@article{8239,
abstract = {Acrolein, a highly reactive unsaturated aldehyde, is generated in large amounts during smoking and is best known for its genotoxic capacity. Here, we aimed to assess whether acrolein at concentrations relevant for smokers may also exert immunomodulatory effects that could be relevant in allergy or cancer. In a BALB/c allergy model repeated nasal exposure to acrolein abrogated allergen-specific antibody and cytokine formation, and led to a relative accumulation of regulatory T cells in the lungs. Only the acrolein-treated mice were protected from bronchial hyperreactivity as well as from anaphylactic reactions upon challenge with the specific allergen. Moreover, grafted D2F2 tumor cells grew faster and intratumoral Foxp3+ cell accumulation was observed in these mice compared to sham-treated controls. Results from reporter cell lines suggested that acrolein acts via the aryl-hydrocarbon receptor which could be inhibited by resveratrol and 3′-methoxy-4′-nitroflavone Acrolein- stimulation of human PBMCs increased Foxp3+ expression by T cells which could be antagonized by resveratrol. Our mouse and human data thus revealed that acrolein exerts systemic immunosuppression by promoting Foxp3+ regulatory cells. This provides a novel explanation why smokers have a lower allergy, but higher cancer risk.},
author = {Roth-Walter, Franziska and Bergmayr, Cornelia and Meitz, Sarah and Buchleitner, Stefan and Stremnitzer, Caroline and Fazekas, Judit and Moskovskich, Anna and Müller, Mario A. and Roth, Georg A. and Manzano-Szalai, Krisztina and Dvorak, Zdenek and Neunkirchner, Alina and Jensen-Jarolim, Erika},
issn = {2045-2322},
journal = {Scientific Reports},
publisher = {Springer Nature},
title = {{Janus-faced Acrolein prevents allergy but accelerates tumor growth by promoting immunoregulatory Foxp3+ cells: Mouse model for passive respiratory exposure}},
doi = {10.1038/srep45067},
volume = {7},
year = {2017},
}
@article{824,
abstract = {In shear flows at transitional Reynolds numbers, localized patches of turbulence, known as puffs, coexist with the laminar flow. Recently, Avila et al. (Phys. Rev. Lett., vol. 110, 2013, 224502) discovered two spatially localized relative periodic solutions for pipe flow, which appeared in a saddle-node bifurcation at low Reynolds number. Combining slicing methods for continuous symmetry reduction with Poincaré sections for the first time in a shear flow setting, we compute and visualize the unstable manifold of the lower-branch solution and show that it extends towards the neighbourhood of the upper-branch solution. Surprisingly, this connection even persists far above the bifurcation point and appears to mediate the first stage of the puff generation: amplification of streamwise localized fluctuations. When the state-space trajectories on the unstable manifold reach the vicinity of the upper branch, corresponding fluctuations expand in space and eventually take the usual shape of a puff.},
author = {Budanur, Nazmi B and Hof, Björn},
issn = {00221120},
journal = {Journal of Fluid Mechanics},
publisher = {Cambridge University Press},
title = {{Heteroclinic path to spatially localized chaos in pipe flow}},
doi = {10.1017/jfm.2017.516},
volume = {827},
year = {2017},
}
@article{8240,
abstract = {Background/Aim: Cancer cell lines are indispensible surrogate models in cancer research, as they can be used off-the-shelf, expanded to the desired extent, easily modified and exchanged between research groups for affirmation, reproduction or follow-up experiments.
As malignant cells are prone to genomic instability, phenotypical changes may occur after certain passages in culture. Thus, cell lines have to be regularly authenticated to ensure data quality. In between experiments these cell lines are often stored in liquid nitrogen for extended time periods.
Although freezing of cells is a necessary evil, little research is performed on how long-term storage affects cancer cell lines. Therefore, this study investigated the effects of a 28-year long liquid nitrogen storage period on BT474 cells with regard to phenotypical changes, differences in cell-surface receptor expression as well as cytokine and gene expressional variations.
Methods: Two batches of BT474 cells, one frozen in 1986, the other directly purchased from ATCC were investigated by light microscopy, cell growth analysis, flow cytometry and cytokine as well as whole-transcriptome expression profiling.
