@article{2706,
abstract = {The Pauli operator describes the energy of a nonrelativistic quantum particle with spin in a magnetic field and an external potential. Bounds on the sum of the negative eigenvalues are called magnetic Lieb-Thirring (MLT) inequalities. The purpose of this paper is twofold. First, we prove a new MLT inequality in a simple way. Second, we give a short summary of our recent proof of a more refined MLT inequality(8) and we explain the differences between the two results and methods. The main feature of both estimates, compared to earlier results, is that in the large field regime they grow with the optimal (first) power of the strength of the magnetic field. As a byproduct of the method, we also obtain optimal upper bounds on the pointwise density of zero energy eigenfunctions of the Dirac operator.},
author = {László Erdös and Solovej, Jan P},
journal = {Journal of Statistical Physics},
number = {1-4},
pages = {475 -- 506},
publisher = {Springer},
title = {{Magnetic Lieb-Thirring inequalities with optimal dependence on the field strength}},
doi = {10.1023/B:JOSS.0000037216.45270.1d},
volume = {116},
year = {2004},
}
@article{2707,
abstract = {We give a nonrigorous derivation of the nonlinear Boltzmann equation from the Schrödinger evolution of interacting fermions. The argument is based mainly on the assumption that a quasifree initial state satisfies a property called restricted quasifreeness in the weak coupling limit at any later time. By definition, a state is called restricted quasifree if the four-point and the eight-point functions of the state factorize in the same manner as in a quasifree state.},
author = {László Erdös and Salmhofer, Manfred and Yau, Horng-Tzer},
journal = {Journal of Statistical Physics},
number = {1-4},
pages = {367 -- 380},
publisher = {Springer},
title = {{On the quantum Boltzmann equation}},
doi = {10.1023/B:JOSS.0000037224.56191.ed},
volume = {116},
year = {2004},
}
@article{2741,
abstract = {The Pauli operator describes the energy of a nonrelativistic quantum particle with spin 1/2 in a magnetic field and an external potential. A new Lieb-Thirring type inequality on the sum of the negative eigenvalues is presented. The main feature compared to earlier results is that in the large field regime the present estimate grows with the optimal (first) power of the strength of the magnetic field. As a byproduct of the method, we also obtain an optimal upper bound on the pointwise density of zero energy eigenfunctions of the Dirac operator. The main technical tools are: (i) a new localization scheme for the square of the resolvent of a general class of second order elliptic operators; (ii) a geometric construction of a Dirac operator with a constant magnetic field that approximates the original Dirac operator in a tubular neighborhood of a fixed field line. The errors may depend on the regularity of the magnetic field but they are uniform in the field strength.},
author = {László Erdös and Solovej, Jan P},
journal = {Annales Henri Poincare},
number = {4},
pages = {671 -- 741},
publisher = {Birkhäuser},
title = {{Uniform Lieb-Thirring inequality for the three-dimensional Pauli operator with a strong non-homogeneous magnetic field}},
doi = {10.1007/s00023-004-0180-x},
volume = {5},
year = {2004},
}
@article{2742,
abstract = {We consider a system of N weakly interacting fermions with a real analytic pair interaction. We prove that for a general class of initial data there exists a fixed time T such that the difference between the one particle density matrix of this system and the solution of the nonlinear Hartree equation is of order N−1 for any time t⩽T.},
author = {Elgart, Alexander and László Erdös and Schlein, Benjamin and Yau, Horng-Tzer},
journal = {Journal de Mathématiques Pures et Appliquées},
number = {10},
pages = {1241 -- 1273},
publisher = {Elsevier},
title = {{Nonlinear Hartree equation as the mean field limit of weakly coupled fermions}},
doi = {10.1016/j.matpur.2004.03.006},
volume = {83},
year = {2004},
}
@article{2786,
abstract = {Transition to turbulence in pipe flow is one of the most fundamental and longest- standing problems in fluid dynamics. Stability theory suggests that the flow remains laminar for all flow rates, but in practice pipe flow becomes turbulent even at moderate speeds. This transition drastically affects the transport efficiency of mass, momentum, and heat. On the basis of the recent discovery of unstable traveling waves in computational studies of the Navier-Stokes equations and ideas from dynamical systems theory, a model for the transition process has been suggested. We report experimental observation of these traveling waves in pipe flow, confirming the proposed transition scenario and suggesting that the dynamics associated with these unstable states may indeed capture the nature of fluid turbulence.},
