@misc{13069, abstract = {To survive elevated temperatures, ectotherms adjust the fluidity of membranes by fine-tuning lipid desaturation levels in a process previously described to be cell-autonomous. We have discovered that, in Caenorhabditis elegans, neuronal Heat shock Factor 1 (HSF-1), the conserved master regulator of the heat shock response (HSR)- causes extensive fat remodelling in peripheral tissues. These changes include a decrease in fat desaturase and acid lipase expression in the intestine, and a global shift in the saturation levels of plasma membrane’s phospholipids. The observed remodelling of plasma membrane is in line with ectothermic adaptive responses and gives worms a cumulative advantage to warm temperatures. We have determined that at least six TAX-2/TAX-4 cGMP gated channel expressing sensory neurons and TGF-β/BMP are required for signalling across tissues to modulate fat desaturation. We also find neuronal hsf-1 is not only sufficient but also partially necessary to control the fat remodelling response and for survival at warm temperatures. This is the first study to show that a thermostat-based mechanism can cell non-autonomously coordinate membrane saturation and composition across tissues in a multicellular animal.}, author = {Chauve, Laetitia and Hodge, Francesca and Murdoch, Sharlene and Masoudzadeh, Fatemah and Mann, Harry-Jack and Lopez-Clavijo, Andrea and Okkenhaug, Hanneke and West, Greg and Sousa, Bebiana C. and Segonds-Pichon, Anne and Li, Cheryl and Wingett, Steven and Kienberger, Hermine and Kleigrewe, Karin and de Bono, Mario and Wakelam, Michael and Casanueva, Olivia}, publisher = {Zenodo}, title = {{Neuronal HSF-1 coordinates the propagation of fat desaturation across tissues to enable adaptation to high temperatures in C. elegans}}, doi = {10.5281/ZENODO.5519410}, year = {2021}, } @inproceedings{10325, abstract = {Since the inception of Bitcoin, a plethora of distributed ledgers differing in design and purpose has been created. While by design, blockchains provide no means to securely communicate with external systems, numerous attempts towards trustless cross-chain communication have been proposed over the years. Today, cross-chain communication (CCC) plays a fundamental role in cryptocurrency exchanges, scalability efforts via sharding, extension of existing systems through sidechains, and bootstrapping of new blockchains. Unfortunately, existing proposals are designed ad-hoc for specific use-cases, making it hard to gain confidence in their correctness and composability. We provide the first systematic exposition of cross-chain communication protocols. We formalize the underlying research problem and show that CCC is impossible without a trusted third party, contrary to common beliefs in the blockchain community. With this result in mind, we develop a framework to design new and evaluate existing CCC protocols, focusing on the inherent trust assumptions thereof, and derive a classification covering the field of cross-chain communication to date. We conclude by discussing open challenges for CCC research and the implications of interoperability on the security and privacy of blockchains.}, author = {Zamyatin, Alexei and Al-Bassam, Mustafa and Zindros, Dionysis and Kokoris Kogias, Eleftherios and Moreno-Sanchez, Pedro and Kiayias, Aggelos and Knottenbelt, William J.}, booktitle = {25th International Conference on Financial Cryptography and Data Security}, isbn = {9-783-6626-4330-3}, issn = {1611-3349}, location = {Virtual}, pages = {3--36}, publisher = {Springer Nature}, title = {{SoK: Communication across distributed ledgers}}, doi = {10.1007/978-3-662-64331-0_1}, volume = {12675 }, year = {2021}, } @inproceedings{10324, abstract = {Off-chain protocols (channels) are a promising solution to the scalability and privacy challenges of blockchain payments. Current proposals, however, require synchrony assumptions to preserve the safety of a channel, leaking to an adversary the exact amount of time needed to control the network for a successful attack. In this paper, we introduce Brick, the first payment channel that remains secure under network asynchrony and concurrently provides correct incentives. The core idea is to incorporate the conflict resolution process within the channel by introducing a rational committee of external parties, called wardens. Hence, if a party wants to close a channel unilaterally, it can only get the committee’s approval for the last valid state. Additionally, Brick provides sub-second latency because it does not employ heavy-weight consensus. Instead, Brick uses consistent broadcast to announce updates and close the channel, a light-weight abstraction that is powerful enough to preserve safety and liveness to any rational parties. We formally define and prove for Brick the properties a payment channel construction should fulfill. We also design incentives for Brick such that honest and rational behavior aligns. Finally, we provide a reference implementation of the smart contracts in Solidity.}, author = {Avarikioti, Zeta and Kokoris Kogias, Eleftherios and Wattenhofer, Roger and Zindros, Dionysis}, booktitle = {25th International Conference on Financial Cryptography and Data Security}, isbn = {9-783-6626-4330-3}, issn = {1611-3349}, location = {Virtual}, pages = {209--230}, publisher = {Springer Nature}, title = {{Brick: Asynchronous incentive-compatible payment channels}}, doi = {10.1007/978-3-662-64331-0_11}, volume = {12675 }, year = {2021}, } @article{10363, abstract = {Erythropoietin enhances oxygen delivery and reduces hypoxia-induced cell death, but its pro-thrombotic activity is problematic for use of erythropoietin in treating hypoxia. We constructed a fusion protein that stimulates red blood cell production and neuroprotection without triggering platelet production, a marker for thrombosis. The protein consists of an anti-glycophorin A nanobody and an erythropoietin mutant (L108A). The mutation reduces activation of erythropoietin receptor homodimers that induce erythropoiesis and thrombosis, but maintains the tissue-protective signaling. The binding of the nanobody element to glycophorin A rescues homodimeric erythropoietin receptor activation on red blood cell precursors. In a cell proliferation assay, the fusion protein is active at 10−14 M, allowing an estimate of the number of receptor–ligand complexes needed for signaling. This fusion protein stimulates erythroid cell proliferation in vitro and in mice, and shows neuroprotective activity in vitro. Our erythropoietin fusion protein presents a novel molecule for treating hypoxia.}, author = {Lee, Jungmin and Vernet, Andyna and Gruber, Nathalie and Kready, Kasia M. and Burrill, Devin R. and Way, Jeffrey C. and Silver, Pamela A.}, issn = {1741-0134}, journal = {Protein Engineering, Design and Selection}, publisher = {Oxford University Press}, title = {{Rational engineering of an erythropoietin fusion protein to treat hypoxia}}, doi = {10.1093/protein/gzab025}, volume = {34}, year = {2021}, } @article{10366, author = {Heisenberg, Carl-Philipp J and Lennon, Ana Maria and Mayor, Roberto and Salbreux, Guillaume}, issn = {2667-2901}, journal = {Cells and Development}, number = {12}, publisher = {Elsevier}, title = {{Special rebranding issue: “Quantitative cell and developmental biology”}}, doi = {10.1016/j.cdev.2021.203758}, volume = {168}, year = {2021}, } @article{10402, abstract = {Branching morphogenesis governs the formation of many organs such as lung, kidney, and the neurovascular system. Many studies have explored system-specific molecular and cellular regulatory mechanisms, as well as self-organizing rules underlying branching morphogenesis. However, in addition to local cues, branched tissue growth can also be influenced by global guidance. Here, we develop a theoretical framework for a stochastic self-organized branching process in the presence of external cues. Combining analytical theory with numerical simulations, we predict differential signatures of global vs. local regulatory mechanisms on the branching pattern, such as angle distributions, domain size, and space-filling efficiency. We find that branch alignment follows a generic scaling law determined by the strength of global guidance, while local interactions influence the tissue density but not its overall territory. Finally, using zebrafish innervation as a model system, we test these key features of the model experimentally. Our work thus provides quantitative predictions to disentangle the role of different types of cues in shaping branched structures across scales.}, author = {Ucar, Mehmet C and Kamenev, Dmitrii and Sunadome, Kazunori and Fachet, Dominik C and Lallemend, Francois and Adameyko, Igor and Hadjab, Saida and Hannezo, Edouard B}, issn = {2041-1723}, journal = {Nature Communications}, publisher = {Springer Nature}, title = {{Theory of branching morphogenesis by local interactions and global guidance}}, doi = {10.1038/s41467-021-27135-5}, volume = {12}, year = {2021}, } @inproceedings{10407, abstract = {Digital hardware Trojans are integrated circuits whose implementation differ from the specification in an arbitrary and malicious way. For example, the circuit can differ from its specified input/output behavior after some fixed number of queries (known as “time bombs”) or on some particular input (known as “cheat codes”). To detect such Trojans, countermeasures using multiparty computation (MPC) or verifiable computation (VC) have been proposed. On a high level, to realize a circuit with specification F one has more sophisticated circuits F⋄ manufactured (where F⋄ specifies a MPC or VC of F ), and then embeds these F⋄ ’s into a master circuit which must be trusted but is relatively simple compared to F . Those solutions impose a significant overhead as F⋄ is much more complex than F , also the master circuits are not exactly trivial. In this work, we show that in restricted settings, where F has no evolving state and is queried on independent inputs, we can achieve a relaxed security notion using very simple constructions. In particular, we do not change the specification of the circuit at all (i.e., F=F⋄ ). Moreover the master circuit basically just queries a subset of its manufactured circuits and checks if they’re all the same. The security we achieve guarantees that, if the manufactured circuits are initially tested on up to T inputs, the master circuit will catch Trojans that try to deviate on significantly more than a 1/T fraction of the inputs. This bound is optimal for the type of construction considered, and we provably achieve it using a construction where 12 instantiations of F need to be embedded into the master. We also discuss an extremely simple construction with just 2 instantiations for which we conjecture that it already achieves the optimal bound.