Results: The cell lines were morphologically indifferent and showed similar growth rates and similar cell-surface receptor expression. Transcriptome analysis revealed significant differences in only 26 of 40,716 investigated RefSeq transcripts with 4 of them being up-regulated and 22 down-regulated.
Conclusion: This study demonstrates that even after very long periods of storage in liquid nitrogen, cancer cell lines display only minimal changes in their gene expression profiles. However, also such minor changes should be carefully assessed before continuation of experiments, especially if phenotypic alterations can be additionally observed.},
author = {Fazekas, Judit and Grunt, Thomas W. and Jensen-Jarolim, Erika and Singer, Josef},
issn = {1949-2553},
journal = {Oncotarget},
pages = {35076--35087},
publisher = {Impact Journals},
title = {{Long term storage in liquid nitrogen leads to only minor phenotypic and gene expression changes in the mammary carcinoma model cell line BT474}},
doi = {10.18632/oncotarget.16623},
volume = {8},
year = {2017},
}
@article{825,
abstract = {What data is needed about data? Describing the process to answer this question for the institutional data repository IST DataRep.},
author = {Petritsch, Barbara},
issn = {10222588},
journal = {Mitteilungen der Vereinigung Österreichischer Bibliothekarinnen & Bibliothekare},
number = {2},
pages = {200 -- 207},
publisher = {VÖB},
title = {{Metadata for research data in practice}},
doi = {10.31263/voebm.v70i2.1678},
volume = {70},
year = {2017},
}
@inproceedings{8299,
abstract = {Permissionless blockchain-based cryptocurrencies commonly use proof-of-work (PoW) or proof-of-stake (PoS) to ensure their security, e.g. to prevent double spending attacks. However, both approaches have disadvantages: PoW leads to massive amounts of wasted electricity and re-centralization, whereas major stakeholders in PoS might be able to create a monopoly. In this work, we propose proof-of-personhood (PoP), a mechanism that binds physical entities to virtual identities in a way that enables accountability while preserving anonymity. Afterwards we introduce PoPCoin, a new cryptocurrency, whose consensus mechanism leverages PoP to eliminate the dis-advantages of PoW and PoS while ensuring security. PoPCoin leads to a continuously fair and democratic wealth creation process which paves the way for an experimental basic income infrastructure.},
author = {Borge, Maria and Kokoris Kogias, Eleftherios and Jovanovic, Philipp and Gasser, Linus and Gailly, Nicolas and Ford, Bryan},
booktitle = {2017 IEEE European Symposium on Security and Privacy Workshops},
location = {Paris, France},
publisher = {IEEE},
title = {{Proof-of-personhood: Redemocratizing permissionless cryptocurrencies}},
doi = {10.1109/eurospw.2017.46},
year = {2017},
}
@inproceedings{8301,
abstract = {Software-update mechanisms are critical to the security of modern systems, but their typically centralized design presents a lucrative and frequently attacked target. In this work, we propose CHAINIAC, a decentralized software-update framework that eliminates single points of failure, enforces transparency, and provides efficient verifiability of integrity and authenticity for software-release processes. Independent witness servers collectively verify conformance of software updates to release policies, build verifiers validate the source-to-binary correspondence, and a tamper-proof release log stores collectively signed updates, thus ensuring that no release is accepted by clients before being widely disclosed and validated. The release log embodies a skipchain, a novel data structure, enabling arbitrarily out-of-date clients to efficiently validate updates and signing keys. Evaluation of our CHAINIAC prototype on reproducible Debian packages shows that the automated update process takes the average of 5 minutes per release for individual packages, and only 20 seconds for the aggregate timeline. We further evaluate the framework using real-world data from the PyPI package repository and show that it offers clients security comparable to verifying every single update themselves while consuming only one-fifth of the bandwidth and having a minimal computational overhead.},
author = {Nikitin, Kirill and Kokoris Kogias, Eleftherios and Jovanovic, Philipp and Gasser, Linus and Gailly, Nicolas and Khoffi, Ismail and Cappos, Justin and Ford, Bryan},
booktitle = {Proceedings of the 26th USENIX Conference on Security Symposium},
isbn = {9781931971409},
location = {Vancouver, Canada},
pages = {1271–1287},
publisher = {USENIX Association},
title = {{CHAINIAC: Proactive software-update transparency via collectively signed skipchains and verified builds}},
year = {2017},
}
@inproceedings{8306,
