmanska_pdfa.pdf","date_created":"2021-11-16T14:40:45Z","content_type":"application/pdf","relation":"main_file","access_level":"closed","checksum":"e37593b3ee75bf3180629df2d6ca8f4e","file_id":"10297"}],"main_file_link":[{"url":"http://users.sussex.ac.uk/~nq28/viktoriia/Thesis_Sharmanska.pdf"}],"alternative_title":["ISTA Thesis"],"month":"04","abstract":[{"lang":"eng","text":"The human ability to recognize objects in complex scenes has driven research in the computer vision field over couple of decades. This thesis focuses on the object recognition task in images. That is, given the image, we want the computer system to be able to predict the class of the object that appears in the image. A recent successful attempt to bridge semantic understanding of the image perceived by humans and by computers uses attribute-based models. Attributes are semantic properties of the objects shared across different categories, which humans and computers can decide on. To explore the attribute-based models we take a statistical machine learning approach, and address two key learning challenges in view of object recognition task: learning augmented attributes as mid-level discriminative feature representation, and learning with attributes as privileged information. Our main contributions are parametric and non-parametric models and algorithms to solve these frameworks. In the parametric approach, we explore an autoencoder model combined with the large margin nearest neighbor principle for mid-level feature learning, and linear support vector machines for learning with privileged information. In the non-parametric approach, we propose a supervised Indian Buffet Process for automatic augmentation of semantic attributes, and explore the Gaussian Processes classification framework for learning with privileged information. A thorough experimental analysis shows the effectiveness of the proposed models in both parametric and non-parametric views."}],"oa_version":"Published Version","file_date_updated":"2021-11-17T13:47:24Z","department":[{"_id":"ChLa"},{"_id":"GradSch"}],"date_updated":"2023-09-07T11:40:11Z","supervisor":[{"id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","first_name":"Christoph","last_name":"Lampert","orcid":"0000-0001-8622-7887","full_name":"Lampert, Christoph"}],"ddc":["000"],"type":"dissertation","status":"public","_id":"1401"},{"publisher":"Institute of Science and Technology Austria","alternative_title":["ISTA Thesis"],"month":"04","abstract":[{"text":"Cancer results from an uncontrolled growth of abnormal cells. Sequentially accumulated genetic and epigenetic alterations decrease cell death and increase cell replication. We used mathematical models to quantify the effect of driver gene mutations. The recently developed targeted therapies can lead to dramatic regressions. However, in solid cancers, clinical responses are often short-lived because resistant cancer cells evolve. We estimated that approximately 50 different mutations can confer resistance to a typical targeted therapeutic agent. We find that resistant cells are likely to be present in expanded subclones before the start of the treatment. The dominant strategy to prevent the evolution of resistance is combination therapy. Our analytical results suggest that in most patients, dual therapy, but not monotherapy, can result in long-term disease control. However, long-term control can only occur if there are no possible mutations in the genome that can cause cross-resistance to both drugs. Furthermore, we showed that simultaneous therapy with two drugs is much more likely to result in long-term disease control than sequential therapy with the same drugs. To improve our understanding of the underlying subclonal evolution we reconstruct the evolutionary history of a patient's cancer from next-generation sequencing data of spatially-distinct DNA samples. Using a quantitative measure of genetic relatedness, we found that pancreatic cancers and their metastases demonstrated a higher level of relatedness than that expected for any two cells randomly taken from a normal tissue. This minimal amount of genetic divergence among advanced lesions indicates that genetic heterogeneity, when quantitatively defined, is not a fundamental feature of the natural history of untreated pancreatic cancers. Our newly developed, phylogenomic tool Treeomics finds evidence for seeding patterns of metastases and can directly be used to discover rules governing the evolution of solid malignancies to transform cancer into a more predictable disease.","lang":"eng"}],"oa_version":"None","page":"183","date_published":"2015-04-01T00:00:00Z","related_material":{"record":[{"status":"public","id":"1709","relation":"part_of_dissertation"},{"id":"2000","status":"public","relation":"part_of_dissertation"},{"relation":"part_of_dissertation","id":"2247","status":"public"},{"relation":"part_of_dissertation","status":"public","id":"2816"},{"relation":"part_of_dissertation","id":"2858","status":"public"},{"status":"public","id":"3157","relation":"part_of_dissertation"},{"relation":"part_of_dissertation","status":"public","id":"3260"}]},"date_created":"2018-12-11T11:51:48Z","publication_identifier":{"issn":["2663-337X"]},"publication_status":"published","year":"2015","degree_awarded":"PhD","day":"01","language":[{"iso":"eng"}],"type":"dissertation","status":"public","_id":"1400","publist_id":"5807","author":[{"first_name":"Johannes","id":"4A918E98-F248-11E8-B48F-1D18A9856A87","last_name":"Reiter","orcid":"0000-0002-0170-7353","full_name":"Reiter, Johannes"}],"article_processing_charge":"No","department":[{"_id":"KrCh"}],"title":"The subclonal evolution of cancer","supervisor":[{"last_name":"Chatterjee","orcid":"0000-0002-4561-241X","full_name":"Chatterjee, Krishnendu","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"}],"date_updated":"2023-09-07T11:40:44Z","citation":{"ista":"Reiter J. 2015. The subclonal evolution of cancer. Institute of Science and Technology Austria.","chicago":"Reiter, Johannes. “The Subclonal Evolution of Cancer.” Institute of Science and Technology Austria, 2015.","ama":"Reiter J. The subclonal evolution of cancer. 2015.","apa":"Reiter, J. (2015). The subclonal evolution of cancer. Institute of Science and Technology Austria.","short":"J. Reiter, The Subclonal Evolution of Cancer, Institute of Science and Technology Austria, 2015.","ieee":"J. Reiter, “The subclonal evolution of cancer,” Institute of Science and Technology Austria, 2015.","mla":"Reiter, Johannes. The Subclonal Evolution of Cancer. Institute of Science and Technology Austria, 2015."},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1"},{"_id":"1399","type":"dissertation","status":"public","supervisor":[{"id":"3FB178DA-F248-11E8-B48F-1D18A9856A87","first_name":"Herbert","last_name":"Edelsbrunner","full_name":"Edelsbrunner, Herbert","orcid":"0000-0002-9823-6833"}],"date_updated":"2023-09-07T11:41:25Z","citation":{"short":"F. Pausinger, On the Approximation of Intrinsic Volumes, Institute of Science and Technology Austria, 2015.","ieee":"F. Pausinger, “On the approximation of intrinsic volumes,” Institute of Science and Technology Austria, 2015.","apa":"Pausinger, F. (2015). On the approximation of intrinsic volumes. Institute of Science and Technology Austria.","ama":"Pausinger F. On the approximation of intrinsic volumes. 2015.","mla":"Pausinger, Florian. On the Approximation of Intrinsic Volumes. Institute of Science and Technology Austria, 2015.","ista":"Pausinger F. 2015. On the approximation of intrinsic volumes. Institute of Science and Technology Austria.","chicago":"Pausinger, Florian. “On the Approximation of Intrinsic Volumes.” Institute of Science and Technology Austria, 2015."},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","publist_id":"5808","author":[{"id":"2A77D7A2-F248-11E8-B48F-1D18A9856A87","first_name":"Florian","last_name":"Pausinger","full_name":"Pausinger, Florian","orcid":"0000-0002-8379-3768"}],"article_processing_charge":"No","title":"On the approximation of intrinsic volumes","department":[{"_id":"HeEd"}],"abstract":[{"lang":"eng","text":"This thesis is concerned with the computation and approximation of intrinsic volumes. Given a smooth body M and a certain digital approximation of it, we develop algorithms to approximate various intrinsic volumes of M using only measurements taken from its digital approximations. The crucial idea behind our novel algorithms is to link the recent theory of persistent homology to the theory of intrinsic volumes via the Crofton formula from integral geometry and, in particular, via Euler characteristic computations. Our main contributions are a multigrid convergent digital algorithm to compute the first intrinsic volume of a solid body in R^n as well as an appropriate integration pipeline to approximate integral-geometric integrals defined over the Grassmannian manifold."}],"oa_version":"None","publisher":"Institute of Science and Technology Austria","alternative_title":["ISTA Thesis"],"month":"06","publication_identifier":{"issn":["2663-337X"]},"degree_awarded":"PhD","publication_status":"published","year":"2015","day":"01","language":[{"iso":"eng"}],"page":"144","date_published":"2015-06-01T00:00:00Z","related_material":{"record":[{"status":"public","id":"1662","relation":"part_of_dissertation"},{"status":"public","id":"1792","relation":"part_of_dissertation"},{"relation":"part_of_dissertation","id":"2255","status":"public"}]},"date_created":"2018-12-11T11:51:48Z"},{"abstract":[{"text":"The co-evolution of hosts and pathogens is characterized by continuous adaptations of both parties. Pathogens of social insects need to adapt towards disease defences at two levels: 1) individual immunity of each colony member consisting of behavioural defence strategies as well as humoral and cellular immune responses and 2) social immunity that is collectively performed by all group members comprising behavioural, physiological and organisational defence strategies.\r\n\r\nTo disentangle the selection pressure on pathogens by the collective versus individual level of disease defence in social insects, we performed an evolution experiment using the Argentine Ant, Linepithema humile, as a host and a mixture of the general insect pathogenic fungus Metarhizium spp. (6 strains) as a pathogen. We allowed pathogen evolution over 10 serial host passages to two different evolution host treatments: (1) only individual host immunity in a single host treatment, and (2) simultaneously acting individual and social immunity in a social host treatment, in which an exposed ant was accompanied by two untreated nestmates.\r\n\r\nBefore starting the pathogen evolution experiment, the 6 Metarhizium spp. strains were characterised concerning conidiospore size killing rates in singly and socially reared ants, their competitiveness under coinfecting conditions and their influence on ant behaviour. We analysed how the ancestral atrain mixture changed in conidiospere size, killing rate and strain composition dependent on host treatment (single or social hosts) during 10 passages and found that killing rate and conidiospere size of the pathogen increased under both evolution regimes, but different depending on host treatment.\r\n\r\nTesting the evolved strain mixtures that evolved under either the single or social host treatment under both single and social current rearing conditions in a full factorial design experiment revealed that the additional collective defences in insect societies add new selection pressure for their coevolving pathogens that compromise their ability to adapt to its host at the group level. To our knowledge, this is the first study directly measuring the influence of social immunity on pathogen evolution.","lang":"eng"}],"acknowledgement":"This work was funded by the DFG and the ERC.","oa_version":"None","alternative_title":["IST Austria Thesis"],"publisher":"IST Austria","month":"04","publication_status":"published","year":"2014","language":[{"iso":"eng"}],"day":"01","page":"101","date_created":"2018-12-11T11:51:49Z","date_published":"2014-04-01T00:00:00Z","_id":"1404","type":"dissertation","status":"public","date_updated":"2021-01-12T06:50:30Z","citation":{"mla":"Stock, Miriam. Evolution of a Fungal Pathogen towards Individual versus Social Immunity in Ants. IST Austria, 2014.","ama":"Stock M. Evolution of a fungal pathogen towards individual versus social immunity in ants. 2014.","apa":"Stock, M. (2014). Evolution of a fungal pathogen towards individual versus social immunity in ants. IST Austria.","ieee":"M. Stock, “Evolution of a fungal pathogen towards individual versus social immunity in ants,” IST Austria, 2014.","short":"M. Stock, Evolution of a Fungal Pathogen towards Individual versus Social Immunity in Ants, IST Austria, 2014.","chicago":"Stock, Miriam. “Evolution of a Fungal Pathogen towards Individual versus Social Immunity in Ants.” IST Austria, 2014.","ista":"Stock M. 2014. Evolution of a fungal pathogen towards individual versus social immunity in ants. IST Austria."},"supervisor":[{"last_name":"Cremer","full_name":"Cremer, Sylvia M","orcid":"0000-0002-2193-3868","first_name":"Sylvia M","id":"2F64EC8C-F248-11E8-B48F-1D18A9856A87"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","author":[{"last_name":"Stock","full_name":"Stock, Miriam","id":"42462816-F248-11E8-B48F-1D18A9856A87","first_name":"Miriam"}],"publist_id":"5803","title":"Evolution of a fungal pathogen towards individual versus social immunity in ants","department":[{"_id":"SyCr"}]},{"alternative_title":["ISTA Thesis"],"publisher":"Institute of Science and Technology Austria","month":"02","abstract":[{"lang":"eng","text":"In this thesis I studied various individual and social immune defences employed by the invasive garden ant Lasius neglectus mostly against entomopathogenic fungi. The first two chapters of this thesis address the phenomenon of 'social immunisation'. Social immunisation, that is the immunological protection of group members due to social contact to a pathogen-exposed nestmate, has been described in various social insect species against different types of pathogens. However, in the case of entomopathogenic fungi it has, so far, only been demonstrated that social immunisation exists at all. Its underlying mechanisms r any other properties were, however, unknown. In the first chapter of this thesis I identified the mechanistic basis of social immunisation in L. neglectus against the entomopathogenous fungus Metarhizium. I could show that nestmates of a pathogen-exposed individual contract low-level infections due to social interactions. These low-level infections are, however, non-lethal and cause an active stimulation of the immune system, which protects the nestmates upon subsequent pathogen encounters. In the second chapter of this thesis I investigated the specificity and colony level effects of social immunisation. I demonstrated that the protection conferred by social immunisation is highly specific, protecting ants only against the same pathogen strain. In addition, depending on the respective context, social immunisation may even cause fitness costs. I further showed that social immunisation crucially affects sanitary behaviour and disease dynamics within ant groups. In the third chapter of this thesis I studied the effects of the ectosymbiotic fungus Laboulbenia formicarum on its host L. neglectus. Although Laboulbeniales are the largest order of insect-parasitic fungi, research concerning host fitness consequence is sparse. I showed that highly Laboulbenia-infected ants sustain fitness costs under resource limitation, however, gain fitness benefits when exposed to an entomopathogenus fungus. These effects are probably cause by a prophylactic upregulation of behavioural as well as physiological immune defences in highly infected ants."