author = {Björn Hof and van Doorne, Casimir W and Westerweel, Jerry and Nieuwstadt, Frans T and Faisst, Holger and Eckhardt, Bruno and Wedin, Håkan and Kersweli, Richard R and Waleffe, Fabian},
journal = {Science},
number = {5690},
pages = {1594 -- 1598},
publisher = {American Association for the Advancement of Science},
title = {{Experimental observation of nonlinear traveling waves in turbulent pipe flow}},
doi = {10.1126/science.1100393},
volume = {305},
year = {2004},
}
@article{2787,
abstract = {The results of experimental and numerical investigations of the onset of oscillatory convection in a sidewall heated rectangular cavity of molten gallium are reported. Detailed comparisons are made between experimental observations and calculations from numerical simulations of a three-dimensional Boussinesq model. The onset of time-dependence takes place through supercritical Hopf bifurcations and the loci of critical points in the (Gr, Pr)-plane are qualitatively similar with excellent agreement between the frequencies of the oscillatory motion. This provides a severe test of the control of the experiment since the mode of oscillation is extremely sensitive to imperfections. Detailed numerical investigations reveal that there are a pair of Hopf bifurcations which exist on two asymmetric states which themselves arise at a subcritical pitchfork from the symmetric state. There is no evidence for this in the experiment and this qualitative difference is attributed to non-Boussinesq perturbations which increase with Gr. However, the antisymmetric spatial structure of the oscillatory state is robust and is present in both the experiment and the numerical model. Moreover, the detailed analysis of the numerical results reveals the origins of the oscillatory instability.},
author = {Björn Hof and Juel, Anne and Zhao, Li and Henry, Daniel and Ben Hadid, Hamda and Mullin, Tom P},
journal = {Journal of Fluid Mechanics},
pages = {391 -- 413},
publisher = {Cambridge University Press},
title = {{On the onset of oscillatory convection in molten gallium}},
doi = {10.1017/S0022112004000527},
volume = {515},
year = {2004},
}
@article{4172,
abstract = {During vertebrate gastrulation, a relatively limited number of blastodermal cells undergoes a stereotypical set of cellular movements that leads to formation of the three germ layers: ectoderm, mesoderm and endoderm. Gastrulation, therefore, provides a unique developmental system in which to study cell movements in vivo in a fairly simple cellular context. Recent advances have been made in elucidating the cellular and molecular mechanisms that underlie cell movements during zebrafish gastrulation. These findings can be compared with observations made in other model systems to identify potential general mechanisms of cell migration during development.},
author = {Montero, Juan-Antonio and Heisenberg, Carl-Philipp},
journal = {Trends in Cell Biology},
number = {11},
pages = {620 -- 627},
publisher = {Cell Press},
title = {{Gastrulation dynamics: cells move into focus}},
doi = {10.1016/j.tcb.2004.09.008},
volume = {14},
year = {2004},
}
@article{4224,
abstract = {Developing cells acquire positional information by reading the graded distribution of morphogens. In Drosophila, the Dpp morphogen forms a long-range concentration gradient by spreading from a restricted source in the developing wing. It has been assumed that Dpp spreads by extracellular diffusion. Under this assumption, the main role of endocytosis in gradient formation is to downregulate receptors at the cell surface. These surface receptors bind to the ligand and thereby interfere with its long-range movement. Recent experiments indicate that Dpp spreading is mediated by Dynamin-dependent endocytosis in the target tissue, suggesting that extracellular diffusion alone cannot account for Dpp dispersal. Here, we perform a theoretical study of a model for morphogen spreading based on extracellular diffusion, which takes into account receptor binding and trafficking. We compare profiles of ligand and surface receptors obtained in this model with experimental data. To this end, we monitored directly the pool of surface receptors and extracellular Dpp with specific antibodies. We conclude that current models considering pure extracellular diffusion cannot explain the observed role of endocytosis during Dpp long-range movement.},
author = {Kruse, Karsten and Pantazis, Periklis and Bollenbach, Tobias and Julicher, Frank and Gonzalez-Gaitan, Marcos},
journal = {Development},
number = {19},
pages = {4843 -- 4856},
publisher = {Company of Biologists},
title = {{Dpp gradient formation by dynamin-dependent endocytosis: receptor trafficking and the diffusion model}},
