[{"project":[{"call_identifier":"H2020","_id":"260AA4E2-B435-11E9-9278-68D0E5697425","name":"Mechanical Adaptation of Lamellipodial Actin Networks in Migrating Cells","grant_number":"747687"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","citation":{"chicago":"Gärtner, Florian R, Zerkah Ahmad, Gerhild Rosenberger, Shuxia Fan, Leo Nicolai, Benjamin Busch, Gökce Yavuz, et al. “Migrating Platelets Are Mechano Scavengers That Collect and Bundle Bacteria.” Cell Press. Cell Press, 2017. https://doi.org/10.1016/j.cell.2017.11.001.","ista":"Gärtner FR, Ahmad Z, Rosenberger G, Fan S, Nicolai L, Busch B, Yavuz G, Luckner M, Ishikawa Ankerhold H, Hennel R, Benechet A, Lorenz M, Chandraratne S, Schubert I, Helmer S, Striednig B, Stark K, Janko M, Böttcher R, Verschoor A, Leon C, Gachet C, Gudermann T, Mederos Y Schnitzler M, Pincus Z, Iannacone M, Haas R, Wanner G, Lauber K, Sixt MK, Massberg S. 2017. Migrating platelets are mechano scavengers that collect and bundle bacteria. Cell Press. 171(6), 1368–1382.","mla":"Gärtner, Florian R., et al. “Migrating Platelets Are Mechano Scavengers That Collect and Bundle Bacteria.” Cell Press, vol. 171, no. 6, Cell Press, 2017, pp. 1368–82, doi:10.1016/j.cell.2017.11.001.","apa":"Gärtner, F. R., Ahmad, Z., Rosenberger, G., Fan, S., Nicolai, L., Busch, B., … Massberg, S. (2017). Migrating platelets are mechano scavengers that collect and bundle bacteria. Cell Press. Cell Press. https://doi.org/10.1016/j.cell.2017.11.001","ama":"Gärtner FR, Ahmad Z, Rosenberger G, et al. Migrating platelets are mechano scavengers that collect and bundle bacteria. Cell Press. 2017;171(6):1368-1382. doi:10.1016/j.cell.2017.11.001","short":"F.R. Gärtner, Z. Ahmad, G. Rosenberger, S. Fan, L. Nicolai, B. Busch, G. Yavuz, M. Luckner, H. Ishikawa Ankerhold, R. Hennel, A. Benechet, M. Lorenz, S. Chandraratne, I. Schubert, S. Helmer, B. Striednig, K. Stark, M. Janko, R. Böttcher, A. Verschoor, C. Leon, C. Gachet, T. Gudermann, M. Mederos Y Schnitzler, Z. Pincus, M. Iannacone, R. Haas, G. Wanner, K. Lauber, M.K. Sixt, S. Massberg, Cell Press 171 (2017) 1368–1382.","ieee":"F. R. Gärtner et al., “Migrating platelets are mechano scavengers that collect and bundle bacteria,” Cell Press, vol. 171, no. 6. Cell Press, pp. 1368–1382, 2017."},"title":"Migrating platelets are mechano scavengers that collect and bundle bacteria","publist_id":"7243","author":[{"last_name":"Gärtner","full_name":"Gärtner, Florian R","orcid":"0000-0001-6120-3723","id":"397A88EE-F248-11E8-B48F-1D18A9856A87","first_name":"Florian R"},{"first_name":"Zerkah","last_name":"Ahmad","full_name":"Ahmad, Zerkah"},{"full_name":"Rosenberger, Gerhild","last_name":"Rosenberger","first_name":"Gerhild"},{"first_name":"Shuxia","last_name":"Fan","full_name":"Fan, Shuxia"},{"full_name":"Nicolai, Leo","last_name":"Nicolai","first_name":"Leo"},{"first_name":"Benjamin","full_name":"Busch, Benjamin","last_name":"Busch"},{"last_name":"Yavuz","full_name":"Yavuz, Gökce","first_name":"Gökce"},{"full_name":"Luckner, Manja","last_name":"Luckner","first_name":"Manja"},{"first_name":"Hellen","full_name":"Ishikawa Ankerhold, Hellen","last_name":"Ishikawa Ankerhold"},{"first_name":"Roman","last_name":"Hennel","full_name":"Hennel, Roman"},{"first_name":"Alexandre","full_name":"Benechet, Alexandre","last_name":"Benechet"},{"last_name":"Lorenz","full_name":"Lorenz, Michael","first_name":"Michael"},{"first_name":"Sue","full_name":"Chandraratne, Sue","last_name":"Chandraratne"},{"last_name":"Schubert","full_name":"Schubert, Irene","first_name":"Irene"},{"first_name":"Sebastian","full_name":"Helmer, Sebastian","last_name":"Helmer"},{"first_name":"Bianca","last_name":"Striednig","full_name":"Striednig, Bianca"},{"last_name":"Stark","full_name":"Stark, Konstantin","first_name":"Konstantin"},{"last_name":"Janko","full_name":"Janko, Marek","first_name":"Marek"},{"full_name":"Böttcher, Ralph","last_name":"Böttcher","first_name":"Ralph"},{"last_name":"Verschoor","full_name":"Verschoor, Admar","first_name":"Admar"},{"full_name":"Leon, Catherine","last_name":"Leon","first_name":"Catherine"},{"first_name":"Christian","last_name":"Gachet","full_name":"Gachet, Christian"},{"full_name":"Gudermann, Thomas","last_name":"Gudermann","first_name":"Thomas"},{"first_name":"Michael","last_name":"Mederos Y Schnitzler","full_name":"Mederos Y Schnitzler, Michael"},{"first_name":"Zachary","last_name":"Pincus","full_name":"Pincus, Zachary"},{"first_name":"Matteo","full_name":"Iannacone, Matteo","last_name":"Iannacone"},{"first_name":"Rainer","full_name":"Haas, Rainer","last_name":"Haas"},{"first_name":"Gerhard","full_name":"Wanner, Gerhard","last_name":"Wanner"},{"full_name":"Lauber, Kirsten","last_name":"Lauber","first_name":"Kirsten"},{"last_name":"Sixt","orcid":"0000-0002-6620-9179","full_name":"Sixt, Michael K","first_name":"Michael K","id":"41E9FBEA-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Massberg","full_name":"Massberg, Steffen","first_name":"Steffen"}],"publisher":"Cell Press","quality_controlled":"1","day":"30","publication":"Cell Press","year":"2017","date_published":"2017-11-30T00:00:00Z","doi":"10.1016/j.cell.2017.11.001","date_created":"2018-12-11T11:47:15Z","page":"1368 - 1382","_id":"571","status":"public","type":"journal_article","date_updated":"2021-01-12T08:03:15Z","department":[{"_id":"MiSi"}],"oa_version":"None","abstract":[{"lang":"eng","text":"Blood platelets are critical for hemostasis and thrombosis and play diverse roles during immune responses. Despite these versatile tasks in mammalian biology, their skills on a cellular level are deemed limited, mainly consisting in rolling, adhesion, and aggregate formation. Here, we identify an unappreciated asset of platelets and show that adherent platelets use adhesion receptors to mechanically probe the adhesive substrate in their local microenvironment. When actomyosin-dependent traction forces overcome substrate resistance, platelets migrate and pile up the adhesive substrate together with any bound particulate material. They use this ability to act as cellular scavengers, scanning the vascular surface for potential invaders and collecting deposited bacteria. Microbe collection by migrating platelets boosts the activity of professional phagocytes, exacerbating inflammatory tissue injury in sepsis. This assigns platelets a central role in innate immune responses and identifies them as potential targets to dampen inflammatory tissue damage in clinical scenarios of severe systemic infection. In addition to their role in thrombosis and hemostasis, platelets can also migrate to sites of infection to help trap bacteria and clear the vascular surface."