}, author = {Chakraborty, Suvradip and Dziembowski, Stefan and Gałązka, Małgorzata and Lizurej, Tomasz and Pietrzak, Krzysztof Z and Yeo, Michelle X}, isbn = {9-783-0309-0452-4}, issn = {1611-3349}, location = {Raleigh, NC, United States}, pages = {397--428}, publisher = {Springer Nature}, title = {{Trojan-resilience without cryptography}}, doi = {10.1007/978-3-030-90453-1_14}, volume = {13043}, year = {2021}, } @article{10403, abstract = {Synaptic transmission, connectivity, and dendritic morphology mature in parallel during brain development and are often disrupted in neurodevelopmental disorders. Yet how these changes influence the neuronal computations necessary for normal brain function are not well understood. To identify cellular mechanisms underlying the maturation of synaptic integration in interneurons, we combined patch-clamp recordings of excitatory inputs in mouse cerebellar stellate cells (SCs), three-dimensional reconstruction of SC morphology with excitatory synapse location, and biophysical modeling. We found that postnatal maturation of postsynaptic strength was homogeneously reduced along the somatodendritic axis, but dendritic integration was always sublinear. However, dendritic branching increased without changes in synapse density, leading to a substantial gain in distal inputs. Thus, changes in synapse distribution, rather than dendrite cable properties, are the dominant mechanism underlying the maturation of neuronal computation. These mechanisms favor the emergence of a spatially compartmentalized two-stage integration model promoting location-dependent integration within dendritic subunits.}, author = {Biane, Celia and Rückerl, Florian and Abrahamsson, Therese and Saint-Cloment, Cécile and Mariani, Jean and Shigemoto, Ryuichi and Digregorio, David A. and Sherrard, Rachel M. and Cathala, Laurence}, issn = {2050-084X}, journal = {eLife}, publisher = {eLife Sciences Publications}, title = {{Developmental emergence of two-stage nonlinear synaptic integration in cerebellar interneurons}}, doi = {10.7554/eLife.65954}, volume = {10}, year = {2021}, } @article{10401, abstract = {Theoretical and experimental studies of the interaction between spins and temperature are vital for the development of spin caloritronics, as they dictate the design of future devices. In this work, we propose a two-terminal cold-atom simulator to study that interaction. The proposed quantum simulator consists of strongly interacting atoms that occupy two temperature reservoirs connected by a one-dimensional link. First, we argue that the dynamics in the link can be described using an inhomogeneous Heisenberg spin chain whose couplings are defined by the local temperature. Second, we show the existence of a spin current in a system with a temperature difference by studying the dynamics that follows the spin-flip of an atom in the link. A temperature gradient accelerates the impurity in one direction more than in the other, leading to an overall spin current similar to the spin Seebeck effect.}, author = {Barfknecht, Rafael E. and Foerster, Angela and Zinner, Nikolaj T. and Volosniev, Artem}, issn = {23993650}, journal = {Communications Physics}, number = {1}, publisher = {Springer Nature}, title = {{Generation of spin currents by a temperature gradient in a two-terminal device}}, doi = {10.1038/s42005-021-00753-7}, volume = {4}, year = {2021}, } @article{10404, abstract = {While convolutional neural networks (CNNs) have found wide adoption as state-of-the-art models for image-related tasks, their predictions are often highly sensitive to small input perturbations, which the human vision is robust against. This paper presents Perturber, a web-based application that allows users to instantaneously explore how CNN activations and predictions evolve when a 3D input scene is interactively perturbed. Perturber offers a large variety of scene modifications, such as camera controls, lighting and shading effects, background modifications, object morphing, as well as adversarial attacks, to facilitate the discovery of potential vulnerabilities. Fine-tuned model versions can be directly compared for qualitative evaluation of their robustness. Case studies with machine learning experts have shown that Perturber helps users to quickly generate hypotheses about model vulnerabilities and to qualitatively compare model behavior. Using quantitative analyses, we could replicate users’ insights with other CNN architectures and input images, yielding new insights about the vulnerability of adversarially trained models.}, author = {Sietzen, Stefan and Lechner, Mathias and Borowski, Judy and Hasani, Ramin and Waldner, Manuela}, issn = {1467-8659}, journal = {Computer Graphics Forum}, number = {7}, pages = {253--264}, publisher = {Wiley}, title = {{Interactive analysis of CNN robustness}}, doi = {10.1111/cgf.14418}, volume = {40}, year = {2021}, } @article{10406, abstract = {Multicellular organisms develop complex shapes from much simpler, single-celled zygotes through a process commonly called morphogenesis. Morphogenesis involves an interplay between several factors, ranging from the gene regulatory networks determining cell fate and differentiation to the mechanical processes underlying cell and tissue shape changes. Thus, the study of morphogenesis has historically been based on multidisciplinary approaches at the interface of biology with physics and mathematics. Recent technological advances have further improved our ability to study morphogenesis by bridging the gap between the genetic and biophysical factors through the development of new tools for visualizing, analyzing, and perturbing these factors and their biochemical intermediaries. Here, we review how a combination of genetic, microscopic, biophysical, and biochemical approaches has aided our attempts to understand morphogenesis and discuss potential approaches that may be beneficial to such an inquiry in the future.}, author = {Mishra, Nikhil and Heisenberg, Carl-Philipp J}, issn = {1545-2948}, journal = {Annual Review of Genetics}, keywords = {morphogenesis, forward genetics, high-resolution microscopy, biophysics, biochemistry, patterning}, pages = {209--233}, publisher = {Annual Reviews}, title = {{Dissecting organismal morphogenesis by bridging genetics and biophysics}}, doi = {10.1146/annurev-genet-071819-103748}, volume = {55}, year = {2021}, } @misc{13058, abstract = {The zip file includes source data used in the main text of the manuscript "Theory of branching morphogenesis by local interactions and global guidance", as well as a representative Jupyter notebook to reproduce the main figures. A sample script for the simulations of branching and annihilating random walks is also included (Sample_script_for_simulations_of_BARWs.ipynb) to generate exemplary branched networks under external guidance. A detailed description of the simulation setup is provided in the supplementary information of the manuscipt.}, author = {Ucar, Mehmet C}, publisher = {Zenodo}, title = {{Source data for the manuscript "Theory of branching morphogenesis by local interactions and global guidance"}}, doi = {10.5281/ZENODO.5257160}, year = {2021}, } @inproceedings{10408, abstract = {Key trees are often the best solution in terms of transmission cost and storage requirements for managing keys in a setting where a group needs to share a secret key, while being able to efficiently rotate the key material of users (in order to recover from a potential compromise, or to add or remove users). Applications include multicast encryption protocols like LKH (Logical Key Hierarchies) or group messaging like the current IETF proposal TreeKEM. A key tree is a (typically balanced) binary tree, where each node is identified with a key: leaf nodes hold users’ secret keys while the root is the shared group key. For a group of size N, each user just holds log(N) keys (the keys on the path from its leaf to the root) and its entire key material can be rotated by broadcasting 2log(N) ciphertexts (encrypting each fresh key on the path under the keys of its parents). In this work we consider the natural setting where we have many groups with partially overlapping sets of users, and ask if we can find solutions where the cost of rotating a key is better than in the trivial one where we have a separate key tree for each group. We show that in an asymptotic setting (where the number m of groups is fixed while the number N of users grows) there exist more general key graphs whose cost converges to the cost of a single group, thus saving a factor linear in the number of groups over the trivial solution. As our asymptotic “solution” converges very slowly and performs poorly on concrete examples, we propose an algorithm that uses a natural heuristic to compute a key graph for any given group structure. Our algorithm combines two greedy algorithms, and is thus very efficient: it first converts the group structure into a “lattice graph”, which is then turned into a key graph by repeatedly applying the algorithm for constructing a Huffman code. To better understand how far our proposal is from an optimal solution, we prove lower bounds on the update cost of continuous group-key agreement and multicast encryption in a symbolic model admitting (asymmetric) encryption, pseudorandom generators, and secret sharing as building blocks.}, author = {Alwen, Joel F and Auerbach, Benedikt and Baig, Mirza Ahad and Cueto Noval, Miguel and Klein, Karen and Pascual Perez, Guillermo and Pietrzak, Krzysztof Z and Walter, Michael}, booktitle = {19th International Conference}, isbn = {9-783-0309-0455-5}, issn = {1611-3349}, location = {Raleigh, NC, United States}, pages = {222--253}, publisher = {Springer Nature}, title = {{Grafting key trees: Efficient key management for overlapping groups}}, doi = {10.1007/978-3-030-90456-2_8}, volume = {13044}, year = {2021}, } @article{10527, abstract = {We show that in a two-dimensional electron gas with an annular Fermi surface, long-range Coulomb interactions can lead to unconventional superconductivity by the Kohn-Luttinger mechanism. Superconductivity is strongly enhanced when the inner and outer Fermi surfaces are close to each other. The most prevalent state has chiral p-wave symmetry, but d-wave and extended s-wave pairing are also possible. We discuss these results in the context of rhombohedral trilayer graphene, where superconductivity was recently discovered in regimes where the normal state has an annular Fermi surface. Using realistic parameters, our mechanism can account for the order of magnitude of Tc, as well as its trends as a function of electron density and perpendicular displacement field. Moreover, it naturally explains some of the outstanding puzzles in this material, that include the weak temperature dependence of the resistivity above Tc, and the proximity of spin singlet superconductivity to the ferromagnetic phase.