@article{1137,
abstract = {RASGRP1 is an important guanine nucleotide exchange factor and activator of the RAS-MAPK pathway following T cell antigen receptor (TCR) signaling. The consequences of RASGRP1 mutations in humans are unknown. In a patient with recurrent bacterial and viral infections, born to healthy consanguineous parents, we used homozygosity mapping and exome sequencing to identify a biallelic stop-gain variant in RASGRP1. This variant segregated perfectly with the disease and has not been reported in genetic databases. RASGRP1 deficiency was associated in T cells and B cells with decreased phosphorylation of the extracellular-signal-regulated serine kinase ERK, which was restored following expression of wild-type RASGRP1. RASGRP1 deficiency also resulted in defective proliferation, activation and motility of T cells and B cells. RASGRP1-deficient natural killer (NK) cells exhibited impaired cytotoxicity with defective granule convergence and actin accumulation. Interaction proteomics identified the dynein light chain DYNLL1 as interacting with RASGRP1, which links RASGRP1 to cytoskeletal dynamics. RASGRP1-deficient cells showed decreased activation of the GTPase RhoA. Treatment with lenalidomide increased RhoA activity and reversed the migration and activation defects of RASGRP1-deficient lymphocytes.},
author = {Salzer, Elisabeth and Çaǧdaş, Deniz and Hons, Miroslav and Mace, Emily and Garncarz, Wojciech and Petronczki, Oezlem and Platzer, René and Pfajfer, Laurène and Bilic, Ivan and Ban, Sol and Willmann, Katharina and Mukherjee, Malini and Supper, Verena and Hsu, Hsiangting and Banerjee, Pinaki and Sinha, Papiya and Mcclanahan, Fabienne and Zlabinger, Gerhard and Pickl, Winfried and Gribben, John and Stockinger, Hannes and Bennett, Keiryn and Huppa, Johannes and Dupré, Loï̈C and Sanal, Özden and Jäger, Ulrich and Sixt, Michael K and Tezcan, Ilhan and Orange, Jordan and Boztug, Kaan},
journal = {Nature Immunology},
number = {12},
pages = {1352 -- 1360},
publisher = {Nature Publishing Group},
title = {{RASGRP1 deficiency causes immunodeficiency with impaired cytoskeletal dynamics}},
doi = {10.1038/ni.3575},
volume = {17},
year = {2016},
}
@inproceedings{1138,
abstract = {Automata with monitor counters, where the transitions do not depend on counter values, and nested weighted automata are two expressive automata-theoretic frameworks for quantitative properties. For a well-studied and wide class of quantitative functions, we establish that automata with monitor counters and nested weighted automata are equivalent. We study for the first time such quantitative automata under probabilistic semantics. We show that several problems that are undecidable for the classical questions of emptiness and universality become decidable under the probabilistic semantics. We present a complete picture of decidability for such automata, and even an almost-complete picture of computational complexity, for the probabilistic questions we consider. © 2016 ACM.},
author = {Chatterjee, Krishnendu and Henzinger, Thomas A and Otop, Jan},
booktitle = {Proceedings of the 31st Annual ACM/IEEE Symposium},
location = {New York, NY, USA},
pages = {76 -- 85},
publisher = {IEEE},
title = {{Quantitative automata under probabilistic semantics}},
doi = {10.1145/2933575.2933588},
year = {2016},
}
@article{1139,
abstract = {Microtubules switch stochastically between phases of growth and shrinkage. The molecular mechanism responsible for the end of a growth phase, an event called catastrophe, is still not understood. The probability for a catastrophe to occur increases with microtubule age, putting constraints on the possible molecular mechanism of catastrophe induction. Here we used microfluidics-Assisted fast tubulin washout experiments to induce microtubule depolymerization in a controlled manner at different times after the start of growth. We found that aging can also be observed in this assay, providing valuable new constraints against which theoretical models of catastrophe induction can be tested. We found that the data can be quantitatively well explained by a simple kinetic threshold model that assumes an age-dependent broadening of the protective cap at the microtubule end as a result of an evolving tapered end structure; this leads to a decrease of the cap density and its stability. This analysis suggests an intuitive picture of the role of morphological changes of the protective cap for the age dependence of microtubule stability.},
author = {Düllberg, Christian F and Cade, Nicholas and Surrey, Thomas},
journal = {Molecular Biology and Evolution},
number = {22},
pages = {3563 -- 3573},
publisher = {Oxford University Press},
title = {{Microtubule aging probed by microfluidics assisted tubulin washout}},
doi = {10.1091/mbc.E16-07-0548},
volume = {27},
year = {2016},
}
@article{1141,
abstract = {In this paper we introduce the Multiobjective Optimization Hierarchic Genetic Strategy with maturing (MO-mHGS), a meta-algorithm that performs evolutionary optimization in a hierarchy of populations. The maturing mechanism improves growth and reduces redundancy. The performance of MO-mHGS with selected state-of-the-art multiobjective evolutionary algorithms as internal algorithms is analysed on benchmark problems and their modifications for which single fitness evaluation time depends on the solution accuracy. We compare the proposed algorithm with the Island Model Genetic Algorithm as well as with single-deme methods, and discuss the impact of internal algorithms on the MO-mHGS meta-algorithm. © 2016 Elsevier B.V.},
author = {Łazarz, Radosław and Idzik, Michał and Gądek, Konrad and Gajda-Zagorska, Ewa P},
journal = {Journal of Computational Science},
number = {1},
pages = {249 -- 260},
publisher = {Elsevier},
title = {{Hierarchic genetic strategy with maturing as a generic tool for multiobjective optimization}},
doi = {10.1016/j.jocs.2016.03.004},
volume = {17},
year = {2016},
}
@article{1142,
abstract = {Hemolysis drives susceptibility to bacterial infections and predicts poor outcome from sepsis. These detrimental effects are commonly considered to be a consequence of heme-iron serving as a nutrient for bacteria. We employed a Gram-negative sepsis model and found that elevated heme levels impaired the control of bacterial proliferation independently of heme-iron acquisition by pathogens. Heme strongly inhibited phagocytosis and the migration of human and mouse phagocytes by disrupting actin cytoskeletal dynamics via activation of the GTP-binding Rho family protein Cdc42 by the guanine nucleotide exchange factor DOCK8. A chemical screening approach revealed that quinine effectively prevented heme effects on the cytoskeleton, restored phagocytosis and improved survival in sepsis. These mechanistic insights provide potential therapeutic targets for patients with sepsis or hemolytic disorders.},
author = {Martins, Rui and Maier, Julia and Gorki, Anna and Huber, Kilian and Sharif, Omar and Starkl, Philipp and Saluzzo, Simona and Quattrone, Federica and Gawish, Riem and Lakovits, Karin and Aichinger, Michael and Radic Sarikas, Branka and Lardeau, Charles and Hladik, Anastasiya and Korosec, Ana and Brown, Markus and Vaahtomeri, Kari and Duggan, Michelle and Kerjaschki, Dontscho and Esterbauer, Harald and Colinge, Jacques and Eisenbarth, Stephanie and Decker, Thomas and Bennett, Keiryn and Kubicek, Stefan and Sixt, Michael K and Superti Furga, Giulio and Knapp, Sylvia},
journal = {Nature Immunology},
number = {12},
pages = {1361 -- 1372},
publisher = {Nature Publishing Group},
title = {{Heme drives hemolysis-induced susceptibility to infection via disruption of phagocyte functions}},
doi = {10.1038/ni.3590},
volume = {17},
year = {2016},
}
@article{1143,
abstract = {We study the ground state of a dilute Bose gas in a scaling limit where the Gross-Pitaevskii functional emerges. This is a repulsive nonlinear Schrödinger functional whose quartic term is proportional to the scattering length of the interparticle interaction potential. We propose a new derivation of this limit problem, with a method that bypasses some of the technical difficulties that previous derivations had to face. The new method is based on a combination of Dyson\'s lemma, the quantum de Finetti theorem and a second moment estimate for ground states of the effective Dyson Hamiltonian. It applies equally well to the case where magnetic fields or rotation are present.},
author = {Nam, Phan and Rougerie, Nicolas and Seiringer, Robert},
journal = {Analysis and PDE},
number = {2},
pages = {459 -- 485},
publisher = {Mathematical Sciences Publishers},
title = {{Ground states of large bosonic systems: The gross Pitaevskii limit revisited}},
doi = {10.2140/apde.2016.9.459},
volume = {9},
year = {2016},
}
@article{1145,
abstract = {Auxin directs plant ontogenesis via differential accumulation within tissues depending largely on the activity of PIN proteins that mediate auxin efflux from cells and its directional cell-to-cell transport. Regardless of the developmental importance of PINs, the structure of these transporters is poorly characterized. Here, we present experimental data concerning protein topology of plasma membrane-localized PINs. Utilizing approaches based on pH-dependent quenching of fluorescent reporters combined with immunolocalization techniques, we mapped the membrane topology of PINs and further cross-validated our results using available topology modeling software. We delineated the topology of PIN1 with two transmembrane (TM) bundles of five α-helices linked by a large intracellular loop and a C-terminus positioned outside the cytoplasm. Using constraints derived from our experimental data, we also provide an updated position of helical regions generating a verisimilitude model of PIN1. Since the canonical long PINs show a high degree of conservation in TM domains and auxin transport capacity has been demonstrated for Arabidopsis representatives of this group, this empirically enhanced topological model of PIN1 will be an important starting point for further studies on PIN structure–function relationships. In addition, we have established protocols that can be used to probe the topology of other plasma membrane proteins in plants. © 2016 The Authors},
author = {Nodzyński, Tomasz and Vanneste, Steffen and Zwiewka, Marta and Pernisová, Markéta and Hejátko, Jan and Friml, Jirí},
journal = {Molecular Plant},
number = {11},
pages = {1504 -- 1519},
publisher = {Cell Press},
title = {{Enquiry into the topology of plasma membrane localized PIN auxin transport components}},
doi = {10.1016/j.molp.2016.08.010},
volume = {9},
year = {2016},
}
@article{1147,
abstract = {Apical dominance is one of the fundamental developmental phenomena in plant biology, which determines the overall architecture of aerial plant parts. Here we show apex decapitation activated competition for dominance in adjacent upper and lower axillary buds. A two-nodal-bud pea (Pisum sativum L.) was used as a model system to monitor and assess auxin flow, auxin transport channels, and dormancy and initiation status of axillary buds. Auxin flow was manipulated by lateral stem wounds or chemically by auxin efflux inhibitors 2,3,5-triiodobenzoic acid (TIBA), 1-N-naphtylphtalamic acid (NPA), or protein synthesis inhibitor cycloheximide (CHX) treatments, which served to interfere with axillary bud competition. Redirecting auxin flow to different points influenced which bud formed the outgrowing and dominant shoot. The obtained results proved that competition between upper and lower axillary buds as secondary auxin sources is based on the same auxin canalization principle that operates between the shoot apex and axillary bud. © The Author(s) 2016.},
author = {Balla, Jozef and Medved'Ová, Zuzana and Kalousek, Petr and Matiješčuková, Natálie and Friml, Jirí and Reinöhl, Vilém and Procházka, Stanislav},
journal = {Scientific Reports},
publisher = {Nature Publishing Group},
title = {{Auxin flow mediated competition between axillary buds to restore apical dominance}},
doi = {10.1038/srep35955},
volume = {6},
year = {2016},
}
@article{1148,
abstract = {Continuous-time Markov chain (CTMC) models have become a central tool for understanding the dynamics of complex reaction networks and the importance of stochasticity in the underlying biochemical processes. When such models are employed to answer questions in applications, in order to ensure that the model provides a sufficiently accurate representation of the real system, it is of vital importance that the model parameters are inferred from real measured data. This, however, is often a formidable task and all of the existing methods fail in one case or the other, usually because the underlying CTMC model is high-dimensional and computationally difficult to analyze. The parameter inference methods that tend to scale best in the dimension of the CTMC are based on so-called moment closure approximations. However, there exists a large number of different moment closure approximations and it is typically hard to say a priori which of the approximations is the most suitable for the inference procedure. Here, we propose a moment-based parameter inference method that automatically chooses the most appropriate moment closure method. Accordingly, contrary to existing methods, the user is not required to be experienced in moment closure techniques. In addition to that, our method adaptively changes the approximation during the parameter inference to ensure that always the best approximation is used, even in cases where different approximations are best in different regions of the parameter space. © 2016 Elsevier Ireland Ltd},
author = {Schilling, Christian and Bogomolov, Sergiy and Henzinger, Thomas A and Podelski, Andreas and Ruess, Jakob},
journal = {Biosystems},
pages = {15 -- 25},
publisher = {Elsevier},
title = {{Adaptive moment closure for parameter inference of biochemical reaction networks}},
doi = {10.1016/j.biosystems.2016.07.005},
volume = {149},
year = {2016},
}
@article{1149,
abstract = {We study the usefulness of two most prominent publicly available rigorous ODE integrators: one provided by the CAPD group (capd.ii.uj.edu.pl), the other based on the COSY Infinity project (cosyinfinity.org). Both integrators are capable of handling entire sets of initial conditions and provide tight rigorous outer enclosures of the images under a time-T map. We conduct extensive benchmark computations using the well-known Lorenz system, and compare the computation time against the final accuracy achieved. We also discuss the effect of a few technical parameters, such as the order of the numerical integration method, the value of T, and the phase space resolution. We conclude that COSY may provide more precise results due to its ability of avoiding the variable dependency problem. However, the overall cost of computations conducted using CAPD is typically lower, especially when intervals of parameters are involved. Moreover, access to COSY is limited (registration required) and the rigorous ODE integrators are not publicly available, while CAPD is an open source free software project. Therefore, we recommend the latter integrator for this kind of computations. Nevertheless, proper choice of the various integration parameters turns out to be of even greater importance than the choice of the integrator itself. © 2016 IMACS. Published by Elsevier B.V. All rights reserved.},
author = {Miyaji, Tomoyuki and Pilarczyk, Pawel and Gameiro, Marcio and Kokubu, Hiroshi and Mischaikow, Konstantin},
journal = {Applied Numerical Mathematics},
pages = {34 -- 47},
publisher = {Elsevier},
title = {{A study of rigorous ODE integrators for multi scale set oriented computations}},
doi = {10.1016/j.apnum.2016.04.005},
volume = {107},
year = {2016},
}
@article{1150,
abstract = {When neutrophils infiltrate a site of inflammation, they have to stop at the right place to exert their effector function. In this issue of Developmental Cell, Wang et al. (2016) show that neutrophils sense reactive oxygen species via the TRPM2 channel to arrest migration at their target site. © 2016 Elsevier Inc.},
author = {Renkawitz, Jörg and Sixt, Michael K},
journal = {Developmental Cell},
number = {5},
pages = {448 -- 450},
publisher = {Cell Press},
title = {{A Radical Break Restraining Neutrophil Migration}},
doi = {10.1016/j.devcel.2016.08.017},
volume = {38},
year = {2016},
}
@article{1151,
abstract = {Tissue patterning in multicellular organisms is the output of precise spatio–temporal regulation of gene expression coupled with changes in hormone dynamics. In plants, the hormone auxin regulates growth and development at every stage of a plant’s life cycle. Auxin signaling occurs through binding of the auxin molecule to a TIR1/AFB F-box ubiquitin ligase, allowing interaction with Aux/IAA transcriptional repressor proteins. These are subsequently ubiquitinated and degraded via the 26S proteasome, leading to derepression of auxin response factors (ARFs). How auxin is able to elicit such a diverse range of developmental responses through a single signaling module has not yet been resolved. Here we present an alternative auxin-sensing mechanism in which the ARF ARF3/ETTIN controls gene expression through interactions with process-specific transcription factors. This noncanonical hormonesensing mechanism exhibits strong preference for the naturally occurring auxin indole 3-acetic acid (IAA) and is important for coordinating growth and patterning in diverse developmental contexts such as gynoecium morphogenesis, lateral root emergence, ovule development, and primary branch formation. Disrupting this IAA-sensing ability induces morphological aberrations with consequences for plant fitness. Therefore, our findings introduce a novel transcription factor-based mechanism of hormone perception in plants. © 2016 Simonini et al.},
author = {Simonini, Sara and Deb, Joyita and Moubayidin, Laila and Stephenson, Pauline and Valluru, Manoj and Freire Rios, Alejandra and Sorefan, Karim and Weijers, Dolf and Friml, Jirí and Östergaard, Lars},
journal = {Genes and Development},
number = {20},
pages = {2286 -- 2296},
publisher = {Cold Spring Harbor Laboratory Press},
title = {{A noncanonical auxin sensing mechanism is required for organ morphogenesis in arabidopsis}},
doi = {10.1101/gad.285361.116},
volume = {30},
year = {2016},
}
@article{1153,
abstract = {Differential cell growth enables flexible organ bending in the presence of environmental signals such as light or gravity. A prominent example of the developmental processes based on differential cell growth is the formation of the apical hook that protects the fragile shoot apical meristem when it breaks through the soil during germination. Here, we combined in silico and in vivo approaches to identify a minimal mechanism producing auxin gradient-guided differential growth during the establishment of the apical hook in the model plant Arabidopsis thaliana. Computer simulation models based on experimental data demonstrate that asymmetric expression of the PIN-FORMED auxin efflux carrier at the concave (inner) versus convex (outer) side of the hook suffices to establish an auxin maximum in the epidermis at the concave side of the apical hook. Furthermore, we propose a mechanism that translates this maximum into differential growth, and thus curvature, of the apical hook. Through a combination of experimental and in silico computational approaches, we have identified the individual contributions of differential cell elongation and proliferation to defining the apical hook and reveal the role of auxin-ethylene crosstalk in balancing these two processes. © 2016 American Society of Plant Biologists. All rights reserved.},
author = {Žádníková, Petra and Wabnik, Krzysztof T and Abuzeineh, Anas and Gallemí, Marçal and Van Der Straeten, Dominique and Smith, Richard and Inze, Dirk and Friml, Jirí and Prusinkiewicz, Przemysław and Benková, Eva},
journal = {Plant Cell},
number = {10},
pages = {2464 -- 2477},
publisher = {American Society of Plant Biologists},
title = {{A model of differential growth guided apical hook formation in plants}},
doi = {10.1105/tpc.15.00569},
volume = {28},
year = {2016},
}
@article{1154,
abstract = {Cellular locomotion is a central hallmark of eukaryotic life. It is governed by cell-extrinsic molecular factors, which can either emerge in the soluble phase or as immobilized, often adhesive ligands. To encode for direction, every cue must be present as a spatial or temporal gradient. Here, we developed a microfluidic chamber that allows measurement of cell migration in combined response to surface immobilized and soluble molecular gradients. As a proof of principle we study the response of dendritic cells to their major guidance cues, chemokines. The majority of data on chemokine gradient sensing is based on in vitro studies employing soluble gradients. Despite evidence suggesting that in vivo chemokines are often immobilized to sugar residues, limited information is available how cells respond to immobilized chemokines. We tracked migration of dendritic cells towards immobilized gradients of the chemokine CCL21 and varying superimposed soluble gradients of CCL19. Differential migratory patterns illustrate the potential of our setup to quantitatively study the competitive response to both types of gradients. Beyond chemokines our approach is broadly applicable to alternative systems of chemo- and haptotaxis such as cells migrating along gradients of adhesion receptor ligands vs. any soluble cue.