abstract = {Bias-resistant public randomness is a critical component in many (distributed) protocols. Generating public randomness is hard, however, because active adversaries may behave dishonestly to bias public random choices toward their advantage. Existing solutions do not scale to hundreds or thousands of participants, as is needed in many decentralized systems. We propose two large-scale distributed protocols, RandHound and RandHerd, which provide publicly-verifiable, unpredictable, and unbiasable randomness against Byzantine adversaries. RandHound relies on an untrusted client to divide a set of randomness servers into groups for scalability, and it depends on the pigeonhole principle to ensure output integrity, even for non-random, adversarial group choices. RandHerd implements an efficient, decentralized randomness beacon. RandHerd is structurally similar to a BFT protocol, but uses RandHound in a one-time setup to arrange participants into verifiably unbiased random secret-sharing groups, which then repeatedly produce random output at predefined intervals. Our prototype demonstrates that RandHound and RandHerd achieve good performance across hundreds of participants while retaining a low failure probability by properly selecting protocol parameters, such as a group size and secret-sharing threshold. For example, when sharding 512 nodes into groups of 32, our experiments show that RandHound can produce fresh random output after 240 seconds. RandHerd, after a setup phase of 260 seconds, is able to generate fresh random output in intervals of approximately 6 seconds. For this configuration, both protocols operate at a failure probability of at most 0.08% against a Byzantine adversary.},
author = {Syta, E. and Jovanovic, P. and Kokoris Kogias, Eleftherios and Gailly, N. and Gasser, L. and Khoffi, I. and Fischer, M. J. and Ford, B.},
booktitle = {2017 IEEE Symposium on Security and Privacy},
isbn = {9781509055340},
issn = {2375-1207},
location = {San Jose, CA, United States},
pages = {444--460},
publisher = {IEEE},
title = {{Scalable bias-resistant distributed randomness}},
doi = {10.1109/SP.2017.45},
year = {2017},
}
@inproceedings{833,
abstract = {We present an efficient algorithm to compute Euler characteristic curves of gray scale images of arbitrary dimension. In various applications the Euler characteristic curve is used as a descriptor of an image. Our algorithm is the first streaming algorithm for Euler characteristic curves. The usage of streaming removes the necessity to store the entire image in RAM. Experiments show that our implementation handles terabyte scale images on commodity hardware. Due to lock-free parallelism, it scales well with the number of processor cores. Additionally, we put the concept of the Euler characteristic curve in the wider context of computational topology. In particular, we explain the connection with persistence diagrams.},
author = {Heiss, Teresa and Wagner, Hubert},
editor = {Felsberg, Michael and Heyden, Anders and Krüger, Norbert},
issn = {03029743},
location = {Ystad, Sweden},
pages = {397 -- 409},
publisher = {Springer},
title = {{Streaming algorithm for Euler characteristic curves of multidimensional images}},
doi = {10.1007/978-3-319-64689-3_32},
volume = {10424},
year = {2017},
}
@article{834,
abstract = {Thermal and many-body localized phases are separated by a dynamical phase transition of a new kind. We analyze the distribution of off-diagonal matrix elements of local operators across this transition in two different models of disordered spin chains. We show that the behavior of matrix elements can be used to characterize the breakdown of thermalization and to extract the many-body Thouless energy. We find that upon increasing the disorder strength the system enters a critical region around the many-body localization transition. The properties of the system in this region are: (i) the Thouless energy becomes smaller than the level spacing, (ii) the matrix elements show critical dependence on the energy difference, and (iii) the matrix elements, viewed as amplitudes of a fictitious wave function, exhibit strong multifractality. This critical region decreases with the system size, which we interpret as evidence for a diverging correlation length at the many-body localization transition. Our findings show that the correlation length becomes larger than the accessible system sizes in a broad range of disorder strength values and shed light on the critical behavior near the many-body localization transition.},
author = {Serbyn, Maksym and Zlatko, Papic and Abanin, Dmitry},
issn = {24699950},
journal = {Physical Review B - Condensed Matter and Materials Physics},
number = {10},
publisher = {American Physical Society},
title = {{Thouless energy and multifractality across the many-body localization transition}},
doi = {10.1103/PhysRevB.96.104201},
volume = {96},
year = {2017},
}
@article{835,
