@misc{9707, abstract = {Branching morphogenesis of the epithelial ureteric bud forms the renal collecting duct system and is critical for normal nephron number, while low nephron number is implicated in hypertension and renal disease. Ureteric bud growth and branching requires GDNF signaling from the surrounding mesenchyme to cells at the ureteric bud tips, via the Ret receptor tyrosine kinase and coreceptor Gfrα1; Ret signaling up-regulates transcription factors Etv4 and Etv5, which are also critical for branching. Despite extensive knowledge of the genetic control of these events, it is not understood, at the cellular level, how renal branching morphogenesis is achieved or how Ret signaling influences epithelial cell behaviors to promote this process. Analysis of chimeric embryos previously suggested a role for Ret signaling in promoting cell rearrangements in the nephric duct, but this method was unsuited to study individual cell behaviors during ureteric bud branching. Here, we use Mosaic Analysis with Double Markers (MADM), combined with organ culture and time-lapse imaging, to trace the movements and divisions of individual ureteric bud tip cells. We first examine wild-type clones and then Ret or Etv4 mutant/wild-type clones in which the mutant and wild-type sister cells are differentially and heritably marked by green and red fluorescent proteins. We find that, in normal kidneys, most individual tip cells behave as self-renewing progenitors, some of whose progeny remain at the tips while others populate the growing UB trunks. In Ret or Etv4 MADM clones, the wild-type cells generated at a UB tip are much more likely to remain at, or move to, the new tips during branching and elongation, while their Ret−/− or Etv4−/− sister cells tend to lag behind and contribute only to the trunks. By tracking successive mitoses in a cell lineage, we find that Ret signaling has little effect on proliferation, in contrast to its effects on cell movement. Our results show that Ret/Etv4 signaling promotes directed cell movements in the ureteric bud tips, and suggest a model in which these cell movements mediate branching morphogenesis.}, author = {Riccio, Paul and Cebrián, Christina and Zong, Hui and Hippenmeyer, Simon and Costantini, Frank}, publisher = {Dryad}, title = {{Data from: Ret and Etv4 promote directed movements of progenitor cells during renal branching morphogenesis}}, doi = {10.5061/dryad.pk16b}, year = {2017}, } @misc{9844, author = {Nikolic, Nela and Schreiber, Frank and Dal Co, Alma and Kiviet, Daniel and Bergmiller, Tobias and Littmann, Sten and Kuypers, Marcel and Ackermann, Martin}, publisher = {Public Library of Science}, title = {{Source data for figures and tables}}, doi = {10.1371/journal.pgen.1007122.s018}, year = {2017}, } @article{12611, abstract = {We investigate the energy balance and ablation regimes of glaciers in high-elevation, dry environments using glaciometeorological data collected on six glaciers in the semiarid Andes of North-Central Chile (29–34°S, 3127–5324 m). We use a point-scale physically based energy balance (EB) model and an enhanced Temperature-Index (ETI) model that calculates melt rates only as a function of air temperature and net shortwave radiation. At all sites, the largest energy inputs are net shortwave and incoming longwave radiation, which are controlled by surface albedo and elevation, respectively. Turbulent fluxes cancel each other out at the lower sites, but as elevation increases, cold, dry and wind-exposed conditions increase the magnitude of negative latent heat fluxes, associated with large surface sublimation rates. In midsummer (January), ablation rates vary from 67.9 mm w.e. d−1 at the lowest site (∼100% corresponding to melt), to 2.3 mm w.e. d−1 at the highest site (>85% corresponding to surface sublimation). At low-elevation, low-albedo, melt-dominated sites, the ETI model correctly reproduces melt using a large range of possible parameters, but both the performance and parameter transferability decrease with elevation for two main reasons: (i) the air temperature threshold approach for melt onset does not capture the diurnal variability of melt in cold and strong irradiated environments and (ii) energy losses decrease the correlation between melt and net shortwave radiation. We summarize our results by means of an elevation profile of ablation components that can be used as reference in future studies of glacier ablation in the semiarid Andes.}, author = {Ayala, A. and Pellicciotti, Francesca and MacDonell, S. and McPhee, J. and Burlando, P.}, issn = {0043-1397}, journal = {Water Resources Research}, keywords = {Water Science and Technology}, number = {7}, pages = {5601--5625}, publisher = {American Geophysical Union}, title = {{Patterns of glacier ablation across North-Central Chile: Identifying the limits of empirical melt models under sublimation-favorable conditions}}, doi = {10.1002/2016wr020126}, volume = {53}, year = {2017}, } @article{12612, abstract = {Supraglacial ponds play a key role in absorbing atmospheric energy and directing it to the ice of debris-covered glaciers, but the spatial and temporal distribution of these features is not well documented. We analyse 172 Landsat TM/ETM+ scenes for the period 1999–2013 to identify thawed supraglacial ponds for the debris-covered tongues of five glaciers in the Langtang Valley of Nepal. We apply an advanced atmospheric correction routine (Landcor/6S) and use band ratio and image morphological techniques to identify ponds and validate our results with 2.5 m Cartosat-1 observations. We then characterize the spatial, seasonal and interannual patterns of ponds. We find high variability in pond incidence between glaciers (May–October means of 0.08–1.69% of debris area), with ponds most frequent in zones of low surface gradient and velocity. The ponds show pronounced seasonality, appearing in the pre-monsoon as snow melts, peaking at the monsoon onset at 2% of debris-covered area, then declining in the post-monsoon as ponds drain or freeze. Ponds are highly recurrent and persistent, with 40.5% of pond locations occurring for multiple years. Rather than a trend in pond cover over the study period, we find high interannual variability for each glacier after controlling for seasonality.}, author = {MILES, EVAN S. and WILLIS, IAN C. and ARNOLD, NEIL S. and STEINER, JAKOB and Pellicciotti, Francesca}, issn = {1727-5652}, journal = {Journal of Glaciology}, keywords = {Earth-Surface Processes}, number = {237}, pages = {88--105}, publisher = {Cambridge University Press}, title = {{Spatial, seasonal and interannual variability of supraglacial ponds in the Langtang Valley of Nepal, 1999–2013}}, doi = {10.1017/jog.2016.120}, volume = {63}, year = {2017}, } @article{12610, abstract = {The hydrological systems of heavily-downwasted debris-covered glaciers differ from those of clean-ice glaciers due to the hummocky surface and debris mantle of such glaciers, leading to a relatively limited understanding of drainage pathways. Supraglacial ponds represent sinks within the discontinuous supraglacial drainage system, and occasionally drain englacially. To assess pond dynamics, we made pond water level measurements on Lirung Glacier, Nepal, during May and October of 2013 and 2014. Simultaneously, aerial, satellite, and terrestrial orthoimages and digital elevation models were obtained, providing snapshots of the ponds and their surroundings. We performed a DEM-based analysis of the glacier's closed surface catchments to identify surface drainage pathways and englacial drainage points, and compared this to field observations of surface and near-surface water flow. The total ponded area was higher in the pre-monsoon than post-monsoon, with individual ponds filling and draining seasonally associated with the surface exposure of englacial conduit segments. We recorded four pond drainage events, all of which occurred gradually (duration of weeks), observed diurnal fluctuations indicative of varying water supply and outflow discharge, and we documented instances of interaction between distant ponds. The DEM drainage analysis identified numerous sinks >3 m in depth across the glacier surface, few of which exhibited ponds (23%), while the field survey highlighted instances of surface water only explicable via englacial routes. Taken together, our observations provide evidence for widespread supraglacial-englacial connectivity of meltwater drainage paths. Results suggest that successive englacial conduit collapse events, themselves likely driven by supraglacial pond drainage, cause the glacier surface drainage system to evolve into a configuration following relict englacial conduit systems. Within this system, ponds form in depressions of reduced drainage efficiency and link the supraglacial and englacial drainage networks.}, author = {Miles, Evan S. and Steiner, Jakob and Willis, Ian and Buri, Pascal and Immerzeel, Walter W. and Chesnokova, Anna and Pellicciotti, Francesca}, issn = {2296-6463}, journal = {Frontiers in Earth Science}, keywords = {General Earth and Planetary Sciences}, publisher = {Frontiers Media}, title = {{Pond dynamics and supraglacial-englacial connectivity on debris-covered Lirung Glacier, Nepal}}, doi = {10.3389/feart.2017.00069}, volume = {5}, year = {2017}, } @article{12609, abstract = {Previous estimates of melt and surface sublimation on glaciers of the subtropical semiarid Andes (29–34°S) have been obtained at few specific locations, but it is not clear how ablation components vary across the entire extent of a glacier in this dry environment. Here, we simulate the distributed energy and mass balance of Juncal Norte Glacier (33°S) during a 2-month summer period. Forcing fields of near-surface air temperature and wind speed are generated using two methods accounting for the main physical processes that shape their spatial variations. Simulated meteorological variables and ablation agree well with observations on the glacier tongue and reveal complex patterns of energy and mass fluxes. Ablation decreases from 70 mm w.e. d−1 at the low-albedo glacier terminus (~3000 m), where almost 100% of total ablation corresponds to melt, to <5 mm w.e. d−1 at wind-exposed, strong-radiated sites above 5500 m, where surface sublimation represents >75% of total ablation. Our simulations provide the first glacier-scale estimates of ablation components on a glacier in the study region and better reproduce the observed and expected spatial variations of melt and surface sublimation, in comparison with more simple assumptions, such as linear gradients and uniform wind speeds.}, author = {AYALA, A. and Pellicciotti, Francesca and PELEG, N. and BURLANDO, P.}, issn = {1727-5652}, journal = {Journal of Glaciology}, keywords = {Earth-Surface Processes}, number = {241}, pages = {803--822}, publisher = {Cambridge University Press}, title = {{Melt and surface sublimation across a glacier in a dry environment: distributed energy-balance modelling of Juncal Norte Glacier, Chile}}, doi = {10.1017/jog.2017.46}, volume = {63}, year = {2017}, } @article{12608, abstract = {The spatio-temporal distribution of air temperature over mountain glaciers can demonstrate complex patterns, yet it is often represented simplistically using linear vertical temperature gradients (VTGs) extrapolated from off-glacier locations. We analyse a network of centreline and lateral air temperature observations at Tsanteleina Glacier, Italy, during summer 2015. On average, VTGs are steep (<−0.0065 °C m−1), but they are shallow under warm ambient conditions when the correlation between air temperature and elevation becomes weaker. Published along-flowline temperature distribution methods explain centreline observations well, including warming on the lower glacier tongue, but cannot estimate lateral temperature variability. Application of temperature distribution methods improves simulation of melt rates (RMSE) in an energy-balance model by up to 36% compared to the environmental lapse rate extrapolated from an off-glacier station. However, results suggest that model parameters are not easily transferable to glaciers with a small fetch without recalibration. Such methods have potential to improve estimates of temperature across a glacier, but their parameter transferability should be further linked to the glacier and atmospheric characteristics. Furthermore, ‘cold spots’, which can be >2°C cooler than expected for their elevation, whose occurrence is not predicted by the temperature distribution models, are identified at one-quarter of the measurement sites.}, author = {SHAW, THOMAS E. and BROCK, BEN W. and AYALA, ÁLVARO and RUTTER, NICK and Pellicciotti, Francesca}, issn = {1727-5652}, journal = {Journal of Glaciology}, keywords = {Earth-Surface Processes}, number = {242}, pages = {973--988}, publisher = {Cambridge University Press}, title = {{Centreline and cross-glacier air temperature variability on an Alpine glacier: Assessing temperature distribution methods and their influence on melt model calculations}}, doi = {10.1017/jog.2017.65}, volume = {63}, year = {2017}, } @inproceedings{12905, author = {Schlögl, Alois and Kiss, Janos}, booktitle = {AHPC17 – Austrian HPC Meeting 2017}, location = {Grundlsee, Austria}, pages = {28}, publisher = {FSP Scientific Computing}, title = {{Scientific Computing at IST Austria}}, year = {2017}, } @inproceedings{13160, abstract = {Transforming deterministic ω -automata into deterministic parity automata is traditionally done using variants of appearance records. We present a more efficient variant of this approach, tailored to Rabin automata, and several optimizations applicable to all appearance records. We compare the methods experimentally and find out that our method produces smaller automata than previous approaches. Moreover, the experiments demonstrate the potential of our method for LTL synthesis, using LTL-to-Rabin translators. It leads to significantly smaller parity automata when compared to state-of-the-art approaches on complex formulae.}, author = {Kretinsky, Jan and Meggendorfer, Tobias and Waldmann, Clara and Weininger, Maximilian}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems}, isbn = {9783662545768}, issn = {1611-3349}, location = {Uppsala, Sweden}, pages = {443--460}, publisher = {Springer}, title = {{Index appearance record for transforming Rabin automata into parity automata}}, doi = {10.1007/978-3-662-54577-5_26}, volume = {10205}, year = {2017}, } @article{13381, abstract = {Self-assembly of inorganic nanoparticles has been used to prepare hundreds of different colloidal crystals, but almost invariably with the restriction that the particles must be densely packed. Here, we show that non–close-packed nanoparticle arrays can be fabricated through the selective removal of one of two components comprising binary nanoparticle superlattices. First, a variety of binary nanoparticle superlattices were prepared at the liquid-air interface, including several arrangements that were previously unknown. Molecular dynamics simulations revealed the particular role of the liquid in templating the formation of superlattices not achievable through self-assembly in bulk solution. Second, upon stabilization, all of these binary superlattices could be transformed into distinct “nanoallotropes”—nanoporous materials having the same chemical composition but differing in their nanoscale architectures.}, author = {Udayabhaskararao, Thumu and Altantzis, Thomas and Houben, Lothar and Coronado-Puchau, Marc and Langer, Judith and Popovitz-Biro, Ronit and Liz-Marzán, Luis M. and Vuković, Lela and Král, Petr and Bals, Sara and Klajn, Rafal}, issn = {1095-9203}, journal = {Science}, keywords = {Multidisciplinary}, number = {6362}, pages = {514--518}, publisher = {American Association for the Advancement of Science}, title = {{Tunable porous nanoallotropes prepared by post-assembly etching of binary nanoparticle superlattices}}, doi = {10.1126/science.aan6046}, volume = {358}, year = {2017}, } @article{13380, abstract = {Although dissipative self-assembly is ubiquitous in nature, where it gives rise to structures and functions critical to life, examples of artificial systems featuring this mode of self-assembly are rare. Here, we identify the presence of ephemeral assemblies during seeded growth of gold nanoparticles. In this process, hydrazine reduces Au(III) ions, which attach to the existing nanoparticles “seeds”. The attachment is accompanied by a local increase in the concentration of a surfactant, which therefore forms a bilayer on nanoparticle surfaces, inducing their assembly. The resulting aggregates gradually disassemble as the surfactant concentration throughout the solution equilibrates. The lifetimes of the out-of-equilibrium aggregates depend on and can be controlled by the size of the constituent nanoparticles. We demonstrate the utility of our out-of-equilibrium aggregates to form transient reflective coatings on polar surfaces.}, author = {Sawczyk, Michał and Klajn, Rafal}, issn = {1520-5126}, journal = {Journal of the American Chemical Society}, keywords = {Colloid and Surface Chemistry, Biochemistry, General Chemistry, Catalysis}, number = {49}, pages = {17973--17978}, publisher = {American Chemical Society}, title = {{Out-of-equilibrium aggregates and coatings during seeded growth of metallic nanoparticles}}, doi = {10.1021/jacs.7b09111}, volume = {139}, year = {2017}, } @article{13383, abstract = {Two novel donor–acceptor Stenhouse adducts (DASAs) featuring the catechol moiety were synthesized and characterized. Both compounds bind strongly to the surfaces of magnetite nanoparticles. An adrenaline-derived DASA renders the particles insoluble in all common solvents, likely because of poor solvation of the zwitterionic isomer generated on the nanoparticle surfaces. Well-soluble nanoparticles were successfully obtained using dopamine-derived DASA equipped with a long alkyl chain. Upon its attachment to nanoparticles, this DASA undergoes an irreversible decoloration reaction owing to the formation of the zwitterionic form. The reaction follows first-order kinetics and proceeds more rapidly on large nanoparticles. Interestingly, decoloration can be suppressed in the presence of free DASA molecules in solution or at high nanoparticle concentrations.}, author = {Ahrens, Johannes and Bian, Tong and Vexler, Tom and Klajn, Rafal}, issn = {2367-0932}, journal = {ChemPhotoChem}, keywords = {Organic Chemistry, Physical and Theoretical Chemistry, Analytical Chemistry}, number = {5}, pages = {230--236}, publisher = {Wiley}, title = {{Irreversible bleaching of donor-acceptor stenhouse adducts on the surfaces of magnetite nanoparticles}}, doi = {10.1002/cptc.201700009}, volume = {1}, year = {2017}, } @article{13384, abstract = {Although methane is a volatile gas, it can be efficiently trapped in ice, which can then be readily set on fire. Beyond the curiosity of this “burning ice,” caged methane is of great importance as one of the world's largest natural gas resources. In these materials, known as clathrates, methane molecules are tightly bound in nanometer-sized, regularly interspaced cages. Other inorganic materials, such as the silica mineral chibaite, can similarly encapsulate methane and higher hydrocarbons. Simple organic compounds have also been found to trap various organic molecules upon crystallization.}, author = {Samanta, Dipak and Klajn, Rafal}, issn = {1095-9203}, journal = {Science}, keywords = {Multidisciplinary}, number = {6328}, pages = {912--912}, publisher = {American Association for the Advancement of Science}, title = {{Clathrates grow up}}, doi = {10.1126/science.aam7927}, volume = {355}, year = {2017}, } @article{13382, author = {van Esch, Jan H. and Klajn, Rafal and Otto, Sijbren}, issn = {1460-4744}, journal = {Chemical Society Reviews}, keywords = {General Chemistry}, number = {18}, pages = {5474--5475}, publisher = {Royal Society of Chemistry}, title = {{Chemical systems out of equilibrium}}, doi = {10.1039/c7cs90088k}, volume = {46}, year = {2017}, } @article{13477, abstract = {Most massive stars, the progenitors of core-collapse supernovae, are in close binary systems and may interact with their companion through mass transfer or merging. We undertake a population synthesis study to compute the delay-time distribution of core-collapse supernovae, that is, the supernova rate versus time following a starburst, taking into account binary interactions. We test the systematic robustness of our results by running various simulations to account for the uncertainties in our standard assumptions. We find that a significant fraction, 15+9-8%, of core-collapse supernovae are “late”, that is, they occur 50–200 Myr after birth, when all massive single stars have already exploded. These late events originate predominantly from binary systems with at least one, or, in most cases, with both stars initially being of intermediate mass (4–8 M⊙). The main evolutionary channels that contribute often involve either the merging of the initially more massive primary star with its companion or the engulfment of the remaining core of the primary by the expanding secondary that has accreted mass at an earlier evolutionary stage. Also, the total number of core-collapse supernovae increases by 14+15-14% because of binarity for the same initial stellar mass. The high rate implies that we should have already observed such late core-collapse supernovae, but have not recognized them as such. We argue that φ Persei is a likely progenitor and that eccentric neutron star – white dwarf systems are likely descendants. Late events can help explain the discrepancy in the delay-time distributions derived from supernova remnants in the Magellanic Clouds and extragalactic type Ia events, lowering the contribution of prompt Ia events. We discuss ways to test these predictions and speculate on the implications for supernova feedback in simulations of galaxy evolution.