}, author = {Ghazaryan, Areg and Holder, Tobias and Serbyn, Maksym and Berg, Erez}, issn = {1079-7114}, journal = {Physical Review Letters}, keywords = {general physics and astronomy}, number = {24}, publisher = {American Physical Society}, title = {{Unconventional superconductivity in systems with annular Fermi surfaces: Application to rhombohedral trilayer graphene}}, doi = {10.1103/physrevlett.127.247001}, volume = {127}, year = {2021}, } @article{10534, abstract = {For many years, fullerene derivatives have been the main n-type material of organic electronics and optoelectronics. Recently, fullerene derivatives functionalized with ethylene glycol (EG) side chains have been showing important properties such as enhanced dielectric constants, facile doping and enhanced self-assembly capabilities. Here, we have prepared field-effect transistors using a series of these fullerene derivatives equipped with EG side chains of different lengths. Transport data show the beneficial effect of increasing the EG side chain. In order to understand the material properties, full structural determination of these fullerene derivatives has been achieved by coupling the X-ray data with molecular dynamics (MD) simulations. The increase in transport properties is paired with the formation of extended layered structures, efficient molecular packing and an increase in the crystallite alignment. The layer-like structure is composed of conducting layers, containing of closely packed C60 balls approaching the inter-distance of 1 nm, that are separated by well-defined EG layers, where the EG chains are rather splayed with the chain direction almost perpendicular to the layer normal. Such a layered structure appears highly ordered and highly aligned with the C60 planes oriented parallel to the substrate in the thin film configuration. The order inside the thin film increases with the EG chain length, allowing the systems to achieve mobilities as high as 0.053 cm2 V−1 s−1. Our work elucidates the structure of these interesting semiconducting organic molecules and shows that the synergistic use of X-ray structural analysis and MD simulations is a powerful tool to identify the structure of thin organic films for optoelectronic applications.}, author = {Dong, Jingjin and Sami, Selim and Balazs, Daniel and Alessandri, Riccardo and Jahani, Fatimeh and Qiu, Li and Marrink, Siewert J. and Havenith, Remco W.A. and Hummelen, Jan C. and Loi, Maria A. and Portale, Giuseppe}, issn = {2050-7526}, journal = {Journal of Materials Chemistry C}, number = {45}, pages = {16217--16225}, publisher = {Royal Society of Chemistry}, title = {{Fullerene derivatives with oligoethylene-glycol side chains: An investigation on the origin of their outstanding transport properties}}, doi = {10.1039/d1tc02753k}, volume = {9}, year = {2021}, } @article{10533, abstract = {Flowering plants utilize small RNA molecules to guide DNA methyltransferases to genomic sequences. This RNA-directed DNA methylation (RdDM) pathway preferentially targets euchromatic transposable elements. However, RdDM is thought to be recruited by methylation of histone H3 at lysine 9 (H3K9me), a hallmark of heterochromatin. How RdDM is targeted to euchromatin despite an affinity for H3K9me is unclear. Here we show that loss of histone H1 enhances heterochromatic RdDM, preferentially at nucleosome linker DNA. Surprisingly, this does not require SHH1, the RdDM component that binds H3K9me. Furthermore, H3K9me is dispensable for RdDM, as is CG DNA methylation. Instead, we find that non-CG methylation is specifically associated with small RNA biogenesis, and without H1 small RNA production quantitatively expands to non-CG methylated loci. Our results demonstrate that H1 enforces the separation of euchromatic and heterochromatic DNA methylation pathways by excluding the small RNA-generating branch of RdDM from non-CG methylated heterochromatin.}, author = {Choi, Jaemyung and Lyons, David B and Zilberman, Daniel}, issn = {2050-084X}, journal = {eLife}, keywords = {genetics and molecular biology}, publisher = {eLife Sciences Publications}, title = {{Histone H1 prevents non-CG methylation-mediated small RNA biogenesis in Arabidopsis heterochromatin}}, doi = {10.7554/elife.72676}, volume = {10}, year = {2021}, } @article{10536, abstract = {TGFβ overexpression is commonly detected in cancer patients and correlates with poor prognosis and metastasis. Cancer progression is often associated with an enhanced recruitment of myeloid-derived cells to the tumor microenvironment. Here we show that functional TGFβ-signaling in myeloid cells is required for metastasis to the lungs and the liver. Myeloid-specific deletion of Tgfbr2 resulted in reduced spontaneous lung metastasis, which was associated with a reduction of proinflammatory cytokines in the metastatic microenvironment. Notably, CD8+ T cell depletion in myeloid-specific Tgfbr2-deficient mice rescued lung metastasis. Myeloid-specific Tgfbr2-deficiency resulted in reduced liver metastasis with an almost complete absence of myeloid cells within metastatic foci. On contrary, an accumulation of Tgfβ-responsive myeloid cells was associated with an increased recruitment of monocytes and granulocytes and higher proinflammatory cytokine levels in control mice. Monocytic cells isolated from metastatic livers of Tgfbr2-deficient mice showed increased polarization towards the M1 phenotype, Tnfα and Il-1β expression, reduced levels of M2 markers and reduced production of chemokines responsible for myeloid-cell recruitment. No significant differences in Tgfβ levels were observed at metastatic sites of any model. These data demonstrate that Tgfβ signaling in monocytic myeloid cells suppresses CD8+ T cell activity during lung metastasis, while these cells actively contribute to tumor growth during liver metastasis. Thus, myeloid cells modulate metastasis through different mechanisms in a tissue-specific manner.}, author = {Stefanescu, Cristina and Van Gogh, Merel and Roblek, Marko and Heikenwalder, Mathias and Borsig, Lubor}, issn = {2234-943X}, journal = {Frontiers in Oncology}, publisher = {Frontiers}, title = {{TGFβ signaling in myeloid cells promotes lung and liver metastasis through different mechanisms}}, doi = {10.3389/fonc.2021.765151}, volume = {11}, year = {2021}, } @article{10537, abstract = {We consider the quantum many-body evolution of a homogeneous Fermi gas in three dimensions in the coupled semiclassical and mean-field scaling regime. We study a class of initial data describing collective particle–hole pair excitations on the Fermi ball. Using a rigorous version of approximate bosonization, we prove that the many-body evolution can be approximated in Fock space norm by a quasi-free bosonic evolution of the collective particle–hole excitations.}, author = {Benedikter, Niels P and Nam, Phan Thành and Porta, Marcello and Schlein, Benjamin and Seiringer, Robert}, issn = {1424-0637}, journal = {Annales Henri Poincaré}, publisher = {Springer Nature}, title = {{Bosonization of fermionic many-body dynamics}}, doi = {10.1007/s00023-021-01136-y}, year = {2021}, } @article{10549, abstract = {We derive optimal-order homogenization rates for random nonlinear elliptic PDEs with monotone nonlinearity in the uniformly elliptic case. More precisely, for a random monotone operator on \mathbb {R}^d with stationary law (that is spatially homogeneous statistics) and fast decay of correlations on scales larger than the microscale \varepsilon >0, we establish homogenization error estimates of the order \varepsilon in case d\geqq 3, and of the order \varepsilon |\log \varepsilon |^{1/2} in case d=2. Previous results in nonlinear stochastic homogenization have been limited to a small algebraic rate of convergence \varepsilon ^\delta . We also establish error estimates for the approximation of the homogenized operator by the method of representative volumes of the order (L/\varepsilon )^{-d/2} for a representative volume of size L. Our results also hold in the case of systems for which a (small-scale) C^{1,\alpha } regularity theory is available.}, author = {Fischer, Julian L and Neukamm, Stefan}, issn = {1432-0673}, journal = {Archive for Rational Mechanics and Analysis}, keywords = {Mechanical Engineering, Mathematics (miscellaneous), Analysis}, number = {1}, pages = {343--452}, publisher = {Springer Nature}, title = {{Optimal homogenization rates in stochastic homogenization of nonlinear uniformly elliptic equations and systems}}, doi = {10.1007/s00205-021-01686-9}, volume = {242}, year = {2021}, } @inproceedings{10409, abstract = {We show that Yao’s garbling scheme is adaptively indistinguishable for the class of Boolean circuits of size S and treewidth w with only a SO(w) loss in security. For instance, circuits with constant treewidth are as a result adaptively indistinguishable with only a polynomial loss. This (partially) complements a negative result of Applebaum et al. (Crypto 2013), which showed (assuming one-way functions) that Yao’s garbling scheme cannot be adaptively simulatable. As main technical contributions, we introduce a new pebble game that abstracts out our security reduction and then present a pebbling strategy for this game where the number of pebbles used is roughly O(δwlog(S)) , δ being the fan-out of the circuit. The design of the strategy relies on separators, a graph-theoretic notion with connections to circuit complexity. with only a SO(w) loss in security. For instance, circuits with constant treewidth are as a result adaptively indistinguishable with only a polynomial loss. This (partially) complements a negative result of Applebaum et al. (Crypto 2013), which showed (assuming one-way functions) that Yao’s garbling scheme cannot be adaptively simulatable. As main technical contributions, we introduce a new pebble game that abstracts out our security reduction and then present a pebbling strategy for this game where the number of pebbles used is roughly O(δwlog(S)) , δ being the fan-out of the circuit. The design of the strategy relies on separators, a graph-theoretic notion with connections to circuit complexity.