abstract = {An outstanding question in animal development, tissue homeostasis and disease is how cell populations adapt to sensory inputs. During Drosophila larval development, hematopoietic sites are in direct contact with sensory neuron clusters of the peripheral nervous system (PNS), and blood cells (hemocytes) require the PNS for their survival and recruitment to these microenvironments, known as Hematopoietic Pockets. Here we report that Activin-β, a TGF-β family ligand, is expressed by sensory neurons of the PNS and regulates the proliferation and adhesion of hemocytes. These hemocyte responses depend on PNS activity, as shown by agonist treatment and transient silencing of sensory neurons. Activin-β has a key role in this regulation, which is apparent from reporter expression and mutant analyses. This mechanism of local sensory neurons controlling blood cell adaptation invites evolutionary parallels with vertebrate hematopoietic progenitors and the independent myeloid system of tissue macrophages, whose regulation by local microenvironments remain undefined.},
author = {Makhijani, Kalpana and Alexander, Brandy and Rao, Deepti and Petraki, Sophia and Herboso, Leire and Kukar, Katelyn and Batool, Itrat and Wachner, Stephanie and Gold, Katrina and Wong, Corinna and O'Connor, Michael and Brückner, Katja},
issn = {20411723},
journal = {Nature Communications},
publisher = {Nature Publishing Group},
title = {{Regulation of Drosophila hematopoietic sites by Activin-β from active sensory neurons}},
doi = {10.1038/ncomms15990},
volume = {8},
year = {2017},
}
@inproceedings{836,
abstract = {Recent research has examined how to study the topological features of a continuous self-map by means of the persistence of the eigenspaces, for given eigenvalues, of the endomorphism induced in homology over a field. This raised the question of how to select dynamically significant eigenvalues. The present paper aims to answer this question, giving an algorithm that computes the persistence of eigenspaces for every eigenvalue simultaneously, also expressing said eigenspaces as direct sums of “finite” and “singular” subspaces.},
author = {Ethier, Marc and Jablonski, Grzegorz and Mrozek, Marian},
booktitle = {Special Sessions in Applications of Computer Algebra},
isbn = {978-331956930-7},
location = {Kalamata, Greece},
pages = {119 -- 136},
publisher = {Springer},
title = {{Finding eigenvalues of self-maps with the Kronecker canonical form}},
doi = {10.1007/978-3-319-56932-1_8},
volume = {198},
year = {2017},
}
@phdthesis{838,
abstract = {In this thesis we discuss the exact security of message authentications codes HMAC , NMAC , and PMAC . NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a variable input-length function. A practical single-key variant of NMAC called HMAC is a very popular and widely deployed message authentication code (MAC). PMAC is a block-cipher based mode of operation, which also happens to be the most famous fully parallel MAC. NMAC was introduced by Bellare, Canetti and Krawczyk Crypto’96, who proved it to be a secure pseudorandom function (PRF), and thus also a MAC, under two assumptions. Unfortunately, for many instantiations of HMAC one of them has been found to be wrong. To restore the provable guarantees for NMAC , Bellare [Crypto’06] showed its security without this assumption. PMAC was introduced by Black and Rogaway at Eurocrypt 2002. If instantiated with a pseudorandom permutation over n -bit strings, PMAC constitutes a provably secure variable input-length PRF. For adversaries making q queries, each of length at most ` (in n -bit blocks), and of total length σ ≤ q` , the original paper proves an upper bound on the distinguishing advantage of O ( σ 2 / 2 n ), while the currently best bound is O ( qσ/ 2 n ). In this work we show that this bound is tight by giving an attack with advantage Ω( q 2 `/ 2 n ). In the PMAC construction one initially XORs a mask to every message block, where the mask for the i th block is computed as τ i := γ i · L , where L is a (secret) random value, and γ i is the i -th codeword of the Gray code. Our attack applies more generally to any sequence of γ i ’s which contains a large coset of a subgroup of GF (2 n ). As for NMAC , our first contribution is a simpler and uniform proof: If f is an ε -secure PRF (against q queries) and a δ - non-adaptively secure PRF (against q queries), then NMAC f is an ( ε + `qδ )-secure PRF against q queries of length at most ` blocks each. We also show that this ε + `qδ bound is basically tight by constructing an f for which an attack with advantage `qδ exists. Moreover, we analyze the PRF-security of a modification of NMAC called NI by An and Bellare that avoids the constant rekeying on multi-block messages in NMAC and allows for an information-theoretic analysis. We carry out such an analysis, obtaining a tight `q 2 / 2 c bound for this step, improving over the trivial bound of ` 2 q 2 / 2 c . Finally, we investigate, if the security of PMAC can be further improved by using τ i ’s that are k -wise independent, for k > 1 (the original has k = 1). We observe that the security of PMAC will not increase in general if k = 2, and then prove that the security increases to O ( q 2 / 2 n ), if the k = 4. Due to simple extension attacks, this is the best bound one can hope for, using any distribution on the masks. Whether k = 3 is already sufficient to get this level of security is left as an open problem. Keywords: Message authentication codes, Pseudorandom functions, HMAC, PMAC. },