}, author = {Zapartas, E. and de Mink, S. E. and Izzard, R. G. and Yoon, S.-C. and Badenes, C. and Götberg, Ylva Louise Linsdotter and de Koter, A. and Neijssel, C. J. and Renzo, M. and Schootemeijer, A. and Shrotriya, T. S.}, issn = {1432-0746}, journal = {Astronomy & Astrophysics}, keywords = {Space and Planetary Science, Astronomy and Astrophysics}, number = {A&A}, publisher = {EDP Sciences}, title = {{Delay-time distribution of core-collapse supernovae with late events resulting from binary interaction}}, doi = {10.1051/0004-6361/201629685}, volume = {601}, year = {2017}, } @article{13476, abstract = {Understanding ionizing fluxes of stellar populations is crucial for various astrophysical problems including the epoch of reionization. Short-lived massive stars are generally considered as the main stellar sources. We examine the potential role of less massive stars that lose their envelope through interaction with a binary companion. Here, we focus on the role of metallicity (Z). For this purpose we used the evolutionary code MESA and created tailored atmosphere models with the radiative transfer code CMFGEN. We show that typical progenitors, with initial masses of 12 M⊙, produce hot and compact stars (~ 4 M⊙, 60–80 kK, ~1 R⊙). These stripped stars copiously produce ionizing photons, emitting 60–85% and 30–60% of their energy as HI and HeI ionizing radiation, for Z = 0.0001–0.02, respectively. Their output is comparable to what massive stars emit during their Wolf-Rayet phase, if we account for their longer lifetimes and the favorable slope of the initial mass function. Their relative importance for reionization may be further favored since they emit their photons with a time delay (~ 20 Myr after birth in our fiducial model). This allows time for the dispersal of the birth clouds, allowing the ionizing photons to escape into the intergalactic medium. At low Z, we find that Roche stripping fails to fully remove the H-rich envelope, because of the reduced opacity in the subsurface layers. This is in sharp contrast with the assumption of complete stripping that is made in rapid population synthesis simulations, which are widely used to simulate the binary progenitors of supernovae and gravitational waves. Finally, we discuss the urgency to increase the observed sample of stripped stars to test these models and we discuss how our predictions can help to design efficient observational campaigns.}, author = {Götberg, Ylva Louise Linsdotter and de Mink, S. E. and Groh, J. H.}, issn = {1432-0746}, journal = {Astronomy & Astrophysics}, keywords = {Space and Planetary Science, Astronomy and Astrophysics}, publisher = {EDP Sciences}, title = {{Ionizing spectra of stars that lose their envelope through interaction with a binary companion: Role of metallicity}}, doi = {10.1051/0004-6361/201730472}, volume = {608}, year = {2017}, } @article{14031, abstract = {High-harmonic spectroscopy driven by circularly polarized laser pulses and their counterrotating second harmonic is a new branch of attosecond science which currently lacks quantitative interpretations. We extend this technique to the midinfrared regime and record detailed high-harmonic spectra of several rare-gas atoms. These results are compared with the solution of the Schrödinger equation in three dimensions and calculations based on the strong-field approximation that incorporate accurate scattering-wave recombination matrix elements. A quantum-orbit analysis of these results provides a transparent interpretation of the measured intensity ratios of symmetry-allowed neighboring harmonics in terms of (i) a set of propensity rules related to the angular momentum of the atomic orbitals, (ii) atom-specific matrix elements related to their electronic structure, and (iii) the interference of the emissions associated with electrons in orbitals corotating or counterrotating with the laser fields. These results provide the foundation for a quantitative understanding of bicircular high-harmonic spectroscopy.}, author = {Baykusheva, Denitsa Rangelova and Brennecke, Simon and Lein, Manfred and Wörner, Hans Jakob}, issn = {1079-7114}, journal = {Physical Review Letters}, keywords = {General Physics and Astronomy}, number = {20}, publisher = {American Physical Society}, title = {{Signatures of electronic structure in bicircular high-harmonic spectroscopy}}, doi = {10.1103/physrevlett.119.203201}, volume = {119}, year = {2017}, } @article{14004, abstract = {High-harmonic spectroscopy driven by circularly polarized laser pulses and their counterrotating second harmonic is a new branch of attosecond science which currently lacks quantitative interpretations. We extend this technique to the midinfrared regime and record detailed high-harmonic spectra of several rare-gas atoms. These results are compared with the solution of the Schrödinger equation in three dimensions and calculations based on the strong-field approximation that incorporate accurate scattering-wave recombination matrix elements. A quantum-orbit analysis of these results provides a transparent interpretation of the measured intensity ratios of symmetry-allowed neighboring harmonics in terms of (i) a set of propensity rules related to the angular momentum of the atomic orbitals, (ii) atom-specific matrix elements related to their electronic structure, and (iii) the interference of the emissions associated with electrons in orbitals corotating or counterrotating with the laser fields. These results provide the foundation for a quantitative understanding of bicircular high-harmonic spectroscopy.}, author = {Baykusheva, Denitsa Rangelova and Brennecke, Simon and Lein, Manfred and Wörner, Hans Jakob}, issn = {1079-7114}, journal = {Physical Review Letters}, keywords = {General Physics and Astronomy}, number = {20}, publisher = {American Physical Society}, title = {{Signatures of electronic structure in bicircular high-harmonic spectroscopy}}, doi = {10.1103/physrevlett.119.203201}, volume = {119}, year = {2017}, } @article{14005, abstract = {Strong-field photoelectron holography and laser-induced electron diffraction (LIED) are two powerful emerging methods for probing the ultrafast dynamics of molecules. However, both of them have remained restricted to static systems and to nuclear dynamics induced by strong-field ionization. Here we extend these promising methods to image purely electronic valence-shell dynamics in molecules using photoelectron holography. In the same experiment, we use LIED and photoelectron holography simultaneously, to observe coupled electronic-rotational dynamics taking place on similar timescales. These results offer perspectives for imaging ultrafast dynamics of molecules on femtosecond to attosecond timescales.}, author = {Walt, Samuel G. and Bhargava Ram, Niraghatam and Atala, Marcos and Shvetsov-Shilovski, Nikolay I and von Conta, Aaron and Baykusheva, Denitsa Rangelova and Lein, Manfred and Wörner, Hans Jakob}, issn = {2041-1723}, journal = {Nature Communications}, keywords = {General Physics and Astronomy, General Biochemistry, Genetics and Molecular Biology, General Chemistry, Multidisciplinary}, publisher = {Springer Nature}, title = {{Dynamics of valence-shell electrons and nuclei probed by strong-field holography and rescattering}}, doi = {10.1038/ncomms15651}, volume = {8}, year = {2017}, } @article{14008, abstract = {Time-resolved x-ray absorption spectroscopy (TR-XAS) has so far practically been limited to large-scale facilities, to subpicosecond temporal resolution, and to the condensed phase. We report the realization of TR-XAS with a temporal resolution in the low femtosecond range by developing a tabletop high-harmonic source reaching up to 350 electron volts, thus partially covering the spectral region of 280 to 530 electron volts, where water is transmissive. We used this source to follow previously unexamined light-induced chemical reactions in the lowest electronic states of isolated CF4+ and SF6+ molecules in the gas phase. By probing element-specific core-to-valence transitions at the carbon K-edge or the sulfur L-edges, we characterized their reaction paths and observed the effect of symmetry breaking through the splitting of absorption bands and Rydberg-valence mixing induced by the geometry changes.}, author = {Pertot, Yoann and Schmidt, Cédric and Matthews, Mary and Chauvet, Adrien and Huppert, Martin and Svoboda, Vit and von Conta, Aaron and Tehlar, Andres and Baykusheva, Denitsa Rangelova and Wolf, Jean-Pierre and Wörner, Hans Jakob}, issn = {1095-9203}, journal = {Science}, keywords = {Multidisciplinary}, number = {6322}, pages = {264--267}, publisher = {American Association for the Advancement of Science}, title = {{Time-resolved x-ray absorption spectroscopy with a water window high-harmonic source}}, doi = {10.1126/science.aah6114}, volume = {355}, year = {2017}, } @article{14006, abstract = {We present a theoretical formalism for the calculation of attosecond delays in molecular photoionization. It is shown how delays relevant to one-photon-ionization, also known as Eisenbud-Wigner-Smith delays, can be obtained from the complex dipole matrix elements provided by molecular quantum scattering theory. These results are used to derive formulae for the delays measured by two-photon attosecond interferometry based on an attosecond pulse train and a dressing femtosecond infrared pulse. These effective delays are first expressed in the molecular frame where maximal information about the molecular photoionization dynamics is available. The effects of averaging over the emission direction of the electron and the molecular orientation are introduced analytically. We illustrate this general formalism for the case of two polyatomic molecules. N2O serves as an example of a polar linear molecule characterized by complex photoionization dynamics resulting from the presence of molecular shape resonances. H2O illustrates the case of a non-linear molecule with comparably simple photoionization dynamics resulting from a flat continuum. Our theory establishes the foundation for interpreting measurements of the photoionization dynamics of all molecules by attosecond metrology.}, author = {Baykusheva, Denitsa Rangelova and Wörner, Hans Jakob}, issn = {1089-7690}, journal = {The Journal of Chemical Physics}, keywords = {Physical and Theoretical Chemistry, General Physics and Astronomy}, number = {12}, publisher = {AIP Publishing}, title = {{Theory of attosecond delays in molecular photoionization}}, doi = {10.1063/1.4977933}, volume = {146}, year = {2017}, } @article{14009, abstract = {Attosecond delays between photoelectron wave packets emitted from different electronic shells are now well established. Is there any delay between electrons originating from the same electronic shell but leaving the cation in different fine-structure states? This question is relevant for all attosecond photoemission studies involving heavy elements, be it atoms, molecules or solids. We answer this fundamental question by measuring energy-dependent delays between photoelectron wave packets associated with the 2P3/2 and 2P1/2 components of the electronic groundstates of Xe+ and Kr+. We observe delays reaching up to 33±6 as in the case of Xe. Our results are compared with two state-of-the-art theories. Whereas both theories quantitatively agree with the results obtained for Kr, neither of them fully reproduces the experimental results in Xe. Performing delay measurements very close to the ionization thresholds, we compare the agreement of several analytical formulas for the continuum-continuum delays with experimental data. Our results show an important influence of spin-orbit coupling on attosecond photoionization delays, highlight the requirement for additional theory development, and offer a precision benchmark for such work.}, author = {Jordan, I. and Huppert, M. and Pabst, S. and Kheifets, A. S. and Baykusheva, Denitsa Rangelova and Wörner, H. J.}, issn = {2469-9934}, journal = {Physical Review A}, number = {1}, publisher = {American Physical Society}, title = {{Spin-orbit delays in photoemission}}, doi = {10.1103/physreva.95.013404}, volume = {95}, year = {2017}, } @article{14007, abstract = {In a recent article by Hockett et al (2016 J. Phys. B: At. Mol. Opt. Phys. 49 095602), time delays arising in the context of molecular single-photon ionization are investigated from a theoretical point of view. We argue that one of the central equations given in this article is incorrect and present a reformulation that is consistent with the established treatment of angle-dependent scattering delays (Eisenbud 1948 PhD Thesis Princeton University; Wigner 1955 Phys. Rev. 98 145–7; Smith 1960 Phys. Rev. 118 349–6; Nussenzveig 1972 Phys. Rev. D 6 1534–42).}, author = {Baykusheva, Denitsa Rangelova and Wörner, Hans Jakob}, issn = {1361-6455}, journal = {Journal of Physics B: Atomic, Molecular and Optical Physics}, keywords = {Condensed Matter Physics, Atomic and Molecular Physics, and Optics}, number = {7}, publisher = {IOP Publishing}, title = {{Comment on ‘Time delays in molecular photoionization’}}, doi = {10.1088/1361-6455/aa62b5}, volume = {50}, year = {2017}, } @inproceedings{950, abstract = {Two-player games on graphs are widely studied in formal methods as they model the interaction between a system and its environment. The game is played by moving a token throughout a graph to produce an infinite path. There are several common modes to determine how the players move the token through the graph; e.g., in turn-based games the players alternate turns in moving the token. We study the bidding mode of moving the token, which, to the best of our knowledge, has never been studied in infinite-duration games. Both players have separate budgets, which sum up to $1$. In each turn, a bidding takes place. Both players submit bids simultaneously, and a bid is legal if it does not exceed the available budget. The winner of the bidding pays his bid to the other player and moves the token. For reachability objectives, repeated bidding games have been studied and are called Richman games. There, a central question is the existence and computation of threshold budgets; namely, a value t\in [0,1] such that if\PO's budget exceeds $t$, he can win the game, and if\PT's budget exceeds 1-t, he can win the game. We focus on parity games and mean-payoff games. We show the existence of threshold budgets in these games, and reduce the problem of finding them to Richman games. We also determine the strategy-complexity of an optimal strategy. Our most interesting result shows that memoryless strategies suffice for mean-payoff bidding games. }, author = {Avni, Guy and Henzinger, Thomas A and Chonev, Ventsislav K}, issn = {1868-8969}, location = {Berlin, Germany}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum für Informatik}, title = {{Infinite-duration bidding games}}, doi = {10.4230/LIPIcs.CONCUR.2017.21}, volume = {85}, year = {2017}, } @inproceedings{683, abstract = {Given a triangulation of a point set in the plane, a flip deletes an edge e whose removal leaves a convex quadrilateral, and replaces e by the opposite diagonal of the quadrilateral. It is well known that any triangulation of a point set can be reconfigured to any other triangulation by some sequence of flips. We explore this question in the setting where each edge of a triangulation has a label, and a flip transfers the label of the removed edge to the new edge. It is not true that every labelled triangulation of a point set can be reconfigured to every other labelled triangulation via a sequence of flips, but we characterize when this is possible. There is an obvious necessary condition: for each label l, if edge e has label l in the first triangulation and edge f has label l in the second triangulation, then there must be some sequence of flips that moves label l from e to f, ignoring all other labels. Bose, Lubiw, Pathak and Verdonschot formulated the Orbit Conjecture, which states that this necessary condition is also sufficient, i.e. that all labels can be simultaneously mapped to their destination if and only if each label individually can be mapped to its destination. We prove this conjecture. Furthermore, we give a polynomial-time algorithm to find a sequence of flips to reconfigure one labelled triangulation to another, if such a sequence exists, and we prove an upper bound of O(n7) on the length of the flip sequence. Our proof uses the topological result that the sets of pairwise non-crossing edges on a planar point set form a simplicial complex that is homeomorphic to a high-dimensional ball (this follows from a result of Orden and Santos; we give a different proof based on a shelling argument). The dual cell complex of this simplicial ball, called the flip complex, has the usual flip graph as its 1-skeleton. We use properties of the 2-skeleton of the flip complex to prove the Orbit Conjecture.}, author = {Lubiw, Anna and Masárová, Zuzana and Wagner, Uli}, location = {Brisbane, Australia}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum für Informatik}, title = {{A proof of the orbit conjecture for flipping edge labelled triangulations}}, doi = {10.4230/LIPIcs.SoCG.2017.49}, volume = {77}, year = {2017}, } @phdthesis{1155, abstract = {This dissertation concerns the automatic verification of probabilistic systems and programs with arrays by statistical and logical methods. Although statistical and logical methods are different in nature, we show that they can be successfully combined for system analysis. In the first part of the dissertation we present a new statistical algorithm for the verification of probabilistic systems with respect to unbounded properties, including linear temporal logic. Our algorithm often performs faster than the previous approaches, and at the same time requires less information about the system. In addition, our method can be generalized to unbounded quantitative properties such as mean-payoff bounds. In the second part, we introduce two techniques for comparing probabilistic systems. Probabilistic systems are typically compared using the notion of equivalence, which requires the systems to have the equal probability of all behaviors. However, this notion is often too strict, since probabilities are typically only empirically estimated, and any imprecision may break the relation between processes. On the one hand, we propose to replace the Boolean notion of equivalence by a quantitative distance of similarity. For this purpose, we introduce a statistical framework for estimating distances between Markov chains based on their simulation runs, and we investigate which distances can be approximated in our framework. On the other hand, we propose to compare systems with respect to a new qualitative logic, which expresses that behaviors occur with probability one or a positive probability. This qualitative analysis is robust with respect to modeling errors and applicable to many domains. In the last part, we present a new quantifier-free logic for integer arrays, which allows us to express counting. Counting properties are prevalent in array-manipulating programs, however they cannot be expressed in the quantified fragments of the theory of arrays. We present a decision procedure for our logic, and provide several complexity results.