@inproceedings{5679, abstract = {We study the almost-sure termination problem for probabilistic programs. First, we show that supermartingales with lower bounds on conditional absolute difference provide a sound approach for the almost-sure termination problem. Moreover, using this approach we can obtain explicit optimal bounds on tail probabilities of non-termination within a given number of steps. Second, we present a new approach based on Central Limit Theorem for the almost-sure termination problem, and show that this approach can establish almost-sure termination of programs which none of the existing approaches can handle. Finally, we discuss algorithmic approaches for the two above methods that lead to automated analysis techniques for almost-sure termination of probabilistic programs.}, author = {Huang, Mingzhang and Fu, Hongfei and Chatterjee, Krishnendu}, editor = {Ryu, Sukyoung}, isbn = {9783030027674}, issn = {03029743}, location = {Wellington, New Zealand}, pages = {181--201}, publisher = {Springer}, title = {{New approaches for almost-sure termination of probabilistic programs}}, doi = {10.1007/978-3-030-02768-1_11}, volume = {11275}, year = {2018}, } @article{546, abstract = {The precise control of neural stem cell (NSC) proliferation and differentiation is crucial for the development and function of the human brain. Here, we review the emerging links between the alteration of embryonic and adult neurogenesis and the etiology of neuropsychiatric disorders (NPDs) such as autism spectrum disorders (ASDs) and schizophrenia (SCZ), as well as the advances in stem cell-based modeling and the novel therapeutic targets derived from these studies.}, author = {Sacco, Roberto and Cacci, Emanuele and Novarino, Gaia}, journal = {Current Opinion in Neurobiology}, number = {2}, pages = {131 -- 138}, publisher = {Elsevier}, title = {{Neural stem cells in neuropsychiatric disorders}}, doi = {10.1016/j.conb.2017.12.005}, volume = {48}, year = {2018}, } @misc{9812, abstract = {This document contains the full list of genes with their respective significance and dN/dS values. (TXT 4499Â kb)}, author = {Zapata, Luis and Pich, Oriol and Serrano, Luis and Kondrashov, Fyodor and Ossowski, Stephan and Schaefer, Martin}, publisher = {Springer Nature}, title = {{Additional file 2: Of negative selection in tumor genome evolution acts on essential cellular functions and the immunopeptidome}}, doi = {10.6084/m9.figshare.6401414.v1}, year = {2018}, } @misc{9811, abstract = {This document contains additional supporting evidence presented as supplemental tables. (XLSX 50Â kb)}, author = {Zapata, Luis and Pich, Oriol and Serrano, Luis and Kondrashov, Fyodor and Ossowski, Stephan and Schaefer, Martin}, publisher = {Springer Nature}, title = {{Additional file 1: Of negative selection in tumor genome evolution acts on essential cellular functions and the immunopeptidome}}, doi = {10.6084/m9.figshare.6401390.v1}, year = {2018}, } @article{20, abstract = {Background: Norepinephrine (NE) signaling has a key role in white adipose tissue (WAT) functions, including lipolysis, free fatty acid liberation and, under certain conditions, conversion of white into brite (brown-in-white) adipocytes. However, acute effects of NE stimulation have not been described at the transcriptional network level. Results: We used RNA-seq to uncover a broad transcriptional response. The inference of protein-protein and protein-DNA interaction networks allowed us to identify a set of immediate-early genes (IEGs) with high betweenness, validating our approach and suggesting a hierarchical control of transcriptional regulation. In addition, we identified a transcriptional regulatory network with IEGs as master regulators, including HSF1 and NFIL3 as novel NE-induced IEG candidates. Moreover, a functional enrichment analysis and gene clustering into functional modules suggest a crosstalk between metabolic, signaling, and immune responses. Conclusions: Altogether, our network biology approach explores for the first time the immediate-early systems level response of human adipocytes to acute sympathetic activation, thereby providing a first network basis of early cell fate programs and crosstalks between metabolic and transcriptional networks required for proper WAT function.