}],"month":"11","intvolume":" 171","scopus_import":1,"language":[{"iso":"eng"}],"publication_identifier":{"issn":["00928674"]},"publication_status":"published","volume":171,"issue":"6","ec_funded":1},{"issue":"12","volume":18,"license":"https://creativecommons.org/licenses/by/4.0/","publication_status":"published","file":[{"content_type":"application/pdf","access_level":"open_access","relation":"main_file","checksum":"82d51f11e493f7eec02976d9a9a9805e","file_id":"4718","date_updated":"2020-07-14T12:47:10Z","file_size":920962,"creator":"system","date_created":"2018-12-12T10:08:55Z","file_name":"IST-2017-917-v1+1_ijms-18-02587.pdf"}],"language":[{"iso":"eng"}],"scopus_import":"1","month":"12","intvolume":" 18","abstract":[{"text":"In this review, we summarize the different biosynthesis-related pathways that contribute to the regulation of endogenous auxin in plants. We demonstrate that all known genes involved in auxin biosynthesis also have a role in root formation, from the initiation of a root meristem during embryogenesis to the generation of a functional root system with a primary root, secondary lateral root branches and adventitious roots. Furthermore, the versatile adaptation of root development in response to environmental challenges is mediated by both local and distant control of auxin biosynthesis. In conclusion, auxin homeostasis mediated by spatial and temporal regulation of auxin biosynthesis plays a central role in determining root architecture.","lang":"eng"}],"oa_version":"Published Version","file_date_updated":"2020-07-14T12:47:10Z","department":[{"_id":"JiFr"}],"date_updated":"2021-01-12T08:03:16Z","ddc":["580"],"type":"journal_article","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"status":"public","pubrep_id":"917","_id":"572","doi":"10.3390/ijms18122587","date_published":"2017-12-01T00:00:00Z","date_created":"2018-12-11T11:47:15Z","has_accepted_license":"1","year":"2017","day":"01","publication":"International Journal of Molecular Sciences","publisher":"MDPI","quality_controlled":"1","oa":1,"publist_id":"7242","author":[{"first_name":"Damilola","full_name":"Olatunji, Damilola","last_name":"Olatunji"},{"full_name":"Geelen, Danny","last_name":"Geelen","first_name":"Danny"},{"full_name":"Verstraeten, Inge","orcid":"0000-0001-7241-2328","last_name":"Verstraeten","id":"362BF7FE-F248-11E8-B48F-1D18A9856A87","first_name":"Inge"}],"article_processing_charge":"No","title":"Control of endogenous auxin levels in plant root development","citation":{"ista":"Olatunji D, Geelen D, Verstraeten I. 2017. Control of endogenous auxin levels in plant root development. International Journal of Molecular Sciences. 18(12), 2587.","chicago":"Olatunji, Damilola, Danny Geelen, and Inge Verstraeten. “Control of Endogenous Auxin Levels in Plant Root Development.” International Journal of Molecular Sciences. MDPI, 2017. https://doi.org/10.3390/ijms18122587.","short":"D. Olatunji, D. Geelen, I. Verstraeten, International Journal of Molecular Sciences 18 (2017).","ieee":"D. Olatunji, D. Geelen, and I. Verstraeten, “Control of endogenous auxin levels in plant root development,” International Journal of Molecular Sciences, vol. 18, no. 12. MDPI, 2017.","ama":"Olatunji D, Geelen D, Verstraeten I. Control of endogenous auxin levels in plant root development. International Journal of Molecular Sciences. 2017;18(12). doi:10.3390/ijms18122587","apa":"Olatunji, D., Geelen, D., & Verstraeten, I. (2017). Control of endogenous auxin levels in plant root development. International Journal of Molecular Sciences. MDPI. https://doi.org/10.3390/ijms18122587","mla":"Olatunji, Damilola, et al. “Control of Endogenous Auxin Levels in Plant Root Development.” International Journal of Molecular Sciences, vol. 18, no. 12, 2587, MDPI, 2017, doi:10.3390/ijms18122587."},"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","article_number":"2587"},{"type":"book_chapter","conference":{"location":"Plovdiv, Bulgaria","end_date":"2017-06-21","start_date":"2017-06-19","name":"IWCIA: International Workshop on Combinatorial Image Analysis"},"status":"public","_id":"5803","department":[{"_id":"HeEd"}],"date_updated":"2022-01-28T07:48:24Z","extern":"1","alternative_title":["LNCS"],"place":"Cham","month":"05","intvolume":" 10256","abstract":[{"lang":"eng","text":"Different distance metrics produce Voronoi diagrams with different properties. It is a well-known that on the (real) 2D plane or even on any 3D plane, a Voronoi diagram (VD) based on the Euclidean distance metric produces convex Voronoi regions. In this paper, we first show that this metric produces a persistent VD on the 2D digital plane, as it comprises digitally convex Voronoi regions and hence correctly approximates the corresponding VD on the 2D real plane. Next, we show that on a 3D digital plane D, the Euclidean metric spanning over its voxel set does not guarantee a digital VD which is persistent with the real-space VD. As a solution, we introduce a novel concept of functional-plane-convexity, which is ensured by the Euclidean metric spanning over the pedal set of D. Necessary proofs and some visual result have been provided to adjudge the merit and usefulness of the proposed concept."