[{"status":"public","title":"Efficient strategies for calculating blockwise likelihoods under the coalescent","ddc":["570"],"intvolume":" 202","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","_id":"1518","file":[{"access_level":"open_access","file_name":"IST-2016-561-v1+1_Lohse_et_al_Genetics_2015.pdf","creator":"system","file_size":957466,"content_type":"application/pdf","file_id":"5241","relation":"main_file","checksum":"41c9b5d72e7fe4624dd22dfe622337d5","date_created":"2018-12-12T10:16:51Z","date_updated":"2020-07-14T12:45:00Z"}],"oa_version":"Preprint","pubrep_id":"561","type":"journal_article","abstract":[{"text":"The inference of demographic history from genome data is hindered by a lack of efficient computational approaches. In particular, it has proved difficult to exploit the information contained in the distribution of genealogies across the genome. We have previously shown that the generating function (GF) of genealogies can be used to analytically compute likelihoods of demographic models from configurations of mutations in short sequence blocks (Lohse et al. 2011). Although the GF has a simple, recursive form, the size of such likelihood calculations explodes quickly with the number of individuals and applications of this framework have so far been mainly limited to small samples (pairs and triplets) for which the GF can be written by hand. Here we investigate several strategies for exploiting the inherent symmetries of the coalescent. In particular, we show that the GF of genealogies can be decomposed into a set of equivalence classes that allows likelihood calculations from nontrivial samples. Using this strategy, we automated blockwise likelihood calculations for a general set of demographic scenarios in Mathematica. These histories may involve population size changes, continuous migration, discrete divergence, and admixture between multiple populations. To give a concrete example, we calculate the likelihood for a model of isolation with migration (IM), assuming two diploid samples without phase and outgroup information. We demonstrate the new inference scheme with an analysis of two individual butterfly genomes from the sister species Heliconius melpomene rosina and H. cydno.","lang":"eng"}],"issue":"2","article_type":"original","page":"775 - 786","publication":"Genetics","citation":{"ista":"Lohse K, Chmelik M, Martin S, Barton NH. 2016. Efficient strategies for calculating blockwise likelihoods under the coalescent. Genetics. 202(2), 775–786.","ieee":"K. Lohse, M. Chmelik, S. Martin, and N. H. Barton, “Efficient strategies for calculating blockwise likelihoods under the coalescent,” Genetics, vol. 202, no. 2. Genetics Society of America, pp. 775–786, 2016.","apa":"Lohse, K., Chmelik, M., Martin, S., & Barton, N. H. (2016). Efficient strategies for calculating blockwise likelihoods under the coalescent. Genetics. Genetics Society of America. https://doi.org/10.1534/genetics.115.183814","ama":"Lohse K, Chmelik M, Martin S, Barton NH. Efficient strategies for calculating blockwise likelihoods under the coalescent. Genetics. 2016;202(2):775-786. doi:10.1534/genetics.115.183814","chicago":"Lohse, Konrad, Martin Chmelik, Simon Martin, and Nicholas H Barton. “Efficient Strategies for Calculating Blockwise Likelihoods under the Coalescent.” Genetics. Genetics Society of America, 2016. https://doi.org/10.1534/genetics.115.183814.","mla":"Lohse, Konrad, et al. “Efficient Strategies for Calculating Blockwise Likelihoods under the Coalescent.” Genetics, vol. 202, no. 2, Genetics Society of America, 2016, pp. 775–86, doi:10.1534/genetics.115.183814.","short":"K. Lohse, M. Chmelik, S. Martin, N.H. Barton, Genetics 202 (2016) 775–786."},"date_published":"2016-02-01T00:00:00Z","scopus_import":"1","day":"01","has_accepted_license":"1","article_processing_charge":"No","publication_status":"published","department":[{"_id":"KrCh"},{"_id":"NiBa"}],"publisher":"Genetics Society of America","year":"2016","acknowledgement":"We thank Lynsey Bunnefeld for discussions throughout the project and Joshua Schraiber and one anonymous reviewer\r\nfor constructive comments on an earlier version of this manuscript. This work was supported by funding from the\r\nUnited Kingdom Natural Environment Research Council (to K.L.) (NE/I020288/1) and a grant from the European\r\nResearch Council (250152) (to N.H.B.).","pmid":1,"date_created":"2018-12-11T11:52:29Z","date_updated":"2022-05-24T09:16:22Z","volume":202,"author":[{"full_name":"Lohse, Konrad","last_name":"Lohse","first_name":"Konrad"},{"full_name":"Chmelik, Martin","id":"3624234E-F248-11E8-B48F-1D18A9856A87","last_name":"Chmelik","first_name":"Martin"},{"full_name":"Martin, Simon","last_name":"Martin","first_name":"Simon"},{"full_name":"Barton, Nicholas H","first_name":"Nicholas H","last_name":"Barton","id":"4880FE40-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8548-5240"}],"file_date_updated":"2020-07-14T12:45:00Z","publist_id":"5658","ec_funded":1,"quality_controlled":"1","project":[{"_id":"25B07788-B435-11E9-9278-68D0E5697425","grant_number":"250152","call_identifier":"FP7","name":"Limits to selection in biology and in evolutionary computation"}],"oa":1,"external_id":{"pmid":["26715666"]},"language":[{"iso":"eng"}],"doi":"10.1534/genetics.115.183814","month":"02"},{"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1524","intvolume":" 9271","status":"public","title":"Efficient reduction of kappa models by static inspection of the rule-set","oa_version":"Preprint","type":"conference","alternative_title":["LNCS"],"abstract":[{"lang":"eng","text":"When designing genetic circuits, the typical primitives used in major existing modelling formalisms are gene interaction graphs, where edges between genes denote either an activation or inhibition relation. However, when designing experiments, it is important to be precise about the low-level mechanistic details as to how each such relation is implemented. The rule-based modelling language Kappa allows to unambiguously specify mechanistic details such as DNA binding sites, dimerisation of transcription factors, or co-operative interactions. Such a detailed description comes with complexity and computationally costly executions. We propose a general method for automatically transforming a rule-based program, by eliminating intermediate species and adjusting the rate constants accordingly. To the best of our knowledge, we show the first automated reduction of rule-based models based on equilibrium approximations.\r\nOur algorithm is an adaptation of an existing algorithm, which was designed for reducing reaction-based programs; our version of the algorithm scans the rule-based Kappa model in search for those interaction patterns known to be amenable to equilibrium approximations (e.g. Michaelis-Menten scheme). Additional checks are then performed in order to verify if the reduction is meaningful in the context of the full model. The reduced model is efficiently obtained by static inspection over the rule-set. The tool is tested on a detailed rule-based model of a λ-phage switch, which lists 92 rules and 13 agents. The reduced model has 11 rules and 5 agents, and provides a dramatic reduction in simulation time of several orders of magnitude."}],"citation":{"chicago":"Beica, Andreea, Calin C Guet, and Tatjana Petrov. “Efficient Reduction of Kappa Models by Static Inspection of the Rule-Set,” 9271:173–91. Springer, 2016. https://doi.org/10.1007/978-3-319-26916-0_10.","short":"A. Beica, C.C. Guet, T. Petrov, in:, Springer, 2016, pp. 173–191.","mla":"Beica, Andreea, et al. Efficient Reduction of Kappa Models by Static Inspection of the Rule-Set. Vol. 9271, Springer, 2016, pp. 173–91, doi:10.1007/978-3-319-26916-0_10.","ieee":"A. Beica, C. C. Guet, and T. Petrov, “Efficient reduction of kappa models by static inspection of the rule-set,” presented at the HSB: Hybrid Systems Biology, Madrid, Spain, 2016, vol. 9271, pp. 173–191.","apa":"Beica, A., Guet, C. C., & Petrov, T. (2016). Efficient reduction of kappa models by static inspection of the rule-set (Vol. 9271, pp. 173–191). Presented at the HSB: Hybrid Systems Biology, Madrid, Spain: Springer. https://doi.org/10.1007/978-3-319-26916-0_10","ista":"Beica A, Guet CC, Petrov T. 2016. Efficient reduction of kappa models by static inspection of the rule-set. HSB: Hybrid Systems Biology, LNCS, vol. 9271, 173–191.","ama":"Beica A, Guet CC, Petrov T. Efficient reduction of kappa models by static inspection of the rule-set. In: Vol 9271. Springer; 2016:173-191. doi:10.1007/978-3-319-26916-0_10"},"page":"173 - 191","date_published":"2016-01-10T00:00:00Z","scopus_import":1,"day":"10","year":"2016","acknowledgement":"This research was supported by the People Programme (Marie Curie Actions) of the European Union’s Seventh Framework Programme (FP7/2007-2013) under REA grant agreement no. 291734, and the SNSF Early Postdoc.Mobility Fellowship, the grant number P2EZP2_148797.","publisher":"Springer","department":[{"_id":"CaGu"},{"_id":"ToHe"}],"publication_status":"published","author":[{"full_name":"Beica, Andreea","last_name":"Beica","first_name":"Andreea"},{"full_name":"Guet, Calin C","id":"47F8433E-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-6220-2052","first_name":"Calin C","last_name":"Guet"},{"id":"3D5811FC-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9041-0905","first_name":"Tatjana","last_name":"Petrov","full_name":"Petrov, Tatjana"}],"volume":9271,"date_created":"2018-12-11T11:52:31Z","date_updated":"2021-01-12T06:51:22Z","publist_id":"5649","ec_funded":1,"oa":1,"main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1501.00440"}],"project":[{"grant_number":"291734","_id":"25681D80-B435-11E9-9278-68D0E5697425","name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7"}],"quality_controlled":"1","doi":"10.1007/978-3-319-26916-0_10","conference":{"name":"HSB: Hybrid Systems Biology","location":"Madrid, Spain","start_date":"2015-09-04","end_date":"2015-09-05"},"language":[{"iso":"eng"}],"month":"01"},{"quality_controlled":"1","page":"892 - 901","publication":"Biochimica et Biophysica Acta - Bioenergetics","citation":{"ista":"Berrisford J, Baradaran R, Sazanov LA. 2016. Structure of bacterial respiratory complex I. Biochimica et Biophysica Acta - Bioenergetics. 1857(7), 892–901.","apa":"Berrisford, J., Baradaran, R., & Sazanov, L. A. (2016). Structure of bacterial respiratory complex I. Biochimica et Biophysica Acta - Bioenergetics. Elsevier. https://doi.org/10.1016/j.bbabio.2016.01.012","ieee":"J. Berrisford, R. Baradaran, and L. A. Sazanov, “Structure of bacterial respiratory complex I,” Biochimica et Biophysica Acta - Bioenergetics, vol. 1857, no. 7. Elsevier, pp. 892–901, 2016.","ama":"Berrisford J, Baradaran R, Sazanov LA. Structure of bacterial respiratory complex I. Biochimica et Biophysica Acta - Bioenergetics. 2016;1857(7):892-901. doi:10.1016/j.bbabio.2016.01.012","chicago":"Berrisford, John, Rozbeh Baradaran, and Leonid A Sazanov. “Structure of Bacterial Respiratory Complex I.” Biochimica et Biophysica Acta - Bioenergetics. Elsevier, 2016. https://doi.org/10.1016/j.bbabio.2016.01.012.","mla":"Berrisford, John, et al. “Structure of Bacterial Respiratory Complex I.” Biochimica et Biophysica Acta - Bioenergetics, vol. 1857, no. 7, Elsevier, 2016, pp. 892–901, doi:10.1016/j.bbabio.2016.01.012.","short":"J. Berrisford, R. Baradaran, L.A. Sazanov, Biochimica et Biophysica Acta - Bioenergetics 1857 (2016) 892–901."},"language":[{"iso":"eng"}],"doi":"10.1016/j.bbabio.2016.01.012","date_published":"2016-07-01T00:00:00Z","scopus_import":1,"day":"01","month":"07","publication_status":"published","title":"Structure of bacterial respiratory complex I","status":"public","publisher":"Elsevier","department":[{"_id":"LeSa"}],"intvolume":" 1857","acknowledgement":"funded by the Medical Research Council (Grant number MC_U105674180)","_id":"1521","year":"2016","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","date_created":"2018-12-11T11:52:30Z","date_updated":"2021-01-12T06:51:21Z","volume":1857,"oa_version":"None","author":[{"full_name":"Berrisford, John","first_name":"John","last_name":"Berrisford"},{"full_name":"Baradaran, Rozbeh","last_name":"Baradaran","first_name":"Rozbeh"},{"orcid":"0000-0002-0977-7989","id":"338D39FE-F248-11E8-B48F-1D18A9856A87","last_name":"Sazanov","first_name":"Leonid A","full_name":"Sazanov, Leonid A"}],"type":"journal_article","abstract":[{"lang":"eng","text":"Complex I (NADH:ubiquinone oxidoreductase) plays a central role in cellular energy production, coupling electron transfer between NADH and quinone to proton translocation. It is the largest protein assembly of respiratory chains and one of the most elaborate redox membrane proteins known. Bacterial enzyme is about half the size of mitochondrial and thus provides its important "minimal" model. Dysfunction of mitochondrial complex I is implicated in many human neurodegenerative diseases. The L-shaped complex consists of a hydrophilic arm, where electron transfer occurs, and a membrane arm, where proton translocation takes place. We have solved the crystal structures of the hydrophilic domain of complex I from Thermus thermophilus, the membrane domain from Escherichia coli and recently of the intact, entire complex I from T. thermophilus (536. kDa, 16 subunits, 9 iron-sulphur clusters, 64 transmembrane helices). The 95. Å long electron transfer pathway through the enzyme proceeds from the primary electron acceptor flavin mononucleotide through seven conserved Fe-S clusters to the unusual elongated quinone-binding site at the interface with the membrane domain. Four putative proton translocation channels are found in the membrane domain, all linked by the central flexible axis containing charged residues. The redox energy of electron transfer is coupled to proton translocation by the as yet undefined mechanism proposed to involve long-range conformational changes. This article is part of a Special Issue entitled Respiratory complex I, edited by Volker Zickermann and Ulrich Brandt."}],"issue":"7","publist_id":"5654"},{"abstract":[{"text":"We classify smooth Brunnian (i.e., unknotted on both components) embeddings (S2 × S1) ⊔ S3 → ℝ6. Any Brunnian embedding (S2 × S1) ⊔ S3 → ℝ6 is isotopic to an explicitly constructed embedding fk,m,n for some integers k, m, n such that m ≡ n (mod 2). Two embeddings fk,m,n and fk′ ,m′,n′ are isotopic if and only if k = k′, m ≡ m′ (mod 2k) and n ≡ n′ (mod 2k). We use Haefliger’s classification of embeddings S3 ⊔ S3 → ℝ6 in our proof. The relation between the embeddings (S2 × S1) ⊔ S3 → ℝ6 and S3 ⊔ S3 → ℝ6 is not trivial, however. For example, we show that there exist embeddings f: (S2 ×S1) ⊔ S3 → ℝ6 and g, g′ : S3 ⊔ S3 → ℝ6 such that the componentwise embedded connected sum f # g is isotopic to f # g′ but g is not isotopic to g′.","lang":"eng"}],"issue":"1","type":"journal_article","oa_version":"Preprint","title":"The classification of certain linked 3-manifolds in 6-space","status":"public","intvolume":" 16","_id":"1522","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","day":"01","article_processing_charge":"No","scopus_import":"1","date_published":"2016-01-01T00:00:00Z","article_type":"original","page":"1 - 25","publication":"Moscow Mathematical Journal","citation":{"short":"S. Avvakumov, Moscow Mathematical Journal 16 (2016) 1–25.","mla":"Avvakumov, Sergey. “The Classification of Certain Linked 3-Manifolds in 6-Space.” Moscow Mathematical Journal, vol. 16, no. 1, Independent University of Moscow, 2016, pp. 1–25, doi:10.17323/1609-4514-2016-16-1-1-25.","chicago":"Avvakumov, Sergey. “The Classification of Certain Linked 3-Manifolds in 6-Space.” Moscow Mathematical Journal. Independent University of Moscow, 2016. https://doi.org/10.17323/1609-4514-2016-16-1-1-25.","ama":"Avvakumov S. The classification of certain linked 3-manifolds in 6-space. Moscow Mathematical Journal. 2016;16(1):1-25. doi:10.17323/1609-4514-2016-16-1-1-25","ieee":"S. Avvakumov, “The classification of certain linked 3-manifolds in 6-space,” Moscow Mathematical Journal, vol. 16, no. 1. Independent University of Moscow, pp. 1–25, 2016.","apa":"Avvakumov, S. (2016). The classification of certain linked 3-manifolds in 6-space. Moscow Mathematical Journal. Independent University of Moscow. https://doi.org/10.17323/1609-4514-2016-16-1-1-25","ista":"Avvakumov S. 2016. The classification of certain linked 3-manifolds in 6-space. Moscow Mathematical Journal. 16(1), 1–25."},"publist_id":"5652","date_updated":"2022-02-25T10:15:57Z","date_created":"2018-12-11T11:52:30Z","volume":16,"author":[{"first_name":"Serhii","last_name":"Avvakumov","id":"3827DAC8-F248-11E8-B48F-1D18A9856A87","full_name":"Avvakumov, Serhii"}],"publication_status":"published","publisher":"Independent University of Moscow","department":[{"_id":"UlWa"}],"acknowledgement":"I thank A. Skopenkov for telling me about the problem and for his useful remarks. I also thank A. Sossinsky,\r\nA. Zhubr, M. Skopenkov, P. Akhmetiev, and an anonymous referee for their feedback. Author was partially\r\nsupported by Dobrushin fellowship, 2013, and by RFBR grant 15-01-06302.","year":"2016","month":"01","publication_identifier":{"eissn":["1609-4514"]},"language":[{"iso":"eng"}],"doi":"10.17323/1609-4514-2016-16-1-1-25","quality_controlled":"1","oa":1,"main_file_link":[{"url":"http://arxiv.org/abs/1408.3918","open_access":"1"}],"external_id":{"arxiv":["1408.3918"]}},{"month":"04","main_file_link":[{"url":"http://arxiv.org/abs/1404.2106","open_access":"1"}],"oa":1,"quality_controlled":"1","doi":"10.1090/proc/12824","language":[{"iso":"eng"}],"publist_id":"5650","year":"2016","acknowledgement":"This research was supported by the Swiss National Science Foundation (SNF Projects 200021-125309 and 200020-138230","department":[{"_id":"UlWa"}],"publisher":"American Mathematical Society","publication_status":"published","author":[{"last_name":"Gundert","first_name":"Anna","full_name":"Gundert, Anna"},{"orcid":"0000-0002-1494-0568","id":"36690CA2-F248-11E8-B48F-1D18A9856A87","last_name":"Wagner","first_name":"Uli","full_name":"Wagner, Uli"}],"volume":144,"date_updated":"2021-01-12T06:51:22Z","date_created":"2018-12-11T11:52:30Z","scopus_import":1,"day":"01","citation":{"chicago":"Gundert, Anna, and Uli Wagner. “On Topological Minors in Random Simplicial Complexes.” Proceedings of the American Mathematical Society. American Mathematical Society, 2016. https://doi.org/10.1090/proc/12824.","short":"A. Gundert, U. Wagner, Proceedings of the American Mathematical Society 144 (2016) 1815–1828.","mla":"Gundert, Anna, and Uli Wagner. “On Topological Minors in Random Simplicial Complexes.” Proceedings of the American Mathematical Society, vol. 144, no. 4, American Mathematical Society, 2016, pp. 1815–28, doi:10.1090/proc/12824.","apa":"Gundert, A., & Wagner, U. (2016). On topological minors in random simplicial complexes. Proceedings of the American Mathematical Society. American Mathematical Society. https://doi.org/10.1090/proc/12824","ieee":"A. Gundert and U. Wagner, “On topological minors in random simplicial complexes,” Proceedings of the American Mathematical Society, vol. 144, no. 4. American Mathematical Society, pp. 1815–1828, 2016.","ista":"Gundert A, Wagner U. 2016. On topological minors in random simplicial complexes. Proceedings of the American Mathematical Society. 144(4), 1815–1828.","ama":"Gundert A, Wagner U. On topological minors in random simplicial complexes. Proceedings of the American Mathematical Society. 