}, author = {Higareda Almaraz, Juan and Karbiener, Michael and Giroud, Maude and Pauler, Florian and Gerhalter, Teresa and Herzig, Stephan and Scheideler, Marcel}, issn = {1471-2164}, journal = {BMC Genomics}, number = {1}, publisher = {BioMed Central}, title = {{Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes}}, doi = {10.1186/s12864-018-5173-0}, volume = {19}, year = {2018}, } @article{107, abstract = {We introduce the notion of “non-malleable codes” which relaxes the notion of error correction and error detection. Informally, a code is non-malleable if the message contained in a modified codeword is either the original message, or a completely unrelated value. In contrast to error correction and error detection, non-malleability can be achieved for very rich classes of modifications. We construct an efficient code that is non-malleable with respect to modifications that affect each bit of the codeword arbitrarily (i.e., leave it untouched, flip it, or set it to either 0 or 1), but independently of the value of the other bits of the codeword. Using the probabilistic method, we also show a very strong and general statement: there exists a non-malleable code for every “small enough” family F of functions via which codewords can be modified. Although this probabilistic method argument does not directly yield efficient constructions, it gives us efficient non-malleable codes in the random-oracle model for very general classes of tampering functions—e.g., functions where every bit in the tampered codeword can depend arbitrarily on any 99% of the bits in the original codeword. As an application of non-malleable codes, we show that they provide an elegant algorithmic solution to the task of protecting functionalities implemented in hardware (e.g., signature cards) against “tampering attacks.” In such attacks, the secret state of a physical system is tampered, in the hopes that future interaction with the modified system will reveal some secret information. This problem was previously studied in the work of Gennaro et al. in 2004 under the name “algorithmic tamper proof security” (ATP). We show that non-malleable codes can be used to achieve important improvements over the prior work. In particular, we show that any functionality can be made secure against a large class of tampering attacks, simply by encoding the secret state with a non-malleable code while it is stored in memory.}, author = {Dziembowski, Stefan and Pietrzak, Krzysztof Z and Wichs, Daniel}, journal = {Journal of the ACM}, number = {4}, publisher = {ACM}, title = {{Non-malleable codes}}, doi = {10.1145/3178432}, volume = {65}, year = {2018}, } @article{5676, abstract = {In epithelial tissues, cells tightly connect to each other through cell–cell junctions, but they also present the remarkable capacity of reorganizing themselves without compromising tissue integrity. Upon injury, simple epithelia efficiently resolve small lesions through the action of actin cytoskeleton contractile structures at the wound edge and cellular rearrangements. However, the underlying mechanisms and how they cooperate are still poorly understood. In this study, we combine live imaging and theoretical modeling to reveal a novel and indispensable role for occluding junctions (OJs) in this process. We demonstrate that OJ loss of function leads to defects in wound-closure dynamics: instead of contracting, wounds dramatically increase their area. OJ mutants exhibit phenotypes in cell shape, cellular rearrangements, and mechanical properties as well as in actin cytoskeleton dynamics at the wound edge. We propose that OJs are essential for wound closure by impacting on epithelial mechanics at the tissue level, which in turn is crucial for correct regulation of the cellular events occurring at the wound edge.}, author = {Carvalho, Lara and Patricio, Pedro and Ponte, Susana and Heisenberg, Carl-Philipp J and Almeida, Luis and Nunes, André S. and Araújo, Nuno A.M. and Jacinto, Antonio}, issn = {00219525}, journal = {Journal of Cell Biology}, number = {12}, pages = {4267--4283}, publisher = {Rockefeller University Press}, title = {{Occluding junctions as novel regulators of tissue mechanics during wound repair}}, doi = {10.1083/jcb.201804048}, volume = {217}, year = {2018}, } @inproceedings{14224, abstract = {Clustering is a cornerstone of unsupervised learning which can be thought as disentangling multiple generative mechanisms underlying the data. In this paper we introduce an algorithmic framework to train mixtures of implicit generative models which we particularize for variational autoencoders. Relying on an additional set of discriminators, we propose a competitive procedure in which the models only need to approximate the portion of the data distribution from which they can produce realistic samples. As a byproduct, each model is simpler to train, and a clustering interpretation arises naturally from the partitioning of the training points among the models. We empirically show that our approach splits the training distribution in a reasonable way and increases the quality of the generated samples.}, author = {Locatello, Francesco and Vincent, Damien and Tolstikhin, Ilya and Ratsch, Gunnar and Gelly, Sylvain and Scholkopf, Bernhard}, booktitle = {6th International Conference on Learning Representations}, location = {Vancouver, Canada}, title = {{Clustering meets implicit generative models}}, year = {2018}, } @misc{9807, abstract = {Table S1. Genes with highest betweenness. Table S2. Local and Master regulators up-regulated. Table S3. Local and Master regulators down-regulated (XLSX 23 kb).