}],"oa_version":"None","volume":10256,"publication_identifier":{"isbn":["978-3-319-59107-0","978-3-319-59108-7"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","language":[{"iso":"eng"}],"author":[{"id":"3C2B033E-F248-11E8-B48F-1D18A9856A87","first_name":"Ranita","orcid":"0000-0002-5372-7890","full_name":"Biswas, Ranita","last_name":"Biswas"},{"full_name":"Bhowmick, Partha","last_name":"Bhowmick","first_name":"Partha"}],"article_processing_charge":"No","title":"Construction of persistent Voronoi diagram on 3D digital plane","citation":{"chicago":"Biswas, Ranita, and Partha Bhowmick. “Construction of Persistent Voronoi Diagram on 3D Digital Plane.” In Combinatorial Image Analysis, 10256:93–104. Cham: Springer Nature, 2017. https://doi.org/10.1007/978-3-319-59108-7_8.","ista":"Biswas R, Bhowmick P. 2017.Construction of persistent Voronoi diagram on 3D digital plane. In: Combinatorial image analysis. LNCS, vol. 10256, 93–104.","mla":"Biswas, Ranita, and Partha Bhowmick. “Construction of Persistent Voronoi Diagram on 3D Digital Plane.” Combinatorial Image Analysis, vol. 10256, Springer Nature, 2017, pp. 93–104, doi:10.1007/978-3-319-59108-7_8.","short":"R. Biswas, P. Bhowmick, in:, Combinatorial Image Analysis, Springer Nature, Cham, 2017, pp. 93–104.","ieee":"R. Biswas and P. Bhowmick, “Construction of persistent Voronoi diagram on 3D digital plane,” in Combinatorial image analysis, vol. 10256, Cham: Springer Nature, 2017, pp. 93–104.","apa":"Biswas, R., & Bhowmick, P. (2017). Construction of persistent Voronoi diagram on 3D digital plane. In Combinatorial image analysis (Vol. 10256, pp. 93–104). Cham: Springer Nature. https://doi.org/10.1007/978-3-319-59108-7_8","ama":"Biswas R, Bhowmick P. Construction of persistent Voronoi diagram on 3D digital plane. In: Combinatorial Image Analysis. Vol 10256. Cham: Springer Nature; 2017:93-104. doi:10.1007/978-3-319-59108-7_8"},"user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","quality_controlled":"1","publisher":"Springer Nature","page":"93-104","doi":"10.1007/978-3-319-59108-7_8","date_published":"2017-05-17T00:00:00Z","date_created":"2019-01-08T20:42:56Z","year":"2017","day":"17","publication":"Combinatorial image analysis"},{"conference":{"name":"Annual International Laser Physics Workshop LPHYS","start_date":"2017-08-17","end_date":"2017-08-21","location":"Kazan, Russian Federation"},"tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"type":"conference","status":"public","_id":"313","file_date_updated":"2020-07-14T12:46:00Z","department":[{"_id":"MiLe"}],"date_updated":"2023-02-23T12:36:07Z","ddc":["530"],"alternative_title":["Journal of Physics: Conference Series"],"scopus_import":1,"intvolume":" 999","month":"07","abstract":[{"lang":"eng","text":"Tunneling of a particle through a potential barrier remains one of the most remarkable quantum phenomena. Owing to advances in laser technology, electric fields comparable to those electrons experience in atoms are readily generated and open opportunities to dynamically investigate the process of electron tunneling through the potential barrier formed by the superposition of both laser and atomic fields. Attosecond-time and angstrom-space resolution of the strong laser-field technique allow to address fundamental questions related to tunneling, which are still open and debated: Which time is spent under the barrier and what momentum is picked up by the particle in the meantime? In this combined experimental and theoretical study we demonstrate that for strong-field ionization the leading quantum mechanical Wigner treatment for the time resolved description of tunneling is valid. We achieve a high sensitivity on the tunneling barrier and unambiguously isolate its effects by performing a differential study of two systems with almost identical tunneling geometry. Moreover, working with a low frequency laser, we essentially limit the non-adiabaticity of the process as a major source of uncertainty. The agreement between experiment and theory implies two substantial corrections with respect to the widely employed quasiclassical treatment: In addition to a non-vanishing longitudinal momentum along the laser field-direction we provide clear evidence for a non-zero tunneling time delay. This addresses also the fundamental question how the transition occurs from the tunnel barrier to free space classical evolution of the ejected electron."}],"oa_version":"Published Version","volume":999,"issue":"1","related_material":{"record":[{"status":"public","id":"6013","relation":"later_version"}]},"publication_status":"published","publication_identifier":{"issn":["17426588"]},"language":[{"iso":"eng"}],"file":[{"date_updated":"2020-07-14T12:46:00Z","file_size":949321,"creator":"dernst","date_created":"2019-01-22T08:34:10Z","file_name":"2017_Physics_Camus.pdf","content_type":"application/pdf","access_level":"open_access","relation":"main_file","file_id":"5871","checksum":"6e70b525a84f6d5fb175c48e9f5cb59a"}],"article_number":"012004","external_id":{"arxiv":["1611.03701"]},"publist_id":"7552","author":[{"full_name":"Camus, Nicolas","last_name":"Camus","first_name":"Nicolas"},{"first_name":"Enderalp","id":"38CB71F6-F248-11E8-B48F-1D18A9856A87","last_name":"Yakaboylu","full_name":"Yakaboylu, Enderalp","orcid":"0000-0001-5973-0874"},{"full_name":"Fechner, Lutz","last_name":"Fechner","first_name":"Lutz"},{"first_name":"Michael","full_name":"Klaiber, Michael","last_name":"Klaiber"},{"first_name":"Martin","full_name":"Laux, Martin","last_name":"Laux"},{"first_name":"Yonghao","last_name":"Mi","full_name":"Mi, Yonghao"},{"first_name":"Karen","last_name":"Hatsagortsyan","full_name":"Hatsagortsyan, Karen"},{"last_name":"Pfeifer","full_name":"Pfeifer, Thomas","first_name":"Thomas"},{"full_name":"Keitel, Cristoph","last_name":"Keitel","first_name":"Cristoph"},{"first_name":"Robert","last_name":"Moshammer","full_name":"Moshammer, Robert"}],"title":"Experimental evidence for Wigner's tunneling time","citation":{"ista":"Camus N, Yakaboylu E, Fechner L, Klaiber M, Laux M, Mi Y, Hatsagortsyan K, Pfeifer T, Keitel C, Moshammer R. 2017. Experimental evidence for Wigner’s tunneling time. Annual International Laser Physics