},
author = {Schwarz, Jan and Bierbaum, Veronika and Merrin, Jack and Frank, Tino and Hauschild, Robert and Bollenbach, Mark Tobias and Tay, Savaş and Sixt, Michael K and Mehling, Matthias},
journal = {Scientific Reports},
publisher = {Nature Publishing Group},
title = {{A microfluidic device for measuring cell migration towards substrate bound and soluble chemokine gradients}},
doi = {10.1038/srep36440},
volume = {6},
year = {2016},
}
@article{1156,
abstract = {Let k, n, and r be positive integers with k < n and r≤⌊nk⌋. We determine the facets of the r-stable n, k-hypersimplex. As a result, it turns out that the r-stable n, k-hypersimplex has exactly 2n facets for every r<⌊nk⌋. We then utilize the equations of the facets to study when the r-stable hypersimplex is Gorenstein. For every k > 0 we identify an infinite collection of Gorenstein r-stable hypersimplices, consequently expanding the collection of r-stable hypersimplices known to have unimodal Ehrhart δ-vectors.},
author = {Hibi, Takayugi and Liam Solus},
journal = {Annals of Combinatorics},
number = {4},
pages = {815 -- 829},
publisher = {Springer},
title = {{Facets of the r-stable (n, k)-hypersimplex}},
doi = {10.1007/s00026-016-0325-x},
volume = {20},
year = {2016},
}
@article{1157,
abstract = {We consider sample covariance matrices of the form Q = ( σ1/2X)(σ1/2X)∗, where the sample X is an M ×N random matrix whose entries are real independent random variables with variance 1/N and whereσ is an M × M positive-definite deterministic matrix. We analyze the asymptotic fluctuations of the largest rescaled eigenvalue of Q when both M and N tend to infinity with N/M →d ϵ (0,∞). For a large class of populations σ in the sub-critical regime, we show that the distribution of the largest rescaled eigenvalue of Q is given by the type-1 Tracy-Widom distribution under the additional assumptions that (1) either the entries of X are i.i.d. Gaussians or (2) that σ is diagonal and that the entries of X have a sub-exponential decay.},
author = {Lee, Ji and Schnelli, Kevin},
journal = {Annals of Applied Probability},
number = {6},
pages = {3786 -- 3839},
publisher = {Institute of Mathematical Statistics},
title = {{Tracy-widom distribution for the largest eigenvalue of real sample covariance matrices with general population}},
doi = {10.1214/16-AAP1193},
volume = {26},
year = {2016},
}
@article{1158,
abstract = {Speciation results from the progressive accumulation of mutations that decrease the probability of mating between parental populations or reduce the fitness of hybrids—the so-called species barriers. The speciation genomic literature, however, is mainly a collection of case studies, each with its own approach and specificities, such that a global view of the gradual process of evolution from one to two species is currently lacking. Of primary importance is the prevalence of gene flow between diverging entities, which is central in most species concepts and has been widely discussed in recent years. Here, we explore the continuum of speciation thanks to a comparative analysis of genomic data from 61 pairs of populations/species of animals with variable levels of divergence. Gene flow between diverging gene pools is assessed under an approximate Bayesian computation (ABC) framework. We show that the intermediate "grey zone" of speciation, in which taxonomy is often controversial, spans from 0.5% to 2% of net synonymous divergence, irrespective of species life history traits or ecology. Thanks to appropriate modeling of among-locus variation in genetic drift and introgression rate, we clarify the status of the majority of ambiguous cases and uncover a number of cryptic species. Our analysis also reveals the high incidence in animals of semi-isolated species (when some but not all loci are affected by barriers to gene flow) and highlights the intrinsic difficulty, both statistical and conceptual, of delineating species in the grey zone of speciation.},
author = {Roux, Camille and Fraisse, Christelle and Romiguier, Jonathan and Anciaux, Youann and Galtier, Nicolas and Bierne, Nicolas},
journal = {PLoS Biology},
number = {12},
publisher = {Public Library of Science},
title = {{Shedding light on the grey zone of speciation along a continuum of genomic divergence}},
doi = {10.1371/journal.pbio.2000234},
volume = {14},
year = {2016},
}
@inproceedings{1164,
abstract = {A drawing of a graph G is radial if the vertices of G are placed on concentric circles C1, … , Ck with common center c, and edges are drawn radially: every edge intersects every circle centered at c at most once. G is radial planar if it has a radial embedding, that is, a crossing-free radial drawing. If the vertices of G are ordered or partitioned into ordered levels (as they are for leveled graphs), we require that the assignment of vertices to circles corresponds to the given ordering or leveling. A pair of edges e and f in a graph is independent if e and f do not share a vertex. We show that a graph G is radial planar if G has a radial drawing in which every two independent edges cross an even number of times; the radial embedding has the same leveling as the radial drawing. In other words, we establish the strong Hanani-Tutte theorem for radial planarity. This characterization yields a very simple algorithm for radial planarity testing.},
author = {Fulek, Radoslav and Pelsmajer, Michael and Schaefer, Marcus},
location = {Athens, Greece},
pages = {468 -- 481},
publisher = {Springer},
title = {{Hanani-Tutte for radial planarity II}},
doi = {10.1007/978-3-319-50106-2_36},
volume = {9801},
year = {2016},
}
@inproceedings{1165,
abstract = {We show that c-planarity is solvable in quadratic time for flat clustered graphs with three clusters if the combinatorial embedding of the underlying graph is fixed. In simpler graph-theoretical terms our result can be viewed as follows. Given a graph G with the vertex set partitioned into three parts embedded on a 2-sphere, our algorithm decides if we can augment G by adding edges without creating an edge-crossing so that in the resulting spherical graph the vertices of each part induce a connected sub-graph. We proceed by a reduction to the problem of testing the existence of a perfect matching in planar bipartite graphs. We formulate our result in a slightly more general setting of cyclic clustered graphs, i.e., the simple graph obtained by contracting each cluster, where we disregard loops and multi-edges, is a cycle.},
author = {Fulek, Radoslav},
location = {Athens, Greece},
pages = {94 -- 106},
publisher = {Springer},
title = {{C-planarity of embedded cyclic c-graphs}},
doi = {10.1007/978-3-319-50106-2_8},
volume = {9801 },
year = {2016},
}
@inproceedings{1166,
abstract = {POMDPs are standard models for probabilistic planning problems, where an agent interacts with an uncertain environment. We study the problem of almost-sure reachability, where given a set of target states, the question is to decide whether there is a policy to ensure that the target set is reached with probability 1 (almost-surely). While in general the problem is EXPTIMEcomplete, in many practical cases policies with a small amount of memory suffice. Moreover, the existing solution to the problem is explicit, which first requires to construct explicitly an exponential reduction to a belief-support MDP. In this work, we first study the existence of observation-stationary strategies, which is NP-complete, and then small-memory strategies. We present a symbolic algorithm by an efficient encoding to SAT and using a SAT solver for the problem. We report experimental results demonstrating the scalability of our symbolic (SAT-based) approach. © 2016, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved.},
author = {Chatterjee, Krishnendu and Chmelik, Martin and Davies, Jessica},
booktitle = {Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence},
location = {Phoenix, AZ, USA},
pages = {3225 -- 3232},
publisher = {AAAI Press},
title = {{A symbolic SAT based algorithm for almost sure reachability with small strategies in pomdps}},
volume = {2016},
year = {2016},
}
@article{1167,
abstract = {Evolutionary pathways describe trajectories of biological evolution in the space of different variants of organisms (genotypes). The probability of existence and the number of evolutionary pathways that lead from a given genotype to a better-adapted genotype are important measures of accessibility of local fitness optima and the reproducibility of evolution. Both quantities have been studied in simple mathematical models where genotypes are represented as binary sequences of two types of basic units, and the network of permitted mutations between the genotypes is a hypercube graph. However, it is unclear how these results translate to the biologically relevant case in which genotypes are represented by sequences of more than two units, for example four nucleotides (DNA) or 20 amino acids (proteins), and the mutational graph is not the hypercube. Here we investigate accessibility of the best-adapted genotype in the general case of K > 2 units. Using computer generated and experimental fitness landscapes we show that accessibility of the global fitness maximum increases with K and can be much higher than for binary sequences. The increase in accessibility comes from the increase in the number of indirect trajectories exploited by evolution for higher K. As one of the consequences, the fraction of genotypes that are accessible increases by three orders of magnitude when the number of units K increases from 2 to 16 for landscapes of size N ∼ 106genotypes. This suggests that evolution can follow many different trajectories on such landscapes and the reconstruction of evolutionary pathways from experimental data might be an extremely difficult task.},
author = {Zagórski, Marcin P and Burda, Zdzisław and Wacław, Bartłomiej},
journal = {PLoS Computational Biology},
number = {12},
publisher = {Public Library of Science},
title = {{Beyond the hypercube evolutionary accessibility of fitness landscapes with realistic mutational networks}},
doi = {10.1371/journal.pcbi.1005218},
volume = {12},
year = {2016},
}
@article{1170,
abstract = {The increasing complexity of dynamic models in systems and synthetic biology poses computational challenges especially for the identification of model parameters. While modularization of the corresponding optimization problems could help reduce the “curse of dimensionality,” abundant feedback and crosstalk mechanisms prohibit a simple decomposition of most biomolecular networks into subnetworks, or modules. Drawing on ideas from network modularization and multiple-shooting optimization, we present here a modular parameter identification approach that explicitly allows for such interdependencies. Interfaces between our modules are given by the experimentally measured molecular species. This definition allows deriving good (initial) estimates for the inter-module communication directly from the experimental data. Given these estimates, the states and parameter sensitivities of different modules can be integrated independently. To achieve consistency between modules, we iteratively adjust the estimates for inter-module communication while optimizing the parameters. After convergence to an optimal parameter set---but not during earlier iterations---the intermodule communication as well as the individual modules\' state dynamics agree with the dynamics of the nonmodularized network. Our modular parameter identification approach allows for easy parallelization; it can reduce the computational complexity for larger networks and decrease the probability to converge to suboptimal local minima. We demonstrate the algorithm\'s performance in parameter estimation for two biomolecular networks, a synthetic genetic oscillator and a mammalian signaling pathway.},
author = {Lang, Moritz and Stelling, Jörg},
journal = {SIAM Journal on Scientific Computing},
number = {6},
pages = {B988 -- B1008},
publisher = {Society for Industrial and Applied Mathematics },
title = {{Modular parameter identification of biomolecular networks}},
doi = {10.1137/15M103306X},
volume = {38},
year = {2016},
}
@article{1171,
author = {Tkacik, Gasper},
journal = {Physics of Life Reviews},
pages = {166 -- 167},
publisher = {Elsevier},
title = {{Understanding regulatory networks requires more than computing a multitude of graph statistics: Comment on "Drivers of structural features in gene regulatory networks: From biophysical constraints to biological function" by O. C. Martin et al.}},
doi = {10.1016/j.plrev.2016.06.005},
volume = {17},
year = {2016},
}
@article{1172,
abstract = {A central issue in cell biology is the physico-chemical basis of organelle biogenesis in intracellular trafficking pathways, its most impressive manifestation being the biogenesis of Golgi cisternae. At a basic level, such morphologically and chemically distinct compartments should arise from an interplay between the molecular transport and chemical maturation. Here, we formulate analytically tractable, minimalist models, that incorporate this interplay between transport and chemical progression in physical space, and explore the conditions for de novo biogenesis of distinct cisternae. We propose new quantitative measures that can discriminate between the various models of transport in a qualitative manner-this includes measures of the dynamics in steady state and the dynamical response to perturbations of the kind amenable to live-cell imaging.},
author = {Sachdeva, Himani and Barma, Mustansir and Rao, Madan},
journal = {Scientific Reports},
publisher = {Nature Publishing Group},
title = {{Nonequilibrium description of de novo biogenesis and transport through Golgi-like cisternae}},
doi = {10.1038/srep38840},
volume = {6},
year = {2016},
}
@article{1545,
abstract = {We provide general conditions for which bosonic quadratic Hamiltonians on Fock spaces can be diagonalized by Bogoliubov transformations. Our results cover the case when quantum systems have infinite degrees of freedom and the associated one-body kinetic and paring operators are unbounded. Our sufficient conditions are optimal in the sense that they become necessary when the relevant one-body operators commute.},
author = {Nam, Phan and Napiórkowski, Marcin M and Solovej, Jan},
journal = {Journal of Functional Analysis},
number = {11},
pages = {4340 -- 4368},
publisher = {Academic Press},
title = {{Diagonalization of bosonic quadratic Hamiltonians by Bogoliubov transformations}},
doi = {10.1016/j.jfa.2015.12.007},
volume = {270},
year = {2016},
}
@article{1552,
abstract = {Antibiotic resistance carries a fitness cost that must be overcome in order for resistance to persist over the long term. Compensatory mutations that recover the functional defects associated with resistance mutations have been argued to play a key role in overcoming the cost of resistance, but compensatory mutations are expected to be rare relative to generally beneficial mutations that increase fitness, irrespective of antibiotic resistance. Given this asymmetry, population genetics theory predicts that populations should adapt by compensatory mutations when the cost of resistance is large, whereas generally beneficial mutations should drive adaptation when the cost of resistance is small. We tested this prediction by determining the genomic mechanisms underpinning adaptation to antibiotic-free conditions in populations of the pathogenic bacterium Pseudomonas aeruginosa that carry costly antibiotic resistance mutations. Whole-genome sequencing revealed that populations founded by high-cost rifampicin-resistant mutants adapted via compensatory mutations in three genes of the RNA polymerase core enzyme, whereas populations founded by low-cost mutants adapted by generally beneficial mutations, predominantly in the quorum-sensing transcriptional regulator gene lasR. Even though the importance of compensatory evolution in maintaining resistance has been widely recognized, our study shows that the roles of general adaptation in maintaining resistance should not be underestimated and highlights the need to understand how selection at other sites in the genome influences the dynamics of resistance alleles in clinical settings.},
author = {Qi, Qin and Toll Riera, Macarena and Heilbron, Karl and Preston, Gail and Maclean, R Craig},
journal = {Proceedings of the Royal Society of London Series B Biological Sciences},
number = {1822},
publisher = {Royal Society, The},
title = {{The genomic basis of adaptation to the fitness cost of rifampicin resistance in Pseudomonas aeruginosa}},
doi = {10.1098/rspb.2015.2452},
volume = {283},
year = {2016},
}
@article{1592,
abstract = {A modular approach to constructing cryptographic protocols leads to simple designs but often inefficient instantiations. On the other hand, ad hoc constructions may yield efficient protocols at the cost of losing conceptual simplicity. We suggest a new design paradigm, structure-preserving cryptography, that provides a way to construct modular protocols with reasonable efficiency while retaining conceptual simplicity. A cryptographic scheme over a bilinear group is called structure-preserving if its public inputs and outputs consist of elements from the bilinear groups and their consistency can be verified by evaluating pairing-product equations. As structure-preserving schemes smoothly interoperate with each other, they are useful as building blocks in modular design of cryptographic applications. This paper introduces structure-preserving commitment and signature schemes over bilinear groups with several desirable properties. The commitment schemes include homomorphic, trapdoor and length-reducing commitments to group elements, and the structure-preserving signature schemes are the first ones that yield constant-size signatures on multiple group elements. A structure-preserving signature scheme is called automorphic if the public keys lie in the message space, which cannot be achieved by compressing inputs via a cryptographic hash function, as this would destroy the mathematical structure we are trying to preserve. Automorphic signatures can be used for building certification chains underlying privacy-preserving protocols. Among a vast number of applications of structure-preserving protocols, we present an efficient round-optimal blind-signature scheme and a group signature scheme with an efficient and concurrently secure protocol for enrolling new members.},
author = {Abe, Masayuki and Fuchsbauer, Georg and Groth, Jens and Haralambiev, Kristiyan and Ohkubo, Miyako},
journal = {Journal of Cryptology},
number = {2},
pages = {363 -- 421},
publisher = {Springer},
title = {{Structure preserving signatures and commitments to group elements}},
doi = {10.1007/s00145-014-9196-7},
volume = {29},
year = {2016},
}
@article{1597,
abstract = {Chemokines are the main guidance cues directing leukocyte migration. Opposed to early assumptions, chemokines do not necessarily act as soluble cues but are often immobilized within tissues, e.g., dendritic cell migration toward lymphatic vessels is guided by a haptotactic gradient of the chemokine CCL21. Controlled assay systems to quantitatively study haptotaxis in vitro are still missing. In this chapter, we describe an in vitro haptotaxis assay optimized for the unique properties of dendritic cells. The chemokine CCL21 is immobilized in a bioactive state, using laser-assisted protein adsorption by photobleaching. The cells follow this immobilized CCL21 gradient in a haptotaxis chamber, which provides three dimensionally confined migration conditions.},
author = {Schwarz, Jan and Sixt, Michael K},
journal = {Methods in Enzymology},
pages = {567 -- 581},
publisher = {Elsevier},
title = {{Quantitative analysis of dendritic cell haptotaxis}},
doi = {10.1016/bs.mie.2015.11.004},
volume = {570},
year = {2016},
}
@article{1599,
abstract = {The addition of polysialic acid to N- and/or O-linked glycans, referred to as polysialylation, is a rare posttranslational modification that is mainly known to control the developmental plasticity of the nervous system. Here we show that CCR7, the central chemokine receptor controlling immune cell trafficking to secondary lymphatic organs, carries polysialic acid. This modification is essential for the recognition of the CCR7 ligand CCL21. As a consequence, dendritic cell trafficking is abrogated in polysialyltransferase-deficient mice, manifesting as disturbed lymph node homeostasis and unresponsiveness to inflammatory stimuli. Structure-function analysis of chemokine-receptor interactions reveals that CCL21 adopts an autoinhibited conformation, which is released upon interaction with polysialic acid. Thus, we describe a glycosylation-mediated immune cell trafficking disorder and its mechanistic basis.