}, author = {Kamath Hosdurg, Chethan and Klein, Karen and Pietrzak, Krzysztof Z}, booktitle = {19th International Conference}, isbn = {9-783-0309-0452-4}, issn = {1611-3349}, location = {Raleigh, NC, United States}, pages = {486--517}, publisher = {Springer Nature}, title = {{On treewidth, separators and Yao’s garbling}}, doi = {10.1007/978-3-030-90453-1_17}, volume = {13043 }, year = {2021}, } @article{10545, abstract = {Classical models with complex energy landscapes represent a perspective avenue for the near-term application of quantum simulators. Until now, many theoretical works studied the performance of quantum algorithms for models with a unique ground state. However, when the classical problem is in a so-called clustering phase, the ground state manifold is highly degenerate. As an example, we consider a 3-XORSAT model defined on simple hypergraphs. The degeneracy of classical ground state manifold translates into the emergence of an extensive number of Z2 symmetries, which remain intact even in the presence of a quantum transverse magnetic field. We establish a general duality approach that restricts the quantum problem to a given sector of conserved Z2 charges and use it to study how the outcome of the quantum adiabatic algorithm depends on the hypergraph geometry. We show that the tree hypergraph which corresponds to a classically solvable instance of the 3-XORSAT problem features a constant gap, whereas the closed hypergraph encounters a second-order phase transition with a gap vanishing as a power-law in the problem size. The duality developed in this work provides a practical tool for studies of quantum models with classically degenerate energy manifold and reveals potential connections between glasses and gauge theories.}, author = {Medina Ramos, Raimel A and Serbyn, Maksym}, issn = {2469-9934}, journal = {Physical Review A}, number = {6}, publisher = {American Physical Society}, title = {{Duality approach to quantum annealing of the 3-variable exclusive-or satisfiability problem (3-XORSAT)}}, doi = {10.1103/physreva.104.062423}, volume = {104}, year = {2021}, } @inproceedings{10554, abstract = {We present DAG-Rider, the first asynchronous Byzantine Atomic Broadcast protocol that achieves optimal resilience, optimal amortized communication complexity, and optimal time complexity. DAG-Rider is post-quantum safe and ensures that all values proposed by correct processes eventually get delivered. We construct DAG-Rider in two layers: In the first layer, processes reliably broadcast their proposals and build a structured Directed Acyclic Graph (DAG) of the communication among them. In the second layer, processes locally observe their DAGs and totally order all proposals with no extra communication.}, author = {Keidar, Idit and Kokoris Kogias, Eleftherios and Naor, Oded and Spiegelman, Alexander}, booktitle = {Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing}, isbn = {978-1-4503-8548-0}, location = {Virtual, Italy}, pages = {165--175}, publisher = {Association for Computing Machinery}, title = {{All You Need is DAG}}, doi = {10.1145/3465084.3467905}, year = {2021}, } @article{10568, abstract = {Genetic adaptation and phenotypic plasticity facilitate the migration into new habitats and enable organisms to cope with a rapidly changing environment. In contrast to genetic adaptation that spans multiple generations as an evolutionary process, phenotypic plasticity allows acclimation within the life-time of an organism. Genetic adaptation and phenotypic plasticity are usually studied in isolation, however, only by including their interactive impact, we can understand acclimation and adaptation in nature. We aimed to explore the contribution of adaptation and plasticity in coping with an abiotic (salinity) and a biotic (Vibrio bacteria) stressor using six different populations of the broad-nosed pipefish Syngnathus typhle that originated from either high [14–17 Practical Salinity Unit (PSU)] or low (7–11 PSU) saline environments along the German coastline of the Baltic Sea. We exposed wild caught animals, to either high (15 PSU) or low (7 PSU) salinity, representing native and novel salinity conditions and allowed animals to mate. After male pregnancy, offspring was split and each half was exposed to one of the two salinities and infected with Vibrio alginolyticus bacteria that were evolved at either of the two salinities in a fully reciprocal design. We investigated life-history traits of fathers and expression of 47 target genes in mothers and offspring. Pregnant males originating from high salinity exposed to low salinity were highly susceptible to opportunistic fungi infections resulting in decreased offspring size and number. In contrast, no signs of fungal infection were identified in fathers originating from low saline conditions suggesting that genetic adaptation has the potential to overcome the challenges encountered at low salinity. Offspring from parents with low saline origin survived better at low salinity suggesting genetic adaptation to low salinity. In addition, gene expression analyses of juveniles indicated patterns of local adaptation, trans-generational plasticity and developmental plasticity. In conclusion, our study suggests that pipefish are locally adapted to the low salinity in their environment, however, they are retaining phenotypic plasticity, which allows them to also cope with ancestral salinity levels and prevailing pathogens.}, author = {Goehlich, Henry and Sartoris, Linda and Wagner, Kim-Sara and Wendling, Carolin C. and Roth, Olivia}, issn = {2296-701X}, journal = {Frontiers in Ecology and Evolution}, keywords = {ecology, evolution, behavior and systematics, trans-generational plasticity, genetic adaptation, local adaptation, phenotypic plasticity, Baltic Sea, climate change, salinity, syngnathids}, publisher = {Frontiers Media}, title = {{Pipefish locally adapted to low salinity in the Baltic Sea retain phenotypic plasticity to cope with ancestral salinity levels}}, doi = {10.3389/fevo.2021.626442}, volume = {9}, year = {2021}, } @article{10586, abstract = {A facile approach for developing an interfacial solar evaporator by heat localization of solar-thermal energy conversion at water-air liquid composed by in-situ polymerization of Fe2O3 nanoparticles (Fe2O3@PPy) deposited over a facial sponge is proposed. The demonstrated system consists of a floating solar receiver having a vertically cross-linked microchannel for wicking up saline water. The in situ polymerized Fe2O3@PPy interfacial layer promotes diffuse reflection and its rough black surface allows Omni-directional solar absorption (94%) and facilitates efficient thermal localization at the water/air interface and offers a defect-rich surface to promote heat localization (41.9 °C) and excellent thermal management due to cellulosic content. The self-floating composite foam reveals continuous vapors generation at a rate of 1.52 kg m−2 h−1 under one 1 kW m−2 and profound evaporating efficiency (95%) without heat losses that dissipates in its surroundings. Indeed, long-term evaporation experiments reveal the negligible disparity in continuous evaporation rate (33.84 kg m−2/8.3 h) receiving two sun solar intensity, and ensures the stability of the device under intense seawater conditions synchronized with excellent salt rejection potential. More importantly, Raman spectroscopy investigation validates the orange dye rejection via Fe2O3@PPy solar evaporator. The combined advantages of high efficiency, self-floating capability, multimedia rejection, low cost, and this configuration are promising for producing large-scale solar steam generating systems appropriate for commercial clean water yield due to their scalable fabrication.}, author = {Lu, Yuzheng and Arshad, Naila and Irshad, Muhammad Sultan and Ahmed, Iftikhar and Ahmad, Shafiq and Alshahrani, Lina Abdullah and Yousaf, Muhammad and Sayed, Abdelaty Edrees and Nauman, Muhammad}, issn = {2073-4352}, journal = {Crystals}, number = {12}, publisher = {MDPI}, title = {{Fe2O3 nanoparticles deposited over self-floating facial sponge for facile interfacial seawater solar desalination}}, doi = {10.3390/cryst11121509}, volume = {11}, year = {2021}, } @article{10569, abstract = {For animals to survive until reproduction, it is crucial that juveniles successfully detect potential predators and respond with appropriate behavior. The recognition of cues originating from predators can be innate or learned. Cues of various modalities might be used alone or in multi-modal combinations to detect and distinguish predators but studies investigating multi-modal integration in predator avoidance are scarce. Here, we used wild, naive tadpoles of the Neotropical poison frog Allobates femoralis ( Boulenger, 1884) to test their reaction to cues with two modalities from two different sympatrically occurring potential predators: heterospecific predatory Dendrobates tinctorius tadpoles and dragonfly larvae. We presented A. femoralis tadpoles with olfactory or visual cues, or a combination of the two, and compared their reaction to a water control in a between-individual design. In our trials, A. femoralis tadpoles reacted to multi-modal stimuli (a combination of visual and chemical information) originating from dragonfly larvae with avoidance but showed no reaction to uni-modal cues or cues from heterospecific tadpoles. In addition, visual cues from conspecifics increased swimming activity while cues from predators had no effect on tadpole activity. Our results show that A. femoralis tadpoles can innately recognize some predators and probably need both visual and chemical information to effectively avoid them. This is the first study looking at anti-predator behavior in poison frog tadpoles. We discuss how parental care might influence the expression of predator avoidance responses in tadpoles.