Workshop LPHYS, Journal of Physics: Conference Series, vol. 999, 012004.","chicago":"Camus, Nicolas, Enderalp Yakaboylu, Lutz Fechner, Michael Klaiber, Martin Laux, Yonghao Mi, Karen Hatsagortsyan, Thomas Pfeifer, Cristoph Keitel, and Robert Moshammer. “Experimental Evidence for Wigner’s Tunneling Time,” Vol. 999. American Physical Society, 2017. https://doi.org/10.1088/1742-6596/999/1/012004.","apa":"Camus, N., Yakaboylu, E., Fechner, L., Klaiber, M., Laux, M., Mi, Y., … Moshammer, R. (2017). Experimental evidence for Wigner’s tunneling time (Vol. 999). Presented at the Annual International Laser Physics Workshop LPHYS, Kazan, Russian Federation: American Physical Society. https://doi.org/10.1088/1742-6596/999/1/012004","ama":"Camus N, Yakaboylu E, Fechner L, et al. Experimental evidence for Wigner’s tunneling time. In: Vol 999. American Physical Society; 2017. doi:10.1088/1742-6596/999/1/012004","short":"N. Camus, E. Yakaboylu, L. Fechner, M. Klaiber, M. Laux, Y. Mi, K. Hatsagortsyan, T. Pfeifer, C. Keitel, R. Moshammer, in:, American Physical Society, 2017.","ieee":"N. Camus et al., “Experimental evidence for Wigner’s tunneling time,” presented at the Annual International Laser Physics Workshop LPHYS, Kazan, Russian Federation, 2017, vol. 999, no. 1.","mla":"Camus, Nicolas, et al. Experimental Evidence for Wigner’s Tunneling Time. Vol. 999, no. 1, 012004, American Physical Society, 2017, doi:10.1088/1742-6596/999/1/012004."},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","oa":1,"publisher":"American Physical Society","quality_controlled":"1","date_created":"2018-12-11T11:45:46Z","date_published":"2017-07-14T00:00:00Z","doi":"10.1088/1742-6596/999/1/012004","year":"2017","has_accepted_license":"1","day":"14"},{"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","citation":{"chicago":"Camus, Nicolas, Enderalp Yakaboylu, Lutz Fechner, Michael Klaiber, Martin Laux, Yonghao Mi, Karen Z. Hatsagortsyan, Thomas Pfeifer, Christoph H. Keitel, and Robert Moshammer. “Experimental Evidence for Quantum Tunneling Time.” Physical Review Letters. American Physical Society, 2017. https://doi.org/10.1103/PhysRevLett.119.023201.","ista":"Camus N, Yakaboylu E, Fechner L, Klaiber M, Laux M, Mi Y, Hatsagortsyan KZ, Pfeifer T, Keitel CH, Moshammer R. 2017. Experimental evidence for quantum tunneling time. Physical Review Letters. 119(2), 023201.","mla":"Camus, Nicolas, et al. “Experimental Evidence for Quantum Tunneling Time.” Physical Review Letters, vol. 119, no. 2, 023201, American Physical Society, 2017, doi:10.1103/PhysRevLett.119.023201.","apa":"Camus, N., Yakaboylu, E., Fechner, L., Klaiber, M., Laux, M., Mi, Y., … Moshammer, R. (2017). Experimental evidence for quantum tunneling time. Physical Review Letters. American Physical Society. https://doi.org/10.1103/PhysRevLett.119.023201","ama":"Camus N, Yakaboylu E, Fechner L, et al. Experimental evidence for quantum tunneling time. Physical Review Letters. 2017;119(2). doi:10.1103/PhysRevLett.119.023201","ieee":"N. Camus et al., “Experimental evidence for quantum tunneling time,” Physical Review Letters, vol. 119, no. 2. American Physical Society, 2017.","short":"N. Camus, E. Yakaboylu, L. Fechner, M. Klaiber, M. Laux, Y. Mi, K.Z. Hatsagortsyan, T. Pfeifer, C.H. Keitel, R. Moshammer, Physical Review Letters 119 (2017)."},"title":"Experimental evidence for quantum tunneling time","external_id":{"arxiv":["1611.03701"]},"author":[{"last_name":"Camus","full_name":"Camus, Nicolas","first_name":"Nicolas"},{"last_name":"Yakaboylu","full_name":"Yakaboylu, Enderalp","orcid":"0000-0001-5973-0874","first_name":"Enderalp","id":"38CB71F6-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Fechner, Lutz","last_name":"Fechner","first_name":"Lutz"},{"first_name":"Michael","full_name":"Klaiber, Michael","last_name":"Klaiber"},{"first_name":"Martin","full_name":"Laux, Martin","last_name":"Laux"},{"last_name":"Mi","full_name":"Mi, Yonghao","first_name":"Yonghao"},{"first_name":"Karen Z.","full_name":"Hatsagortsyan, Karen Z.","last_name":"Hatsagortsyan"},{"full_name":"Pfeifer, Thomas","last_name":"Pfeifer","first_name":"Thomas"},{"first_name":"Christoph H.","last_name":"Keitel","full_name":"Keitel, Christoph H."},{"last_name":"Moshammer","full_name":"Moshammer, Robert","first_name":"Robert"}],"article_number":"023201","publication":"Physical Review Letters","day":"14","year":"2017","date_created":"2019-02-14T15:24:13Z","date_published":"2017-07-14T00:00:00Z","doi":"10.1103/PhysRevLett.119.023201","oa":1,"quality_controlled":"1","publisher":"American Physical Society","date_updated":"2023-02-23T11:13:36Z","department":[{"_id":"MiLe"}],"_id":"6013","status":"public","type":"journal_article","language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"eissn":["1079-7114"],"issn":["0031-9007"]},"volume":119,"related_material":{"record":[{"relation":"earlier_version","status":"public","id":"313"}]},"issue":"2","oa_version":"Preprint","abstract":[{"text":"The first hundred attoseconds of the electron dynamics during strong field tunneling ionization are investigated. We quantify theoretically how the electron’s classical trajectories in the continuum emerge from the tunneling process and test the results with those achieved in parallel from attoclock measurements. An especially high sensitivity on the tunneling barrier is accomplished here by comparing the momentum distributions of two atomic species of slightly deviating atomic potentials (argon and krypton) being ionized under absolutely identical conditions with near-infrared laser pulses (1300 nm). The agreement between experiment and theory provides clear evidence for a nonzero tunneling time delay and a nonvanishing longitudinal momentum of the electron at the “tunnel exit.”","lang":"eng"}],"intvolume":" 119","month":"07","main_file_link":[{"url":"https://arxiv.org/abs/1611.03701","open_access":"1"}],"scopus_import":1},{"oa":1,"quality_controlled":"1","publisher":"Springer","year":"2017","day":"05","page":"56 - 