},
author = {Kiermaier, Eva and Moussion, Christine and Veldkamp, Christopher and Gerardy Schahn, Rita and De Vries, Ingrid and Williams, Larry and Chaffee, Gary and Phillips, Andrew and Freiberger, Friedrich and Imre, Richard and Taleski, Deni and Payne, Richard and Braun, Asolina and Förster, Reinhold and Mechtler, Karl and Mühlenhoff, Martina and Volkman, Brian and Sixt, Michael K},
journal = {Science},
number = {6269},
pages = {186 -- 190},
publisher = {American Association for the Advancement of Science},
title = {{Polysialylation controls dendritic cell trafficking by regulating chemokine recognition}},
doi = {10.1126/science.aad0512},
volume = {351},
year = {2016},
}
@article{1608,
abstract = {We show that the Anderson model has a transition from localization to delocalization at exactly 2 dimensional growth rate on antitrees with normalized edge weights which are certain discrete graphs. The kinetic part has a one-dimensional structure allowing a description through transfer matrices which involve some Schur complement. For such operators we introduce the notion of having one propagating channel and extend theorems from the theory of one-dimensional Jacobi operators that relate the behavior of transfer matrices with the spectrum. These theorems are then applied to the considered model. In essence, in a certain energy region the kinetic part averages the random potentials along shells and the transfer matrices behave similar as for a one-dimensional operator with random potential of decaying variance. At d dimensional growth for d>2 this effective decay is strong enough to obtain absolutely continuous spectrum, whereas for some uniform d dimensional growth with d<2 one has pure point spectrum in this energy region. At exactly uniform 2 dimensional growth also some singular continuous spectrum appears, at least at small disorder. As a corollary we also obtain a change from singular spectrum (d≤2) to absolutely continuous spectrum (d≥3) for random operators of the type rΔdr+λ on ℤd, where r is an orthogonal radial projection, Δd the discrete adjacency operator (Laplacian) on ℤd and λ a random potential. },
author = {Sadel, Christian},
journal = {Annales Henri Poincare},
number = {7},
pages = {1631 -- 1675},
publisher = {Birkhäuser},
title = {{Anderson transition at 2 dimensional growth rate on antitrees and spectral theory for operators with one propagating channel}},
doi = {10.1007/s00023-015-0456-3},
volume = {17},
year = {2016},
}
@article{1612,
abstract = {We prove that whenever A is a 3-conservative relational structure with only binary and unary relations,then the algebra of polymorphisms of A either has no Taylor operation (i.e.,CSP(A)is NP-complete),or it generates an SD(∧) variety (i.e.,CSP(A)has bounded width).},
author = {Kazda, Alexandr},
journal = {Algebra Universalis},
number = {1},
pages = {75 -- 84},
publisher = {Springer},
title = {{CSP for binary conservative relational structures}},
doi = {10.1007/s00012-015-0358-8},
volume = {75},
year = {2016},
}
@article{1613,
abstract = {In the last decade, induced pluripotent stem (iPS) cells have revolutionized the utility of human in vitro models of neurological disease. The iPS-derived and differentiated cells allow researchers to study the impact of a distinct cell type in health and disease as well as performing therapeutic drug screens on a human genetic background. In particular, clinical trials for Alzheimer's disease (AD) have been often failing. Two of the potential reasons are first, the species gap involved in proceeding from initial discoveries in rodent models to human studies, and second, an unsatisfying patient stratification, meaning subgrouping patients based on the disease severity due to the lack of phenotypic and genetic markers. iPS cells overcome this obstacles and will improve our understanding of disease subtypes in AD. They allow researchers conducting in depth characterization of neural cells from both familial and sporadic AD patients as well as preclinical screens on human cells.
In this review, we briefly outline the status quo of iPS cell research in neurological diseases along with the general advantages and pitfalls of these models. We summarize how genome-editing techniques such as CRISPR/Cas will allow researchers to reduce the problem of genomic variability inherent to human studies, followed by recent iPS cell studies relevant to AD. We then focus on current techniques for the differentiation of iPS cells into neural cell types that are relevant to AD research. Finally, we discuss how the generation of three-dimensional cell culture systems will be important for understanding AD phenotypes in a complex cellular milieu, and how both two- and three-dimensional iPS cell models can provide platforms for drug discovery and translational studies into the treatment of AD.},
author = {Mungenast, Alison and Siegert, Sandra and Tsai, Li},
journal = {Molecular and Cellular Neuroscience},
pages = {13 -- 31},
publisher = {Academic Press},
title = {{Modeling Alzheimer's disease with human induced pluripotent stem (iPS) cells}},
doi = {doi:10.1016/j.mcn.2015.11.010},
volume = {73},
year = {2016},
}
@article{1616,
abstract = {The hippocampus plays a key role in learning and memory. Previous studies suggested that the main types of principal neurons, dentate gyrus granule cells (GCs), CA3 pyramidal neurons, and CA1 pyramidal neurons, differ in their activity pattern, with sparse firing in GCs and more frequent firing in CA3 and CA1 pyramidal neurons. It has been assumed but never shown that such different activity may be caused by differential synaptic excitation. To test this hypothesis, we performed high-resolution whole-cell patch-clamp recordings in anesthetized rats in vivo. In contrast to previous in vitro data, both CA3 and CA1 pyramidal neurons fired action potentials spontaneously, with a frequency of ∼3–6 Hz, whereas GCs were silent. Furthermore, both CA3 and CA1 cells primarily fired in bursts. To determine the underlying mechanisms, we quantitatively assessed the frequency of spontaneous excitatory synaptic input, the passive membrane properties, and the active membrane characteristics. Surprisingly, GCs showed comparable synaptic excitation to CA3 and CA1 cells and the highest ratio of excitation versus hyperpolarizing inhibition. Thus, differential synaptic excitation is not responsible for differences in firing. Moreover, the three types of hippocampal neurons markedly differed in their passive properties. While GCs showed the most negative membrane potential, CA3 pyramidal neurons had the highest input resistance and the slowest membrane time constant. The three types of neurons also differed in the active membrane characteristics. GCs showed the highest action potential threshold, but displayed the largest gain of the input-output curves. In conclusion, our results reveal that differential firing of the three main types of hippocampal principal neurons in vivo is not primarily caused by differences in the characteristics of the synaptic input, but by the distinct properties of synaptic integration and input-output transformation.},
author = {Kowalski, Janina and Gan, Jian and Jonas, Peter M and Pernia-Andrade, Alejandro},
journal = {Hippocampus},
number = {5},
pages = {668 -- 682},
publisher = {John Wiley and Sons Inc.},
title = {{Intrinsic membrane properties determine hippocampal differential firing pattern in vivo in anesthetized rats}},
doi = {10.1002/hipo.22550},
volume = {26},
year = {2016},
}
@article{1617,
abstract = {We study the discrepancy of jittered sampling sets: such a set P⊂ [0,1]d is generated for fixed m∈ℕ by partitioning [0,1]d into md axis aligned cubes of equal measure and placing a random point inside each of the N=md cubes. We prove that, for N sufficiently large, 1/10 d/N1/2+1/2d ≤EDN∗(P)≤ √d(log N) 1/2/N1/2+1/2d, where the upper bound with an unspecified constant Cd was proven earlier by Beck. Our proof makes crucial use of the sharp Dvoretzky-Kiefer-Wolfowitz inequality and a suitably taylored Bernstein inequality; we have reasons to believe that the upper bound has the sharp scaling in N. Additional heuristics suggest that jittered sampling should be able to improve known bounds on the inverse of the star-discrepancy in the regime N≳dd. We also prove a partition principle showing that every partition of [0,1]d combined with a jittered sampling construction gives rise to a set whose expected squared L2-discrepancy is smaller than that of purely random points.},
author = {Pausinger, Florian and Steinerberger, Stefan},
journal = {Journal of Complexity},
pages = {199 -- 216},
publisher = {Academic Press},
title = {{On the discrepancy of jittered sampling}},
doi = {10.1016/j.jco.2015.11.003},
volume = {33},
year = {2016},
}
@article{1620,
abstract = {We consider the Bardeen–Cooper–Schrieffer free energy functional for particles interacting via a two-body potential on a microscopic scale and in the presence of weak external fields varying on a macroscopic scale. We study the influence of the external fields on the critical temperature. We show that in the limit where the ratio between the microscopic and macroscopic scale tends to zero, the next to leading order of the critical temperature is determined by the lowest eigenvalue of the linearization of the Ginzburg–Landau equation.},
author = {Frank, Rupert and Hainzl, Christian and Seiringer, Robert and Solovej, Jan},
journal = {Communications in Mathematical Physics},
number = {1},
pages = {189 -- 216},
publisher = {Springer},
title = {{The external field dependence of the BCS critical temperature}},
doi = {10.1007/s00220-015-2526-2},
volume = {342},
year = {2016},
}
@article{1622,
abstract = {We prove analogues of the Lieb–Thirring and Hardy–Lieb–Thirring inequalities for many-body quantum systems with fractional kinetic operators and homogeneous interaction potentials, where no anti-symmetry on the wave functions is assumed. These many-body inequalities imply interesting one-body interpolation inequalities, and we show that the corresponding one- and many-body inequalities are actually equivalent in certain cases.},
author = {Lundholm, Douglas and Nam, Phan and Portmann, Fabian},
journal = {Archive for Rational Mechanics and Analysis},
number = {3},
pages = {1343 -- 1382},
publisher = {Springer},
title = {{Fractional Hardy–Lieb–Thirring and related Inequalities for interacting systems}},
doi = {10.1007/s00205-015-0923-5},
volume = {219},
year = {2016},
}
@article{1631,
abstract = {Ancestral processes are fundamental to modern population genetics and spatial structure has been the subject of intense interest for many years. Despite this interest, almost nothing is known about the distribution of the locations of pedigree or genetic ancestors. Using both spatially continuous and stepping-stone models, we show that the distribution of pedigree ancestors approaches a travelling wave, for which we develop two alternative approximations. The speed and width of the wave are sensitive to the local details of the model. After a short time, genetic ancestors spread far more slowly than pedigree ancestors, ultimately diffusing out with radius ## rather than spreading at constant speed. In contrast to the wave of pedigree ancestors, the spread of genetic ancestry is insensitive to the local details of the models.},
author = {Kelleher, Jerome and Etheridge, Alison and Véber, Amandine and Barton, Nicholas H},
journal = {Theoretical Population Biology},
pages = {1 -- 12},
publisher = {Academic Press},
title = {{Spread of pedigree versus genetic ancestry in spatially distributed populations}},
doi = {10.1016/j.tpb.2015.10.008},
volume = {108},
year = {2016},
}
@article{1641,
abstract = {The plant hormone auxin (indole-3-acetic acid) is a major regulator of plant growth and development including embryo and root patterning, lateral organ formation and growth responses to environmental stimuli. Auxin is directionally transported from cell to cell by the action of specific auxin influx [AUXIN-RESISTANT1 (AUX1)] and efflux [PIN-FORMED (PIN)] transport regulators, whose polar, subcellular localizations are aligned with the direction of the auxin flow. Auxin itself regulates its own transport by modulation of the expression and subcellular localization of the auxin transporters. Increased auxin levels promote the transcription of PIN2 and AUX1 genes as well as stabilize PIN proteins at the plasma membrane, whereas prolonged auxin exposure increases the turnover of PIN proteins and their degradation in the vacuole. In this study, we applied a forward genetic approach, to identify molecular components playing a role in the auxin-mediated degradation. We generated EMS-mutagenized Arabidopsis PIN2::PIN2:GFP, AUX1::AUX1:YFP eir1aux1 populations and designed a screen for mutants with persistently strong fluorescent signals of the tagged PIN2 and AUX1 after prolonged treatment with the synthetic auxin 2,4-dichlorophenoxyacetic acid (2,4-D). This approach yielded novel auxin degradation mutants defective in trafficking and degradation of PIN2 and AUX1 proteins and established a role for auxin-mediated degradation in plant development.},
author = {Zemová, Radka and Zwiewka, Marta and Bielach, Agnieszka and Robert, Hélène and Friml, Jirí},
journal = {Journal of Plant Growth Regulation},
number = {2},
pages = {465 -- 476},
publisher = {Springer},
title = {{A forward genetic screen for new regulators of auxin mediated degradation of auxin transport proteins in Arabidopsis thaliana}},
doi = {10.1007/s00344-015-9553-2},
volume = {35},
year = {2016},
}
@inproceedings{1653,
abstract = {A somewhere statistically binding (SSB) hash, introduced by Hubáček and Wichs (ITCS ’15), can be used to hash a long string x to a short digest y = H hk (x) using a public hashing-key hk. Furthermore, there is a way to set up the hash key hk to make it statistically binding on some arbitrary hidden position i, meaning that: (1) the digest y completely determines the i’th bit (or symbol) of x so that all pre-images of y have the same value in the i’th position, (2) it is computationally infeasible to distinguish the position i on which hk is statistically binding from any other position i’. Lastly, the hash should have a local opening property analogous to Merkle-Tree hashing, meaning that given x and y = H hk (x) it should be possible to create a short proof π that certifies the value of the i’th bit (or symbol) of x without having to provide the entire input x. A similar primitive called a positional accumulator, introduced by Koppula, Lewko and Waters (STOC ’15) further supports dynamic updates of the hashed value. These tools, which are interesting in their own right, also serve as one of the main technical components in several recent works building advanced applications from indistinguishability obfuscation (iO).