}],"oa_version":"None","page":"131","date_created":"2018-12-11T11:51:46Z","date_published":"2014-02-01T00:00:00Z","degree_awarded":"PhD","publication_status":"published","year":"2014","publication_identifier":{"issn":["2663-337X"]},"language":[{"iso":"eng"}],"day":"01","type":"dissertation","status":"public","_id":"1395","article_processing_charge":"No","author":[{"last_name":"Konrad","full_name":"Konrad, Matthias","first_name":"Matthias","id":"46528076-F248-11E8-B48F-1D18A9856A87"}],"publist_id":"5814","department":[{"_id":"SyCr"}],"title":"Immune defences in ants: Effects of social immunisation and a fungal ectosymbiont in the ant Lasius neglectus","citation":{"ista":"Konrad M. 2014. Immune defences in ants: Effects of social immunisation and a fungal ectosymbiont in the ant Lasius neglectus. Institute of Science and Technology Austria.","chicago":"Konrad, Matthias. “Immune Defences in Ants: Effects of Social Immunisation and a Fungal Ectosymbiont in the Ant Lasius Neglectus.” Institute of Science and Technology Austria, 2014.","ieee":"M. Konrad, “Immune defences in ants: Effects of social immunisation and a fungal ectosymbiont in the ant Lasius neglectus,” Institute of Science and Technology Austria, 2014.","short":"M. Konrad, Immune Defences in Ants: Effects of Social Immunisation and a Fungal Ectosymbiont in the Ant Lasius Neglectus, Institute of Science and Technology Austria, 2014.","apa":"Konrad, M. (2014). Immune defences in ants: Effects of social immunisation and a fungal ectosymbiont in the ant Lasius neglectus. Institute of Science and Technology Austria.","ama":"Konrad M. Immune defences in ants: Effects of social immunisation and a fungal ectosymbiont in the ant Lasius neglectus. 2014.","mla":"Konrad, Matthias. Immune Defences in Ants: Effects of Social Immunisation and a Fungal Ectosymbiont in the Ant Lasius Neglectus. Institute of Science and Technology Austria, 2014."},"date_updated":"2023-09-07T11:38:56Z","supervisor":[{"full_name":"Cremer, Sylvia M","orcid":"0000-0002-2193-3868","last_name":"Cremer","first_name":"Sylvia M","id":"2F64EC8C-F248-11E8-B48F-1D18A9856A87"}],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1"},{"page":"90","date_created":"2018-12-11T11:51:49Z","date_published":"2014-12-01T00:00:00Z","publication_status":"published","year":"2014","degree_awarded":"PhD","publication_identifier":{"issn":["2663-337X"]},"language":[{"iso":"eng"}],"day":"01","alternative_title":["ISTA Thesis"],"publisher":"Institute of Science and Technology Austria","month":"12","abstract":[{"text":"Phosphatidylinositol (Ptdlns) is a structural phospholipid that can be phosphorylated into various lipid signaling molecules, designated polyphosphoinositides (PPIs). The reversible phosphorylation of PPIs on the 3, 4, or 5 position of inositol is performed by a set of organelle-specific kinases and phosphatases, and the characteristic head groups make these molecules ideal for regulating biological processes in time and space. In yeast and mammals, Ptdlns3P and Ptdlns(3,5)P2 play crucial roles in trafficking toward the lytic compartments, whereas the role in plants is not yet fully understood. Here we identified the role of a land plant-specific subgroup of PPI phosphatases, the suppressor of actin 2 (SAC2) to SAC5, during vauolar trafficking and morphogenesis in Arabidopsis thaliana. SAC2-SAC5 localize to the tonoplast along with Ptdlns3P, the presumable product of their activity. in SAC gain- and loss-of-function mutants, the levels of Ptdlns monophosphates and bisphosphates were changed, with opposite effects on the morphology of storage and lytic vacuoles, and the trafficking toward the vacuoles was defective. Moreover, multiple sac knockout mutants had an increased number of smaller storage and lytic vacuoles, whereas extralarge vacuoles were observed in the overexpression lines, correlating with various growth and developmental defects. The fragmented vacuolar phenotype of sac mutants could be mimicked by treating wild-type seedlings with Ptdlns(3,5)P2, corroborating that this PPI is important for vacuole morphology. Taken together, these results provide evidence that PPIs, together with their metabolic enzymes SAC2-SAC5, are crucial for vacuolar trafficking and for vacuolar morphology and function in plants.","lang":"eng"}],"oa_version":"None","article_processing_charge":"No","author":[{"last_name":"Marhavá","full_name":"Marhavá, Petra","first_name":"Petra","id":"44E59624-F248-11E8-B48F-1D18A9856A87"}],"publist_id":"5805","department":[{"_id":"JiFr"}],"title":"Molecular mechanisms of patterning and subcellular trafficking in Arabidopsis thaliana","date_updated":"2023-09-07T11:39:38Z","citation":{"chicago":"Marhavá, Petra. “Molecular Mechanisms of Patterning and Subcellular Trafficking in Arabidopsis Thaliana.” Institute of Science and Technology Austria, 2014.","ista":"Marhavá P. 2014. Molecular mechanisms of patterning and subcellular trafficking in Arabidopsis thaliana. Institute of Science and Technology Austria.","mla":"Marhavá, Petra. Molecular Mechanisms of Patterning and Subcellular Trafficking in Arabidopsis Thaliana. Institute of Science and Technology Austria, 2014.","apa":"Marhavá, P. (2014). Molecular mechanisms of patterning and subcellular trafficking in Arabidopsis thaliana. Institute of Science and Technology Austria.","ama":"Marhavá P. Molecular mechanisms of patterning and subcellular trafficking in Arabidopsis thaliana. 2014.","ieee":"P. Marhavá, “Molecular mechanisms of patterning and subcellular trafficking in Arabidopsis thaliana,” Institute of Science and Technology Austria, 2014.","short":"P. Marhavá, Molecular Mechanisms of Patterning and Subcellular Trafficking in Arabidopsis Thaliana, Institute of Science and Technology Austria, 2014."},"supervisor":[{"first_name":"Jiří","id":"4159519E-F248-11E8-B48F-1D18A9856A87","last_name":"Friml","orcid":"0000-0002-8302-7596","full_name":"Friml, Jiří"}],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","type":"dissertation","status":"public","_id":"1402"},{"date_updated":"2023-10-17T12:16:58Z","citation":{"mla":"Behrndt, Martin. Forces Driving Epithelial Spreading in Zebrafish Epiboly. IST Austria, 2014.","apa":"Behrndt, M. (2014). Forces driving epithelial spreading in zebrafish epiboly. IST Austria.","ama":"Behrndt M. Forces driving epithelial spreading in zebrafish epiboly. 2014.","ieee":"M. Behrndt, “Forces driving epithelial spreading in zebrafish epiboly,” IST Austria, 2014.","short":"M. Behrndt, Forces Driving Epithelial Spreading in Zebrafish Epiboly, IST Austria, 2014.","chicago":"Behrndt, Martin. “Forces Driving Epithelial Spreading in Zebrafish Epiboly.” IST Austria, 2014.","ista":"Behrndt M. 2014. Forces driving epithelial spreading in zebrafish epiboly. IST Austria."},"supervisor":[{"first_name":"Carl-Philipp J","id":"39427864-F248-11E8-B48F-1D18A9856A87","last_name":"Heisenberg","orcid":"0000-0002-0912-4566","full_name":"Heisenberg, Carl-Philipp J"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publist_id":"5804","author":[{"last_name":"Behrndt","full_name":"Behrndt, Martin","id":"3ECECA3A-F248-11E8-B48F-1D18A9856A87","first_name":"Martin"}],"department":[{"_id":"CaHe"}],"title":"Forces driving epithelial spreading in zebrafish epiboly","_id":"1403","type":"dissertation","status":"public","publication_status":"published","year":"2014","language":[{"iso":"eng"}],"day":"01","page":"91","date_created":"2018-12-11T11:51:49Z","related_material":{"record":[{"relation":"part_of_dissertation","id":"2282","status":"public"},{"id":"2950","status":"public","relation":"part_of_dissertation"},{"id":"3373","status":"public","relation":"part_of_dissertation"}]},"date_published":"2014-08-01T00:00:00Z","abstract":[{"lang":"eng","text":"A variety of developmental and disease related processes depend on epithelial cell sheet spreading. In order to gain insight into the biophysical mechanism(s) underlying the tissue morphogenesis we studied the spreading of an epithelium during the early development of the zebrafish embryo. In zebrafish epiboly the enveloping cell layer (EVL), a simple squamous epithelium, spreads over the yolk cell to completely engulf it at the end of gastrulation. Previous studies have proposed that an actomyosin ring forming within the yolk syncytial layer (YSL) acts as purse string that through constriction along its circumference pulls on the margin of the EVL. Direct biophysical evidence for this hypothesis has however been missing. The aim of the thesis was to understand how the actomyosin ring may generate pulling forces onto the EVL and what cellular mechanism(s) may facilitate the spreading of the epithelium. Using laser ablation to measure cortical tension within the actomyosin ring we found an anisotropic tension distribution, which was highest along the circumference of the ring. However the low degree of anisotropy was incompatible with the actomyosin ring functioning as a purse string only. Additionally, we observed retrograde cortical flow from vegetal parts of the ring into the EVL margin. Interpreting the experimental data using a theoretical distribution that models the tissues as active viscous gels led us to proposen that the actomyosin ring has a twofold contribution to EVL epiboly. It not only acts as a purse string through constriction along its circumference, but in addition constriction along the width of the ring generates pulling forces through friction-resisted cortical flow. Moreover, when rendering the purse string mechanism unproductive EVL epiboly proceeded normally indicating that the flow-friction mechanism is sufficient to drive the process. Aiming to understand what cellular mechanism(s) may facilitate the spreading of the epithelium we found that tension-oriented EVL cell divisions limit tissue anisotropy by releasing tension along the division axis and promote epithelial spreading. Notably, EVL cells undergo ectopic cell fusion in conditions in which oriented-cell division is impaired or the epithelium is mechanically challenged. Taken together our study of EVL epiboly suggests a novel mechanism of force generation for actomyosin rings through friction-resisted cortical flow and highlights the importance of tension-oriented cell divisions in epithelial morphogenesis."}],"acknowledged_ssus":[{"_id":"SSU"}],"oa_version":"None","publisher":"IST Austria","alternative_title":["IST Austria Thesis"],"month":"08"},{"doi":"10.15479/at:ista:1405","date_published":"2013-09-05T00:00:00Z","date_created":"2018-12-11T11:51:50Z","page":"134","day":"05","has_accepted_license":"1","year":"2013","publisher":"Institute of Science and Technology Austria","oa":1,"acknowledgement":"This work was supported in part by the Austrian Science Fund NFN RiSE (Rigorous Systems Engineering) and by the ERC Advanced Grant QUAREM (Quantitative Reactve Modeling).\r\nChapter 2, 3, and 4 are joint work with Thomas A. Henzinger and Thomas Wies. Chapter 2 was published in FoSSaCS 2010 as “Forward Analysis of Depth-Bounded Processes” [112]. Chapter 3 was published in VMCAI 2012 as “Ideal Abstractions for Well-Structured Transition Systems” [114]. Chap- ter 5.1 is joint work with Kshitij Bansal, Eric Koskinen, and Thomas Wies. It was published in TACAS 2013 as “Structural Counter Abstraction” [13]. The author’s contribution in this part is mostly related to the implementation. The theory required to understand the method and its implementation is quickly recalled to make the thesis self-contained, but should not be considered as a contribution. For the details of the methods, we refer the reader to the orig- inal publication [13] and the corresponding technical report [14]. Chapter 5.2 is ongoing work with Shahram Esmaeilsabzali, Rupak Majumdar, and Thomas Wies. I also would like to thank the people who supported over the past 4 years. My advisor Thomas A. Henzinger who gave me a lot of freedom to work on projects I was interested in. My collaborators, especially Thomas Wies with whom I worked since the beginning. The members of my thesis committee, Viktor Kun- cak and Rupak Majumdar, who also agreed to advise me. Simon Aeschbacher, Pavol Cerny, Cezara Dragoi, Arjun Radhakrishna, my family, friends and col- leagues who created an enjoyable environment. ","title":"Analysis of dynamic message passing programs","publist_id":"5802","author":[{"id":"4397AC76-F248-11E8-B48F-1D18A9856A87","first_name":"Damien","last_name":"Zufferey","full_name":"Zufferey, Damien","orcid":"0000-0002-3197-8736"}],"article_processing_charge":"No","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","citation":{"short":"D. Zufferey, Analysis of Dynamic Message Passing Programs, Institute of Science and Technology Austria, 2013.","ieee":"D. Zufferey, “Analysis of dynamic message passing programs,” Institute of Science and Technology Austria, 2013.","apa":"Zufferey, D. (2013). Analysis of dynamic message passing programs. Institute of Science and Technology Austria. https://doi.org/10.15479/at:ista:1405","ama":"Zufferey D. Analysis of dynamic message passing programs. 2013. doi:10.15479/at:ista:1405","mla":"Zufferey, Damien. Analysis of Dynamic Message Passing Programs. Institute of Science and Technology Austria, 2013, doi:10.15479/at:ista:1405.","ista":"Zufferey D. 2013. Analysis of dynamic message passing programs. Institute of Science and Technology Austria.","chicago":"Zufferey, Damien. “Analysis of Dynamic Message Passing Programs.” Institute of Science and Technology Austria, 2013. https://doi.org/10.15479/at:ista:1405."},"project":[{"name":"Rigorous Systems Engineering","grant_number":"S 11407_N23","call_identifier":"FWF","_id":"25832EC2-B435-11E9-9278-68D0E5697425"},{"grant_number":"267989","name":"Quantitative Reactive Modeling","call_identifier":"FP7","_id":"25EE3708-B435-11E9-9278-68D0E5697425"}],"related_material":{"record":[{"relation":"part_of_dissertation","id":"2847","status":"public"},{"status":"public","id":"3251","relation":"part_of_dissertation"},{"relation":"part_of_dissertation","status":"public","id":"4361"}]},"ec_funded":1,"file":[{"date_created":"2021-02-22T11:28:36Z","file_name":"2013_Zufferey_thesis_final.pdf","creator":"dernst","date_updated":"2021-02-22T11:28:36Z","file_size":1514906,"file_id":"9176","checksum":"ed2d7b52933d134e8dc69d569baa284e","success":1,"access_level":"open_access","relation":"main_file","content_type":"application/pdf"},{"content_type":"application/pdf","relation":"main_file","access_level":"closed","checksum":"cecc4c4b14225bee973d32e3dba91a55","file_id":"10298","file_size":1378313,"date_updated":"2021-11-17T13:47:58Z","creator":"cchlebak","file_name":"2013_Zufferey_thesis_final_pdfa.pdf","date_created":"2021-11-16T14:42:52Z"}],"language":[{"iso":"eng"}],"publication_identifier":{"issn":["2663-337X"]},"degree_awarded":"PhD","publication_status":"published","month":"09","alternative_title":["ISTA Thesis"],"main_file_link":[{"url":"http://dzufferey.github.io/files/2013_thesis.pdf"}],"oa_version":"Published Version","abstract":[{"lang":"eng","text":"Motivated by the analysis of highly dynamic message-passing systems, i.e. unbounded thread creation, mobility, etc. we present a framework for the analysis of depth-bounded systems. Depth-bounded systems are one of the most expressive known fragment of the π-calculus for which interesting verification problems are still decidable. Even though they are infinite state systems depth-bounded systems are well-structured, thus can be analyzed algorithmically. We give an interpretation of depth-bounded systems as graph-rewriting systems. This gives more flexibility and ease of use to apply depth-bounded systems to other type of systems like shared memory concurrency.\r\n\r\nFirst, we develop an adequate domain of limits for depth-bounded systems, a prerequisite for the effective representation of downward-closed sets. Downward-closed sets are needed by forward saturation-based algorithms to represent potentially infinite sets of states. Then, we present an abstract interpretation framework to compute the covering set of well-structured transition systems. Because, in general, the covering set is not computable, our abstraction over-approximates the actual covering set. Our abstraction captures the essence of acceleration based-algorithms while giving up enough precision to ensure convergence. We have implemented the analysis in the PICASSO tool and show that it is accurate in practice. Finally, we build some further analyses like termination using the covering set as starting point."