2016;144(4):1815-1828. doi:10.1090/proc/12824"},"publication":"Proceedings of the American Mathematical Society","page":"1815 - 1828","date_published":"2016-04-01T00:00:00Z","type":"journal_article","issue":"4","abstract":[{"lang":"eng","text":"For random graphs, the containment problem considers the probability that a binomial random graph G(n, p) contains a given graph as a substructure. When asking for the graph as a topological minor, i.e., for a copy of a subdivision of the given graph, it is well known that the (sharp) threshold is at p = 1/n. We consider a natural analogue of this question for higher-dimensional random complexes Xk(n, p), first studied by Cohen, Costa, Farber and Kappeler for k = 2. Improving previous results, we show that p = Θ(1/ √n) is the (coarse) threshold for containing a subdivision of any fixed complete 2-complex. For higher dimensions k > 2, we get that p = O(n−1/k) is an upper bound for the threshold probability of containing a subdivision of a fixed k-dimensional complex."}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1523","intvolume":" 144","status":"public","title":"On topological minors in random simplicial complexes","oa_version":"Preprint"},{"month":"01","main_file_link":[{"url":"http://arxiv.org/abs/1506.01233","open_access":"1"}],"oa":1,"project":[{"name":"Quantitative Reactive Modeling","call_identifier":"FP7","_id":"25EE3708-B435-11E9-9278-68D0E5697425","grant_number":"267989"},{"grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"The Wittgenstein Prize"},{"name":"Rigorous Systems Engineering","call_identifier":"FWF","grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425"}],"quality_controlled":"1","doi":"10.1007/978-3-662-49122-5_12","conference":{"location":"St. Petersburg, FL, USA","start_date":"2016-01-17","end_date":"2016-01-19","name":"VMCAI: Verification, Model Checking and Abstract Interpretation"},"language":[{"iso":"eng"}],"ec_funded":1,"publist_id":"5647","year":"2016","acknowledgement":"This research was supported in part by the European Research Council (ERC) under grant 267989 (QUAREM), by the Austrian Science Fund (FWF) under grants S11402-N23 (RiSE) and Z211-N23 (Wittgenstein Award), and by the National Science Centre (NCN), Poland under grant 2014/15/D/ST6/04543.","department":[{"_id":"ToHe"}],"publisher":"Springer","publication_status":"published","author":[{"last_name":"Henzinger","first_name":"Thomas A","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A"},{"full_name":"Otop, Jan","id":"2FC5DA74-F248-11E8-B48F-1D18A9856A87","last_name":"Otop","first_name":"Jan"},{"last_name":"Samanta","first_name":"Roopsha","id":"3D2AAC08-F248-11E8-B48F-1D18A9856A87","full_name":"Samanta, Roopsha"}],"volume":9583,"date_updated":"2021-01-12T06:51:23Z","date_created":"2018-12-11T11:52:32Z","scopus_import":1,"day":"01","citation":{"short":"T.A. Henzinger, J. Otop, R. Samanta, in:, Springer, 2016, pp. 250–267.","mla":"Henzinger, Thomas A., et al. Lipschitz Robustness of Timed I/O Systems. Vol. 9583, Springer, 2016, pp. 250–67, doi:10.1007/978-3-662-49122-5_12.","chicago":"Henzinger, Thomas A, Jan Otop, and Roopsha Samanta. “Lipschitz Robustness of Timed I/O Systems,” 9583:250–67. Springer, 2016. https://doi.org/10.1007/978-3-662-49122-5_12.","ama":"Henzinger TA, Otop J, Samanta R. Lipschitz robustness of timed I/O systems. In: Vol 9583. Springer; 2016:250-267. doi:10.1007/978-3-662-49122-5_12","ieee":"T. A. Henzinger, J. Otop, and R. Samanta, “Lipschitz robustness of timed I/O systems,” presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, St. Petersburg, FL, USA, 2016, vol. 9583, pp. 250–267.","apa":"Henzinger, T. A., Otop, J., & Samanta, R. (2016). Lipschitz robustness of timed I/O systems (Vol. 9583, pp. 250–267). Presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, St. Petersburg, FL, USA: Springer. https://doi.org/10.1007/978-3-662-49122-5_12","ista":"Henzinger TA, Otop J, Samanta R. 2016. Lipschitz robustness of timed I/O systems. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS, vol. 9583, 250–267."},"page":"250 - 267","date_published":"2016-01-01T00:00:00Z","type":"conference","alternative_title":["LNCS"],"abstract":[{"text":"We present the first study of robustness of systems that are both timed as well as reactive (I/O). We study the behavior of such timed I/O systems in the presence of uncertain inputs and formalize their robustness using the analytic notion of Lipschitz continuity: a timed I/O system is K-(Lipschitz) robust if the perturbation in its output is at most K times the perturbation in its input. We quantify input and output perturbation using similarity functions over timed words such as the timed version of the Manhattan distance and the Skorokhod distance. We consider two models of timed I/O systems — timed transducers and asynchronous sequential circuits. We show that K-robustness of timed transducers can be decided in polynomial space under certain conditions. For asynchronous sequential circuits, we reduce K-robustness w.r.t. timed Manhattan distances to K-robustness of discrete letter-to-letter transducers and show PSpace-completeness of the problem.","lang":"eng"}],"_id":"1526","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","intvolume":" 9583","title":"Lipschitz robustness of timed I/O systems","status":"public","oa_version":"Preprint"},{"oa":1,"main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1508.07321"}],"quality_controlled":"1","project":[{"grant_number":"291734","_id":"25681D80-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme"},{"call_identifier":"FWF","name":"Structure of the Excitation Spectrum for Many-Body Quantum Systems","grant_number":"P27533_N27","_id":"25C878CE-B435-11E9-9278-68D0E5697425"}],"doi":"10.1016/j.jfa.2015.12.007","language":[{"iso":"eng"}],"month":"06","year":"2016","acknowledgement":"We thank Jan Dereziński for several inspiring discussions and useful remarks. We thank the referee for helpful comments. J.P.S. thanks the Erwin Schrödinger Institute for the hospitality during the thematic programme “Quantum many-body systems, random matrices, and disorder”. We gratefully acknowledge the financial supports by the European Union's Seventh Framework Programme under the ERC Advanced Grant ERC-2012-AdG 321029 (J.P.S.) and the REA grant agreement No. 291734 (P.T.N.), as well as the support of the National Science Center (NCN) grant No. 2012/07/N/ST1/03185 and the Austrian Science Fund (FWF) project No. P 27533-N27 (M.N.).","publication_status":"published","department":[{"_id":"RoSe"}],"publisher":"Academic Press","author":[{"first_name":"Phan","last_name":"Nam","id":"404092F4-F248-11E8-B48F-1D18A9856A87","full_name":"Nam, Phan"},{"full_name":"Napiórkowski, Marcin M","first_name":"Marcin M","last_name":"Napiórkowski","id":"4197AD04-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Jan","last_name":"Solovej","full_name":"Solovej, Jan"}],"date_created":"2018-12-11T11:52:38Z","date_updated":"2021-01-12T06:51:30Z","volume":270,"publist_id":"5626","ec_funded":1,"publication":"Journal of Functional Analysis","citation":{"mla":"Nam, Phan, et al. “Diagonalization of Bosonic Quadratic Hamiltonians by Bogoliubov Transformations.” Journal of Functional Analysis, vol. 270, no. 11, Academic Press, 2016, pp. 4340–68, doi:10.1016/j.jfa.2015.12.007.","short":"P. Nam, M.M. Napiórkowski, J. Solovej, Journal of Functional Analysis 270 (2016) 4340–4368.","chicago":"Nam, Phan, Marcin M Napiórkowski, and Jan Solovej. “Diagonalization of Bosonic Quadratic Hamiltonians by Bogoliubov Transformations.” Journal of Functional Analysis. Academic Press, 2016. https://doi.org/10.1016/j.jfa.2015.12.007.","ama":"Nam P, Napiórkowski MM, Solovej J. Diagonalization of bosonic quadratic Hamiltonians by Bogoliubov transformations. Journal of Functional Analysis. 2016;270(11):4340-4368. doi:10.1016/j.jfa.2015.12.007","ista":"Nam P, Napiórkowski MM, Solovej J. 2016. Diagonalization of bosonic quadratic Hamiltonians by Bogoliubov transformations. Journal of Functional Analysis. 270(11), 4340–4368.","apa":"Nam, P., Napiórkowski, M. M., & Solovej, J. (2016). Diagonalization of bosonic quadratic Hamiltonians by Bogoliubov transformations. Journal of Functional Analysis. Academic Press. https://doi.org/10.1016/j.jfa.2015.12.007","ieee":"P. Nam, M. M. Napiórkowski, and J. Solovej, “Diagonalization of bosonic quadratic Hamiltonians by Bogoliubov transformations,” Journal of Functional Analysis, vol. 270, no. 11. Academic Press, pp. 4340–4368, 2016."},"page":"4340 - 4368","date_published":"2016-06-01T00:00:00Z","scopus_import":1,"day":"01","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1545","status":"public","title":"Diagonalization of bosonic quadratic Hamiltonians by Bogoliubov transformations","intvolume":" 270","oa_version":"Submitted Version","type":"journal_article","abstract":[{"text":"We provide general conditions for which bosonic quadratic Hamiltonians on Fock spaces can be diagonalized by Bogoliubov transformations. Our results cover the case when quantum systems have infinite degrees of freedom and the associated one-body kinetic and paring operators are unbounded. Our sufficient conditions are optimal in the sense that they become necessary when the relevant one-body operators commute.","lang":"eng"}],"issue":"11"},{"date_published":"2016-01-13T00:00:00Z","publication":"Proceedings of the Royal Society of London Series B Biological Sciences","citation":{"chicago":"Qi, Qin, Macarena Toll Riera, Karl Heilbron, Gail Preston, and R Craig Maclean. “The Genomic Basis of Adaptation to the Fitness Cost of Rifampicin Resistance in Pseudomonas Aeruginosa.” Proceedings of the Royal Society of London Series B Biological Sciences. Royal Society, The, 2016. https://doi.org/10.1098/rspb.2015.2452.","short":"Q. Qi, M. Toll Riera, K. Heilbron, G. Preston, R.C. Maclean, Proceedings of the Royal Society of London Series B Biological Sciences 283 (2016).","mla":"Qi, Qin, et al. “The Genomic Basis of Adaptation to the Fitness Cost of Rifampicin Resistance in Pseudomonas Aeruginosa.” Proceedings of the Royal Society of London Series B Biological Sciences, vol. 283, no. 1822, 20152452, Royal Society, The, 2016, doi:10.1098/rspb.2015.2452.","ieee":"Q. Qi, M. Toll Riera, K. Heilbron, G. Preston, and R. C. Maclean, “The genomic basis of adaptation to the fitness cost of rifampicin resistance in Pseudomonas aeruginosa,” Proceedings of the Royal Society of London Series B Biological Sciences, vol. 283, no. 1822. Royal Society, The, 2016.","apa":"Qi, Q., Toll Riera, M., Heilbron, K., Preston, G., & Maclean, R. C. (2016). The genomic basis of adaptation to the fitness cost of rifampicin resistance in Pseudomonas aeruginosa. Proceedings of the Royal Society of London Series B Biological Sciences. Royal Society, The. https://doi.org/10.1098/rspb.2015.2452","ista":"Qi Q, Toll Riera M, Heilbron K, Preston G, Maclean RC. 2016. The genomic basis of adaptation to the fitness cost of rifampicin resistance in Pseudomonas aeruginosa. Proceedings of the Royal Society of London Series B Biological Sciences. 283(1822), 20152452.","ama":"Qi Q, Toll Riera M, Heilbron K, Preston G, Maclean RC. The genomic basis of adaptation to the fitness cost of rifampicin resistance in Pseudomonas aeruginosa. Proceedings of the Royal Society of London Series B Biological Sciences. 2016;283(1822). doi:10.1098/rspb.2015.2452"},"day":"13","has_accepted_license":"1","scopus_import":1,"pubrep_id":"488","file":[{"creator":"system","file_size":626804,"content_type":"application/pdf","file_name":"IST-2016-488-v1+1_20152452.full.pdf","access_level":"open_access","date_updated":"2020-07-14T12:45:02Z","date_created":"2018-12-12T10:11:43Z","checksum":"78ffe70c1c88af3856d31ca6b7195a27","file_id":"4899","relation":"main_file"}],"oa_version":"Published Version","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1552","status":"public","ddc":["570"],"title":"The genomic basis of adaptation to the fitness cost of rifampicin resistance in Pseudomonas aeruginosa","intvolume":" 283","abstract":[{"text":"Antibiotic resistance carries a fitness cost that must be overcome in order for resistance to persist over the long term. Compensatory mutations that recover the functional defects associated with resistance mutations have been argued to play a key role in overcoming the cost of resistance, but compensatory mutations are expected to be rare relative to generally beneficial mutations that increase fitness, irrespective of antibiotic resistance. Given this asymmetry, population genetics theory predicts that populations should adapt by compensatory mutations when the cost of resistance is large, whereas generally beneficial mutations should drive adaptation when the cost of resistance is small. We tested this prediction by determining the genomic mechanisms underpinning adaptation to antibiotic-free conditions in populations of the pathogenic bacterium Pseudomonas aeruginosa that carry costly antibiotic resistance mutations. Whole-genome sequencing revealed that populations founded by high-cost rifampicin-resistant mutants adapted via compensatory mutations in three genes of the RNA polymerase core enzyme, whereas populations founded by low-cost mutants adapted by generally beneficial mutations, predominantly in the quorum-sensing transcriptional regulator gene lasR. Even though the importance of compensatory evolution in maintaining resistance has been widely recognized, our study shows that the roles of general adaptation in maintaining resistance should not be underestimated and highlights the need to understand how selection at other sites in the genome influences the dynamics of resistance alleles in clinical settings.","lang":"eng"}],"issue":"1822","type":"journal_article","doi":"10.1098/rspb.2015.2452","language":[{"iso":"eng"}],"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"oa":1,"quality_controlled":"1","month":"01","author":[{"full_name":"Qi, Qin","first_name":"Qin","last_name":"Qi","id":"3B22D412-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-6148-2416"},{"first_name":"Macarena","last_name":"Toll Riera","full_name":"Toll Riera, Macarena"},{"full_name":"Heilbron, Karl","last_name":"Heilbron","first_name":"Karl"},{"full_name":"Preston, Gail","first_name":"Gail","last_name":"Preston"},{"full_name":"Maclean, R Craig","last_name":"Maclean","first_name":"R Craig"}],"date_updated":"2021-01-12T06:51:33Z","date_created":"2018-12-11T11:52:40Z","volume":283,"acknowledgement":"We thank the High-Throughput Genomics Group at the Wellcome Trust Centre for Human Genetics funded by Wellcome\r\nTrust grant reference 090532/Z/09/Z and Medical Research Council Hub grant no. G0900747 91070 for generation of the high-throughput sequencing data. We thank Wook Kim and two anonymous reviewers for their constructive feedback on previous versions of our manuscript.","year":"2016","publication_status":"published","department":[{"_id":"ToBo"}],"publisher":"Royal Society, The","file_date_updated":"2020-07-14T12:45:02Z","publist_id":"5619","license":"https://creativecommons.org/licenses/by/4.0/","article_number":"20152452"},{"license":"https://creativecommons.org/licenses/by-nc-nd/4.0/","file_date_updated":"2020-07-14T12:44:42Z","publist_id":"6027","publication_status":"published","department":[{"_id":"HeEd"}],"publisher":"Elsevier","year":"2016","date_created":"2018-12-11T11:51:10Z","date_updated":"2023-02-23T10:04:40Z","volume":83,"author":[{"full_name":"Dunaeva, Olga","last_name":"Dunaeva","first_name":"Olga"},{"full_name":"Edelsbrunner, Herbert","first_name":"Herbert","last_name":"Edelsbrunner","id":"3FB178DA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9823-6833"},{"first_name":"Anton","last_name":"Lukyanov","full_name":"Lukyanov, Anton"},{"full_name":"Machin, Michael","last_name":"Machin","first_name":"Michael"},{"full_name":"Malkova, Daria","last_name":"Malkova","first_name":"Daria"},{"last_name":"Kuvaev","first_name":"Roman","full_name":"Kuvaev, Roman"},{"full_name":"Kashin, Sergey","first_name":"Sergey","last_name":"Kashin"}],"related_material":{"record":[{"relation":"earlier_version","status":"public","id":"1568"}]},"month":"11","quality_controlled":"1","tmp":{"name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","short":"CC BY-NC-ND (4.0)","image":"/images/cc_by_nc_nd.png"},"oa":1,"language":[{"iso":"eng"}],"doi":"10.1016/j.patrec.2015.12.012","type":"journal_article","abstract":[{"lang":"eng","text":"Aiming at the automatic diagnosis of tumors using narrow band imaging (NBI) magnifying endoscopic (ME) images of the stomach, we combine methods from image processing, topology, geometry, and machine learning to classify patterns into three classes: oval, tubular and irregular. Training the algorithm on a small number of images of each type, we achieve a high rate of correct classifications. The analysis of the learning algorithm reveals that a handful of geometric and topological features are responsible for the overwhelming majority of decisions."}],"issue":"1","ddc":["004","514"],"status":"public","title":"The classification of endoscopy images with persistent homology","intvolume":" 83","_id":"1289","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","oa_version":"Submitted Version","file":[{"checksum":"33458bbb8c32a339e1adeca6d5a1112d","date_updated":"2020-07-14T12:44:42Z","date_created":"2019-04-17T07:55:51Z","file_id":"6334","relation":"main_file","creator":"dernst","content_type":"application/pdf","file_size":1921113,"access_level":"open_access","file_name":"2016-Edelsbrunner_The_classification.pdf"}],"pubrep_id":"975","scopus_import":1,"day":"01","article_processing_charge":"No","has_accepted_license":"1","page":"13 - 22","publication":"Pattern Recognition Letters","citation":{"short":"O. Dunaeva, H. Edelsbrunner, A. Lukyanov, M. Machin, D. Malkova, R. Kuvaev, S. Kashin, Pattern Recognition Letters 83 (2016) 13–22.","mla":"Dunaeva, Olga, et al. “The Classification of Endoscopy Images with Persistent Homology.” Pattern Recognition Letters, vol. 83, no. 1, Elsevier, 2016, pp. 13–22, doi:10.1016/j.patrec.2015.12.012.","chicago":"Dunaeva, Olga, Herbert Edelsbrunner, Anton Lukyanov, Michael Machin, Daria Malkova, Roman Kuvaev, and Sergey Kashin. “The Classification of Endoscopy Images with Persistent Homology.” Pattern Recognition Letters. Elsevier, 2016. https://doi.org/10.1016/j.patrec.2015.12.012.","ama":"Dunaeva O, Edelsbrunner H, Lukyanov A, et al. The classification of endoscopy images with persistent homology. Pattern Recognition Letters. 2016;83(1):13-22. doi:10.1016/j.patrec.2015.12.012","apa":"Dunaeva, O., Edelsbrunner, H., Lukyanov, A., Machin, M., Malkova, D., Kuvaev, R., & Kashin, S. (2016). The classification of endoscopy images with persistent homology. Pattern Recognition Letters. Elsevier. https://doi.org/10.1016/j.patrec.2015.12.012","ieee":"O. Dunaeva et al., “The classification of endoscopy images with persistent homology,” Pattern Recognition Letters, vol. 83, no. 1. Elsevier, pp. 13–22, 2016.","ista":"Dunaeva O, Edelsbrunner H, Lukyanov A, Machin M, Malkova D, Kuvaev R, Kashin S. 2016. The classification of endoscopy images with persistent homology. Pattern Recognition Letters. 83(1), 13–22."