The prior constructions of SSB hashing and positional accumulators required fully homomorphic encryption (FHE) and iO respectively. In this work, we give new constructions of these tools based on well studied number-theoretic assumptions such as DDH, Phi-Hiding and DCR, as well as a general construction from lossy/injective functions.},
author = {Okamoto, Tatsuaki and Pietrzak, Krzysztof Z and Waters, Brent and Wichs, Daniel},
location = {Auckland, New Zealand},
pages = {121 -- 145},
publisher = {Springer},
title = {{New realizations of somewhere statistically binding hashing and positional accumulators}},
doi = {10.1007/978-3-662-48797-6_6},
volume = {9452},
year = {2016},
}
@article{1662,
abstract = {We introduce a modification of the classic notion of intrinsic volume using persistence moments of height functions. Evaluating the modified first intrinsic volume on digital approximations of a compact body with smoothly embedded boundary in Rn, we prove convergence to the first intrinsic volume of the body as the resolution of the approximation improves. We have weaker results for the other modified intrinsic volumes, proving they converge to the corresponding intrinsic volumes of the n-dimensional unit ball.},
author = {Edelsbrunner, Herbert and Pausinger, Florian},
journal = {Advances in Mathematics},
pages = {674 -- 703},
publisher = {Academic Press},
title = {{Approximation and convergence of the intrinsic volume}},
doi = {10.1016/j.aim.2015.10.004},
volume = {287},
year = {2016},
}
@article{1705,
abstract = {Hybrid systems represent an important and powerful formalism for modeling real-world applications such as embedded systems. A verification tool like SpaceEx is based on the exploration of a symbolic search space (the region space). As a verification tool, it is typically optimized towards proving the absence of errors. In some settings, e.g., when the verification tool is employed in a feedback-directed design cycle, one would like to have the option to call a version that is optimized towards finding an error trajectory in the region space. A recent approach in this direction is based on guided search. Guided search relies on a cost function that indicates which states are promising to be explored, and preferably explores more promising states first. In this paper, we propose an abstraction-based cost function based on coarse-grained space abstractions for guiding the reachability analysis. For this purpose, a suitable abstraction technique that exploits the flexible granularity of modern reachability analysis algorithms is introduced. The new cost function is an effective extension of pattern database approaches that have been successfully applied in other areas. The approach has been implemented in the SpaceEx model checker. The evaluation shows its practical potential.},
author = {Bogomolov, Sergiy and Donzé, Alexandre and Frehse, Goran and Grosu, Radu and Johnson, Taylor and Ladan, Hamed and Podelski, Andreas and Wehrle, Martin},
journal = {International Journal on Software Tools for Technology Transfer},
number = {4},
pages = {449 -- 467},
publisher = {Springer},
title = {{Guided search for hybrid systems based on coarse-grained space abstractions}},
doi = {10.1007/s10009-015-0393-y},
volume = {18},
year = {2016},
}
@inproceedings{1707,
abstract = {Volunteer supporters play an important role in modern crisis and disaster management. In the times of mobile Internet devices, help from thousands of volunteers can be requested within a short time span, thus relieving professional helpers from minor chores or geographically spread-out tasks. However, the simultaneous availability of many volunteers also poses new problems. In particular, the volunteer efforts must be well coordinated, or otherwise situations might emerge in which too many idle volunteers at one location become more of a burden than a relief to the professionals.
In this work, we study the task of optimally assigning volunteers to selected locations, e.g. in order to perform regular measurements, to report on damage, or to distribute information or resources to the population in a crisis situation. We formulate the assignment tasks as an optimization problem and propose an effective and efficient solution procedure. Experiments on real data of the Team Österreich, consisting of over 36,000 Austrian volunteers, show the effectiveness and efficiency of our approach.},
author = {Pielorz, Jasmin and Lampert, Christoph},
location = {Rennes, France},
publisher = {IEEE},
title = {{Optimal geospatial allocation of volunteers for crisis management}},
doi = {10.1109/ICT-DM.2015.7402041},
year = {2016},
}
@article{173,
abstract = {We calculate admissible values of r such that a square-free polynomial with integer coefficients, no fixed prime divisor and irreducible factors of degree at most 3 takes infinitely many values that are a product of at most r distinct primes.},
author = {Browning, Timothy D and Booker, Andrew},
journal = {Discrete Analysis},
pages = {1 -- 18},
title = {{Square-free values of reducible polynomials}},
doi = {10.19086/da.732},
volume = {8},
year = {2016},
}
@article{1794,
abstract = {We consider Conditional random fields (CRFs) with pattern-based potentials defined on a chain. In this model the energy of a string (labeling) (Formula presented.) is the sum of terms over intervals [i, j] where each term is non-zero only if the substring (Formula presented.) equals a prespecified pattern w. Such CRFs can be naturally applied to many sequence tagging problems. We present efficient algorithms for the three standard inference tasks in a CRF, namely computing (i) the partition function, (ii) marginals, and (iii) computing the MAP. Their complexities are respectively (Formula presented.), (Formula presented.) and (Formula presented.) where L is the combined length of input patterns, (Formula presented.) is the maximum length of a pattern, and D is the input alphabet. This improves on the previous algorithms of Ye et al. (NIPS, 2009) whose complexities are respectively (Formula presented.), (Formula presented.) and (Formula presented.), where (Formula presented.) is the number of input patterns. In addition, we give an efficient algorithm for sampling, and revisit the case of MAP with non-positive weights.},
author = {Kolmogorov, Vladimir and Takhanov, Rustem},
journal = {Algorithmica},
number = {1},
pages = {17 -- 46},
publisher = {Springer},
title = {{Inference algorithms for pattern-based CRFs on sequence data}},
doi = {10.1007/s00453-015-0017-7},
volume = {76},
year = {2016},
}
@article{1833,
abstract = {Relational models for contingency tables are generalizations of log-linear models, allowing effects associated with arbitrary subsets of cells in the table, and not necessarily containing the overall effect, that is, a common parameter in every cell. Similarly to log-linear models, relational models can be extended to non-negative distributions, but the extension requires more complex methods. An extended relational model is defined as an algebraic variety, and it turns out to be the closure of the original model with respect to the Bregman divergence. In the extended relational model, the MLE of the cell parameters always exists and is unique, but some of its properties may be different from those of the MLE under log-linear models. The MLE can be computed using a generalized iterative scaling procedure based on Bregman projections. },
author = {Klimova, Anna and Rudas, Tamás},
journal = {Journal of Multivariate Analysis},
pages = {440 -- 452},
publisher = {Elsevier},
title = {{On the closure of relational models}},
doi = {10.1016/j.jmva.2015.10.005},
volume = {143},
year = {2016},
}
@article{1881,
abstract = {We consider random matrices of the form H=W+λV, λ∈ℝ+, where W is a real symmetric or complex Hermitian Wigner matrix of size N and V is a real bounded diagonal random matrix of size N with i.i.d.\ entries that are independent of W. We assume subexponential decay for the matrix entries of W and we choose λ∼1, so that the eigenvalues of W and λV are typically of the same order. Further, we assume that the density of the entries of V is supported on a single interval and is convex near the edges of its support. In this paper we prove that there is λ+∈ℝ+ such that the largest eigenvalues of H are in the limit of large N determined by the order statistics of V for λ>λ+. In particular, the largest eigenvalue of H has a Weibull distribution in the limit N→∞ if λ>λ+. Moreover, for N sufficiently large, we show that the eigenvectors associated to the largest eigenvalues are partially localized for λ>λ+, while they are completely delocalized for λ<λ+. Similar results hold for the lowest eigenvalues. },
author = {Lee, Jioon and Schnelli, Kevin},
journal = {Probability Theory and Related Fields},
number = {1-2},
pages = {165 -- 241},
publisher = {Springer},
title = {{Extremal eigenvalues and eigenvectors of deformed Wigner matrices}},
doi = {10.1007/s00440-014-0610-8},
volume = {164},
year = {2016},
}
@article{6732,
abstract = {Consider the transmission of a polar code of block length N and rate R over a binary memoryless symmetric channel W and let P e be the block error probability under successive cancellation decoding. In this paper, we develop new bounds that characterize the relationship of the parameters R, N, P e , and the quality of the channel W quantified by its capacity I(W) and its Bhattacharyya parameter Z(W). In previous work, two main regimes were studied. In the error exponent regime, the channel W and the rate R <; I(W) are fixed, and it was proved that the error probability Pe scales roughly as 2 -√N . In the scaling exponent approach, the channel W and the error probability Pe are fixed and it was proved that the gap to capacity I(W) - R scales as N -1/μ . Here, μ is called scaling exponent and this scaling exponent depends on the channel W. A heuristic computation for the binary erasure channel (BEC) gives μ = 3.627 and it was shown that, for any channel W, 3.579 ≤ μ ≤ 5.702. Our contributions are as follows. First, we provide the tighter upper bound μ <;≤ 4.714 valid for any W. With the same technique, we obtain the upper bound μ ≤ 3.639 for the case of the BEC; this upper bound approaches very closely the heuristically derived value for the scaling exponent of the erasure channel. Second, we develop a trade-off between the gap to capacity I(W)- R and the error probability Pe as the functions of the block length N. In other words, we neither fix the gap to capacity (error exponent regime) nor the error probability (scaling exponent regime), but we do consider a moderate deviations regime in which we study how fast both quantities, as the functions of the block length N, simultaneously go to 0. Third, we prove that polar codes are not affected by error floors. To do so, we fix a polar code of block length N and rate R. Then, we vary the channel W and study the impact of this variation on the error probability. We show that the error probability Pe scales as the Bhattacharyya parameter Z(W) raised to a power that scales roughly like VN. This agrees with the scaling in the error exponent regime.},
author = {Mondelli, Marco and Hassani, S. Hamed and Urbanke, Rudiger L.},
issn = {1557-9654},
journal = {IEEE Transactions on Information Theory},
number = {12},
pages = {6698--6712},
publisher = {IEEE},
title = {{Unified scaling of polar codes: Error exponent, scaling exponent, moderate deviations, and error floors}},
doi = {10.1109/tit.2016.2616117},
volume = {62},
year = {2016},
}
@inproceedings{6733,
abstract = {The question whether RM codes are capacity-achieving is a long-standing open problem in coding theory that was recently answered in the affirmative for transmission over erasure channels [1], [2]. Remarkably, the proof does not rely on specific properties of RM codes, apart from their symmetry. Indeed, the main technical result consists in showing that any sequence of linear codes, with doubly-transitive permutation groups, achieves capacity on the memoryless erasure channel under bit-MAP decoding. Thus, a natural question is what happens under block-MAP decoding. In [1], [2], by exploiting further symmetries of the code, the bit-MAP threshold was shown to be sharp enough so that the block erasure probability also converges to 0. However, this technique relies heavily on the fact that the transmission is over an erasure channel. We present an alternative approach to strengthen results regarding the bit-MAP threshold to block-MAP thresholds. This approach is based on a careful analysis of the weight distribution of RM codes. In particular, the flavor of the main result is the following: assume that the bit-MAP error probability decays as N -δ , for some δ > 0. Then, the block-MAP error probability also converges to 0. This technique applies to transmission over any binary memoryless symmetric channel. Thus, it can be thought of as a first step in extending the proof that RM codes are capacity-achieving to the general case.},
author = {Kudekar, Shrinivas and Kumar, Santhosh and Mondelli, Marco and Pfister, Henry D. and Urbankez, Rudiger},
booktitle = {2016 IEEE International Symposium on Information Theory },
location = {Barcelona, Spain},
pages = {1755--1759},
publisher = {IEEE},
title = {{Comparing the bit-MAP and block-MAP decoding thresholds of Reed-Muller codes on BMS channels}},
doi = {10.1109/isit.2016.7541600},
year = {2016},
}
@inproceedings{6770,
abstract = {We describe a new method to compare the bit-MAP and block-MAP decoding thresholds of Reed-Muller (RM) codes for transmission over a binary memoryless symmetric channel. The question whether RM codes are capacity-achieving is a long-standing open problem in coding theory and it has recently been answered in the affirmative for transmission over
erasure channels. Remarkably, the proof does not rely on specific properties of RM codes, apart from their symmetry. Indeed, the main technical result consists in showing that any sequence of linear codes, with doubly-transitive permutation groups, achieves capacity on the memoryless erasure channel under bit-MAP decoding. A natural question is what happens under block-MAP decoding. If the minimum distance of the code family is close to linear (e.g., of order N/ log(N)), then one can combine an upper bound on the bit-MAP error probability with a lower bound on the minimum distance to show that the code family is also capacity-achieving under block-MAP decoding. This strategy is successful for BCH codes. Unfortunately, the minimum distance of RM codes scales only as √N, which does not suffice to obtain the desired result. Then, one can exploit further symmetries of RM codes to show that the bit-MAP threshold is sharp enough so that the block erasure probability also tends to 0. However, this technique relies heavily on the fact that the transmission is over an erasure channel.