}],"department":[{"_id":"ToHe"},{"_id":"GradSch"}],"file_date_updated":"2021-11-17T13:47:58Z","ddc":["000"],"supervisor":[{"full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"}],"date_updated":"2023-09-07T11:36:37Z","status":"public","type":"dissertation","_id":"1405"},{"alternative_title":["ISTA Thesis"],"publisher":"Institute of Science and Technology Austria","month":"10","acknowledged_ssus":[{"_id":"Bio"},{"_id":"PreCl"}],"abstract":[{"lang":"eng","text":"Epithelial spreading is a critical part of various developmental and wound repair processes. Here we use zebrafish epiboly as a model system to study the cellular and molecular mechanisms underlying the spreading of epithelial sheets. During zebrafish epiboly the enveloping cell layer (EVL), a simple squamous epithelium, spreads over the embryo to eventually cover the entire yolk cell by the end of gastrulation. The EVL leading edge is anchored through tight junctions to the yolk syncytial layer (YSL), where directly adjacent to the EVL margin a contractile actomyosin ring is formed that is thought to drive EVL epiboly. The prevalent view in the field was that the contractile ring exerts a pulling force on the EVL margin, which pulls the EVL towards the vegetal pole. However, how this force is generated and how it affects EVL morphology still remains elusive. Moreover, the cellular mechanisms mediating the increase in EVL surface area, while maintaining tissue integrity and function are still unclear. Here we show that the YSL actomyosin ring pulls on the EVL margin by two distinct force-generating mechanisms. One mechanism is based on contraction of the ring around its circumference, as previously proposed. The second mechanism is based on actomyosin retrogade flows, generating force through resistance against the substrate. The latter can function at any epiboly stage even in situations where the contraction-based mechanism is unproductive. Additionally, we demonstrate that during epiboly the EVL is subjected to anisotropic tension, which guides the orientation of EVL cell division along the main axis (animal-vegetal) of tension. The influence of tension in cell division orientation involves cell elongation and requires myosin-2 activity for proper spindle alignment. Strikingly, we reveal that tension-oriented cell divisions release anisotropic tension within the EVL and that in the absence of such divisions, EVL cells undergo ectopic fusions. We conclude that forces applied to the EVL by the action of the YSL actomyosin ring generate a tension anisotropy in the EVL that orients cell divisions, which in turn limit tissue tension increase thereby facilitating tissue spreading."}],"oa_version":"None","page":"123","date_published":"2013-10-01T00:00:00Z","date_created":"2018-12-11T11:51:50Z","publication_identifier":{"issn":["2663-337X"]},"year":"2013","publication_status":"published","degree_awarded":"PhD","day":"01","language":[{"iso":"eng"}],"type":"dissertation","status":"public","_id":"1406","author":[{"last_name":"Campinho","orcid":"0000-0002-8526-5416","full_name":"Campinho, Pedro","id":"3AFBBC42-F248-11E8-B48F-1D18A9856A87","first_name":"Pedro"}],"publist_id":"5801","article_processing_charge":"No","title":"Mechanics of zebrafish epiboly: Tension-oriented cell divisions limit anisotropic tissue tension in epithelial spreading","department":[{"_id":"CaHe"}],"supervisor":[{"orcid":"0000-0002-0912-4566","full_name":"Heisenberg, Carl-Philipp J","last_name":"Heisenberg","first_name":"Carl-Philipp J","id":"39427864-F248-11E8-B48F-1D18A9856A87"}],"citation":{"mla":"Campinho, Pedro. Mechanics of Zebrafish Epiboly: Tension-Oriented Cell Divisions Limit Anisotropic Tissue Tension in Epithelial Spreading. Institute of Science and Technology Austria, 2013.","ieee":"P. Campinho, “Mechanics of zebrafish epiboly: Tension-oriented cell divisions limit anisotropic tissue tension in epithelial spreading,” Institute of Science and Technology Austria, 2013.","short":"P. Campinho, Mechanics of Zebrafish Epiboly: Tension-Oriented Cell Divisions Limit Anisotropic Tissue Tension in Epithelial Spreading, Institute of Science and Technology Austria, 2013.","apa":"Campinho, P. (2013). Mechanics of zebrafish epiboly: Tension-oriented cell divisions limit anisotropic tissue tension in epithelial spreading. Institute of Science and Technology Austria.","ama":"Campinho P. Mechanics of zebrafish epiboly: Tension-oriented cell divisions limit anisotropic tissue tension in epithelial spreading. 2013.","chicago":"Campinho, Pedro. “Mechanics of Zebrafish Epiboly: Tension-Oriented Cell Divisions Limit Anisotropic Tissue Tension in Epithelial Spreading.” Institute of Science and Technology Austria, 2013.","ista":"Campinho P. 2013. Mechanics of zebrafish epiboly: Tension-oriented cell divisions limit anisotropic tissue tension in epithelial spreading. Institute of Science and Technology Austria."},"date_updated":"2023-09-07T11:36:07Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1"},{"date_created":"2018-12-11T12:00:35Z","date_published":"2012-06-01T00:00:00Z","related_material":{"record":[{"relation":"part_of_dissertation","id":"3258","status":"public"}]},"page":"65","language":[{"iso":"eng"}],"day":"01","publication_status":"published","degree_awarded":"PhD","year":"2012","publication_identifier":{"issn":["2663-337X"]},"month":"06","alternative_title":["ISTA Thesis"],"publisher":"Institute of Science and Technology Austria","oa_version":"None","abstract":[{"text":"CA3 pyramidal neurons are important for memory formation and pattern completion in the hippocampal network. These neurons receive multiple excitatory inputs from numerous sources. Therefore, the rules of spatiotemporal integration of multiple synaptic inputs and propagation of action potentials are important to understand how CA3 neurons contribute to higher brain functions at cellular level. By using confocally targeted patch-clamp recording techniques, we investigated the biophysical properties of rat CA3 pyramidal neuron dendrites. We found two distinct dendritic domains critical for action potential initiation and propagation: In the proximal domain, action potentials initiated in the axon backpropagate actively with large amplitude and fast time course. In the distal domain, Na+-channel mediated dendritic spikes are efficiently evoked by local dendritic depolarization or waveforms mimicking synaptic events. These findings can be explained by a high Na+-to-K+ conductance density ratio of CA3 pyramidal neuron dendrites. The results challenge the prevailing view that proximal mossy fiber inputs activate CA3 pyramidal neurons more efficiently than distal perforant inputs by showing that the distal synapses trigger a different form of activity represented by dendritic spikes. The high probability of dendritic spike initiation in the distal area may enhance the computational power of CA3 pyramidal neurons in the hippocampal network. ","lang":"eng"}],"department":[{"_id":"PeJo"},{"_id":"GradSch"}],"title":"Active properties of hippocampal CA3 pyramidal neuron dendrites","article_processing_charge":"No","author":[{"last_name":"Kim","full_name":"Kim, Sooyun","first_name":"Sooyun","id":"394AB1C8-F248-11E8-B48F-1D18A9856A87"}],"publist_id":"3755","user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","citation":{"chicago":"Kim, Sooyun. “Active Properties of Hippocampal CA3 Pyramidal Neuron Dendrites.” Institute of Science and Technology Austria, 2012.","ista":"Kim S. 2012. Active properties of hippocampal CA3 pyramidal neuron dendrites. Institute of Science and Technology Austria.","mla":"Kim, Sooyun. Active Properties of Hippocampal CA3 Pyramidal Neuron Dendrites. Institute of Science and Technology Austria, 2012.","ieee":"S. Kim, “Active properties of hippocampal CA3 pyramidal neuron dendrites,” Institute of Science and Technology Austria, 2012.","short":"S. Kim, Active Properties of Hippocampal CA3 Pyramidal Neuron Dendrites, Institute of Science and Technology Austria, 2012.","apa":"Kim, S. (2012). Active properties of hippocampal CA3 pyramidal neuron dendrites. Institute of Science and Technology Austria.","ama":"Kim S. Active properties of hippocampal CA3 pyramidal neuron dendrites. 2012."},"date_updated":"2023-09-07T11:43:51Z","supervisor":[{"full_name":"Jonas, Peter M","orcid":"0000-0001-5001-4804","last_name":"Jonas","first_name":"Peter M","id":"353C1B58-F248-11E8-B48F-1D18A9856A87"}],"status":"public","type":"dissertation","_id":"2964"},{"_id":"3275","pubrep_id":"11","status":"public","type":"dissertation","ddc":["570","579"],"date_updated":"2023-09-07T11:31:48Z","supervisor":[{"last_name":"Sixt","full_name":"Sixt, Michael K","orcid":"0000-0002-6620-9179","first_name":"Michael K","id":"41E9FBEA-F248-11E8-B48F-1D18A9856A87"}],"file_date_updated":"2021-02-22T11:24:30Z","department":[{"_id":"MiSi"}],"oa_version":"Published Version","abstract":[{"lang":"eng","text":"Chemokines organize immune cell trafficking by inducing either directed (tactic) or random (kinetic) migration and by activating integrins in order to support surface adhesion (haptic). Beyond that the same chemokines can establish clearly defined functional areas in secondary lymphoid organs. Until now it is unclear how chemokines can fulfill such diverse functions. One decisive prerequisite to explain these capacities is to know how chemokines are presented in tissue. In theory chemokines could occur either soluble or immobilized, and could be distributed either homogenously or as a concentration gradient. To dissect if and how the presenting mode of chemokines influences immune cells, I tested the response of dendritic cells (DCs) to differentially displayed chemokines. DCs are antigen presenting cells that reside in the periphery and migrate into draining lymph nodes (LNs) once exposed to inflammatory stimuli to activate naïve T cells. DCs are guided to and within the LN by the chemokine receptor CCR7, which has two ligands, the chemokines CCL19 and CCL21. Both CCR7 ligands are expressed by fibroblastic reticular cells in the LN, but differ in their ability to bind to heparan sulfate residues. CCL21 has a highly charged C-terminal extension, which mediates binding to anionic surfaces, whereas CCL19 is lacking such residues and likely distributes as a soluble molecule. This study shows that surface-bound CCL21 causes random, haptokinetic DC motility, which is confined to the chemokine coated area by insideout activation of β2 integrins that mediate cell binding to the surface. CCL19 on the other hand forms concentration gradients which trigger directional, chemotactic movement, but no surface adhesion. In addition DCs can actively manipulate this system by recruiting and activating serine proteases on their surfaces, which create - by proteolytically removing the adhesive C-terminus - a solubilized variant of CCL21 that functionally resembles CCL19. By generating a CCL21 concentration gradient DCs establish a positive feedback loop to recruit further DCs from the periphery to the CCL21 coated region. In addition DCs can sense chemotactic gradients as well as immobilized haptokinetic fields at the same time and integrate these signals. The result is chemotactically biased haptokinesis - directional migration confined to a chemokine coated track or area - which could explain the dynamic but spatially tightly controlled swarming leukocyte locomotion patterns that have been observed in lymphatic organs by intravital microscopists. The finding that DCs can approach soluble cues in a non-adhesive manner while they attach to surfaces coated with immobilized cues raises the question how these cells transmit intracellular forces to the environment, especially in the non-adherent migration mode. In order to migrate, cells have to generate and transmit force to the extracellular substrate. Force transmission is the prerequisite to procure an expansion of the leading edge and a forward motion of the whole cell body. In the current conceptions actin polymerization at the leading edge is coupled to extracellular ligands via the integrin family of transmembrane receptors, which allows the transmission of intracellular force. Against the paradigm of force transmission during migration, leukocytes, like DCs, are able to migrate in threedimensional environments without using integrin transmembrane receptors (Lämmermann et al., 2008). This reflects the biological function of leukocytes, as they can invade almost all tissues, whereby their migration has to be independent from the extracellular environment. How the cells can achieve this is unclear. For this study I examined DC migration in a defined threedimensional environment and highlighted actin-dynamics with the probe Lifeact-GFP. The result was that chemotactic DCs can switch between integrin-dependent and integrin- independent locomotion and can thereby adapt to the adhesive properties of their environment. If the cells are able to couple their actin cytoskeleton to the substrate, actin polymerization is entirely converted into protrusion. Without coupling the actin cortex undergoes slippage and retrograde actin flow can be observed. But retrograde actin flow can be completely compensated by higher actin polymerization rate keeping the migration velocity and the shape of the cells unaltered. Mesenchymal cells like fibroblast cannot balance the loss of adhesive interaction, cannot protrude into open space and, therefore, strictly depend on integrinmediated force coupling. This leukocyte specific phenomenon of “adaptive force transmission” endows these cells with the unique ability to transit and invade almost every type of tissue. "}],"month":"03","alternative_title":["ISTA Thesis"],"language":[{"iso":"eng"}],"file":[{"file_name":"2011_Thesis_Kathrin_Schumann.pdf","date_created":"2019-03-26T08:12:21Z","creator":"dernst","file_size":4487708,"date_updated":"2020-07-14T12:46:06Z","file_id":"6177","checksum":"e69eee6252660f0b694a2ea8923ddc72","relation":"main_file","access_level":"closed","content_type":"application/pdf"},{"date_created":"2021-02-22T11:24:30Z","file_name":"2011_Thesis_Schumann_noS.pdf","creator":"dernst","date_updated":"2021-02-22T11:24:30Z","file_size":4313127,"file_id":"9175","checksum":"71727d63f424b5b446f68f4b87ecadc0","success":1,"access_level":"open_access","relation":"main_file","content_type":"application/pdf"}],"degree_awarded":"PhD","publication_status":"published","publication_identifier":{"issn":["2663-337X"]},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","citation":{"chicago":"Schumann, Kathrin. “The Role of Chemotactic Gradients in Dendritic Cell Migration.” Institute of Science and Technology Austria, 2011.","ista":"Schumann K. 2011. The role of chemotactic gradients in dendritic cell migration. Institute of Science and Technology Austria.","mla":"Schumann, Kathrin. The Role of Chemotactic Gradients in Dendritic Cell Migration. Institute of Science and Technology Austria, 2011.","short":"K. Schumann, The Role of Chemotactic Gradients in Dendritic Cell Migration, Institute of Science and Technology Austria, 2011.","ieee":"K. Schumann, “The role of chemotactic gradients in dendritic cell migration,” Institute of Science and Technology Austria, 2011.","ama":"Schumann K. The role of chemotactic gradients in dendritic cell migration. 2011.","apa":"Schumann, K. (2011). The role of chemotactic gradients in dendritic cell migration. Institute of Science and Technology Austria."},"title":"The role of chemotactic gradients in dendritic cell migration","article_processing_charge":"No","publist_id":"3371","author":[{"last_name":"Schumann","full_name":"Schumann, Kathrin","first_name":"Kathrin","id":"F44D762E-4F9D-11E9-B64C-9EB26CEFFB5F"}],"acknowledgement":"I would like to express my sincere gratitude to the following people who made with their continuous support and encouragement this thesis possible: First, I want to thank Prof. Dr. Michael Sixt for his excellent supervision and mentoring, especially for the nice, relaxed working atmosphere, a lot of brilliant ideas and the freedom to work in my own way.\r\n\r\nProf. Dr. Reinhard Fässler for his constant support of the Sixt lab and for providing excellent working conditions. \r\n\r\nProf. Dr. Sanjiv Luther and Prof. Dr. Tobias Bollenbach for agreeing to be member of my thesis committee and to evaluate my work.\r\n\r\nDr. Walther Göhring, Carmen Schmitz, the Recombinant Protein Production core facility and the animal care takers for providing the “infrastructure” for this thesis. \r\n\r\nProf. Dr. Daniel Legler, Markus Bruckner and Dr. Julien Polleux for very fruitful collaborations and discussions.\r\n\r\nMy labmates for their help, a lot of discussions and to make the Sixt lab to a convenient place to work : Karin Hirsch, Tim Lämmeramnn, Holger Pflicke, Jörg Renkawitz, Michele Weber and Alexander Eichner All members of the Department of Molecular Medicine for their help. Especially I want to thank Sarah Schmidt, Karin Hirsch and Raphael Ruppert for their friendship, nice chats and their uncensored point of view. ","oa":1,"publisher":"Institute of Science and Technology Austria","day":"01","year":"2011","has_accepted_license":"1","date_created":"2018-12-11T12:02:24Z","date_published":"2011-03-01T00:00:00Z","page":"141"},{"type":"dissertation","status":"public","_id":"3273","article_processing_charge":"No","author":[{"last_name":"Maître","full_name":"Maître, Jean-Léon","orcid":"0000-0002-3688-1474","first_name":"Jean-Léon","id":"48F1E0D8-F248-11E8-B48F-1D18A9856A87"}],"publist_id":"3373","title":"Mechanics of adhesion and de‐adhesion in zebrafish germ layer progenitors","department":[{"_id":"CaHe"}],"citation":{"apa":"Maître, J.