}, author = {Szabo, B and Mangione, R and Rath, M and Pašukonis, A and Reber, SA and Oh, Jinook and Ringler, M and Ringler, E}, issn = {1477-9145}, journal = {Journal of Experimental Biology}, number = {24}, publisher = {The Company of Biologists}, title = {{Naïve poison frog tadpoles use bi-modal cues to avoid insect predators but not heterospecific predatory tadpoles}}, doi = {10.1242/jeb.243647}, volume = {224}, year = {2021}, } @article{10575, abstract = {The choice of the boundary conditions in mechanical problems has to reflect the interaction of the considered material with the surface. Still the assumption of the no-slip condition is preferred in order to avoid boundary terms in the analysis and slipping effects are usually overlooked. Besides the “static slip models”, there are phenomena that are not accurately described by them, e.g. at the moment when the slip changes rapidly, the wall shear stress and the slip can exhibit a sudden overshoot and subsequent relaxation. When these effects become significant, the so-called dynamic slip phenomenon occurs. We develop a mathematical analysis of Navier–Stokes-like problems with a dynamic slip boundary condition, which requires a proper generalization of the Gelfand triplet and the corresponding function space setting.}, author = {Abbatiello, Anna and Bulíček, Miroslav and Maringová, Erika}, issn = {1793-6314}, journal = {Mathematical Models and Methods in Applied Sciences}, number = {11}, pages = {2165--2212}, publisher = {World Scientific Publishing}, title = {{On the dynamic slip boundary condition for Navier-Stokes-like problems}}, doi = {10.1142/S0218202521500470}, volume = {31}, year = {2021}, } @article{10574, abstract = {The understanding of material appearance perception is a complex problem due to interactions between material reflectance, surface geometry, and illumination. Recently, Serrano et al. collected the largest dataset to date with subjective ratings of material appearance attributes, including glossiness, metallicness, sharpness and contrast of reflections. In this work, we make use of their dataset to investigate for the first time the impact of the interactions between illumination, geometry, and eight different material categories in perceived appearance attributes. After an initial analysis, we select for further analysis the four material categories that cover the largest range for all perceptual attributes: fabric, plastic, ceramic, and metal. Using a cumulative link mixed model (CLMM) for robust regression, we discover interactions between these material categories and four representative illuminations and object geometries. We believe that our findings contribute to expanding the knowledge on material appearance perception and can be useful for many applications, such as scene design, where any particular material in a given shape can be aligned with dominant classes of illumination, so that a desired strength of appearance attributes can be achieved.}, author = {Chen, Bin and Wang, Chao and Piovarci, Michael and Seidel, Hans Peter and Didyk, Piotr and Myszkowski, Karol and Serrano, Ana}, issn = {1432-2315}, journal = {Visual Computer}, number = {12}, pages = {2975--2987}, publisher = {Springer Nature}, title = {{The effect of geometry and illumination on appearance perception of different material categories}}, doi = {10.1007/s00371-021-02227-x}, volume = {37}, year = {2021}, } @article{10573, abstract = {How tissues acquire complex shapes is a fundamental question in biology and regenerative medicine. Zebrafish semicircular canals form from invaginations in the otic epithelium (buds) that extend and fuse to form the hubs of each canal. We find that conventional actomyosin-driven behaviors are not required. Instead, local secretion of hyaluronan, made by the enzymes uridine 5′-diphosphate dehydrogenase (ugdh) and hyaluronan synthase 3 (has3), drives canal morphogenesis. Charged hyaluronate polymers osmotically swell with water and generate isotropic extracellular pressure to deform the overlying epithelium into buds. The mechanical anisotropy needed to shape buds into tubes is conferred by a polarized distribution of actomyosin and E-cadherin-rich membrane tethers, which we term cytocinches. Most work on tissue morphogenesis ascribes actomyosin contractility as the driving force, while the extracellular matrix shapes tissues through differential stiffness. Our work inverts this expectation. Hyaluronate pressure shaped by anisotropic tissue stiffness may be a widespread mechanism for powering morphological change in organogenesis and tissue engineering.}, author = {Munjal, Akankshi and Hannezo, Edouard B and Tsai, Tony Y.C. and Mitchison, Timothy J. and Megason, Sean G.}, issn = {1097-4172}, journal = {Cell}, number = {26}, pages = {6313--6325.e18}, publisher = {Elsevier ; Cell Press}, title = {{Extracellular hyaluronate pressure shaped by cellular tethers drives tissue morphogenesis}}, doi = {10.1016/j.cell.2021.11.025}, volume = {184}, year = {2021}, } @article{10674, abstract = {In two-player games on graphs, the players move a token through a graph to produce an infinite path, which determines the winner of the game. Such games are central in formal methods since they model the interaction between a non-terminating system and its environment. In bidding games the players bid for the right to move the token: in each round, the players simultaneously submit bids, and the higher bidder moves the token and pays the other player. Bidding games are known to have a clean and elegant mathematical structure that relies on the ability of the players to submit arbitrarily small bids. Many applications, however, require a fixed granularity for the bids, which can represent, for example, the monetary value expressed in cents. We study, for the first time, the combination of discrete-bidding and infinite-duration games. Our most important result proves that these games form a large determined subclass of concurrent games, where determinacy is the strong property that there always exists exactly one player who can guarantee winning the game. In particular, we show that, in contrast to non-discrete bidding games, the mechanism with which tied bids are resolved plays an important role in discrete-bidding games. We study several natural tie-breaking mechanisms and show that, while some do not admit determinacy, most natural mechanisms imply determinacy for every pair of initial budgets.}, author = {Aghajohari, Milad and Avni, Guy and Henzinger, Thomas A}, issn = {1860-5974}, journal = {Logical Methods in Computer Science}, keywords = {computer science, computer science and game theory, logic in computer science}, number = {1}, pages = {10:1--10:23}, publisher = {International Federation for Computational Logic}, title = {{Determinacy in discrete-bidding infinite-duration games}}, doi = {10.23638/LMCS-17(1:10)2021}, volume = {17}, year = {2021}, } @inproceedings{10609, abstract = {We study Multi-party computation (MPC) in the setting of subversion, where the adversary tampers with the machines of honest parties. Our goal is to construct actively secure MPC protocols where parties are corrupted adaptively by an adversary (as in the standard adaptive security setting), and in addition, honest parties’ machines are compromised. The idea of reverse firewalls (RF) was introduced at EUROCRYPT’15 by Mironov and Stephens-Davidowitz as an approach to protecting protocols against corruption of honest parties’ devices. Intuitively, an RF for a party P is an external entity that sits between P and the outside world and whose scope is to sanitize P ’s incoming and outgoing messages in the face of subversion of their computer. Mironov and Stephens-Davidowitz constructed a protocol for passively-secure two-party computation. At CRYPTO’20, Chakraborty, Dziembowski and Nielsen constructed a protocol for secure computation with firewalls that improved on this result, both by extending it to multi-party computation protocol, and considering active security in the presence of static corruptions. In this paper, we initiate the study of RF for MPC in the adaptive setting. We put forward a definition for adaptively secure MPC in the reverse firewall setting, explore relationships among the security notions, and then construct reverse firewalls for MPC in this stronger setting of adaptive security. We also resolve the open question of Chakraborty, Dziembowski and Nielsen by removing the need for a trusted setup in constructing RF for MPC. Towards this end, we construct reverse firewalls for adaptively secure augmented coin tossing and adaptively secure zero-knowledge protocols and obtain a constant round adaptively secure MPC protocol in the reverse firewall setting without setup. Along the way, we propose a new multi-party adaptively secure coin tossing protocol in the plain model, that is of independent interest.}, author = {Chakraborty, Suvradip and Ganesh, Chaya and Pancholi, Mahak and Sarkar, Pratik}, booktitle = {27th International Conference on the Theory and Application of Cryptology and Information Security}, isbn = {978-3-030-92074-6}, issn = {1611-3349}, location = {Virtual, Singapore}, pages = {335--364}, publisher = {Springer Nature}, title = {{Reverse firewalls for adaptively secure MPC without setup}}, doi = {10.1007/978-3-030-92075-3_12}, volume = {13091}, year = {2021}, } @article{10606, abstract = {Cell division orientation is thought to result from a competition between cell geometry and polarity domains controlling the position of the mitotic spindle during mitosis. Depending on the level of cell shape anisotropy or the strength of the polarity domain, one dominates the other and determines the orientation of the spindle. Whether and how such competition is also at work to determine unequal cell division (UCD), producing daughter cells of different size, remains unclear. Here, we show that cell geometry and polarity domains cooperate, rather than compete, in positioning the cleavage plane during UCDs in early ascidian embryos. We found that the UCDs and their orientation at the ascidian third cleavage rely on the spindle tilting in an anisotropic cell shape, and cortical polarity domains exerting different effects on spindle astral microtubules. By systematically varying mitotic cell shape, we could modulate the effect of attractive and repulsive polarity domains and consequently generate predicted daughter cell size asymmetries and position. We therefore propose that the spindle position during UCD is set by the combined activities of cell geometry and polarity domains, where cell geometry modulates the effect of cortical polarity domain(s).