}, author = {Daca, Przemyslaw}, issn = {2663-337X}, pages = {163}, publisher = {Institute of Science and Technology Austria}, title = {{Statistical and logical methods for property checking}}, doi = {10.15479/AT:ISTA:TH_730}, year = {2017}, } @phdthesis{6291, abstract = {Bacteria and their pathogens – phages – are the most abundant living entities on Earth. Throughout their coevolution, bacteria have evolved multiple immune systems to overcome the ubiquitous threat from the phages. Although the molecu- lar details of these immune systems’ functions are relatively well understood, their epidemiological consequences for the phage-bacterial communities have been largely neglected. In this thesis we employed both experimental and theoretical methods to explore whether herd and social immunity may arise in bacterial popu- lations. Using our experimental system consisting of Escherichia coli strains with a CRISPR based immunity to the T7 phage we show that herd immunity arises in phage-bacterial communities and that it is accentuated when the populations are spatially structured. By fitting a mathematical model, we inferred expressions for the herd immunity threshold and the velocity of spread of a phage epidemic in partially resistant bacterial populations, which both depend on the bacterial growth rate, phage burst size and phage latent period. We also investigated the poten- tial for social immunity in Streptococcus thermophilus and its phage 2972 using a bioinformatic analysis of potentially coding short open reading frames with a signalling signature, encoded within the CRISPR associated genes. Subsequently, we tested one identified potentially signalling peptide and found that its addition to a phage-challenged culture increases probability of survival of bacteria two fold, although the results were only marginally significant. Together, these results demonstrate that the ubiquitous arms races between bacteria and phages have further consequences at the level of the population.}, author = {Payne, Pavel}, issn = {2663-337X}, pages = {83}, publisher = {Institute of Science and Technology Austria}, title = {{Bacterial herd and social immunity to phages}}, year = {2017}, } @article{561, abstract = {Restriction–modification systems are widespread genetic elements that protect bacteria from bacteriophage infections by recognizing and cleaving heterologous DNA at short, well-defined sequences called restriction sites. Bioinformatic evidence shows that restriction sites are significantly underrepresented in bacteriophage genomes, presumably because bacteriophages with fewer restriction sites are more likely to escape cleavage by restriction–modification systems. However, how mutations in restriction sites affect the likelihood of bacteriophage escape is unknown. Using the bacteriophage l and the restriction–modification system EcoRI, we show that while mutation effects at different restriction sites are unequal, they are independent. As a result, the probability of bacteriophage escape increases with each mutated restriction site. Our results experimentally support the role of restriction site avoidance as a response to selection imposed by restriction–modification systems and offer an insight into the events underlying the process of bacteriophage escape.}, author = {Pleska, Maros and Guet, Calin C}, issn = {1744-9561}, journal = {Biology Letters}, number = {12}, publisher = {The Royal Society}, title = {{Effects of mutations in phage restriction sites during escape from restriction–modification}}, doi = {10.1098/rsbl.2017.0646}, volume = {13}, year = {2017}, } @phdthesis{818, abstract = {Antibiotics have diverse effects on bacteria, including massive changes in bacterial gene expression. Whereas the gene expression changes under many antibiotics have been measured, the temporal organization of these responses and their dependence on the bacterial growth rate are unclear. As described in Chapter 1, we quantified the temporal gene expression changes in the bacterium Escherichia coli in response to the sudden exposure to antibiotics using a fluorescent reporter library and a robotic system. Our data show temporally structured gene expression responses, with response times for individual genes ranging from tens of minutes to several hours. We observed that many stress response genes were activated in response to antibiotics. As certain stress responses cross-protect bacteria from other stressors, we then asked whether cellular responses to antibiotics have a similar protective role in Chapter 2. Indeed, we found that the trimethoprim-induced acid stress response protects bacteria from subsequent acid stress. We combined microfluidics with time-lapse imaging to monitor survival, intracellular pH, and acid stress response in single cells. This approach revealed that the variable expression of the acid resistance operon gadBC strongly correlates with single-cell survival time. Cells with higher gadBC expression following trimethoprim maintain higher intracellular pH and survive the acid stress longer. Overall, we provide a way to identify single-cell cross-protection between antibiotics and environmental stressors from temporal gene expression data, and show how antibiotics can increase bacterial fitness in changing environments. While gene expression changes to antibiotics show a clear temporal structure at the population-level, it is unclear whether this clear temporal order is followed by every single cell. Using dual-reporter strains described in Chapter 3, we measured gene expression dynamics of promoter pairs in the same cells using microfluidics and microscopy. Chapter 4 shows that the oxidative stress response and the DNA stress response showed little timing variability and a clear temporal order under the antibiotic nitrofurantoin. In contrast, the acid stress response under trimethoprim ran independently from all other activated response programs including the DNA stress response, which showed particularly high timing variability in this stress condition. In summary, this approach provides insight into the temporal organization of gene expression programs at the single-cell level and suggests dependencies between response programs and the underlying variability-introducing mechanisms. Altogether, this work advances our understanding of the diverse effects that antibiotics have on bacteria. These results were obtained by taking into account gene expression dynamics, which allowed us to identify general principles, molecular mechanisms, and dependencies between genes. Our findings may have implications for infectious disease treatments, and microbial communities in the human body and in nature. }, author = {Mitosch, Karin}, issn = {2663-337X}, pages = {113}, publisher = {Institute of Science and Technology Austria}, title = {{Timing, variability and cross-protection in bacteria – insights from dynamic gene expression responses to antibiotics}}, doi = {10.15479/AT:ISTA:th_862}, year = {2017}, } @article{666, abstract = {Antibiotics elicit drastic changes in microbial gene expression, including the induction of stress response genes. While certain stress responses are known to “cross-protect” bacteria from other stressors, it is unclear whether cellular responses to antibiotics have a similar protective role. By measuring the genome-wide transcriptional response dynamics of Escherichia coli to four antibiotics, we found that trimethoprim induces a rapid acid stress response that protects bacteria from subsequent exposure to acid. Combining microfluidics with time-lapse imaging to monitor survival and acid stress response in single cells revealed that the noisy expression of the acid resistance operon gadBC correlates with single-cell survival. Cells with higher gadBC expression following trimethoprim maintain higher intracellular pH and survive the acid stress longer. The seemingly random single-cell survival under acid stress can therefore be predicted from gadBC expression and rationalized in terms of GadB/C molecular function. Overall, we provide a roadmap for identifying the molecular mechanisms of single-cell cross-protection between antibiotics and other stressors.}, author = {Mitosch, Karin and Rieckh, Georg and Bollenbach, Tobias}, issn = {24054712}, journal = {Cell Systems}, number = {4}, pages = {393 -- 403}, publisher = {Cell Press}, title = {{Noisy response to antibiotic stress predicts subsequent single cell survival in an acidic environment}}, doi = {10.1016/j.cels.2017.03.001}, volume = {4}, year = {2017}, } @phdthesis{821, abstract = {This dissertation focuses on algorithmic aspects of program verification, and presents modeling and complexity advances on several problems related to the static analysis of programs, the stateless model checking of concurrent programs, and the competitive analysis of real-time scheduling algorithms. Our contributions can be broadly grouped into five categories. Our first contribution is a set of new algorithms and data structures for the quantitative and data-flow analysis of programs, based on the graph-theoretic notion of treewidth. It has been observed that the control-flow graphs of typical programs have special structure, and are characterized as graphs of small treewidth. We utilize this structural property to provide faster algorithms for the quantitative and data-flow analysis of recursive and concurrent programs. In most cases we make an algebraic treatment of the considered problem, where several interesting analyses, such as the reachability, shortest path, and certain kind of data-flow analysis problems follow as special cases. We exploit the constant-treewidth property to obtain algorithmic improvements for on-demand versions of the problems, and provide data structures with various tradeoffs between the resources spent in the preprocessing and querying phase. We also improve on the algorithmic complexity of quantitative problems outside the algebraic path framework, namely of the minimum mean-payoff, minimum ratio, and minimum initial credit for energy problems. Our second contribution is a set of algorithms for Dyck reachability with applications to data-dependence analysis and alias analysis. In particular, we develop an optimal algorithm for Dyck reachability on bidirected graphs, which are ubiquitous in context-insensitive, field-sensitive points-to analysis. Additionally, we develop an efficient algorithm for context-sensitive data-dependence analysis via Dyck reachability, where the task is to obtain analysis summaries of library code in the presence of callbacks. Our algorithm preprocesses libraries in almost linear time, after which the contribution of the library in the complexity of the client analysis is (i)~linear in the number of call sites and (ii)~only logarithmic in the size of the whole library, as opposed to linear in the size of the whole library. Finally, we prove that Dyck reachability is Boolean Matrix Multiplication-hard in general, and the hardness also holds for graphs of constant treewidth. This hardness result strongly indicates that there exist no combinatorial algorithms for Dyck reachability with truly subcubic complexity. Our third contribution is the formalization and algorithmic treatment of the Quantitative Interprocedural Analysis framework. In this framework, the transitions of a recursive program are annotated as good, bad or neutral, and receive a weight which measures the magnitude of their respective effect. The Quantitative Interprocedural Analysis problem asks to determine whether there exists an infinite run of the program where the long-run ratio of the bad weights over the good weights is above a given threshold. We illustrate how several quantitative problems related to static analysis of recursive programs can be instantiated in this framework, and present some case studies to this direction. Our fourth contribution is a new dynamic partial-order reduction for the stateless model checking of concurrent programs. Traditional approaches rely on the standard Mazurkiewicz equivalence between traces, by means of partitioning the trace space into equivalence classes, and attempting to explore a few representatives from each class. We present a new dynamic partial-order reduction method called the Data-centric Partial Order Reduction (DC-DPOR). Our algorithm is based on a new equivalence between traces, called the observation equivalence. DC-DPOR explores a coarser partitioning of the trace space than any exploration method based on the standard Mazurkiewicz equivalence. Depending on the program, the new partitioning can be even exponentially coarser. Additionally, DC-DPOR spends only polynomial time in each explored class. Our fifth contribution is the use of automata and game-theoretic verification techniques in the competitive analysis and synthesis of real-time scheduling algorithms for firm-deadline tasks. On the analysis side, we leverage automata on infinite words to compute the competitive ratio of real-time schedulers subject to various environmental constraints. On the synthesis side, we introduce a new instance of two-player mean-payoff partial-information games, and show how the synthesis of an optimal real-time scheduler can be reduced to computing winning strategies in this new type of games.}, author = {Pavlogiannis, Andreas}, issn = {2663-337X}, pages = {418}, publisher = {Institute of Science and Technology Austria}, title = {{Algorithmic advances in program analysis and their applications}}, doi = {10.15479/AT:ISTA:th_854}, year = {2017}, } @phdthesis{820, abstract = {The lac operon is a classic model system for bacterial gene regulation, and has been studied extensively in E. coli, a classic model organism. However, not much is known about E. coli’s ecology and life outside the laboratory, in particular in soil and water environments. The natural diversity of the lac operon outside the laboratory, its role in the ecology of E. coli and the selection pressures it is exposed to, are similarly unknown. In Chapter Two of this thesis, I explore the genetic diversity, phylogenetic history and signatures of selection of the lac operon across 20 natural isolates of E. coli and divergent clades of Escherichia. I found that complete lac operons were present in all isolates examined, which in all but one case were functional. The lac operon phylogeny conformed to the whole-genome phylogeny of the divergent Escherichia clades, which excludes horizontal gene transfer as an explanation for the presence of functional lac operons in these clades. All lac operon genes showed a signature of purifying selection; this signature was strongest for the lacY gene. Lac operon genes of human and environmental isolates showed similar signatures of selection, except the lacZ gene, which showed a stronger signature of selection in environmental isolates. In Chapter Three, I try to identify the natural genetic variation relevant for phenotype and fitness in the lac operon, comparing growth rate on lactose and LacZ activity of the lac operons of these wild isolates in a common genetic background. Sequence variation in the lac promoter region, upstream of the -10 and -35 RNA polymerase binding motif, predicted variation in LacZ activity at full induction, using a thermodynamic model of polymerase binding (Tugrul, 2016). However, neither variation in LacZ activity, nor RNA polymerase binding predicted by the model correlated with variation in growth rate. Lac operons of human and environmental isolates did not differ systematically in either growth rate on lactose or LacZ protein activity, suggesting that these lac operons have been exposed to similar selection pressures. We thus have no evidence that the phenotypic variation we measured is relevant for fitness. To start assessing the effect of genomic background on the growth phenotype conferred by the lac operon, I compared growth on minimal medium with lactose between lac operon constructs and the corresponding original isolates, I found that maximal growth rate was determined by genomic background, with almost all backgrounds conferring higher growth rates than lab strain K12 MG1655. However, I found no evidence that the lactose concentration at which growth was half maximal depended on genomic background.}, author = {Jesse, Fabienne}, issn = {2663-337X}, pages = {87}, publisher = {Institute of Science and Technology Austria}, title = {{The lac operon in the wild}}, doi = {10.15479/AT:ISTA:th_857}, year = {2017}, } @phdthesis{838, abstract = {In this thesis we discuss the exact security of message authentications codes HMAC , NMAC , and PMAC . NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a variable input-length function. A practical single-key variant of NMAC called HMAC is a very popular and widely deployed message authentication code (MAC). PMAC is a block-cipher based mode of operation, which also happens to be the most famous fully parallel MAC. NMAC was introduced by Bellare, Canetti and Krawczyk Crypto’96, who proved it to be a secure pseudorandom function (PRF), and thus also a MAC, under two assumptions. Unfortunately, for many instantiations of HMAC one of them has been found to be wrong. To restore the provable guarantees for NMAC , Bellare [Crypto’06] showed its security without this assumption. PMAC was introduced by Black and Rogaway at Eurocrypt 2002. If instantiated with a pseudorandom permutation over n -bit strings, PMAC constitutes a provably secure variable input-length PRF. For adversaries making q queries, each of length at most ` (in n -bit blocks), and of total length σ ≤ q` , the original paper proves an upper bound on the distinguishing advantage of O ( σ 2 / 2 n ), while the currently best bound is O ( qσ/ 2 n ). In this work we show that this bound is tight by giving an attack with advantage Ω( q 2 `/ 2 n ). In the PMAC construction one initially XORs a mask to every message block, where the mask for the i th block is computed as τ i := γ i · L , where L is a (secret) random value, and γ i is the i -th codeword of the Gray code. Our attack applies more generally to any sequence of γ i ’s which contains a large coset of a subgroup of GF (2 n ). As for NMAC , our first contribution is a simpler and uniform proof: If f is an ε -secure PRF (against q queries) and a δ - non-adaptively secure PRF (against q queries), then NMAC f is an ( ε + `qδ )-secure PRF against q queries of length at most ` blocks each. We also show that this ε + `qδ bound is basically tight by constructing an f for which an attack with advantage `qδ exists. Moreover, we analyze the PRF-security of a modification of NMAC called NI by An and Bellare that avoids the constant rekeying on multi-block messages in NMAC and allows for an information-theoretic analysis. We carry out such an analysis, obtaining a tight `q 2 / 2 c bound for this step, improving over the trivial bound of ` 2 q 2 / 2 c . Finally, we investigate, if the security of PMAC can be further improved by using τ i ’s that are k -wise independent, for k > 1 (the original has k = 1). We observe that the security of PMAC will not increase in general if k = 2, and then prove that the security increases to O ( q 2 / 2 n ), if the k = 4. Due to simple extension attacks, this is the best bound one can hope for, using any distribution on the masks. Whether k = 3 is already sufficient to get this level of security is left as an open problem. Keywords: Message authentication codes, Pseudorandom functions, HMAC, PMAC. }, author = {Rybar, Michal}, issn = {2663-337X}, pages = {86}, publisher = {Institute of Science and Technology Austria}, title = {{(The exact security of) Message authentication codes}}, doi = {10.15479/AT:ISTA:th_828}, year = {2017}, } @article{6196, abstract = {PMAC is a simple and parallel block-cipher mode of operation, which was introduced by Black and Rogaway at Eurocrypt 2002. If instantiated with a (pseudo)random permutation over n-bit strings, PMAC constitutes a provably secure variable input-length (pseudo)random function. For adversaries making q queries, each of length at most l (in n-bit blocks), and of total length σ ≤ ql, the original paper proves an upper bound on the distinguishing advantage of Ο(σ2/2n), while the currently best bound is Ο (qσ/2n).In this work we show that this bound is tight by giving an attack with advantage Ω (q2l/2n). In the PMAC construction one initially XORs a mask to every message block, where the mask for the ith block is computed as τi := γi·L, where L is a (secret) random value, and γi is the i-th codeword of the Gray code. Our attack applies more generally to any sequence of γi’s which contains a large coset of a subgroup of GF(2n). We then investigate if the security of PMAC can be further improved by using τi’s that are k-wise independent, for k > 1 (the original distribution is only 1-wise independent). We observe that the security of PMAC will not increase in general, even if the masks are chosen from a 2-wise independent distribution, and then prove that the security increases to O(q<2/2n), if the τi are 4-wise independent. Due to simple extension attacks, this is the best bound one can hope for, using any distribution on the masks. Whether 3-wise independence is already sufficient to get this level of security is left as an open problem.