}, author = {Higareda Almaraz, Juan and Karbiener, Michael and Giroud, Maude and Pauler, Florian and Gerhalter, Teresa and Herzig, Stephan and Scheideler, Marcel}, publisher = {Springer Nature}, title = {{Additional file 1: Of Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes}}, doi = {10.6084/m9.figshare.7295339.v1}, year = {2018}, } @misc{9808, abstract = {Table S4. Counts per Gene per Million Reads Mapped. (XLSX 2751 kb).}, author = {Higareda Almaraz, Juan and Karbiener, Michael and Giroud, Maude and Pauler, Florian and Gerhalter, Teresa and Herzig, Stephan and Scheideler, Marcel}, publisher = {Springer Nature}, title = {{Additional file 3: Of Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes}}, doi = {10.6084/m9.figshare.7295369.v1}, year = {2018}, } @inproceedings{193, abstract = {We show attacks on five data-independent memory-hard functions (iMHF) that were submitted to the password hashing competition (PHC). Informally, an MHF is a function which cannot be evaluated on dedicated hardware, like ASICs, at significantly lower hardware and/or energy cost than evaluating a single instance on a standard single-core architecture. Data-independent means the memory access pattern of the function is independent of the input; this makes iMHFs harder to construct than data-dependent ones, but the latter can be attacked by various side-channel attacks. Following [Alwen-Blocki'16], we capture the evaluation of an iMHF as a directed acyclic graph (DAG). The cumulative parallel pebbling complexity of this DAG is a measure for the hardware cost of evaluating the iMHF on an ASIC. Ideally, one would like the complexity of a DAG underlying an iMHF to be as close to quadratic in the number of nodes of the graph as possible. Instead, we show that (the DAGs underlying) the following iMHFs are far from this bound: Rig.v2, TwoCats and Gambit each having an exponent no more than 1.75. Moreover, we show that the complexity of the iMHF modes of the PHC finalists Pomelo and Lyra2 have exponents at most 1.83 and 1.67 respectively. To show this we investigate a combinatorial property of each underlying DAG (called its depth-robustness. By establishing upper bounds on this property we are then able to apply the general technique of [Alwen-Block'16] for analyzing the hardware costs of an iMHF.}, author = {Alwen, Joel F and Gazi, Peter and Kamath Hosdurg, Chethan and Klein, Karen and Osang, Georg F and Pietrzak, Krzysztof Z and Reyzin, Lenoid and Rolinek, Michal and Rybar, Michal}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communication Security}, location = {Incheon, Republic of Korea}, pages = {51 -- 65}, publisher = {ACM}, title = {{On the memory hardness of data independent password hashing functions}}, doi = {10.1145/3196494.3196534}, year = {2018}, } @inproceedings{300, abstract = {We introduce a formal quantitative notion of “bit security” for a general type of cryptographic games (capturing both decision and search problems), aimed at capturing the intuition that a cryptographic primitive with k-bit security is as hard to break as an ideal cryptographic function requiring a brute force attack on a k-bit key space. Our new definition matches the notion of bit security commonly used by cryptographers and cryptanalysts when studying search (e.g., key recovery) problems, where the use of the traditional definition is well established. However, it produces a quantitatively different metric in the case of decision (indistinguishability) problems, where the use of (a straightforward generalization of) the traditional definition is more problematic and leads to a number of paradoxical situations or mismatches between theoretical/provable security and practical/common sense intuition. Key to our new definition is to consider adversaries that may explicitly declare failure of the attack. We support and justify the new definition by proving a number of technical results, including tight reductions between several standard cryptographic problems, a new hybrid theorem that preserves bit security, and an application to the security analysis of indistinguishability primitives making use of (approximate) floating point numbers. This is the first result showing that (standard precision) 53-bit floating point numbers can be used to achieve 100-bit security in the context of cryptographic primitives with general indistinguishability-based security definitions. Previous results of this type applied only to search problems, or special types of decision problems.