},"date_published":"2016-11-01T00:00:00Z"},{"external_id":{"arxiv":["1608.08662"]},"oa":1,"main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1608.08662"}],"quality_controlled":"1","project":[{"call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme","grant_number":"291734","_id":"25681D80-B435-11E9-9278-68D0E5697425"}],"conference":{"start_date":"2016-09-19","location":"Athens, Greece","end_date":"2016-09-21","name":"GD: Graph Drawing and Network Visualization"},"doi":"10.1007/978-3-319-50106-2_36","language":[{"iso":"eng"}],"month":"12","year":"2016","publication_status":"published","department":[{"_id":"UlWa"}],"publisher":"Springer","author":[{"full_name":"Fulek, Radoslav","orcid":"0000-0001-8485-1774","id":"39F3FFE4-F248-11E8-B48F-1D18A9856A87","last_name":"Fulek","first_name":"Radoslav"},{"full_name":"Pelsmajer, Michael","last_name":"Pelsmajer","first_name":"Michael"},{"full_name":"Schaefer, Marcus","first_name":"Marcus","last_name":"Schaefer"}],"related_material":{"record":[{"id":"1113","status":"public","relation":"later_version"},{"status":"public","relation":"earlier_version","id":"1595"}]},"date_created":"2018-12-11T11:50:29Z","date_updated":"2023-02-23T10:05:57Z","volume":9801,"publist_id":"6193","ec_funded":1,"citation":{"ista":"Fulek R, Pelsmajer M, Schaefer M. 2016. Hanani-Tutte for radial planarity II. GD: Graph Drawing and Network Visualization, LNCS, vol. 9801, 468–481.","ieee":"R. Fulek, M. Pelsmajer, and M. Schaefer, “Hanani-Tutte for radial planarity II,” presented at the GD: Graph Drawing and Network Visualization, Athens, Greece, 2016, vol. 9801, pp. 468–481.","apa":"Fulek, R., Pelsmajer, M., & Schaefer, M. (2016). Hanani-Tutte for radial planarity II (Vol. 9801, pp. 468–481). Presented at the GD: Graph Drawing and Network Visualization, Athens, Greece: Springer. https://doi.org/10.1007/978-3-319-50106-2_36","ama":"Fulek R, Pelsmajer M, Schaefer M. Hanani-Tutte for radial planarity II. In: Vol 9801. Springer; 2016:468-481. doi:10.1007/978-3-319-50106-2_36","chicago":"Fulek, Radoslav, Michael Pelsmajer, and Marcus Schaefer. “Hanani-Tutte for Radial Planarity II,” 9801:468–81. Springer, 2016. https://doi.org/10.1007/978-3-319-50106-2_36.","mla":"Fulek, Radoslav, et al. Hanani-Tutte for Radial Planarity II. Vol. 9801, Springer, 2016, pp. 468–81, doi:10.1007/978-3-319-50106-2_36.","short":"R. Fulek, M. Pelsmajer, M. Schaefer, in:, Springer, 2016, pp. 468–481."},"page":"468 - 481","date_published":"2016-12-08T00:00:00Z","scopus_import":1,"day":"08","article_processing_charge":"No","_id":"1164","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","status":"public","title":"Hanani-Tutte for radial planarity II","intvolume":" 9801","oa_version":"Preprint","type":"conference","alternative_title":["LNCS"],"abstract":[{"text":"A drawing of a graph G is radial if the vertices of G are placed on concentric circles C1, … , Ck with common center c, and edges are drawn radially: every edge intersects every circle centered at c at most once. G is radial planar if it has a radial embedding, that is, a crossing-free radial drawing. If the vertices of G are ordered or partitioned into ordered levels (as they are for leveled graphs), we require that the assignment of vertices to circles corresponds to the given ordering or leveling. A pair of edges e and f in a graph is independent if e and f do not share a vertex. We show that a graph G is radial planar if G has a radial drawing in which every two independent edges cross an even number of times; the radial embedding has the same leveling as the radial drawing. In other words, we establish the strong Hanani-Tutte theorem for radial planarity. This characterization yields a very simple algorithm for radial planarity testing.","lang":"eng"}]},{"date_published":"2016-04-01T00:00:00Z","doi":"10.1007/s00145-014-9196-7","language":[{"iso":"eng"}],"publication":"Journal of Cryptology","citation":{"mla":"Abe, Masayuki, et al. “Structure Preserving Signatures and Commitments to Group Elements.” Journal of Cryptology, vol. 29, no. 2, Springer, 2016, pp. 363–421, doi:10.1007/s00145-014-9196-7.","short":"M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, M. Ohkubo, Journal of Cryptology 29 (2016) 363–421.","chicago":"Abe, Masayuki, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, and Miyako Ohkubo. “Structure Preserving Signatures and Commitments to Group Elements.” Journal of Cryptology. Springer, 2016. https://doi.org/10.1007/s00145-014-9196-7.","ama":"Abe M, Fuchsbauer G, Groth J, Haralambiev K, Ohkubo M. Structure preserving signatures and commitments to group elements. Journal of Cryptology. 2016;29(2):363-421. doi:10.1007/s00145-014-9196-7","ista":"Abe M, Fuchsbauer G, Groth J, Haralambiev K, Ohkubo M. 2016. Structure preserving signatures and commitments to group elements. Journal of Cryptology. 29(2), 363–421.","ieee":"M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, and M. Ohkubo, “Structure preserving signatures and commitments to group elements,” Journal of Cryptology, vol. 29, no. 2. Springer, pp. 363–421, 2016.","apa":"Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., & Ohkubo, M. (2016). Structure preserving signatures and commitments to group elements. Journal of Cryptology. Springer. https://doi.org/10.1007/s00145-014-9196-7"},"quality_controlled":"1","page":"363 - 421","day":"01","month":"04","scopus_import":1,"author":[{"full_name":"Abe, Masayuki","first_name":"Masayuki","last_name":"Abe"},{"full_name":"Fuchsbauer, Georg","id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","first_name":"Georg","last_name":"Fuchsbauer"},{"last_name":"Groth","first_name":"Jens","full_name":"Groth, Jens"},{"last_name":"Haralambiev","first_name":"Kristiyan","full_name":"Haralambiev, Kristiyan"},{"first_name":"Miyako","last_name":"Ohkubo","full_name":"Ohkubo, Miyako"}],"date_updated":"2021-01-12T06:51:49Z","date_created":"2018-12-11T11:52:54Z","oa_version":"None","volume":29,"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1592","year":"2016","acknowledgement":"The authors would like to thank the anonymous reviewers of this paper. We also would like to express our appreciation to the program committee and the anonymous reviewers for CRYPTO 2010. The first author thanks Sherman S. M. Chow for his comment on group signatures in Sect. 7.1.","status":"public","publication_status":"published","title":"Structure preserving signatures and commitments to group elements","intvolume":" 29","department":[{"_id":"KrPi"}],"publisher":"Springer","abstract":[{"lang":"eng","text":"A modular approach to constructing cryptographic protocols leads to simple designs but often inefficient instantiations. On the other hand, ad hoc constructions may yield efficient protocols at the cost of losing conceptual simplicity. We suggest a new design paradigm, structure-preserving cryptography, that provides a way to construct modular protocols with reasonable efficiency while retaining conceptual simplicity. A cryptographic scheme over a bilinear group is called structure-preserving if its public inputs and outputs consist of elements from the bilinear groups and their consistency can be verified by evaluating pairing-product equations. As structure-preserving schemes smoothly interoperate with each other, they are useful as building blocks in modular design of cryptographic applications. This paper introduces structure-preserving commitment and signature schemes over bilinear groups with several desirable properties. The commitment schemes include homomorphic, trapdoor and length-reducing commitments to group elements, and the structure-preserving signature schemes are the first ones that yield constant-size signatures on multiple group elements. A structure-preserving signature scheme is called automorphic if the public keys lie in the message space, which cannot be achieved by compressing inputs via a cryptographic hash function, as this would destroy the mathematical structure we are trying to preserve. Automorphic signatures can be used for building certification chains underlying privacy-preserving protocols. Among a vast number of applications of structure-preserving protocols, we present an efficient round-optimal blind-signature scheme and a group signature scheme with an efficient and concurrently secure protocol for enrolling new members."}],"issue":"2","publist_id":"5579","type":"journal_article"},{"external_id":{"pmid":["26657283"]},"main_file_link":[{"url":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5583642/","open_access":"1"}],"oa":1,"quality_controlled":"1","project":[{"grant_number":"281556","_id":"25A603A2-B435-11E9-9278-68D0E5697425","name":"Cytoskeletal force generation and force transduction of migrating leukocytes (EU)","call_identifier":"FP7"},{"_id":"25A76F58-B435-11E9-9278-68D0E5697425","grant_number":"289720","call_identifier":"FP7","name":"Stromal Cell-immune Cell Interactions in Health and Disease"},{"name":"Cytoskeletal force generation and transduction of leukocytes (FWF)","call_identifier":"FWF","_id":"25A8E5EA-B435-11E9-9278-68D0E5697425","grant_number":"Y 564-B12"}],"doi":"10.1126/science.aad0512","acknowledged_ssus":[{"_id":"SSU"}],"language":[{"iso":"eng"}],"month":"01","acknowledgement":"We thank S. Schüchner and E. Ogris for kindly providing the antibody to GFP, M. Helmbrecht and A. Huber for providing Nrp2−/− mice, the IST Scientific Support Facilities for excellent services, and J. Renkawitz and K. Vaahtomeri for critically reading the manuscript. ","year":"2016","pmid":1,"publication_status":"published","publisher":"American Association for the Advancement of Science","department":[{"_id":"MiSi"}],"author":[{"first_name":"Eva","last_name":"Kiermaier","id":"3EB04B78-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-6165-5738","full_name":"Kiermaier, Eva"},{"first_name":"Christine","last_name":"Moussion","id":"3356F664-F248-11E8-B48F-1D18A9856A87","full_name":"Moussion, Christine"},{"first_name":"Christopher","last_name":"Veldkamp","full_name":"Veldkamp, Christopher"},{"full_name":"Gerardy Schahn, Rita","last_name":"Gerardy Schahn","first_name":"Rita"},{"id":"4C7D837E-F248-11E8-B48F-1D18A9856A87","first_name":"Ingrid","last_name":"De Vries","full_name":"De Vries, Ingrid"},{"full_name":"Williams, Larry","first_name":"Larry","last_name":"Williams"},{"full_name":"Chaffee, Gary","last_name":"Chaffee","first_name":"Gary"},{"last_name":"Phillips","first_name":"Andrew","full_name":"Phillips, Andrew"},{"last_name":"Freiberger","first_name":"Friedrich","full_name":"Freiberger, Friedrich"},{"last_name":"Imre","first_name":"Richard","full_name":"Imre, Richard"},{"full_name":"Taleski, Deni","last_name":"Taleski","first_name":"Deni"},{"full_name":"Payne, Richard","last_name":"Payne","first_name":"Richard"},{"full_name":"Braun, Asolina","first_name":"Asolina","last_name":"Braun"},{"full_name":"Förster, Reinhold","first_name":"Reinhold","last_name":"Förster"},{"last_name":"Mechtler","first_name":"Karl","full_name":"Mechtler, Karl"},{"full_name":"Mühlenhoff, Martina","first_name":"Martina","last_name":"Mühlenhoff"},{"full_name":"Volkman, Brian","last_name":"Volkman","first_name":"Brian"},{"full_name":"Sixt, Michael K","first_name":"Michael K","last_name":"Sixt","id":"41E9FBEA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-6620-9179"}],"date_updated":"2021-01-12T06:51:52Z","date_created":"2018-12-11T11:52:57Z","volume":351,"ec_funded":1,"publist_id":"5570","publication":"Science","citation":{"ista":"Kiermaier E, Moussion C, Veldkamp C, Gerardy Schahn R, de Vries I, Williams L, Chaffee G, Phillips A, Freiberger F, Imre R, Taleski D, Payne R, Braun A, Förster R, Mechtler K, Mühlenhoff M, Volkman B, Sixt MK. 2016. Polysialylation controls dendritic cell trafficking by regulating chemokine recognition. Science. 351(6269), 186–190.","apa":"Kiermaier, E., Moussion, C., Veldkamp, C., Gerardy Schahn, R., de Vries, I., Williams, L., … Sixt, M. K. (2016). Polysialylation controls dendritic cell trafficking by regulating chemokine recognition. Science. American Association for the Advancement of Science. https://doi.org/10.1126/science.aad0512","ieee":"E. Kiermaier et al., “Polysialylation controls dendritic cell trafficking by regulating chemokine recognition,” Science, vol. 351, no. 6269. American Association for the Advancement of Science, pp. 186–190, 2016.","ama":"Kiermaier E, Moussion C, Veldkamp C, et al. Polysialylation controls dendritic cell trafficking by regulating chemokine recognition. Science. 2016;351(6269):186-190. doi:10.1126/science.aad0512","chicago":"Kiermaier, Eva, Christine Moussion, Christopher Veldkamp, Rita Gerardy Schahn, Ingrid de Vries, Larry Williams, Gary Chaffee, et al. “Polysialylation Controls Dendritic Cell Trafficking by Regulating Chemokine Recognition.” Science. American Association for the Advancement of Science, 2016. https://doi.org/10.1126/science.aad0512.","mla":"Kiermaier, Eva, et al. “Polysialylation Controls Dendritic Cell Trafficking by Regulating Chemokine Recognition.” Science, vol. 351, no. 6269, American Association for the Advancement of Science, 2016, pp. 186–90, doi:10.1126/science.aad0512.","short":"E. Kiermaier, C. Moussion, C. Veldkamp, R. Gerardy Schahn, I. de Vries, L. Williams, G. Chaffee, A. Phillips, F. Freiberger, R. Imre, D. Taleski, R. Payne, A. Braun, R. Förster, K. Mechtler, M. Mühlenhoff, B. Volkman, M.K. Sixt, Science 351 (2016) 186–190."},"article_type":"original","page":"186 - 190","date_published":"2016-01-08T00:00:00Z","scopus_import":1,"day":"08","article_processing_charge":"No","_id":"1599","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"Polysialylation controls dendritic cell trafficking by regulating chemokine recognition","status":"public","intvolume":" 351","oa_version":"Submitted Version","type":"journal_article","abstract":[{"lang":"eng","text":"The addition of polysialic acid to N- and/or O-linked glycans, referred to as polysialylation, is a rare posttranslational modification that is mainly known to control the developmental plasticity of the nervous system. Here we show that CCR7, the central chemokine receptor controlling immune cell trafficking to secondary lymphatic organs, carries polysialic acid. This modification is essential for the recognition of the CCR7 ligand CCL21. As a consequence, dendritic cell trafficking is abrogated in polysialyltransferase-deficient mice, manifesting as disturbed lymph node homeostasis and unresponsiveness to inflammatory stimuli. Structure-function analysis of chemokine-receptor interactions reveals that CCL21 adopts an autoinhibited conformation, which is released upon interaction with polysialic acid. Thus, we describe a glycosylation-mediated immune cell trafficking disorder and its mechanistic basis.\r\n"}],"issue":"6269"},{"type":"journal_article","abstract":[{"text":"Chemokines are the main guidance cues directing leukocyte migration. Opposed to early assumptions, chemokines do not necessarily act as soluble cues but are often immobilized within tissues, e.g., dendritic cell migration toward lymphatic vessels is guided by a haptotactic gradient of the chemokine CCL21. Controlled assay systems to quantitatively study haptotaxis in vitro are still missing. In this chapter, we describe an in vitro haptotaxis assay optimized for the unique properties of dendritic cells. The chemokine CCL21 is immobilized in a bioactive state, using laser-assisted protein adsorption by photobleaching. The cells follow this immobilized CCL21 gradient in a haptotaxis chamber, which provides three dimensionally confined migration conditions.","lang":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","_id":"1597","title":"Quantitative analysis of dendritic cell haptotaxis","status":"public","intvolume":" 570","oa_version":"None","scopus_import":1,"day":"01","article_processing_charge":"No","publication":"Methods in Enzymology","citation":{"ama":"Schwarz J, Sixt MK. Quantitative analysis of dendritic cell haptotaxis. Methods in Enzymology. 2016;570:567-581. doi:10.1016/bs.mie.2015.11.004","ista":"Schwarz J, Sixt MK. 2016. Quantitative analysis of dendritic cell haptotaxis. Methods in Enzymology. 570, 567–581.","apa":"Schwarz, J., & Sixt, M. K. (2016). Quantitative analysis of dendritic cell haptotaxis. Methods in Enzymology. Elsevier. https://doi.org/10.1016/bs.mie.2015.11.004","ieee":"J. Schwarz and M. K. Sixt, “Quantitative analysis of dendritic cell haptotaxis,” Methods in Enzymology, vol. 570. Elsevier, pp. 567–581, 2016.","mla":"Schwarz, Jan, and Michael K. Sixt. “Quantitative Analysis of Dendritic Cell Haptotaxis.” Methods in Enzymology, vol. 570, Elsevier, 2016, pp. 567–81, doi:10.1016/bs.mie.2015.11.004.","short":"J. Schwarz, M.K. Sixt, Methods in Enzymology 570 (2016) 567–581.","chicago":"Schwarz, Jan, and Michael K Sixt. “Quantitative Analysis of Dendritic Cell Haptotaxis.” Methods in Enzymology. Elsevier, 2016. https://doi.org/10.1016/bs.mie.2015.11.004."},"article_type":"original","page":"567 - 581","date_published":"2016-01-01T00:00:00Z","ec_funded":1,"publist_id":"5573","acknowledgement":"This work was supported by the Boehringer Ingelheim Fonds, the European Research Council (ERC StG 281556), and a START Award of the Austrian Science Foundation (FWF). We thank Robert Hauschild, Anne Reversat, and Jack Merrin for valuable input and the Imaging Facility of IST Austria for excellent support.","year":"2016","pmid":1,"publication_status":"published","department":[{"_id":"MiSi"}],"publisher":"Elsevier","author":[{"full_name":"Schwarz, Jan","id":"346C1EC6-F248-11E8-B48F-1D18A9856A87","last_name":"Schwarz","first_name":"Jan"},{"last_name":"Sixt","first_name":"Michael K","orcid":"0000-0002-6620-9179","id":"41E9FBEA-F248-11E8-B48F-1D18A9856A87","full_name":"Sixt, Michael K"}],"date_created":"2018-12-11T11:52:56Z","date_updated":"2021-01-12T06:51:51Z","volume":570,"month":"01","external_id":{"pmid":["26921962"]},"quality_controlled":"1","project":[{"call_identifier":"FP7","name":"Cytoskeletal force generation and force transduction of migrating leukocytes (EU)","grant_number":"281556","_id":"25A603A2-B435-11E9-9278-68D0E5697425"},{"grant_number":"Y 564-B12","_id":"25A8E5EA-B435-11E9-9278-68D0E5697425","name":"Cytoskeletal force generation and transduction of leukocytes (FWF)","call_identifier":"FWF"}],"doi":"10.1016/bs.mie.2015.11.004","acknowledged_ssus":[{"_id":"Bio"}],"language":[{"iso":"eng"}]},{"publication_status":"published","department":[{"_id":"LaEr"}],"publisher":"Birkhäuser","year":"2016","date_updated":"2021-01-12T06:51:58Z","date_created":"2018-12-11T11:53:00Z","volume":17,"author":[{"last_name":"Sadel","first_name":"Christian","orcid":"0000-0001-8255-3968","id":"4760E9F8-F248-11E8-B48F-1D18A9856A87","full_name":"Sadel, Christian"}],"publist_id":"5558","ec_funded":1,"quality_controlled":"1","project":[{"call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme","_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734"}],"main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1501.04287"}],"oa":1,"language":[{"iso":"eng"}],"doi":"10.1007/s00023-015-0456-3","month":"07","title":"Anderson transition at 2 dimensional growth rate on antitrees and spectral theory for operators with one propagating channel","status":"public","intvolume":" 17","_id":"1608","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","oa_version":"Preprint","type":"journal_article","abstract":[{"lang":"eng","text":"We show that the Anderson model has a transition from localization to delocalization at exactly 2 dimensional growth rate on antitrees with normalized edge weights which are certain discrete graphs. The kinetic part has a one-dimensional structure allowing a description through transfer matrices which involve some Schur complement. For such operators we introduce the notion of having one propagating channel and extend theorems from the theory of one-dimensional Jacobi operators that relate the behavior of transfer matrices with the spectrum. These theorems are then applied to the considered model. In essence, in a certain energy region the kinetic part averages the random potentials along shells and the transfer matrices behave similar as for a one-dimensional operator with random potential of decaying variance. At d dimensional growth for d>2 this effective decay is strong enough to obtain absolutely continuous spectrum, whereas for some uniform d dimensional growth with d<2 one has pure point spectrum in this energy region. At exactly uniform 2 dimensional growth also some singular continuous spectrum appears, at least at small disorder. As a corollary we also obtain a change from singular spectrum (d≤2) to absolutely continuous spectrum (d≥3) for random operators of the type rΔdr+λ on ℤd, where r is an orthogonal radial projection, Δd the discrete adjacency operator (Laplacian) on ℤd and λ a random potential. "}],"issue":"7","page":"1631 - 1675","publication":"Annales Henri Poincare","citation":{"chicago":"Sadel, Christian. “Anderson Transition at 2 Dimensional Growth Rate on Antitrees and Spectral Theory for Operators with One Propagating Channel.” Annales Henri Poincare. Birkhäuser, 2016. https://doi.org/10.1007/s00023-015-0456-3.","mla":"Sadel, Christian. “Anderson Transition at 2 Dimensional Growth Rate on Antitrees and Spectral Theory for Operators with One Propagating Channel.” Annales Henri Poincare, vol. 17, no. 7, Birkhäuser, 2016, pp. 1631–75, doi:10.1007/s00023-015-0456-3.","short":"C. Sadel, Annales Henri Poincare 17 (2016) 1631–1675.","ista":"Sadel C. 2016. Anderson transition at 2 dimensional growth rate on antitrees and spectral theory for operators with one propagating channel. Annales Henri Poincare. 