@phdthesis{1405, abstract = {Motivated by the analysis of highly dynamic message-passing systems, i.e. unbounded thread creation, mobility, etc. we present a framework for the analysis of depth-bounded systems. Depth-bounded systems are one of the most expressive known fragment of the π-calculus for which interesting verification problems are still decidable. Even though they are infinite state systems depth-bounded systems are well-structured, thus can be analyzed algorithmically. We give an interpretation of depth-bounded systems as graph-rewriting systems. This gives more flexibility and ease of use to apply depth-bounded systems to other type of systems like shared memory concurrency. First, we develop an adequate domain of limits for depth-bounded systems, a prerequisite for the effective representation of downward-closed sets. Downward-closed sets are needed by forward saturation-based algorithms to represent potentially infinite sets of states. Then, we present an abstract interpretation framework to compute the covering set of well-structured transition systems. Because, in general, the covering set is not computable, our abstraction over-approximates the actual covering set. Our abstraction captures the essence of acceleration based-algorithms while giving up enough precision to ensure convergence. We have implemented the analysis in the PICASSO tool and show that it is accurate in practice. Finally, we build some further analyses like termination using the covering set as starting point.}, author = {Zufferey, Damien}, issn = {2663-337X}, pages = {134}, publisher = {Institute of Science and Technology Austria}, title = {{Analysis of dynamic message passing programs}}, doi = {10.15479/at:ista:1405}, year = {2013}, } @inproceedings{2847, abstract = {Depth-Bounded Systems form an expressive class of well-structured transition systems. They can model a wide range of concurrent infinite-state systems including those with dynamic thread creation, dynamically changing communication topology, and complex shared heap structures. We present the first method to automatically prove fair termination of depth-bounded systems. Our method uses a numerical abstraction of the system, which we obtain by systematically augmenting an over-approximation of the system’s reachable states with a finite set of counters. This numerical abstraction can be analyzed with existing termination provers. What makes our approach unique is the way in which it exploits the well-structuredness of the analyzed system. We have implemented our work in a prototype tool and used it to automatically prove liveness properties of complex concurrent systems, including nonblocking algorithms such as Treiber’s stack and several distributed processes. Many of these examples are beyond the scope of termination analyses that are based on traditional counter abstractions.}, author = {Bansal, Kshitij and Koskinen, Eric and Wies, Thomas and Zufferey, Damien}, editor = {Piterman, Nir and Smolka, Scott}, location = {Rome, Italy}, pages = {62 -- 77}, publisher = {Springer}, title = {{Structural Counter Abstraction}}, doi = {10.1007/978-3-642-36742-7_5}, volume = {7795}, year = {2013}, } @phdthesis{1406, abstract = {Epithelial spreading is a critical part of various developmental and wound repair processes. Here we use zebrafish epiboly as a model system to study the cellular and molecular mechanisms underlying the spreading of epithelial sheets. During zebrafish epiboly the enveloping cell layer (EVL), a simple squamous epithelium, spreads over the embryo to eventually cover the entire yolk cell by the end of gastrulation. The EVL leading edge is anchored through tight junctions to the yolk syncytial layer (YSL), where directly adjacent to the EVL margin a contractile actomyosin ring is formed that is thought to drive EVL epiboly. The prevalent view in the field was that the contractile ring exerts a pulling force on the EVL margin, which pulls the EVL towards the vegetal pole. However, how this force is generated and how it affects EVL morphology still remains elusive. Moreover, the cellular mechanisms mediating the increase in EVL surface area, while maintaining tissue integrity and function are still unclear. Here we show that the YSL actomyosin ring pulls on the EVL margin by two distinct force-generating mechanisms. One mechanism is based on contraction of the ring around its circumference, as previously proposed. The second mechanism is based on