}, author = {Gazi, Peter and Pietrzak, Krzysztof Z and Rybar, Michal}, issn = {2519-173X}, journal = {IACR Transactions on Symmetric Cryptology}, number = {2}, pages = {145--161}, publisher = {Ruhr University Bochum}, title = {{The exact security of PMAC}}, doi = {10.13154/TOSC.V2016.I2.145-161}, volume = {2016}, year = {2017}, } @phdthesis{837, abstract = {The hippocampus is a key brain region for memory and notably for spatial memory, and is needed for both spatial working and reference memories. Hippocampal place cells selectively discharge in specific locations of the environment to form mnemonic represen tations of space. Several behavioral protocols have been designed to test spatial memory which requires the experimental subject to utilize working memory and reference memory. However, less is known about how these memory traces are presented in the hippo campus, especially considering tasks that require both spatial working and long -term reference memory demand. The aim of my thesis was to elucidate how spatial working memory, reference memory, and the combination of both are represented in the hippocampus. In this thesis, using a radial eight -arm maze, I examined how the combined demand on these memories influenced place cell assemblies while reference memories were partially updated by changing some of the reward- arms. This was contrasted with task varian ts requiring working or reference memories only. Reference memory update led to gradual place field shifts towards the rewards on the switched arms. Cells developed enhanced firing in passes between newly -rewarded arms as compared to those containing an unchanged reward. The working memory task did not show such gradual changes. Place assemblies on occasions replayed trajectories of the maze; at decision points the next arm choice was preferentially replayed in tasks needing reference memory while in the pure working memory task the previously visited arm was replayed. Hence trajectory replay only reflected the decision of the animal in tasks needing reference memory update. At the reward locations, in all three tasks outbound trajectories of the current arm were preferentially replayed, showing the animals’ next path to the center. At reward locations trajectories were replayed preferentially in reverse temporal order. Moreover, in the center reverse replay was seen in the working memory task but in the other tasks forward replay was seen. Hence, the direction of reactivation was determined by the goal locations so that part of the trajectory which was closer to the goal was reactivated later in an HSE while places further away from the goal were reactivated earlier. Altogether my work demonstrated that reference memory update triggers several levels of reorganization of the hippocampal cognitive map which are not seen in simpler working memory demand s. Moreover, hippocampus is likely to be involved in spatial decisions through reactivating planned trajectories when reference memory recall is required for such a decision. }, author = {Xu, Haibing}, issn = {2663-337X}, pages = {93}, publisher = {Institute of Science and Technology Austria}, title = {{Reactivation of the hippocampal cognitive map in goal-directed spatial tasks}}, doi = {10.15479/AT:ISTA:th_858}, year = {2017}, } @phdthesis{938, abstract = {The thesis encompasses several topics of plant cell biology which were studied in the model plant Arabidopsis thaliana. Chapter 1 concerns the plant hormone auxin and its polar transport through cells and tissues. The highly controlled, directional transport of auxin is facilitated by plasma membrane-localized transporters. Transporters from the PIN family direct auxin transport due to their polarized localizations at cell membranes. Substantial effort has been put into research on cellular trafficking of PIN proteins, which is thought to underlie their polar distribution. I participated in a forward genetic screen aimed at identifying novel regulators of PIN polarity. The screen yielded several genes which may be involved in PIN polarity regulation or participate in polar auxin transport by other means. Chapter 2 focuses on the endomembrane system, with particular attention to clathrin-mediated endocytosis. The project started with identification of several proteins that interact with clathrin light chains. Among them, I focused on two putative homologues of auxilin, which in non-plant systems is an endocytotic factor known for uncoating clathrin-coated vesicles in the final step of endocytosis. The body of my work consisted of an in-depth characterization of transgenic A. thaliana lines overexpressing these putative auxilins in an inducible manner. Overexpression of these proteins leads to an inhibition of endocytosis, as documented by imaging of cargoes and clathrin-related endocytic machinery. An extension of this work is an investigation into a concept of homeostatic regulation acting between distinct transport processes in the endomembrane system. With auxilin overexpressing lines, where endocytosis is blocked specifically, I made observations on the mutual relationship between two opposite trafficking processes of secretion and endocytosis. In Chapter 3, I analyze cortical microtubule arrays and their relationship to auxin signaling and polarized growth in elongating cells. In plants, microtubules are organized into arrays just below the plasma membrane, and it is thought that their function is to guide membrane-docked cellulose synthase complexes. These, in turn, influence cell wall structure and cell shape by directed deposition of cellulose fibres. In elongating cells, cortical microtubule arrays are able to reorient in relation to long cell axis, and these reorientations have been linked to cell growth and to signaling of growth-regulating factors such as auxin or light. In this chapter, I am addressing the causal relationship between microtubule array reorientation, growth, and auxin signaling. I arrive at a model where array reorientation is not guided by auxin directly, but instead is only controlled by growth, which, in turn, is regulated by auxin.}, author = {Adamowski, Maciek}, issn = {2663-337X}, pages = {117}, publisher = {Institute of Science and Technology Austria}, title = {{Investigations into cell polarity and trafficking in the plant model Arabidopsis thaliana }}, doi = {10.15479/AT:ISTA:th_842}, year = {2017}, } @phdthesis{992, abstract = {An instance of the Constraint Satisfaction Problem (CSP) is given by a finite set of variables, a finite domain of labels, and a set of constraints, each constraint acting on a subset of the variables. The goal is to find an assignment of labels to its variables that satisfies all constraints (or decide whether one exists). If we allow more general “soft” constraints, which come with (possibly infinite) costs of particular assignments, we obtain instances from a richer class called Valued Constraint Satisfaction Problem (VCSP). There the goal is to find an assignment with minimum total cost. In this thesis, we focus (assuming that P 6 = NP) on classifying computational com- plexity of CSPs and VCSPs under certain restricting conditions. Two results are the core content of the work. In one of them, we consider VCSPs parametrized by a constraint language, that is the set of “soft” constraints allowed to form the instances, and finish the complexity classification modulo (missing pieces of) complexity classification for analogously parametrized CSP. The other result is a generalization of Edmonds’ perfect matching algorithm. This generalization contributes to complexity classfications in two ways. First, it gives a new (largest known) polynomial-time solvable class of Boolean CSPs in which every variable may appear in at most two constraints and second, it settles full classification of Boolean CSPs with planar drawing (again parametrized by a constraint language).}, author = {Rolinek, Michal}, issn = {2663-337X}, pages = {97}, publisher = {Institute of Science and Technology Austria}, title = {{Complexity of constraint satisfaction}}, doi = {10.15479/AT:ISTA:th_815}, year = {2017}, } @article{718, abstract = {Mapping every simplex in the Delaunay mosaic of a discrete point set to the radius of the smallest empty circumsphere gives a generalized discrete Morse function. Choosing the points from a Poisson point process in ℝ n , we study the expected number of simplices in the Delaunay mosaic as well as the expected number of critical simplices and nonsingular intervals in the corresponding generalized discrete gradient. Observing connections with other probabilistic models, we obtain precise expressions for the expected numbers in low dimensions. In particular, we obtain the expected numbers of simplices in the Poisson–Delaunay mosaic in dimensions n ≤ 4.}, author = {Edelsbrunner, Herbert and Nikitenko, Anton and Reitzner, Matthias}, issn = {00018678}, journal = {Advances in Applied Probability}, number = {3}, pages = {745 -- 767}, publisher = {Cambridge University Press}, title = {{Expected sizes of poisson Delaunay mosaics and their discrete Morse functions}}, doi = {10.1017/apr.2017.20}, volume = {49}, year = {2017}, } @inproceedings{559, abstract = {Proofs of space (PoS) were suggested as more ecological and economical alternative to proofs of work, which are currently used in blockchain designs like Bitcoin. The existing PoS are based on rather sophisticated graph pebbling lower bounds. Much simpler and in several aspects more efficient schemes based on inverting random functions have been suggested, but they don’t give meaningful security guarantees due to existing time-memory trade-offs. In particular, Hellman showed that any permutation over a domain of size N can be inverted in time T by an algorithm that is given S bits of auxiliary information whenever (Formula presented). For functions Hellman gives a weaker attack with S2· T≈ N2 (e.g., S= T≈ N2/3). To prove lower bounds, one considers an adversary who has access to an oracle f: [ N] → [N] and can make T oracle queries. The best known lower bound is S· T∈ Ω(N) and holds for random functions and permutations. We construct functions that provably require more time and/or space to invert. Specifically, for any constant k we construct a function [N] → [N] that cannot be inverted unless Sk· T∈ Ω(Nk) (in particular, S= T≈ (Formula presented). Our construction does not contradict Hellman’s time-memory trade-off, because it cannot be efficiently evaluated in forward direction. However, its entire function table can be computed in time quasilinear in N, which is sufficient for the PoS application. Our simplest construction is built from a random function oracle g: [N] × [N] → [ N] and a random permutation oracle f: [N] → N] and is defined as h(x) = g(x, x′) where f(x) = π(f(x′)) with π being any involution without a fixed point, e.g. flipping all the bits. For this function we prove that any adversary who gets S bits of auxiliary information, makes at most T oracle queries, and inverts h on an ϵ fraction of outputs must satisfy S2· T∈ Ω(ϵ2N2).}, author = {Abusalah, Hamza M and Alwen, Joel F and Cohen, Bram and Khilko, Danylo and Pietrzak, Krzysztof Z and Reyzin, Leonid}, isbn = {978-331970696-2}, location = {Hong Kong, China}, pages = {357 -- 379}, publisher = {Springer}, title = {{Beyond Hellman’s time-memory trade-offs with applications to proofs of space}}, doi = {10.1007/978-3-319-70697-9_13}, volume = {10625}, year = {2017}, } @article{550, abstract = {For large random matrices X with independent, centered entries but not necessarily identical variances, the eigenvalue density of XX* is well-approximated by a deterministic measure on ℝ. We show that the density of this measure has only square and cubic-root singularities away from zero. We also extend the bulk local law in [5] to the vicinity of these singularities.}, author = {Alt, Johannes}, issn = {1083589X}, journal = {Electronic Communications in Probability}, publisher = {Institute of Mathematical Statistics}, title = {{Singularities of the density of states of random Gram matrices}}, doi = {10.1214/17-ECP97}, volume = {22}, year = {2017}, } @inproceedings{647, abstract = {Despite researchers’ efforts in the last couple of decades, reachability analysis is still a challenging problem even for linear hybrid systems. Among the existing approaches, the most practical ones are mainly based on bounded-time reachable set over-approximations. For the purpose of unbounded-time analysis, one important strategy is to abstract the original system and find an invariant for the abstraction. In this paper, we propose an approach to constructing a new kind of abstraction called conic abstraction for affine hybrid systems, and to computing reachable sets based on this abstraction. The essential feature of a conic abstraction is that it partitions the state space of a system into a set of convex polyhedral cones which is derived from a uniform conic partition of the derivative space. Such a set of polyhedral cones is able to cut all trajectories of the system into almost straight segments so that every segment of a reach pipe in a polyhedral cone tends to be straight as well, and hence can be over-approximated tightly by polyhedra using similar techniques as HyTech or PHAVer. In particular, for diagonalizable affine systems, our approach can guarantee to find an invariant for unbounded reachable sets, which is beyond the capability of bounded-time reachability analysis tools. We implemented the approach in a tool and experiments on benchmarks show that our approach is more powerful than SpaceEx and PHAVer in dealing with diagonalizable systems.}, author = {Bogomolov, Sergiy and Giacobbe, Mirco and Henzinger, Thomas A and Kong, Hui}, isbn = {978-331965764-6}, location = {Berlin, Germany}, pages = {116 -- 132}, publisher = {Springer}, title = {{Conic abstractions for hybrid systems}}, doi = {10.1007/978-3-319-65765-3_7}, volume = {10419 }, year = {2017}, } @inproceedings{631, abstract = {Template polyhedra generalize intervals and octagons to polyhedra whose facets are orthogonal to a given set of arbitrary directions. They have been employed in the abstract interpretation of programs and, with particular success, in the reachability analysis of hybrid automata. While previously, the choice of directions has been left to the user or a heuristic, we present a method for the automatic discovery of directions that generalize and eliminate spurious counterexamples. We show that for the class of convex hybrid automata, i.e., hybrid automata with (possibly nonlinear) convex constraints on derivatives, such directions always exist and can be found using convex optimization. We embed our method inside a CEGAR loop, thus enabling the time-unbounded reachability analysis of an important and richer class of hybrid automata than was previously possible. We evaluate our method on several benchmarks, demonstrating also its superior efficiency for the special case of linear hybrid automata.}, author = {Bogomolov, Sergiy and Frehse, Goran and Giacobbe, Mirco and Henzinger, Thomas A}, isbn = {978-366254576-8}, location = {Uppsala, Sweden}, pages = {589 -- 606}, publisher = {Springer}, title = {{Counterexample guided refinement of template polyhedra}}, doi = {10.1007/978-3-662-54577-5_34}, volume = {10205}, year = {2017}, } @article{1144, abstract = {We show that matrix elements of functions of N × N Wigner matrices fluctuate on a scale of order N−1/2 and we identify the limiting fluctuation. Our result holds for any function f of the matrix that has bounded variation thus considerably relaxing the regularity requirement imposed in [7, 11].}, author = {Erdös, László and Schröder, Dominik J}, journal = {Electronic Communications in Probability}, publisher = {Institute of Mathematical Statistics}, title = {{Fluctuations of functions of Wigner matrices}}, doi = {10.1214/16-ECP38}, volume = {21}, year = {2017}, } @article{486, abstract = {Color texture reproduction in 3D printing commonly ignores volumetric light transport (cross-talk) between surface points on a 3D print. Such light diffusion leads to significant blur of details and color bleeding, and is particularly severe for highly translucent resin-based print materials. Given their widely varying scattering properties, this cross-talk between surface points strongly depends on the internal structure of the volume surrounding each surface point. Existing scattering-aware methods use simplified models for light diffusion, and often accept the visual blur as an immutable property of the print medium. In contrast, our work counteracts heterogeneous scattering to obtain the impression of a crisp albedo texture on top of the 3D print, by optimizing for a fully volumetric material distribution that preserves the target appearance. Our method employs an efficient numerical optimizer on top of a general Monte-Carlo simulation of heterogeneous scattering, supported by a practical calibration procedure to obtain scattering parameters from a given set of printer materials. Despite the inherent translucency of the medium, we reproduce detailed surface textures on 3D prints. We evaluate our system using a commercial, five-tone 3D print process and compare against the printer’s native color texturing mode, demonstrating that our method preserves high-frequency features well without having to compromise on color gamut.}, author = {Elek, Oskar and Sumin, Denis and Zhang, Ran and Weyrich, Tim and Myszkowski, Karol and Bickel, Bernd and Wilkie, Alexander and Krivanek, Jaroslav}, issn = {07300301}, journal = {ACM Transactions on Graphics}, number = {6}, publisher = {ACM}, title = {{Scattering-aware texture reproduction for 3D printing}}, doi = {10.1145/3130800.3130890}, volume = {36}, year = {2017}, } @inproceedings{637, abstract = {For many cryptographic primitives, it is relatively easy to achieve selective security (where the adversary commits a-priori to some of the choices to be made later in the attack) but appears difficult to achieve the more natural notion of adaptive security (where the adversary can make all choices on the go as the attack progresses). A series of several recent works shows how to cleverly achieve adaptive security in several such scenarios including generalized selective decryption (Panjwani, TCC ’07 and Fuchsbauer et al., CRYPTO ’15), constrained PRFs (Fuchsbauer et al., ASIACRYPT ’14), and Yao garbled circuits (Jafargholi and Wichs, TCC ’16b). Although the above works expressed vague intuition that they share a common technique, the connection was never made precise. In this work we present a new framework that connects all of these works and allows us to present them in a unified and simplified fashion. Moreover, we use the framework to derive a new result for adaptively secure secret sharing over access structures defined via monotone circuits. We envision that further applications will follow in the future. Underlying our framework is the following simple idea. It is well known that selective security, where the adversary commits to n-bits of information about his future choices, automatically implies adaptive security at the cost of amplifying the adversary’s advantage by a factor of up to 2n. However, in some cases the proof of selective security proceeds via a sequence of hybrids, where each pair of adjacent hybrids locally only requires some smaller partial information consisting of m ≪ n bits. The partial information needed might be completely different between different pairs of hybrids, and if we look across all the hybrids we might rely on the entire n-bit commitment. Nevertheless, the above is sufficient to prove adaptive security, at the cost of amplifying the adversary’s advantage by a factor of only 2m ≪ 2n. In all of our examples using the above framework, the different hybrids are captured by some sort of a graph pebbling game and the amount of information that the adversary needs to commit to in each pair of hybrids is bounded by the maximum number of pebbles in play at any point in time. Therefore, coming up with better strategies for proving adaptive security translates to various pebbling strategies for different types of graphs.