81","date_created":"2018-12-11T11:47:27Z","date_published":"2017-11-05T00:00:00Z","doi":"10.1007/978-3-319-70500-2_3","project":[{"grant_number":"682815","name":"Teaching Old Crypto New Tricks","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","call_identifier":"H2020"}],"citation":{"mla":"Brody, Joshua, et al. Position Based Cryptography and Multiparty Communication Complexity. Edited by Yael Kalai and Leonid Reyzin, vol. 10677, Springer, 2017, pp. 56–81, doi:10.1007/978-3-319-70500-2_3.","apa":"Brody, J., Dziembowski, S., Faust, S., & Pietrzak, K. Z. (2017). Position based cryptography and multiparty communication complexity. In Y. Kalai & L. Reyzin (Eds.) (Vol. 10677, pp. 56–81). Presented at the TCC: Theory of Cryptography Conference, Baltimore, MD, United States: Springer. https://doi.org/10.1007/978-3-319-70500-2_3","ama":"Brody J, Dziembowski S, Faust S, Pietrzak KZ. Position based cryptography and multiparty communication complexity. In: Kalai Y, Reyzin L, eds. Vol 10677. Springer; 2017:56-81. doi:10.1007/978-3-319-70500-2_3","short":"J. Brody, S. Dziembowski, S. Faust, K.Z. Pietrzak, in:, Y. Kalai, L. Reyzin (Eds.), Springer, 2017, pp. 56–81.","ieee":"J. Brody, S. Dziembowski, S. Faust, and K. Z. Pietrzak, “Position based cryptography and multiparty communication complexity,” presented at the TCC: Theory of Cryptography Conference, Baltimore, MD, United States, 2017, vol. 10677, pp. 56–81.","chicago":"Brody, Joshua, Stefan Dziembowski, Sebastian Faust, and Krzysztof Z Pietrzak. “Position Based Cryptography and Multiparty Communication Complexity.” edited by Yael Kalai and Leonid Reyzin, 10677:56–81. Springer, 2017. https://doi.org/10.1007/978-3-319-70500-2_3.","ista":"Brody J, Dziembowski S, Faust S, Pietrzak KZ. 2017. Position based cryptography and multiparty communication complexity. TCC: Theory of Cryptography Conference, LNCS, vol. 10677, 56–81."},"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publist_id":"7200","author":[{"first_name":"Joshua","last_name":"Brody","full_name":"Brody, Joshua"},{"first_name":"Stefan","last_name":"Dziembowski","full_name":"Dziembowski, Stefan"},{"first_name":"Sebastian","last_name":"Faust","full_name":"Faust, Sebastian"},{"id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","first_name":"Krzysztof Z","last_name":"Pietrzak","orcid":"0000-0002-9139-1654","full_name":"Pietrzak, Krzysztof Z"}],"editor":[{"first_name":"Yael","full_name":"Kalai, Yael","last_name":"Kalai"},{"first_name":"Leonid","full_name":"Reyzin, Leonid","last_name":"Reyzin"}],"title":"Position based cryptography and multiparty communication complexity","abstract":[{"text":"Position based cryptography (PBC), proposed in the seminal work of Chandran, Goyal, Moriarty, and Ostrovsky (SIAM J. Computing, 2014), aims at constructing cryptographic schemes in which the identity of the user is his geographic position. Chandran et al. construct PBC schemes for secure positioning and position-based key agreement in the bounded-storage model (Maurer, J. Cryptology, 1992). Apart from bounded memory, their security proofs need a strong additional restriction on the power of the adversary: he cannot compute joint functions of his inputs. Removing this assumption is left as an open problem. We show that an answer to this question would resolve a long standing open problem in multiparty communication complexity: finding a function that is hard to compute with low communication complexity in the simultaneous message model, but easy to compute in the fully adaptive model. On a more positive side: we also show some implications in the other direction, i.e.: we prove that lower bounds on the communication complexity of certain multiparty problems imply existence of PBC primitives. Using this result we then show two attractive ways to “bypass” our hardness result: the first uses the random oracle model, the second weakens the locality requirement in the bounded-storage model to online computability. The random oracle construction is arguably one of the simplest proposed so far in this area. Our results indicate that constructing improved provably secure protocols for PBC requires a better understanding of multiparty communication complexity. This is yet another example where negative results in one area (in our case: lower bounds in multiparty communication complexity) can be used to construct secure cryptographic schemes.","lang":"eng"}],"oa_version":"Submitted Version","main_file_link":[{"url":"https://eprint.iacr.org/2016/536","open_access":"1"}],"scopus_import":1,"alternative_title":["LNCS"],"intvolume":" 10677","month":"11","publication_status":"published","publication_identifier":{"isbn":["978-331970499-9"]},"language":[{"iso":"eng"}],"ec_funded":1,"volume":10677,"_id":"605","conference":{"name":"TCC: Theory of Cryptography Conference","end_date":"2017-11-15","location":"Baltimore, MD, United States","start_date":"2017-11-12"},"type":"conference","status":"public","date_updated":"2021-01-12T08:05:53Z","department":[{"_id":"KrPi"}]},{"month":"12","intvolume":" 11","scopus_import":1,"alternative_title":["Theoretical and Computational Chemistry Series"],"main_file_link":[{"url":"https://arxiv.org/abs/1703.06753","open_access":"1"}],"oa_version":"Submitted Version","abstract":[{"lang":"eng","text":"In several settings of physics and chemistry one has to deal with molecules interacting with some kind of an external environment, be it a gas, a solution, or a crystal surface. Understanding molecular processes in the presence of such a many-particle bath is inherently challenging, and usually requires large-scale numerical computations. Here, we present an alternative approach to the problem, based on the notion of the angulon quasiparticle. We show that molecules rotating inside superfluid helium nanodroplets and Bose–Einstein condensates form angulons, and therefore can be described by straightforward solutions of a simple microscopic Hamiltonian. Casting the problem in the language of angulons allows us not only to greatly simplify it, but also to gain insights into the origins of the observed phenomena and to make predictions for future experimental studies."