author = {Rybar, Michal},
pages = {86},
publisher = {IST Austria},
title = {{(The exact security of) Message authentication codes}},
doi = {10.15479/AT:ISTA:th_828},
year = {2017},
}
@phdthesis{839,
abstract = {This thesis describes a brittle fracture simulation method for visual effects applications. Building upon a symmetric Galerkin boundary element method, we first compute stress intensity factors following the theory of linear elastic fracture mechanics. We then use these stress intensities to simulate the motion of a propagating crack front at a significantly higher resolution than the overall deformation of the breaking object. Allowing for spatial variations of the material's toughness during crack propagation produces visually realistic, highly-detailed fracture surfaces. Furthermore, we introduce approximations for stress intensities and crack opening displacements, resulting in both practical speed-up and theoretically superior runtime complexity compared to previous methods. While we choose a quasi-static approach to fracture mechanics, ignoring dynamic deformations, we also couple our fracture simulation framework to a standard rigid-body dynamics solver, enabling visual effects artists to simulate both large scale motion, as well as fracturing due to collision forces in a combined system. As fractures inside of an object grow, their geometry must be represented both in the coarse boundary element mesh, as well as at the desired fine output resolution. Using a boundary element method, we avoid complicated volumetric meshing operations. Instead we describe a simple set of surface meshing operations that allow us to progressively add cracks to the mesh of an object and still re-use all previously computed entries of the linear boundary element system matrix. On the high resolution level, we opt for an implicit surface representation. We then describe how to capture fracture surfaces during crack propagation, as well as separate the individual fragments resulting from the fracture process, based on this implicit representation. We show results obtained with our method, either solving the full boundary element system in every time step, or alternatively using our fast approximations. These results demonstrate that both of these methods perform well in basic test cases and produce realistic fracture surfaces. Furthermore we show that our fast approximations substantially out-perform the standard approach in more demanding scenarios. Finally, these two methods naturally combine, using the full solution while the problem size is manageably small and switching to the fast approximations later on. The resulting hybrid method gives the user a direct way to choose between speed and accuracy of the simulation. },
author = {Hahn, David},
pages = {124},
publisher = {IST Austria},
title = {{Brittle fracture simulation with boundary elements for computer graphics}},
doi = {10.15479/AT:ISTA:th_855},
year = {2017},
}
@inbook{84,
abstract = {The advent of high-throughput technologies and the concurrent advances in information sciences have led to a data revolution in biology. This revolution is most significant in molecular biology, with an increase in the number and scale of the “omics” projects over the last decade. Genomics projects, for example, have produced impressive advances in our knowledge of the information concealed into genomes, from the many genes that encode for the proteins that are responsible for most if not all cellular functions, to the noncoding regions that are now known to provide regulatory functions. Proteomics initiatives help to decipher the role of post-translation modifications on the protein structures and provide maps of protein-protein interactions, while functional genomics is the field that attempts to make use of the data produced by these projects to understand protein functions. The biggest challenge today is to assimilate the wealth of information provided by these initiatives into a conceptual framework that will help us decipher life. For example, the current views of the relationship between protein structure and function remain fragmented. We know of their sequences, more and more about their structures, we have information on their biological