}, author = {Jafargholi, Zahra and Kamath Hosdurg, Chethan and Klein, Karen and Komargodski, Ilan and Pietrzak, Krzysztof Z and Wichs, Daniel}, editor = {Katz, Jonathan and Shacham, Hovav}, isbn = {978-331963687-0}, location = {Santa Barbara, CA, United States}, pages = {133 -- 163}, publisher = {Springer}, title = {{Be adaptive avoid overcommitting}}, doi = {10.1007/978-3-319-63688-7_5}, volume = {10401}, year = {2017}, } @misc{9842, abstract = {Mathematica notebooks used to generate figures.}, author = {Etheridge, Alison and Barton, Nicholas H}, publisher = {Mendeley Data}, title = {{Data for: Establishment in a new habitat by polygenic adaptation}}, doi = {10.17632/nw68fxzjpm.1}, year = {2017}, } @inproceedings{14206, abstract = {Greedy optimization methods such as Matching Pursuit (MP) and Frank-Wolfe (FW) algorithms regained popularity in recent years due to their simplicity, effectiveness and theoretical guarantees. MP and FW address optimization over the linear span and the convex hull of a set of atoms, respectively. In this paper, we consider the intermediate case of optimization over the convex cone, parametrized as the conic hull of a generic atom set, leading to the first principled definitions of non-negative MP algorithms for which we give explicit convergence rates and demonstrate excellent empirical performance. In particular, we derive sublinear (O(1/t)) convergence on general smooth and convex objectives, and linear convergence (O(e−t)) on strongly convex objectives, in both cases for general sets of atoms. Furthermore, we establish a clear correspondence of our algorithms to known algorithms from the MP and FW literature. Our novel algorithms and analyses target general atom sets and general objective functions, and hence are directly applicable to a large variety of learning settings.}, author = {Locatello, Francesco and Tschannen, Michael and Rätsch, Gunnar and Jaggi, Martin}, booktitle = {Advances in Neural Information Processing Systems}, isbn = {9781510860964}, location = {Long Beach, CA, United States}, title = {{Greedy algorithms for cone constrained optimization with convergence guarantees}}, year = {2017}, } @inproceedings{14205, abstract = {Two of the most fundamental prototypes of greedy optimization are the matching pursuit and Frank-Wolfe algorithms. In this paper, we take a unified view on both classes of methods, leading to the first explicit convergence rates of matching pursuit methods in an optimization sense, for general sets of atoms. We derive sublinear (1/t) convergence for both classes on general smooth objectives, and linear convergence on strongly convex objectives, as well as a clear correspondence of algorithm variants. Our presented algorithms and rates are affine invariant, and do not need any incoherence or sparsity assumptions.}, author = {Locatello, Francesco and Khanna, Rajiv and Tschannen, Michael and Jaggi, Martin}, booktitle = {Proceedings of the 20th International Conference on Artificial Intelligence and Statistics}, location = {Fort Lauderdale, FL, United States}, pages = {860--868}, publisher = {ML Research Press}, title = {{A unified optimization view on generalized matching pursuit and Frank-Wolfe}}, volume = {54}, year = {2017}, } @phdthesis{202, abstract = {Restriction-modification (RM) represents the simplest and possibly the most widespread mechanism of self/non-self discrimination in nature. In order to provide bacteria with immunity against bacteriophages and other parasitic genetic elements, RM systems rely on a balance between two enzymes: the restriction enzyme, which cleaves non-self DNA at specific restriction sites, and the modification enzyme, which tags the host’s DNA as self and thus protects it from cleavage. In this thesis, I use population and single-cell level experiments in combination with mathematical modeling to study different aspects of the interplay between RM systems, bacteria and bacteriophages. First, I analyze how mutations in phage restriction sites affect the probability of phage escape – an inherently stochastic process, during which phages accidently get modified instead of restricted. Next, I use single-cell experiments to show that RM systems can, with a low probability, attack the genome of their bacterial host and that this primitive form of autoimmunity leads to a tradeoff between the evolutionary cost and benefit of RM systems. Finally, I investigate the nature of interactions between bacteria, RM systems and temperate bacteriophages to find that, as a consequence of phage escape and its impact on population dynamics, RM systems can promote acquisition of symbiotic bacteriophages, rather than limit it. The results presented here uncover new fundamental biological properties of RM systems and highlight their importance in the ecology and evolution of bacteria, bacteriophages and their interactions.}, author = {Pleska, Maros}, issn = {2663-337X}, pages = {126}, publisher = {Institute of Science and Technology Austria}, title = {{Biology of restriction-modification systems at the single-cell and population level}}, doi = {10.15479/AT:ISTA:th_916}, year = {2017}, } @phdthesis{6287, abstract = {The main objects considered in the present work are simplicial and CW-complexes with vertices forming a random point cloud. In particular, we consider a Poisson point process in R^n and study Delaunay and Voronoi complexes of the first and higher orders and weighted Delaunay complexes obtained as sections of Delaunay complexes, as well as the Čech complex. Further, we examine theDelaunay complex of a Poisson point process on the sphere S^n, as well as of a uniform point cloud, which is equivalent to the convex hull, providing a connection to the theory of random polytopes. Each of the complexes in question can be endowed with a radius function, which maps its cells to the radii of appropriately chosen circumspheres, called the radius of the cell. Applying and developing discrete Morse theory for these functions, joining it together with probabilistic and sometimes analytic machinery, and developing several integral geometric tools, we aim at getting the distributions of circumradii of typical cells. For all considered complexes, we are able to generalize and obtain up to constants the distribution of radii of typical intervals of all types. In low dimensions the constants can be computed explicitly, thus providing the explicit expressions for the expected numbers of cells. In particular, it allows to find the expected density of simplices of every dimension for a Poisson point process in R^4, whereas the result for R^3 was known already in 1970's.}, author = {Nikitenko, Anton}, issn = {2663-337X}, pages = {86}, publisher = {Institute of Science and Technology Austria}, title = {{Discrete Morse theory for random complexes }}, doi = {10.15479/AT:ISTA:th_873}, year = {2017}, } @phdthesis{1127, abstract = {Plant hormone auxin and its transport between cells belong to the most important mechanisms controlling plant development. Auxin itself could change localization of PINs and thereby control direction of its own flow. We performed an expression profiling experiment in Arabidopsis roots to identify potential regulators of PIN polarity which are transcriptionally regulated by auxin signalling. We identified several novel regulators and performed a detailed characterization of the transcription factor WRKY23 (At2g47260) and its role in auxin feedback on PIN polarity. Gain-of-function and dominant-negative mutants revealed that WRKY23 plays a crucial role in mediating the auxin effect on PIN polarity. In concordance, typical polar auxin transport processes such as gravitropism and leaf vascular pattern formation were disturbed by interfering with WRKY23 function. In order to identify direct targets of WRKY23, we performed consequential expression profiling experiments using a WRKY23 inducible gain-of-function line and dominant-negative WRKY23 line that is defunct in PIN re-arrangement. Among several genes mostly related to the groups of cell wall and defense process regulators, we identified LYSINE-HISTIDINE TRANSPORTER 1 (LHT1; At5g40780), a small amino acid permease gene from the amino acid/auxin permease family (AAAP), we present its detailed characterisation in auxin feedback on PIN repolarization, identified its transcriptional regulation, we propose a potential mechanism of its action. Moreover, we identified also a member of receptor-like protein kinase LRR-RLK (LEUCINE-RICH REPEAT TRANSMEMBRANE PROTEIN KINASE PROTEIN 1; LRRK1; At1g05700), which also affects auxin-dependent PIN re-arrangement. We described its transcriptional behaviour, subcellular localization. Based on global expression data, we tried to identify ligand responsible for mechanism of signalling and suggest signalling partner and interactors. Additionally, we described role of novel phytohormone group, strigolactone, in auxin-dependent PIN re-arrangement, that could be a fundament for future studies in this field. Our results provide first insights into an auxin transcriptional network targeting PIN localization and thus regulating plant development. We highlighted WRKY23 transcriptional network and characterised its mediatory role in plant development. We identified direct effectors of this network, LHT1 and LRRK1, and describe their roles in PIN re-arrangement and PIN-dependent auxin transport processes.}, author = {Prat, Tomas}, issn = {2663-337X}, pages = {131}, publisher = {Institute of Science and Technology Austria}, title = {{Identification of novel regulators of PIN polarity and development of novel auxin sensor}}, year = {2017}, } @article{2016, abstract = {The Ising model is one of the simplest and most famous models of interacting systems. It was originally proposed to model ferromagnetic interactions in statistical physics and is now widely used to model spatial processes in many areas such as ecology, sociology, and genetics, usually without testing its goodness-of-fit. Here, we propose an exact goodness-of-fit test for the finite-lattice Ising model. The theory of Markov bases has been developed in algebraic statistics for exact goodness-of-fit testing using a Monte Carlo approach. However, this beautiful theory has fallen short of its promise for applications, because finding a Markov basis is usually computationally intractable. We develop a Monte Carlo method for exact goodness-of-fit testing for the Ising model which avoids computing a Markov basis and also leads to a better connectivity of the Markov chain and hence to a faster convergence. We show how this method can be applied to analyze the spatial organization of receptors on the cell membrane.}, author = {Martin Del Campo Sanchez, Abraham and Cepeda Humerez, Sarah A and Uhler, Caroline}, issn = {03036898}, journal = {Scandinavian Journal of Statistics}, number = {2}, pages = {285 -- 306}, publisher = {Wiley-Blackwell}, title = {{Exact goodness-of-fit testing for the Ising model}}, doi = {10.1111/sjos.12251}, volume = {44}, year = {2017}, } @article{1528, abstract = {We consider N×N Hermitian random matrices H consisting of blocks of size M≥N6/7. The matrix elements are i.i.d. within the blocks, close to a Gaussian in the four moment matching sense, but their distribution varies from block to block to form a block-band structure, with an essential band width M. We show that the entries of the Green’s function G(z)=(H−z)−1 satisfy the local semicircle law with spectral parameter z=E+iη down to the real axis for any η≫N−1, using a combination of the supersymmetry method inspired by Shcherbina (J Stat Phys 155(3): 466–499, 2014) and the Green’s function comparison strategy. Previous estimates were valid only for η≫M−1. The new estimate also implies that the eigenvectors in the middle of the spectrum are fully delocalized.}, author = {Bao, Zhigang and Erdös, László}, issn = {01788051}, journal = {Probability Theory and Related Fields}, number = {3-4}, pages = {673 -- 776}, publisher = {Springer}, title = {{Delocalization for a class of random block band matrices}}, doi = {10.1007/s00440-015-0692-y}, volume = {167}, year = {2017}, } @article{1433, abstract = {Phat is an open-source C. ++ library for the computation of persistent homology by matrix reduction, targeted towards developers of software for topological data analysis. We aim for a simple generic design that decouples algorithms from data structures without sacrificing efficiency or user-friendliness. We provide numerous different reduction strategies as well as data types to store and manipulate the boundary matrix. We compare the different combinations through extensive experimental evaluation and identify optimization techniques that work well in practical situations. We also compare our software with various other publicly available libraries for persistent homology.}, author = {Bauer, Ulrich and Kerber, Michael and Reininghaus, Jan and Wagner, Hubert}, issn = { 07477171}, journal = {Journal of Symbolic Computation}, pages = {76 -- 90}, publisher = {Academic Press}, title = {{Phat - Persistent homology algorithms toolbox}}, doi = {10.1016/j.jsc.2016.03.008}, volume = {78}, year = {2017}, } @article{1407, abstract = {We consider the problem of computing the set of initial states of a dynamical system such that there exists a control strategy to ensure that the trajectories satisfy a temporal logic specification with probability 1 (almost-surely). We focus on discrete-time, stochastic linear dynamics and specifications given as formulas of the Generalized Reactivity(1) fragment of Linear Temporal Logic over linear predicates in the states of the system. We propose a solution based on iterative abstraction-refinement, and turn-based 2-player probabilistic games. While the theoretical guarantee of our algorithm after any finite number of iterations is only a partial solution, we show that if our algorithm terminates, then the result is the set of all satisfying initial states. Moreover, for any (partial) solution our algorithm synthesizes witness control strategies to ensure almost-sure satisfaction of the temporal logic specification. While the proposed algorithm guarantees progress and soundness in every iteration, it is computationally demanding. We offer an alternative, more efficient solution for the reachability properties that decomposes the problem into a series of smaller problems of the same type. All algorithms are demonstrated on an illustrative case study.}, author = {Svoreňová, Mária and Kretinsky, Jan and Chmelik, Martin and Chatterjee, Krishnendu and Cěrná, Ivana and Belta, Cǎlin}, journal = {Nonlinear Analysis: Hybrid Systems}, number = {2}, pages = {230 -- 253}, publisher = {Elsevier}, title = {{Temporal logic control for stochastic linear systems using abstraction refinement of probabilistic games}}, doi = {10.1016/j.nahs.2016.04.006}, volume = {23}, year = {2017}, } @article{1367, abstract = {One of the major challenges in physically based modelling is making simulations efficient. Adaptive models provide an essential solution to these efficiency goals. These models are able to self-adapt in space and time, attempting to provide the best possible compromise between accuracy and speed. This survey reviews the adaptive solutions proposed so far in computer graphics. Models are classified according to the strategy they use for adaptation, from time-stepping and freezing techniques to geometric adaptivity in the form of structured grids, meshes and particles. Applications range from fluids, through deformable bodies, to articulated solids.}, author = {Manteaux, Pierre and Wojtan, Christopher J and Narain, Rahul and Redon, Stéphane and Faure, François and Cani, Marie}, issn = {01677055}, journal = {Computer Graphics Forum}, number = {6}, pages = {312 -- 337}, publisher = {Wiley-Blackwell}, title = {{Adaptive physically based models in computer graphics}}, doi = {10.1111/cgf.12941}, volume = {36}, year = {2017}, } @article{1338, abstract = {We present a computer-aided programming approach to concurrency. The approach allows programmers to program assuming a friendly, non-preemptive scheduler, and our synthesis procedure inserts synchronization to ensure that the final program works even with a preemptive scheduler. The correctness specification is implicit, inferred from the non-preemptive behavior. Let us consider sequences of calls that the program makes to an external interface. The specification requires that any such sequence produced under a preemptive scheduler should be included in the set of sequences produced under a non-preemptive scheduler. We guarantee that our synthesis does not introduce deadlocks and that the synchronization inserted is optimal w.r.t. a given objective function. The solution is based on a finitary abstraction, an algorithm for bounded language inclusion modulo an independence relation, and generation of a set of global constraints over synchronization placements. Each model of the global constraints set corresponds to a correctness-ensuring synchronization placement. The placement that is optimal w.r.t. the given objective function is chosen as the synchronization solution. We apply the approach to device-driver programming, where the driver threads call the software interface of the device and the API provided by the operating system. Our experiments demonstrate that our synthesis method is precise and efficient. The implicit specification helped us find one concurrency bug previously missed when model-checking using an explicit, user-provided specification. We implemented objective functions for coarse-grained and fine-grained locking and observed that different synchronization placements are produced for our experiments, favoring a minimal number of synchronization operations or maximum concurrency, respectively.}, author = {Cerny, Pavol and Clarke, Edmund and Henzinger, Thomas A and Radhakrishna, Arjun and Ryzhyk, Leonid and Samanta, Roopsha and Tarrach, Thorsten}, journal = {Formal Methods in System Design}, number = {2-3}, pages = {97 -- 139}, publisher = {Springer}, title = {{From non-preemptive to preemptive scheduling using synchronization synthesis}}, doi = {10.1007/s10703-016-0256-5}, volume = {50}, year = {2017}, } @article{1351, abstract = {The behaviour of gene regulatory networks (GRNs) is typically analysed using simulation-based statistical testing-like methods. In this paper, we demonstrate that we can replace this approach by a formal verification-like method that gives higher assurance and scalability. We focus on Wagner’s weighted GRN model with varying weights, which is used in evolutionary biology. In the model, weight parameters represent the gene interaction strength that may change due to genetic mutations. For a property of interest, we synthesise the constraints over the parameter space that represent the set of GRNs satisfying the property. We experimentally show that our parameter synthesis procedure computes the mutational robustness of GRNs—an important problem of interest in evolutionary biology—more efficiently than the classical simulation method. We specify the property in linear temporal logic. We employ symbolic bounded model checking and SMT solving to compute the space of GRNs that satisfy the property, which amounts to synthesizing a set of linear constraints on the weights.}, author = {Giacobbe, Mirco and Guet, Calin C and Gupta, Ashutosh and Henzinger, Thomas A and Paixao, Tiago and Petrov, Tatjana}, issn = {00015903}, journal = {Acta Informatica}, number = {8}, pages = {765 -- 787}, publisher = {Springer}, title = {{Model checking the evolution of gene regulatory networks}}, doi = {10.1007/s00236-016-0278-x}, volume = {54}, year = {2017}, } @article{1336, abstract = {Evolutionary algorithms (EAs) form a popular optimisation paradigm inspired by natural evolution. In recent years the field of evolutionary computation has developed a rigorous analytical theory to analyse the runtimes of EAs on many illustrative problems. Here we apply this theory to a simple model of natural evolution. In the Strong Selection Weak Mutation (SSWM) evolutionary regime the time between occurrences of new mutations is much longer than the time it takes for a mutated genotype to take over the population. In this situation, the population only contains copies of one genotype and evolution can be modelled as a stochastic process evolving one genotype by means of mutation and selection between the resident and the mutated genotype. The probability of accepting the mutated genotype then depends on the change in fitness. We study this process, SSWM, from an algorithmic perspective, quantifying its expected optimisation time for various parameters and investigating differences to a similar evolutionary algorithm, the well-known (1+1) EA. We show that SSWM can have a moderate advantage over the (1+1) EA at crossing fitness valleys and study an example where SSWM outperforms the (1+1) EA by taking advantage of information on the fitness gradient.