actomyosin retrogade flows, generating force through resistance against the substrate. The latter can function at any epiboly stage even in situations where the contraction-based mechanism is unproductive. Additionally, we demonstrate that during epiboly the EVL is subjected to anisotropic tension, which guides the orientation of EVL cell division along the main axis (animal-vegetal) of tension. The influence of tension in cell division orientation involves cell elongation and requires myosin-2 activity for proper spindle alignment. Strikingly, we reveal that tension-oriented cell divisions release anisotropic tension within the EVL and that in the absence of such divisions, EVL cells undergo ectopic fusions. We conclude that forces applied to the EVL by the action of the YSL actomyosin ring generate a tension anisotropy in the EVL that orients cell divisions, which in turn limit tissue tension increase thereby facilitating tissue spreading.}, author = {Campinho, Pedro}, issn = {2663-337X}, pages = {123}, publisher = {Institute of Science and Technology Austria}, title = {{Mechanics of zebrafish epiboly: Tension-oriented cell divisions limit anisotropic tissue tension in epithelial spreading}}, year = {2013}, } @article{2247, abstract = {Cooperative behavior, where one individual incurs a cost to help another, is a wide spread phenomenon. Here we study direct reciprocity in the context of the alternating Prisoner's Dilemma. We consider all strategies that can be implemented by one and two-state automata. We calculate the payoff matrix of all pairwise encounters in the presence of noise. We explore deterministic selection dynamics with and without mutation. Using different error rates and payoff values, we observe convergence to a small number of distinct equilibria. Two of them are uncooperative strict Nash equilibria representing always-defect (ALLD) and Grim. The third equilibrium is mixed and represents a cooperative alliance of several strategies, dominated by a strategy which we call Forgiver. Forgiver cooperates whenever the opponent has cooperated; it defects once when the opponent has defected, but subsequently Forgiver attempts to re-establish cooperation even if the opponent has defected again. Forgiver is not an evolutionarily stable strategy, but the alliance, which it rules, is asymptotically stable. For a wide range of parameter values the most commonly observed outcome is convergence to the mixed equilibrium, dominated by Forgiver. Our results show that although forgiving might incur a short-term loss it can lead to a long-term gain. Forgiveness facilitates stable cooperation in the presence of exploitation and noise.}, author = {Zagorsky, Benjamin and Reiter, Johannes and Chatterjee, Krishnendu and Nowak, Martin}, journal = {PLoS One}, number = {12}, publisher = {Public Library of Science}, title = {{Forgiver triumphs in alternating prisoner's dilemma }}, doi = {10.1371/journal.pone.0080814}, volume = {8}, year = {2013}, } @article{2858, abstract = {Tumor growth is caused by the acquisition of driver mutations, which enhance the net reproductive rate of cells. Driver mutations may increase cell division, reduce cell death, or allow cells to overcome density-limiting effects. We study the dynamics of tumor growth as one additional driver mutation is acquired. Our models are based on two-type branching processes that terminate in either tumor disappearance or tumor detection. In our first model, both cell types grow exponentially, with a faster rate for cells carrying the additional driver. We find that the additional driver mutation does not affect the survival probability of the lesion, but can substantially reduce the time to reach the detectable size if the lesion is slow growing. In our second model, cells lacking the additional driver cannot exceed a fixed carrying capacity, due to density limitations. In this case, the time to detection depends strongly on this carrying capacity. Our model provides a quantitative framework for studying tumor dynamics during different stages of progression. We observe that early, small lesions need additional drivers, while late stage metastases are only marginally affected by them. These results help to explain why additional driver mutations are typically not detected in fast-growing metastases.