17(7), 1631–1675.","apa":"Sadel, C. (2016). Anderson transition at 2 dimensional growth rate on antitrees and spectral theory for operators with one propagating channel. Annales Henri Poincare. Birkhäuser. https://doi.org/10.1007/s00023-015-0456-3","ieee":"C. Sadel, “Anderson transition at 2 dimensional growth rate on antitrees and spectral theory for operators with one propagating channel,” Annales Henri Poincare, vol. 17, no. 7. Birkhäuser, pp. 1631–1675, 2016.","ama":"Sadel C. Anderson transition at 2 dimensional growth rate on antitrees and spectral theory for operators with one propagating channel. Annales Henri Poincare. 2016;17(7):1631-1675. doi:10.1007/s00023-015-0456-3"},"date_published":"2016-07-01T00:00:00Z","scopus_import":1,"day":"01"},{"author":[{"full_name":"Kazda, Alexandr","last_name":"Kazda","first_name":"Alexandr","id":"3B32BAA8-F248-11E8-B48F-1D18A9856A87"}],"volume":75,"oa_version":"Preprint","date_created":"2018-12-11T11:53:01Z","date_updated":"2021-01-12T06:52:00Z","_id":"1612","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","year":"2016","publisher":"Springer","department":[{"_id":"VlKo"}],"intvolume":" 75","title":"CSP for binary conservative relational structures","publication_status":"published","status":"public","issue":"1","publist_id":"5554","abstract":[{"lang":"eng","text":"We prove that whenever A is a 3-conservative relational structure with only binary and unary relations,then the algebra of polymorphisms of A either has no Taylor operation (i.e.,CSP(A)is NP-complete),or it generates an SD(∧) variety (i.e.,CSP(A)has bounded width)."}],"type":"journal_article","doi":"10.1007/s00012-015-0358-8","date_published":"2016-02-01T00:00:00Z","language":[{"iso":"eng"}],"oa":1,"citation":{"ieee":"A. Kazda, “CSP for binary conservative relational structures,” Algebra Universalis, vol. 75, no. 1. Springer, pp. 75–84, 2016.","apa":"Kazda, A. (2016). CSP for binary conservative relational structures. Algebra Universalis. Springer. https://doi.org/10.1007/s00012-015-0358-8","ista":"Kazda A. 2016. CSP for binary conservative relational structures. Algebra Universalis. 75(1), 75–84.","ama":"Kazda A. CSP for binary conservative relational structures. Algebra Universalis. 2016;75(1):75-84. doi:10.1007/s00012-015-0358-8","chicago":"Kazda, Alexandr. “CSP for Binary Conservative Relational Structures.” Algebra Universalis. Springer, 2016. https://doi.org/10.1007/s00012-015-0358-8.","short":"A. Kazda, Algebra Universalis 75 (2016) 75–84.","mla":"Kazda, Alexandr. “CSP for Binary Conservative Relational Structures.” Algebra Universalis, vol. 75, no. 1, Springer, 2016, pp. 75–84, doi:10.1007/s00012-015-0358-8."},"main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1112.1099"}],"publication":"Algebra Universalis","page":"75 - 84","quality_controlled":"1","month":"02","day":"01","scopus_import":1},{"oa_version":"Submitted Version","volume":33,"date_updated":"2021-01-12T06:52:02Z","date_created":"2018-12-11T11:53:03Z","author":[{"full_name":"Pausinger, Florian","id":"2A77D7A2-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8379-3768","first_name":"Florian","last_name":"Pausinger"},{"last_name":"Steinerberger","first_name":"Stefan","full_name":"Steinerberger, Stefan"}],"department":[{"_id":"HeEd"}],"publisher":"Academic Press","intvolume":" 33","title":"On the discrepancy of jittered sampling","publication_status":"published","status":"public","_id":"1617","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","acknowledgement":"We are grateful to the referee whose suggestions greatly improved the quality and clarity of the exposition.","year":"2016","publist_id":"5549","abstract":[{"text":"We study the discrepancy of jittered sampling sets: such a set P⊂ [0,1]d is generated for fixed m∈ℕ by partitioning [0,1]d into md axis aligned cubes of equal measure and placing a random point inside each of the N=md cubes. We prove that, for N sufficiently large, 1/10 d/N1/2+1/2d ≤EDN∗(P)≤ √d(log N) 1/2/N1/2+1/2d, where the upper bound with an unspecified constant Cd was proven earlier by Beck. Our proof makes crucial use of the sharp Dvoretzky-Kiefer-Wolfowitz inequality and a suitably taylored Bernstein inequality; we have reasons to believe that the upper bound has the sharp scaling in N. Additional heuristics suggest that jittered sampling should be able to improve known bounds on the inverse of the star-discrepancy in the regime N≳dd. We also prove a partition principle showing that every partition of [0,1]d combined with a jittered sampling construction gives rise to a set whose expected squared L2-discrepancy is smaller than that of purely random points.","lang":"eng"}],"type":"journal_article","language":[{"iso":"eng"}],"date_published":"2016-04-01T00:00:00Z","doi":"10.1016/j.jco.2015.11.003","page":"199 - 216","quality_controlled":"1","citation":{"apa":"Pausinger, F., & Steinerberger, S. (2016). On the discrepancy of jittered sampling. Journal of Complexity. Academic Press. https://doi.org/10.1016/j.jco.2015.11.003","ieee":"F. Pausinger and S. Steinerberger, “On the discrepancy of jittered sampling,” Journal of Complexity, vol. 33. Academic Press, pp. 199–216, 2016.","ista":"Pausinger F, Steinerberger S. 2016. On the discrepancy of jittered sampling. Journal of Complexity. 33, 199–216.","ama":"Pausinger F, Steinerberger S. On the discrepancy of jittered sampling. Journal of Complexity. 2016;33:199-216. doi:10.1016/j.jco.2015.11.003","chicago":"Pausinger, Florian, and Stefan Steinerberger. “On the Discrepancy of Jittered Sampling.” Journal of Complexity. Academic Press, 2016. https://doi.org/10.1016/j.jco.2015.11.003.","short":"F. Pausinger, S. Steinerberger, Journal of Complexity 33 (2016) 199–216.","mla":"Pausinger, Florian, and Stefan Steinerberger. “On the Discrepancy of Jittered Sampling.” Journal of Complexity, vol. 33, Academic Press, 2016, pp. 199–216, doi:10.1016/j.jco.2015.11.003."},"oa":1,"main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1510.00251"}],"publication":"Journal of Complexity","month":"04","day":"01","scopus_import":1},{"citation":{"ama":"Frank R, Hainzl C, Seiringer R, Solovej J. The external field dependence of the BCS critical temperature. Communications in Mathematical Physics. 2016;342(1):189-216. doi:10.1007/s00220-015-2526-2","apa":"Frank, R., Hainzl, C., Seiringer, R., & Solovej, J. (2016). The external field dependence of the BCS critical temperature. Communications in Mathematical Physics. Springer. https://doi.org/10.1007/s00220-015-2526-2","ieee":"R. Frank, C. Hainzl, R. Seiringer, and J. Solovej, “The external field dependence of the BCS critical temperature,” Communications in Mathematical Physics, vol. 342, no. 1. Springer, pp. 189–216, 2016.","ista":"Frank R, Hainzl C, Seiringer R, Solovej J. 2016. The external field dependence of the BCS critical temperature. Communications in Mathematical Physics. 342(1), 189–216.","short":"R. Frank, C. Hainzl, R. Seiringer, J. Solovej, Communications in Mathematical Physics 342 (2016) 189–216.","mla":"Frank, Rupert, et al. “The External Field Dependence of the BCS Critical Temperature.” Communications in Mathematical Physics, vol. 342, no. 1, Springer, 2016, pp. 189–216, doi:10.1007/s00220-015-2526-2.","chicago":"Frank, Rupert, Christian Hainzl, Robert Seiringer, and Jan Solovej. “The External Field Dependence of the BCS Critical Temperature.” Communications in Mathematical Physics. Springer, 2016. https://doi.org/10.1007/s00220-015-2526-2."},"publication":"Communications in Mathematical Physics","page":"189 - 216","date_published":"2016-02-01T00:00:00Z","scopus_import":1,"day":"01","_id":"1620","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","intvolume":" 342","status":"public","title":"The external field dependence of the BCS critical temperature","oa_version":"Submitted Version","type":"journal_article","issue":"1","abstract":[{"lang":"eng","text":"We consider the Bardeen–Cooper–Schrieffer free energy functional for particles interacting via a two-body potential on a microscopic scale and in the presence of weak external fields varying on a macroscopic scale. We study the influence of the external fields on the critical temperature. We show that in the limit where the ratio between the microscopic and macroscopic scale tends to zero, the next to leading order of the critical temperature is determined by the lowest eigenvalue of the linearization of the Ginzburg–Landau equation."}],"oa":1,"main_file_link":[{"url":"http://arxiv.org/abs/1410.2352","open_access":"1"}],"quality_controlled":"1","doi":"10.1007/s00220-015-2526-2","language":[{"iso":"eng"}],"month":"02","year":"2016","acknowledgement":"The authors are grateful to I. M. Sigal for useful discussions. Financial support from the US National Science Foundation through Grants PHY-1347399 and DMS-1363432 (R.L.F.), from the Danish council for independent research and from ERC Advanced Grant 321029 (J.P.S.) is acknowledged.","publisher":"Springer","department":[{"_id":"RoSe"}],"publication_status":"published","author":[{"last_name":"Frank","first_name":"Rupert","full_name":"Frank, Rupert"},{"full_name":"Hainzl, Christian","first_name":"Christian","last_name":"Hainzl"},{"full_name":"Seiringer, Robert","id":"4AFD0470-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-6781-0521","first_name":"Robert","last_name":"Seiringer"},{"first_name":"Jan","last_name":"Solovej","full_name":"Solovej, Jan"}],"volume":342,"date_created":"2018-12-11T11:53:04Z","date_updated":"2021-01-12T06:52:03Z","publist_id":"5546"},{"quality_controlled":"1","project":[{"_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734","name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7"}],"oa":1,"main_file_link":[{"url":"http://arxiv.org/abs/1501.04570","open_access":"1"}],"language":[{"iso":"eng"}],"doi":"10.1007/s00205-015-0923-5","month":"03","publication_status":"published","department":[{"_id":"RoSe"}],"publisher":"Springer","acknowledgement":"We thank Jan Philip Solovej, Robert Seiringer and Vladimir Maz’ya for helpful discussions, as well as Rupert Frank\r\nand the anonymous referee for useful comments. Part of this work has been carried out during a visit at the Institut Mittag-Leffler (Stockholm). D.L. acknowledges financial support by the grant KAW 2010.0063 from the Knut and Alice Wallenberg Foundation and the Swedish Research Council grant no. 2013-4734. P.T.N. is supported by the People Programme (Marie Curie Actions) of the European Union’s Seventh Framework Programme (FP7/2007-2013) under REA grant agreement no. 291734. F.P. acknowledges support from the ERC project no. 321029 “The\r\nmathematics of the structure of matter”.","year":"2016","date_created":"2018-12-11T11:53:05Z","date_updated":"2021-01-12T06:52:04Z","volume":219,"author":[{"full_name":"Lundholm, Douglas","first_name":"Douglas","last_name":"Lundholm"},{"id":"404092F4-F248-11E8-B48F-1D18A9856A87","first_name":"Phan","last_name":"Nam","full_name":"Nam, Phan"},{"full_name":"Portmann, Fabian","last_name":"Portmann","first_name":"Fabian"}],"ec_funded":1,"publist_id":"5542","page":"1343 - 1382","publication":"Archive for Rational Mechanics and Analysis","citation":{"ieee":"D. Lundholm, P. Nam, and F. Portmann, “Fractional Hardy–Lieb–Thirring and related Inequalities for interacting systems,” Archive for Rational Mechanics and Analysis, vol. 219, no. 3. Springer, pp. 1343–1382, 2016.","apa":"Lundholm, D., Nam, P., & Portmann, F. (2016). Fractional Hardy–Lieb–Thirring and related Inequalities for interacting systems. Archive for Rational Mechanics and Analysis. Springer. https://doi.org/10.1007/s00205-015-0923-5","ista":"Lundholm D, Nam P, Portmann F. 2016. Fractional Hardy–Lieb–Thirring and related Inequalities for interacting systems. Archive for Rational Mechanics and Analysis. 219(3), 1343–1382.","ama":"Lundholm D, Nam P, Portmann F. Fractional Hardy–Lieb–Thirring and related Inequalities for interacting systems. Archive for Rational Mechanics and Analysis. 2016;219(3):1343-1382. doi:10.1007/s00205-015-0923-5","chicago":"Lundholm, Douglas, Phan Nam, and Fabian Portmann. “Fractional Hardy–Lieb–Thirring and Related Inequalities for Interacting Systems.” Archive for Rational Mechanics and Analysis. Springer, 2016. https://doi.org/10.1007/s00205-015-0923-5.","short":"D. Lundholm, P. Nam, F. Portmann, Archive for Rational Mechanics and Analysis 219 (2016) 1343–1382.","mla":"Lundholm, Douglas, et al. “Fractional Hardy–Lieb–Thirring and Related Inequalities for Interacting Systems.” Archive for Rational Mechanics and Analysis, vol. 219, no. 3, Springer, 2016, pp. 1343–82, doi:10.1007/s00205-015-0923-5."},"date_published":"2016-03-01T00:00:00Z","scopus_import":1,"day":"01","title":"Fractional Hardy–Lieb–Thirring and related Inequalities for interacting systems","status":"public","intvolume":" 219","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1622","oa_version":"Submitted Version","type":"journal_article","abstract":[{"text":"We prove analogues of the Lieb–Thirring and Hardy–Lieb–Thirring inequalities for many-body quantum systems with fractional kinetic operators and homogeneous interaction potentials, where no anti-symmetry on the wave functions is assumed. These many-body inequalities imply interesting one-body interpolation inequalities, and we show that the corresponding one- and many-body inequalities are actually equivalent in certain cases.","lang":"eng"}],"issue":"3"},{"date_published":"2016-04-01T00:00:00Z","page":"1 - 12","publication":"Theoretical Population Biology","citation":{"ieee":"J. Kelleher, A. Etheridge, A. Véber, and N. H. Barton, “Spread of pedigree versus genetic ancestry in spatially distributed populations,” Theoretical Population Biology, vol. 108. Academic Press, pp. 1–12, 2016.","apa":"Kelleher, J., Etheridge, A., Véber, A., & Barton, N. H. (2016). Spread of pedigree versus genetic ancestry in spatially distributed populations. Theoretical Population Biology. Academic Press. https://doi.org/10.1016/j.tpb.2015.10.008","ista":"Kelleher J, Etheridge A, Véber A, Barton NH. 2016. Spread of pedigree versus genetic ancestry in spatially distributed populations. Theoretical Population Biology. 108, 1–12.","ama":"Kelleher J, Etheridge A, Véber A, Barton NH. Spread of pedigree versus genetic ancestry in spatially distributed populations. Theoretical Population Biology. 2016;108:1-12. doi:10.1016/j.tpb.2015.10.008","chicago":"Kelleher, Jerome, Alison Etheridge, Amandine Véber, and Nicholas H Barton. “Spread of Pedigree versus Genetic Ancestry in Spatially Distributed Populations.” Theoretical Population Biology. Academic Press, 2016. https://doi.org/10.1016/j.tpb.2015.10.008.","short":"J. Kelleher, A. Etheridge, A. Véber, N.H. Barton, Theoretical Population Biology 108 (2016) 1–12.","mla":"Kelleher, Jerome, et al. “Spread of Pedigree versus Genetic Ancestry in Spatially Distributed Populations.” Theoretical Population Biology, vol. 108, Academic Press, 2016, pp. 1–12, doi:10.1016/j.tpb.2015.10.008."},"day":"01","has_accepted_license":"1","scopus_import":1,"oa_version":"Published Version","file":[{"access_level":"open_access","file_name":"IST-2016-465-v1+1_1-s2.0-S0040580915001094-main.pdf","content_type":"application/pdf","file_size":1684043,"creator":"system","relation":"main_file","file_id":"4865","checksum":"6a65ba187994d4ad86c1c509e0ff482a","date_created":"2018-12-12T10:11:12Z","date_updated":"2020-07-14T12:45:07Z"}],"pubrep_id":"465","status":"public","ddc":["576"],"title":"Spread of pedigree versus genetic ancestry in spatially distributed populations","intvolume":" 108","_id":"1631","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","abstract":[{"text":"Ancestral processes are fundamental to modern population genetics and spatial structure has been the subject of intense interest for many years. Despite this interest, almost nothing is known about the distribution of the locations of pedigree or genetic ancestors. Using both spatially continuous and stepping-stone models, we show that the distribution of pedigree ancestors approaches a travelling wave, for which we develop two alternative approximations. The speed and width of the wave are sensitive to the local details of the model. After a short time, genetic ancestors spread far more slowly than pedigree ancestors, ultimately diffusing out with radius ## rather than spreading at constant speed. In contrast to the wave of pedigree ancestors, the spread of genetic ancestry is insensitive to the local details of the models.","lang":"eng"}],"type":"journal_article","language":[{"iso":"eng"}],"doi":"10.1016/j.tpb.2015.10.008","quality_controlled":"1","project":[{"name":"Limits to selection in biology and in evolutionary computation","call_identifier":"FP7","grant_number":"250152","_id":"25B07788-B435-11E9-9278-68D0E5697425"}],"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"oa":1,"month":"04","date_updated":"2021-01-12T06:52:07Z","date_created":"2018-12-11T11:53:08Z","volume":108,"author":[{"full_name":"Kelleher, Jerome","last_name":"Kelleher","first_name":"Jerome"},{"last_name":"Etheridge","first_name":"Alison","full_name":"Etheridge, Alison"},{"full_name":"Véber, Amandine","last_name":"Véber","first_name":"Amandine"},{"full_name":"Barton, Nicholas H","id":"4880FE40-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8548-5240","first_name":"Nicholas H","last_name":"Barton"}],"publication_status":"published","department":[{"_id":"NiBa"}],"publisher":"Academic Press","year":"2016","file_date_updated":"2020-07-14T12:45:07Z","ec_funded":1,"publist_id":"5524"},{"has_accepted_license":"1","day":"01","scopus_import":1,"date_published":"2016-06-01T00:00:00Z","citation":{"mla":"Zemová, Radka, et al. “A Forward Genetic Screen for New Regulators of Auxin Mediated Degradation of Auxin Transport Proteins in Arabidopsis Thaliana.” Journal of Plant Growth Regulation, vol. 35, no. 2, Springer, 2016, pp. 465–76, doi:10.1007/s00344-015-9553-2.","short":"R. Zemová, M. Zwiewka, A. Bielach, H. Robert, J. Friml, Journal of Plant Growth Regulation 35 (2016) 465–476.","chicago":"Zemová, Radka, Marta Zwiewka, Agnieszka Bielach, Hélène Robert, and Jiří Friml. “A Forward Genetic Screen for New Regulators of Auxin Mediated Degradation of Auxin Transport Proteins in Arabidopsis Thaliana.” Journal of Plant Growth Regulation. Springer, 2016. https://doi.org/10.1007/s00344-015-9553-2.","ama":"Zemová R, Zwiewka M, Bielach A, Robert H, Friml J. A forward genetic screen for new regulators of auxin mediated degradation of auxin transport proteins in Arabidopsis thaliana. Journal of Plant Growth Regulation. 