activities, but we have difficulties connecting this dotted line into an informed whole. We lack the experimental and computational tools for directly studying protein structure, function, and dynamics at the molecular and supra-molecular levels. In this chapter, we review some of the current developments in building the computational tools that are needed, focusing on the role that geometry and topology play in these efforts. One of our goals is to raise the general awareness about the importance of geometric methods in elucidating the mysterious foundations of our very existence. Another goal is the broadening of what we consider a geometric algorithm. There is plenty of valuable no-man’s-land between combinatorial and numerical algorithms, and it seems opportune to explore this land with a computational-geometric frame of mind.},
author = {Edelsbrunner, Herbert and Koehl, Patrice},
booktitle = {Handbook of Discrete and Computational Geometry, Third Edition},
editor = {Toth, Csaba and O'Rourke, Joseph and Goodman, Jacob},
pages = {1709 -- 1735},
publisher = {CRC Press},
title = {{Computational topology for structural molecular biology}},
doi = {10.1201/9781315119601},
year = {2017},
}
@article{840,
abstract = {Heavy holes confined in quantum dots are predicted to be promising candidates for the realization of spin qubits with long coherence times. Here we focus on such heavy-hole states confined in germanium hut wires. By tuning the growth density of the latter we can realize a T-like structure between two neighboring wires. Such a structure allows the realization of a charge sensor, which is electrostatically and tunnel coupled to a quantum dot, with charge-transfer signals as high as 0.3 e. By integrating the T-like structure into a radiofrequency reflectometry setup, single-shot measurements allowing the extraction of hole tunneling times are performed. The extracted tunneling times of less than 10 μs are attributed to the small effective mass of Ge heavy-hole states and pave the way toward projective spin readout measurements.},
author = {Vukusic, Lada and Kukucka, Josip and Watzinger, Hannes and Katsaros, Georgios},
issn = {15306984},
journal = {Nano Letters},
number = {9},
pages = {5706 -- 5710},
publisher = {American Chemical Society},
title = {{Fast hole tunneling times in germanium hut wires probed by single-shot reflectometry}},
doi = {10.1021/acs.nanolett.7b02627},
volume = {17},
year = {2017},
}
@article{909,
abstract = {We study the lengths of curves passing through a fixed number of points on the boundary of a convex shape in the plane. We show that, for any convex shape K, there exist four points on the boundary of K such that the length of any curve passing through these points is at least half of the perimeter of K. It is also shown that the same statement does not remain valid with the additional constraint that the points are extreme points of K. Moreover, the factor ½ cannot be achieved with any fixed number of extreme points. We conclude the paper with a few other inequalities related to the perimeter of a convex shape.},
author = {Akopyan, Arseniy and Vysotsky, Vladislav},
issn = {00029890},
journal = {The American Mathematical Monthly},
number = {7},
pages = {588 -- 596},
publisher = {Mathematical Association of America},
title = {{On the lengths of curves passing through boundary points of a planar convex shape}},
doi = {10.4169/amer.math.monthly.124.7.588},
volume = {124},
year = {2017},
}
@article{910,
abstract = {Frequency-independent selection is generally considered as a force that acts to reduce the genetic variation in evolving populations, yet rigorous arguments for this idea are scarce. When selection fluctuates in time, it is unclear whether frequency-independent selection may maintain genetic polymorphism without invoking additional mechanisms. We show that constant frequency-independent selection with arbitrary epistasis on a well-mixed haploid population eliminates genetic variation if we assume linkage equilibrium between alleles. To this end, we introduce the notion of frequency-independent selection at the level of alleles, which is sufficient to prove our claim and contains the notion of frequency-independent selection on haploids. When selection and recombination are weak but of the same order, there may be strong linkage disequilibrium; numerical calculations show that stable equilibria are highly unlikely. Using the example of a diallelic two-locus model, we then demonstrate that frequency-independent selection that fluctuates in time can maintain stable polymorphism if linkage disequilibrium changes its sign periodically. We put our findings in the context of results from the existing literature and point out those scenarios in which the possible role of frequency-independent selection in maintaining genetic variation remains unclear.