-L. (2011). Mechanics of adhesion and de‐adhesion in zebrafish germ layer progenitors. Institute of Science and Technology Austria.","ama":"Maître J-L. Mechanics of adhesion and de‐adhesion in zebrafish germ layer progenitors. 2011.","ieee":"J.-L. Maître, “Mechanics of adhesion and de‐adhesion in zebrafish germ layer progenitors,” Institute of Science and Technology Austria, 2011.","short":"J.-L. Maître, Mechanics of Adhesion and De‐adhesion in Zebrafish Germ Layer Progenitors, Institute of Science and Technology Austria, 2011.","mla":"Maître, Jean-Léon. Mechanics of Adhesion and De‐adhesion in Zebrafish Germ Layer Progenitors. Institute of Science and Technology Austria, 2011.","ista":"Maître J-L. 2011. Mechanics of adhesion and de‐adhesion in zebrafish germ layer progenitors. Institute of Science and Technology Austria.","chicago":"Maître, Jean-Léon. “Mechanics of Adhesion and De‐adhesion in Zebrafish Germ Layer Progenitors.” Institute of Science and Technology Austria, 2011."},"date_updated":"2023-09-07T11:30:16Z","supervisor":[{"full_name":"Heisenberg, Carl-Philipp J","orcid":"0000-0002-0912-4566","last_name":"Heisenberg","first_name":"Carl-Philipp J","id":"39427864-F248-11E8-B48F-1D18A9856A87"}],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","alternative_title":["ISTA Thesis"],"publisher":"Institute of Science and Technology Austria","month":"12","oa_version":"None","date_created":"2018-12-11T12:02:23Z","date_published":"2011-12-12T00:00:00Z","degree_awarded":"PhD","publication_status":"published","year":"2011","publication_identifier":{"issn":["2663-337X"]},"language":[{"iso":"eng"}],"day":"12"},{"abstract":[{"lang":"eng","text":"This thesis investigates the combination of data-driven and physically based techniques for acquiring, modeling, and animating deformable materials, with a special focus on human faces. Furthermore, based on these techniques, we introduce a data-driven process for designing and fabricating materials with desired deformation behavior. \nRealistic simulation behavior, surface details, and appearance are still demanding tasks. Neither pure data-driven, pure procedural, nor pure physical methods are best suited for accurate synthesis of facial motion and details (both for appearance and geometry), due to the difficulties in model design, parameter estimation, and desired controllability for animators. Capturing of a small but representative amount of real data, and then synthesizing diverse on-demand examples with physically-based models and real data as input benefits from both sides: Highly realistic model behavior due to real-world data and controllability due to physically-based models.\nTo model the face and its behavior, hybrid physically-based and data-driven approaches are elaborated. We investigate surface-based representations as well as a solid representation based on FEM. To achieve realistic behavior, we propose to build light-weighted data capture devices to acquire real-world data to estimate model parameters and to employ concepts from data-driven modeling techniques and machine learning. The resulting models support simple acquisition systems, offer techniques to process and extract model parameters from real-world data, provide a compact representation of the facial geometry and its motion, and allow intuitive editing. We demonstrate applications such as capture of facial geometry and motion and real-time animation and transfer of facial details, and show that our soft tissue model can react to external forces and produce realistic deformations beyond facial expressions.\nBased on this model, we furthermore introduce a data-driven process for designing and fabricating materials with desired deformation behavior. The process starts with measuring deformation properties of base materials. Each material is represented as a non-linear stress-strain relationship in a finite-element model. For material design and fabrication, we introduce an optimization process that finds the best combination of base materials that meets a user’s criteria specified by example deformations. Our algorithm employs a number of strategies to prune poor solutions from the combinatorial search space. We finally demonstrate the complete process by designing and fabricating objects with complex heterogeneous materials using modern multi-material 3D printers.\n"}],"intvolume":" 499","month":"01","quality_controlled":0,"publisher":"Unknown","publication":"Unknown","day":"01","publication_status":"published","year":"2010","date_created":"2018-12-11T11:55:34Z","volume":499,"issue":"7458","date_published":"2010-01-01T00:00:00Z","doi":"dx.doi.org/10.3929/ethz-a-006354908","_id":"2075","status":"public","type":"dissertation","extern":1,"date_updated":"2021-01-12T06:55:09Z","citation":{"chicago":"Bickel, Bernd. “Measurement-Based Modeling and Fabrication of Deformable Materials for Human Faces.” Unknown. Unknown, 2010. https://doi.org/dx.doi.org/10.3929/ethz-a-006354908.","ista":"Bickel B. 2010. Measurement-based modeling and fabrication of deformable materials for human faces. Unknown.","mla":"Bickel, Bernd. “Measurement-Based Modeling and Fabrication of Deformable Materials for Human Faces.” Unknown, vol. 499, no. 7458, Unknown, 2010, doi:dx.doi.org/10.3929/ethz-a-006354908.","ieee":"B. Bickel, “Measurement-based modeling and fabrication of deformable materials for human faces,” Unknown, 2010.","short":"B. Bickel, Measurement-Based Modeling and Fabrication of Deformable Materials for Human Faces, Unknown, 2010.","ama":"Bickel B. Measurement-based modeling and fabrication of deformable materials for human faces. Unknown. 2010;499(7458). doi:dx.doi.org/10.3929/ethz-a-006354908","apa":"Bickel, B. (2010). Measurement-based modeling and fabrication of deformable materials for human faces. Unknown. Unknown. https://doi.org/dx.doi.org/10.3929/ethz-a-006354908"},"title":"Measurement-based modeling and fabrication of deformable materials for human faces","publist_id":"4963","author":[{"id":"49876194-F248-11E8-B48F-1D18A9856A87","first_name":"Bernd","full_name":"Bernd Bickel","orcid":"0000-0001-6511-9385","last_name":"Bickel"}]},{"type":"dissertation","status":"public","_id":"3296","article_processing_charge":"No","publist_id":"3345","author":[{"full_name":"Wojtan, Christopher J","orcid":"0000-0001-6646-5546","last_name":"Wojtan","first_name":"Christopher J","id":"3C61F1D2-F248-11E8-B48F-1D18A9856A87"}],"title":"Animating physical phenomena with embedded surface meshes","date_updated":"2023-02-23T11:21:00Z","citation":{"chicago":"Wojtan, Chris. “Animating Physical Phenomena with Embedded Surface Meshes.” Georgia Institute of Technology, 2010.","ista":"Wojtan C. 2010. Animating physical phenomena with embedded surface meshes. Georgia Institute of Technology.","mla":"Wojtan, Chris. Animating Physical Phenomena with Embedded Surface Meshes. Georgia Institute of Technology, 2010, pp. 1–175.","ieee":"C. Wojtan, “Animating physical phenomena with embedded surface meshes,” Georgia Institute of Technology, 2010.","short":"C. Wojtan, Animating Physical Phenomena with Embedded Surface Meshes, Georgia Institute of Technology, 2010.","apa":"Wojtan, C. (2010). Animating physical phenomena with embedded surface meshes. Georgia Institute of Technology.","ama":"Wojtan C. Animating physical phenomena with embedded surface meshes. 2010:1-175."},"supervisor":[{"first_name":"Irfan","full_name":"Essa, Irfan","last_name":"Essa"},{"first_name":"Karen","last_name":"Liu","full_name":"Liu, Karen"},{"first_name":"Peter","full_name":"Mucha, Peter","last_name":"Mucha"},{"last_name":"Rossignac","full_name":"Rossignac, Jarek","first_name":"Jarek"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","extern":"1","main_file_link":[{"url":"http://hdl.handle.net/1853/37256"}],"publisher":"Georgia Institute of Technology","month":"11","abstract":[{"lang":"eng","text":"Accurate computational representations of highly deformable surfaces are indispensable in the fields of computer animation, medical simulation, computer vision, digital modeling, and computational physics. The focus of this dissertation is on the animation of physics-based phenomena with highly detailed deformable surfaces represented by triangle meshes.\r\n \r\nWe first present results from an algorithm that generates continuum mechanics animations with intricate surface features. This method combines a finite element method with a tetrahedral mesh generator and a high resolution surface mesh, and it is orders of magnitude more efficient than previous approaches. Next, we present an efficient solution for the challenging problem of computing topological changes in detailed dynamic surface meshes. We then introduce a new physics-inspired surface tracking algorithm that is capable of preserving arbitrarily thin features and reproducing realistic fine-scale topological changes like Rayleigh-Plateau instabilities. This physics-inspired surface tracking technique also opens the door for a unique coupling between surficial finite element methods and volumetric finite difference methods, in order to simulate liquid surface tension phenomena more efficiently than any previous method. Due to its dramatic increase in computational resolution and efficiency, this method yielded the first computer simulations of a fully developed crown splash with droplet pinch off."}],"oa_version":"None","page":"1 - 175","date_created":"2018-12-11T12:02:31Z","date_published":"2010-11-17T00:00:00Z","year":"2010","publication_status":"published","language":[{"iso":"eng"}],"day":"17"},{"oa_version":"None","month":"07","publisher":"Institute of Science and Technology Austria","alternative_title":["ISTA Thesis"],"language":[{"iso":"eng"}],"day":"01","degree_awarded":"PhD","publication_status":"published","year":"2010","publication_identifier":{"issn":["2663-337X"]},"date_created":"2018-12-11T12:06:08Z","date_published":"2010-07-01T00:00:00Z","_id":"3962","status":"public","type":"dissertation","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","date_updated":"2023-09-07T11:28:47Z","citation":{"ista":"Pflicke H. 2010. Dendritic cell migration across basement membranes in the skin. Institute of Science and Technology Austria.","chicago":"Pflicke, Holger. “ Dendritic Cell Migration across Basement Membranes in the Skin.” Institute of Science and Technology Austria, 2010.","ama":"Pflicke H. Dendritic cell migration across basement membranes in the skin. 2010.","apa":"Pflicke, H. (2010). Dendritic cell migration across basement membranes in the skin. Institute of Science and Technology Austria.","ieee":"H. Pflicke, “ Dendritic cell migration across basement membranes in the skin,” Institute of Science and Technology Austria, 2010.","short":"H. Pflicke, Dendritic Cell Migration across Basement Membranes in the Skin, Institute of Science and Technology Austria, 2010.","mla":"Pflicke, Holger. Dendritic Cell Migration across Basement Membranes in the Skin. Institute of Science and Technology Austria, 2010."},"supervisor":[{"orcid":"0000-0002-0912-4566","full_name":"Heisenberg, Carl-Philipp J","last_name":"Heisenberg","id":"39427864-F248-11E8-B48F-1D18A9856A87","first_name":"Carl-Philipp J"}],"department":[{"_id":"CaHe"},{"_id":"GradSch"}],"title":"Dendritic cell migration across basement membranes in the skin","article_processing_charge":"No","publist_id":"2165","author":[{"last_name":"Pflicke","full_name":"Pflicke, Holger","first_name":"Holger","id":"CAA57A9A-5B61-11E9-B130-E0C1E1F2C83D"}]},{"day":"13","publication_status":"published","year":"2009","date_published":"2009-08-13T00:00:00Z","date_created":"2018-12-11T12:03:07Z","page":"1 - 72","abstract":[{"lang":"eng","text":"Invasive fungal infections pose a serious threat to immunocompromised people. Most of these infections are caused by either Candida or Aspergillus species, with A. fumigatus being the predominant causative agent of Invasive Aspergillosis. Affected people comprise mainly haematopoietic stem cell or solid organ transplant patients who receive either high-dose corticosteroids or immunosuppressants. These risk factors predispose to the development of Invasive\nAspergillosis which is lethal in 20 to 80 % of the cases, largely due to insufficient efficacy of current antifungal therapy. Thus one major aim in current mycological research is the identification of new drug targets.\nThe polysaccharide-based fungal cell wall is both essential to fungi and absent from human cells which makes it appear an attractive new target. Notably, many components of the A. fumigatus cell wall, including the polysaccharide galactomannan, glycoproteins, and glycolipids, contain the unusual sugar galactofuranose (Galf). In contrast to the other cell wall monosaccharides, Galf does not occur on human cells but is known as component of cell surface molecules of many pathogenic bacteria and protozoa, such as Mycobacterium tuberculosis or Leishmania major. These molecules are often essential for virulence or viability of these organisms which suggested a possible role of Galf in the pathogenicity of A. fumigatus.\nTo address the importance of Galf in A. fumigatus, the key biosynthesis gene glfA, encoding UDPgalactopyranose mutase (UGM), was deleted. In different experimental approaches it was demonstrated that the absence of the glfA gene led to a complete loss of Galf-containing glycans.\nAnalysis of the DeltaglfA phenotype revealed growth and sporulation defects, reduced thermotolerance and an increased susceptibility to antifungal drugs. Electron Microscopy indicated a cell wall defect as a likely cause for the observed impairments. Furthermore, the virulence of the DeltaglfA mutant was found to be severely attenuated in a murine model of Invasive Aspergillosis.\nThe second focus of this study was laid on further elucidation of the galactofuranosylation pathway in A. fumigatus. In eukaryotes, a UDP-Galf transporter is likely required to transport UDP-Galf from the\ncytosol into the organelles of the secretory pathway, but no such activity had been described. Sixteen candidate genes were identified in the A. fumigatus genome of which one, glfB, was found in close proximity to the glfA gene. In vitro transport assays revealed specificity of GlfB for UDP-Galf suggesting that glfB encoded indeed a UDP-Galf transporter. The influence of glfB on\ngalactofuranosylation was determined by a DeltaglfB deletion mutant, which closely recapitulated the DeltaglfA phenotype and was likewise found to be completely devoid of Galf. It could be concluded that all galactofuranosylation processes in A. fumigatus occur in the secretory pathway, including the biosynthesis of the cell wall polysaccharide galactomannan whose subcellular origin was previously disputed.\n\nThus in the course of this study the first UDP-Galf specific nucleotide sugar transporter was identified and its requirement for galactofuranosylation in A. fumigatus demonstrated. Moreover, it was shown that blocking the galactofuranosylation pathway impaired virulence of A. fumigatus which suggests the UDP-Galf biosynthesis enzyme UGM as a target for new antifungal drugs."}],"month":"08","quality_controlled":0,"publisher":"Gottfried Wilhelm Leibniz Universität Hannover","main_file_link":[{"url":"http://edok01.tib.uni-hannover.de/edoks/e01dh09/609861891.pdf","open_access":"0"}],"extern":1,"citation":{"chicago":"Schmalhorst, Philipp S. “Biosynthesis of Galactofuranose Containing Glycans and Their Relevance for the Pathogenic Fungus Aspergillus Fumigatus.” Gottfried Wilhelm Leibniz Universität Hannover, 2009.","ista":"Schmalhorst PS. 2009. Biosynthesis of Galactofuranose Containing Glycans and Their Relevance for the Pathogenic Fungus Aspergillus fumigatus. Gottfried Wilhelm Leibniz Universität Hannover.","mla":"Schmalhorst, Philipp S. Biosynthesis of Galactofuranose Containing Glycans and Their Relevance for the Pathogenic Fungus Aspergillus Fumigatus. Gottfried Wilhelm Leibniz Universität Hannover, 2009, pp. 1–72.","short":"P.S. Schmalhorst, Biosynthesis of Galactofuranose Containing Glycans and Their Relevance for the Pathogenic Fungus Aspergillus Fumigatus, Gottfried Wilhelm Leibniz Universität Hannover, 2009.","ieee":"P. S. Schmalhorst, “Biosynthesis of Galactofuranose Containing Glycans and Their Relevance for the Pathogenic Fungus Aspergillus fumigatus,” Gottfried Wilhelm Leibniz Universität Hannover, 2009.","ama":"Schmalhorst PS. Biosynthesis of Galactofuranose Containing Glycans and Their Relevance for the Pathogenic Fungus Aspergillus fumigatus. 