}, author = {Micciancio, Daniele and Walter, Michael}, location = {Tel Aviv, Israel}, pages = {3 -- 28}, publisher = {Springer}, title = {{On the bit security of cryptographic primitives}}, doi = {10.1007/978-3-319-78381-9_1}, volume = {10820}, year = {2018}, } @article{312, abstract = {Motivated by biological questions, we study configurations of equal spheres that neither pack nor cover. Placing their centers on a lattice, we define the soft density of the configuration by penalizing multiple overlaps. Considering the 1-parameter family of diagonally distorted 3-dimensional integer lattices, we show that the soft density is maximized at the FCC lattice.}, author = {Edelsbrunner, Herbert and Iglesias Ham, Mabel}, issn = {08954801}, journal = {SIAM J Discrete Math}, number = {1}, pages = {750 -- 782}, publisher = {Society for Industrial and Applied Mathematics }, title = {{On the optimality of the FCC lattice for soft sphere packing}}, doi = {10.1137/16M1097201}, volume = {32}, year = {2018}, } @article{409, abstract = {We give a simple proof of T. Stehling's result [4], whereby in any normal tiling of the plane with convex polygons with number of sides not less than six, all tiles except a finite number are hexagons.}, author = {Akopyan, Arseniy}, issn = {1631073X}, journal = {Comptes Rendus Mathematique}, number = {4}, pages = {412--414}, publisher = {Elsevier}, title = {{On the number of non-hexagons in a planar tiling}}, doi = {10.1016/j.crma.2018.03.005}, volume = {356}, year = {2018}, } @article{419, abstract = {Reciprocity is a major factor in human social life and accounts for a large part of cooperation in our communities. Direct reciprocity arises when repeated interactions occur between the same individuals. The framework of iterated games formalizes this phenomenon. Despite being introduced more than five decades ago, the concept keeps offering beautiful surprises. Recent theoretical research driven by new mathematical tools has proposed a remarkable dichotomy among the crucial strategies: successful individuals either act as partners or as rivals. Rivals strive for unilateral advantages by applying selfish or extortionate strategies. Partners aim to share the payoff for mutual cooperation, but are ready to fight back when being exploited. Which of these behaviours evolves depends on the environment. Whereas small population sizes and a limited number of rounds favour rivalry, partner strategies are selected when populations are large and relationships stable. Only partners allow for evolution of cooperation, while the rivals’ attempt to put themselves first leads to defection. Hilbe et al. synthesize recent theoretical work on zero-determinant and ‘rival’ versus ‘partner’ strategies in social dilemmas. They describe the environments under which these contrasting selfish or cooperative strategies emerge in evolution.}, author = {Hilbe, Christian and Chatterjee, Krishnendu and Nowak, Martin}, journal = {Nature Human Behaviour}, pages = {469–477}, publisher = {Nature Publishing Group}, title = {{Partners and rivals in direct reciprocity}}, doi = {10.1038/s41562-018-0320-9}, volume = {2}, year = {2018}, } @inproceedings{78, abstract = {We provide a procedure for detecting the sub-segments of an incrementally observed Boolean signal ω that match a given temporal pattern ϕ. As a pattern specification language, we use timed regular expressions, a formalism well-suited for expressing properties of concurrent asynchronous behaviors embedded in metric time. We construct a timed automaton accepting the timed language denoted by ϕ and modify it slightly for the purpose of matching. We then apply zone-based reachability computation to this automaton while it reads ω, and retrieve all the matching segments from the results. Since the procedure is automaton based, it can be applied to patterns specified by other formalisms such as timed temporal logics reducible to timed automata or directly encoded as timed automata. The procedure has been implemented and its performance on synthetic examples is demonstrated.}, author = {Bakhirkin, Alexey and Ferrere, Thomas and Nickovic, Dejan and Maler, Oded and Asarin, Eugene}, isbn = {978-3-030-00150-6}, location = {Bejing, China}, pages = {215 -- 232}, publisher = {Springer}, title = {{Online timed pattern matching using automata}}, doi = {10.1007/978-3-030-00151-3_13}, volume = {11022}, year = {2018}, } @article{317, abstract = {We replace the established aluminium gates for the formation of quantum dots in silicon with gates made from palladium. We study the morphology of both aluminium and palladium gates with transmission electron microscopy. The native aluminium oxide is found to be formed all around the aluminium gates, which could lead to the formation of unintentional dots. Therefore, we report on a novel fabrication route that replaces aluminium and its native oxide by palladium with atomic-layer-deposition-grown aluminium oxide. Using this approach, we show the formation of low-disorder gate-defined quantum dots, which are reproducibly fabricated. Furthermore, palladium enables us to further shrink the gate design, allowing us to perform electron transport measurements in the few-electron regime in devices comprising only two gate layers, a major technological advancement. It remains to be seen, whether the introduction of palladium gates can improve the excellent results on electron and nuclear spin qubits defined with an aluminium gate stack.