}, author = {Godard, Benoit G and Dumollard, Remi and Heisenberg, Carl-Philipp J and Mcdougall, Alex}, issn = {2050-084X}, journal = {eLife}, publisher = {eLife Sciences Publications}, title = {{Combined effect of cell geometry and polarity domains determines the orientation of unequal division}}, doi = {10.7554/eLife.75639}, volume = {10}, year = {2021}, } @article{10607, abstract = {The evidence linking innate immunity mechanisms and neurodegenerative diseases is growing, but the specific mechanisms are incompletely understood. Experimental data suggest that microglial TLR4 mediates the uptake and clearance of α-synuclein also termed synucleinophagy. The accumulation of misfolded α-synuclein throughout the brain is central to Parkinson's disease (PD). The distribution and progression of the pathology is often attributed to the propagation of α-synuclein. Here, we apply a classical α-synuclein propagation model of prodromal PD in wild type and TLR4 deficient mice to study the role of TLR4 in the progression of the disease. Our data suggest that TLR4 deficiency facilitates the α-synuclein seed spreading associated with reduced lysosomal activity of microglia. Three months after seed inoculation, more pronounced proteinase K-resistant α-synuclein inclusion pathology is observed in mice with TLR4 deficiency. The facilitated propagation of α-synuclein is associated with early loss of dopamine transporter (DAT) signal in the striatum and loss of dopaminergic neurons in substantia nigra pars compacta of TLR4 deficient mice. These new results support TLR4 signaling as a putative target for disease modification to slow the progression of PD and related disorders.}, author = {Venezia, Serena and Kaufmann, Walter and Wenning, Gregor K. and Stefanova, Nadia}, issn = {1873-5126}, journal = {Parkinsonism & Related Disorders}, pages = {59--65}, publisher = {Elsevier}, title = {{Toll-like receptor 4 deficiency facilitates α-synuclein propagation and neurodegeneration in a mouse model of prodromal Parkinson's disease}}, doi = {10.1016/j.parkreldis.2021.09.007}, volume = {91}, year = {2021}, } @article{10628, abstract = {The surface states of 3D topological insulators in general have negligible quantum oscillations (QOs) when the chemical potential is tuned to the Dirac points. In contrast, we find that topological Kondo insulators (TKIs) can support surface states with an arbitrarily large Fermi surface (FS) when the chemical potential is pinned to the Dirac point. We illustrate that these FSs give rise to finite-frequency QOs, which can become comparable to the extremal area of the unhybridized bulk bands. We show that this occurs when the crystal symmetry is lowered from cubic to tetragonal in a minimal two-orbital model. We label such surface modes as 'shadow surface states'. Moreover, we show that the sufficient next-nearest neighbor out-of-plane hybridization leading to shadow surface states can be self-consistently stabilized for tetragonal TKIs. Consequently, shadow surface states provide an important example of high-frequency QOs beyond the context of cubic TKIs.}, author = {Ghazaryan, Areg and Nica, Emilian M. and Erten, Onur and Ghaemi, Pouyan}, issn = {1367-2630}, journal = {New Journal of Physics}, number = {12}, publisher = {IOP Publishing}, title = {{Shadow surface states in topological Kondo insulators}}, doi = {10.1088/1367-2630/ac4124}, volume = {23}, year = {2021}, } @article{10631, abstract = {We combine experimental and theoretical approaches to explore excited rotational states of molecules embedded in helium nanodroplets using CS2 and I2 as examples. Laser-induced nonadiabatic molecular alignment is employed to measure spectral lines for rotational states extending beyond those initially populated at the 0.37 K droplet temperature. We construct a simple quantum-mechanical model, based on a linear rotor coupled to a single-mode bosonic bath, to determine the rotational energy structure in its entirety. The calculated and measured spectral lines are in good agreement. We show that the effect of the surrounding superfluid on molecular rotation can be rationalized by a single quantity, the angular momentum, transferred from the molecule to the droplet.}, author = {Cherepanov, Igor and Bighin, Giacomo and Schouder, Constant A. and Chatterley, Adam S. and Albrechtsen, Simon H. and Muñoz, Alberto Viñas and Christiansen, Lars and Stapelfeldt, Henrik and Lemeshko, Mikhail}, issn = {2469-9934}, journal = {Physical Review A}, number = {6}, publisher = {American Physical Society}, title = {{Excited rotational states of molecules in a superfluid}}, doi = {10.1103/PhysRevA.104.L061303}, volume = {104}, year = {2021}, } @inproceedings{10597, abstract = {We thank Emmanuel Abbe and Min Ye for providing us the implementation of RPA decoding. D. Fathollahi and M. Mondelli are partially supported by the 2019 Lopez-Loreta Prize. N. Farsad is supported by Discovery Grant from the Natural Sciences and Engineering Research Council of Canada (NSERC) and Canada Foundation for Innovation (CFI), John R. Evans Leader Fund. S. A. Hashemi is supported by a Postdoctoral Fellowship from NSERC.}, author = {Fathollahi, Dorsa and Farsad, Nariman and Hashemi, Seyyed Ali and Mondelli, Marco}, booktitle = {2021 IEEE International Symposium on Information Theory}, isbn = {978-1-5386-8210-4}, location = {Virtual, Melbourne, Australia}, pages = {1082--1087}, publisher = {Institute of Electrical and Electronics Engineers}, title = {{Sparse multi-decoder recursive projection aggregation for Reed-Muller codes}}, doi = {10.1109/isit45174.2021.9517887}, year = {2021}, } @inproceedings{10666, abstract = {Adversarial training is an effective method to train deep learning models that are resilient to norm-bounded perturbations, with the cost of nominal performance drop. While adversarial training appears to enhance the robustness and safety of a deep model deployed in open-world decision-critical applications, counterintuitively, it induces undesired behaviors in robot learning settings. In this paper, we show theoretically and experimentally that neural controllers obtained via adversarial training are subjected to three types of defects, namely transient, systematic, and conditional errors. We first generalize adversarial training to a safety-domain optimization scheme allowing for more generic specifications. We then prove that such a learning process tends to cause certain error profiles. We support our theoretical results by a thorough experimental safety analysis in a robot-learning task. Our results suggest that adversarial training is not yet ready for robot learning.}, author = {Lechner, Mathias and Hasani, Ramin and Grosu, Radu and Rus, Daniela and Henzinger, Thomas A}, booktitle = {2021 IEEE International Conference on Robotics and Automation}, isbn = {978-1-7281-9078-5}, issn = {2577-087X}, location = {Xi'an, China}, pages = {4140--4147}, title = {{Adversarial training is not ready for robot learning}}, doi = {10.1109/ICRA48506.2021.9561036}, year = {2021}, } @article{10711, abstract = {In this paper, we investigate the distribution of the maximum of partial sums of families of m -periodic complex-valued functions satisfying certain conditions. We obtain precise uniform estimates for the distribution function of this maximum in a near-optimal range. Our results apply to partial sums of Kloosterman sums and other families of ℓ -adic trace functions, and are as strong as those obtained by Bober, Goldmakher, Granville and Koukoulopoulos for character sums. In particular, we improve on the recent work of the third author for Birch sums. However, unlike character sums, we are able to construct families of m -periodic complex-valued functions which satisfy our conditions, but for which the Pólya–Vinogradov inequality is sharp.}, author = {Autissier, Pascal and Bonolis, Dante and Lamzouri, Youness}, issn = {1570-5846}, journal = {Compositio Mathematica}, keywords = {Algebra and Number Theory}, number = {7}, pages = {1610--1651}, publisher = {Cambridge University Press}, title = {{The distribution of the maximum of partial sums of Kloosterman sums and other trace functions}}, doi = {10.1112/s0010437x21007351}, volume = {157}, year = {2021}, } @article{10809, abstract = {Thermoelectric materials are engines that convert heat into an electrical current. Intuitively, the efficiency of this process depends on how many electrons (charge carriers) can move and how easily they do so, how much energy those moving electrons transport, and how easily the temperature gradient is maintained. In terms of material properties, an excellent thermoelectric material requires a high electrical conductivity σ, a high Seebeck coefficient S (a measure of the induced thermoelectric voltage as a function of temperature gradient), and a low thermal conductivity κ. The challenge is that these three properties are strongly interrelated in a conflicting manner (1). On page 722 of this issue, Roychowdhury et al. (2) have found a way to partially break these ties in silver antimony telluride (AgSbTe2) with the addition of cadmium (Cd) cations, which increase the ordering in this inherently disordered thermoelectric material.}, author = {Liu, Yu and Ibáñez, Maria}, issn = {1095-9203}, journal = {Science}, keywords = {multidisciplinary}, number = {6530}, pages = {678--679}, publisher = {American Association for the Advancement of Science}, title = {{Tidying up the mess}}, doi = {10.1126/science.abg0886}, volume = {371}, year = {2021}, } @article{10858, abstract = {The cost-effective conversion of low-grade heat into electricity using thermoelectric devices requires developing alternative materials and material processing technologies able to reduce the currently high device manufacturing costs. In this direction, thermoelectric materials that do not rely on rare or toxic elements such as tellurium or lead need to be produced using high-throughput technologies not involving high temperatures and long processes. Bi2Se3 is an obvious possible Te-free alternative to Bi2Te3 for ambient temperature thermoelectric applications, but its performance is still low for practical applications, and additional efforts toward finding proper dopants are required. Here, we report a scalable method to produce Bi2Se3 nanosheets at low synthesis temperatures. We studied the influence of different dopants on the thermoelectric properties of this material. Among the elements tested, we demonstrated that Sn doping resulted in the best performance. Sn incorporation resulted in a significant improvement to the Bi2Se3 Seebeck coefficient and a reduction in the thermal conductivity in the direction of the hot-press axis, resulting in an overall 60% improvement in the thermoelectric figure of merit of Bi2Se3.