2009:1-72.","apa":"Schmalhorst, P. S. (2009). Biosynthesis of Galactofuranose Containing Glycans and Their Relevance for the Pathogenic Fungus Aspergillus fumigatus. Gottfried Wilhelm Leibniz Universität Hannover."},"date_updated":"2021-01-12T07:43:13Z","title":"Biosynthesis of Galactofuranose Containing Glycans and Their Relevance for the Pathogenic Fungus Aspergillus fumigatus","author":[{"full_name":"Philipp Schmalhorst","orcid":"0000-0002-5795-0133","last_name":"Schmalhorst","first_name":"Philipp S","id":"309D50DA-F248-11E8-B48F-1D18A9856A87"}],"publist_id":"3058","_id":"3400","status":"public","type":"dissertation"},{"month":"01","quality_controlled":0,"publisher":"Faculty of mathematical and natural sciences, University of Groningen","day":"01","publication_status":"published","year":"2009","date_created":"2018-12-11T12:07:44Z","date_published":"2009-01-01T00:00:00Z","doi":"3811","_id":"4232","status":"public","type":"dissertation","extern":1,"date_updated":"2021-01-12T07:55:29Z","citation":{"short":"H. de Vladar, Stochasticity and Variability in the Dynamics and Genetics of Populations, Faculty of mathematical and natural sciences, University of Groningen, 2009.","ieee":"H. de Vladar, “Stochasticity and Variability in the dynamics and genetics of populations,” Faculty of mathematical and natural sciences, University of Groningen, 2009.","apa":"de Vladar, H. (2009). Stochasticity and Variability in the dynamics and genetics of populations. Faculty of mathematical and natural sciences, University of Groningen. https://doi.org/3811","ama":"de Vladar H. Stochasticity and Variability in the dynamics and genetics of populations. 2009. doi:3811","mla":"de Vladar, Harold. Stochasticity and Variability in the Dynamics and Genetics of Populations. Faculty of mathematical and natural sciences, University of Groningen, 2009, doi:3811.","ista":"de Vladar H. 2009. Stochasticity and Variability in the dynamics and genetics of populations. Faculty of mathematical and natural sciences, University of Groningen.","chicago":"Vladar, Harold de. “Stochasticity and Variability in the Dynamics and Genetics of Populations.” Faculty of mathematical and natural sciences, University of Groningen, 2009. https://doi.org/3811."},"title":"Stochasticity and Variability in the dynamics and genetics of populations","publist_id":"1883","author":[{"orcid":"0000-0002-5985-7653","full_name":"Harold Vladar","last_name":"Vladar","id":"2A181218-F248-11E8-B48F-1D18A9856A87","first_name":"Harold"}]},{"date_created":"2018-12-11T12:08:28Z","date_published":"2009-01-01T00:00:00Z","year":"2009","publication_status":"published","publication":"Formalizing and Verifying Transactional Memories","day":"01","quality_controlled":0,"publisher":"EPFL Lausanne","month":"01","author":[{"id":"4DAE2708-F248-11E8-B48F-1D18A9856A87","first_name":"Vasu","full_name":"Vasu Singh","last_name":"Singh"}],"publist_id":"1095","title":"Formalizing and Verifying Transactional Memories","citation":{"mla":"Singh, Vasu. “Formalizing and Verifying Transactional Memories.” Formalizing and Verifying Transactional Memories, EPFL Lausanne, 2009.","short":"V. Singh, Formalizing and Verifying Transactional Memories, EPFL Lausanne, 2009.","ieee":"V. Singh, “Formalizing and Verifying Transactional Memories,” EPFL Lausanne, 2009.","ama":"Singh V. Formalizing and Verifying Transactional Memories. Formalizing and Verifying Transactional Memories. 2009.","apa":"Singh, V. (2009). Formalizing and Verifying Transactional Memories. Formalizing and Verifying Transactional Memories. EPFL Lausanne.","chicago":"Singh, Vasu. “Formalizing and Verifying Transactional Memories.” Formalizing and Verifying Transactional Memories. EPFL Lausanne, 2009.","ista":"Singh V. 2009. Formalizing and Verifying Transactional Memories. EPFL Lausanne."},"date_updated":"2021-01-12T07:56:25Z","extern":1,"type":"dissertation","status":"public","_id":"4363"},{"oa_version":"None","abstract":[{"text":"Models of timed systems must incorporate not only the sequence of system events, but the timings of these events as well to capture the real-time aspects of physical systems. Timed automata are models of real-time systems in which states consist of discrete locations and values for real-time clocks. The presence of real-time clocks leads to an uncountable state space. This thesis studies verification problems on timed automata in a game theoretic framework.\r\n\r\nFor untimed systems, two systems are close if every sequence of events of one system is also observable in the second system. For timed systems, the difference in timings of the two corresponding sequences is also of importance. We propose the notion of bisimulation distance which quantifies timing differences; if the bisimulation distance between two systems is epsilon, then (a) every sequence of events of one system has a corresponding matching sequence in the other, and (b) the timings of matching events in between the two corresponding traces do not differ by more than epsilon. We show that we can compute the bisimulation distance between two timed automata to within any desired degree of accuracy. We also show that the timed verification logic TCTL is robust with respect to our notion of quantitative bisimilarity, in particular, if a system satisfies a formula, then every close system satisfies a close formula.\r\n\r\nTimed games are used for distinguishing between the actions of several agents, typically a controller and an environment. The controller must achieve its objective against all possible choices of the environment. The modeling of the passage of time leads to the presence of zeno executions, and corresponding unrealizable strategies of the controller which may achieve objectives by blocking time. We disallow such unreasonable strategies by restricting all agents to use only receptive strategies --strategies which while not being required to ensure time divergence by any agent, are such that no agent is responsible for blocking time. Time divergence is guaranteed when all players use receptive strategies. We show that timed automaton games with receptive strategies can be solved by a reduction to finite state turn based game graphs. We define the logic timed alternating-time temporal logic for verification of timed automaton games and show that the logic can be model checked in EXPTIME. We also show that the minimum time required by an agent to reach a desired location, and the maximum time an agent can stay safe within a set of locations, against all possible actions of its adversaries are both computable.\r\n\r\nWe next study the memory requirements of winning strategies for timed automaton games. We prove that finite memory strategies suffice for safety objectives, and that winning strategies for reachability objectives may require infinite memory in general. We introduce randomized strategies in which an agent can propose a probabilistic distribution of moves and show that finite memory randomized strategies suffice for all omega-regular objectives. We also show that while randomization helps in simplifying winning strategies, and thus allows the construction of simpler controllers, it does not help a player in winning at more states, and thus does not allow the construction of more powerful controllers.\r\n\r\nFinally we study robust winning strategies in timed games. In a physical system, a controller may propose an action together with a time delay, but the action cannot be assumed to be executed at the exact proposed time delay. We present robust strategies which incorporate such jitters and show that the set of states from which an agent can win robustly is computable.","lang":"eng"}],"month":"09","main_file_link":[{"url":"https://www2.eecs.berkeley.edu/Pubs/TechRpts/2008/EECS-2008-97.html","open_access":"1"}],"oa":1,"publisher":"University of California, Berkeley","language":[{"iso":"eng"}],"day":"01","year":"2008","degree_awarded":"PhD","publication_status":"published","date_created":"2018-12-11T12:08:42Z","date_published":"2008-09-01T00:00:00Z","page":"1 - 137","_id":"4409","status":"public","type":"dissertation","user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","extern":"1","date_updated":"2022-02-14T14:35:11Z","citation":{"mla":"Prabhu, Vinayak. Games for the Verification of Timed Systems. University of California, Berkeley, 2008, pp. 1–137.","short":"V. Prabhu, Games for the Verification of Timed Systems, University of California, Berkeley, 2008.","ieee":"V. Prabhu, “Games for the verification of timed systems,” University of California, Berkeley, 2008.","apa":"Prabhu, V. (2008). Games for the verification of timed systems. University of California, Berkeley.","ama":"Prabhu V. Games for the verification of timed systems. 2008:1-137.","chicago":"Prabhu, Vinayak. “Games for the Verification of Timed Systems.” University of California, Berkeley, 2008.","ista":"Prabhu V. 2008. Games for the verification of timed systems. University of California, Berkeley."},"supervisor":[{"last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000-0002-2985-7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"},{"full_name":"Steel, John","last_name":"Steel","first_name":"John"},{"first_name":"Pravin","last_name":"Varaiya","full_name":"Varaiya, Pravin"}],"title":"Games for the verification of timed systems","article_processing_charge":"No","publist_id":"319","author":[{"last_name":"Prabhu","full_name":"Prabhu, Vinayak","first_name":"Vinayak"}]},{"title":"Compositionality in deterministic real-time embedded systems","author":[{"first_name":"Slobodan","last_name":"Matic","full_name":"Matic, Slobodan"}],"publist_id":"316","article_processing_charge":"No","extern":"1","user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","supervisor":[{"first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","orcid":"0000-0002-2985-7724","full_name":"Henzinger, Thomas A"},{"last_name":"Lee","full_name":"Lee, Edward","first_name":"Edward"},{"first_name":"Raja","last_name":"Sengupta","full_name":"Sengupta, Raja"}],"citation":{"ista":"Matic S. 2008. Compositionality in deterministic real-time embedded systems. University of California, Berkeley.","chicago":"Matic, Slobodan. “Compositionality in Deterministic Real-Time Embedded Systems.” University of California, Berkeley, 2008.","ieee":"S. Matic, “Compositionality in deterministic real-time embedded systems,” University of California, Berkeley, 2008.","short":"S. Matic, Compositionality in Deterministic Real-Time Embedded Systems, University of California, Berkeley, 2008.","apa":"Matic, S. (2008). Compositionality in deterministic real-time embedded systems. University of California, Berkeley.","ama":"Matic S. Compositionality in deterministic real-time embedded systems. 2008:1-148.","mla":"Matic, Slobodan. Compositionality in Deterministic Real-Time Embedded Systems. University of California, Berkeley, 2008, pp. 1–148."},"date_updated":"2022-02-14T14:08:50Z","status":"public","type":"dissertation","_id":"4415","date_published":"2008-01-01T00:00:00Z","date_created":"2018-12-11T12:08:44Z","page":"1 - 148","day":"01","language":[{"iso":"eng"}],"publication_status":"published","year":"2008","degree_awarded":"PhD","month":"01","publisher":"University of California, Berkeley","oa_version":"None","acknowledgement":"978-0-549-83480-9","abstract":[{"text":"Many computing applications, especially those in safety critical embedded systems, require highly predictable timing properties. However, time is often not present in the prevailing computing and networking abstractions. In fact, most advances in computer architecture, software, and networking favor average-case performance over timing predictability. This thesis studies several methods for the design of concurrent and/or distributed embedded systems with precise timing guarantees. The focus is on flexible and compositional methods for programming and verification of the timing properties. The presented methods together with related formalisms cover two levels of design: (1) Programming language/model level. We propose the distributed variant of Giotto, a coordination programming language with an explicit temporal semantics—the logical execution time (LET) semantics. The LET of a task is an interval of time that specifies the time instants at which task inputs and outputs become available (task release and termination instants). The LET of a task is always non-zero. This allows us to communicate values across the network without changing the timing information of the task, and without introducing nondeterminism. We show how this methodology supports distributed code generation for distributed real-time systems. The method gives up some performance in favor of composability and predictability. We characterize the tradeoff by comparing the LET semantics with the semantics used in Simulink. (2) Abstract task graph level. We study interface-based design and verification of applications represented with task graphs. We consider task sequence graphs with general event models, and cyclic graphs with periodic event models with jitter and phase. Here an interface of a component exposes time and resource constraints of the component. Together with interfaces we formally define interface composition operations and the refinement relation. For efficient and flexible composability checking two properties are important: incremental design and independent refinement. According to the incremental design property the composition of interfaces can be performed in any order, even if interfaces for some components are not known. The refinement relation is defined such that in a design we can always substitute a refined interface for an abstract one. We show that the framework supports independent refinement, i.e., the refinement relation is preserved under composition operations.","lang":"eng"}]},{"date_created":"2018-12-11T12:09:18Z","date_published":"2008-01-31T00:00:00Z","page":"1 - 210","language":[{"iso":"eng"}],"day":"31","publication_status":"published","year":"2008","month":"01","publisher":"University of California, Berkeley","acknowledgement":"978-0-549-83679-7","oa_version":"None","abstract":[{"text":"Complex requirements, time-to-market pressure and regulatory constraints have made the designing of embedded systems extremely challenging. This is evident by the increase in effort and expenditure for design of safety-driven real-time control-dominated applications like automotive and avionic controllers. Design processes are often challenged by lack of proper programming tools for specifying and verifying critical requirements (e.g. timing and reliability) of such applications. Platform based design, an approach for designing embedded systems, addresses the above concerns by separating requirement from architecture. The requirement specifies the intended behavior of an application while the architecture specifies the guarantees (e.g. execution speed, failure rate etc). An implementation, a mapping of the requirement on the architecture, is then analyzed for correctness. The orthogonalization of concerns makes the specification and analyses simpler. An effective use of such design methodology has been proposed in Logical Execution Time (LET) model of real-time tasks. The model separates the timing requirements (specified by release and termination instances of a task) from the architecture guarantees (specified by worst-case execution time of the task).\r\n\r\nThis dissertation proposes a coordination language, Hierarchical Timing Language (HTL), that captures the timing and reliability requirements of real-time applications. An implementation of the program on an architecture is then analyzed to check whether desired timing and reliability requirements are met or not. The core framework extends the LET model by accounting for reliability and refinement. The reliability model separates the reliability requirements of tasks from the reliability guarantees of the architecture. The requirement expresses the desired long-term reliability while the architecture provides a short-term reliability guarantee (e.g. failure rate for each iteration). The analysis checks if the short-term guarantee ensures the desired long-term reliability. The refinement model allows replacing a task by another task during program execution. Refinement preserves schedulability and reliability, i.e., if a refined task is schedulable and reliable for an implementation, then the refining task is also schedulable and reliable for the implementation. Refinement helps in concise specification without overloading analysis.