doi = {10.1242/dev.01335},
volume = {131},
year = {2004},
}
@inbook{4230,
author = {Harold Vladar and Cipriani, Roberto and Scharifker, Benjamin and Bubis, Jose},
booktitle = {Life in the Universe From the Miller Experiment to the Search for Life on Other Worlds},
editor = {Hanslmeier,A. and Kempe,S. and Seckbach,J.},
pages = {83 -- 87},
publisher = {Springer},
title = {{A mechanism for the prebiotic emergence of proteins}},
year = {2004},
}
@phdthesis{4236,
author = {de Vladar,Harold Paul},
publisher = {Centro de estudios avazados, IVIC},
title = {{Métodos no lineales y sus aplicaciones en dinámicas aleatorias de poblaciones celulares}},
doi = {3810},
year = {2004},
}
@article{4238,
abstract = {The dynamical basis of tumoral growth has been controversial. Many models have been proposed to explain cancer development. The descriptions employ exponential, potential, logistic or Gompertzian growth laws. Some of these models are concerned with the interaction between cancer and the immunological, system. Among other properties, these models are concerned with the microscopic behavior of tumors and the emergence of cancer. We propose a modification of a previous model by Stepanova, which describes the specific immunological response against cancer. The modification consists of the substitution of a Gompertian law for the exponential rate used for tumoral growth. This modification is motivated by the numerous works confirming that Gompertz's equation correctly describes solid tumor growth. The modified model predicts that near zero, tumors always tend to grow. Immunological contraposition never suffices to induce a complete regression of the tumor. Instead, a stable microscopic equilibrium between cancer and immunological activity can be attained. In other words, our model predicts that the theory of immune surveillance is plausible. A macroscopic equilibrium in which the system develops cancer is also possible. In this case, immunological activity is depleted. This is consistent with the phenomena of cancer tolerance. Both equilibrium points can coexist or can exist without the other. In all cases the fixed point at zero tumor size is unstable. Since immunity cannot induce a complete tumor regression, a therapy is required. We include constant-dose therapies and show that they are insufficient. Final levels of immunocompetent cells and tumoral cells are finite, thus post-treatment regrowth of the tumor is certain. We also evaluate late-intensification therapies which are successful. They induce an asymptotic regression to zero tumor size. Immune response is also suppressed by the therapy, and thus plays a negligible role in the remission. We conclude that treatment evaluation should be successful without taking into account immunological effects. (C) 2003 Elsevier Ltd. All rights reserved.},
author = {de Vladar,Harold Paul and González,J. A},
journal = {Journal of Theoretical Biology},
number = {3},
pages = {335 -- 348},
publisher = {Elsevier},
title = {{Dynamic response of cancer under the influence of immunological activity and therapy}},
doi = {3801},
volume = {227},
year = {2004},
}
@inbook{4239,
author = {Harold Vladar and Cipriani, Roberto and Scharifker, Benjamin and Bubis, Jose},
booktitle = {Life in the Universe From the Miller Experiment to the Search for Life on Other Worlds},
editor = {Seckbach,J. and Chela-Flores,J. and Owen,T. and Raulin,F.},
pages = {83 -- 87},
publisher = {Springer},
title = {{A Mechanism for the Prebiotic Emergence of Proteins}},
doi = {3807},
volume = {7},
year = {2004},
}
@article{4253,
abstract = {We consider a single genetic locus which carries two alleles, labelled P and Q. This locus experiences selection and mutation. It is linked to a second neutral locus with recombination rate r. If r = 0, this reduces to the study of a single selected locus. Assuming a Moran model for the population dynamics, we pass to a diffusion approximation and, assuming that the allele frequencies at the selected locus have reached stationarity, establish the joint generating function for the genealogy of a sample from the population and the frequency of the P allele. In essence this is the joint generating function for a coalescent and the random background in which it evolves. We use this to characterize, for the diffusion approximation, the probability of identity in state at the neutral locus of a sample of two individuals (whose type at the selected locus is known) as solutions to a system of ordinary differential equations. The only subtlety is to find the boundary conditions for this system. Finally, numerical examples are presented that illustrate the accuracy and predictions of the diffusion approximation. In particular, a comparison is made between this approach and one in which the frequencies at the selected locus are estimated by their value in the absence of fluctuations and a classical structured coalescent model is used.},