}, author = {Paixao, Tiago and Pérez Heredia, Jorge and Sudholt, Dirk and Trubenova, Barbora}, issn = {01784617}, journal = {Algorithmica}, number = {2}, pages = {681 -- 713}, publisher = {Springer}, title = {{Towards a runtime comparison of natural and artificial evolution}}, doi = {10.1007/s00453-016-0212-1}, volume = {78}, year = {2017}, } @article{1337, abstract = {We consider the local eigenvalue distribution of large self-adjoint N×N random matrices H=H∗ with centered independent entries. In contrast to previous works the matrix of variances sij=\mathbbmE|hij|2 is not assumed to be stochastic. Hence the density of states is not the Wigner semicircle law. Its possible shapes are described in the companion paper (Ajanki et al. in Quadratic Vector Equations on the Complex Upper Half Plane. arXiv:1506.05095). We show that as N grows, the resolvent, G(z)=(H−z)−1, converges to a diagonal matrix, diag(m(z)), where m(z)=(m1(z),…,mN(z)) solves the vector equation −1/mi(z)=z+∑jsijmj(z) that has been analyzed in Ajanki et al. (Quadratic Vector Equations on the Complex Upper Half Plane. arXiv:1506.05095). We prove a local law down to the smallest spectral resolution scale, and bulk universality for both real symmetric and complex hermitian symmetry classes.}, author = {Ajanki, Oskari H and Erdös, László and Krüger, Torben H}, issn = {01788051}, journal = {Probability Theory and Related Fields}, number = {3-4}, pages = {667 -- 727}, publisher = {Springer}, title = {{Universality for general Wigner-type matrices}}, doi = {10.1007/s00440-016-0740-2}, volume = {169}, year = {2017}, } @article{1294, abstract = {We study controller synthesis problems for finite-state Markov decision processes, where the objective is to optimize the expected mean-payoff performance and stability (also known as variability in the literature). We argue that the basic notion of expressing the stability using the statistical variance of the mean payoff is sometimes insufficient, and propose an alternative definition. We show that a strategy ensuring both the expected mean payoff and the variance below given bounds requires randomization and memory, under both the above definitions. We then show that the problem of finding such a strategy can be expressed as a set of constraints.}, author = {Brázdil, Tomáš and Chatterjee, Krishnendu and Forejt, Vojtěch and Kučera, Antonín}, journal = {Journal of Computer and System Sciences}, pages = {144 -- 170}, publisher = {Elsevier}, title = {{Trading performance for stability in Markov decision processes}}, doi = {10.1016/j.jcss.2016.09.009}, volume = {84}, year = {2017}, } @article{1228, abstract = {Since 2006, reprogrammed cells have increasingly been used as a biomedical research technique in addition to neuro-psychiatric methods. These rapidly evolving techniques allow for the generation of neuronal sub-populations, and have sparked interest not only in monogenetic neuro-psychiatric diseases, but also in poly-genetic and poly-aetiological disorders such as schizophrenia (SCZ) and bipolar disorder (BPD). This review provides a summary of 19 publications on reprogrammed adult somatic cells derived from patients with SCZ, and five publications using this technique in patients with BPD. As both disorders are complex and heterogeneous, there is a plurality of hypotheses to be tested in vitro. In SCZ, data on alterations of dopaminergic transmission in vitro are sparse, despite the great explanatory power of the so-called DA hypothesis of SCZ. Some findings correspond to perturbations of cell energy metabolism, and observations in reprogrammed cells suggest neuro-developmental alterations. Some studies also report on the efficacy of medicinal compounds to revert alterations observed in cellular models. However, due to the paucity of replication studies, no comprehensive conclusions can be drawn from studies using reprogrammed cells at the present time. In the future, findings from cell culture methods need to be integrated with clinical, epidemiological, pharmacological and imaging data in order to generate a more comprehensive picture of SCZ and BPD.}, author = {Sauerzopf, Ulrich and Sacco, Roberto and Novarino, Gaia and Niello, Marco and Weidenauer, Ana and Praschak Rieder, Nicole and Sitte, Harald and Willeit, Matthaeus}, journal = {European Journal of Neuroscience}, number = {1}, pages = {45 -- 57}, publisher = {Wiley-Blackwell}, title = {{Are reprogrammed cells a useful tool for studying dopamine dysfunction in psychotic disorders? A review of the current evidence}}, doi = {10.1111/ejn.13418}, volume = {45}, year = {2017}, } @inbook{1213, abstract = {Bacterial cytokinesis is commonly initiated by the Z-ring, a dynamic cytoskeletal structure that assembles at the site of division. Its primary component is FtsZ, a tubulin-like GTPase, that like its eukaryotic relative forms protein filaments in the presence of GTP. Since the discovery of the Z-ring 25 years ago, various models for the role of FtsZ have been suggested. However, important information about the architecture and dynamics of FtsZ filaments during cytokinesis is still missing. One reason for this lack of knowledge has been the small size of bacteria, which has made it difficult to resolve the orientation and dynamics of individual FtsZ filaments in the Z-ring. While superresolution microscopy experiments have helped to gain more information about the organization of the Z-ring in the dividing cell, they were not yet able to elucidate a mechanism of how FtsZ filaments reorganize during assembly and disassembly of the Z-ring. In this chapter, we explain how to use an in vitro reconstitution approach to investigate the self-organization of FtsZ filaments recruited to a biomimetic lipid bilayer by its membrane anchor FtsA. We show how to perform single-molecule experiments to study the behavior of individual FtsZ monomers during the constant reorganization of the FtsZ-FtsA filament network. We describe how to analyze the dynamics of single molecules and explain why this information can help to shed light onto possible mechanism of Z-ring constriction. We believe that similar experimental approaches will be useful to study the mechanism of membrane-based polymerization of other cytoskeletal systems, not only from prokaryotic but also eukaryotic origin.}, author = {Baranova, Natalia and Loose, Martin}, booktitle = {Cytokinesis}, editor = {Echard, Arnaud }, issn = {0091679X}, pages = {355 -- 370}, publisher = {Academic Press}, title = {{Single-molecule measurements to study polymerization dynamics of FtsZ-FtsA copolymers}}, doi = {10.1016/bs.mcb.2016.03.036}, volume = {137}, year = {2017}, } @article{1198, abstract = {We consider a model of fermions interacting via point interactions, defined via a certain weighted Dirichlet form. While for two particles the interaction corresponds to infinite scattering length, the presence of further particles effectively decreases the interaction strength. We show that the model becomes trivial in the thermodynamic limit, in the sense that the free energy density at any given particle density and temperature agrees with the corresponding expression for non-interacting particles.}, author = {Moser, Thomas and Seiringer, Robert}, issn = {03779017}, journal = {Letters in Mathematical Physics}, number = {3}, pages = { 533 -- 552}, publisher = {Springer}, title = {{Triviality of a model of particles with point interactions in the thermodynamic limit}}, doi = {10.1007/s11005-016-0915-x}, volume = {107}, year = {2017}, } @article{1207, abstract = {The eigenvalue distribution of the sum of two large Hermitian matrices, when one of them is conjugated by a Haar distributed unitary matrix, is asymptotically given by the free convolution of their spectral distributions. We prove that this convergence also holds locally in the bulk of the spectrum, down to the optimal scales larger than the eigenvalue spacing. The corresponding eigenvectors are fully delocalized. Similar results hold for the sum of two real symmetric matrices, when one is conjugated by Haar orthogonal matrix.}, author = {Bao, Zhigang and Erdös, László and Schnelli, Kevin}, issn = {00103616}, journal = {Communications in Mathematical Physics}, number = {3}, pages = {947 -- 990}, publisher = {Springer}, title = {{Local law of addition of random matrices on optimal scale}}, doi = {10.1007/s00220-016-2805-6}, volume = {349}, year = {2017}, } @article{1196, abstract = {We define the . model-measuring problem: given a model . M and specification . ϕ, what is the maximal distance . ρ such that all models . M' within distance . ρ from . M satisfy (or violate) . ϕ. The model-measuring problem presupposes a distance function on models. We concentrate on . automatic distance functions, which are defined by weighted automata. The model-measuring problem subsumes several generalizations of the classical model-checking problem, in particular, quantitative model-checking problems that measure the degree of satisfaction of a specification; robustness problems that measure how much a model can be perturbed without violating the specification; and parameter synthesis for hybrid systems. We show that for automatic distance functions, and (a) . ω-regular linear-time, (b) . ω-regular branching-time, and (c) hybrid specifications, the model-measuring problem can be solved.We use automata-theoretic model-checking methods for model measuring, replacing the emptiness question for word, tree, and hybrid automata by the . optimal-value question for the weighted versions of these automata. For automata over words and trees, we consider weighted automata that accumulate weights by maximizing, summing, discounting, and limit averaging. For hybrid automata, we consider monotonic (parametric) hybrid automata, a hybrid counterpart of (discrete) weighted automata.We give several examples of using the model-measuring problem to compute various notions of robustness and quantitative satisfaction for temporal specifications. Further, we propose the modeling framework for model measuring to ease the specification and reduce the likelihood of errors in modeling.Finally, we present a variant of the model-measuring problem, called the . model-repair problem. The model-repair problem applies to models that do not satisfy the specification; it can be used to derive restrictions, under which the model satisfies the specification, i.e., to repair the model.}, author = {Henzinger, Thomas A and Otop, Jan}, journal = {Nonlinear Analysis: Hybrid Systems}, pages = {166 -- 190}, publisher = {Elsevier}, title = {{Model measuring for discrete and hybrid systems}}, doi = {10.1016/j.nahs.2016.09.001}, volume = {23}, year = {2017}, } @article{1199, abstract = {Much of quantitative genetics is based on the ‘infinitesimal model’, under which selection has a negligible effect on the genetic variance. This is typically justified by assuming a very large number of loci with additive effects. However, it applies even when genes interact, provided that the number of loci is large enough that selection on each of them is weak relative to random drift. In the long term, directional selection will change allele frequencies, but even then, the effects of epistasis on the ultimate change in trait mean due to selection may be modest. Stabilising selection can maintain many traits close to their optima, even when the underlying alleles are weakly selected. However, the number of traits that can be optimised is apparently limited to ~4Ne by the ‘drift load’, and this is hard to reconcile with the apparent complexity of many organisms. Just as for the mutation load, this limit can be evaded by a particular form of negative epistasis. A more robust limit is set by the variance in reproductive success. This suggests that selection accumulates information most efficiently in the infinitesimal regime, when selection on individual alleles is weak, and comparable with random drift. A review of evidence on selection strength suggests that although most variance in fitness may be because of alleles with large Nes, substantial amounts of adaptation may be because of alleles in the infinitesimal regime, in which epistasis has modest effects.}, author = {Barton, Nicholas H}, journal = {Heredity}, pages = {96 -- 109}, publisher = {Nature Publishing Group}, title = {{How does epistasis influence the response to selection?}}, doi = {10.1038/hdy.2016.109}, volume = {118}, year = {2017}, } @article{1208, abstract = {We study parameter estimation in linear Gaussian covariance models, which are p-dimensional Gaussian models with linear constraints on the covariance matrix. Maximum likelihood estimation for this class of models leads to a non-convex optimization problem which typically has many local maxima. Using recent results on the asymptotic distribution of extreme eigenvalues of the Wishart distribution, we provide sufficient conditions for any hill climbing method to converge to the global maximum. Although we are primarily interested in the case in which n≫p, the proofs of our results utilize large sample asymptotic theory under the scheme n/p→γ>1. Remarkably, our numerical simulations indicate that our results remain valid for p as small as 2. An important consequence of this analysis is that, for sample sizes n≃14p, maximum likelihood estimation for linear Gaussian covariance models behaves as if it were a convex optimization problem. © 2016 The Royal Statistical Society and Blackwell Publishing Ltd.}, author = {Zwiernik, Piotr and Uhler, Caroline and Richards, Donald}, issn = {13697412}, journal = {Journal of the Royal Statistical Society. Series B: Statistical Methodology}, number = {4}, pages = {1269 -- 1292}, publisher = {Wiley-Blackwell}, title = {{Maximum likelihood estimation for linear Gaussian covariance models}}, doi = {10.1111/rssb.12217}, volume = {79}, year = {2017}, } @inproceedings{1174, abstract = {Security of cryptographic applications is typically defined by security games. The adversary, within certain resources, cannot win with probability much better than 0 (for unpredictability applications, like one-way functions) or much better than 1/2 (indistinguishability applications for instance encryption schemes). In so called squared-friendly applications the winning probability of the adversary, for different values of the application secret randomness, is not only close to 0 or 1/2 on average, but also concentrated in the sense that its second central moment is small. The class of squared-friendly applications, which contains all unpredictability applications and many indistinguishability applications, is particularly important for key derivation. Barak et al. observed that for square-friendly applications one can beat the "RT-bound", extracting secure keys with significantly smaller entropy loss. In turn Dodis and Yu showed that in squared-friendly applications one can directly use a "weak" key, which has only high entropy, as a secure key. In this paper we give sharp lower bounds on square security assuming security for "weak" keys. We show that any application which is either (a) secure with weak keys or (b) allows for entropy savings for keys derived by universal hashing, must be square-friendly. Quantitatively, our lower bounds match the positive results of Dodis and Yu and Barak et al. (TCC\'13, CRYPTO\'11) Hence, they can be understood as a general characterization of squared-friendly applications. While the positive results on squared-friendly applications where derived by one clever application of the Cauchy-Schwarz Inequality, for tight lower bounds we need more machinery. In our approach we use convex optimization techniques and some theory of circular matrices.}, author = {Skórski, Maciej}, issn = {18688969}, location = {Hannover, Germany}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum für Informatik}, title = {{Lower bounds on key derivation for square-friendly applications}}, doi = {10.4230/LIPIcs.STACS.2017.57}, volume = {66}, year = {2017}, } @inproceedings{1176, abstract = {The algorithm Argon2i-B of Biryukov, Dinu and Khovratovich is currently being considered by the IRTF (Internet Research Task Force) as a new de-facto standard for password hashing. An older version (Argon2i-A) of the same algorithm was chosen as the winner of the recent Password Hashing Competition. An important competitor to Argon2i-B is the recently introduced Balloon Hashing (BH) algorithm of Corrigan-Gibs, Boneh and Schechter. A key security desiderata for any such algorithm is that evaluating it (even using a custom device) requires a large amount of memory amortized across multiple instances. Alwen and Blocki (CRYPTO 2016) introduced a class of theoretical attacks against Argon2i-A and BH. While these attacks yield large asymptotic reductions in the amount of memory, it was not, a priori, clear if (1) they can be extended to the newer Argon2i-B, (2) the attacks are effective on any algorithm for practical parameter ranges (e.g., 1GB of memory) and (3) if they can be effectively instantiated against any algorithm under realistic hardware constrains. In this work we answer all three of these questions in the affirmative for all three algorithms. This is also the first work to analyze the security of Argon2i-B. In more detail, we extend the theoretical attacks of Alwen and Blocki (CRYPTO 2016) to the recent Argon2i-B proposal demonstrating severe asymptotic deficiencies in its security. Next we introduce several novel heuristics for improving the attack's concrete memory efficiency even when on-chip memory bandwidth is bounded. We then simulate our attacks on randomly sampled Argon2i-A, Argon2i-B and BH instances and measure the resulting memory consumption for various practical parameter ranges and for a variety of upperbounds on the amount of parallelism available to the attacker. Finally we describe, implement, and test a new heuristic for applying the Alwen-Blocki attack to functions employing a technique developed by Corrigan-Gibs et al. for improving concrete security of memory-hard functions. We analyze the collected data and show the effects various parameters have on the memory consumption of the attack. In particular, we can draw several interesting conclusions about the level of security provided by these functions. · For the Alwen-Blocki attack to fail against practical memory parameters, Argon2i-B must be instantiated with more than 10 passes on memory - beyond the "paranoid" parameter setting in the current IRTF proposal. · The technique of Corrigan-Gibs for improving security can also be overcome by the Alwen-Blocki attack under realistic hardware constraints. · On a positive note, both the asymptotic and concrete security of Argon2i-B seem to improve on that of Argon2i-A.}, author = {Alwen, Joel F and Blocki, Jeremiah}, isbn = {978-150905761-0}, location = {Paris, France}, publisher = {IEEE}, title = {{Towards practical attacks on Argon2i and balloon hashing}}, doi = {10.1109/EuroSP.2017.47}, year = {2017}, } @article{1187, abstract = {We construct efficient authentication protocols and message authentication codes (MACs) whose security can be reduced to the learning parity with noise (LPN) problem. Despite a large body of work—starting with the (Formula presented.) protocol of Hopper and Blum in 2001—until now it was not even known how to construct an efficient authentication protocol from LPN which is secure against man-in-the-middle attacks. A MAC implies such a (two-round) protocol.}, author = {Kiltz, Eike and Pietrzak, Krzysztof Z and Venturi, Daniele and Cash, David and Jain, Abhishek}, journal = {Journal of Cryptology}, number = {4}, pages = {1238 -- 1275}, publisher = {Springer}, title = {{Efficient authentication from hard learning problems}}, doi = {10.1007/s00145-016-9247-3}, volume = {30}, year = {2017}, } @inproceedings{1192, abstract = {The main result of this paper is a generalization of the classical blossom algorithm for finding perfect matchings. Our algorithm can efficiently solve Boolean CSPs where each variable appears in exactly two constraints (we call it edge CSP) and all constraints are even Δ-matroid relations (represented by lists of tuples). As a consequence of this, we settle the complexity classification of planar Boolean CSPs started by Dvorak and Kupec. Knowing that edge CSP is tractable for even Δ-matroid constraints allows us to extend the tractability result to a larger class of Δ-matroids that includes many classes that were known to be tractable before, namely co-independent, compact, local and binary.