}, author = {Reiter, Johannes and Božić, Ivana and Allen, Benjamin and Chatterjee, Krishnendu and Nowak, Martin}, journal = {Evolutionary Applications}, number = {1}, pages = {34 -- 45}, publisher = {Wiley-Blackwell}, title = {{The effect of one additional driver mutation on tumor progression}}, doi = {10.1111/eva.12020}, volume = {6}, year = {2013}, } @article{2816, abstract = {In solid tumors, targeted treatments can lead to dramatic regressions, but responses are often short-lived because resistant cancer cells arise. The major strategy proposed for overcoming resistance is combination therapy. We present a mathematical model describing the evolutionary dynamics of lesions in response to treatment. We first studied 20 melanoma patients receiving vemurafenib. We then applied our model to an independent set of pancreatic, colorectal, and melanoma cancer patients with metastatic disease. We find that dual therapy results in long-term disease control for most patients, if there are no single mutations that cause cross-resistance to both drugs; in patients with large disease burden, triple therapy is needed. We also find that simultaneous therapy with two drugs is much more effective than sequential therapy. Our results provide realistic expectations for the efficacy of new drug combinations and inform the design of trials for new cancer therapeutics.}, author = {Božić, Ivana and Reiter, Johannes and Allen, Benjamin and Antal, Tibor and Chatterjee, Krishnendu and Shah, Preya and Moon, Yo and Yaqubie, Amin and Kelly, Nicole and Le, Dung and Lipson, Evan and Chapman, Paul and Diaz, Luis and Vogelstein, Bert and Nowak, Martin}, journal = {eLife}, publisher = {eLife Sciences Publications}, title = {{Evolutionary dynamics of cancer in response to targeted combination therapy}}, doi = {10.7554/eLife.00747}, volume = {2}, year = {2013}, } @inproceedings{2000, abstract = {In this work we present a flexible tool for tumor progression, which simulates the evolutionary dynamics of cancer. Tumor progression implements a multi-type branching process where the key parameters are the fitness landscape, the mutation rate, and the average time of cell division. The fitness of a cancer cell depends on the mutations it has accumulated. The input to our tool could be any fitness landscape, mutation rate, and cell division time, and the tool produces the growth dynamics and all relevant statistics.}, author = {Reiter, Johannes and Božić, Ivana and Chatterjee, Krishnendu and Nowak, Martin}, booktitle = {Proceedings of 25th Int. Conf. on Computer Aided Verification}, location = {St. Petersburg, Russia}, pages = {101 -- 106}, publisher = {Springer}, title = {{TTP: Tool for tumor progression}}, doi = {10.1007/978-3-642-39799-8_6}, volume = {8044}, year = {2013}, } @inproceedings{2445, abstract = {We develop program synthesis techniques that can help programmers fix concurrency-related bugs. We make two new contributions to synthesis for concurrency, the first improving the efficiency of the synthesized code, and the second improving the efficiency of the synthesis procedure itself. The first contribution is to have the synthesis procedure explore a variety of (sequential) semantics-preserving program transformations. Classically, only one such transformation has been considered, namely, the insertion of synchronization primitives (such as locks). Based on common manual bug-fixing techniques used by Linux device-driver developers, we explore additional, more efficient transformations, such as the reordering of independent instructions. The second contribution is to speed up the counterexample-guided removal of concurrency bugs within the synthesis procedure by considering partial-order traces (instead of linear traces) as counterexamples. A partial-order error trace represents a set of linear (interleaved) traces of a concurrent program all of which lead to the same error. By eliminating a partial-order error trace, we eliminate in a single iteration of the synthesis procedure all linearizations of the partial-order trace. We evaluated our techniques on several simplified examples of real concurrency bugs that occurred in Linux device drivers.