author = {Nicholas Barton and Etheridge, Alison M and Sturm, Anja K},
journal = {Annals of Applied Probability},
number = {2},
pages = {754 -- 785},
publisher = {Institute of Mathematical Statistics},
title = {{Coalescence in a Random Background}},
volume = {14},
year = {2004},
}
@inproceedings{4372,
author = {Maler, Oded and Dejan Nickovic},
pages = {152 -- 166},
publisher = {Springer},
title = {{Monitoring Temporal Properties of Continuous Signals}},
doi = {1572},
year = {2004},
}
@phdthesis{4424,
abstract = {The enormous cost and ubiquity of software errors necessitates the need for techniques and tools that can precisely analyze large systems and prove that they meet given specifications, or if they don't, return counterexample behaviors showing how the system fails. Recent advances in model checking, decision procedures, program analysis and type systems, and a shift of focus to partial specifications common to several systems (e.g., memory safety and race freedom) have resulted in several practical verification methods. However, these methods are either precise or they are scalable, depending on whether they track the values of variables or only a fixed small set of dataflow facts (e.g., types), and are usually insufficient for precisely verifying large programs.
We describe a new technique called Lazy Abstraction (LA) which achieves both precision and scalability by localizing the use of precise information. LA automatically builds, explores and refines a single abstract model of the program in a way that different parts of the model exhibit different degrees of precision, namely just enough to verify the desired property. The algorithm automatically mines the information required by partitioning mechanical proofs of unsatisfiability of spurious counterexamples into Craig Interpolants. For multithreaded systems, we give a new technique based on analyzing the behavior of a single thread executing in a context which is an abstraction of the other (arbitrarily many) threads. We define novel context models and show how to automatically infer them and analyze the full system (thread + context) using LA.
LA is implemented in BLAST. We have run BLAST on Windows and Linux Device Drivers to verify API conformance properties, and have used it to find (or guarantee the absence of) data races in multithreaded Networked Embedded Systems (NESC) applications. BLAST is able to prove the absence of races in several cases where earlier methods, which depend on lock-based synchronization, fail.},
author = {Jhala, Ranjit},
pages = {1 -- 165},
publisher = {University of California, Berkeley},
title = {{Program verification by lazy abstraction}},
year = {2004},
}
@inproceedings{4445,
abstract = {We present a type system for E code, which is an assembly language that manages the release, interaction, and termination of real-time tasks. E code specifies a deadline for each task, and the type system ensures that the deadlines are path-insensitive. We show that typed E programs allow, for given worst-case execution times of tasks, a simple schedulability analysis. Moreover, the real-time programming language Giotto can be compiled into typed E~code. This shows that typed E~code identifies an easily schedulable yet expressive class of real-time programs. We have extended the Giotto compiler to generate typed E code, and enabled the run-time system for E code to perform a type and schedulability check before executing the code.},
author = {Thomas Henzinger and Kirsch, Christoph M},
pages = {104 -- 113},
publisher = {ACM},
title = {{A typed assembly language for real-time programs}},
doi = {10.1145/1017753.1017774},
year = {2004},
}
@inproceedings{4458,
abstract = {The success of model checking for large programs depends crucially on the ability to efficiently construct parsimonious abstractions. A predicate abstraction is parsimonious if at each control location, it specifies only relationships between current values of variables, and only those which are required for proving correctness. Previous methods for automatically refining predicate abstractions until sufficient precision is obtained do not systematically construct parsimonious abstractions: predicates usually contain symbolic variables, and are added heuristically and often uniformly to many or all control locations at once. We use Craig interpolation to efficiently construct, from a given abstract error trace which cannot be concretized, a parsominous abstraction that removes the trace. At each location of the trace, we infer