\r\n\r\nThe work presents the formal model, the analyses (both with and without refinement), and a compiler for HTL programs. The compiler checks composition and refinement constraints, performs schedulability and reliability analyses, and generates code for implementation of an HTL program on a virtual machine. Three real-time controllers, one each from automatic control, automotive control and avionic control, are used to illustrate the steps in modeling and analyzing HTL programs.","lang":"eng"}],"title":"A hierarchical coordination language for reliable real-time tasks","article_processing_charge":"No","author":[{"first_name":"Arkadeb","full_name":"Ghosal, Arkadeb","last_name":"Ghosal"}],"publist_id":"199","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","extern":"1","citation":{"ista":"Ghosal A. 2008. A hierarchical coordination language for reliable real-time tasks. University of California, Berkeley.","chicago":"Ghosal, Arkadeb. “A Hierarchical Coordination Language for Reliable Real-Time Tasks.” University of California, Berkeley, 2008.","short":"A. Ghosal, A Hierarchical Coordination Language for Reliable Real-Time Tasks, University of California, Berkeley, 2008.","ieee":"A. Ghosal, “A hierarchical coordination language for reliable real-time tasks,” University of California, Berkeley, 2008.","ama":"Ghosal A. A hierarchical coordination language for reliable real-time tasks. 2008:1-210.","apa":"Ghosal, A. (2008). A hierarchical coordination language for reliable real-time tasks. University of California, Berkeley.","mla":"Ghosal, Arkadeb. A Hierarchical Coordination Language for Reliable Real-Time Tasks. University of California, Berkeley, 2008, pp. 1–210."},"date_updated":"2021-01-12T07:59:26Z","supervisor":[{"first_name":"Alberto","full_name":"Sangiovanni-Vincentelli, Alberto","last_name":"Sangiovanni-Vincentelli"},{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","full_name":"Henzinger, Thomas A","orcid":"0000-0002-2985-7724","last_name":"Henzinger"},{"last_name":"Lee","full_name":"Lee, Edward","first_name":"Edward"},{"first_name":"Karl","last_name":"Hedrick","full_name":"Hedrick, Karl"}],"status":"public","type":"dissertation","_id":"4524"},{"date_published":"2007-10-08T00:00:00Z","date_created":"2018-12-11T12:09:29Z","page":"1 - 247","day":"08","year":"2007","publication_status":"published","month":"10","publisher":"University of California, Berkeley","quality_controlled":0,"main_file_link":[{"open_access":"0","url":"http://chess.eecs.berkeley.edu/pubs/462.html"}],"acknowledgement":"Technical Report No. UCB/EECS-2007-122","abstract":[{"lang":"eng","text":"We study games played on graphs with omega-regular conditions specified as parity, Rabin, Streett or Muller conditions. These games have applications in the verification, synthesis, modeling, testing, and compatibility checking of reactive systems. Important distinctions between graph games are as follows: (a) turn-based vs. concurrent games, depending on whether at a state of the game only a single player makes a move, or players make moves simultaneously; (b) deterministic vs. stochastic, depending on whether the transition function is a deterministic or a probabilistic function over successor states; and (c) zero-sum vs. non-zero-sum, depending on whether the objectives of the players are strictly conflicting or not.\n\nWe establish that the decision problem for turn-based stochastic zero-sum games with Rabin, Streett, and Muller objectives are NP-complete, coNP-complete, and PSPACE-complete, respectively, substantially improving the previously known 3EXPTIME bound. We also present strategy improvement style algorithms for turn-based stochastic Rabin and Streett games. In the case of concurrent stochastic zero-sum games with parity objectives we obtain a PSPACE bound, again improving the previously known 3EXPTIME bound. As a consequence, concurrent stochastic zero-sum games with Rabin, Streett, and Muller objectives can be solved in EXPSPACE, improving the previously known 4EXPTIME bound. We also present an elementary and combinatorial proof of the existence of memoryless \\epsilon-optimal strategies in concurrent stochastic games with reachability objectives, for all real \\epsilon>0, where an \\epsilon-optimal strategy achieves the value of the game with in \\epsilon against all strategies of the opponent. We also use the proof techniques to present a strategy improvement style algorithm for concurrent stochastic reachability games.\n\nWe then go beyond \\omega-regular objectives and study the complexity of an important class of quantitative objectives, namely, limit-average objectives. In the case of limit-average games, the states of the graph is labeled with rewards and the goal is to maximize the long-run average of the rewards. We show that concurrent stochastic zero-sum games with limit-average objectives can be solved in EXPTIME.\n\nFinally, we introduce a new notion of equilibrium, called secure equilibrium, in non-zero-sum games which captures the notion of conditional competitiveness. We prove the existence of unique maximal secure equilibrium payoff profiles in turn-based deterministic games, and present algorithms to compute such payoff profiles. We also show how the notion of secure equilibrium extends the assume-guarantee style of reasoning in the game theoretic framework."}],"title":"Stochastic ω-Regular Games","publist_id":"150","author":[{"first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","last_name":"Chatterjee","orcid":"0000-0002-4561-241X","full_name":"Krishnendu Chatterjee"}],"extern":1,"date_updated":"2021-01-12T07:59:42Z","citation":{"ista":"Chatterjee K. 2007. Stochastic ω-Regular Games. University of California, Berkeley.","chicago":"Chatterjee, Krishnendu. “Stochastic ω-Regular Games.” University of California, Berkeley, 2007.","short":"K. Chatterjee, Stochastic ω-Regular Games, University of California, Berkeley, 2007.","ieee":"K. Chatterjee, “Stochastic ω-Regular Games,” University of California, Berkeley, 2007.","apa":"Chatterjee, K. (2007). Stochastic ω-Regular Games. University of California, Berkeley.","ama":"Chatterjee K. Stochastic ω-Regular Games. 2007:1-247.","mla":"Chatterjee, Krishnendu. Stochastic ω-Regular Games. University of California, Berkeley, 2007, pp. 1–247."},"status":"public","type":"dissertation","_id":"4559"},{"_id":"4566","status":"public","type":"dissertation","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","extern":"1","date_updated":"2021-01-12T07:59:45Z","citation":{"ista":"Chakrabarti A. 2007. A framework for compositional design and analysis of systems. University of California, Berkeley.","chicago":"Chakrabarti, Arindam. “A Framework for Compositional Design and Analysis of Systems.” University of California, Berkeley, 2007.","ieee":"A. Chakrabarti, “A framework for compositional design and analysis of systems,” University of California, Berkeley, 2007.","short":"A. Chakrabarti, A Framework for Compositional Design and Analysis of Systems, University of California, Berkeley, 2007.","apa":"Chakrabarti, A. (2007). A framework for compositional design and analysis of systems. University of California, Berkeley.","ama":"Chakrabarti A. A framework for compositional design and analysis of systems. 2007:1-244.","mla":"Chakrabarti, Arindam. A Framework for Compositional Design and Analysis of Systems. University of California, Berkeley, 2007, pp. 1–244."},"supervisor":[{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","orcid":"0000-0002-2985-7724","full_name":"Henzinger, Thomas A","last_name":"Henzinger"},{"full_name":"Necula, George","last_name":"Necula","first_name":"George"},{"last_name":"Lee","full_name":"Lee, Edward","first_name":"Edward"},{"first_name":"Jack","full_name":"Silver, Jack","last_name":"Silver"}],"title":"A framework for compositional design and analysis of systems","article_processing_charge":"No","author":[{"last_name":"Chakrabarti","full_name":"Chakrabarti, Arindam","first_name":"Arindam"}],"publist_id":"145","oa_version":"None","abstract":[{"text":"Complex system design today calls for compositional design and implementation. However each component is designed with certain assumptions about the environment it is meant to operate in, and delivering certain guarantees if those assumptions are satisfied; numerous inter-component interaction errors are introduced in the manual and error-prone integration process as there is little support in design environments for machine-readably representing these assumptions and guarantees and automatically checking consistency during integration.\r\n\r\nBased on Interface Automata we propose a framework for compositional design and analysis of systems: a set of domain-specific automata-theoretic type systems for compositional system specification and analysis by behavioral specification of open systems. We focus on three different domains: component-based hardware systems communicating on bidirectional wires. concurrent distributed recursive message-passing software systems, and embedded software system components operating in resource-constrained environments. For these domains we present approaches to formally represent the assumptions and conditional guarantees between interacting open system components. Composition of such components produces new components with the appropriate assumptions and guarantees. We check satisfaction of temporal logic specifications by such components, and the substitutability of one component with another in an arbitrary context. Using this framework one can analyze large systems incrementally without needing extensive summary information to close the system at each stage. Furthermore, we focus only on the inter-component interaction behavior without dealing with the full implementation details of each component. Many of the merits of automata-theoretic model-checking are combined with the compositionality afforded by type-system based techniques. We also present an integer-based extension of the conventional boolean verification framework motivated by our interface formalism for embedded software components.\r\n\r\nOur algorithms for checking the behavioral compatibility of component interfaces are available in our tool Chic, which can be used as a plug-in for the Java IDE JBuilder and the heterogenous modeling and design environment Ptolemy II.\r\n\r\nFinally, we address the complementary problem of partitioning a large system into meaningful coherent components by analyzing the interaction patterns between its basic elements. We demonstrate the usefulness of our partitioning approach by evaluating its efficacy in improving unit-test branch coverage for a large software system implemented in C.","lang":"eng"}],"month":"12","publisher":"University of California, Berkeley","language":[{"iso":"eng"}],"day":"20","publication_status":"published","year":"2007","date_created":"2018-12-11T12:09:31Z","date_published":"2007-12-20T00:00:00Z","page":"1 - 244"},{"extern":"1","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_updated":"2021-01-12T07:55:30Z","citation":{"mla":"de Vladar, Harold. Métodos No Lineales y Sus Aplicaciones En Dinámicas Aleatorias de Poblaciones Celulares. Centro de estudios avazados, IVIC, 2004, doi:3810.","apa":"de Vladar, H. (2004). Métodos no lineales y sus aplicaciones en dinámicas aleatorias de poblaciones celulares. Centro de estudios avazados, IVIC. https://doi.org/3810","ama":"de Vladar H. Métodos no lineales y sus aplicaciones en dinámicas aleatorias de poblaciones celulares. 2004. doi:3810","ieee":"H. de Vladar, “Métodos no lineales y sus aplicaciones en dinámicas aleatorias de poblaciones celulares,” Centro de estudios avazados, IVIC, 2004.","short":"H. de Vladar, Métodos No Lineales y Sus Aplicaciones En Dinámicas Aleatorias de Poblaciones Celulares, Centro de estudios avazados, IVIC, 2004.","chicago":"Vladar, Harold de. “Métodos No Lineales y Sus Aplicaciones En Dinámicas Aleatorias de Poblaciones Celulares.” Centro de estudios avazados, IVIC, 2004. https://doi.org/3810.","ista":"de Vladar H. 2004. Métodos no lineales y sus aplicaciones en dinámicas aleatorias de poblaciones celulares. Centro de estudios avazados, IVIC."},"title":"Métodos no lineales y sus aplicaciones en dinámicas aleatorias de poblaciones celulares","author":[{"last_name":"de Vladar","full_name":"de Vladar, Harold","orcid":"0000-0002-5985-7653","id":"2A181218-F248-11E8-B48F-1D18A9856A87","first_name":"Harold"}],"publist_id":"1877","article_processing_charge":"No","_id":"4236","status":"public","type":"dissertation","day":"01","language":[{"iso":"eng"}],"publication_status":"published","year":"2004","doi":"3810","date_published":"2004-01-01T00:00:00Z","date_created":"2018-12-11T12:07:46Z","oa_version":"None","month":"01","publisher":"Centro de estudios avazados, IVIC"},{"date_published":"2004-12-01T00:00:00Z","date_created":"2018-12-11T12:08:47Z","page":"1 - 165","day":"01","language":[{"iso":"eng"}],"year":"2004","publication_status":"published","month":"12","publisher":"University of California, Berkeley","oa_version":"None","abstract":[{"text":"The enormous cost and ubiquity of software errors necessitates the need for techniques and tools that can precisely analyze large systems and prove that they meet given specifications, or if they don't, return counterexample behaviors showing how the system fails. Recent advances in model checking, decision procedures, program analysis and type systems, and a shift of focus to partial specifications common to several systems (e.g., memory safety and race freedom) have resulted in several practical verification methods. However, these methods are either precise or they are scalable, depending on whether they track the values of variables or only a fixed small set of dataflow facts (e.g., types), and are usually insufficient for precisely verifying large programs.\r\n\r\nWe describe a new technique called Lazy Abstraction (LA) which achieves both precision and scalability by localizing the use of precise information. LA automatically builds, explores and refines a single abstract model of the program in a way that different parts of the model exhibit different degrees of precision, namely just enough to verify the desired property. The algorithm automatically mines the information required by partitioning mechanical proofs of unsatisfiability of spurious counterexamples into Craig Interpolants. For multithreaded systems, we give a new technique based on analyzing the behavior of a single thread executing in a context which is an abstraction of the other (arbitrarily many) threads. We define novel context models and show how to automatically infer them and analyze the full system (thread + context) using LA.\r\n\r\nLA is implemented in BLAST. We have run BLAST on Windows and Linux Device Drivers to verify API conformance properties, and have used it to find (or guarantee the absence of) data races in multithreaded Networked Embedded Systems (NESC) applications. BLAST is able to prove the absence of races in several cases where earlier methods, which depend on lock-based synchronization, fail.","lang":"eng"}],"title":"Program verification by lazy abstraction","publist_id":"307","author":[{"first_name":"Ranjit","last_name":"Jhala","full_name":"Jhala, Ranjit"}],"article_processing_charge":"No","extern":"1","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","supervisor":[{"first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000-0002-2985-7724"}],"citation":{"ista":"Jhala R. 2004. Program verification by lazy abstraction. University of California, Berkeley.","chicago":"Jhala, Ranjit. “Program Verification by Lazy Abstraction.” University of California, Berkeley, 2004.","ieee":"R. Jhala, “Program verification by lazy abstraction,” University of California, Berkeley, 2004.","short":"R. Jhala, Program Verification by Lazy Abstraction, University of California, Berkeley, 2004.","apa":"Jhala, R. (2004). Program verification by lazy abstraction. University of California, Berkeley.","ama":"Jhala R. Program verification by lazy abstraction. 2004:1-165.","mla":"Jhala, Ranjit. Program Verification by Lazy Abstraction. University of California, Berkeley, 2004, pp. 1–165."},"date_updated":"2021-01-12T07:56:52Z","status":"public","type":"dissertation","_id":"4424"},{"date_created":"2018-12-11T11:57:31Z","doi":"10.3929/ethz-a-004708408","date_published":"2003-01-01T00:00:00Z","day":"01","year":"2003","publication_status":"published","month":"01","quality_controlled":0,"publisher":"ETH Zurich","title":"On k-Sets and Their Applications","author":[{"first_name":"Uli","id":"36690CA2-F248-11E8-B48F-1D18A9856A87","last_name":"Wagner","orcid":"0000-0002-1494-0568","full_name":"Uli Wagner"}],"publist_id":"4511","extern":1,"citation":{"ista":"Wagner U. 2003. On k-Sets and Their Applications. ETH Zurich.","chicago":"Wagner, Uli. “On K-Sets and Their Applications.” ETH Zurich, 2003. https://doi.org/10.3929/ethz-a-004708408.","short":"U. Wagner, On K-Sets and Their Applications, ETH Zurich, 2003.","ieee":"U. Wagner, “On k-Sets and Their Applications,” ETH Zurich, 2003.","ama":"Wagner U. On k-Sets and Their Applications. 