}, author = {Kazda, Alexandr and Kolmogorov, Vladimir and Rolinek, Michal}, isbn = {978-161197478-2}, location = {Barcelona, Spain}, pages = {307 -- 326}, publisher = {SIAM}, title = {{Even delta-matroids and the complexity of planar Boolean CSPs}}, doi = {10.1137/1.9781611974782.20}, year = {2017}, } @inproceedings{1178, abstract = {For any pair (X, Z) of correlated random variables we can think of Z as a randomized function of X. If the domain of Z is small, one can make this function computationally efficient by allowing it to be only approximately correct. In folklore this problem is known as simulating auxiliary inputs. This idea of simulating auxiliary information turns out to be a very usefull tool, finding applications in complexity theory, cryptography, pseudorandomness and zero-knowledge. In this paper we revisit this problem, achieving the following results: (a) We present a novel boosting algorithm for constructing the simulator. This boosting proof is of independent interest, as it shows how to handle “negative mass” issues when constructing probability measures by shifting distinguishers in descent algorithms. Our technique essentially fixes the flaw in the TCC’14 paper “How to Fake Auxiliary Inputs”. (b) The complexity of our simulator is better than in previous works, including results derived from the uniform min-max theorem due to Vadhan and Zheng. To achieve (s,ϵ) -indistinguishability we need the complexity O(s⋅25ℓϵ−2) in time/circuit size, which improve previous bounds by a factor of ϵ−2. In particular, with we get meaningful provable security for the EUROCRYPT’09 leakage-resilient stream cipher instantiated with a standard 256-bit block cipher, like }, author = {Skórski, Maciej}, pages = {159 -- 179}, publisher = {Springer}, title = {{Simulating auxiliary inputs, revisited}}, doi = {10.1007/978-3-662-53641-4_7}, volume = {9985}, year = {2017}, } @article{1180, abstract = {In this article we define an algebraic vertex of a generalized polyhedron and show that the set of algebraic vertices is the smallest set of points needed to define the polyhedron. We prove that the indicator function of a generalized polytope P is a linear combination of indicator functions of simplices whose vertices are algebraic vertices of P. We also show that the indicator function of any generalized polyhedron is a linear combination, with integer coefficients, of indicator functions of cones with apices at algebraic vertices and line-cones. The concept of an algebraic vertex is closely related to the Fourier–Laplace transform. We show that a point v is an algebraic vertex of a generalized polyhedron P if and only if the tangent cone of P, at v, has non-zero Fourier–Laplace transform.}, author = {Akopyan, Arseniy and Bárány, Imre and Robins, Sinai}, issn = {00018708}, journal = {Advances in Mathematics}, pages = {627 -- 644}, publisher = {Academic Press}, title = {{Algebraic vertices of non-convex polyhedra}}, doi = {10.1016/j.aim.2016.12.026}, volume = {308}, year = {2017}, } @article{1159, abstract = {Auxin steers numerous physiological processes in plants, making the tight control of its endogenous levels and spatiotemporal distribution a necessity. This regulation is achieved by different mechanisms, including auxin biosynthesis, metabolic conversions, degradation, and transport. Here, we introduce cis-cinnamic acid (c-CA) as a novel and unique addition to a small group of endogenous molecules affecting in planta auxin concentrations. c-CA is the photo-isomerization product of the phenylpropanoid pathway intermediate trans-CA (t-CA). When grown on c-CA-containing medium, an evolutionary diverse set of plant species were shown to exhibit phenotypes characteristic for high auxin levels, including inhibition of primary root growth, induction of root hairs, and promotion of adventitious and lateral rooting. By molecular docking and receptor binding assays, we showed that c-CA itself is neither an auxin nor an anti-auxin, and auxin profiling data revealed that c-CA does not significantly interfere with auxin biosynthesis. Single cell-based auxin accumulation assays showed that c-CA, and not t-CA, is a potent inhibitor of auxin efflux. Auxin signaling reporters detected changes in spatiotemporal distribution of the auxin response along the root of c-CA-treated plants, and long-distance auxin transport assays showed no inhibition of rootward auxin transport. Overall, these results suggest that the phenotypes of c-CA-treated plants are the consequence of a local change in auxin accumulation, induced by the inhibition of auxin efflux. This work reveals a novel mechanism how plants may regulate auxin levels and adds a novel, naturally occurring molecule to the chemical toolbox for the studies of auxin homeostasis.}, author = {Steenackers, Ward and Klíma, Petr and Quareshy, Mussa and Cesarino, Igor and Kumpf, Robert and Corneillie, Sander and Araújo, Pedro and Viaene, Tom and Goeminne, Geert and Nowack, Moritz and Ljung, Karin and Friml, Jirí and Blakeslee, Joshua and Novák, Ondřej and Zažímalová, Eva and Napier, Richard and Boerjan, Wout and Vanholme, Bartel}, issn = {0032-0889}, journal = {Plant Physiology}, number = {1}, pages = {552 -- 565}, publisher = {American Society of Plant Biologists}, title = {{Cis-cinnamic acid is a novel natural auxin efflux inhibitor that promotes lateral root formation}}, doi = {10.1104/pp.16.00943}, volume = {173}, year = {2017}, } @article{1169, abstract = {Dispersal is a crucial factor in natural evolution, since it determines the habitat experienced by any population and defines the spatial scale of interactions between individuals. There is compelling evidence for systematic differences in dispersal characteristics within the same population, i.e., genotype-dependent dispersal. The consequences of genotype-dependent dispersal on other evolutionary phenomena, however, are poorly understood. In this article we investigate the effect of genotype-dependent dispersal on spatial gene frequency patterns, using a generalization of the classical diffusion model of selection and dispersal. Dispersal is characterized by the variance of dispersal (diffusion coefficient) and the mean displacement (directional advection term). We demonstrate that genotype-dependent dispersal may change the qualitative behavior of Fisher waves, which change from being “pulled” to being “pushed” wave fronts as the discrepancy in dispersal between genotypes increases. The speed of any wave is partitioned into components due to selection, genotype-dependent variance of dispersal, and genotype-dependent mean displacement. We apply our findings to wave fronts maintained by selection against heterozygotes. Furthermore, we identify a benefit of increased variance of dispersal, quantify its effect on the speed of the wave, and discuss the implications for the evolution of dispersal strategies.}, author = {Novak, Sebastian and Kollár, Richard}, issn = {00166731}, journal = {Genetics}, number = {1}, pages = {367 -- 374}, publisher = {Genetics Society of America}, title = {{Spatial gene frequency waves under genotype dependent dispersal}}, doi = {10.1534/genetics.116.193946}, volume = {205}, year = {2017}, } @article{1160, abstract = {We investigate fundamental nonlinear dynamics of ferrofluidic Taylor-Couette flow - flow confined be-tween two concentric independently rotating cylinders - consider small aspect ratio by solving the ferro-hydrodynamical equations, carrying out systematic bifurcation analysis. Without magnetic field, we find steady flow patterns, previously observed with a simple fluid, such as those containing normal one- or two vortex cells, as well as anomalous one-cell and twin-cell flow states. However, when a symmetry-breaking transverse magnetic field is present, all flow states exhibit stimulated, finite two-fold mode. Various bifurcations between steady and unsteady states can occur, corresponding to the transitions between the two-cell and one-cell states. While unsteady, axially oscillating flow states can arise, we also detect the emergence of new unsteady flow states. In particular, we uncover two new states: one contains only the azimuthally oscillating solution in the configuration of the twin-cell flow state, and an-other a rotating flow state. Topologically, these flow states are a limit cycle and a quasiperiodic solution on a two-torus, respectively. Emergence of new flow states in addition to observed ones with classical fluid, indicates that richer but potentially more controllable dynamics in ferrofluidic flows, as such flow states depend on the external magnetic field.}, author = {Altmeyer, Sebastian and Do, Younghae and Lai, Ying}, issn = {20452322}, journal = {Scientific Reports}, publisher = {Nature Publishing Group}, title = {{Dynamics of ferrofluidic flow in the Taylor-Couette system with a small aspect ratio}}, doi = {10.1038/srep40012}, volume = {7}, year = {2017}, } @article{1162, abstract = {Selected universal experimental properties of high-temperature superconducting (HTS) cuprates have been singled out in the last decade. One of the pivotal challenges in this field is the designation of a consistent interpretation framework within which we can describe quantitatively the universal features of those systems. Here we analyze in a detailed manner the principal experimental data and compare them quantitatively with the approach based on a single-band model of strongly correlated electrons supplemented with strong antiferromagnetic (super)exchange interaction (the so-called t−J−U model). The model rationale is provided by estimating its microscopic parameters on the basis of the three-band approach for the Cu-O plane. We use our original full Gutzwiller wave-function solution by going beyond the renormalized mean-field theory (RMFT) in a systematic manner. Our approach reproduces very well the observed hole doping (δ) dependence of the kinetic-energy gain in the superconducting phase, one of the principal non-Bardeen-Cooper-Schrieffer features of the cuprates. The calculated Fermi velocity in the nodal direction is practically δ-independent and its universal value agrees very well with that determined experimentally. Also, a weak doping dependence of the Fermi wave vector leads to an almost constant value of the effective mass in a pure superconducting phase which is both observed in experiment and reproduced within our approach. An assessment of the currently used models (t−J, Hubbard) is carried out and the results of the canonical RMFT as a zeroth-order solution are provided for comparison to illustrate the necessity of the introduced higher-order contributions.}, author = {Spałek, Jozef and Zegrodnik, Michał and Kaczmarczyk, Jan}, issn = {24699950}, journal = {Physical Review B - Condensed Matter and Materials Physics}, number = {2}, publisher = {American Physical Society}, title = {{Universal properties of high temperature superconductors from real space pairing t-J-U model and its quantitative comparison with experiment}}, doi = {10.1103/PhysRevB.95.024506}, volume = {95}, year = {2017}, } @article{1152, abstract = {We propose a new memetic strategy that can solve the multi-physics, complex inverse problems, formulated as the multi-objective optimization ones, in which objectives are misfits between the measured and simulated states of various governing processes. The multi-deme structure of the strategy allows for both, intensive, relatively cheap exploration with a moderate accuracy and more accurate search many regions of Pareto set in parallel. The special type of selection operator prefers the coherent alternative solutions, eliminating artifacts appearing in the particular processes. The additional accuracy increment is obtained by the parallel convex searches applied to the local scalarizations of the misfit vector. The strategy is dedicated for solving ill-conditioned problems, for which inverting the single physical process can lead to the ambiguous results. The skill of the selection in artifact elimination is shown on the benchmark problem, while the whole strategy was applied for identification of oil deposits, where the misfits are related to various frequencies of the magnetic and electric waves of the magnetotelluric measurements. 2016 Elsevier B.V.}, author = {Gajda-Zagorska, Ewa P and Schaefer, Robert and Smołka, Maciej and Pardo, David and Alvarez Aramberri, Julen}, issn = {18777503}, journal = {Journal of Computational Science}, pages = {85 -- 94}, publisher = {Elsevier}, title = {{A multi objective memetic inverse solver reinforced by local optimization methods}}, doi = {10.1016/j.jocs.2016.06.007}, volume = {18}, year = {2017}, } @article{1168, abstract = {Optimum experimental design theory has recently been extended for parameter estimation in copula models. The use of these models allows one to gain in flexibility by considering the model parameter set split into marginal and dependence parameters. However, this separation also leads to the natural issue of estimating only a subset of all model parameters. In this work, we treat this problem with the application of the (Formula presented.)-optimality to copula models. First, we provide an extension of the corresponding equivalence theory. Then, we analyze a wide range of flexible copula models to highlight the usefulness of (Formula presented.)-optimality in many possible scenarios. Finally, we discuss how the usage of the introduced design criterion also relates to the more general issue of copula selection and optimal design for model discrimination.}, author = {Perrone, Elisa and Rappold, Andreas and Müller, Werner}, journal = {Statistical Methods and Applications}, number = {3}, pages = {403 -- 418}, publisher = {Springer}, title = {{D inf s optimality in copula models}}, doi = {10.1007/s10260-016-0375-6}, volume = {26}, year = {2017}, } @article{1163, abstract = {We investigate the effect of the electron-hole (e-h) symmetry breaking on d-wave superconductivity induced by non-local effects of correlations in the generalized Hubbard model. The symmetry breaking is introduced in a two-fold manner: by the next-to-nearest neighbor hopping of electrons and by the charge-bond interaction - the off-diagonal term of the Coulomb potential. Both terms lead to a pronounced asymmetry of the superconducting order parameter. The next-to-nearest neighbor hopping enhances superconductivity for h-doping, while diminishes it for e-doping. The charge-bond interaction alone leads to the opposite effect and, additionally, to the kinetic-energy gain upon condensation in the underdoped regime. With both terms included, with similar amplitudes, the height of the superconducting dome and the critical doping remain in favor of h-doping. The influence of the charge-bond interaction on deviations from symmetry of the shape of the gap at the Fermi surface in the momentum space is briefly discussed.}, author = {Wysokiński, Marcin and Kaczmarczyk, Jan}, issn = {09538984}, journal = {Journal of Physics: Condensed Matter}, number = {8}, publisher = {IOP Publishing Ltd.}, title = {{Unconventional superconductivity in generalized Hubbard model role of electron–hole symmetry breaking terms}}, doi = {10.1088/1361-648X/aa532f}, volume = {29}, year = {2017}, } @article{1173, abstract = {We introduce the Voronoi functional of a triangulation of a finite set of points in the Euclidean plane and prove that among all geometric triangulations of the point set, the Delaunay triangulation maximizes the functional. This result neither extends to topological triangulations in the plane nor to geometric triangulations in three and higher dimensions.}, author = {Edelsbrunner, Herbert and Glazyrin, Alexey and Musin, Oleg and Nikitenko, Anton}, issn = {02099683}, journal = {Combinatorica}, number = {5}, pages = {887 -- 910}, publisher = {Springer}, title = {{The Voronoi functional is maximized by the Delaunay triangulation in the plane}}, doi = {10.1007/s00493-016-3308-y}, volume = {37}, year = {2017}, } @article{1161, abstract = {Coordinated changes of cell shape are often the result of the excitable, wave-like dynamics of the actin cytoskeleton. New work shows that, in migrating cells, protrusion waves arise from mechanochemical crosstalk between adhesion sites, membrane tension and the actin protrusive machinery.}, author = {Müller, Jan and Sixt, Michael K}, issn = {09609822}, journal = {Current Biology}, number = {1}, pages = {R24 -- R25}, publisher = {Cell Press}, title = {{Cell migration: Making the waves}}, doi = {10.1016/j.cub.2016.11.035}, volume = {27}, year = {2017}, } @inproceedings{1116, abstract = {Time-triggered switched networks are a deterministic communication infrastructure used by real-time distributed embedded systems. Due to the criticality of the applications running over them, developers need to ensure that end-to-end communication is dependable and predictable. Traditional approaches assume static networks that are not flexible to changes caused by reconfigurations or, more importantly, faults, which are dealt with in the application using redundancy. We adopt the concept of handling faults in the switches from non-real-time networks while maintaining the required predictability. We study a class of forwarding schemes that can handle various types of failures. We consider probabilistic failures. We study a class of forwarding schemes that can handle various types of failures. We consider probabilistic failures. For a given network with a forwarding scheme and a constant ℓ, we compute the {\em score} of the scheme, namely the probability (induced by faults) that at least ℓ messages arrive on time. We reduce the scoring problem to a reachability problem on a Markov chain with a "product-like" structure. Its special structure allows us to reason about it symbolically, and reduce the scoring problem to #SAT. Our solution is generic and can be adapted to different networks and other contexts. Also, we show the computational complexity of the scoring problem is #P-complete, and we study methods to estimate the score. We evaluate the effectiveness of our techniques with an implementation. }, author = {Avni, Guy and Goel, Shubham and Henzinger, Thomas A and Rodríguez Navas, Guillermo}, issn = {03029743}, location = {Uppsala, Sweden}, pages = {169 -- 187}, publisher = {Springer}, title = {{Computing scores of forwarding schemes in switched networks with probabilistic faults}}, doi = {10.1007/978-3-662-54580-5_10}, volume = {10206}, year = {2017}, } @article{1118, abstract = {Sharp wave-ripple (SWR) oscillations play a key role in memory consolidation during non-rapid eye movement sleep, immobility, and consummatory behavior. However, whether temporally modulated synaptic excitation or inhibition underlies the ripples is controversial. To address this question, we performed simultaneous recordings of excitatory and inhibitory postsynaptic currents (EPSCs and IPSCs) and local field potentials (LFPs) in the CA1 region of awake mice in vivo. During SWRs, inhibition dominated over excitation, with a peak conductance ratio of 4.1 ± 0.5. Furthermore, the amplitude of SWR-associated IPSCs was positively correlated with SWR magnitude, whereas that of EPSCs was not. Finally, phase analysis indicated that IPSCs were phase-locked to individual ripple cycles, whereas EPSCs were uniformly distributed in phase space. Optogenetic inhibition indicated that PV+ interneurons provided a major contribution to SWR-associated IPSCs. Thus, phasic inhibition, but not excitation, shapes SWR oscillations in the hippocampal CA1 region in vivo.