We present an alternative approach to strengthen results regarding the bit-MAP threshold to block-MAP thresholds. This approach is based on a careful analysis of the weight distribution of RM codes. In particular, the flavor of the main result is the following: assume that the bit-MAP error probability decays as N−δ, for some δ > 0. Then, the block-MAP
error probability also converges to 0. This technique applies to the transmission over any binary memoryless symmetric channel. Thus, it can be thought of as a first step in extending the proof that RM codes are capacity-achieving to the general case.},
author = {Mondelli, Marco and Kudekar, Shrinivas and Kumar, Santosh and Pfister, Henry D. and Şaşoğlu, Eren and Urbanke, Rüdiger},
booktitle = {24th International Zurich Seminar on Communications},
location = {Zurich, Switzerland},
pages = {50},
publisher = {ETH Zürich},
title = {{Reed-Muller codes: Thresholds and weight distribution}},
doi = {10.3929/ETHZ-A-010646484},
year = {2016},
}
@article{896,
abstract = {Multicellular eukaryotes have evolved a range of mechanisms for immune recognition. A widespread family involved in innate immunity are the NACHT-domain and leucine-rich-repeat-containing (NLR) proteins.Mammals have small numbers of NLR proteins, whereas in some species, mostly those without adaptive immune systems, NLRs have expanded into very large families.We describe a family of nearly 400NLR proteins encoded in the zebrafish genome. The proteins share a defining overall structure, which arose in fishes after a fusion of the core NLR domains with a B30.2 domain, but can be subdivided into four groups based on their NACHT domains. Gene conversion acting differentially on the NACHT and B30.2 domains has shaped the family and created the groups. Evidence of positive selection in the B30.2 domain indicates that this domain rather than the leucine-rich repeats acts as the pathogen recognition module. In an unusual chromosomal organization, the majority of the genes are located on one chromosome arm, interspersed with other large multigene families, including a new family encoding zinc-finger proteins. The NLR-B30.2 proteins represent a new family with diversity in the specific recognition module that is present in fishes in spite of the parallel existence of an adaptive immune system.},
author = {Howe, Kerstin L and Schiffer, Philipp H and Zielinski, Julia G and Wiehe, Thomas H and Laird, Gavin K and Marioni, John C and Soylemez, Onuralp and Fyodor Kondrashov and Leptin, Maria},
journal = {Open Biology},
number = {4},
publisher = {Royal Society, The},
title = {{Structure and evolutionary history of a large family of NLR proteins in the zebrafish}},
doi = {10.1098/rsob.160009},
volume = {6},
year = {2016},
}
@article{9019,
abstract = {Targeting protein–protein interactions has long been considered as a very difficult if impossible task, but over the past decade, front lines have moved. The number of successful examples is exponentially growing. This review presents a rapid overview of recent advances in this field considering the strengths and weaknesses of the small molecule approaches and alternative strategies such as the selection or design of artificial antibodies, peptides or peptidomimetics.},
author = {Bakail, May M and Ochsenbein, Francoise},
issn = {1631-0748},
journal = {Comptes Rendus Chimie},
keywords = {General Chemistry, General Chemical Engineering},
number = {1-2},
pages = {19--27},
publisher = {Elsevier},
title = {{Targeting protein–protein interactions, a wide open field for drug design}},
doi = {10.1016/j.crci.2015.12.004},
volume = {19},
year = {2016},
}
@article{9051,
abstract = {Biological systems often involve the self-assembly of basic components into complex and functioning structures. Artificial systems that mimic such processes can provide a well-controlled setting to explore the principles involved and also synthesize useful micromachines. Our experiments show that immotile, but active, components self-assemble into two types of structure that exhibit the fundamental forms of motility: translation and rotation. Specifically, micron-scale metallic rods are designed to induce extensile surface flows in the presence of a chemical fuel; these rods interact with each other and pair up to form either a swimmer or a rotor. Such pairs can transition reversibly between these two configurations, leading to kinetics reminiscent of bacterial run-and-tumble motion.},
author = {Davies Wykes, Megan S. and Palacci, Jérémie A and Adachi, Takuji and Ristroph, Leif and Zhong, Xiao and Ward, Michael D. and Zhang, Jun and Shelley, Michael J.},
issn = {1744-6848},
journal = {Soft Matter},
number = {20},
pages = {4584--4589},
publisher = {Royal Society of Chemistry},
title = {{Dynamic self-assembly of microscale rotors and swimmers}},
doi = {10.1039/c5sm03127c},
volume = {12},
year = {2016},
}
@article{9052,
abstract = {We describe colloidal Janus particles with metallic and dielectric faces that swim vigorously when illuminated by defocused optical tweezers without consuming any chemical fuel. Rather than wandering randomly, these optically-activated colloidal swimmers circulate back and forth through the beam of light, tracing out sinuous rosette patterns. We propose a model for this mode of light-activated transport that accounts for the observed behavior through a combination of self-thermophoresis and optically-induced torque. In the deterministic limit, this model yields trajectories that resemble rosette curves known as hypotrochoids.},
author = {Moyses, Henrique and Palacci, Jérémie A and Sacanna, Stefano and Grier, David G.},
issn = {1744-6848},
journal = {Soft Matter},
keywords = {General Chemistry, Condensed Matter Physics},
number = {30},
pages = {6357--6364},
publisher = {Royal Society of Chemistry },
title = {{Trochoidal trajectories of self-propelled Janus particles in a diverging laser beam}},
doi = {10.1039/c6sm01163b},
volume = {12},
year = {2016},
}
@article{9140,
abstract = {Expected changes to future extreme precipitation remain a key uncertainty associated with anthropogenic climate change. Extreme precipitation has been proposed to scale with the precipitable water content in the atmosphere. Assuming constant relative humidity, this implies an increase of precipitation extremes at a rate of about 7% °C−1 globally as indicated by the Clausius‐Clapeyron relationship. Increases faster and slower than Clausius‐Clapeyron have also been reported. In this work, we examine the scaling between precipitation extremes and temperature in the present climate using simulations and measurements from surface weather stations collected in the frame of the HyMeX and MED‐CORDEX programs in Southern France. Of particular interest are departures from the Clausius‐Clapeyron thermodynamic expectation, their spatial and temporal distribution, and their origin. Looking at the scaling of precipitation extreme with temperature, two regimes emerge which form a hook shape: one at low temperatures (cooler than around 15°C) with rates of increase close to the Clausius‐Clapeyron rate and one at high temperatures (warmer than about 15°C) with sub‐Clausius‐Clapeyron rates and most often negative rates. On average, the region of focus does not seem to exhibit super Clausius‐Clapeyron behavior except at some stations, in contrast to earlier studies. Many factors can contribute to departure from Clausius‐Clapeyron scaling: time and spatial averaging, choice of scaling temperature (surface versus condensation level), and precipitation efficiency and vertical velocity in updrafts that are not necessarily constant with temperature. But most importantly, the dynamical contribution of orography to precipitation in the fall over this area during the so‐called “Cevenoles” events, explains the hook shape of the scaling of precipitation extremes.},
author = {Drobinski, P. and Alonzo, B. and Bastin, S. and Silva, N. Da and Muller, Caroline J},
issn = {2169-897X},
journal = {Journal of Geophysical Research: Atmospheres},
number = {7},
pages = {3100--3119},
publisher = {American Geophysical Union},
title = {{Scaling of precipitation extremes with temperature in the French Mediterranean region: What explains the hook shape?}},
doi = {10.1002/2015jd023497},
volume = {121},
year = {2016},
}
@article{92,
abstract = {Advanced organic nonlinear optical (NLO) materials have attracted increasing attention due to their multitude of applications in modern telecommunication devices. Arguably the most important advantage of organic NLO materials, relative to traditionally used inorganic NLO materials, is their short optical response time. Geminal amido esters with their donor-π-acceptor (D-π-A) architecture exhibit high levels of electron delocalization and substantial intramolecular charge transfer, which should endow these materials with short optical response times and large molecular (hyper)polarizabilities. In order to test this hypothesis, the linear and second-order nonlinear optical properties of five geminal amido esters, (E)-ethyl 3-(X-phenylamino)-2-(Y-phenylcarbamoyl)acrylate (1, X = 4-H, Y = 4-H; 2, X = 4-CH3, Y = 4-CH3; 3, X = 4-NO2, Y = 2,5-OCH3; 4, X = 2-Cl, Y = 2-Cl; 5, X = 4-Cl, Y = 4-Cl) were synthesized and characterized, whereby NLO structure-function relationships were established including intramolecular charge transfer characteristics, crystal field effects, and molecular first hyperpolarizabilities (β). Given the typically large errors (10-30%) associated with the determination of β coefficients, three independent methods were used: (i) density functional theory, (ii) hyper-Rayleigh scattering, and (iii) high-resolution X-ray diffraction data analysis based on multipolar modeling of electron densities at each atom. These three methods delivered consistent values of β, and based on these results, 3 should hold the most promise for NLO applications. The correlation between the molecular structure of these geminal amido esters and their linear and nonlinear optical properties thus provide molecular design guidelines for organic NLO materials; this leads to the ultimate goal of generating bespoke organic molecules to suit a given NLO device application.},
author = {Cole, Jaqueline and Lin, Tzechia and Ashcroft, Christopher and Pérez Moreno, Javier and Tan, Yizhou and Venkatesan, Perumal and Higginbotham, Andrew P and Pattison, Philip and Edwards, Alison and Piltz, Ross and Clays, Koen and Ilangovan, Andivelu},
journal = {Journal of Physical Chemistry C},
number = {51},
pages = {29439 -- 29448},
publisher = {American Chemical Society},
title = {{Relating the structure of geminal Amido Esters to their molecular hyperpolarizability}},
doi = {10.1021/acs.jpcc.6b10724},
volume = {120},
year = {2016},
}
@article{1177,
abstract = {Boldyreva, Palacio and Warinschi introduced a multiple forking game as an extension of general forking. The notion of (multiple) forking is a useful abstraction from the actual simulation of cryptographic scheme to the adversary in a security reduction, and is achieved through the intermediary of a so-called wrapper algorithm. Multiple forking has turned out to be a useful tool in the security argument of several cryptographic protocols. However, a reduction employing multiple forking incurs a significant degradation of (Formula presented.) , where (Formula presented.) denotes the upper bound on the underlying random oracle calls and (Formula presented.) , the number of forkings. In this work we take a closer look at the reasons for the degradation with a tighter security bound in mind. We nail down the exact set of conditions for success in the multiple forking game. A careful analysis of the cryptographic schemes and corresponding security reduction employing multiple forking leads to the formulation of ‘dependence’ and ‘independence’ conditions pertaining to the output of the wrapper in different rounds. Based on the (in)dependence conditions we propose a general framework of multiple forking and a General Multiple Forking Lemma. Leveraging (in)dependence to the full allows us to improve the degradation factor in the multiple forking game by a factor of (Formula presented.). By implication, the cost of a single forking involving two random oracles (augmented forking) matches that involving a single random oracle (elementary forking). Finally, we study the effect of these observations on the concrete security of existing schemes employing multiple forking. We conclude that by careful design of the protocol (and the wrapper in the security reduction) it is possible to harness our observations to the full extent.},
author = {Kamath Hosdurg, Chethan and Chatterjee, Sanjit},
journal = {Algorithmica},
number = {4},
pages = {1321 -- 1362},
publisher = {Springer},
title = {{A closer look at multiple-forking: Leveraging (in)dependence for a tighter bound}},
doi = {10.1007/s00453-015-9997-6},
volume = {74},
year = {2016},
}
@inproceedings{1179,
abstract = {Computational notions of entropy have recently found many applications, including leakage-resilient cryptography, deterministic encryption or memory delegation. The two main types of results which make computational notions so useful are (1) Chain rules, which quantify by how much the computational entropy of a variable decreases if conditioned on some other variable (2) Transformations, which quantify to which extend one type of entropy implies another.
Such chain rules and transformations typically lose a significant amount in quality of the entropy, and are the reason why applying these results one gets rather weak quantitative security bounds. In this paper we for the first time prove lower bounds in this context, showing that existing results for transformations are, unfortunately, basically optimal for non-adaptive black-box reductions (and it’s hard to imagine how non black-box reductions or adaptivity could be useful here.)
A variable X has k bits of HILL entropy of quality (ϵ,s)
if there exists a variable Y with k bits min-entropy which cannot be distinguished from X with advantage ϵ
by distinguishing circuits of size s. A weaker notion is Metric entropy, where we switch quantifiers, and only require that for every distinguisher of size s, such a Y exists.
We first describe our result concerning transformations. By definition, HILL implies Metric without any loss in quality. Metric entropy often comes up in applications, but must be transformed to HILL for meaningful security guarantees. The best known result states that if a variable X has k bits of Metric entropy of quality (ϵ,s)
, then it has k bits of HILL with quality (2ϵ,s⋅ϵ2). We show that this loss of a factor Ω(ϵ−2)
in circuit size is necessary. In fact, we show the stronger result that this loss is already necessary when transforming so called deterministic real valued Metric entropy to randomised boolean Metric (both these variants of Metric entropy are implied by HILL without loss in quality).
The chain rule for HILL entropy states that if X has k bits of HILL entropy of quality (ϵ,s)
, then for any variable Z of length m, X conditioned on Z has k−m bits of HILL entropy with quality (ϵ,s⋅ϵ2/2m). We show that a loss of Ω(2m/ϵ) in circuit size necessary here. Note that this still leaves a gap of ϵ between the known bound and our lower bound.},
author = {Pietrzak, Krzysztof Z and Maciej, Skorski},
location = {Beijing, China},
pages = {183 -- 203},
publisher = {Springer},
title = {{Pseudoentropy: Lower-bounds for chain rules and transformations}},
doi = {10.1007/978-3-662-53641-4_8},
volume = {9985},
year = {2016},
}
@article{1181,
abstract = {This review accompanies a 2016 SFN mini-symposium presenting examples of current studies that address a central question: How do neural stem cells (NSCs) divide in different ways to produce heterogeneous daughter types at the right time and in proper numbers to build a cerebral cortex with the appropriate size and structure? We will focus on four aspects of corticogenesis: cytokinesis events that follow apical mitoses of NSCs; coordinating abscission with delamination from the apical membrane; timing of neurogenesis and its indirect regulation through emergence of intermediate progenitors; and capacity of single NSCs to generate the correct number and laminar fate of cortical neurons. Defects in these mechanisms can cause microcephaly and other brain malformations, and understanding them is critical to designing diagnostic tools and preventive and corrective therapies.},
author = {Dwyer, Noelle and Chen, Bin and Chou, Shen and Hippenmeyer, Simon and Nguyen, Laurent and Ghashghaei, Troy},
journal = {Journal of Neuroscience},
number = {45},
pages = {11394 -- 11401},
publisher = {Society for Neuroscience},
title = {{Neural stem cells to cerebral cortex: Emerging mechanisms regulating progenitor behavior and productivity}},
doi = {10.1523/JNEUROSCI.2359-16.2016},
volume = {36},
year = {2016},
}
@inproceedings{1182,
abstract = {Balanced knockout tournaments are ubiquitous in sports competitions and are also used in decisionmaking and elections. The traditional computational question, that asks to compute a draw (optimal draw) that maximizes the winning probability for a distinguished player, has received a lot of attention. Previous works consider the problem where the pairwise winning probabilities are known precisely, while we study how robust is the winning probability with respect to small errors in the pairwise winning probabilities. First, we present several illuminating examples to establish: (a) there exist deterministic tournaments (where the pairwise winning probabilities are 0 or 1) where one optimal draw is much more robust than the other; and (b) in general, there exist tournaments with slightly suboptimal draws that are more robust than all the optimal draws. The above examples motivate the study of the computational problem of robust draws that guarantee a specified winning probability. Second, we present a polynomial-time algorithm for approximating the robustness of a draw for sufficiently small errors in pairwise winning probabilities, and obtain that the stated computational problem is NP-complete. We also show that two natural cases of deterministic tournaments where the optimal draw could be computed in polynomial time also admit polynomial-time algorithms to compute robust optimal draws.},
author = {Chatterjee, Krishnendu and Ibsen-Jensen, Rasmus and Tkadlec, Josef},
location = {New York, NY, USA},
pages = {172 -- 179},
publisher = {AAAI Press},
title = {{Robust draws in balanced knockout tournaments}},
volume = {2016-January},
year = {2016},
}
@article{1184,
abstract = {Across multicellular organisms, the costs of reproduction and self-maintenance result in a life history trade-off between fecundity and longevity. Queens of perennial social Hymenoptera are both highly fertile and long-lived, and thus, this fundamental trade-off is lacking. Whether social insect males similarly evade the fecundity/longevity trade-off remains largely unstudied. Wingless males of the ant genus Cardiocondyla stay in their natal colonies throughout their relatively long lives and mate with multiple female sexuals. Here, we show that Cardiocondyla obscurior males that were allowed to mate with large numbers of female sexuals had a shortened life span compared to males that mated at a low frequency or virgin males. Although frequent mating negatively affects longevity, males clearly benefit from a “live fast, die young strategy” by inseminating as many female sexuals as possible at a cost to their own survival.},
author = {Metzler, Sina and Heinze, Jürgen and Schrempf, Alexandra},
journal = {Ecology and Evolution},
number = {24},
pages = {8903 -- 8906},
publisher = {Wiley-Blackwell},
title = {{Mating and longevity in ant males}},
doi = {10.1002/ece3.2474},
volume = {6},
year = {2016},
}
@article{1185,
abstract = {The developmental programme of the pistil is under the control of both auxin and cytokinin. Crosstalk between these factors converges on regulation of the auxin carrier PIN-FORMED 1 (PIN1). Here, we show that in the triple transcription factor mutant cytokinin response factor 2 (crf2) crf3 crf6 both pistil length and ovule number were reduced. PIN1 expression was also lower in the triple mutant and the phenotypes could not be rescued by exogenous cytokinin application. pin1 complementation studies using genomic PIN1 constructs showed that the pistil phenotypes were only rescued when the PCRE1 domain, to which CRFs bind, was present. Without this domain, pin mutants resemble the crf2 crf3 crf6 triple mutant, indicating the pivotal role of CRFs in auxin-cytokinin crosstalk.},
author = {Cucinotta, Mara and Manrique, Silvia and Guazzotti, Andrea and Quadrelli, Nadia and Mendes, Marta and Benková, Eva and Colombo, Lucia},
journal = {Development},
number = {23},
pages = {4419 -- 4424},
publisher = {Company of Biologists},
title = {{Cytokinin response factors integrate auxin and cytokinin pathways for female reproductive organ development}},
doi = {10.1242/dev.143545},
volume = {143},
year = {2016},
}
@article{1186,
abstract = {The human pathogen Streptococcus pneumoniae is decorated with a special class of surface-proteins known as choline-binding proteins (CBPs) attached to phosphorylcholine (PCho) moieties from cell-wall teichoic acids. By a combination of X-ray crystallography, NMR, molecular dynamics techniques and in vivo virulence and phagocytosis studies, we provide structural information of choline-binding protein L (CbpL) and demonstrate its impact on pneumococcal pathogenesis and immune evasion. CbpL is a very elongated three-module protein composed of (i) an Excalibur Ca 2+ -binding domain -reported in this work for the very first time-, (ii) an unprecedented anchorage module showing alternate disposition of canonical and non-canonical choline-binding sites that allows vine-like binding of fully-PCho-substituted teichoic acids (with two choline moieties per unit), and (iii) a Ltp-Lipoprotein domain. Our structural and infection assays indicate an important role of the whole multimodular protein allowing both to locate CbpL at specific places on the cell wall and to interact with host components in order to facilitate pneumococcal lung infection and transmigration from nasopharynx to the lungs and blood. CbpL implication in both resistance against killing by phagocytes and pneumococcal pathogenesis further postulate this surface-protein as relevant among the pathogenic arsenal of the pneumococcus.},
author = {Gutierrez-Fernandez, Javier and Saleh, Malek and Alcorlo, Martín and Gómez Mejóa, Alejandro and Pantoja Uceda, David and Treviño, Miguel and Vob, Franziska and Abdullah, Mohammed and Galán Bartual, Sergio and Seinen, Jolien and Sánchez Murcia, Pedro and Gago, Federico and Bruix, Marta and Hammerschmidt, Sven and Hermoso, Juan},
journal = {Scientific Reports},
publisher = {Nature Publishing Group},
title = {{Modular architecture and unique teichoic acid recognition features of choline-binding protein L CbpL contributing to pneumococcal pathogenesis}},
doi = {10.1038/srep38094},
volume = {6},
year = {2016},
}
@article{1188,
abstract = {We consider a population dynamics model coupling cell growth to a diffusion in the space of metabolic phenotypes as it can be obtained from realistic constraints-based modelling.