2003. doi:10.3929/ethz-a-004708408","apa":"Wagner, U. (2003). On k-Sets and Their Applications. ETH Zurich. https://doi.org/10.3929/ethz-a-004708408","mla":"Wagner, Uli. On K-Sets and Their Applications. ETH Zurich, 2003, doi:10.3929/ethz-a-004708408."},"date_updated":"2021-01-12T06:57:20Z","status":"public","type":"dissertation","_id":"2414"},{"date_updated":"2021-01-12T07:45:05Z","citation":{"mla":"Lampert, Christoph. “The Neumann Operator in Strictly Pseudoconvex Domains with Weighted Bergman Metric .” Bonner Mathematische Schriften, vol. 356, Universität Bonn, Fachbibliothek Mathematik, 2003, pp. 1–165.","ieee":"C. Lampert, “The Neumann operator in strictly pseudoconvex domains with weighted Bergman metric ,” Universität Bonn, Fachbibliothek Mathematik, 2003.","short":"C. Lampert, The Neumann Operator in Strictly Pseudoconvex Domains with Weighted Bergman Metric , Universität Bonn, Fachbibliothek Mathematik, 2003.","apa":"Lampert, C. (2003). The Neumann operator in strictly pseudoconvex domains with weighted Bergman metric . Bonner Mathematische Schriften. Universität Bonn, Fachbibliothek Mathematik.","ama":"Lampert C. The Neumann operator in strictly pseudoconvex domains with weighted Bergman metric . Bonner Mathematische Schriften. 2003;356:1-165.","chicago":"Lampert, Christoph. “The Neumann Operator in Strictly Pseudoconvex Domains with Weighted Bergman Metric .” Bonner Mathematische Schriften. Universität Bonn, Fachbibliothek Mathematik, 2003.","ista":"Lampert C. 2003. The Neumann operator in strictly pseudoconvex domains with weighted Bergman metric . Universität Bonn, Fachbibliothek Mathematik."},"extern":1,"author":[{"id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","first_name":"Christoph","full_name":"Christoph Lampert","orcid":"0000-0001-8622-7887","last_name":"Lampert"}],"publist_id":"2704","title":"The Neumann operator in strictly pseudoconvex domains with weighted Bergman metric ","_id":"3678","type":"dissertation","status":"public","publication_status":"published","year":"2003","publication":"Bonner Mathematische Schriften","day":"31","page":"1 - 165","date_created":"2018-12-11T12:04:34Z","date_published":"2003-03-31T00:00:00Z","volume":356,"main_file_link":[{"open_access":"0","url":"http://pub.ist.ac.at/~chl/papers/lampert-phd2003.pdf"}],"publisher":"Universität Bonn, Fachbibliothek Mathematik","quality_controlled":0,"intvolume":" 356","month":"03"},{"title":"Symbolic algorithms for verification and control","author":[{"last_name":"Majumdar","full_name":"Majumdar, Ritankar","first_name":"Ritankar"}],"publist_id":"313","article_processing_charge":"No","extern":"1","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","supervisor":[{"first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A","orcid":"0000-0002-2985-7724","last_name":"Henzinger"}],"citation":{"chicago":"Majumdar, Ritankar. “Symbolic Algorithms for Verification and Control.” University of California, Berkeley, 2003.","ista":"Majumdar R. 2003. Symbolic algorithms for verification and control. University of California, Berkeley.","mla":"Majumdar, Ritankar. Symbolic Algorithms for Verification and Control. University of California, Berkeley, 2003, pp. 1–201.","ama":"Majumdar R. Symbolic algorithms for verification and control. 2003:1-201.","apa":"Majumdar, R. (2003). Symbolic algorithms for verification and control. University of California, Berkeley.","ieee":"R. Majumdar, “Symbolic algorithms for verification and control,” University of California, Berkeley, 2003.","short":"R. Majumdar, Symbolic Algorithms for Verification and Control, University of California, Berkeley, 2003."},"date_updated":"2021-01-12T07:56:49Z","status":"public","type":"dissertation","_id":"4416","date_published":"2003-12-01T00:00:00Z","date_created":"2018-12-11T12:08:44Z","page":"1 - 201","day":"01","language":[{"iso":"eng"}],"year":"2003","publication_status":"published","month":"12","publisher":"University of California, Berkeley","oa_version":"None","abstract":[{"text":"Methods for the formal specification and verification of systems are indispensible for the development of complex yet correct systems. In formal verification, the designer describes the system in a modeling language with a well-defined semantics, and this system description is analyzed against a set of correctness requirements. Model checking is an algorithmic technique to check that a system description indeed satisfies correctness requirements given as logical specifications. While successful in hardware verification, the potential for model checking for software and embedded systems has not yet been realized. This is because traditional model checking focuses on systems modeled as finite state-transition graphs. While a natural model for hardware (especially synchronous hardware), state-transition graphs often do not capture software and embedded systems at an appropriate level of granularity. This dissertation considers two orthogonal extensions to finite state-transition graphs making model checking techniques applicable to both a wider class of systems and a wider class of properties.\r\n\r\nThe first direction is an extension to infinite-state structures finitely represented using constraints and operations on constraints. Infinite state arises when we wish to model variables with unbounded range (e.g., integers), or data structures, or real time. We provide a uniform framework of symbolic region algebras to study model checking of infinite-state systems. We also provide sufficient language-independent termination conditions for symbolic model checking algorithms on infinite state systems.\r\n\r\nThe second direction supplements verification with game theoretic reasoning. Games are natural models for interactions between components. We study game theoretic behavior with winning conditions given by temporal logic objectives both in the deterministic and in the probabilistic context. For deterministic games, we provide an extremal model characterization of fixpoint algorithms that link solutions of verification problems to solutions for games. For probabilistic games we study fixpoint characterization of winning probabilities for games with omega-regular winning objectives, and construct (epsilon-)optimal winning strategies.","lang":"eng"}]},{"_id":"4425","type":"dissertation","status":"public","supervisor":[{"last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000-0002-2985-7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"}],"date_updated":"2021-01-12T07:56:53Z","citation":{"mla":"Horowitz, Benjamin. Giotto: A Time-Triggered Language for Embedded Programming. University of California, Berkeley, 2003, pp. 1–237.","short":"B. Horowitz, Giotto: A Time-Triggered Language for Embedded Programming, University of California, Berkeley, 2003.","ieee":"B. Horowitz, “Giotto: A time-triggered language for embedded programming,” University of California, Berkeley, 2003.","apa":"Horowitz, B. (2003). Giotto: A time-triggered language for embedded programming. University of California, Berkeley.","ama":"Horowitz B. Giotto: A time-triggered language for embedded programming. 2003:1-237.","chicago":"Horowitz, Benjamin. “Giotto: A Time-Triggered Language for Embedded Programming.” University of California, Berkeley, 2003.","ista":"Horowitz B. 2003. Giotto: A time-triggered language for embedded programming. University of California, Berkeley."},"extern":"1","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publist_id":"305","author":[{"first_name":"Benjamin","last_name":"Horowitz","full_name":"Horowitz, Benjamin"}],"article_processing_charge":"No","title":"Giotto: A time-triggered language for embedded programming","abstract":[{"lang":"eng","text":"Giotto provides a time-triggered programmer’s model for the implementation of embedded control systems with hard real-time constraints. Giotto’s precise semantics and predictabil- ity make it suitable for safety-critical applications.\r\nGiotto is based around the idea that time-triggered task invocation together with time-triggered mode switching can form a useful programming model for real-time systems. To substantiate this claim, we describe the use of Giotto to refactor the software of a small, autonomous helicopter. The ease with which Giotto expresses the existing software provides evidence that Giotto is an appropriate programming language for control systems.\r\nSince Giotto is a real-time programming language, ensuring that Giotto programs meet their deadlines is crucial. To study precedence-constrained Giotto scheduling, we first examine single-mode, single-processor scheduling. We extend to an infinite, periodic setting the classical problem of meeting deadlines for a set of tasks with release times, deadlines, precedence constraints, and preemption. We then develop an algorithm for scheduling Giotto programs on a single processor by representing Giotto programs as instances of the extended scheduling problem.\r\nNext, we study multi-mode, single-processor Giotto scheduling. This problem is different from classical scheduling problems, since in our precedence-constrained approach, the deadlines of tasks may vary depending on the mode switching behavior of the program. We present conditional scheduling models which capture this varying-deadline behavior. We develop polynomial-time algorithms for some conditional scheduling models, and prove oth- ers to be computationally hard. We show how to represent multi-mode Giotto programs as instances of the model, resulting in an algorithm for scheduling multi-mode Giotto programs on a single processor.\r\nFinally, we show that the problem of scheduling Giotto programs for multiple net- worked processors is strongly NP-hard."}],"oa_version":"None","publisher":"University of California, Berkeley","month":"10","year":"2003","publication_status":"published","day":"01","language":[{"iso":"eng"}],"page":"1 - 237","date_published":"2003-10-01T00:00:00Z","date_created":"2018-12-11T12:08:47Z"},{"title":"Games in open systems verification and synthesis","article_processing_charge":"No","author":[{"full_name":"Mang, Freddy","last_name":"Mang","first_name":"Freddy"}],"publist_id":"315","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","extern":"1","citation":{"apa":"Mang, F. (2002). Games in open systems verification and synthesis. University of California, Berkeley.","ama":"Mang F. Games in open systems verification and synthesis. 2002:1-116.","short":"F. Mang, Games in Open Systems Verification and Synthesis, University of California, Berkeley, 2002.","ieee":"F. Mang, “Games in open systems verification and synthesis,” University of California, Berkeley, 2002.","mla":"Mang, Freddy. Games in Open Systems Verification and Synthesis. University of California, Berkeley, 2002, pp. 1–116.","ista":"Mang F. 2002. Games in open systems verification and synthesis. University of California, Berkeley.","chicago":"Mang, Freddy. “Games in Open Systems Verification and Synthesis.” University of California, Berkeley, 2002."},"date_updated":"2021-01-12T07:56:48Z","supervisor":[{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","orcid":"0000-0002-2985-7724","full_name":"Henzinger, Thomas A","last_name":"Henzinger"}],"status":"public","type":"dissertation","_id":"4414","date_created":"2018-12-11T12:08:44Z","date_published":"2002-05-01T00:00:00Z","page":"1 - 116","language":[{"iso":"eng"}],"day":"01","year":"2002","publication_status":"published","month":"05","publisher":"University of California, Berkeley","oa_version":"None","abstract":[{"lang":"eng","text":"This dissertation investigates game-theoretic approaches to the algorithmic analysis of concurrent, reactive systems. A concurrent system comprises a number of components working concurrently; a reactive system maintains an ongoing interaction with its environment. Traditional approaches to the formal analysis of concurrent reactive systems usually view the system as an unstructured state-transition graphs; instead, we view them as collections of interacting components, where each one is an open system which accepts inputs from the other components. The interactions among the components are naturally modeled as games.\r\n\r\nAdopting this game-theoretic view, we study three related problems pertaining to the verification and synthesis of systems. Firstly, we propose two novel game-theoretic techniques for the model-checking of concurrent reactive systems, and improve the performance of model-checking. The first technique discovers an error as soon as it cannot be prevented, which can be long before it actually occurs. This technique is based on the key observation that "unpreventability" is a local property to a module: an error is unpreventable in a module state if no environment can prevent it. The second technique attempts to decompose a model-checking proof into smaller proof obligations by constructing abstract modules automatically, using reachability and "unpreventability" information about the concrete modules. Three increasingly powerful proof decomposition rules are proposed and we show that in practice, the resulting abstract modules are often significantly smaller than the concrete modules and can drastically reduce the space and time requirements for verification. Both techniques fall into the category of compositional reasoning.\r\n\r\nSecondly, we investigate the composition and control of synchronous systems. An essential property of synchronous systems for compositional reasoning is non-blocking. In the composition of synchronous systems, however, due to circular causal dependency of input and output signals, non-blocking is not always guaranteed. Blocking compositions of systems can be ruled out semantically, by insisting on the existence of certain fixed points, or syntactically, by equipping systems with types, which make the dependencies between input and output signals transparent. We characterize various typing mechanisms in game-theoretic terms, and study their effects on the controller synthesis problem. We show that our typing systems are general enough to capture interesting real-life synchronous systems such as all delay-insensitive digital circuits. We then study their corresponding single-step control problems --a restricted form of controller synthesis problem whose solutions can be iterated in appropriate manners to solve all LTL controller synthesis problems. We also consider versions of the controller synthesis problem in which the type of the controller is given. We show that the solution of these fixed-type control problems requires the evaluation of partially ordered (Henkin) quantifiers on boolean formulas, and is therefore harder (nondeterministic exponential time) than more traditional control questions.\r\n\r\nThirdly, we study the synthesis of a class of open systems, namely, uninitialized state machines. The sequential synthesis problem, which is closely related to Church's solvability problem, asks, given a specification in the form of a binary relation between input and output streams, for the construction of a finite-state stream transducer that converts inputs to appropriate outputs. For efficiency reasons, practical sequential hardware is often designed to operate without prior initialization. Such hardware designs can be modeled by uninitialized state machines, which are required to satisfy their specification if started from any state. We solve the sequential synthesis problem for uninitialized systems, that is, we construct uninitialized finite-state stream transducers. We consider specifications given by LTL formulas, deterministic, nondeterministic, universal, and alternating Buechi automata. We solve this uninitialized synthesis problem by reducing it to the well-understood initialized synthesis problem. While our solution is straightforward, it leads, for some specification formalisms, to upper bounds that are exponentially worse than the complexity of the corresponding initialized problems. However, we prove lower bounds to show that our simple solutions are optimal for all considered specification formalisms. The lower bound proofs require nontrivial generic reductions."