2016;35(2):465-476. doi:10.1007/s00344-015-9553-2","ista":"Zemová R, Zwiewka M, Bielach A, Robert H, Friml J. 2016. A forward genetic screen for new regulators of auxin mediated degradation of auxin transport proteins in Arabidopsis thaliana. Journal of Plant Growth Regulation. 35(2), 465–476.","ieee":"R. Zemová, M. Zwiewka, A. Bielach, H. Robert, and J. Friml, “A forward genetic screen for new regulators of auxin mediated degradation of auxin transport proteins in Arabidopsis thaliana,” Journal of Plant Growth Regulation, vol. 35, no. 2. Springer, pp. 465–476, 2016.","apa":"Zemová, R., Zwiewka, M., Bielach, A., Robert, H., & Friml, J. (2016). A forward genetic screen for new regulators of auxin mediated degradation of auxin transport proteins in Arabidopsis thaliana. Journal of Plant Growth Regulation. Springer. https://doi.org/10.1007/s00344-015-9553-2"},"publication":"Journal of Plant Growth Regulation","page":"465 - 476","issue":"2","abstract":[{"text":"The plant hormone auxin (indole-3-acetic acid) is a major regulator of plant growth and development including embryo and root patterning, lateral organ formation and growth responses to environmental stimuli. Auxin is directionally transported from cell to cell by the action of specific auxin influx [AUXIN-RESISTANT1 (AUX1)] and efflux [PIN-FORMED (PIN)] transport regulators, whose polar, subcellular localizations are aligned with the direction of the auxin flow. Auxin itself regulates its own transport by modulation of the expression and subcellular localization of the auxin transporters. Increased auxin levels promote the transcription of PIN2 and AUX1 genes as well as stabilize PIN proteins at the plasma membrane, whereas prolonged auxin exposure increases the turnover of PIN proteins and their degradation in the vacuole. In this study, we applied a forward genetic approach, to identify molecular components playing a role in the auxin-mediated degradation. We generated EMS-mutagenized Arabidopsis PIN2::PIN2:GFP, AUX1::AUX1:YFP eir1aux1 populations and designed a screen for mutants with persistently strong fluorescent signals of the tagged PIN2 and AUX1 after prolonged treatment with the synthetic auxin 2,4-dichlorophenoxyacetic acid (2,4-D). This approach yielded novel auxin degradation mutants defective in trafficking and degradation of PIN2 and AUX1 proteins and established a role for auxin-mediated degradation in plant development.","lang":"eng"}],"type":"journal_article","pubrep_id":"1001","file":[{"access_level":"open_access","file_name":"IST-2018-1001-v1+1_Zemova_JPlantGrowthRegul_2016_proofs.pdf","content_type":"application/pdf","file_size":5637591,"creator":"system","relation":"main_file","file_id":"4695","checksum":"0dc6a300cde6536ceedd2bcdd2060efb","date_created":"2018-12-12T10:08:34Z","date_updated":"2020-07-14T12:45:08Z"}],"oa_version":"Preprint","_id":"1641","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","intvolume":" 35","title":"A forward genetic screen for new regulators of auxin mediated degradation of auxin transport proteins in Arabidopsis thaliana","status":"public","ddc":["581"],"month":"06","doi":"10.1007/s00344-015-9553-2","language":[{"iso":"eng"}],"oa":1,"quality_controlled":"1","publist_id":"5512","file_date_updated":"2020-07-14T12:45:08Z","author":[{"last_name":"Zemová","first_name":"Radka","full_name":"Zemová, Radka"},{"full_name":"Zwiewka, Marta","first_name":"Marta","last_name":"Zwiewka"},{"full_name":"Bielach, Agnieszka","last_name":"Bielach","first_name":"Agnieszka"},{"full_name":"Robert, Hélène","first_name":"Hélène","last_name":"Robert"},{"first_name":"Jirí","last_name":"Friml","id":"4159519E-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8302-7596","full_name":"Friml, Jirí"}],"volume":35,"date_updated":"2021-01-12T06:52:11Z","date_created":"2018-12-11T11:53:12Z","year":"2016","acknowledgement":"European Social Fund (CZ.1.07/2.3.00/20.0043) and the Czech Science Foundation GAČR (GA13-40637S) to JF. ","publisher":"Springer","department":[{"_id":"JiFr"}],"publication_status":"published"},{"quality_controlled":"1","project":[{"_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668","call_identifier":"FP7","name":"Provable Security for Physical Cryptography"},{"grant_number":"682815","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","name":"Teaching Old Crypto New Tricks","call_identifier":"H2020"}],"oa":1,"main_file_link":[{"url":"https://eprint.iacr.org/2016/662","open_access":"1"}],"language":[{"iso":"eng"}],"conference":{"end_date":"2016-09-02","location":"Amalfi, Italy","start_date":"2016-08-31","name":"SCN: Security and Cryptography for Networks"},"doi":"10.1007/978-3-319-44618-9_21","month":"08","publication_status":"published","publisher":"Springer","department":[{"_id":"KrPi"}],"year":"2016","date_created":"2018-12-11T11:50:49Z","date_updated":"2023-02-23T10:08:16Z","volume":9841,"author":[{"last_name":"Fuchsbauer","first_name":"Georg","id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","full_name":"Fuchsbauer, Georg"},{"full_name":"Hanser, Christian","first_name":"Christian","last_name":"Hanser"},{"full_name":"Kamath Hosdurg, Chethan","id":"4BD3F30E-F248-11E8-B48F-1D18A9856A87","first_name":"Chethan","last_name":"Kamath Hosdurg"},{"full_name":"Slamanig, Daniel","last_name":"Slamanig","first_name":"Daniel"}],"related_material":{"record":[{"id":"1647","status":"public","relation":"earlier_version"}]},"publist_id":"6109","ec_funded":1,"page":"391 - 408","citation":{"chicago":"Fuchsbauer, Georg, Christian Hanser, Chethan Kamath Hosdurg, and Daniel Slamanig. “Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions,” 9841:391–408. Springer, 2016. https://doi.org/10.1007/978-3-319-44618-9_21.","short":"G. Fuchsbauer, C. Hanser, C. Kamath Hosdurg, D. Slamanig, in:, Springer, 2016, pp. 391–408.","mla":"Fuchsbauer, Georg, et al. Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions. Vol. 9841, Springer, 2016, pp. 391–408, doi:10.1007/978-3-319-44618-9_21.","ieee":"G. Fuchsbauer, C. Hanser, C. Kamath Hosdurg, and D. Slamanig, “Practical round-optimal blind signatures in the standard model from weaker assumptions,” presented at the SCN: Security and Cryptography for Networks, Amalfi, Italy, 2016, vol. 9841, pp. 391–408.","apa":"Fuchsbauer, G., Hanser, C., Kamath Hosdurg, C., & Slamanig, D. (2016). Practical round-optimal blind signatures in the standard model from weaker assumptions (Vol. 9841, pp. 391–408). Presented at the SCN: Security and Cryptography for Networks, Amalfi, Italy: Springer. https://doi.org/10.1007/978-3-319-44618-9_21","ista":"Fuchsbauer G, Hanser C, Kamath Hosdurg C, Slamanig D. 2016. Practical round-optimal blind signatures in the standard model from weaker assumptions. SCN: Security and Cryptography for Networks, LNCS, vol. 9841, 391–408.","ama":"Fuchsbauer G, Hanser C, Kamath Hosdurg C, Slamanig D. Practical round-optimal blind signatures in the standard model from weaker assumptions. In: Vol 9841. Springer; 2016:391-408. doi:10.1007/978-3-319-44618-9_21"},"date_published":"2016-08-11T00:00:00Z","scopus_import":1,"day":"11","status":"public","title":"Practical round-optimal blind signatures in the standard model from weaker assumptions","intvolume":" 9841","_id":"1225","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","oa_version":"Submitted Version","alternative_title":["LNCS"],"type":"conference","abstract":[{"lang":"eng","text":"At Crypto 2015 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standard-model construction of efficient roundoptimal blind signatures that does not require complexity leveraging. It is conceptually simple and builds on the primitive of structure-preserving signatures on equivalence classes (SPS-EQ). FHS prove the unforgeability of their scheme assuming EUF-CMA security of the SPS-EQ scheme and hardness of a version of the DH inversion problem. Blindness under adversarially chosen keys is proven under an interactive variant of the DDH assumption. We propose a variant of their scheme whose blindness can be proven under a non-interactive assumption, namely a variant of the bilinear DDH assumption. We moreover prove its unforgeability assuming only unforgeability of the underlying SPS-EQ but no additional assumptions as needed for the FHS scheme."}]},{"author":[{"first_name":"Tatsuaki","last_name":"Okamoto","full_name":"Okamoto, Tatsuaki"},{"id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z","last_name":"Pietrzak","full_name":"Pietrzak, Krzysztof Z"},{"first_name":"Brent","last_name":"Waters","full_name":"Waters, Brent"},{"last_name":"Wichs","first_name":"Daniel","full_name":"Wichs, Daniel"}],"volume":9452,"date_created":"2018-12-11T11:53:16Z","date_updated":"2021-01-12T06:52:16Z","year":"2016","publisher":"Springer","department":[{"_id":"KrPi"}],"publication_status":"published","ec_funded":1,"publist_id":"5497","file_date_updated":"2020-07-14T12:45:08Z","doi":"10.1007/978-3-662-48797-6_6","conference":{"location":"Auckland, New Zealand","start_date":"2015-11-29","end_date":"2015-12-03","name":"ASIACRYPT: Theory and Application of Cryptology and Information Security"},"language":[{"iso":"eng"}],"oa":1,"project":[{"call_identifier":"FP7","name":"Provable Security for Physical Cryptography","_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668"}],"quality_controlled":"1","month":"01","pubrep_id":"677","oa_version":"Submitted Version","file":[{"creator":"system","file_size":580088,"content_type":"application/pdf","access_level":"open_access","file_name":"IST-2016-677-v1+1_869.pdf","checksum":"a57711cb660c5b17b42bb47275a00180","date_updated":"2020-07-14T12:45:08Z","date_created":"2018-12-12T10:12:05Z","file_id":"4923","relation":"main_file"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","_id":"1653","intvolume":" 9452","status":"public","ddc":["000"],"title":"New realizations of somewhere statistically binding hashing and positional accumulators","abstract":[{"lang":"eng","text":"A somewhere statistically binding (SSB) hash, introduced by Hubáček and Wichs (ITCS ’15), can be used to hash a long string x to a short digest y = H hk (x) using a public hashing-key hk. Furthermore, there is a way to set up the hash key hk to make it statistically binding on some arbitrary hidden position i, meaning that: (1) the digest y completely determines the i’th bit (or symbol) of x so that all pre-images of y have the same value in the i’th position, (2) it is computationally infeasible to distinguish the position i on which hk is statistically binding from any other position i’. Lastly, the hash should have a local opening property analogous to Merkle-Tree hashing, meaning that given x and y = H hk (x) it should be possible to create a short proof π that certifies the value of the i’th bit (or symbol) of x without having to provide the entire input x. A similar primitive called a positional accumulator, introduced by Koppula, Lewko and Waters (STOC ’15) further supports dynamic updates of the hashed value. These tools, which are interesting in their own right, also serve as one of the main technical components in several recent works building advanced applications from indistinguishability obfuscation (iO).\r\n\r\nThe prior constructions of SSB hashing and positional accumulators required fully homomorphic encryption (FHE) and iO respectively. In this work, we give new constructions of these tools based on well studied number-theoretic assumptions such as DDH, Phi-Hiding and DCR, as well as a general construction from lossy/injective functions."}],"type":"conference","alternative_title":["LNCS"],"date_published":"2016-01-08T00:00:00Z","citation":{"ista":"Okamoto T, Pietrzak KZ, Waters B, Wichs D. 2016. New realizations of somewhere statistically binding hashing and positional accumulators. ASIACRYPT: Theory and Application of Cryptology and Information Security, LNCS, vol. 9452, 121–145.","apa":"Okamoto, T., Pietrzak, K. Z., Waters, B., & Wichs, D. (2016). New realizations of somewhere statistically binding hashing and positional accumulators (Vol. 9452, pp. 121–145). Presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Auckland, New Zealand: Springer. https://doi.org/10.1007/978-3-662-48797-6_6","ieee":"T. Okamoto, K. Z. Pietrzak, B. Waters, and D. Wichs, “New realizations of somewhere statistically binding hashing and positional accumulators,” presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Auckland, New Zealand, 2016, vol. 9452, pp. 121–145.","ama":"Okamoto T, Pietrzak KZ, Waters B, Wichs D. New realizations of somewhere statistically binding hashing and positional accumulators. In: Vol 9452. Springer; 2016:121-145. doi:10.1007/978-3-662-48797-6_6","chicago":"Okamoto, Tatsuaki, Krzysztof Z Pietrzak, Brent Waters, and Daniel Wichs. “New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators,” 9452:121–45. Springer, 2016. https://doi.org/10.1007/978-3-662-48797-6_6.","mla":"Okamoto, Tatsuaki, et al. New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators. Vol. 9452, Springer, 2016, pp. 121–45, doi:10.1007/978-3-662-48797-6_6.","short":"T. Okamoto, K.Z. Pietrzak, B. Waters, D. Wichs, in:, Springer, 2016, pp. 121–145."},"page":"121 - 145","has_accepted_license":"1","day":"08","scopus_import":1},{"date_published":"2016-11-01T00:00:00Z","page":"15 - 25","publication":"Biosystems","citation":{"mla":"Schilling, Christian, et al. “Adaptive Moment Closure for Parameter Inference of Biochemical Reaction Networks.” Biosystems, vol. 149, Elsevier, 2016, pp. 15–25, doi:10.1016/j.biosystems.2016.07.005.","short":"C. Schilling, S. Bogomolov, T.A. Henzinger, A. Podelski, J. Ruess, Biosystems 149 (2016) 15–25.","chicago":"Schilling, Christian, Sergiy Bogomolov, Thomas A Henzinger, Andreas Podelski, and Jakob Ruess. “Adaptive Moment Closure for Parameter Inference of Biochemical Reaction Networks.” Biosystems. Elsevier, 2016. https://doi.org/10.1016/j.biosystems.2016.07.005.","ama":"Schilling C, Bogomolov S, Henzinger TA, Podelski A, Ruess J. Adaptive moment closure for parameter inference of biochemical reaction networks. Biosystems. 2016;149:15-25. doi:10.1016/j.biosystems.2016.07.005","ista":"Schilling C, Bogomolov S, Henzinger TA, Podelski A, Ruess J. 2016. Adaptive moment closure for parameter inference of biochemical reaction networks. Biosystems. 149, 15–25.","apa":"Schilling, C., Bogomolov, S., Henzinger, T. A., Podelski, A., & Ruess, J. (2016). Adaptive moment closure for parameter inference of biochemical reaction networks. Biosystems. Elsevier. https://doi.org/10.1016/j.biosystems.2016.07.005","ieee":"C. Schilling, S. Bogomolov, T. A. Henzinger, A. Podelski, and J. Ruess, “Adaptive moment closure for parameter inference of biochemical reaction networks,” Biosystems, vol. 149. Elsevier, pp. 15–25, 2016."},"day":"01","scopus_import":1,"oa_version":"None","title":"Adaptive moment closure for parameter inference of biochemical reaction networks","status":"public","intvolume":" 149","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","_id":"1148","abstract":[{"lang":"eng","text":"Continuous-time Markov chain (CTMC) models have become a central tool for understanding the dynamics of complex reaction networks and the importance of stochasticity in the underlying biochemical processes. When such models are employed to answer questions in applications, in order to ensure that the model provides a sufficiently accurate representation of the real system, it is of vital importance that the model parameters are inferred from real measured data. This, however, is often a formidable task and all of the existing methods fail in one case or the other, usually because the underlying CTMC model is high-dimensional and computationally difficult to analyze. The parameter inference methods that tend to scale best in the dimension of the CTMC are based on so-called moment closure approximations. However, there exists a large number of different moment closure approximations and it is typically hard to say a priori which of the approximations is the most suitable for the inference procedure. Here, we propose a moment-based parameter inference method that automatically chooses the most appropriate moment closure method. Accordingly, contrary to existing methods, the user is not required to be experienced in moment closure techniques. In addition to that, our method adaptively changes the approximation during the parameter inference to ensure that always the best approximation is used, even in cases where different approximations are best in different regions of the parameter space. © 2016 Elsevier Ireland Ltd"}],"type":"journal_article","language":[{"iso":"eng"}],"doi":"10.1016/j.biosystems.2016.07.005","quality_controlled":"1","project":[{"call_identifier":"FP7","name":"Quantitative Reactive Modeling","grant_number":"267989","_id":"25EE3708-B435-11E9-9278-68D0E5697425"},{"_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23","call_identifier":"FWF","name":"Rigorous Systems Engineering"},{"grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"The Wittgenstein Prize"},{"call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme","grant_number":"291734","_id":"25681D80-B435-11E9-9278-68D0E5697425"}],"month":"11","date_updated":"2023-02-23T10:08:46Z","date_created":"2018-12-11T11:50:24Z","volume":149,"author":[{"first_name":"Christian","last_name":"Schilling","full_name":"Schilling, Christian"},{"full_name":"Bogomolov, Sergiy","first_name":"Sergiy","last_name":"Bogomolov","id":"369D9A44-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-0686-0365"},{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724","first_name":"Thomas A","last_name":"Henzinger","full_name":"Henzinger, Thomas A"},{"first_name":"Andreas","last_name":"Podelski","full_name":"Podelski, Andreas"},{"full_name":"Ruess, Jakob","first_name":"Jakob","last_name":"Ruess","id":"4A245D00-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-1615-3282"}],"related_material":{"record":[{"relation":"earlier_version","status":"public","id":"1658"}]},"publication_status":"published","publisher":"Elsevier","department":[{"_id":"ToHe"},{"_id":"GaTk"}],"acknowledgement":"This work is based on the CMSB 2015 paper “Adaptive moment closure for parameter inference of biochemical reaction networks” (Bogomolov et al., 2015). The work was partly supported by the German Research Foundation (DFG) as part of the Transregional Collaborative Research Center “Automatic Verification and Analysis of Complex Systems” (SFB/TR 14 AVACS1), by the European Research Council (ERC) under grant 267989 (QUAREM) and by the Austrian Science Fund (FWF) under grants S11402-N23 (RiSE) and Z211-N23 (Wittgenstein Award). J.R. acknowledges support from the People Programme (Marie Curie Actions) of the European Union's Seventh Framework Programme (FP7/2007-2013) under REA grant agreement no. 291734.","year":"2016","publist_id":"6210","ec_funded":1},{"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1705","intvolume":" 18","ddc":["000"],"status":"public","title":"Guided search for hybrid systems based on coarse-grained space abstractions","pubrep_id":"457","oa_version":"Published Version","file":[{"file_id":"5146","relation":"main_file","checksum":"31561d7705599a9bd4ea816accc0752e","date_created":"2018-12-12T10:15:26Z","date_updated":"2020-07-14T12:45:13Z","access_level":"open_access","file_name":"IST-2016-457-v1+1_s10009-015-0393-y.pdf","creator":"system","content_type":"application/pdf","file_size":2296522}],"type":"journal_article","issue":"4","abstract":[{"text":"Hybrid systems represent an important and powerful formalism for modeling real-world applications such as embedded systems. A verification tool like SpaceEx is based on the exploration of a symbolic search space (the region space). As a verification tool, it is typically optimized towards proving the absence of errors. In some settings, e.g., when the verification tool is employed in a feedback-directed design cycle, one would like to have the option to call a version that is optimized towards finding an error trajectory in the region space. A recent approach in this direction is based on guided search. Guided search relies on a cost function that indicates which states are promising to be explored, and preferably explores more promising states first. In this paper, we propose an abstraction-based cost function based on coarse-grained space abstractions for guiding the reachability analysis. For this purpose, a suitable abstraction technique that exploits the flexible granularity of modern reachability analysis algorithms is introduced. The new cost function is an effective extension of pattern database approaches that have been successfully applied in other areas. The approach has been implemented in the SpaceEx model checker. The evaluation shows its practical potential.","lang":"eng"}],"citation":{"ista":"Bogomolov S, Donzé A, Frehse G, Grosu R, Johnson T, Ladan H, Podelski A, Wehrle M. 2016. Guided search for hybrid systems based on coarse-grained space abstractions. International Journal on Software Tools for Technology Transfer. 