In the asymptotic regime of slow
diffusion, that coincides with the relevant experimental range, the resulting
non-linear Fokker–Planck equation is solved for the steady state in the WKB
approximation that maps it into the ground state of a quantum particle in an
Airy potential plus a centrifugal term. We retrieve scaling laws for growth rate
fluctuations and time response with respect to the distance from the maximum
growth rate suggesting that suboptimal populations can have a faster response
to perturbations.},
author = {De Martino, Daniele and Masoero, Davide},
journal = { Journal of Statistical Mechanics: Theory and Experiment},
number = {12},
publisher = {IOPscience},
title = {{Asymptotic analysis of noisy fitness maximization, applied to metabolism & growth}},
doi = {10.1088/1742-5468/aa4e8f},
volume = {2016},
year = {2016},
}
@phdthesis{1189,
abstract = {Within the scope of this thesis, we show that a driven-dissipative system with
few ultracold atoms can exhibit dissipatively bound states, even if the atom-atom
interaction is purely repulsive. This bond arises due to the dipole-dipole inter-
action, which is restricted to one of the lower electronic energy states, resulting
in the distance-dependent coherent population trapping. The quality of this al-
ready established method of dissipative binding is improved and the application
is extended to higher dimensions and a larger number of atoms. Here, we simu-
late two- and three-atom systems using an adapted approach to the Monte Carlo
wave-function method and analyse the results. Finally, we examine the possi-
bility of finding a setting allowing trimer states but prohibiting dimer states.
In the context of open quantum systems, such a three-body bound states corre-
sponds to the driven-dissipative analogue of a Borromean state. These states can
be detected in modern experiments with dipolar and Rydberg-dressed ultracold
atomic gases.
},
author = {Jochum, Clemens},
pages = {94},
publisher = {Technical University Vienna},
title = {{Dissipative Few-Body Quantum Systems}},
year = {2016},
}
@inproceedings{1193,
abstract = {We consider the recent formulation of the Algorithmic Lovász Local Lemma [1], [2] for finding objects that avoid "bad features", or "flaws". It extends the Moser-Tardos resampling algorithm [3] to more general discrete spaces. At each step the method picks a flaw present in the current state and "resamples" it using a "resampling oracle" provided by the user. However, it is less flexible than the Moser-Tardos method since [1], [2] require a specific flaw selection rule, whereas [3] allows an arbitrary rule (and thus can potentially be implemented more efficiently). We formulate a new "commutativity" condition, and prove that it is sufficient for an arbitrary rule to work. It also enables an efficient parallelization under an additional assumption. We then show that existing resampling oracles for perfect matchings and permutations do satisfy this condition. Finally, we generalize the precondition in [2] (in the case of symmetric potential causality graphs). This unifies special cases that previously were treated separately.},
author = {Kolmogorov, Vladimir},
booktitle = {Proceedings - Annual IEEE Symposium on Foundations of Computer Science},
location = {New Brunswick, NJ, USA },
publisher = {IEEE},
title = {{Commutativity in the algorithmic Lovasz local lemma}},
doi = {10.1109/FOCS.2016.88},
volume = {2016-December},
year = {2016},
}
@article{1195,
abstract = {The genetic analysis of experimentally evolving populations typically relies on short reads from pooled individuals (Pool-Seq). While this method provides reliable allele frequency estimates, the underlying haplotype structure remains poorly characterized. With small population sizes and adaptive variants that start from low frequencies, the interpretation of selection signatures in most Evolve and Resequencing studies remains challenging. To facilitate the characterization of selection targets, we propose a new approach that reconstructs selected haplotypes from replicated time series, using Pool-Seq data. We identify selected haplotypes through the correlated frequencies of alleles carried by them. Computer simulations indicate that selected haplotype-blocks of several Mb can be reconstructed with high confidence and low error rates, even when allele frequencies change only by 20% across three replicates. Applying this method to real data from D. melanogaster populations adapting to a hot environment, we identify a selected haplotype-block of 6.93 Mb. We confirm the presence of this haplotype-block in evolved populations by experimental haplotyping, demonstrating the power and accuracy of our haplotype reconstruction from Pool-Seq data. We propose that the combination of allele frequency estimates with haplotype information will provide the key to understanding the dynamics of adaptive alleles. },
author = {Franssen, Susan and Barton, Nicholas H and Schlötterer, Christian},
journal = {Molecular Biology and Evolution},
number = {1},
pages = {174 -- 184},
publisher = {Oxford University Press},
title = {{Reconstruction of haplotype-blocks selected during experimental evolution.}},
doi = {10.1093/molbev/msw210},
volume = {34},
year = {2016},
}
@article{1197,
abstract = {Across the nervous system, certain population spiking patterns are observed far more frequently than others. A hypothesis about this structure is that these collective activity patterns function as population codewords–collective modes–carrying information distinct from that of any single cell. We investigate this phenomenon in recordings of ∼150 retinal ganglion cells, the retina’s output. We develop a novel statistical model that decomposes the population response into modes; it predicts the distribution of spiking activity in the ganglion cell population with high accuracy. We found that the modes represent localized features of the visual stimulus that are distinct from the features represented by single neurons. Modes form clusters of activity states that are readily discriminated from one another. When we repeated the same visual stimulus, we found that the same mode was robustly elicited. These results suggest that retinal ganglion cells’ collective signaling is endowed with a form of error-correcting code–a principle that may hold in brain areas beyond retina.},
author = {Prentice, Jason and Marre, Olivier and Ioffe, Mark and Loback, Adrianna and Tkacik, Gasper and Berry, Michael},
journal = {PLoS Computational Biology},
number = {11},
publisher = {Public Library of Science},
title = {{Error-robust modes of the retinal population code}},
doi = {10.1371/journal.pcbi.1005148},
volume = {12},
year = {2016},
}
@article{1200,
author = {Hilbe, Christian and Traulsen, Arne},
journal = {Physics of Life Reviews},
pages = {29 -- 31},
publisher = {Elsevier},
title = {{Only the combination of mathematics and agent based simulations can leverage the full potential of evolutionary modeling: Comment on “Evolutionary game theory using agent-based methods” by C. Adami, J. Schossau and A. Hintze}},
doi = {10.1016/j.plrev.2016.10.004},
volume = {19},
year = {2016},
}
@article{1201,
abstract = {In this issue of Cell, Skau et al. show that the formin FMN2 organizes a perinuclear actin cytoskeleton that protects the nucleus and its genomic content of migrating cells squeezing through small spaces.},
author = {Renkawitz, Jörg and Sixt, Michael K},
journal = {Cell},
number = {6},
pages = {1448 -- 1449},
publisher = {Cell Press},
title = {{Formin’ a nuclear protection}},
doi = {10.1016/j.cell.2016.11.024},
volume = {167},
year = {2016},
}
@article{1202,
author = {Milutinovic, Barbara and Peuß, Robert and Ferro, Kevin and Kurtz, Joachim},
journal = {Zoology },
number = {4},
pages = {254 -- 261},
publisher = {Elsevier},
title = {{Immune priming in arthropods: an update focusing on the red flour beetle}},
doi = {10.1016/j.zool.2016.03.006},
volume = {119},
year = {2016},
}
@article{1203,
abstract = {Haemophilus haemolyticus has been recently discovered to have the potential to cause invasive disease. It is closely related to nontypeable Haemophilus influenzae (NT H. influenzae). NT H. influenzae and H. haemolyticus are often misidentified because none of the existing tests targeting the known phenotypes of H. haemolyticus are able to specifically identify H. haemolyticus. Through comparative genomic analysis of H. haemolyticus and NT H. influenzae, we identified genes unique to H. haemolyticus that can be used as targets for the identification of H. haemolyticus. A real-time PCR targeting purT (encoding phosphoribosylglycinamide formyltransferase 2 in the purine synthesis pathway) was developed and evaluated. The lower limit of detection was 40 genomes/PCR; the sensitivity and specificity in detecting H. haemolyticus were 98.9% and 97%, respectively. To improve the discrimination of H. haemolyticus and NT H. influenzae, a testing scheme combining two targets (H. haemolyticus purT and H. influenzae hpd, encoding protein D lipoprotein) was also evaluated and showed 96.7% sensitivity and 98.2% specificity for the identification of H. haemolyticus and 92.8% sensitivity and 100% specificity for the identification of H. influenzae, respectively. The dual-target testing scheme can be used for the diagnosis and surveillance of infection and disease caused by H. haemolyticus and NT H. influenzae.},
author = {Hu, Fang and Rishishwar, Lavanya and Sivadas, Ambily and Mitchell, Gabriel and King, Jordan and Murphy, Timothy and Gilsdorf, Janet and Mayer, Leonard and Wang, Xin},
journal = {Journal of Clinical Microbiology},
number = {12},
pages = {3010 -- 3017},
publisher = {American Society for Microbiology},
title = {{Comparative genomic analysis of Haemophilus haemolyticus and nontypeable Haemophilus influenzae and a new testing scheme for their discrimination}},
doi = {10.1128/JCM.01511-16},
volume = {54},
year = {2016},
}
@article{1204,
abstract = {In science, as in life, "surprises" can be adequately appreciated only in the presence of a null model, what we expect a priori. In physics, theories sometimes express the values of dimensionless physical constants as combinations of mathematical constants like π or e. The inverse problem also arises, whereby the measured value of a physical constant admits a "surprisingly" simple approximation in terms of well-known mathematical constants. Can we estimate the probability for this to be a mere coincidence, rather than an inkling of some theory? We answer the question in the most naive form.},
author = {Amir, Ariel and Lemeshko, Mikhail and Tokieda, Tadashi},
journal = {American Mathematical Monthly},
number = {6},
pages = {609 -- 612},
publisher = {Mathematical Association of America},
title = {{Surprises in numerical expressions of physical constants}},
doi = {10.4169/amer.math.monthly.123.6.609},
volume = {123},
year = {2016},
}
@inproceedings{1205,
abstract = {In this paper, we present a formal model-driven engineering approach to establishing a safety-assured implementation of Multifunction vehicle bus controller (MVBC) based on the generic reference models and requirements described in the International Electrotechnical Commission (IEC) standard IEC-61375. First, the generic models described in IEC-61375 are translated into a network of timed automata, and some safety requirements tested in IEC-61375 are formalized as timed computation tree logic (TCTL) formulas. With the help of Uppaal, we check and debug whether the timed automata satisfy the formulas or not. Within this step, several logic inconsistencies in the original standard are detected and corrected. Then, we apply the tool Times to generate C code from the verified model, which was later synthesized into a real MVBC chip. Finally, the runtime verification tool RMOR is applied to verify some safety requirements at the implementation level. We set up a real platform with worldwide mostly used MVBC D113, and verify the correctness and the scalability of the synthesized MVBC chip more comprehensively. The errors in the standard has been confirmed and the resulted MVBC has been deployed in real train communication network.},
author = {Jiang, Yu and Liu, Han and Song, Houbing and Kong, Hui and Gu, Ming and Sun, Jiaguang and Sha, Lui},
location = {Limassol, Cyprus},
pages = {757 -- 763},
publisher = {Springer},
title = {{Safety assured formal model driven design of the multifunction vehicle bus controller}},
doi = {10.1007/978-3-319-48989-6_47},
volume = {9995},
year = {2016},
}
@article{1206,
abstract = {We study a polar molecule immersed in a superfluid environment, such as a helium nanodroplet or a Bose–Einstein condensate, in the presence of a strong electrostatic field. We show that coupling of the molecular pendular motion, induced by the field, to the fluctuating bath leads to formation of pendulons—spherical harmonic librators dressed by a field of many-particle excitations. We study the behavior of the pendulon in a broad range of molecule–bath and molecule–field interaction strengths, and reveal that its spectrum features a series of instabilities which are absent in the field-free case of the angulon quasiparticle. Furthermore, we show that an external field allows to fine-tune the positions of these instabilities in the molecular rotational spectrum. This opens the door to detailed experimental studies of redistribution of orbital angular momentum in many-particle systems. © 2016 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim},
author = {Redchenko, Elena and Lemeshko, Mikhail},
journal = {ChemPhysChem},
number = {22},
pages = {3649 -- 3654},
publisher = {Wiley-Blackwell},
title = {{Libration of strongly oriented polar molecules inside a superfluid}},
doi = {10.1002/cphc.201601042},
volume = {17},
year = {2016},
}
@article{1209,
abstract = {NADH-ubiquinone oxidoreductase (complex I) is the largest (∼1 MDa) and the least characterized complex of the mitochondrial electron transport chain. Because of the ease of sample availability, previous work has focused almost exclusively on bovine complex I. However, only medium resolution structural analyses of this complex have been reported. Working with other mammalian complex I homologues is a potential approach for overcoming these limitations. Due to the inherent difficulty of expressing large membrane protein complexes, screening of complex I homologues is limited to large mammals reared for human consumption. The high sequence identity among these available sources may preclude the benefits of screening. Here, we report the characterization of complex I purified from Ovis aries (ovine) heart mitochondria. All 44 unique subunits of the intact complex were identified by mass spectrometry. We identified differences in the subunit composition of subcomplexes of ovine complex I as compared with bovine, suggesting differential stability of inter-subunit interactions within the complex. Furthermore, the 42-kDa subunit, which is easily lost from the bovine enzyme, remains tightly bound to ovine complex I. Additionally, we developed a novel purification protocol for highly active and stable mitochondrial complex I using the branched-chain detergent lauryl maltose neopentyl glycol. Our data demonstrate that, although closely related, significant differences exist between the biochemical properties of complex I prepared from ovine and bovine mitochondria and that ovine complex I represents a suitable alternative target for further structural studies. },
author = {Letts, James A and Degliesposti, Gianluca and Fiedorczuk, Karol and Skehel, Mark and Sazanov, Leonid A},
journal = {Journal of Biological Chemistry},
number = {47},
pages = {24657 -- 24675},
publisher = {American Society for Biochemistry and Molecular Biology},
title = {{Purification of ovine respiratory complex i results in a highly active and stable preparation}},
doi = {10.1074/jbc.M116.735142},
volume = {291},
year = {2016},
}
@inbook{1210,
abstract = {Mechanisms for cell protection are essential for survival of multicellular organisms. In plants, the apical hook, which is transiently formed in darkness when the germinating seedling penetrates towards the soil surface, plays such protective role and shields the vitally important shoot apical meristem and cotyledons from damage. The apical hook is formed by bending of the upper hypocotyl soon after germination, and it is maintained in a closed stage while the hypocotyl continues to penetrate through the soil and rapidly opens when exposed to light in proximity of the soil surface. To uncover the complex molecular network orchestrating this spatiotemporally tightly coordinated process, monitoring of the apical hook development in real time is indispensable. Here we describe an imaging platform that enables high-resolution kinetic analysis of this dynamic developmental process. © Springer Science+Business Media New York 2017.},
author = {Zhu, Qiang and Žádníková, Petra and Smet, Dajo and Van Der Straeten, Dominique and Benková, Eva},
booktitle = {Plant Hormones},
pages = {1 -- 8},
publisher = {Humana Press},
title = {{Real time analysis of the apical hook development}},
doi = {10.1007/978-1-4939-6469-7_1},
volume = {1497},
year = {2016},
}
@article{1212,
abstract = {Plants adjust their growth according to gravity. Gravitropism involves gravity perception, signal transduction, and asymmetric growth response, with organ bending as a consequence [1]. Asymmetric growth results from the asymmetric distribution of the plant-specific signaling molecule auxin [2] that is generated by lateral transport, mediated in the hypocotyl predominantly by the auxin transporter PIN-FORMED3 (PIN3) [3–5]. Gravity stimulation polarizes PIN3 to the bottom sides of endodermal cells, correlating with increased auxin accumulation in adjacent tissues at the lower side of the stimulated organ, where auxin induces cell elongation and, hence, organ bending. A curvature response allows the hypocotyl to resume straight growth at a defined angle [6], implying that at some point auxin symmetry is restored to prevent overbending. Here, we present initial insights into cellular and molecular mechanisms that lead to the termination of the tropic response. We identified an auxin feedback on PIN3 polarization as underlying mechanism that restores symmetry of the PIN3-dependent auxin flow. Thus, two mechanistically distinct PIN3 polarization events redirect auxin fluxes at different time points of the gravity response: first, gravity-mediated redirection of PIN3-mediated auxin flow toward the lower hypocotyl side, where auxin gradually accumulates and promotes growth, and later PIN3 polarization to the opposite cell side, depleting this auxin maximum to end the bending. Accordingly, genetic or pharmacological interference with the late PIN3 polarization prevents termination of the response and leads to hypocotyl overbending. This observation reveals a role of auxin feedback on PIN polarity in the termination of the tropic response. © 2016 Elsevier Ltd},