}, author = {Cerny, Pavol and Henzinger, Thomas A and Radhakrishna, Arjun and Ryzhyk, Leonid and Tarrach, Thorsten}, location = {St. Petersburg, Russia}, pages = {951 -- 967}, publisher = {Springer}, title = {{Efficient synthesis for concurrency by semantics-preserving transformations}}, doi = {10.1007/978-3-642-39799-8_68}, volume = {8044}, year = {2013}, } @article{2926, abstract = {To fight infectious diseases, host immune defenses are employed at multiple levels. Sanitary behavior, such as pathogen avoidance and removal, acts as a first line of defense to prevent infection [1] before activation of the physiological immune system. Insect societies have evolved a wide range of collective hygiene measures and intensive health care toward pathogen-exposed group members [2]. One of the most common behaviors is allogrooming, in which nestmates remove infectious particles from the body surfaces of exposed individuals [3]. Here we show that, in invasive garden ants, grooming of fungus-exposed brood is effective beyond the sheer mechanical removal of fungal conidiospores; it also includes chemical disinfection through the application of poison produced by the ants themselves. Formic acid is the main active component of the poison. It inhibits fungal growth of conidiospores remaining on the brood surface after grooming and also those collected in the mouth of the grooming ant. This dual function is achieved by uptake of the poison droplet into the mouth through acidopore self-grooming and subsequent application onto the infectious brood via brood grooming. This extraordinary behavior extends the current understanding of grooming and the establishment of social immunity in insect societies.}, author = {Tragust, Simon and Mitteregger, Barbara and Barone, Vanessa and Konrad, Matthias and Ugelvig, Line V and Cremer, Sylvia}, journal = {Current Biology}, number = {1}, pages = {76 -- 82}, publisher = {Cell Press}, title = {{Ants disinfect fungus-exposed brood by oral uptake and spread of their poison}}, doi = {10.1016/j.cub.2012.11.034}, volume = {23}, year = {2013}, } @inproceedings{2305, abstract = {We study the complexity of central controller synthesis problems for finite-state Markov decision processes, where the objective is to optimize both the expected mean-payoff performance of the system and its stability. e argue that the basic theoretical notion of expressing the stability in terms of the variance of the mean-payoff (called global variance in our paper) is not always sufficient, since it ignores possible instabilities on respective runs. For this reason we propose alernative definitions of stability, which we call local and hybrid variance, and which express how rewards on each run deviate from the run's own mean-payoff and from the expected mean-payoff, respectively. We show that a strategy ensuring both the expected mean-payoff and the variance below given bounds requires randomization and memory, under all the above semantics of variance. We then look at the problem of determining whether there is a such a strategy. For the global variance, we show that the problem is in PSPACE, and that the answer can be approximated in pseudo-polynomial time. For the hybrid variance, the analogous decision problem is in NP, and a polynomial-time approximating algorithm also exists. For local variance, we show that the decision problem is in NP. Since the overall performance can be traded for stability (and vice versa), we also present algorithms for approximating the associated Pareto curve in all the three cases. Finally, we study a special case of the decision problems, where we require a given expected mean-payoff together with zero variance. Here we show that the problems can be all solved in polynomial time.}, author = {Brázdil, Tomáš and Chatterjee, Krishnendu and Forejt, Vojtěch and Kučera, Antonín}, booktitle = {28th Annual ACM/IEEE Symposium}, location = {New Orleans, LA, United States}, pages = {331 -- 340}, publisher = {IEEE}, title = {{Trading performance for stability in Markov decision processes}}, doi = {10.1109/LICS.2013.39}, year = {2013}, } @inproceedings{2820, abstract = {In this paper, we introduce the powerful framework of graph games for the analysis of real-time scheduling with firm deadlines. We introduce a novel instance of a partial-observation game that is suitable for this purpose, and prove decidability of all the involved decision problems. We derive a graph game that allows the automated computation of the competitive ratio (along with an optimal witness algorithm for the competitive ratio) and establish an NP-completeness proof for the graph game problem. For a given on-line algorithm, we present polynomial time solution for computing (i) the worst-case utility; (ii) the worst-case utility ratio w.r.t. a clairvoyant off-line algorithm; and (iii) the competitive ratio. A major strength of the proposed approach lies in its