18(4), 449–467.","apa":"Bogomolov, S., Donzé, A., Frehse, G., Grosu, R., Johnson, T., Ladan, H., … Wehrle, M. (2016). Guided search for hybrid systems based on coarse-grained space abstractions. International Journal on Software Tools for Technology Transfer. Springer. https://doi.org/10.1007/s10009-015-0393-y","ieee":"S. Bogomolov et al., “Guided search for hybrid systems based on coarse-grained space abstractions,” International Journal on Software Tools for Technology Transfer, vol. 18, no. 4. Springer, pp. 449–467, 2016.","ama":"Bogomolov S, Donzé A, Frehse G, et al. Guided search for hybrid systems based on coarse-grained space abstractions. International Journal on Software Tools for Technology Transfer. 2016;18(4):449-467. doi:10.1007/s10009-015-0393-y","chicago":"Bogomolov, Sergiy, Alexandre Donzé, Goran Frehse, Radu Grosu, Taylor Johnson, Hamed Ladan, Andreas Podelski, and Martin Wehrle. “Guided Search for Hybrid Systems Based on Coarse-Grained Space Abstractions.” International Journal on Software Tools for Technology Transfer. Springer, 2016. https://doi.org/10.1007/s10009-015-0393-y.","mla":"Bogomolov, Sergiy, et al. “Guided Search for Hybrid Systems Based on Coarse-Grained Space Abstractions.” International Journal on Software Tools for Technology Transfer, vol. 18, no. 4, Springer, 2016, pp. 449–67, doi:10.1007/s10009-015-0393-y.","short":"S. Bogomolov, A. Donzé, G. Frehse, R. Grosu, T. Johnson, H. Ladan, A. Podelski, M. Wehrle, International Journal on Software Tools for Technology Transfer 18 (2016) 449–467."},"publication":"International Journal on Software Tools for Technology Transfer","page":"449 - 467","date_published":"2016-08-01T00:00:00Z","scopus_import":1,"article_processing_charge":"Yes (via OA deal)","has_accepted_license":"1","day":"01","year":"2016","publisher":"Springer","department":[{"_id":"ToHe"}],"publication_status":"published","author":[{"full_name":"Bogomolov, Sergiy","orcid":"0000-0002-0686-0365","id":"369D9A44-F248-11E8-B48F-1D18A9856A87","last_name":"Bogomolov","first_name":"Sergiy"},{"full_name":"Donzé, Alexandre","first_name":"Alexandre","last_name":"Donzé"},{"first_name":"Goran","last_name":"Frehse","full_name":"Frehse, Goran"},{"full_name":"Grosu, Radu","last_name":"Grosu","first_name":"Radu"},{"first_name":"Taylor","last_name":"Johnson","full_name":"Johnson, Taylor"},{"first_name":"Hamed","last_name":"Ladan","full_name":"Ladan, Hamed"},{"full_name":"Podelski, Andreas","first_name":"Andreas","last_name":"Podelski"},{"full_name":"Wehrle, Martin","last_name":"Wehrle","first_name":"Martin"}],"volume":18,"date_updated":"2021-01-12T06:52:38Z","date_created":"2018-12-11T11:53:34Z","ec_funded":1,"publist_id":"5431","file_date_updated":"2020-07-14T12:45:13Z","tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"oa":1,"project":[{"name":"Quantitative Reactive Modeling","call_identifier":"FP7","_id":"25EE3708-B435-11E9-9278-68D0E5697425","grant_number":"267989"},{"name":"The Wittgenstein Prize","call_identifier":"FWF","_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211"},{"name":"Rigorous Systems Engineering","call_identifier":"FWF","grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425"}],"quality_controlled":"1","doi":"10.1007/s10009-015-0393-y","language":[{"iso":"eng"}],"month":"08"},{"_id":"1707","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","acknowledgement":"The DRIVER FP7 project has received funding from the European Unions Seventh Framework Programme for research, technological development and demonstration under grant agreement no 607798. RE-ACTA was funded within the framework of the Austrian Security Research Programme KIRAS by the Federal Ministry for Transport, Innovation and Technology.","year":"2016","publisher":"IEEE","department":[{"_id":"ChLa"}],"publication_status":"published","title":"Optimal geospatial allocation of volunteers for crisis management","status":"public","author":[{"full_name":"Pielorz, Jasmin","id":"49BC895A-F248-11E8-B48F-1D18A9856A87","last_name":"Pielorz","first_name":"Jasmin"},{"full_name":"Lampert, Christoph","orcid":"0000-0001-8622-7887","id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","last_name":"Lampert","first_name":"Christoph"}],"oa_version":"None","date_updated":"2021-01-12T06:52:39Z","date_created":"2018-12-11T11:53:35Z","type":"conference","article_number":"7402041","publist_id":"5429","abstract":[{"text":"Volunteer supporters play an important role in modern crisis and disaster management. In the times of mobile Internet devices, help from thousands of volunteers can be requested within a short time span, thus relieving professional helpers from minor chores or geographically spread-out tasks. However, the simultaneous availability of many volunteers also poses new problems. In particular, the volunteer efforts must be well coordinated, or otherwise situations might emerge in which too many idle volunteers at one location become more of a burden than a relief to the professionals.\r\nIn this work, we study the task of optimally assigning volunteers to selected locations, e.g. in order to perform regular measurements, to report on damage, or to distribute information or resources to the population in a crisis situation. We formulate the assignment tasks as an optimization problem and propose an effective and efficient solution procedure. Experiments on real data of the Team Österreich, consisting of over 36,000 Austrian volunteers, show the effectiveness and efficiency of our approach.","lang":"eng"}],"citation":{"ista":"Pielorz J, Lampert C. 2016. Optimal geospatial allocation of volunteers for crisis management. ICT-DM: Information and Communication Technologies for Disaster Management, 7402041.","ieee":"J. Pielorz and C. Lampert, “Optimal geospatial allocation of volunteers for crisis management,” presented at the ICT-DM: Information and Communication Technologies for Disaster Management, Rennes, France, 2016.","apa":"Pielorz, J., & Lampert, C. (2016). Optimal geospatial allocation of volunteers for crisis management. Presented at the ICT-DM: Information and Communication Technologies for Disaster Management, Rennes, France: IEEE. https://doi.org/10.1109/ICT-DM.2015.7402041","ama":"Pielorz J, Lampert C. Optimal geospatial allocation of volunteers for crisis management. In: IEEE; 2016. doi:10.1109/ICT-DM.2015.7402041","chicago":"Pielorz, Jasmin, and Christoph Lampert. “Optimal Geospatial Allocation of Volunteers for Crisis Management.” IEEE, 2016. https://doi.org/10.1109/ICT-DM.2015.7402041.","mla":"Pielorz, Jasmin, and Christoph Lampert. Optimal Geospatial Allocation of Volunteers for Crisis Management. 7402041, IEEE, 2016, doi:10.1109/ICT-DM.2015.7402041.","short":"J. Pielorz, C. Lampert, in:, IEEE, 2016."},"quality_controlled":"1","date_published":"2016-02-11T00:00:00Z","doi":"10.1109/ICT-DM.2015.7402041","conference":{"location":"Rennes, France","start_date":"2015-11-30","end_date":"2015-12-02","name":"ICT-DM: Information and Communication Technologies for Disaster Management"},"language":[{"iso":"eng"}],"scopus_import":1,"day":"11","month":"02"},{"publist_id":"5270","abstract":[{"lang":"eng","text":"Relational models for contingency tables are generalizations of log-linear models, allowing effects associated with arbitrary subsets of cells in the table, and not necessarily containing the overall effect, that is, a common parameter in every cell. Similarly to log-linear models, relational models can be extended to non-negative distributions, but the extension requires more complex methods. An extended relational model is defined as an algebraic variety, and it turns out to be the closure of the original model with respect to the Bregman divergence. In the extended relational model, the MLE of the cell parameters always exists and is unique, but some of its properties may be different from those of the MLE under log-linear models. The MLE can be computed using a generalized iterative scaling procedure based on Bregman projections. "}],"type":"journal_article","oa_version":"Preprint","volume":143,"date_created":"2018-12-11T11:54:15Z","date_updated":"2021-01-12T06:53:30Z","author":[{"id":"31934120-F248-11E8-B48F-1D18A9856A87","last_name":"Klimova","first_name":"Anna","full_name":"Klimova, Anna"},{"full_name":"Rudas, Tamás","last_name":"Rudas","first_name":"Tamás"}],"publisher":"Elsevier","department":[{"_id":"CaUh"}],"intvolume":" 143","title":"On the closure of relational models","publication_status":"published","status":"public","_id":"1833","year":"2016","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","month":"01","day":"01","scopus_import":1,"language":[{"iso":"eng"}],"doi":"10.1016/j.jmva.2015.10.005","date_published":"2016-01-01T00:00:00Z","page":"440 - 452","quality_controlled":"1","citation":{"ama":"Klimova A, Rudas T. On the closure of relational models. Journal of Multivariate Analysis. 2016;143:440-452. doi:10.1016/j.jmva.2015.10.005","ista":"Klimova A, Rudas T. 2016. On the closure of relational models. Journal of Multivariate Analysis. 143, 440–452.","apa":"Klimova, A., & Rudas, T. (2016). On the closure of relational models. Journal of Multivariate Analysis. Elsevier. https://doi.org/10.1016/j.jmva.2015.10.005","ieee":"A. Klimova and T. Rudas, “On the closure of relational models,” Journal of Multivariate Analysis, vol. 143. Elsevier, pp. 440–452, 2016.","mla":"Klimova, Anna, and Tamás Rudas. “On the Closure of Relational Models.” Journal of Multivariate Analysis, vol. 143, Elsevier, 2016, pp. 440–52, doi:10.1016/j.jmva.2015.10.005.","short":"A. Klimova, T. Rudas, Journal of Multivariate Analysis 143 (2016) 440–452.","chicago":"Klimova, Anna, and Tamás Rudas. “On the Closure of Relational Models.” Journal of Multivariate Analysis. Elsevier, 2016. https://doi.org/10.1016/j.jmva.2015.10.005."},"oa":1,"main_file_link":[{"url":"http://arxiv.org/abs/1501.00600","open_access":"1"}],"publication":"Journal of Multivariate Analysis"},{"page":"165 - 241","citation":{"chicago":"Lee, Jioon, and Kevin Schnelli. “Extremal Eigenvalues and Eigenvectors of Deformed Wigner Matrices.” Probability Theory and Related Fields. Springer, 2016. https://doi.org/10.1007/s00440-014-0610-8.","short":"J. Lee, K. Schnelli, Probability Theory and Related Fields 164 (2016) 165–241.","mla":"Lee, Jioon, and Kevin Schnelli. “Extremal Eigenvalues and Eigenvectors of Deformed Wigner Matrices.” Probability Theory and Related Fields, vol. 164, no. 1–2, Springer, 2016, pp. 165–241, doi:10.1007/s00440-014-0610-8.","apa":"Lee, J., & Schnelli, K. (2016). Extremal eigenvalues and eigenvectors of deformed Wigner matrices. Probability Theory and Related Fields. Springer. https://doi.org/10.1007/s00440-014-0610-8","ieee":"J. Lee and K. Schnelli, “Extremal eigenvalues and eigenvectors of deformed Wigner matrices,” Probability Theory and Related Fields, vol. 164, no. 1–2. Springer, pp. 165–241, 2016.","ista":"Lee J, Schnelli K. 2016. Extremal eigenvalues and eigenvectors of deformed Wigner matrices. Probability Theory and Related Fields. 164(1–2), 165–241.","ama":"Lee J, Schnelli K. Extremal eigenvalues and eigenvectors of deformed Wigner matrices. Probability Theory and Related Fields. 2016;164(1-2):165-241. doi:10.1007/s00440-014-0610-8"},"publication":"Probability Theory and Related Fields","date_published":"2016-02-01T00:00:00Z","scopus_import":1,"day":"01","intvolume":" 164","status":"public","title":"Extremal eigenvalues and eigenvectors of deformed Wigner matrices","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1881","oa_version":"Preprint","type":"journal_article","issue":"1-2","abstract":[{"text":"We consider random matrices of the form H=W+λV, λ∈ℝ+, where W is a real symmetric or complex Hermitian Wigner matrix of size N and V is a real bounded diagonal random matrix of size N with i.i.d.\\ entries that are independent of W. We assume subexponential decay for the matrix entries of W and we choose λ∼1, so that the eigenvalues of W and λV are typically of the same order. Further, we assume that the density of the entries of V is supported on a single interval and is convex near the edges of its support. In this paper we prove that there is λ+∈ℝ+ such that the largest eigenvalues of H are in the limit of large N determined by the order statistics of V for λ>λ+. In particular, the largest eigenvalue of H has a Weibull distribution in the limit N→∞ if λ>λ+. Moreover, for N sufficiently large, we show that the eigenvectors associated to the largest eigenvalues are partially localized for λ>λ+, while they are completely delocalized for λ<λ+. Similar results hold for the lowest eigenvalues. ","lang":"eng"}],"project":[{"call_identifier":"FP7","name":"Random matrices, universality and disordered quantum systems","grant_number":"338804","_id":"258DCDE6-B435-11E9-9278-68D0E5697425"}],"quality_controlled":"1","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1310.7057"}],"oa":1,"language":[{"iso":"eng"}],"doi":"10.1007/s00440-014-0610-8","month":"02","department":[{"_id":"LaEr"}],"publisher":"Springer","publication_status":"published","year":"2016","acknowledgement":"Most of the presented work was obtained while Kevin Schnelli was staying at the IAS with the support of\r\nThe Fund For Math.","volume":164,"date_created":"2018-12-11T11:54:31Z","date_updated":"2021-01-12T06:53:49Z","author":[{"first_name":"Jioon","last_name":"Lee","full_name":"Lee, Jioon"},{"full_name":"Schnelli, Kevin","id":"434AD0AE-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-0954-3231","first_name":"Kevin","last_name":"Schnelli"}],"ec_funded":1,"publist_id":"5215"},{"publist_id":"5796","author":[{"last_name":"Matoušek","first_name":"Jiří","full_name":"Matoušek, Jiří"},{"full_name":"Sedgwick, Eric","last_name":"Sedgwick","first_name":"Eric"},{"id":"38AC689C-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-1191-6714","first_name":"Martin","last_name":"Tancer","full_name":"Tancer, Martin"},{"id":"36690CA2-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-1494-0568","first_name":"Uli","last_name":"Wagner","full_name":"Wagner, Uli"}],"related_material":{"record":[{"id":"2244","status":"public","relation":"earlier_version"}]},"date_updated":"2023-02-23T10:34:31Z","date_created":"2018-12-11T11:51:52Z","volume":212,"year":"2016","acknowledgement":"Supported by the ERC Adv anced Grant No. 267165. ","publication_status":"published","publisher":"Springer","department":[{"_id":"UlWa"}],"month":"05","doi":"10.1007/s11856-016-1294-9","language":[{"iso":"eng"}],"main_file_link":[{"url":"http://arxiv.org/abs/1302.6475","open_access":"1"}],"oa":1,"quality_controlled":"1","project":[{"_id":"25FA3206-B435-11E9-9278-68D0E5697425","grant_number":"PP00P2_138948","name":"Embeddings in Higher Dimensions: Algorithms and Combinatorics"}],"abstract":[{"lang":"eng","text":"We consider two systems (α1, …, αm) and (β1, …,βn) of simple curves drawn on a compact two-dimensional surface M with boundary. Each αi and each βj is either an arc meeting the boundary of M at its two endpoints, or a closed curve. The αi are pairwise disjoint except for possibly sharing endpoints, and similarly for the βj. We want to “untangle” the βj from the ai by a self-homeomorphism of M; more precisely, we seek a homeomorphism φ:M→M fixing the boundary of M pointwise such that the total number of crossings of the ai with the φ(βj) is as small as possible. This problem is motivated by an application in the algorithmic theory of embeddings and 3-manifolds. We prove that if M is planar, i.e., a sphere with h ≥ 0 boundary components (“holes”), then O(mn) crossings can be achieved (independently of h), which is asymptotically tight, as an easy lower bound shows. In general, for an arbitrary (orientable or nonorientable) surface M with h holes and of (orientable or nonorientable) genus g ≥ 0, we obtain an O((m + n)4) upper bound, again independent of h and g. The proofs rely, among other things, on a result concerning simultaneous planar drawings of graphs by Erten and Kobourov."}],"issue":"1","type":"journal_article","oa_version":"Preprint","_id":"1411","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","title":"Untangling two systems of noncrossing curves","status":"public","intvolume":" 212","day":"01","scopus_import":1,"date_published":"2016-05-01T00:00:00Z","publication":"Israel Journal of Mathematics","citation":{"ista":"Matoušek J, Sedgwick E, Tancer M, Wagner U. 2016. Untangling two systems of noncrossing curves. Israel Journal of Mathematics. 212(1), 37–79.","apa":"Matoušek, J., Sedgwick, E., Tancer, M., & Wagner, U. (2016). Untangling two systems of noncrossing curves. Israel Journal of Mathematics. Springer. https://doi.org/10.1007/s11856-016-1294-9","ieee":"J. Matoušek, E. Sedgwick, M. Tancer, and U. Wagner, “Untangling two systems of noncrossing curves,” Israel Journal of Mathematics, vol. 212, no. 1. Springer, pp. 37–79, 2016.","ama":"Matoušek J, Sedgwick E, Tancer M, Wagner U. Untangling two systems of noncrossing curves. Israel Journal of Mathematics. 