author = {Rakusová, Hana and Abbas, Mohamad and Han, Huibin and Song, Siyuan and Robert, Hélène and Friml, Jirí},
journal = {Current Biology},
number = {22},
pages = {3026 -- 3032},
publisher = {Cell Press},
title = {{Termination of shoot gravitropic responses by auxin feedback on PIN3 polarity}},
doi = {10.1016/j.cub.2016.08.067},
volume = {26},
year = {2016},
}
@inproceedings{1214,
abstract = {With the accelerated development of robot technologies, optimal control becomes one of the central themes of research. In traditional approaches, the controller, by its internal functionality, finds appropriate actions on the basis of the history of sensor values, guided by the goals, intentions, objectives, learning schemes, and so forth. While very successful with classical robots, these methods run into severe difficulties when applied to soft robots, a new field of robotics with large interest for human-robot interaction. We claim that a novel controller paradigm opens new perspective for this field. This paper applies a recently developed neuro controller with differential extrinsic synaptic plasticity to a muscle-tendon driven arm-shoulder system from the Myorobotics toolkit. In the experiments, we observe a vast variety of self-organized behavior patterns: when left alone, the arm realizes pseudo-random sequences of different poses. By applying physical forces, the system can be entrained into definite motion patterns like wiping a table. Most interestingly, after attaching an object, the controller gets in a functional resonance with the object's internal dynamics, starting to shake spontaneously bottles half-filled with water or sensitively driving an attached pendulum into a circular mode. When attached to the crank of a wheel the neural system independently develops to rotate it. In this way, the robot discovers affordances of objects its body is interacting with.},
author = {Martius, Georg S and Hostettler, Raphael and Knoll, Alois and Der, Ralf},
location = {Daejeon, Korea},
publisher = {IEEE},
title = {{Compliant control for soft robots: Emergent behavior of a tendon driven anthropomorphic arm}},
doi = {10.1109/IROS.2016.7759138},
volume = {2016-November},
year = {2016},
}
@article{1216,
abstract = {A framework fo r extracting features in 2D transient flows, based on the acceleration field to ensure Galilean invariance is proposed in this paper. The minima of the acceleration magnitude (a superset of acceleration zeros) are extracted and discriminated into vortices and saddle points, based on the spectral properties of the velocity Jacobian. The extraction of topological features is performed with purely combinatorial algorithms from discrete computational topology. The feature points are prioritized with persistence, as a physically meaningful importance measure. These feature points are tracked in time with a robust algorithm for tracking features. Thus, a space-time hierarchy of the minima is built and vortex merging events are detected. We apply the acceleration feature extraction strategy to three two-dimensional shear flows: (1) an incompressible periodic cylinder wake, (2) an incompressible planar mixing layer and (3) a weakly compressible planar jet. The vortex-like acceleration feature points are shown to be well aligned with acceleration zeros, maxima of the vorticity magnitude, minima of the pressure field and minima of λ2.},
author = {Kasten, Jens and Reininghaus, Jan and Hotz, Ingrid and Hege, Hans and Noack, Bernd and Daviller, Guillaume and Morzyński, Marek},
journal = {Archives of Mechanics},
number = {1},
pages = {55 -- 80},
publisher = {Polish Academy of Sciences Publishing House},
title = {{Acceleration feature points of unsteady shear flows}},
volume = {68},
year = {2016},
}
@article{1217,
abstract = {Understanding the regulation of T-cell responses during inflammation and auto-immunity is fundamental for designing efficient therapeutic strategies against immune diseases. In this regard, prostaglandin E 2 (PGE 2) is mostly considered a myeloid-derived immunosuppressive molecule. We describe for the first time that T cells secrete PGE 2 during T-cell receptor stimulation. In addition, we show that autocrine PGE 2 signaling through EP receptors is essential for optimal CD4 + T-cell activation in vitro and in vivo, and for T helper 1 (Th1) and regulatory T cell differentiation. PGE 2 was found to provide additive co-stimulatory signaling through AKT activation. Intravital multiphoton microscopy showed that triggering EP receptors in T cells is also essential for the stability of T cell-dendritic cell (DC) interactions and Th-cell accumulation in draining lymph nodes (LNs) during inflammation. We further demonstrated that blocking EP receptors in T cells during the initial phase of collagen-induced arthritis in mice resulted in a reduction of clinical arthritis. This could be attributable to defective T-cell activation, accompanied by a decline in activated and interferon-γ-producing CD4 + Th1 cells in draining LNs. In conclusion, we prove that T lymphocytes secret picomolar concentrations of PGE 2, which in turn provide additive co-stimulatory signaling, enabling T cells to attain a favorable activation threshold. PGE 2 signaling in T cells is also required for maintaining long and stable interactions with DCs within LNs. Blockade of EP receptors in vivo impairs T-cell activation and development of T cell-mediated inflammatory responses. This may have implications in various pathophysiological settings.},
author = {Sreeramkumar, Vinatha and Hons, Miroslav and Punzón, Carmen and Stein, Jens and Sancho, David and Fresno Forcelledo, Manuel and Cuesta, Natalia},
journal = {Immunology and Cell Biology},
number = {1},
pages = {39 -- 51},
publisher = {Nature Publishing Group},
title = {{Efficient T-cell priming and activation requires signaling through prostaglandin E2 (EP) receptors}},
doi = {10.1038/icb.2015.62},
volume = {94},
year = {2016},
}
@article{1218,
abstract = {Investigating the physiology of cyanobacteria cultured under a diel light regime is relevant for a better understanding of the resulting growth characteristics and for specific biotechnological applications that are foreseen for these photosynthetic organisms. Here, we present the results of a multiomics study of the model cyanobacterium Synechocystis sp. strain PCC 6803, cultured in a lab-scale photobioreactor in physiological conditions relevant for large-scale culturing. The culture was sparged withN2 andCO2, leading to an anoxic environment during the dark period. Growth followed the availability of light. Metabolite analysis performed with 1Hnuclear magnetic resonance analysis showed that amino acids involved in nitrogen and sulfur assimilation showed elevated levels in the light. Most protein levels, analyzed through mass spectrometry, remained rather stable. However, several high-light-response proteins and stress-response proteins showed distinct changes at the onset of the light period. Microarray-based transcript analysis found common patterns of~56% of the transcriptome following the diel regime. These oscillating transcripts could be grouped coarsely into genes that were upregulated and downregulated in the dark period. The accumulated glycogen was degraded in the anaerobic environment in the dark. A small part was degraded gradually, reflecting basic maintenance requirements of the cells in darkness. Surprisingly, the largest part was degraded rapidly in a short time span at the end of the dark period. This degradation could allow rapid formation of metabolic intermediates at the end of the dark period, preparing the cells for the resumption of growth at the start of the light period.},
author = {Angermayr, Andreas and Van Alphen, Pascal and Hasdemir, Dicle and Kramer, Gertjan and Iqbal, Muzamal and Van Grondelle, Wilmar and Hoefsloot, Huub and Choi, Younghae and Hellingwerf, Klaas},
journal = {Applied and Environmental Microbiology},
number = {14},
pages = {4180 -- 4189},
publisher = {American Society for Microbiology},
title = {{Culturing synechocystis sp. Strain pcc 6803 with N2 and CO2 in a diel regime reveals multiphase glycogen dynamics with low maintenance costs}},
doi = {10.1128/AEM.00256-16},
volume = {82},
year = {2016},
}
@article{1219,
abstract = {We consider N×N random matrices of the form H = W + V where W is a real symmetric or complex Hermitian Wigner matrix and V is a random or deterministic, real, diagonal matrix whose entries are independent of W. We assume subexponential decay for the matrix entries of W, and we choose V so that the eigenvalues ofW and V are typically of the same order. For a large class of diagonal matrices V , we show that the local statistics in the bulk of the spectrum are universal in the limit of large N.},
author = {Lee, Jioon and Schnelli, Kevin and Stetler, Ben and Yau, Horngtzer},
journal = {Annals of Probability},
number = {3},
pages = {2349 -- 2425},
publisher = {Institute of Mathematical Statistics},
title = {{Bulk universality for deformed wigner matrices}},
doi = {10.1214/15-AOP1023},
volume = {44},
year = {2016},
}
@article{122,
abstract = {Four rigid panels connected by hinges that meet at a point form a four-vertex, the fundamental building block of origami metamaterials. Most materials designed so far are based on the same four-vertex geometry, and little is known regarding how different geometries affect folding behavior. Here we systematically categorize and analyze the geometries and resulting folding motions of Euclidean four-vertices. Comparing the relative sizes of sector angles, we identify three types of generic vertices and two accompanying subtypes. We determine which folds can fully close and the possible mountain-valley assignments. Next, we consider what occurs when sector angles or sums thereof are set equal, which results in 16 special vertex types. One of these, flat-foldable vertices, has been studied extensively, but we show that a wide variety of qualitatively different folding motions exist for the other 15 special and 3 generic types. Our work establishes a straightforward set of rules for understanding the folding motion of both generic and special four-vertices and serves as a roadmap for designing origami metamaterials.},
author = {Waitukaitis, Scott R and Van Hecke, Martin},
journal = {Physical Review E - Statistical, Nonlinear, and Soft Matter Physics},
number = {2},
publisher = {American Physiological Society},
title = {{Origami building blocks: Generic and special four-vertices}},
doi = {10.1103/PhysRevE.93.023003},
volume = {93},
year = {2016},
}
@inproceedings{1220,
abstract = {Theoretical and numerical aspects of aerodynamic efficiency of propulsion systems coupled to the boundary layer of a fuselage are studied. We discuss the effects of local flow fields, which are affected both by conservative flow acceleration as well as total pressure losses, on the efficiency of boundary layer immersed propulsion devices. We introduce the concept of a boundary layer retardation turbine that helps reduce skin friction over the fuselage. We numerically investigate efficiency gains offered by boundary layer and wake interacting devices. We discuss the results in terms of a total energy consumption framework and show that efficiency gains of any device depend on all the other elements of the propulsion system.},
author = {Mikić, Gregor and Stoll, Alex and Bevirt, Joe and Grah, Rok and Moore, Mark},
location = {Washington, D.C., USA},
pages = {1 -- 19},
publisher = {AIAA},
title = {{Fuselage boundary layer ingestion propulsion applied to a thin haul commuter aircraft for optimal efficiency}},
doi = {10.2514/6.2016-3764},
year = {2016},
}
@article{1221,
abstract = {The Auxin Binding Protein 1 (ABP1) is one of the most studied proteins in plants. Since decades ago, it has been the prime receptor candidate for the plant hormone auxin with a plethora of described functions in auxin signaling and development. The developmental importance of ABP1 has recently been questioned by identification of Arabidopsis thaliana abp1 knock-out alleles that show no obvious phenotypes under normal growth conditions. In this study, we examined the contradiction between the normal growth and development of the abp1 knock-outs and the strong morphological defects observed in three different ethanol-inducible abp1 knock-down mutants ( abp1-AS, SS12K, SS12S). By analyzing segregating populations of abp1 knock-out vs. abp1 knock-down crosses we show that the strong morphological defects that were believed to be the result of conditional down-regulation of ABP1 can be reproduced also in the absence of the functional ABP1 protein. This data suggests that the phenotypes in abp1 knock-down lines are due to the off-target effects and asks for further reflections on the biological function of ABP1 or alternative explanations for the missing phenotypic defects in the abp1 loss-of-function alleles.},
author = {Michalko, Jaroslav and Glanc, Matous and Perrot Rechenmann, Catherine and Friml, Jirí},
journal = {F1000 Research },
publisher = {F1000 Research},
title = {{Strong morphological defects in conditional Arabidopsis abp1 knock-down mutants generated in absence of functional ABP1 protein}},
doi = {10.12688/f1000research.7654.1},
volume = {5},
year = {2016},
}
@article{1222,
abstract = {We consider packings of congruent circles on a square flat torus, i.e., periodic (w.r.t. a square lattice) planar circle packings, with the maximal circle radius. This problem is interesting due to a practical reason—the problem of “super resolution of images.” We have found optimal arrangements for N=6, 7 and 8 circles. Surprisingly, for the case N=7 there are three different optimal arrangements. Our proof is based on a computer enumeration of toroidal irreducible contact graphs.},
author = {Musin, Oleg and Nikitenko, Anton},
journal = {Discrete & Computational Geometry},
number = {1},
pages = {1 -- 20},
publisher = {Springer},
title = {{Optimal packings of congruent circles on a square flat torus}},
doi = {10.1007/s00454-015-9742-6},
volume = {55},
year = {2016},
}
@article{1223,
abstract = {We consider a random Schrödinger operator on the binary tree with a random potential which is the sum of a random radially symmetric potential, Qr, and a random transversally periodic potential, κQt, with coupling constant κ. Using a new one-dimensional dynamical systems approach combined with Jensen's inequality in hyperbolic space (our key estimate) we obtain a fractional moment estimate proving localization for small and large κ. Together with a previous result we therefore obtain a model with two Anderson transitions, from localization to delocalization and back to localization, when increasing κ. As a by-product we also have a partially new proof of one-dimensional Anderson localization at any disorder.},
author = {Froese, Richard and Lee, Darrick and Sadel, Christian and Spitzer, Wolfgang and Stolz, Günter},
journal = {Journal of Spectral Theory},
number = {3},
pages = {557 -- 600},
publisher = {European Mathematical Society},
title = {{Localization for transversally periodic random potentials on binary trees}},
doi = {10.4171/JST/132},
volume = {6},
year = {2016},
}
@article{1224,
abstract = {Sexual dimorphism in resource allocation is expected to change during the life cycle of dioecious plants because of temporal differences between the sexes in reproductive investment. Given the potential for sex-specific differences in reproductive costs, resource availability may contribute to variation in reproductive allocation in females and males. Here, we used Rumex hastatulus, a dioecious, wind-pollinated annual plant, to investigate whether sexual dimorphism varies with life-history stage and nutrient availability, and determine whether allocation patterns differ depending on reproductive commitment. To examine if the costs of reproduction varied between the sexes, reproduction was either allowed or prevented through bud removal, and biomass allocation was measured at maturity. In a second experiment to assess variation in sexual dimorphism across the life cycle, and whether this varied with resource availability, plants were grown in high and low nutrients and allocation to roots, aboveground vegetative growth and reproduction were measured at three developmental stages. Males prevented from reproducing compensated with increased above- and belowground allocation to a much larger degree than females, suggesting that male reproductive costs reduce vegetative growth. The proportional allocation to roots, reproductive structures and aboveground vegetative growth varied between the sexes and among life-cycle stages, but not with nutrient treatment. Females allocated proportionally more resources to roots than males at peak flowering, but this pattern was reversed at reproductive maturity under low-nutrient conditions. Our study illustrates the importance of temporal dynamics in sex-specific resource allocation and provides support for high male reproductive costs in wind-pollinated plants.},
author = {Teitel, Zachary and Pickup, Melinda and Field, David and Barrett, Spencer},
journal = {Plant Biology},
number = {1},
pages = {98 -- 103},
publisher = {Wiley-Blackwell},
title = {{The dynamics of resource allocation and costs of reproduction in a sexually dimorphic, wind-pollinated dioecious plant}},
doi = {10.1111/plb.12336},
volume = {18},
year = {2016},
}
@inproceedings{1225,
abstract = {At Crypto 2015 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standard-model construction of efficient roundoptimal blind signatures that does not require complexity leveraging. It is conceptually simple and builds on the primitive of structure-preserving signatures on equivalence classes (SPS-EQ). FHS prove the unforgeability of their scheme assuming EUF-CMA security of the SPS-EQ scheme and hardness of a version of the DH inversion problem. Blindness under adversarially chosen keys is proven under an interactive variant of the DDH assumption. We propose a variant of their scheme whose blindness can be proven under a non-interactive assumption, namely a variant of the bilinear DDH assumption. We moreover prove its unforgeability assuming only unforgeability of the underlying SPS-EQ but no additional assumptions as needed for the FHS scheme.},