flexibility w.r.t. incorporating additional constraints on the adversary and/or the algorithm, including limited maximum or average load, finiteness of periods of overload, etc., which are easily added by means of additional instances of standard objective functions for graph games. }, author = {Chatterjee, Krishnendu and Kößler, Alexander and Schmid, Ulrich}, booktitle = {Proceedings of the 16th International conference on Hybrid systems: Computation and control}, isbn = {978-1-4503-1567-8 }, location = {Philadelphia, PA, United States}, pages = {163 -- 172}, publisher = {ACM}, title = {{Automated analysis of real-time scheduling using graph games}}, doi = {10.1145/2461328.2461356}, year = {2013}, } @inproceedings{2272, abstract = {We consider Conditional Random Fields (CRFs) with pattern-based potentials defined on a chain. In this model the energy of a string (labeling) x1...xn is the sum of terms over intervals [i,j] where each term is non-zero only if the substring xi...xj equals a prespecified pattern α. Such CRFs can be naturally applied to many sequence tagging problems. We present efficient algorithms for the three standard inference tasks in a CRF, namely computing (i) the partition function, (ii) marginals, and (iii) computing the MAP. Their complexities are respectively O(nL), O(nLℓmax) and O(nLmin{|D|,log(ℓmax+1)}) where L is the combined length of input patterns, ℓmax is the maximum length of a pattern, and D is the input alphabet. This improves on the previous algorithms of (Ye et al., 2009) whose complexities are respectively O(nL|D|), O(n|Γ|L2ℓ2max) and O(nL|D|), where |Γ| is the number of input patterns. In addition, we give an efficient algorithm for sampling. Finally, we consider the case of non-positive weights. (Komodakis & Paragios, 2009) gave an O(nL) algorithm for computing the MAP. We present a modification that has the same worst-case complexity but can beat it in the best case. }, author = {Takhanov, Rustem and Kolmogorov, Vladimir}, booktitle = {ICML'13 Proceedings of the 30th International Conference on International}, location = {Atlanta, GA, USA}, number = {3}, pages = {145 -- 153}, publisher = {ML Research Press}, title = {{Inference algorithms for pattern-based CRFs on sequence data}}, volume = {28}, year = {2013}, } @article{2448, abstract = {Cell-to-cell directional flow of the phytohormone auxin is primarily established by polar localization of the PIN auxin transporters, a process tightly regulated at multiple levels by auxin itself. We recently reported that, in the context of strong auxin flows, activity of the vacuolar ZIFL1.1 transporter is required for fine-tuning of polar auxin transport rates in the Arabidopsis root. In particular, ZIFL1.1 function protects plasma-membrane stability of the PIN2 carrier in epidermal root tip cells under conditions normally triggering PIN2 degradation. Here, we show that ZIFL1.1 activity at the root tip also promotes PIN1 plasma-membrane abundance in central cylinder cells, thus supporting the notion that ZIFL1.1 acts as a general positive modulator of polar auxin transport in roots.}, author = {Remy, Estelle and Baster, Pawel and Friml, Jirí and Duque, Paula}, journal = {Plant Signaling & Behavior}, number = {10}, publisher = {Taylor & Francis}, title = {{ZIFL1.1 transporter modulates polar auxin transport by stabilizing membrane abundance of multiple PINs in Arabidopsis root tip}}, doi = {10.4161/psb.25688}, volume = {8}, year = {2013}, } @article{2853, abstract = {High relatedness among interacting individuals has generally been considered a precondition for the evolution of altruism. However, kin-selection theory also predicts the evolution of altruism when relatedness is low, as long as the cost of the altruistic act is minor compared with its benefit. Here, we demonstrate evidence for a low-cost altruistic act in bacteria. We investigated Escherichia coli responding to the attack of an obligately lytic phage by committing suicide in order to prevent parasite transmission to nearby relatives. We found that bacterial suicide provides large benefits to survivors at marginal costs to committers. The cost of suicide was low, because infected cells are moribund, rapidly dying upon phage infection, such that no more opportunity for reproduction remains. As a consequence of its marginal cost, host suicide was selectively favoured even when relatedness between committers and survivors approached zero. Altogether, our findings demonstrate that low-cost suicide can evolve with ease, represents an effective host-defence strategy, and seems to be widespread among microbes. Moreover, low-cost suicide might also occur in higher organisms as exemplified by infected social insect workers leaving the colony to die in isolation.