2016;212(1):37-79. doi:10.1007/s11856-016-1294-9","chicago":"Matoušek, Jiří, Eric Sedgwick, Martin Tancer, and Uli Wagner. “Untangling Two Systems of Noncrossing Curves.” Israel Journal of Mathematics. Springer, 2016. https://doi.org/10.1007/s11856-016-1294-9.","mla":"Matoušek, Jiří, et al. “Untangling Two Systems of Noncrossing Curves.” Israel Journal of Mathematics, vol. 212, no. 1, Springer, 2016, pp. 37–79, doi:10.1007/s11856-016-1294-9.","short":"J. Matoušek, E. Sedgwick, M. Tancer, U. Wagner, Israel Journal of Mathematics 212 (2016) 37–79."},"page":"37 - 79"},{"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1479","ddc":["004"],"title":"A counterexample to the chain rule for conditional HILL entropy","status":"public","intvolume":" 25","pubrep_id":"766","file":[{"date_updated":"2020-07-14T12:44:56Z","date_created":"2018-12-12T10:13:29Z","checksum":"7659296174fa75f5f0364f31f46f4bcf","relation":"main_file","file_id":"5012","file_size":483258,"content_type":"application/pdf","creator":"system","file_name":"IST-2017-766-v1+1_678.pdf","access_level":"open_access"}],"oa_version":"Submitted Version","type":"journal_article","abstract":[{"lang":"eng","text":"Most entropy notions H(.) like Shannon or min-entropy satisfy a chain rule stating that for random variables X,Z, and A we have H(X|Z,A)≥H(X|Z)−|A|. That is, by conditioning on A the entropy of X can decrease by at most the bitlength |A| of A. Such chain rules are known to hold for some computational entropy notions like Yao’s and unpredictability-entropy. For HILL entropy, the computational analogue of min-entropy, the chain rule is of special interest and has found many applications, including leakage-resilient cryptography, deterministic encryption, and memory delegation. These applications rely on restricted special cases of the chain rule. Whether the chain rule for conditional HILL entropy holds in general was an open problem for which we give a strong negative answer: we construct joint distributions (X,Z,A), where A is a distribution over a single bit, such that the HILL entropy H HILL (X|Z) is large but H HILL (X|Z,A) is basically zero.\r\n\r\nOur counterexample just makes the minimal assumption that NP⊈P/poly. Under the stronger assumption that injective one-way function exist, we can make all the distributions efficiently samplable.\r\n\r\nFinally, we show that some more sophisticated cryptographic objects like lossy functions can be used to sample a distribution constituting a counterexample to the chain rule making only a single invocation to the underlying object."}],"issue":"3","publication":"Computational Complexity","citation":{"ama":"Krenn S, Pietrzak KZ, Wadia A, Wichs D. A counterexample to the chain rule for conditional HILL entropy. Computational Complexity. 2016;25(3):567-605. doi:10.1007/s00037-015-0120-9","ista":"Krenn S, Pietrzak KZ, Wadia A, Wichs D. 2016. A counterexample to the chain rule for conditional HILL entropy. Computational Complexity. 25(3), 567–605.","apa":"Krenn, S., Pietrzak, K. Z., Wadia, A., & Wichs, D. (2016). A counterexample to the chain rule for conditional HILL entropy. Computational Complexity. Springer. https://doi.org/10.1007/s00037-015-0120-9","ieee":"S. Krenn, K. Z. Pietrzak, A. Wadia, and D. Wichs, “A counterexample to the chain rule for conditional HILL entropy,” Computational Complexity, vol. 25, no. 3. Springer, pp. 567–605, 2016.","mla":"Krenn, Stephan, et al. “A Counterexample to the Chain Rule for Conditional HILL Entropy.” Computational Complexity, vol. 25, no. 3, Springer, 2016, pp. 567–605, doi:10.1007/s00037-015-0120-9.","short":"S. Krenn, K.Z. Pietrzak, A. Wadia, D. Wichs, Computational Complexity 25 (2016) 567–605.","chicago":"Krenn, Stephan, Krzysztof Z Pietrzak, Akshay Wadia, and Daniel Wichs. “A Counterexample to the Chain Rule for Conditional HILL Entropy.” Computational Complexity. Springer, 2016. https://doi.org/10.1007/s00037-015-0120-9."},"page":"567 - 605","date_published":"2016-09-01T00:00:00Z","scopus_import":1,"day":"01","has_accepted_license":"1","acknowledgement":"This work was partly funded by the European Research Council under ERC Starting Grant 259668-PSPC and ERC Advanced Grant 321310-PERCY.\r\n","year":"2016","publication_status":"published","department":[{"_id":"KrPi"}],"publisher":"Springer","author":[{"id":"329FCCF0-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-2835-9093","first_name":"Stephan","last_name":"Krenn","full_name":"Krenn, Stephan"},{"id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z","last_name":"Pietrzak","full_name":"Pietrzak, Krzysztof Z"},{"full_name":"Wadia, Akshay","first_name":"Akshay","last_name":"Wadia"},{"full_name":"Wichs, Daniel","last_name":"Wichs","first_name":"Daniel"}],"related_material":{"record":[{"id":"2940","relation":"earlier_version","status":"public"}]},"date_updated":"2023-02-23T11:05:09Z","date_created":"2018-12-11T11:52:16Z","volume":25,"file_date_updated":"2020-07-14T12:44:56Z","ec_funded":1,"publist_id":"5715","tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"oa":1,"quality_controlled":"1","project":[{"name":"Provable Security for Physical Cryptography","call_identifier":"FP7","grant_number":"259668","_id":"258C570E-B435-11E9-9278-68D0E5697425"}],"doi":"10.1007/s00037-015-0120-9","language":[{"iso":"eng"}],"month":"09"},{"month":"01","language":[{"iso":"eng"}],"conference":{"name":"ECAI: European Conference on Artificial Intelligence","start_date":"2016-08-29","location":"The Hague, Netherlands","end_date":"2016-09-02"},"doi":"10.3233/978-1-61499-672-9-1432","quality_controlled":"1","oa":1,"tmp":{"name":"Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nc/4.0/legalcode","image":"/images/cc_by_nc.png","short":"CC BY-NC (4.0)"},"license":"https://creativecommons.org/licenses/by-nc/4.0/","file_date_updated":"2020-07-14T12:46:35Z","publist_id":"7342","date_created":"2018-12-11T11:46:41Z","date_updated":"2021-01-12T08:00:54Z","volume":285,"author":[{"orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","last_name":"Chatterjee","first_name":"Krishnendu","full_name":"Chatterjee, Krishnendu"},{"id":"3B699956-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-4783-0389","first_name":"Rasmus","last_name":"Ibsen-Jensen","full_name":"Ibsen-Jensen, Rasmus"}],"publication_status":"published","department":[{"_id":"KrCh"}],"publisher":"IOS Press","year":"2016","day":"01","has_accepted_license":"1","scopus_import":1,"date_published":"2016-01-01T00:00:00Z","page":"1432 - 1439","citation":{"chicago":"Chatterjee, Krishnendu, and Rasmus Ibsen-Jensen. “The Complexity of Deciding Legality of a Single Step of Magic: The Gathering,” 285:1432–39. IOS Press, 2016. https://doi.org/10.3233/978-1-61499-672-9-1432.","mla":"Chatterjee, Krishnendu, and Rasmus Ibsen-Jensen. The Complexity of Deciding Legality of a Single Step of Magic: The Gathering. Vol. 285, IOS Press, 2016, pp. 1432–39, doi:10.3233/978-1-61499-672-9-1432.","short":"K. Chatterjee, R. Ibsen-Jensen, in:, IOS Press, 2016, pp. 1432–1439.","ista":"Chatterjee K, Ibsen-Jensen R. 2016. The complexity of deciding legality of a single step of magic: The gathering. ECAI: European Conference on Artificial Intelligence, Frontiers in Artificial Intelligence and Applications, vol. 285, 1432–1439.","apa":"Chatterjee, K., & Ibsen-Jensen, R. (2016). The complexity of deciding legality of a single step of magic: The gathering (Vol. 285, pp. 1432–1439). Presented at the ECAI: European Conference on Artificial Intelligence, The Hague, Netherlands: IOS Press. https://doi.org/10.3233/978-1-61499-672-9-1432","ieee":"K. Chatterjee and R. Ibsen-Jensen, “The complexity of deciding legality of a single step of magic: The gathering,” presented at the ECAI: European Conference on Artificial Intelligence, The Hague, Netherlands, 2016, vol. 285, pp. 1432–1439.","ama":"Chatterjee K, Ibsen-Jensen R. The complexity of deciding legality of a single step of magic: The gathering. In: Vol 285. IOS Press; 2016:1432-1439. doi:10.3233/978-1-61499-672-9-1432"},"abstract":[{"lang":"eng","text":"Magic: the Gathering is a game about magical combat for any number of players. Formally it is a zero-sum, imperfect information stochastic game that consists of a potentially unbounded number of steps. We consider the problem of deciding if a move is legal in a given single step of Magic. We show that the problem is (a) coNP-complete in general; and (b) in P if either of two small sets of cards are not used. Our lower bound holds even for single-player Magic games. The significant aspects of our results are as follows: First, in most real-life game problems, the task of deciding whether a given move is legal in a single step is trivial, and the computationally hard task is to find the best sequence of legal moves in the presence of multiple players. In contrast, quite uniquely our hardness result holds for single step and with only one-player. Second, we establish efficient algorithms for important special cases of Magic."}],"alternative_title":["Frontiers in Artificial Intelligence and Applications"],"type":"conference","oa_version":"Published Version","file":[{"relation":"main_file","file_id":"4658","date_created":"2018-12-12T10:07:59Z","date_updated":"2020-07-14T12:46:35Z","checksum":"848043c812ace05e459579c923f3d3cf","file_name":"IST-2018-950-v1+1_2016_Chatterjee_The_complexity.pdf","access_level":"open_access","content_type":"application/pdf","file_size":2116225,"creator":"system"}],"pubrep_id":"950","ddc":["004"],"status":"public","title":"The complexity of deciding legality of a single step of magic: The gathering","intvolume":" 285","_id":"478","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87"},{"type":"conference","alternative_title":["Proceedings International Conference on Software Engineering"],"abstract":[{"text":"Clinical guidelines and decision support systems (DSS) play an important role in daily practices of medicine. Many text-based guidelines have been encoded for work-flow simulation of DSS to automate health care. During the collaboration with Carle hospital to develop a DSS, we identify that, for some complex and life-critical diseases, it is highly desirable to automatically rigorously verify some complex temporal properties in guidelines, which brings new challenges to current simulation based DSS with limited support of automatical formal verification and real-time data analysis. In this paper, we conduct the first study on applying runtime verification to cooperate with current DSS based on real-time data. Within the proposed technique, a user-friendly domain specific language, named DRTV, is designed to specify vital real-time data sampled by medical devices and temporal properties originated from clinical guidelines. Some interfaces are developed for data acquisition and communication. Then, for medical practice scenarios described in DRTV model, we will automatically generate event sequences and runtime property verifier automata. If a temporal property violates, real-time warnings will be produced by the formal verifier and passed to medical DSS. We have used DRTV to specify different kinds of medical care scenarios, and applied the proposed technique to assist existing DSS. As presented in experiment results, in terms of warning detection, it outperforms the only use of DSS or human inspection, and improves the quality of clinical health care of hospital","lang":"eng"}],"publist_id":"7341","_id":"479","acknowledgement":"This work is supported by NSF CNS 13-30077, NSF CNS 13-29886, NSF CNS 15-45002, and NSFC 61303014.\r\nThe authors thank Dr. Bobby and Dr. Hill at Carle Hospital, Urbana, IL for their help with the discussion on medical knowledge.\r\n\r\n","year":"2016","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","title":"Use runtime verification to improve the quality of medical care practice","status":"public","publication_status":"published","department":[{"_id":"ToHe"}],"publisher":"IEEE","author":[{"first_name":"Yu","last_name":"Jiang","full_name":"Jiang, Yu"},{"last_name":"Liu","first_name":"Han","full_name":"Liu, Han"},{"orcid":"0000-0002-3066-6941","id":"3BDE25AA-F248-11E8-B48F-1D18A9856A87","last_name":"Kong","first_name":"Hui","full_name":"Kong, Hui"},{"full_name":"Wang, Rui","last_name":"Wang","first_name":"Rui"},{"last_name":"Hosseini","first_name":"Mohamad","full_name":"Hosseini, Mohamad"},{"last_name":"Sun","first_name":"Jiaguang","full_name":"Sun, Jiaguang"},{"full_name":"Sha, Lui","first_name":"Lui","last_name":"Sha"}],"date_updated":"2021-01-12T08:00:55Z","date_created":"2018-12-11T11:46:42Z","oa_version":"None","scopus_import":1,"month":"05","day":"14","publication":"Proceedings of the 38th International Conference on Software Engineering Companion ","citation":{"apa":"Jiang, Y., Liu, H., Kong, H., Wang, R., Hosseini, M., Sun, J., & Sha, L. (2016). Use runtime verification to improve the quality of medical care practice. In Proceedings of the 38th International Conference on Software Engineering Companion (pp. 112–121). Austin, TX, USA: IEEE. https://doi.org/10.1145/2889160.2889233","ieee":"Y. Jiang et al., “Use runtime verification to improve the quality of medical care practice,” in Proceedings of the 38th International Conference on Software Engineering Companion , Austin, TX, USA, 2016, pp. 112–121.","ista":"Jiang Y, Liu H, Kong H, Wang R, Hosseini M, Sun J, Sha L. 2016. Use runtime verification to improve the quality of medical care practice. Proceedings of the 38th International Conference on Software Engineering Companion . ICSE: International Conference on Software Engineering, Proceedings International Conference on Software Engineering, , 112–121.","ama":"Jiang Y, Liu H, Kong H, et al. Use runtime verification to improve the quality of medical care practice. In: Proceedings of the 38th International Conference on Software Engineering Companion . IEEE; 2016:112-121. doi:10.1145/2889160.2889233","chicago":"Jiang, Yu, Han Liu, Hui Kong, Rui Wang, Mohamad Hosseini, Jiaguang Sun, and Lui Sha. “Use Runtime Verification to Improve the Quality of Medical Care Practice.” In Proceedings of the 38th International Conference on Software Engineering Companion , 112–21. IEEE, 2016. https://doi.org/10.1145/2889160.2889233.","short":"Y. Jiang, H. Liu, H. Kong, R. Wang, M. Hosseini, J. Sun, L. Sha, in:, Proceedings of the 38th International Conference on Software Engineering Companion , IEEE, 2016, pp. 112–121.","mla":"Jiang, Yu, et al. “Use Runtime Verification to Improve the Quality of Medical Care Practice.” Proceedings of the 38th International Conference on Software Engineering Companion , IEEE, 2016, pp. 112–21, doi:10.1145/2889160.2889233."},"quality_controlled":"1","page":"112 - 121","conference":{"end_date":"2016-05-22","location":"Austin, TX, USA","start_date":"2016-05-14","name":"ICSE: International Conference on Software Engineering"},"date_published":"2016-05-14T00:00:00Z","doi":"10.1145/2889160.2889233","language":[{"iso":"eng"}]},{"publist_id":"7340","ec_funded":1,"publisher":"IEEE","department":[{"_id":"KrCh"}],"publication_status":"published","year":"2016","volume":"05-08-July-2016","date_updated":"2021-01-12T08:00:56Z","date_created":"2018-12-11T11:46:42Z","author":[{"last_name":"Chatterjee","first_name":"Krishnendu","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu"},{"full_name":"Doyen, Laurent","first_name":"Laurent","last_name":"Doyen"}],"month":"07","project":[{"name":"Rigorous Systems Engineering","call_identifier":"FWF","_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23"},{"grant_number":"279307","_id":"2581B60A-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","name":"Quantitative Graph Games: Theory and Applications"},{"_id":"25892FC0-B435-11E9-9278-68D0E5697425","grant_number":"ICT15-003","name":"Efficient Algorithms for Computer Aided Verification"}],"quality_controlled":"1","main_file_link":[{"url":"https://arxiv.org/abs/1604.06376","open_access":"1"}],"oa":1,"language":[{"iso":"eng"}],"doi":"10.1145/2933575.2934513","conference":{"name":"LICS: Logic in Computer Science","end_date":"2016-07-08","start_date":"2016-07-05","location":"New York, NY, USA"},"alternative_title":["Proceedings Symposium on Logic in Computer Science"],"type":"conference","abstract":[{"lang":"eng","text":"Graph games provide the foundation for modeling and synthesizing reactive processes. In the synthesis of stochastic reactive processes, the traditional model is perfect-information stochastic games, where some transitions of the game graph are controlled by two adversarial players, and the other transitions are executed probabilistically. We consider such games where the objective is the conjunction of several quantitative objectives (specified as mean-payoff conditions), which we refer to as generalized mean-payoff objectives. The basic decision problem asks for the existence of a finite-memory strategy for a player that ensures the generalized mean-payoff objective be satisfied with a desired probability against all strategies of the opponent. A special case of the decision problem is the almost-sure problem where the desired probability is 1. Previous results presented a semi-decision procedure for -approximations of the almost-sure problem. In this work, we show that both the almost-sure problem as well as the general basic decision problem are coNP-complete, significantly improving the previous results. Moreover, we show that in the case of 1-player stochastic games, randomized memoryless strategies are sufficient and the problem can be solved in polynomial time. In contrast, in two-player stochastic games, we show that even with randomized strategies exponential memory is required in general, and present a matching exponential upper bound. We also study the basic decision problem with infinite-memory strategies and present computational complexity results for the problem. Our results are relevant in the synthesis of stochastic reactive systems with multiple quantitative requirements."