}, author = {Li, Mengyao and Zhang, Yu and Zhang, Ting and Zuo, Yong and Xiao, Ke and Arbiol, Jordi and Llorca, Jordi and Liu, Yu and Cabot, Andreu}, issn = {2079-4991}, journal = {Nanomaterials}, keywords = {General Materials Science, General Chemical Engineering}, number = {7}, publisher = {MDPI}, title = {{Enhanced thermoelectric performance of n-type Bi2Se3 nanosheets through Sn doping}}, doi = {10.3390/nano11071827}, volume = {11}, year = {2021}, } @article{10834, abstract = {Hematopoietic-specific protein 1 (Hem1) is an essential subunit of the WAVE regulatory complex (WRC) in immune cells. WRC is crucial for Arp2/3 complex activation and the protrusion of branched actin filament networks. Moreover, Hem1 loss of function in immune cells causes autoimmune diseases in humans. Here, we show that genetic removal of Hem1 in macrophages diminishes frequency and efficacy of phagocytosis as well as phagocytic cup formation in addition to defects in lamellipodial protrusion and migration. Moreover, Hem1-null macrophages displayed strong defects in cell adhesion despite unaltered podosome formation and concomitant extracellular matrix degradation. Specifically, dynamics of both adhesion and de-adhesion as well as concomitant phosphorylation of paxillin and focal adhesion kinase (FAK) were significantly compromised. Accordingly, disruption of WRC function in non-hematopoietic cells coincided with both defects in adhesion turnover and altered FAK and paxillin phosphorylation. Consistently, platelets exhibited reduced adhesion and diminished integrin αIIbβ3 activation upon WRC removal. Interestingly, adhesion phenotypes, but not lamellipodia formation, were partially rescued by small molecule activation of FAK. A full rescue of the phenotype, including lamellipodia formation, required not only the presence of WRCs but also their binding to and activation by Rac. Collectively, our results uncover that WRC impacts on integrin-dependent processes in a FAK-dependent manner, controlling formation and dismantling of adhesions, relevant for properly grabbing onto extracellular surfaces and particles during cell edge expansion, like in migration or phagocytosis.}, author = {Stahnke, Stephanie and Döring, Hermann and Kusch, Charly and de Gorter, David J.J. and Dütting, Sebastian and Guledani, Aleks and Pleines, Irina and Schnoor, Michael and Sixt, Michael K and Geffers, Robert and Rohde, Manfred and Müsken, Mathias and Kage, Frieda and Steffen, Anika and Faix, Jan and Nieswandt, Bernhard and Rottner, Klemens and Stradal, Theresia E.B.}, issn = {0960-9822}, journal = {Current Biology}, keywords = {General Agricultural and Biological Sciences, General Biochemistry, Genetics and Molecular Biology}, number = {10}, pages = {2051--2064.e8}, publisher = {Elsevier}, title = {{Loss of Hem1 disrupts macrophage function and impacts migration, phagocytosis, and integrin-mediated adhesion}}, doi = {10.1016/j.cub.2021.02.043}, volume = {31}, year = {2021}, } @inproceedings{9935, abstract = {We present a deterministic O(log log log n)-round low-space Massively Parallel Computation (MPC) algorithm for the classical problem of (Δ+1)-coloring on n-vertex graphs. In this model, every machine has sublinear local space of size n^φ for any arbitrary constant φ \in (0,1). Our algorithm works under the relaxed setting where each machine is allowed to perform exponential local computations, while respecting the n^φ space and bandwidth limitations. Our key technical contribution is a novel derandomization of the ingenious (Δ+1)-coloring local algorithm by Chang-Li-Pettie (STOC 2018, SIAM J. Comput. 2020). The Chang-Li-Pettie algorithm runs in T_local =poly(loglog n) rounds, which sets the state-of-the-art randomized round complexity for the problem in the local model. Our derandomization employs a combination of tools, notably pseudorandom generators (PRG) and bounded-independence hash functions. The achieved round complexity of O(logloglog n) rounds matches the bound of log(T_local ), which currently serves an upper bound barrier for all known randomized algorithms for locally-checkable problems in this model. Furthermore, no deterministic sublogarithmic low-space MPC algorithms for the (Δ+1)-coloring problem have been known before.}, author = {Czumaj, Artur and Davies, Peter and Parter, Merav}, booktitle = {Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing}, isbn = {978-1-4503-8548-0}, location = {Virtual, Italy}, pages = {469–479}, publisher = {Association for Computing Machinery}, title = {{Improved deterministic (Δ+1) coloring in low-space MPC}}, doi = {10.1145/3465084.3467937}, year = {2021}, } @article{10856, abstract = {We study the properties of the maximal volume k-dimensional sections of the n-dimensional cube [−1, 1]n. We obtain a first order necessary condition for a k-dimensional subspace to be a local maximizer of the volume of such sections, which we formulate in a geometric way. We estimate the length of the projection of a vector of the standard basis of Rn onto a k-dimensional subspace that maximizes the volume of the intersection. We nd the optimal upper bound on the volume of a planar section of the cube [−1, 1]n , n ≥ 2.}, author = {Ivanov, Grigory and Tsiutsiurupa, Igor}, issn = {2299-3274}, journal = {Analysis and Geometry in Metric Spaces}, keywords = {Applied Mathematics, Geometry and Topology, Analysis}, number = {1}, pages = {1--18}, publisher = {De Gruyter}, title = {{On the volume of sections of the cube}}, doi = {10.1515/agms-2020-0103}, volume = {9}, year = {2021}, } @inproceedings{9933, abstract = {In this paper, we study the power and limitations of component-stable algorithms in the low-space model of Massively Parallel Computation (MPC). Recently Ghaffari, Kuhn and Uitto (FOCS 2019) introduced the class of component-stable low-space MPC algorithms, which are, informally, defined as algorithms for which the outputs reported by the nodes in different connected components are required to be independent. This very natural notion was introduced to capture most (if not all) of the known efficient MPC algorithms to date, and it was the first general class of MPC algorithms for which one can show non-trivial conditional lower bounds. In this paper we enhance the framework of component-stable algorithms and investigate its effect on the complexity of randomized and deterministic low-space MPC. Our key contributions include: 1) We revise and formalize the lifting approach of Ghaffari, Kuhn and Uitto. This requires a very delicate amendment of the notion of component stability, which allows us to fill in gaps in the earlier arguments. 2) We also extend the framework to obtain conditional lower bounds for deterministic algorithms and fine-grained lower bounds that depend on the maximum degree Δ. 3) We demonstrate a collection of natural graph problems for which non-component-stable algorithms break the conditional lower bound obtained for component-stable algorithms. This implies that, for both deterministic and randomized algorithms, component-stable algorithms are conditionally weaker than the non-component-stable ones. Altogether our results imply that component-stability might limit the computational power of the low-space MPC model, paving the way for improved upper bounds that escape the conditional lower bound setting of Ghaffari, Kuhn, and Uitto.}, author = {Czumaj, Artur and Davies, Peter and Parter, Merav}, booktitle = {Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing}, isbn = {9781450385480}, location = {Virtual, Italy}, pages = {481–491}, publisher = {Association for Computing Machinery}, title = {{Component stability in low-space massively parallel computation}}, doi = {10.1145/3465084.3467903}, year = {2021}, } @article{9627, abstract = {We compute the deficiency spaces of operators of the form 𝐻𝐴⊗̂ 𝐼+𝐼⊗̂ 𝐻𝐵, for symmetric 𝐻𝐴 and self-adjoint 𝐻𝐵. This enables us to construct self-adjoint extensions (if they exist) by means of von Neumann's theory. The structure of the deficiency spaces for this case was asserted already in Ibort et al. [Boundary dynamics driven entanglement, J. Phys. A: Math. Theor. 47(38) (2014) 385301], but only proven under the restriction of 𝐻𝐵 having discrete, non-degenerate spectrum.}, author = {Lenz, Daniel and Weinmann, Timon and Wirth, Melchior}, issn = {1464-3839}, journal = {Proceedings of the Edinburgh Mathematical Society}, number = {3}, pages = {443--447}, publisher = {Cambridge University Press}, title = {{Self-adjoint extensions of bipartite Hamiltonians}}, doi = {10.1017/S0013091521000080}, volume = {64}, year = {2021}, } @article{7901, abstract = {We derive rigorously the leading order of the correlation energy of a Fermi gas in a scaling regime of high density and weak interaction. The result verifies the prediction of the random-phase approximation. Our proof refines the method of collective bosonization in three dimensions. We approximately diagonalize an effective Hamiltonian describing approximately bosonic collective excitations around the Hartree–Fock state, while showing that gapless and non-collective excitations have only a negligible effect on the ground state energy.}, author = {Benedikter, Niels P and Nam, Phan Thành and Porta, Marcello and Schlein, Benjamin and Seiringer, Robert}, issn = {1432-1297}, journal = {Inventiones Mathematicae}, pages = {885--979}, publisher = {Springer}, title = {{Correlation energy of a weakly interacting Fermi gas}}, doi = {10.1007/s00222-021-01041-5}, volume = {225}, year = {2021}, } @article{13456, abstract = {While most simulations of the epoch of reionization have focused on single-stellar populations in star-forming dwarf galaxies, products of binary evolution are expected to significantly contribute to emissions of hydrogen-ionizing photons. Among these products are stripped stars (or helium stars), which have their envelopes stripped from interactions with binary companions, leaving an exposed helium core. Previous work has suggested these stripped stars can dominate the Lyman Continuum (LyC) photon output of high-redshift, low-luminosity galaxies post-starburst. Other sources of hard radiation in the early universe include zero-metallicity Population iii stars, which may have similar spectral energy distribution (SED) properties to galaxies with radiation dominated by stripped-star emissions. Here, we use four metrics (the power-law exponent over wavelength intervals 240–500 Å, 600–900 Å, and 1200–2000 Å, and the ratio of total luminosity in FUV wavelengths to LyC wavelengths) to compare the SEDs of simulated galaxies with only single-stellar evolution, galaxies containing stripped stars, and galaxies containing Population iii stars, with four different initial mass functions (IMFs). We find that stripped stars significantly alter SEDs in the LyC range of galaxies at the epoch of reionization. SEDs in galaxies with stripped stars have lower power-law indices in the LyC range and lower FUV to LyC luminosity ratios. These differences in SEDs are present at all considered luminosities (${M}_{\mathrm{UV}}\gt -15$, AB system), and are most pronounced for lower-luminosity galaxies. Intrinsic SEDs as well as those with interstellar medium absorption of galaxies with stripped stars and Population iii stars are found to be distinct for all tested Population iii IMFs.