}],"volume":11,"language":[{"iso":"eng"}],"publication_identifier":{"issn":["20413181"]},"publication_status":"published","status":"public","type":"book_chapter","series_title":"Theoretical and Computational Chemistry Series","_id":"604","department":[{"_id":"MiLe"}],"date_updated":"2021-01-12T08:05:50Z","quality_controlled":"1","publisher":"The Royal Society of Chemistry","oa":1,"doi":"10.1039/9781782626800-00444","date_published":"2017-12-14T00:00:00Z","date_created":"2018-12-11T11:47:27Z","page":"444 - 495","day":"14","publication":"Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero ","year":"2017","title":"Molecular impurities interacting with a many-particle environment: From ultracold gases to helium nanodroplets","editor":[{"first_name":"Oliver","full_name":"Dulieu, Oliver","last_name":"Dulieu"},{"last_name":"Osterwalder","full_name":"Osterwalder, Andreas","first_name":"Andreas"}],"publist_id":"7201","author":[{"id":"37CB05FA-F248-11E8-B48F-1D18A9856A87","first_name":"Mikhail","last_name":"Lemeshko","full_name":"Lemeshko, Mikhail","orcid":"0000-0002-6990-7802"},{"last_name":"Schmidt","full_name":"Schmidt, Richard","first_name":"Richard"}],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","citation":{"short":"M. Lemeshko, R. Schmidt, in:, O. Dulieu, A. Osterwalder (Eds.), Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero , The Royal Society of Chemistry, 2017, pp. 444–495.","ieee":"M. Lemeshko and R. Schmidt, “Molecular impurities interacting with a many-particle environment: From ultracold gases to helium nanodroplets,” in Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero , vol. 11, O. Dulieu and A. Osterwalder, Eds. The Royal Society of Chemistry, 2017, pp. 444–495.","apa":"Lemeshko, M., & Schmidt, R. (2017). Molecular impurities interacting with a many-particle environment: From ultracold gases to helium nanodroplets. In O. Dulieu & A. Osterwalder (Eds.), Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero (Vol. 11, pp. 444–495). The Royal Society of Chemistry. https://doi.org/10.1039/9781782626800-00444","ama":"Lemeshko M, Schmidt R. Molecular impurities interacting with a many-particle environment: From ultracold gases to helium nanodroplets. In: Dulieu O, Osterwalder A, eds. Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero . Vol 11. Theoretical and Computational Chemistry Series. The Royal Society of Chemistry; 2017:444-495. doi:10.1039/9781782626800-00444","mla":"Lemeshko, Mikhail, and Richard Schmidt. “Molecular Impurities Interacting with a Many-Particle Environment: From Ultracold Gases to Helium Nanodroplets.” Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero , edited by Oliver Dulieu and Andreas Osterwalder, vol. 11, The Royal Society of Chemistry, 2017, pp. 444–95, doi:10.1039/9781782626800-00444.","ista":"Lemeshko M, Schmidt R. 2017.Molecular impurities interacting with a many-particle environment: From ultracold gases to helium nanodroplets. In: Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero . Theoretical and Computational Chemistry Series, vol. 11, 444–495.","chicago":"Lemeshko, Mikhail, and Richard Schmidt. “Molecular Impurities Interacting with a Many-Particle Environment: From Ultracold Gases to Helium Nanodroplets.” In Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero , edited by Oliver Dulieu and Andreas Osterwalder, 11:444–95. Theoretical and Computational Chemistry Series. The Royal Society of Chemistry, 2017. https://doi.org/10.1039/9781782626800-00444."}},{"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2017/945"}],"alternative_title":["LNCS"],"scopus_import":1,"intvolume":" 10677","month":"11","abstract":[{"lang":"eng","text":"Several cryptographic schemes and applications are based on functions that are both reasonably efficient to compute and moderately hard to invert, including client puzzles for Denial-of-Service protection, password protection via salted hashes, or recent proof-of-work blockchain systems. Despite their wide use, a definition of this concept has not yet been distilled and formalized explicitly. Instead, either the applications are proven directly based on the assumptions underlying the function, or some property of the function is proven, but the security of the application is argued only informally. The goal of this work is to provide a (universal) definition that decouples the efforts of designing new moderately hard functions and of building protocols based on them, serving as an interface between the two. On a technical level, beyond the mentioned definitions, we instantiate the model for four different notions of hardness. We extend the work of Alwen and Serbinenko (STOC 2015) by providing a general tool for proving security for the first notion of memory-hard functions that allows for provably secure applications. The tool allows us to recover all of the graph-theoretic techniques developed for proving security under the older, non-composable, notion of security used by Alwen and Serbinenko. As an application of our definition of moderately hard functions, we prove the security of two different schemes for proofs of effort (PoE). We also formalize and instantiate the concept of a non-interactive proof of effort (niPoE), in which the proof is not bound to a particular communication context but rather any bit-string chosen by the prover."