the relevant predicates as an interpolant between the two formulas that define the past and the future segment of the trace. Each interpolant is a relationship between current values of program variables, and is relevant only at that particular program location. It can be found by a linear scan of the proof of infeasibility of the trace.We develop our method for programs with arithmetic and pointer expressions, and call-by-value function calls. For function calls, Craig interpolation offers a systematic way of generating relevant predicates that contain only the local variables of the function and the values of the formal parameters when the function was called. We have extended our model checker Blast with predicate discovery by Craig interpolation, and applied it successfully to C programs with more than 130,000 lines of code, which was not possible with approaches that build less parsimonious abstractions.},
author = {Thomas Henzinger and Jhala, Ranjit and Majumdar, Ritankar S and McMillan, Kenneth L},
pages = {232 -- 244},
publisher = {ACM},
title = {{Abstractions from proofs}},
doi = {10.1145/964001.964021},
year = {2004},
}
@inproceedings{4459,
abstract = {Software model checking has been successful for sequential programs, where predicate abstraction offers suitable models, and counterexample-guided abstraction refinement permits the automatic inference of models. When checking concurrent programs, we need to abstract threads as well as the contexts in which they execute. Stateless context models, such as predicates on global variables, prove insufficient for showing the absence of race conditions in many examples. We therefore use richer context models, which combine (1) predicates for abstracting data state, (2) control flow quotients for abstracting control state, and (3) counters for abstracting an unbounded number of threads. We infer suitable context models automatically by a combination of counterexample-guided abstraction refinement, bisimulation minimization, circular assume-guarantee reasoning, and parametric reasoning about an unbounded number of threads. This algorithm, called CIRC, has been implemented in BLAST and succeeds in checking many examples of NESC code for data races. In particular, BLAST proves the absence of races in several cases where previous race checkers give false positives.},
author = {Thomas Henzinger and Jhala, Ranjit and Majumdar, Ritankar S},
pages = {1 -- 13},
publisher = {ACM},
title = {{Race checking by context inference}},
doi = {10.1145/996841.996844},
year = {2004},
}
@inbook{4461,
abstract = {One of the central axioms of extreme programming is the disciplined use of regression testing during stepwise software development. Due to recent progress in software model checking, it has become possible to supplement this process with automatic checks for behavioral safety properties of programs, such as conformance with locking idioms and other programming protocols and patterns. For efficiency reasons, all checks must be incremental, i.e., they must reuse partial results from previous checks in order to avoid all unnecessary repetition of expensive verification tasks. We show that the lazy-abstraction algorithm, and its implementation in Blast, can be extended to support the fully automatic and incremental checking of temporal safety properties during software development.},
author = {Thomas Henzinger and Jhala, Ranjit and Majumdar, Ritankar S and Sanvido, Marco A},
booktitle = {Verification: Theory and Practice},
pages = {332 -- 358},
publisher = {Springer},
title = {{Extreme model checking}},
doi = {10.1007/978-3-540-39910-0_16},
volume = {2772},
year = {2004},
}
@inproceedings{4525,
abstract = {We present a new high-level programming language, called xGiotto, for programming applications with hard real-time constraints. Like its predecessor, xGiotto is based on the LET (logical execution time) assumption: the programmer specifies when the outputs of a task become available, and the compiler checks if the specification can be implemented on a given platform. However, while the predecessor language xGiotto was purely time-triggered, xGiotto accommodates also asynchronous events. Indeed, through a mechanism called event scoping, events are the main structuring principle of the new language. The xGiotto compiler and run-time system implement event scoping through a tree-based event filter. The compiler also checks programs for determinism (absence of race conditions).},
author = {Ghosal, Arkadeb and Thomas Henzinger and Kirsch, Christoph M and Sanvido, Marco A},
pages = {167 -- 170},
publisher = {Springer},
title = {{Event-driven programming with logical execution times}},
doi = {10.1007/978-3-540-24743-2_24},
volume = {2993},
year = {2004},
}