}, author = {Gan, Jian and Weng, Shih-Ming and Pernia-Andrade, Alejandro and Csicsvari, Jozsef L and Jonas, Peter M}, journal = {Neuron}, number = {2}, pages = {308 -- 314}, publisher = {Elsevier}, title = {{Phase-locked inhibition, but not excitation, underlies hippocampal ripple oscillations in awake mice in vivo}}, doi = {10.1016/j.neuron.2016.12.018}, volume = {93}, year = {2017}, } @article{1117, abstract = {GABAergic synapses in brain circuits generate inhibitory output signals with submillisecond latency and temporal precision. Whether the molecular identity of the release sensor contributes to these signaling properties remains unclear. Here, we examined the Ca^2+ sensor of exocytosis at GABAergic basket cell (BC) to Purkinje cell (PC) synapses in cerebellum. Immunolabeling suggested that BC terminals selectively expressed synaptotagmin 2 (Syt2), whereas synaptotagmin 1 (Syt1) was enriched in excitatory terminals. Genetic elimination of Syt2 reduced action potential-evoked release to ∼10%, identifying Syt2 as the major Ca^2+ sensor at BC-PC synapses. Differential adenovirus-mediated rescue revealed that Syt2 triggered release with shorter latency and higher temporal precision and mediated faster vesicle pool replenishment than Syt1. Furthermore, deletion of Syt2 severely reduced and delayed disynaptic inhibition following parallel fiber stimulation. Thus, the selective use of Syt2 as release sensor at BC-PC synapses ensures fast and efficient feedforward inhibition in cerebellar microcircuits. #bioimagingfacility-author}, author = {Chen, Chong and Arai, Itaru and Satterield, Rachel and Young, Samuel and Jonas, Peter M}, issn = {22111247}, journal = {Cell Reports}, number = {3}, pages = {723 -- 736}, publisher = {Cell Press}, title = {{Synaptotagmin 2 is the fast Ca2+ sensor at a central inhibitory synapse}}, doi = {10.1016/j.celrep.2016.12.067}, volume = {18}, year = {2017}, } @article{1132, abstract = {The hippocampus is thought to initiate systems-wide mnemonic processes through the reactivation of previously acquired spatial and episodic memory traces, which can recruit the entorhinal cortex as a first stage of memory redistribution to other brain areas. Hippocampal reactivation occurs during sharp wave-ripples, in which synchronous network firing encodes sequences of places.We investigated the coordination of this replay by recording assembly activity simultaneously in the CA1 region of the hippocampus and superficial layers of the medial entorhinal cortex. We found that entorhinal cell assemblies can replay trajectories independently of the hippocampus and sharp wave-ripples. This suggests that the hippocampus is not the sole initiator of spatial and episodic memory trace reactivation. Memory systems involved in these processes may include nonhierarchical, parallel components.}, author = {O'Neill, Joseph and Boccara, Charlotte and Stella, Federico and Schönenberger, Philipp and Csicsvari, Jozsef L}, issn = {00368075}, journal = {Science}, number = {6321}, pages = {184 -- 188}, publisher = {American Association for the Advancement of Science}, title = {{Superficial layers of the medial entorhinal cortex replay independently of the hippocampus}}, doi = {10.1126/science.aag2787}, volume = {355}, year = {2017}, } @article{1120, abstract = {The existence of a self-localization transition in the polaron problem has been under an active debate ever since Landau suggested it 83 years ago. Here we reveal the self-localization transition for the rotational analogue of the polaron -- the angulon quasiparticle. We show that, unlike for the polarons, self-localization of angulons occurs at finite impurity-bath coupling already at the mean-field level. The transition is accompanied by the spherical-symmetry breaking of the angulon ground state and a discontinuity in the first derivative of the ground-state energy. Moreover, the type of the symmetry breaking is dictated by the symmetry of the microscopic impurity-bath interaction, which leads to a number of distinct self-localized states. The predicted effects can potentially be addressed in experiments on cold molecules trapped in superfluid helium droplets and ultracold quantum gases, as well as on electronic excitations in solids and Bose-Einstein condensates. }, author = {Li, Xiang and Seiringer, Robert and Lemeshko, Mikhail}, issn = {24699926}, journal = {Physical Review A}, number = {3}, publisher = {American Physical Society}, title = {{Angular self-localization of impurities rotating in a bosonic bath}}, doi = {10.1103/PhysRevA.95.033608}, volume = {95}, year = {2017}, } @article{1133, abstract = {It is a common knowledge that an effective interaction of a quantum impurity with an electromagnetic field can be screened by surrounding charge carriers, whether mobile or static. Here we demonstrate that very strong, "anomalous" screening can take place in the presence of a neutral, weakly polarizable environment, due to an exchange of orbital angular momentum between the impurity and the bath. Furthermore, we show that it is possible to generalize all phenomena related to isolated impurities in an external field to the case when a many-body environment is present, by casting the problem in terms of the angulon quasiparticle. As a result, the relevant observables such as the effective Rabi frequency, geometric phase, and impurity spatial alignment are straightforward to evaluate in terms of a single parameter: the angular-momentum-dependent screening factor.}, author = {Yakaboylu, Enderalp and Lemeshko, Mikhail}, issn = {00319007}, journal = {Physical Review Letters}, number = {8}, publisher = {American Physical Society}, title = {{Anomalous screening of quantum impurities by a neutral environment}}, doi = {10.1103/PhysRevLett.118.085302}, volume = {118}, year = {2017}, } @article{1119, abstract = {Understanding the behavior of molecules interacting with superfluid helium represents a formidable challenge and, in general, requires approaches relying on large-scale numerical simulations. Here we demonstrate that experimental data collected over the last 20 years provide evidence that molecules immersed in superfluid helium form recently-predicted angulon quasiparticles [Phys. Rev. Lett. 114, 203001 (2015)]. Most importantly, casting the many-body problem in terms of angulons amounts to a drastic simplification and yields effective molecular moments of inertia as straightforward analytic solutions of a simple microscopic Hamiltonian. The outcome of the angulon theory is in good agreement with experiment for a broad range of molecular impurities, from heavy to medium-mass to light species. These results pave the way to understanding molecular rotation in liquid and crystalline phases in terms of the angulon quasiparticle.}, author = {Lemeshko, Mikhail}, issn = {00319007}, journal = {Physical Review Letters}, number = {9}, publisher = {American Physical Society}, title = {{Quasiparticle approach to molecules interacting with quantum solvents}}, doi = {10.1103/PhysRevLett.118.095301}, volume = {118}, year = {2017}, } @article{1110, abstract = {The phytohormone auxin is a major determinant and regulatory component important for plant development. Auxin transport between cells is mediated by a complex system of transporters such as AUX1/LAX, PIN, and ABCB proteins, and their localization and activity is thought to be influenced by phosphatases and kinases. Flavonols have been shown to alter auxin transport activity and changes in flavonol accumulation in the Arabidopsis thaliana rol1-2 mutant cause defects in auxin transport and seedling development. A new mutation in ROOTS CURL IN NPA 1 (RCN1), encoding a regulatory subunit of the phosphatase PP2A, was found to suppress the growth defects of rol1-2 without changing the flavonol content. rol1-2 rcn1-3 double mutants show wild type-like auxin transport activity while levels of free auxin are not affected by rcn1-3. In the rol1-2 mutant, PIN2 shows a flavonol-induced basal-to-apical shift in polar localization which is reversed in the rol1-2 rcn1-3 to basal localization. In vivo analysis of PINOID action, a kinase known to influence PIN protein localization in a PP2A-antagonistic manner, revealed a negative impact of flavonols on PINOID activity. Together, these data suggest that flavonols affect auxin transport by modifying the antagonistic kinase/phosphatase equilibrium.}, author = {Kuhn, Benjamin and Nodzyński, Tomasz and Errafi, Sanae and Bucher, Rahel and Gupta, Shibu and Aryal, Bibek and Dobrev, Petre and Bigler, Laurent and Geisler, Markus and Zažímalová, Eva and Friml, Jirí and Ringli, Christoph}, issn = {20452322}, journal = {Scientific Reports}, publisher = {Nature Publishing Group}, title = {{Flavonol-induced changes in PIN2 polarity and auxin transport in the Arabidopsis thaliana rol1-2 mutant require phosphatase activity}}, doi = {10.1038/srep41906}, volume = {7}, year = {2017}, } @article{1104, abstract = {In the early visual system, cells of the same type perform the same computation in different places of the visual field. How these cells code together a complex visual scene is unclear. A common assumption is that cells of a single-type extract a single-stimulus feature to form a feature map, but this has rarely been observed directly. Using large-scale recordings in the rat retina, we show that a homogeneous population of fast OFF ganglion cells simultaneously encodes two radically different features of a visual scene. Cells close to a moving object code quasilinearly for its position, while distant cells remain largely invariant to the object's position and, instead, respond nonlinearly to changes in the object's speed. We develop a quantitative model that accounts for this effect and identify a disinhibitory circuit that mediates it. Ganglion cells of a single type thus do not code for one, but two features simultaneously. This richer, flexible neural map might also be present in other sensory systems.}, author = {Deny, Stephane and Ferrari, Ulisse and Mace, Emilie and Yger, Pierre and Caplette, Romain and Picaud, Serge and Tkacik, Gasper and Marre, Olivier}, issn = {20411723}, journal = {Nature Communications}, number = {1}, publisher = {Nature Publishing Group}, title = {{Multiplexed computations in retinal ganglion cells of a single type}}, doi = {10.1038/s41467-017-02159-y}, volume = {8}, year = {2017}, } @article{1107, abstract = {The generation, migration, and differentiation of neurons requires the functional integrity of the microtubule cytoskeleton. Mutations in the tubulin gene family are known to cause various neurological diseases including lissencephaly, ocular motor disorders, polymicrogyria and amyotrophic lateral sclerosis. We have previously reported that mutations in TUBB5 cause microcephaly that is accompanied by severe intellectual impairment and motor delay. Here we present the characterization of a Tubb5 mouse model that allows for the conditional expression of the pathogenic E401K mutation. Homozygous knockin animals exhibit a severe reduction in brain size and in body weight. These animals do not show any significant impairment in general activity, anxiety, or in the acoustic startle response, however, present with notable defects in motor coordination. When assessed on the static rod apparatus mice took longer to orient and often lost their balance completely. Interestingly, mutant animals also showed defects in prepulse inhibition, a phenotype associated with sensorimotor gating and considered an endophenotype for schizophrenia. This study provides insight into the behavioral consequences of tubulin gene mutations.}, author = {Breuss, Martin and Hansen, Andi H and Landler, Lukas and Keays, David}, issn = {01664328}, journal = {Behavioural Brain Research}, pages = {47 -- 55}, publisher = {Elsevier}, title = {{Brain specific knockin of the pathogenic Tubb5 E401K allele causes defects in motor coordination and prepulse inhibition}}, doi = {10.1016/j.bbr.2017.01.029}, volume = {323}, year = {2017}, } @article{1114, abstract = {Nonequilibrium phase transitions exist in damped-driven open quantum systems when the continuous tuning of an external parameter leads to a transition between two robust steady states. In second-order transitions this change is abrupt at a critical point, whereas in first-order transitions the two phases can coexist in a critical hysteresis domain. Here, we report the observation of a first-order dissipative quantum phase transition in a driven circuit quantum electrodynamics system. It takes place when the photon blockade of the driven cavity-atom system is broken by increasing the drive power. The observed experimental signature is a bimodal phase space distribution with varying weights controlled by the drive strength. Our measurements show an improved stabilization of the classical attractors up to the millisecond range when the size of the quantum system is increased from one to three artificial atoms. The formation of such robust pointer states could be used for new quantum measurement schemes or to investigate multiphoton phases of finite-size, nonlinear, open quantum systems.}, author = {Fink, Johannes M and Dombi, András and Vukics, András and Wallraff, Andreas and Domokos, Peter}, issn = {21603308}, journal = {Physical Review X}, number = {1}, publisher = {American Physical Society}, title = {{Observation of the photon blockade breakdown phase transition}}, doi = {10.1103/PhysRevX.7.011012}, volume = {7}, year = {2017}, } @article{1111, abstract = {Adaptation depends critically on the effects of new mutations and their dependency on the genetic background in which they occur. These two factors can be summarized by the fitness landscape. However, it would require testing all mutations in all backgrounds, making the definition and analysis of fitness landscapes mostly inaccessible. Instead of postulating a particular fitness landscape, we address this problem by considering general classes of landscapes and calculating an upper limit for the time it takes for a population to reach a fitness peak, circumventing the need to have full knowledge about the fitness landscape. We analyze populations in the weak-mutation regime and characterize the conditions that enable them to quickly reach the fitness peak as a function of the number of sites under selection. We show that for additive landscapes there is a critical selection strength enabling populations to reach high-fitness genotypes, regardless of the distribution of effects. This threshold scales with the number of sites under selection, effectively setting a limit to adaptation, and results from the inevitable increase in deleterious mutational pressure as the population adapts in a space of discrete genotypes. Furthermore, we show that for the class of all unimodal landscapes this condition is sufficient but not necessary for rapid adaptation, as in some highly epistatic landscapes the critical strength does not depend on the number of sites under selection; effectively removing this barrier to adaptation.}, author = {Heredia, Jorge and Trubenova, Barbora and Sudholt, Dirk and Paixao, Tiago}, issn = {00166731}, journal = {Genetics}, number = {2}, pages = {803 -- 825}, publisher = {Genetics Society of America}, title = {{Selection limits to adaptive walks on correlated landscapes}}, doi = {10.1534/genetics.116.189340}, volume = {205}, year = {2017}, } @article{1109, abstract = {Rotation of molecules embedded in He nanodroplets is explored by a combination of fs laser-induced alignment experiments and angulon quasiparticle theory. We demonstrate that at low fluence of the fs alignment pulse, the molecule and its solvation shell can be set into coherent collective rotation lasting long enough to form revivals. With increasing fluence, however, the revivals disappear -- instead, rotational dynamics as rapid as for an isolated molecule is observed during the first few picoseconds. Classical calculations trace this phenomenon to transient decoupling of the molecule from its He shell. Our results open novel opportunities for studying non-equilibrium solute-solvent dynamics and quantum thermalization. }, author = {Shepperson, Benjamin and Søndergaard, Anders and Christiansen, Lars and Kaczmarczyk, Jan and Zillich, Robert and Lemeshko, Mikhail and Stapelfeldt, Henrik}, journal = {Physical Review Letters}, number = {20}, publisher = {American Physical Society}, title = {{Laser-induced rotation of iodine molecules in helium nanodroplets: Revivals and breaking-free}}, doi = {10.1103/PhysRevLett.118.203203}, volume = {118}, year = {2017}, } @article{1087, abstract = {Using extensive direct numerical simulations, the dynamics of laminar-turbulent fronts in pipe flow is investigated for Reynolds numbers between and 5500. We here investigate the physical distinction between the fronts of weak and strong slugs both by analysing the turbulent kinetic energy budget and by comparing the downstream front motion to the advection speed of bulk turbulent structures. Our study shows that weak downstream fronts travel slower than turbulent structures in the bulk and correspond to decaying turbulence at the front. At the downstream front speed becomes faster than the advection speed, marking the onset of strong fronts. In contrast to weak fronts, turbulent eddies are generated at strong fronts by feeding on the downstream laminar flow. Our study also suggests that temporal fluctuations of production and dissipation at the downstream laminar-turbulent front drive the dynamical switches between the two types of front observed up to.}, author = {Song, Baofang and Barkley, Dwight and Hof, Björn and Avila, Marc}, issn = {00221120}, journal = {Journal of Fluid Mechanics}, pages = {1045 -- 1059}, publisher = {Cambridge University Press}, title = {{Speed and structure of turbulent fronts in pipe flow}}, doi = {10.1017/jfm.2017.14}, volume = {813}, year = {2017}, } @article{1089, abstract = {We discuss properties of distributions that are multivariate totally positive of order two (MTP2) related to conditional independence. In particular, we show that any independence model generated by an MTP2 distribution is a compositional semigraphoid which is upward-stable and singleton-transitive. In addition, we prove that any MTP2 distribution satisfying an appropriate support condition is faithful to its concentration graph. Finally, we analyze factorization properties of MTP2 distributions and discuss ways of constructing MTP2 distributions; in particular we give conditions on the log-linear parameters of a discrete distribution which ensure MTP2 and characterize conditional Gaussian distributions which satisfy MTP2.}, author = {Fallat, Shaun and Lauritzen, Steffen and Sadeghi, Kayvan and Uhler, Caroline and Wermuth, Nanny and Zwiernik, Piotr}, issn = {00905364}, journal = {Annals of Statistics}, number = {3}, pages = {1152 -- 1184}, publisher = {Institute of Mathematical Statistics}, title = {{Total positivity in Markov structures}}, doi = {10.1214/16-AOS1478}, volume = {45}, year = {2017}, } @article{1080, abstract = {Reconstructing the evolutionary history of metastases is critical for understanding their basic biological principles and has profound clinical implications. Genome-wide sequencing data has enabled modern phylogenomic methods to accurately dissect subclones and their phylogenies from noisy and impure bulk tumour samples at unprecedented depth. However, existing methods are not designed to infer metastatic seeding patterns. Here we develop a tool, called Treeomics, to reconstruct the phylogeny of metastases and map subclones to their anatomic locations. Treeomics infers comprehensive seeding patterns for pancreatic, ovarian, and prostate cancers. Moreover, Treeomics correctly disambiguates true seeding patterns from sequencing artifacts; 7% of variants were misclassified by conventional statistical methods. These artifacts can skew phylogenies by creating illusory tumour heterogeneity among distinct samples. In silico benchmarking on simulated tumour phylogenies across a wide range of sample purities (15–95%) and sequencing depths (25-800 × ) demonstrates the accuracy of Treeomics compared with existing methods.}, author = {Reiter, Johannes and Makohon Moore, Alvin and Gerold, Jeffrey and Božić, Ivana and Chatterjee, Krishnendu and Iacobuzio Donahue, Christine and Vogelstein, Bert and Nowak, Martin}, issn = {20411723}, journal = {Nature Communications}, publisher = {Nature Publishing Group}, title = {{Reconstructing metastatic seeding patterns of human cancers}}, doi = {10.1038/ncomms14114}, volume = {8}, year = {2017}, } @article{1085, abstract = {Sex chromosomes evolve once recombination is halted between a homologous pair of chromosomes. The dominant model of sex chromosome evolution posits that recombination is suppressed between emerging X and Y chromosomes in order to resolve sexual conflict. Here we test this model using whole genome and transcriptome resequencing data in the guppy, a model for sexual selection with many Y-linked colour traits. We show that although the nascent Y chromosome encompasses nearly half of the linkage group, there has been no perceptible degradation of Y chromosome gene content or activity. Using replicate wild populations with differing levels of sexually antagonistic selection for colour, we also show that sexual selection leads to greater expansion of the non-recombining region and increased Y chromosome divergence. These results provide empirical support for longstanding models of sex chromosome catalysis, and suggest an important role for sexual selection and sexual conflict in genome evolution.}, author = {Wright, Alison and Darolti, Iulia and Bloch, Natasha and Oostra, Vicencio and Sandkam, Benjamin and Buechel, Séverine and Kolm, Niclas and Breden, Felix and Vicoso, Beatriz and Mank, Judith}, issn = {20411723}, journal = {Nature Communications}, publisher = {Nature Publishing Group}, title = {{Convergent recombination suppression suggests role of sexual selection in guppy sex chromosome formation}}, doi = {10.1038/ncomms14251}, volume = {8}, year = {2017}, }