}, author = {Refardt, Dominik and Bergmiller, Tobias and Kümmerli, Rolf}, issn = {1471-2954}, journal = {Proceedings of the Royal Society of London Series B Biological Sciences}, number = {1759}, publisher = {The Royal Society}, title = {{Altruism can evolve when relatedness is low: Evidence from bacteria committing suicide upon phage infection}}, doi = {10.1098/rspb.2012.3035}, volume = {280}, year = {2013}, } @misc{9751, abstract = {High relatedness among interacting individuals has generally been considered a precondition for the evolution of altruism. However, kin-selection theory also predicts the evolution of altruism when relatedness is low, as long as the cost of the altruistic act is minor compared to its benefit. Here, we demonstrate evidence for a low-cost altruistic act in bacteria. We investigated Escherichia coli responding to the attack of an obligately lytic phage by committing suicide in order to prevent parasite transmission to nearby relatives. We found that bacterial suicide provides large benefits to survivors at marginal costs to committers. The cost of suicide was low because infected cells are moribund, rapidly dying upon phage infection, such that no more opportunity for reproduction remains. As a consequence of its marginal cost, host suicide was selectively favoured even when relatedness between committers and survivors approached zero. Altogether, our findings demonstrate that low-cost suicide can evolve with ease, represents an effective host-defence strategy, and seems to be widespread among microbes. Moreover, low-cost suicide might also occur in higher organisms as exemplified by infected social insect workers leaving the colony to die in isolation.}, author = {Refardt, Dominik and Bergmiller, Tobias and Kümmerli, Rolf}, publisher = {Dryad}, title = {{Data from: Altruism can evolve when relatedness is low: evidence from bacteria committing suicide upon phage infection}}, doi = {10.5061/dryad.b1q2n}, year = {2013}, } @article{7785, abstract = {Neural circuit assembly requires selection of specific cell fates, axonal trajectories, and synaptic targets. By analyzing the function of a secreted semaphorin, Sema-2b, in Drosophila olfactory receptor neuron (ORN) development, we identified multiple molecular and cellular mechanisms that link these events. Notch signaling limits Sema-2b expression to ventromedial ORN classes, within which Sema-2b cell-autonomously sensitizes ORN axons to external semaphorins. Central-brain-derived Sema-2a and Sema-2b attract Sema-2b-expressing axons to the ventromedial trajectory. In addition, Sema-2b/PlexB-mediated axon-axon interactions consolidate this trajectory choice and promote ventromedial axon-bundle formation. Selecting the correct developmental trajectory is ultimately essential for proper target choice. These findings demonstrate that Sema-2b couples ORN axon guidance to postsynaptic target neuron dendrite patterning well before the final target selection phase, and exemplify how a single guidance molecule can drive consecutive stages of neural circuit assembly with the help of sophisticated spatial and temporal regulation.}, author = {Joo, William J. and Sweeney, Lora Beatrice Jaeger and Liang, Liang and Luo, Liqun}, issn = {0896-6273}, journal = {Neuron}, number = {4}, pages = {673--686}, publisher = {Elsevier}, title = {{Linking cell fate, trajectory choice, and target selection: Genetic analysis of sema-2b in olfactory axon targeting}}, doi = {10.1016/j.neuron.2013.03.022}, volume = {78}, year = {2013}, } @techreport{2274, abstract = {Proofs of work (PoW) have been suggested by Dwork and Naor (Crypto'92) as protection to a shared resource. The basic idea is to ask the service requestor to dedicate some non-trivial amount of computational work to every request. The original applications included prevention of spam and protection against denial of service attacks. More recently, PoWs have been used to prevent double spending in the Bitcoin digital currency system. In this work, we put forward an alternative concept for PoWs -- so-called proofs of space (PoS), where a service requestor must dedicate a significant amount of disk space as opposed to