author = {Fuchsbauer, Georg and Hanser, Christian and Kamath Hosdurg, Chethan and Slamanig, Daniel},
location = {Amalfi, Italy},
pages = {391 -- 408},
publisher = {Springer},
title = {{Practical round-optimal blind signatures in the standard model from weaker assumptions}},
doi = {10.1007/978-3-319-44618-9_21},
volume = {9841},
year = {2016},
}
@article{1226,
abstract = {Mitochondrial complex I (also known as NADH:ubiquinone oxidoreductase) contributes to cellular energy production by transferring electrons from NADH to ubiquinone coupled to proton translocation across the membrane. It is the largest protein assembly of the respiratory chain with a total mass of 970 kilodaltons. Here we present a nearly complete atomic structure of ovine (Ovis aries) mitochondrial complex I at 3.9 Å resolution, solved by cryo-electron microscopy with cross-linking and mass-spectrometry mapping experiments. All 14 conserved core subunits and 31 mitochondria-specific supernumerary subunits are resolved within the L-shaped molecule. The hydrophilic matrix arm comprises flavin mononucleotide and 8 iron-sulfur clusters involved in electron transfer, and the membrane arm contains 78 transmembrane helices, mostly contributed by antiporter-like subunits involved in proton translocation. Supernumerary subunits form an interlinked, stabilizing shell around the conserved core. Tightly bound lipids (including cardiolipins) further stabilize interactions between the hydrophobic subunits. Subunits with possible regulatory roles contain additional cofactors, NADPH and two phosphopantetheine molecules, which are shown to be involved in inter-subunit interactions. We observe two different conformations of the complex, which may be related to the conformationally driven coupling mechanism and to the active-deactive transition of the enzyme. Our structure provides insight into the mechanism, assembly, maturation and dysfunction of mitochondrial complex I, and allows detailed molecular analysis of disease-causing mutations.},
author = {Fiedorczuk, Karol and Letts, James A and Degliesposti, Gianluca and Kaszuba, Karol and Skehel, Mark and Sazanov, Leonid A},
journal = {Nature},
number = {7625},
pages = {406 -- 410},
publisher = {Nature Publishing Group},
title = {{Atomic structure of the entire mammalian mitochondrial complex i}},
doi = {10.1038/nature19794},
volume = {538},
year = {2016},
}
@inproceedings{1227,
abstract = {Many biological systems can be modeled as multiaffine hybrid systems. Due to the nonlinearity of multiaffine systems, it is difficult to verify their properties of interest directly. A common strategy to tackle this problem is to construct and analyze a discrete overapproximation of the original system. However, the conservativeness of a discrete abstraction significantly determines the level of confidence we can have in the properties of the original system. In this paper, in order to reduce the conservativeness of a discrete abstraction, we propose a new method based on a sufficient and necessary decision condition for computing discrete transitions between states in the abstract system. We assume the state space partition of a multiaffine system to be based on a set of multivariate polynomials. Hence, a rectangular partition defined in terms of polynomials of the form (xi − c) is just a simple case of multivariate polynomial partition, and the new decision condition applies naturally. We analyze and demonstrate the improvement of our method over the existing methods using some examples.},
author = {Kong, Hui and Bartocci, Ezio and Bogomolov, Sergiy and Grosu, Radu and Henzinger, Thomas A and Jiang, Yu and Schilling, Christian},
location = {Grenoble, France},
pages = {128 -- 144},
publisher = {Springer},
title = {{Discrete abstraction of multiaffine systems}},
doi = {10.1007/978-3-319-47151-8_9},
volume = {9957},
year = {2016},
}
@inproceedings{1229,
abstract = {Witness encryption (WE) was introduced by Garg et al. [GGSW13]. A WE scheme is defined for some NP language L and lets a sender encrypt messages relative to instances x. A ciphertext for x can be decrypted using w witnessing x ∈ L, but hides the message if x ∈ L. Garg et al. construct WE from multilinear maps and give another construction [GGH+13b] using indistinguishability obfuscation (iO) for circuits. Due to the reliance on such heavy tools, WE can cur- rently hardly be implemented on powerful hardware and will unlikely be realizable on constrained devices like smart cards any time soon. We construct a WE scheme where encryption is done by simply computing a Naor-Yung ciphertext (two CPA encryptions and a NIZK proof). To achieve this, our scheme has a setup phase, which outputs public parameters containing an obfuscated circuit (only required for decryption), two encryption keys and a common reference string (used for encryption). This setup need only be run once, and the parame- ters can be used for arbitrary many encryptions. Our scheme can also be turned into a functional WE scheme, where a message is encrypted w.r.t. a statement and a function f, and decryption with a witness w yields f (m, w). Our construction is inspired by the functional encryption scheme by Garg et al. and we prove (selective) security assuming iO and statistically simulation-sound NIZK. We give a construction of the latter in bilinear groups and combining it with ElGamal encryption, our ciphertexts are of size 1.3 kB at a 128-bit security level and can be computed on a smart card.},
author = {Abusalah, Hamza M and Fuchsbauer, Georg and Pietrzak, Krzysztof Z},
location = {Guildford, UK},
pages = {285 -- 303},
publisher = {Springer},
title = {{Offline witness encryption}},
doi = {10.1007/978-3-319-39555-5_16},
volume = {9696},
year = {2016},
}
@inproceedings{1230,
abstract = {Concolic testing is a promising method for generating test suites for large programs. However, it suffers from the path-explosion problem and often fails to find tests that cover difficult-to-reach parts of programs. In contrast, model checkers based on counterexample-guided abstraction refinement explore programs exhaustively, while failing to scale on large programs with precision. In this paper, we present a novel method that iteratively combines concolic testing and model checking to find a test suite for a given coverage criterion. If concolic testing fails to cover some test goals, then the model checker refines its program abstraction to prove more paths infeasible, which reduces the search space for concolic testing. We have implemented our method on top of the concolictesting tool Crest and the model checker CpaChecker. We evaluated our tool on a collection of programs and a category of SvComp benchmarks. In our experiments, we observed an improvement in branch coverage compared to Crest from 48% to 63% in the best case, and from 66% to 71% on average.},
author = {Daca, Przemyslaw and Gupta, Ashutosh and Henzinger, Thomas A},
location = {St. Petersburg, FL, USA},
pages = {328 -- 347},
publisher = {Springer},
title = {{Abstraction-driven concolic testing}},
doi = {10.1007/978-3-662-49122-5_16},
volume = {9583},
year = {2016},
}
@inproceedings{1231,
abstract = {We study the time-and memory-complexities of the problem of computing labels of (multiple) randomly selected challenge-nodes in a directed acyclic graph. The w-bit label of a node is the hash of the labels of its parents, and the hash function is modeled as a random oracle. Specific instances of this problem underlie both proofs of space [Dziembowski et al. CRYPTO’15] as well as popular memory-hard functions like scrypt. As our main tool, we introduce the new notion of a probabilistic parallel entangled pebbling game, a new type of combinatorial pebbling game on a graph, which is closely related to the labeling game on the same graph. As a first application of our framework, we prove that for scrypt, when the underlying hash function is invoked n times, the cumulative memory complexity (CMC) (a notion recently introduced by Alwen and Serbinenko (STOC’15) to capture amortized memory-hardness for parallel adversaries) is at least Ω(w · (n/ log(n))2). This bound holds for adversaries that can store many natural functions of the labels (e.g., linear combinations), but still not arbitrary functions thereof. We then introduce and study a combinatorial quantity, and show how a sufficiently small upper bound on it (which we conjecture) extends our CMC bound for scrypt to hold against arbitrary adversaries. We also show that such an upper bound solves the main open problem for proofs-of-space protocols: namely, establishing that the time complexity of computing the label of a random node in a graph on n nodes (given an initial kw-bit state) reduces tightly to the time complexity for black pebbling on the same graph (given an initial k-node pebbling).},
author = {Alwen, Joel F and Chen, Binyi and Kamath Hosdurg, Chethan and Kolmogorov, Vladimir and Pietrzak, Krzysztof Z and Tessaro, Stefano},
location = {Vienna, Austria},
pages = {358 -- 387},
publisher = {Springer},
title = {{On the complexity of scrypt and proofs of space in the parallel random oracle model}},
doi = {10.1007/978-3-662-49896-5_13},
volume = {9666},
year = {2016},
}
@article{1232,
abstract = {Mitochondrial electron transport chain complexes are organized into supercomplexes responsible for carrying out cellular respiration. Here we present three architectures of mammalian (ovine) supercomplexes determined by cryo-electron microscopy. We identify two distinct arrangements of supercomplex CICIII 2 CIV (the respirasome) - a major 'tight' form and a minor 'loose' form (resolved at the resolution of 5.8 Å and 6.7 Å, respectively), which may represent different stages in supercomplex assembly or disassembly. We have also determined an architecture of supercomplex CICIII 2 at 7.8 Å resolution. All observed density can be attributed to the known 80 subunits of the individual complexes, including 132 transmembrane helices. The individual complexes form tight interactions that vary between the architectures, with complex IV subunit COX7a switching contact from complex III to complex I. The arrangement of active sites within the supercomplex may help control reactive oxygen species production. To our knowledge, these are the first complete architectures of the dominant, physiologically relevant state of the electron transport chain.},
author = {Letts, James A and Fiedorczuk, Karol and Sazanov, Leonid A},
journal = {Nature},
number = {7622},
pages = {644 -- 648},
publisher = {Nature Publishing Group},
title = {{The architecture of respiratory supercomplexes}},
doi = {10.1038/nature19774},
volume = {537},
year = {2016},
}
@inproceedings{1233,
abstract = {About three decades ago it was realized that implementing private channels between parties which can be adaptively corrupted requires an encryption scheme that is secure against selective opening attacks. Whether standard (IND-CPA) security implies security against selective opening attacks has been a major open question since. The only known reduction from selective opening to IND-CPA security loses an exponential factor. A polynomial reduction is only known for the very special case where the distribution considered in the selective opening security experiment is a product distribution, i.e., the messages are sampled independently from each other. In this paper we give a reduction whose loss is quantified via the dependence graph (where message dependencies correspond to edges) of the underlying message distribution. In particular, for some concrete distributions including Markov distributions, our reduction is polynomial.},
author = {Fuchsbauer, Georg and Heuer, Felix and Kiltz, Eike and Pietrzak, Krzysztof Z},
location = {Tel Aviv, Israel},
pages = {282 -- 305},
publisher = {Springer},
title = {{Standard security does imply security against selective opening for markov distributions}},
doi = {10.1007/978-3-662-49096-9_12},
volume = {9562},
year = {2016},
}
@inproceedings{1234,
abstract = {We present a new algorithm for the statistical model checking of Markov chains with respect to unbounded temporal properties, including full linear temporal logic. The main idea is that we monitor each simulation run on the fly, in order to detect quickly if a bottom strongly connected component is entered with high probability, in which case the simulation run can be terminated early. As a result, our simulation runs are often much shorter than required by termination bounds that are computed a priori for a desired level of confidence on a large state space. In comparison to previous algorithms for statistical model checking our method is not only faster in many cases but also requires less information about the system, namely, only the minimum transition probability that occurs in the Markov chain. In addition, our method can be generalised to unbounded quantitative properties such as mean-payoff bounds.},
author = {Daca, Przemyslaw and Henzinger, Thomas A and Kretinsky, Jan and Petrov, Tatjana},
location = {Eindhoven, The Netherlands},
pages = {112 -- 129},
publisher = {Springer},
title = {{Faster statistical model checking for unbounded temporal properties}},
doi = {10.1007/978-3-662-49674-9_7},
volume = {9636},
year = {2016},
}
@inproceedings{1235,
abstract = {A constrained pseudorandom function (CPRF) F: K×X → Y for a family T of subsets of χ is a function where for any key k ∈ K and set S ∈ T one can efficiently compute a short constrained key kS, which allows to evaluate F(k, ·) on all inputs x ∈ S, while the outputs on all inputs x /∈ S look random even given kS. Abusalah et al. recently constructed the first constrained PRF for inputs of arbitrary length whose sets S are decided by Turing machines. They use their CPRF to build broadcast encryption and the first ID-based non-interactive key exchange for an unbounded number of users. Their constrained keys are obfuscated circuits and are therefore large. In this work we drastically reduce the key size and define a constrained key for a Turing machine M as a short signature on M. For this, we introduce a new signature primitive with constrained signing keys that let one only sign certain messages, while forging a signature on others is hard even when knowing the coins for key generation.},
author = {Abusalah, Hamza M and Fuchsbauer, Georg},
location = {Guildford, UK},
pages = {445 -- 463},
publisher = {Springer},
title = {{Constrained PRFs for unbounded inputs with short keys}},
doi = {10.1007/978-3-319-39555-5_24},
volume = {9696},
year = {2016},
}
@inproceedings{1236,
abstract = {A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function where for any key k ∈ K and set S ∈ T one can efficiently compute a constrained key kS which allows to evaluate F (k, ·) on all inputs x ∈ S, while even given this key, the outputs on all inputs x ∉ S look random. At Asiacrypt’13 Boneh and Waters gave a construction which supports the most general set family so far. Its keys kc are defined for sets decided by boolean circuits C and enable evaluation of the PRF on any x ∈ X where C(x) = 1. In their construction the PRF input length and the size of the circuits C for which constrained keys can be computed must be fixed beforehand during key generation. We construct a constrained PRF that has an unbounded input length and whose constrained keys can be defined for any set recognized by a Turing machine. The only a priori bound we make is on the description size of the machines. We prove our construction secure assuming publiccoin differing-input obfuscation. As applications of our constrained PRF we build a broadcast encryption scheme where the number of potential receivers need not be fixed at setup (in particular, the length of the keys is independent of the number of parties) and the first identity-based non-interactive key exchange protocol with no bound on the number of parties that can agree on a shared key.},
author = {Abusalah, Hamza M and Fuchsbauer, Georg and Pietrzak, Krzysztof Z},
location = {San Francisco, CA, USA},
pages = {413 -- 428},
publisher = {Springer},
title = {{Constrained PRFs for unbounded inputs}},
doi = {10.1007/978-3-319-29485-8_24},
volume = {9610},
year = {2016},
}
@inproceedings{1237,
abstract = {Bitmap images of arbitrary dimension may be formally perceived as unions of m-dimensional boxes aligned with respect to a rectangular grid in ℝm. Cohomology and homology groups are well known topological invariants of such sets. Cohomological operations, such as the cup product, provide higher-order algebraic topological invariants, especially important for digital images of dimension higher than 3. If such an operation is determined at the level of simplicial chains [see e.g. González-Díaz, Real, Homology, Homotopy Appl, 2003, 83-93], then it is effectively computable. However, decomposing a cubical complex into a simplicial one deleteriously affects the efficiency of such an approach. In order to avoid this overhead, a direct cubical approach was applied in [Pilarczyk, Real, Adv. Comput. Math., 2015, 253-275] for the cup product in cohomology, and implemented in the ChainCon software package [http://www.pawelpilarczyk.com/chaincon/]. We establish a formula for the Steenrod square operations [see Steenrod, Annals of Mathematics. Second Series, 1947, 290-320] directly at the level of cubical chains, and we prove the correctness of this formula. An implementation of this formula is programmed in C++ within the ChainCon software framework. We provide a few examples and discuss the effectiveness of this approach. One specific application follows from the fact that Steenrod squares yield tests for the topological extension problem: Can a given map A → Sd to a sphere Sd be extended to a given super-complex X of A? In particular, the ROB-SAT problem, which is to decide for a given function f: X → ℝm and a value r > 0 whether every g: X → ℝm with ∥g - f ∥∞ ≤ r has a root, reduces to the extension problem.},
author = {Krcál, Marek and Pilarczyk, Pawel},
location = {Marseille, France},
pages = {140 -- 151},
publisher = {Springer},
title = {{Computation of cubical Steenrod squares}},
doi = {10.1007/978-3-319-39441-1_13},
volume = {9667},
year = {2016},
}