},
author = {Novak, Sebastian and Barton, Nicholas H},
journal = {Genetics},
number = {2},
pages = {653 -- 668},
publisher = {Genetics Society of America},
title = {{When does frequency-independent selection maintain genetic variation?}},
doi = {10.1534/genetics.117.300129},
volume = {207},
year = {2017},
}
@article{912,
abstract = {We consider a many-body system of fermionic atoms interacting via a local pair potential and subject to an external potential within the framework of Bardeen-Cooper-Schrieffer (BCS) theory. We measure the free energy of the whole sample with respect to the free energy of a reference state which allows us to define a BCS functional with boundary conditions at infinity. Our main result is a lower bound for this energy functional in terms of expressions that typically appear in Ginzburg-Landau functionals.
},
author = {Deuchert, Andreas},
issn = {00222488},
journal = { Journal of Mathematical Physics},
number = {8},
publisher = {AIP},
title = {{A lower bound for the BCS functional with boundary conditions at infinity}},
doi = {10.1063/1.4996580},
volume = {58},
year = {2017},
}
@article{914,
abstract = {Infections with potentially lethal pathogens may negatively affect an individual’s lifespan and decrease its reproductive value. The terminal investment hypothesis predicts that individuals faced with a reduced survival should invest more into reproduction instead of maintenance and growth. Several studies suggest that individuals are indeed able to estimate their body condition and to increase their reproductive effort with approaching death, while other studies gave ambiguous results. We investigate whether queens of a perennial social insect (ant) are able to boost their reproduction following infection with an obligate killing pathogen. Social insect queens are special with regard to reproduction and aging, as they outlive conspecific non-reproductive workers. Moreover, in the ant Cardiocondyla obscurior, fecundity increases with queen age. However, it remained unclear whether this reflects negative reproductive senescence or terminal investment in response to approaching death. Here, we test whether queens of C. obscurior react to infection with the entomopathogenic fungus Metarhizium brunneum by an increased egg-laying rate. We show that a fungal infection triggers a reinforced investment in reproduction in queens. This adjustment of the reproductive rate by ant queens is consistent with predictions of the terminal investment hypothesis and is reported for the first time in a social insect.},
author = {Giehr, Julia and Grasse, Anna V and Cremer, Sylvia and Heinze, Jürgen and Schrempf, Alexandra},
issn = {20545703},
journal = {Royal Society Open Science},
number = {7},
publisher = {Royal Society, The},
title = {{Ant queens increase their reproductive efforts after pathogen infection}},
doi = {10.1098/rsos.170547},
volume = {4},
year = {2017},
}
@inproceedings{915,
abstract = {We propose a dual decomposition and linear program relaxation of the NP-hard minimum cost multicut problem. Unlike other polyhedral relaxations of the multicut polytope, it is amenable to efficient optimization by message passing. Like other polyhedral relaxations, it can be tightened efficiently by cutting planes. We define an algorithm that alternates between message passing and efficient separation of cycle- and odd-wheel inequalities. This algorithm is more efficient than state-of-the-art algorithms based on linear programming, including algorithms written in the framework of leading commercial software, as we show in experiments with large instances of the problem from applications in computer vision, biomedical image analysis and data mining.},
author = {Swoboda, Paul and Andres, Bjoern},
isbn = {978-153860457-1},
location = {Honolulu, HA, United States},
pages = {4990--4999},
publisher = {IEEE},
title = {{A message passing algorithm for the minimum cost multicut problem}},
doi = {10.1109/CVPR.2017.530},
volume = {2017},
year = {2017},
}