}],"oa_version":"Submitted Version","volume":10677,"publication_status":"published","publication_identifier":{"isbn":["978-331970499-9"]},"language":[{"iso":"eng"}],"conference":{"start_date":"2017-11-12","location":"Baltimore, MD, United States","end_date":"2017-11-15","name":"TCC: Theory of Cryptography"},"type":"conference","status":"public","_id":"609","department":[{"_id":"KrPi"}],"date_updated":"2021-01-12T08:06:04Z","oa":1,"quality_controlled":"1","publisher":"Springer","page":"493 - 526","date_created":"2018-12-11T11:47:28Z","date_published":"2017-11-05T00:00:00Z","doi":"10.1007/978-3-319-70500-2_17","year":"2017","day":"05","author":[{"last_name":"Alwen","full_name":"Alwen, Joel F","first_name":"Joel F","id":"2A8DFA8C-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Tackmann, Björn","last_name":"Tackmann","first_name":"Björn"}],"publist_id":"7196","title":"Moderately hard functions: Definition, instantiations, and applications","editor":[{"first_name":"Yael","last_name":"Kalai","full_name":"Kalai, Yael"},{"last_name":"Reyzin","full_name":"Reyzin, Leonid","first_name":"Leonid"}],"citation":{"chicago":"Alwen, Joel F, and Björn Tackmann. “Moderately Hard Functions: Definition, Instantiations, and Applications.” edited by Yael Kalai and Leonid Reyzin, 10677:493–526. Springer, 2017. https://doi.org/10.1007/978-3-319-70500-2_17.","ista":"Alwen JF, Tackmann B. 2017. Moderately hard functions: Definition, instantiations, and applications. TCC: Theory of Cryptography, LNCS, vol. 10677, 493–526.","mla":"Alwen, Joel F., and Björn Tackmann. Moderately Hard Functions: Definition, Instantiations, and Applications. Edited by Yael Kalai and Leonid Reyzin, vol. 10677, Springer, 2017, pp. 493–526, doi:10.1007/978-3-319-70500-2_17.","short":"J.F. Alwen, B. Tackmann, in:, Y. Kalai, L. Reyzin (Eds.), Springer, 2017, pp. 493–526.","ieee":"J. F. Alwen and B. Tackmann, “Moderately hard functions: Definition, instantiations, and applications,” presented at the TCC: Theory of Cryptography, Baltimore, MD, United States, 2017, vol. 10677, pp. 493–526.","apa":"Alwen, J. F., & Tackmann, B. (2017). Moderately hard functions: Definition, instantiations, and applications. In Y. Kalai & L. Reyzin (Eds.) (Vol. 10677, pp. 493–526). Presented at the TCC: Theory of Cryptography, Baltimore, MD, United States: Springer. https://doi.org/10.1007/978-3-319-70500-2_17","ama":"Alwen JF, Tackmann B. Moderately hard functions: Definition, instantiations, and applications. In: Kalai Y, Reyzin L, eds. Vol 10677. Springer; 2017:493-526. doi:10.1007/978-3-319-70500-2_17"},"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87"},{"project":[{"name":"International IST Postdoc Fellowship Programme","grant_number":"291734","_id":"25681D80-B435-11E9-9278-68D0E5697425","call_identifier":"FP7"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","citation":{"apa":"Goaoc, X., Mabillard, I., Paták, P., Patakova, Z., Tancer, M., & Wagner, U. (2017). On generalized Heawood inequalities for manifolds: A van Kampen–Flores type nonembeddability result. Israel Journal of Mathematics. Springer. https://doi.org/10.1007/s11856-017-1607-7","ama":"Goaoc X, Mabillard I, Paták P, Patakova Z, Tancer M, Wagner U. On generalized Heawood inequalities for manifolds: A van Kampen–Flores type nonembeddability result. Israel Journal of Mathematics. 2017;222(2):841-866. doi:10.1007/s11856-017-1607-7","short":"X. Goaoc, I. Mabillard, P. Paták, Z. Patakova, M. Tancer, U. Wagner, Israel Journal of Mathematics 222 (2017) 841–866.","ieee":"X. Goaoc, I. Mabillard, P. Paták, Z. Patakova, M. Tancer, and U. Wagner, “On generalized Heawood inequalities for manifolds: A van Kampen–Flores type nonembeddability result,” Israel Journal of Mathematics, vol. 222, no. 2. Springer, pp. 841–866, 2017.","mla":"Goaoc, Xavier, et al. “On Generalized Heawood Inequalities for Manifolds: A van Kampen–Flores Type Nonembeddability Result.” Israel Journal of Mathematics, vol. 222, no. 2, Springer, 2017, pp. 841–66, doi:10.1007/s11856-017-1607-7.","ista":"Goaoc X, Mabillard I, Paták P, Patakova Z, Tancer M, Wagner U. 2017. On generalized Heawood inequalities for manifolds: A van Kampen–Flores type nonembeddability result. Israel Journal of Mathematics. 222(2), 841–866.","chicago":"Goaoc, Xavier, Isaac Mabillard, Pavel Paták, Zuzana Patakova, Martin Tancer, and Uli Wagner. “On Generalized Heawood Inequalities for Manifolds: A van Kampen–Flores Type Nonembeddability Result.” Israel Journal of Mathematics. Springer, 2017. https://doi.org/10.1007/s11856-017-1607-7."},"title":"On generalized Heawood inequalities for manifolds: A van Kampen–Flores type nonembeddability result","author":[{"full_name":"Goaoc, Xavier","last_name":"Goaoc","first_name":"Xavier"},{"id":"32BF9DAA-F248-11E8-B48F-1D18A9856A87","first_name":"Isaac","full_name":"Mabillard, Isaac","last_name":"Mabillard"},{"last_name":"Paták","full_name":"Paták, Pavel","first_name":"Pavel"},{"full_name":"Patakova, Zuzana","orcid":"0000-0002-3975-1683","last_name":"Patakova","id":"48B57058-F248-11E8-B48F-1D18A9856A87","first_name":"Zuzana"},{"full_name":"Tancer, Martin","orcid":"0000-0002-1191-6714","last_name":"Tancer","id":"38AC689C-F248-11E8-B48F-1D18A9856A87","first_name":"Martin"},{"id":"36690CA2-F248-11E8-B48F-1D18A9856A87","first_name":"Uli","orcid":"0000-0002-1494-0568","full_name":"Wagner, Uli","last_name":"Wagner"}],"publist_id":"7194","acknowledgement":"The work by Z. P. was partially supported by the Israel Science Foundation grant ISF-768/12. The work by Z. P. and M. T. was partially supported by the project CE-ITI (GACR P202/12/G061) of the Czech Science Foundation and by the ERC Advanced Grant No. 267165. Part of the research work of M.T. was conducted at IST Austria, supported by an IST Fellowship. The research of P. P. was supported by the ERC Advanced grant no. 320924. The work by I. M. and U. W. was supported by the Swiss National Science Foundation (grants SNSF-200020-138230 and SNSF-PP00P2-138948). The collaboration between U. W. and X. G. was partially supported by the LabEx Bézout (ANR-10-LABX-58).","quality_controlled":"1","publisher":"Springer","oa":1,"day":"01","publication":"Israel Journal of Mathematics","year":"2017","doi":"10.1007/s11856-017-1607-7","date_published":"2017-10-01T00:00:00Z","date_created":"2018-12-11T11:47:29Z","page":"841 - 866","_id":"610","status":"public","type":"journal_article","date_updated":"2023-02-23T10:02:13Z","department":[{"_id":"UlWa"}],"oa_version":"Preprint","abstract":[{"text":"The fact that the complete graph K5 does not embed in