}, author = {Brauns, Matthias and Amitonov, Sergey and Spruijtenburg, Paul and Zwanenburg, Floris}, journal = {Scientific Reports}, number = {1}, publisher = {Nature Publishing Group}, title = {{Palladium gates for reproducible quantum dots in silicon}}, doi = {10.1038/s41598-018-24004-y}, volume = {8}, year = {2018}, } @article{194, abstract = {Ants are emerging model systems to study cellular signaling because distinct castes possess different physiologic phenotypes within the same colony. Here we studied the functionality of inotocin signaling, an insect ortholog of mammalian oxytocin (OT), which was recently discovered in ants. In Lasius ants, we determined that specialization within the colony, seasonal factors, and physiologic conditions down-regulated the expression of the OT-like signaling system. Given this natural variation, we interrogated its function using RNAi knockdowns. Next-generation RNA sequencing of OT-like precursor knock-down ants highlighted its role in the regulation of genes involved in metabolism. Knock-down ants exhibited higher walking activity and increased self-grooming in the brood chamber. We propose that OT-like signaling in ants is important for regulating metabolic processes and locomotion.}, author = {Liutkeviciute, Zita and Gil Mansilla, Esther and Eder, Thomas and Casillas Perez, Barbara E and Giulia Di Giglio, Maria and Muratspahić, Edin and Grebien, Florian and Rattei, Thomas and Muttenthaler, Markus and Cremer, Sylvia and Gruber, Christian}, issn = {08926638}, journal = {The FASEB Journal}, number = {12}, pages = {6808--6821}, publisher = {FASEB}, title = {{Oxytocin-like signaling in ants influences metabolic gene expression and locomotor activity}}, doi = {10.1096/fj.201800443}, volume = {32}, year = {2018}, } @article{159, abstract = {L-type Ca2+ channels (LTCCs) play a crucial role in excitation-contraction coupling and release of hormones from secretory cells. They are targets of antihypertensive and antiarrhythmic drugs such as diltiazem. Here, we present a photoswitchable diltiazem, FHU-779, which can be used to reversibly block endogenous LTCCs by light. FHU-779 is as potent as diltiazem and can be used to place pancreatic β-cell function and cardiac activity under optical control.}, author = {Fehrentz, Timm and Huber, Florian and Hartrampf, Nina and Bruegmann, Tobias and Frank, James and Fine, Nicholas and Malan, Daniela and Danzl, Johann G and Tikhonov, Denis and Sumser, Maritn and Sasse, Philipp and Hodson, David and Zhorov, Boris and Klocker, Nikolaj and Trauner, Dirk}, journal = {Nature Chemical Biology}, number = {8}, pages = {764 -- 767}, publisher = {Nature Publishing Group}, title = {{Optical control of L-type Ca2+ channels using a diltiazem photoswitch}}, doi = {10.1038/s41589-018-0090-8}, volume = {14}, year = {2018}, } @inproceedings{79, abstract = {Markov Decision Processes (MDPs) are a popular class of models suitable for solving control decision problems in probabilistic reactive systems. We consider parametric MDPs (pMDPs) that include parameters in some of the transition probabilities to account for stochastic uncertainties of the environment such as noise or input disturbances. We study pMDPs with reachability objectives where the parameter values are unknown and impossible to measure directly during execution, but there is a probability distribution known over the parameter values. We study for the first time computing parameter-independent strategies that are expectation optimal, i.e., optimize the expected reachability probability under the probability distribution over the parameters. We present an encoding of our problem to partially observable MDPs (POMDPs), i.e., a reduction of our problem to computing optimal strategies in POMDPs. We evaluate our method experimentally on several benchmarks: a motivating (repeated) learner model; a series of benchmarks of varying configurations of a robot moving on a grid; and a consensus protocol.}, author = {Arming, Sebastian and Bartocci, Ezio and Chatterjee, Krishnendu and Katoen, Joost P and Sokolova, Ana}, location = {Beijing, China}, pages = {53--70}, publisher = {Springer}, title = {{Parameter-independent strategies for pMDPs via POMDPs}}, doi = {10.1007/978-3-319-99154-2_4}, volume = {11024}, year = {2018}, }