computation. We construct secure PoS schemes in the random oracle model, using graphs with high "pebbling complexity" and Merkle hash-trees. }, author = {Dziembowski, Stefan and Faust, Sebastian and Kolmogorov, Vladimir and Pietrzak, Krzysztof Z}, publisher = {IST Austria}, title = {{Proofs of Space}}, year = {2013}, } @article{15162, abstract = {Cytological profiling (CP) is an unbiased image-based screening technique that uses automated microscopy and image analysis to profile compounds based on numerous quantifiable phenotypic features. We used CP to evaluate a library of nearly 500 compounds with documented mechanisms of action (MOAs) spanning a wide range of biological pathways. We developed informatics techniques for generating dosage-independent phenotypic “fingerprints” for each compound, and for quantifying the likelihood that a compound's CP fingerprint corresponds to its annotated MOA. We identified groups of features that distinguish classes with closely related phenotypes, such as microtubule poisons vs. HSP90 inhibitors, and DNA synthesis vs. proteasome inhibitors. We tested several cases in which cytological profiles indicated novel mechanisms, including a tyrphostin kinase inhibitor involved in mitochondrial uncoupling, novel microtubule poisons, and a nominal PPAR-gamma ligand that acts as a proteasome inhibitor, using independent biochemical assays to confirm the MOAs predicted by the CP signatures. We also applied maximal-information statistics to identify correlations between cytological features and kinase inhibitory activities by combining the CP fingerprints of 24 kinase inhibitors with published data on their specificities against a diverse panel of kinases. The resulting analysis suggests a strategy for probing the biological functions of specific kinases by compiling cytological data from inhibitors of varying specificities.}, author = {Woehrmann, Marcos H. and Bray, Walter M. and Durbin, James K. and Nisam, Sean C. and Michael, Alicia Kathleen and Glassey, Emerson and Stuart, Joshua M. and Lokey, R. Scott}, issn = {1742-2051}, journal = {Molecular BioSystems}, keywords = {Molecular Biology, Biotechnology}, number = {11}, publisher = {Royal Society of Chemistry}, title = {{Large-scale cytological profiling for functional analysis of bioactive compounds}}, doi = {10.1039/c3mb70245f}, volume = {9}, year = {2013}, } @article{10387, abstract = {We report numerical simulations of membrane tubulation driven by large colloidal particles. Using Monte Carlo simulations we study how the process depends on particle size and binding strength, and present accurate free energy calculations to sort out how tube formation compares with the competing budding process. We find that tube formation is a result of the collective behavior of the particles adhering on the surface, and it occurs for binding strengths that are smaller than those required for budding. We also find that long linear aggregates of particles forming on the membrane surface act as nucleation seeds for tubulation by lowering the free energy barrier associated to the process.}, author = {Šarić, Anđela and Cacciuto, Angelo}, issn = {1079-7114}, journal = {Physical Review Letters}, keywords = {general physics and astronomy}, number = {18}, publisher = {American Physical Society}, title = {{Mechanism of membrane tube formation induced by adhesive nanocomponents}}, doi = {10.1103/physrevlett.109.188101}, volume = {109}, year = {2012}, } @article{10388, abstract = {Using computer simulations, we show that lipid membranes can mediate linear aggregation of spherical nanoparticles binding to it for a wide range of biologically relevant bending rigidities. This result is in net contrast with the isotropic aggregation of nanoparticles on fluid interfaces or the expected clustering of isotropic insertions in biological membranes. We present a phase diagram indicating where linear aggregation is expected and compute explicitly the free-energy barriers associated with linear and isotropic aggregation. Finally, we provide simple scaling arguments to explain this phenomenology.}, author = {Šarić, Anđela and Cacciuto, Angelo}, issn = {1079-7114}, journal = {Physical Review Letters}, keywords = {general physics and astronomy}, number = {11}, publisher = {American Physical Society}, title = {{Fluid membranes can drive linear aggregation of adsorbed spherical nanoparticles}}, doi = {10.1103/physrevlett.108.118101}, volume = {108}, year = {2012}, }