}]},{"abstract":[{"text":"Model checking algorithms for the verification of reactive systems proceed by a systematic and exhaustive exploration of the system state space. They do not scale to large designs because of the state explosion problem --the number of states grows exponentially with the number of components in the design. Consequently, the model checking problem is PSPACE-hard in the size of the design description. This dissertation proposes three novel techniques to combat the state explosion problem.\r\n\r\nOne of the most important advances in model checking in recent years has been the discovery of symbolic methods, which use a calculus of expressions, such as binary decision diagrams, to represent the state sets encountered during state space exploration. Symbolic model checking has proved to be effective for verifying hardware designs. Traditionally, symbolic checking of temporal logic specifications is performed by backward fixpoint reasoning with the operator Pre. Backward reasoning can be wasteful since unreachable states are explored. We suggest the use of forward fixpoint reasoning based on the operator Post. We show how all linear temporal logic specifications can be model checked symbolically by forward reasoning. In contrast to backward reasoning, forward reasoning performs computations only on the reachable states.\r\n\r\nHeuristics that improve algorithms for application domains, such as symbolic methods for hardware designs, are useful but not enough to make model checking feasible on industrial designs. Currently, exhaustive state exploration is possible only on designs with about 50-100 boolean state variables. Assume-guarantee verification attempts to combat the state explosion problem by using the principle of "divide and conquer," where the components of the implementation are analyzed one at a time. Typically, an implementation component refines its specification only when its inputs are suitably constrained by other components in the implementation. The assume-guarantee principle states that instead of constraining the inputs by implementation components, it is sound to constrain them by the corresponding specification components, which can be significantly smaller. We extend the assume-guarantee proof rule to deal with the case where the specification operates at a coarser time scale than the implementation. Using our model checker Mocha, which implements this methodology, we verify VGI, a parallel DSP processor chip with 64 compute processors each containing approximately 800 state variables and 30K gates.\r\n\r\nOur third contribution is a systematic model checking methodology for verifying the abstract shared-memory interface of sequential consistency on multiprocessor systems with three parameters --number of processors, number of memory locations, and number of data values. Sequential consistency requires that some interleaving of the local temporal orders of read/write events at different processors be a trace of serial memory. Therefore, it suffices to construct a non-interfering serializer that watches and reorders read/write events so that a trace of serial memory is obtained. While in general such a serializer must be unbounded even for fixed values of the parameters --checking sequential consistency is undecidable!-- we show that the paradigmatic class of snoopy cache coherence protocols has finite-state serializers. In order to reduce the arbitrary-parameter problem to the fixed-parameter problem, we develop a novel framework for induction over the number of processors and use the notion of a serializer to reduce the problem of verifying sequential consistency to that of checking language inclusion between finite state machines.","lang":"eng"}],"oa_version":"None","main_file_link":[{"url":"https://www.microsoft.com/en-us/research/publication/algorithms-methodology-scalable-model-checking/"}],"publisher":"University of California, Berkeley","month":"10","publication_status":"published","year":"1999","degree_awarded":"PhD","language":[{"iso":"eng"}],"day":"01","page":"1 - 150","date_created":"2018-12-11T12:08:43Z","date_published":"1999-10-01T00:00:00Z","_id":"4411","type":"dissertation","status":"public","date_updated":"2022-09-06T08:07:40Z","citation":{"ista":"Qadeer S. 1999. Algorithms and Methodology for Scalable Model Checking. University of California, Berkeley.","chicago":"Qadeer, Shaz. “Algorithms and Methodology for Scalable Model Checking.” University of California, Berkeley, 1999.","ama":"Qadeer S. Algorithms and Methodology for Scalable Model Checking. 1999:1-150.","apa":"Qadeer, S. (1999). Algorithms and Methodology for Scalable Model Checking. University of California, Berkeley.","short":"S. Qadeer, Algorithms and Methodology for Scalable Model Checking, University of California, Berkeley, 1999.","ieee":"S. Qadeer, “Algorithms and Methodology for Scalable Model Checking,” University of California, Berkeley, 1999.","mla":"Qadeer, Shaz. Algorithms and Methodology for Scalable Model Checking. University of California, Berkeley, 1999, pp. 1–150."},"supervisor":[{"full_name":"Henzinger, Thomas A","orcid":"0000-0002-2985-7724","last_name":"Henzinger","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Bryton","full_name":"Bryton, Robert","first_name":"Robert"},{"last_name":"Steel","full_name":"Steel, John","first_name":"John"}],"user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","extern":"1","article_processing_charge":"No","author":[{"last_name":"Qadeer","full_name":"Qadeer, Shaz","first_name":"Shaz"}],"publist_id":"321","title":"Algorithms and Methodology for Scalable Model Checking"},{"abstract":[{"text":"A {\\em hybrid automaton\\/} consists of a finite automaton interacting with a dynamical system. Hybrid automata are used to model embedded controllers and other systems that consist of interacting discrete and continuous components. A hybrid automaton is {\\em rectangular\\/} if each of its continuous variables~x satisfies a nondeterministic differential equation of the form a≤dxdt≤b, where a and~b are rational constants. Rectangular hybrid automata are particularly useful for the analysis of communication protocols in which local clocks have bounded drift, and for the conservative approximation of systems with more complex continuous behavior. We examine several verification problems on the class of rectangular hybrid automata, including reachability, temporal logic model checking, and controller synthesis. Both dense-time and discrete-time models are considered. We identify subclasses of rectangular hybrid automata for which these problems are decidable and give complexity analyses. An investigation of the structural properties of rectangular hybrid automata is undertaken. One method for proving the decidability of verification problems on infinite-state systems is to find finite quotient systems on which analysis can proceed. Three state-space equivalence relations with strong connections to temporal logic are bisimilarity, similarity, and language equivalence. We characterize the quotient spaces of rectangular hybrid automata with respect to these equivalence relations.","lang":"eng"}],"oa_version":"None","publisher":"Cornell University","month":"01","publication_status":"published","year":"1996","day":"01","language":[{"iso":"eng"}],"date_published":"1996-01-01T00:00:00Z","date_created":"2018-12-11T12:08:45Z","_id":"4419","type":"dissertation","status":"public","supervisor":[{"last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000-0002-2985-7724","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"}],"citation":{"ieee":"P. Kopke, “The Theory of Rectangular Hybrid Automata,” Cornell University, 1996.","short":"P. Kopke, The Theory of Rectangular Hybrid Automata, Cornell University, 1996.","apa":"Kopke, P. (1996). The Theory of Rectangular Hybrid Automata. Cornell University.","ama":"Kopke P. The Theory of Rectangular Hybrid Automata. 1996.","mla":"Kopke, Peter. The Theory of Rectangular Hybrid Automata. Cornell University, 1996.","ista":"Kopke P. 1996. The Theory of Rectangular Hybrid Automata. Cornell University.","chicago":"Kopke, Peter. “The Theory of Rectangular Hybrid Automata.” Cornell University, 1996."},"date_updated":"2022-07-06T15:11:24Z","extern":"1","user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","publist_id":"312","author":[{"first_name":"Peter","last_name":"Kopke","full_name":"Kopke, Peter"}],"article_processing_charge":"No","title":"The Theory of Rectangular Hybrid Automata"},{"supervisor":[{"last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000-0002-2985-7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"}],"date_updated":"2022-06-28T07:30:34Z","citation":{"mla":"Ho, Pei. Automatic Analysis of Hybrid Systems. Cornell University, 1995, pp. 1–188.","short":"P. Ho, Automatic Analysis of Hybrid Systems, Cornell University, 1995.","ieee":"P. Ho, “Automatic analysis of hybrid systems,” Cornell University, 1995.","ama":"Ho P. Automatic analysis of hybrid systems. 1995:1-188.","apa":"Ho, P. (1995). Automatic analysis of hybrid systems. Cornell University.","chicago":"Ho, Pei. “Automatic Analysis of Hybrid Systems.” Cornell University, 1995.","ista":"Ho P. 1995. Automatic analysis of hybrid systems. Cornell University."},"extern":"1","user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","author":[{"first_name":"Pei","last_name":"Ho","full_name":"Ho, Pei"}],"publist_id":"304","article_processing_charge":"No","title":"Automatic analysis of hybrid systems","_id":"4428","type":"dissertation","status":"public","publication_status":"published","degree_awarded":"PhD","year":"1995","day":"01","language":[{"iso":"eng"}],"page":"1 - 188","date_published":"1995-08-01T00:00:00Z","date_created":"2018-12-11T12:08:48Z","abstract":[{"lang":"eng","text":"Hybrid systems are real-time systems that react to both discrete and continuous activities (such as analog signals, time, temperature, and speed). Typical examples of hybrid systems are embedded systems, timing-based communication protocols, and digital circuits at the transistor level. Due to the rapid development of microprocessor technology, hybrid systems directly control much of what we depend on in our daily lives. Consequently, the formal specification and verification of hybrid systems has become an active area of research. This dissertation presents the first general framework for the formal specification and verification of hybrid systems, as well as the first hybrid-system analysis tool--HyTech. The framework consists of a graphical finite-state-machine-like language for modeling hybrid systems, a temporal logic for modeling the requirements of hybrid systems, and a computer procedure that verifies modeled hybrid systems against modeled requirements. The tool HyTech is the implementation of the framework using C++ and Mathematica.\r\n\r\nMore specifically, our hybrid-system modeling language, Hybrid Automata, is an extension of timed automata with discrete and continuous variables whose dynamics are governed by differential equations. Our requirement modeling language, ICTL, is a branching-time temporal logic, and is an extension of TCTL with stop-watch variables. Our verification procedure is a symbolic model-checking procedure that verifies linear hybrid automata against ICTL formulas. To make HyTech more efficient and effective, we use model-checking strategies and abstract operators that can expedite the verification process. To enable HyTech to verify nonlinear hybrid automata, we introduce two translations from nonlinear hybrid automata to linear hybrid automata. We have applied HyTech to analyze more than 30 hybrid-system benchmarks. In this dissertation, we present the application of HyTech to three nontrivial hybrid systems taken from the literature."}],"oa_version":"Published Version","publisher":"Cornell University","oa":1,"main_file_link":[{"url":"https://hdl.handle.net/1813/7193","open_access":"1"}],"month":"08"},{"_id":"4516","status":"public","type":"dissertation","extern":"1","user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","citation":{"mla":"Henzinger, Thomas A. The Temporal Specification and Verification of Real-Time Systems . Stanford University, 1991.","short":"T.A. Henzinger, The Temporal Specification and Verification of Real-Time Systems , Stanford University, 1991.","ieee":"T. A. Henzinger, “The temporal specification and verification of real-time systems ,” Stanford University, 1991.","apa":"Henzinger, T. A. (1991). The temporal specification and verification of real-time systems . Stanford University.","ama":"Henzinger TA. The temporal specification and verification of real-time systems . 1991.","chicago":"Henzinger, Thomas A. “The Temporal Specification and Verification of Real-Time Systems .” Stanford University, 1991.","ista":"Henzinger TA. 1991. The temporal specification and verification of real-time systems . Stanford University."},"date_updated":"2022-02-24T14:12:36Z","title":"The temporal specification and verification of real-time systems ","publist_id":"210","author":[{"orcid":"0000−0002−2985−7724","full_name":"Henzinger, Thomas A","last_name":"Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"}],"article_processing_charge":"No","oa_version":"None","abstract":[{"text":"We extend the specification language of temporal logic, the corresponding verification framework, and the underlying computational model to deal with real-time properties of reactive systems. Semantics We introduce the abstract computational model of timed transition systems as a conservative extension of traditional transition systems qualitative fairness requirements are superseded by quantitative real-time constraints on the transitions. Digital clocks are introduced as observers of continuous real-time behavior. We justify our semantical abstractions by demonstrating that a wide variety of concrete real-time systems can be modeled adequately. Specification We present two conservative extensions of temporal logic that allow for the specification of timing constraints while timed temporal logic provides access to time through a novel kind of time quantifier, metric temporal logic refers to time through time-bounded versions of the temporal operators. We justify our choice of specification languages by developing a general framework for the classification of real-time logics according to their complexity and expressive power. Verification We develop tools for determining if a real-time system that is modeled as a timed transition system meets a specification that is given in timed temporal logic or in metric temporal logic. We present both model-checking algorithms for the automatic verification of finite-state real-time systems and proof methods for the deductive verification of real-time systems.","lang":"eng"}],"month":"08","publisher":"Stanford University","main_file_link":[{"url":"http://pub.ist.ac.at/~tah/Publications/the_temporal_specification_and_verification_of_real-time_systems.pdf"}],"day":"30","language":[{"iso":"eng"}],"year":"1991","publication_status":"published","degree_awarded":"PhD","date_published":"1991-08-30T00:00:00Z","date_created":"2018-12-11T12:09:15Z","page":"295"},{"publisher":"University of East Anglia","month":"01","oa_version":"None","date_created":"2018-12-11T12:08:20Z","date_published":"1979-01-01T00:00:00Z","year":"1979","publication_status":"published","degree_awarded":"PhD","language":[{"iso":"eng"}],"day":"01","type":"dissertation","status":"public","_id":"4337","article_processing_charge":"No","author":[{"first_name":"Nicholas H","id":"4880FE40-F248-11E8-B48F-1D18A9856A87","last_name":"Barton","full_name":"Barton, Nicholas H","orcid":"0000-0002-8548-5240"}],"publist_id":"1694","title":"A hybrid zone in the alpine grasshopper Podisma pedestris","citation":{"short":"N.H. Barton, A Hybrid Zone in the Alpine Grasshopper Podisma Pedestris, University of East Anglia, 1979.","ieee":"N. H. Barton, “A hybrid zone in the alpine grasshopper Podisma pedestris,” University of East Anglia, 1979.","apa":"Barton, N. H. (1979). A hybrid zone in the alpine grasshopper Podisma pedestris. University of East Anglia.","ama":"Barton NH. A hybrid zone in the alpine grasshopper Podisma pedestris. 1979.","mla":"Barton, Nicholas H. A Hybrid Zone in the Alpine Grasshopper Podisma Pedestris. University of East Anglia, 1979.","ista":"Barton NH. 1979. A hybrid zone in the alpine grasshopper Podisma pedestris. University of East Anglia.","chicago":"Barton, Nicholas H. “A Hybrid Zone in the Alpine Grasshopper Podisma Pedestris.” University of East Anglia, 1979."},"date_updated":"2021-12-16T08:04:16Z","user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","extern":"1"}]