}, author = {Berzin, Elizabeth and Secunda, Amy and Cen, Renyue and Menegas, Alexander and Götberg, Ylva Louise Linsdotter}, issn = {1538-4357}, journal = {The Astrophysical Journal}, keywords = {Space and Planetary Science, Astronomy and Astrophysics}, number = {1}, publisher = {American Astronomical Society}, title = {{Spectral signatures of population III and envelope-stripped stars in galaxies at the epoch of reionization}}, doi = {10.3847/1538-4357/ac0af6}, volume = {918}, year = {2021}, } @article{13458, abstract = {Most massive stars experience binary interactions in their lifetimes that can alter both the surface and core structure of the stripped star with significant effects on their ultimate fate as core-collapse supernovae. However, core-collapse supernovae simulations to date have focused almost exclusively on the evolution of single stars. We present a systematic simulation study of single and binary-stripped stars with the same initial mass as candidates for core-collapse supernovae (11–21 M⊙). Generally, we find that binary-stripped stars core tend to have a smaller compactness parameter, with a more prominent, deeper silicon/oxygen interface, and explode preferentially to the corresponding single stars of the same initial mass. Such a dichotomy of behavior between these two modes of evolution would have important implications for supernovae statistics, including the final neutron star masses, explosion energies, and nucleosynthetic yields. Binary-stripped remnants are also well poised to populate the possible mass gap between the heaviest neutron stars and the lightest black holes. Our work presents an improvement along two fronts, as we self-consistently account for the pre-collapse stellar evolution and the subsequent explosion outcome. Even so, our results emphasize the need for more detailed stellar evolutionary models to capture the sensitive nature of explosion outcome.}, author = {Vartanyan, David and Laplace, Eva and Renzo, Mathieu and Götberg, Ylva Louise Linsdotter and Burrows, Adam and de Mink, Selma E.}, issn = {2041-8213}, journal = {The Astrophysical Journal Letters}, keywords = {Space and Planetary Science, Astronomy and Astrophysics}, number = {1}, publisher = {American Astronomical Society}, title = {{Binary-stripped stars as core-collapse supernovae progenitors}}, doi = {10.3847/2041-8213/ac0b42}, volume = {916}, year = {2021}, } @article{13459, abstract = {The B emission-line stars are rapid rotators that were probably spun up by mass and angular momentum accretion through mass transfer in an interacting binary. Mass transfer will strip the donor star of its envelope to create a small and hot subdwarf remnant. Here we report on Hubble Space Telescope/STIS far-ultraviolet spectroscopy of a sample of Be stars that reveals the presence of the hot sdO companion through the calculation of cross-correlation functions of the observed and model spectra. We clearly detect the spectral signature of the sdO star in 10 of the 13 stars in the sample, and the spectral signals indicate that the sdO stars are hot, relatively faint, and slowly rotating as predicted by models. A comparison of their temperatures and radii with evolutionary tracks indicates that the sdO stars occupy the relatively long-lived, He-core burning stage. Only 1 of the 10 detections was a known binary prior to this investigation, which emphasizes the difficulty of finding such Be+sdO binaries through optical spectroscopy. However, these results and others indicate that many Be stars probably host hot subdwarf companions.}, author = {Wang, Luqian and Gies, Douglas R. and Peters, Geraldine J. and Götberg, Ylva Louise Linsdotter and Chojnowski, S. Drew and Lester, Kathryn V. and Howell, Steve B.}, issn = {1538-3881}, journal = {The Astronomical Journal}, keywords = {Space and Planetary Science, Astronomy and Astrophysics}, number = {5}, publisher = {American Astronomical Society}, title = {{The detection and characterization of Be+sdO binaries from HST/STIS FUV spectroscopy}}, doi = {10.3847/1538-3881/abf144}, volume = {161}, year = {2021}, } @article{13457, abstract = {Context. Observations of massive stars in open clusters younger than ∼8 Myr have shown that a majority of them are in binary systems, most of which will interact during their life. While these can be used as a proxy of the initial multiplicity properties, studying populations of massive stars older than ∼20 Myr allows us to probe the outcome of these interactions after a significant number of systems have experienced mass and angular momentum transfer and may even have merged. Aims. Using multi-epoch integral-field spectroscopy, we aim to investigate the multiplicity properties of the massive-star population in the dense core of the ∼40 Myr old cluster NGC 330 in the Small Magellanic Cloud in order to search for possible imprints of stellar evolution on the multiplicity properties. Methods. We obtained six epochs of VLT/MUSE observations operated in wide-field mode with the extended wavelength setup and supported by adaptive optics. We extracted spectra and measured radial velocities for stars brighter than mF814W = 19. We identified single-lined spectroscopic binaries through significant RV variability with a peak-to-peak amplitude larger than 20 km s−1. We also identified double-lined spectroscopic binaries, and quantified the observational biases for binary detection. In particular, we took into account that binary systems with similar line strengths are difficult to detect in our data set. Results. The observed spectroscopic binary fraction among stars brighter than mF814W = 19 (approximately 5.5 M⊙ on the main sequence) is fSBobs = 13.2 ± 2.0%. Considering period and mass ratio ranges from log(P) = 0.15−3.5 (about 1.4 to 3160 d), q = 0.1−1.0, and a representative set of orbital parameter distributions, we find a bias-corrected close binary fraction of fcl = 34−7+8%. This fraction seems to decline for the fainter stars, which indicates either that the close binary fraction drops in the B-type domain, or that the period distribution becomes more heavily weighted toward longer orbital periods. We further find that both fractions vary strongly in different regions of the color-magnitude diagram, which corresponds to different evolutionary stages. This probably reveals the imprint of the binary history of different groups of stars. In particular, we find that the observed spectroscopic binary fraction of Be stars (fSBobs = 2 ± 2%) is significantly lower than that of B-type stars (fSBobs = 9 ± 2%). Conclusions. We provide the first homogeneous radial velocity study of a large sample of B-type stars at a low metallicity ([Fe/H] ≲ −1.0). The overall bias-corrected close binary fraction (log(P) < 3.5 d) of the B-star population in NGC 330 is lower than the fraction reported for younger Galactic and Large Magellanic Cloud clusters in previous works. More data are needed, however, to establish whether the observed differences are caused by an age or a metallicity effect.}, author = {Bodensteiner, J. and Sana, H. and Wang, C. and Langer, N. and Mahy, L. and Banyard, G. and de Koter, A. and de Mink, S. E. and Evans, C. J. and Götberg, Ylva Louise Linsdotter and Patrick, L. R. and Schneider, F. R. N. and Tramper, F.}, issn = {1432-0746}, journal = {Astronomy & Astrophysics}, keywords = {Space and Planetary Science, Astronomy and Astrophysics}, publisher = {EDP Sciences}, title = {{The young massive SMC cluster NGC 330 seen by MUSE. II. Multiplicity properties of the massive-star population}}, doi = {10.1051/0004-6361/202140507}, volume = {652}, year = {2021}, } @article{13455, abstract = {The majority of massive stars live in binary or multiple systems and will interact with a companion during their lifetimes, which helps to explain the observed diversity of core-collapse supernovae. Donor stars in binary systems can lose most of their hydrogen-rich envelopes through mass transfer. As a result, not only are the surface properties affected, but so is the core structure. However, most calculations of the core-collapse properties of massive stars rely on single-star models. We present a systematic study of the difference between the pre-supernova structures of single stars and stars of the same initial mass (11–21 M⊙) that have been stripped due to stable post-main-sequence mass transfer at solar metallicity. We present the pre-supernova core composition with novel diagrams that give an intuitive representation of the isotope distribution. As shown in previous studies, at the edge of the carbon-oxygen core, the binary-stripped star models contain an extended gradient of carbon, oxygen, and neon. This layer remains until core collapse and is more extended in mass for higher initial stellar masses. It originates from the receding of the convective helium core during core helium burning in binary-stripped stars, which does not occur in single-star models. We find that this same evolutionary phase leads to systematic differences in the final density and nuclear energy generation profiles. Binary-stripped star models have systematically higher total masses of carbon at the moment of core collapse compared to single-star models, which likely results in systematically different supernova yields. In about half of our models, the silicon-burning and oxygen-rich layers merge after core silicon burning. We discuss the implications of our findings for the “explodability”, supernova observations, and nucleosynthesis of these stars. Our models are publicly available and can be readily used as input for detailed supernova simulations.}, author = {Laplace, E. and Justham, S. and Renzo, M. and Götberg, Ylva Louise Linsdotter and Farmer, R. and Vartanyan, D. and de Mink, S. E.}, issn = {1432-0746}, journal = {Astronomy & Astrophysics}, keywords = {Space and Planetary Science, Astronomy and Astrophysics}, publisher = {EDP Sciences}, title = {{Different to the core: The pre-supernova structures of massive single and binary-stripped stars}}, doi = {10.1051/0004-6361/202140506}, volume = {656}, year = {2021}, }