the plane has been generalized in two independent directions. On the one hand, the solution of the classical Heawood problem for graphs on surfaces established that the complete graph Kn embeds in a closed surface M (other than the Klein bottle) if and only if (n−3)(n−4) ≤ 6b1(M), where b1(M) is the first Z2-Betti number of M. On the other hand, van Kampen and Flores proved that the k-skeleton of the n-dimensional simplex (the higher-dimensional analogue of Kn+1) embeds in R2k if and only if n ≤ 2k + 1. Two decades ago, Kühnel conjectured that the k-skeleton of the n-simplex embeds in a compact, (k − 1)-connected 2k-manifold with kth Z2-Betti number bk only if the following generalized Heawood inequality holds: (k+1 n−k−1) ≤ (k+1 2k+1)bk. This is a common generalization of the case of graphs on surfaces as well as the van Kampen–Flores theorem. In the spirit of Kühnel’s conjecture, we prove that if the k-skeleton of the n-simplex embeds in a compact 2k-manifold with kth Z2-Betti number bk, then n ≤ 2bk(k 2k+2)+2k+4. This bound is weaker than the generalized Heawood inequality, but does not require the assumption that M is (k−1)-connected. Our results generalize to maps without q-covered points, in the spirit of Tverberg’s theorem, for q a prime power. Our proof uses a result of Volovikov about maps that satisfy a certain homological triviality condition.","lang":"eng"}],"month":"10","intvolume":" 222","scopus_import":1,"main_file_link":[{"url":"https://arxiv.org/abs/1610.09063","open_access":"1"}],"language":[{"iso":"eng"}],"publication_status":"published","related_material":{"record":[{"relation":"earlier_version","status":"public","id":"1511"}]},"issue":"2","volume":222,"ec_funded":1},{"month":"11","intvolume":" 358","scopus_import":1,"publisher":"American Association for the Advancement of Science","quality_controlled":"1","oa_version":"None","abstract":[{"lang":"eng","text":"Small RNAs (sRNAs) regulate genes in plants and animals. Here, we show that population-wide differences in color patterns in snapdragon flowers are caused by an inverted duplication that generates sRNAs. The complexity and size of the transcripts indicate that the duplication represents an intermediate on the pathway to microRNA evolution. The sRNAs repress a pigment biosynthesis gene, creating a yellow highlight at the site of pollinator entry. The inverted duplication exhibits steep clines in allele frequency in a natural hybrid zone, showing that the allele is under selection. Thus, regulatory interactions of evolutionarily recent sRNAs can be acted upon by selection and contribute to the evolution of phenotypic diversity."}],"date_published":"2017-11-17T00:00:00Z","doi":"10.1126/science.aao3526","issue":"6365","volume":358,"date_created":"2018-12-11T11:47:29Z","page":"925 - 928","day":"17","publication":"Science","language":[{"iso":"eng"}],"publication_identifier":{"issn":["00368075"]},"year":"2017","publication_status":"published","status":"public","type":"journal_article","_id":"611","department":[{"_id":"NiBa"}],"title":"Evolution of flower color pattern through selection on regulatory small RNAs","author":[{"full_name":"Bradley, Desmond","last_name":"Bradley","first_name":"Desmond"},{"full_name":"Xu, Ping","last_name":"Xu","first_name":"Ping"},{"full_name":"Mohorianu, Irina","last_name":"Mohorianu","first_name":"Irina"},{"full_name":"Whibley, Annabel","last_name":"Whibley","first_name":"Annabel"},{"first_name":"David","id":"419049E2-F248-11E8-B48F-1D18A9856A87","full_name":"Field, David","orcid":"0000-0002-4014-8478","last_name":"Field"},{"first_name":"Hugo","last_name":"Tavares","full_name":"Tavares, Hugo"},{"full_name":"Couchman, Matthew","last_name":"Couchman","first_name":"Matthew"},{"first_name":"Lucy","last_name":"Copsey","full_name":"Copsey, Lucy"},{"first_name":"Rosemary","last_name":"Carpenter","full_name":"Carpenter, Rosemary"},{"full_name":"Li, Miaomiao","last_name":"Li","first_name":"Miaomiao"},{"first_name":"Qun","last_name":"Li","full_name":"Li, Qun"},{"full_name":"Xue, Yongbiao","last_name":"Xue","first_name":"Yongbiao"},{"first_name":"Tamas","full_name":"Dalmay, Tamas","last_name":"Dalmay"},{"full_name":"Coen, Enrico","last_name":"Coen","first_name":"Enrico"}],"publist_id":"7193","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_updated":"2021-01-12T08:06:10Z","citation":{"mla":"Bradley, Desmond, et al. “Evolution of Flower Color Pattern through Selection on Regulatory Small RNAs.” Science, vol. 358, no. 6365, American Association for the Advancement of Science, 2017, pp. 925–28, doi:10.1126/science.aao3526.","short":"D. Bradley, P. Xu, I. Mohorianu, A. Whibley, D. Field, H. Tavares, M. Couchman, L. Copsey, R. Carpenter, M. Li, Q. Li, Y. Xue, T. Dalmay, E. Coen, Science 358 (2017) 925–928.","ieee":"D. Bradley et al., “Evolution of flower color pattern through selection on regulatory small RNAs,” Science, vol. 358, no. 6365. American Association for the Advancement of Science, pp. 925–928, 2017.","ama":"Bradley D, Xu P, Mohorianu I, et al. Evolution of flower color pattern through selection on regulatory small RNAs. Science. 2017;358(6365):925-928. doi:10.1126/science.aao3526","apa":"Bradley, D., Xu, P., Mohorianu, I., Whibley, A., Field, D., Tavares, H., … Coen, E. (2017). Evolution of flower color pattern through selection on regulatory small RNAs. Science. American Association for the Advancement of Science. https://doi.org/10.1126/science.aao3526","chicago":"Bradley, Desmond, Ping Xu, Irina Mohorianu, Annabel Whibley, David Field, Hugo Tavares, Matthew Couchman, et al. “Evolution of Flower Color Pattern through Selection on Regulatory Small RNAs.” Science. American Association for the Advancement of Science, 2017. https://doi.org/10.1126/science.aao3526.","ista":"Bradley D, Xu P, Mohorianu I, Whibley A, Field D, Tavares H, Couchman M, Copsey L, Carpenter R, Li M, Li Q, Xue Y, Dalmay T, Coen E. 2017. Evolution of flower color pattern through selection on regulatory small RNAs. Science. 358(6365), 925–928."}}]