}],"title":"Perfect-information stochastic games with generalized mean-payoff objectives","status":"public","_id":"480","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","oa_version":"Preprint","scopus_import":1,"day":"05","page":"247 - 256","citation":{"chicago":"Chatterjee, Krishnendu, and Laurent Doyen. “Perfect-Information Stochastic Games with Generalized Mean-Payoff Objectives,” 05-08-July-2016:247–56. IEEE, 2016. https://doi.org/10.1145/2933575.2934513.","mla":"Chatterjee, Krishnendu, and Laurent Doyen. Perfect-Information Stochastic Games with Generalized Mean-Payoff Objectives. Vol. 05-08-July-2016, IEEE, 2016, pp. 247–56, doi:10.1145/2933575.2934513.","short":"K. Chatterjee, L. Doyen, in:, IEEE, 2016, pp. 247–256.","ista":"Chatterjee K, Doyen L. 2016. Perfect-information stochastic games with generalized mean-payoff objectives. LICS: Logic in Computer Science, Proceedings Symposium on Logic in Computer Science, vol. 05-08-July-2016, 247–256.","ieee":"K. Chatterjee and L. Doyen, “Perfect-information stochastic games with generalized mean-payoff objectives,” presented at the LICS: Logic in Computer Science, New York, NY, USA, 2016, vol. 05-08-July-2016, pp. 247–256.","apa":"Chatterjee, K., & Doyen, L. (2016). Perfect-information stochastic games with generalized mean-payoff objectives (Vol. 05-08-July-2016, pp. 247–256). Presented at the LICS: Logic in Computer Science, New York, NY, USA: IEEE. https://doi.org/10.1145/2933575.2934513","ama":"Chatterjee K, Doyen L. Perfect-information stochastic games with generalized mean-payoff objectives. In: Vol 05-08-July-2016. IEEE; 2016:247-256. doi:10.1145/2933575.2934513"},"date_published":"2016-07-05T00:00:00Z"},{"oa_version":"Published Version","file":[{"date_created":"2018-12-12T10:12:12Z","date_updated":"2020-07-14T12:44:47Z","checksum":"f04248a61c24297cfabd30c5f8e0deb9","relation":"main_file","file_id":"4930","file_size":574770,"content_type":"application/pdf","creator":"system","file_name":"IST-2016-622-v1+1_LIPIcs-SoCG-2016-24.pdf","access_level":"open_access"}],"pubrep_id":"622","ddc":["510"],"title":"Finding non-orientable surfaces in 3-manifolds","status":"public","intvolume":" 51","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1379","abstract":[{"text":"We investigate the complexity of finding an embedded non-orientable surface of Euler genus g in a triangulated 3-manifold. This problem occurs both as a natural question in low-dimensional topology, and as a first non-trivial instance of embeddability of complexes into 3-manifolds. We prove that the problem is NP-hard, thus adding to the relatively few hardness results that are currently known in 3-manifold topology. In addition, we show that the problem lies in NP when the Euler genus g is odd, and we give an explicit algorithm in this case.","lang":"eng"}],"alternative_title":["LIPIcs"],"type":"conference","date_published":"2016-06-01T00:00:00Z","page":"24.1 - 24.15","citation":{"ista":"Burton B, de Mesmay AN, Wagner U. 2016. Finding non-orientable surfaces in 3-manifolds. SoCG: Symposium on Computational Geometry, LIPIcs, vol. 51, 24.1-24.15.","apa":"Burton, B., de Mesmay, A. N., & Wagner, U. (2016). Finding non-orientable surfaces in 3-manifolds (Vol. 51, p. 24.1-24.15). Presented at the SoCG: Symposium on Computational Geometry, Medford, MA, USA: Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing. https://doi.org/10.4230/LIPIcs.SoCG.2016.24","ieee":"B. Burton, A. N. de Mesmay, and U. Wagner, “Finding non-orientable surfaces in 3-manifolds,” presented at the SoCG: Symposium on Computational Geometry, Medford, MA, USA, 2016, vol. 51, p. 24.1-24.15.","ama":"Burton B, de Mesmay AN, Wagner U. Finding non-orientable surfaces in 3-manifolds. In: Vol 51. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing; 2016:24.1-24.15. doi:10.4230/LIPIcs.SoCG.2016.24","chicago":"Burton, Benjamin, Arnaud N de Mesmay, and Uli Wagner. “Finding Non-Orientable Surfaces in 3-Manifolds,” 51:24.1-24.15. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2016. https://doi.org/10.4230/LIPIcs.SoCG.2016.24.","mla":"Burton, Benjamin, et al. Finding Non-Orientable Surfaces in 3-Manifolds. Vol. 51, Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2016, p. 24.1-24.15, doi:10.4230/LIPIcs.SoCG.2016.24.","short":"B. Burton, A.N. de Mesmay, U. Wagner, in:, Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2016, p. 24.1-24.15."},"day":"01","has_accepted_license":"1","scopus_import":1,"date_updated":"2023-02-23T12:23:20Z","date_created":"2018-12-11T11:51:41Z","volume":51,"author":[{"full_name":"Burton, Benjamin","last_name":"Burton","first_name":"Benjamin"},{"last_name":"De Mesmay","first_name":"Arnaud N","id":"3DB2F25C-F248-11E8-B48F-1D18A9856A87","full_name":"De Mesmay, Arnaud N"},{"id":"36690CA2-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-1494-0568","first_name":"Uli","last_name":"Wagner","full_name":"Wagner, Uli"}],"related_material":{"record":[{"relation":"later_version","status":"public","id":"534"}]},"publication_status":"published","department":[{"_id":"UlWa"}],"publisher":"Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing","year":"2016","file_date_updated":"2020-07-14T12:44:47Z","publist_id":"5832","language":[{"iso":"eng"}],"conference":{"name":"SoCG: Symposium on Computational Geometry","location":"Medford, MA, USA","start_date":"2016-06-14","end_date":"2016-06-17"},"doi":"10.4230/LIPIcs.SoCG.2016.24","quality_controlled":"1","tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"oa":1,"month":"06"},{"month":"08","project":[{"grant_number":"P 23499-N23","_id":"2584A770-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Modern Graph Algorithmic Techniques in Formal Verification"},{"call_identifier":"FWF","name":"Game Theory","grant_number":"S11407","_id":"25863FF4-B435-11E9-9278-68D0E5697425"},{"name":"Quantitative Graph Games: Theory and Applications","call_identifier":"FP7","_id":"2581B60A-B435-11E9-9278-68D0E5697425","grant_number":"279307"},{"name":"Microsoft Research Faculty Fellowship","_id":"2587B514-B435-11E9-9278-68D0E5697425"}],"quality_controlled":"1","oa":1,"main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1309.2802"}],"external_id":{"arxiv":["1309.2802"]},"language":[{"iso":"eng"}],"doi":"10.1016/j.jcss.2016.02.009","publist_id":"5718","ec_funded":1,"department":[{"_id":"KrCh"}],"publisher":"Elsevier","publication_status":"published","year":"2016","volume":82,"date_created":"2018-12-11T11:52:15Z","date_updated":"2023-02-23T12:24:38Z","related_material":{"record":[{"relation":"earlier_version","status":"public","id":"2295"},{"status":"public","relation":"earlier_version","id":"5400"}]},"author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","first_name":"Krishnendu","last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu"},{"full_name":"Chmelik, Martin","first_name":"Martin","last_name":"Chmelik","id":"3624234E-F248-11E8-B48F-1D18A9856A87"},{"id":"3F54FA38-F248-11E8-B48F-1D18A9856A87","first_name":"Mathieu","last_name":"Tracol","full_name":"Tracol, Mathieu"}],"scopus_import":1,"day":"01","page":"878 - 911","citation":{"chicago":"Chatterjee, Krishnendu, Martin Chmelik, and Mathieu Tracol. “What Is Decidable about Partially Observable Markov Decision Processes with ω-Regular Objectives.” Journal of Computer and System Sciences. Elsevier, 2016. https://doi.org/10.1016/j.jcss.2016.02.009.","mla":"Chatterjee, Krishnendu, et al. “What Is Decidable about Partially Observable Markov Decision Processes with ω-Regular Objectives.” Journal of Computer and System Sciences, vol. 82, no. 5, Elsevier, 2016, pp. 878–911, doi:10.1016/j.jcss.2016.02.009.","short":"K. Chatterjee, M. Chmelik, M. Tracol, Journal of Computer and System Sciences 82 (2016) 878–911.","ista":"Chatterjee K, Chmelik M, Tracol M. 2016. What is decidable about partially observable Markov decision processes with ω-regular objectives. Journal of Computer and System Sciences. 82(5), 878–911.","apa":"Chatterjee, K., Chmelik, M., & Tracol, M. (2016). What is decidable about partially observable Markov decision processes with ω-regular objectives. Journal of Computer and System Sciences. Elsevier. https://doi.org/10.1016/j.jcss.2016.02.009","ieee":"K. Chatterjee, M. Chmelik, and M. Tracol, “What is decidable about partially observable Markov decision processes with ω-regular objectives,” Journal of Computer and System Sciences, vol. 82, no. 5. Elsevier, pp. 878–911, 2016.","ama":"Chatterjee K, Chmelik M, Tracol M. What is decidable about partially observable Markov decision processes with ω-regular objectives. Journal of Computer and System Sciences. 2016;82(5):878-911. doi:10.1016/j.jcss.2016.02.009"},"publication":"Journal of Computer and System Sciences","date_published":"2016-08-01T00:00:00Z","type":"journal_article","issue":"5","abstract":[{"text":"We consider partially observable Markov decision processes (POMDPs) with ω-regular conditions specified as parity objectives. The class of ω-regular languages provides a robust specification language to express properties in verification, and parity objectives are canonical forms to express them. The qualitative analysis problem given a POMDP and a parity objective asks whether there is a strategy to ensure that the objective is satisfied with probability 1 (resp. positive probability). While the qualitative analysis problems are undecidable even for special cases of parity objectives, we establish decidability (with optimal complexity) for POMDPs with all parity objectives under finite-memory strategies. We establish optimal (exponential) memory bounds and EXPTIME-completeness of the qualitative analysis problems under finite-memory strategies for POMDPs with parity objectives. We also present a practical approach, where we design heuristics to deal with the exponential complexity, and have applied our implementation on a number of POMDP examples.","lang":"eng"}],"intvolume":" 82","status":"public","title":"What is decidable about partially observable Markov decision processes with ω-regular objectives","_id":"1477","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","oa_version":"Preprint"},{"publication_status":"published","publisher":"Elsevier","department":[{"_id":"KrCh"}],"acknowledgement":"We thank Blai Bonet for helping us with RTDP-Bel. The research was partly supported by Austrian Science Fund (FWF) Grant No P23499-N23, FWF NFN Grant No S11407-N23 (RiSE), ERC Start grant (279307: Graph Games), and Microsoft faculty fellows award.","year":"2016","date_created":"2018-12-11T11:52:33Z","date_updated":"2023-02-23T12:25:49Z","volume":234,"author":[{"orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","last_name":"Chatterjee","first_name":"Krishnendu","full_name":"Chatterjee, Krishnendu"},{"first_name":"Martin","last_name":"Chmelik","id":"3624234E-F248-11E8-B48F-1D18A9856A87","full_name":"Chmelik, Martin"},{"last_name":"Gupta","first_name":"Raghav","full_name":"Gupta, Raghav"},{"full_name":"Kanodia, Ayush","last_name":"Kanodia","first_name":"Ayush"}],"related_material":{"record":[{"id":"1820","relation":"earlier_version","status":"public"},{"status":"public","relation":"earlier_version","id":"5425"}]},"publist_id":"5642","ec_funded":1,"quality_controlled":"1","project":[{"name":"Modern Graph Algorithmic Techniques in Formal Verification","call_identifier":"FWF","_id":"2584A770-B435-11E9-9278-68D0E5697425","grant_number":"P 23499-N23"},{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Rigorous Systems Engineering"},{"grant_number":"279307","_id":"2581B60A-B435-11E9-9278-68D0E5697425","name":"Quantitative Graph Games: Theory and Applications","call_identifier":"FP7"}],"main_file_link":[{"url":"http://arxiv.org/abs/1411.3880","open_access":"1"}],"oa":1,"external_id":{"arxiv":["1411.3880"]},"language":[{"iso":"eng"}],"doi":"10.1016/j.artint.2016.01.007","month":"05","title":"Optimal cost almost-sure reachability in POMDPs","status":"public","intvolume":" 234","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","_id":"1529","oa_version":"Preprint","type":"journal_article","abstract":[{"lang":"eng","text":"We consider partially observable Markov decision processes (POMDPs) with a set of target states and an integer cost associated with every transition. The optimization objective we study asks to minimize the expected total cost of reaching a state in the target set, while ensuring that the target set is reached almost surely (with probability 1). We show that for integer costs approximating the optimal cost is undecidable. For positive costs, our results are as follows: (i) we establish matching lower and upper bounds for the optimal cost, both double exponential in the POMDP state space size; (ii) we show that the problem of approximating the optimal cost is decidable and present approximation algorithms developing on the existing algorithms for POMDPs with finite-horizon objectives. While the worst-case running time of our algorithm is double exponential, we also present efficient stopping criteria for the algorithm and show experimentally that it performs well in many examples of interest."}],"page":"26 - 48","publication":"Artificial Intelligence","citation":{"apa":"Chatterjee, K., Chmelik, M., Gupta, R., & Kanodia, A. (2016). Optimal cost almost-sure reachability in POMDPs. Artificial Intelligence. Elsevier. https://doi.org/10.1016/j.artint.2016.01.007","ieee":"K. Chatterjee, M. Chmelik, R. Gupta, and A. Kanodia, “Optimal cost almost-sure reachability in POMDPs,” Artificial Intelligence, vol. 234. Elsevier, pp. 26–48, 2016.","ista":"Chatterjee K, Chmelik M, Gupta R, Kanodia A. 2016. Optimal cost almost-sure reachability in POMDPs. Artificial Intelligence. 234, 26–48.","ama":"Chatterjee K, Chmelik M, Gupta R, Kanodia A. Optimal cost almost-sure reachability in POMDPs. Artificial Intelligence. 2016;234:26-48. doi:10.1016/j.artint.2016.01.007","chicago":"Chatterjee, Krishnendu, Martin Chmelik, Raghav Gupta, and Ayush Kanodia. “Optimal Cost Almost-Sure Reachability in POMDPs.” Artificial Intelligence. Elsevier, 2016. https://doi.org/10.1016/j.artint.2016.01.007.","short":"K. Chatterjee, M. Chmelik, R. Gupta, A. Kanodia, Artificial Intelligence 234 (2016) 26–48.","mla":"Chatterjee, Krishnendu, et al. “Optimal Cost Almost-Sure Reachability in POMDPs.” Artificial Intelligence, vol. 234, Elsevier, 2016, pp. 26–48, doi:10.1016/j.artint.2016.01.007."},"date_published":"2016-05-01T00:00:00Z","scopus_import":1,"day":"01","article_processing_charge":"No"},{"publication_identifier":{"issn":["2664-1690"]},"has_accepted_license":"1","day":"31","month":"03","oa":1,"citation":{"ama":"Chatterjee K, Pavlogiannis A, Velner Y. Quantitative Interprocedural Analysis. IST Austria; 2016. doi:10.15479/AT:IST-2016-523-v1-1","ista":"Chatterjee K, Pavlogiannis A, Velner Y. 2016. Quantitative interprocedural analysis, IST Austria, 33p.","apa":"Chatterjee, K., Pavlogiannis, A., & Velner, Y. (2016). Quantitative interprocedural analysis. IST Austria. https://doi.org/10.15479/AT:IST-2016-523-v1-1","ieee":"K. Chatterjee, A. Pavlogiannis, and Y. Velner, Quantitative interprocedural analysis. IST Austria, 2016.","mla":"Chatterjee, Krishnendu, et al. Quantitative Interprocedural Analysis. IST Austria, 2016, doi:10.15479/AT:IST-2016-523-v1-1.","short":"K. Chatterjee, A. Pavlogiannis, Y. Velner, Quantitative Interprocedural Analysis, IST Austria, 2016.","chicago":"Chatterjee, Krishnendu, Andreas Pavlogiannis, and Yaron Velner. Quantitative Interprocedural Analysis. IST Austria, 2016. https://doi.org/10.15479/AT:IST-2016-523-v1-1."},"page":"33","doi":"10.15479/AT:IST-2016-523-v1-1","date_published":"2016-03-31T00:00:00Z","language":[{"iso":"eng"}],"type":"technical_report","alternative_title":["IST Austria Technical Report"],"abstract":[{"lang":"eng","text":"We consider the quantitative analysis problem for interprocedural control-flow graphs (ICFGs). The input consists of an ICFG, a positive weight function that assigns every transition a positive integer-valued number, and a labelling of the transitions (events) as good, bad, and neutral events. The weight function assigns to each transition a numerical value that represents ameasure of how good or bad an event is. The quantitative analysis problem asks whether there is a run of the ICFG where the ratio of the sum of the numerical weights of good events versus the sum of weights of bad events in the long-run is at least a given threshold (or equivalently, to compute the maximal ratio among all valid paths in the ICFG). The quantitative analysis problem for ICFGs can be solved in polynomial time, and we present an efficient and practical algorithm for the problem. We show that several problems relevant for static program analysis, such as estimating the worst-case execution time of a program or the average energy consumption of a mobile application, can be modeled in our framework. We have implemented our algorithm as a tool in the Java Soot framework. We demonstrate the effectiveness of our approach with two case studies. First, we show that our framework provides a sound approach (no false positives) for the analysis of inefficiently-used containers. Second, we show that our approach can also be used for static profiling of programs which reasons about methods that are frequently invoked. Our experimental results show that our tool scales to relatively large benchmarks, and discovers relevant and useful information that can be used to optimize performance of the programs. "}],"file_date_updated":"2020-07-14T12:46:58Z","_id":"5445","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","year":"2016","publisher":"IST Austria","department":[{"_id":"KrCh"}],"ddc":["005"],"publication_status":"published","status":"public","title":"Quantitative interprocedural analysis","pubrep_id":"523","related_material":{"record":[{"id":"1604","status":"public","relation":"later_version"}]},"author":[{"full_name":"Chatterjee, Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","first_name":"Krishnendu","last_name":"Chatterjee"},{"full_name":"Pavlogiannis, Andreas","orcid":"0000-0002-8943-0722","id":"49704004-F248-11E8-B48F-1D18A9856A87","last_name":"Pavlogiannis","first_name":"Andreas"},{"first_name":"Yaron","last_name":"Velner","full_name":"Velner, Yaron"}],"oa_version":"Published Version","file":[{"file_size":1012204,"content_type":"application/pdf","creator":"system","file_name":"IST-2016-523-v1+1_main.pdf","access_level":"open_access","date_updated":"2020-07-14T12:46:58Z","date_created":"2018-12-12T11:53:52Z","checksum":"cef516fa091925b5868813e355268fb4","relation":"main_file","file_id":"5513"}],"date_updated":"2023-02-23T10:06:22Z","date_created":"2018-12-12T11:39:22Z"},{"day":"02","month":"12","citation":{"short":"K. Chatterjee, M. Chmelik, J. Davies, in:, Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, AAAI Press, 2016, pp. 3225–3232.","mla":"Chatterjee, Krishnendu, et al. “A Symbolic SAT Based Algorithm for Almost Sure Reachability with Small Strategies in Pomdps.” Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, vol. 2016, AAAI Press, 2016, pp. 3225–32.","chicago":"Chatterjee, Krishnendu, Martin Chmelik, and Jessica Davies. “A Symbolic SAT Based Algorithm for Almost Sure Reachability with Small Strategies in Pomdps.” In Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016:3225–32. AAAI Press, 2016.","ama":"Chatterjee K, Chmelik M, Davies J. A symbolic SAT based algorithm for almost sure reachability with small strategies in pomdps. In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence. Vol 2016. AAAI Press; 2016:3225-3232.","apa":"Chatterjee, K., Chmelik, M., & Davies, J. (2016). A symbolic SAT based algorithm for almost sure reachability with small strategies in pomdps. In Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (Vol. 2016, pp. 3225–3232). Phoenix, AZ, USA: AAAI Press.","ieee":"K. Chatterjee, M. Chmelik, and J. Davies, “A symbolic SAT based algorithm for almost sure reachability with small strategies in pomdps,” in Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, Phoenix, AZ, USA, 2016, vol. 2016, pp. 3225–3232.","ista":"Chatterjee K, Chmelik M, Davies J. 2016. A symbolic SAT based algorithm for almost sure reachability with small strategies in pomdps. Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence. AAAI: Conference on Artificial Intelligence vol. 2016, 3225–3232."},"publication":"Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence","project":[{"grant_number":"P 23499-N23","_id":"2584A770-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Modern Graph Algorithmic Techniques in Formal Verification"},{"_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23","name":"Rigorous Systems Engineering","call_identifier":"FWF"},{"_id":"2581B60A-B435-11E9-9278-68D0E5697425","grant_number":"279307","name":"Quantitative Graph Games: Theory and Applications","call_identifier":"FP7"}],"page":"3225 - 3232","quality_controlled":"1","date_published":"2016-12-02T00:00:00Z","conference":{"name":"AAAI: Conference on Artificial Intelligence","end_date":"2016-02-17","start_date":"2016-02-12","location":"Phoenix, AZ, USA"},"language":[{"iso":"eng"}],"type":"conference","publist_id":"6191","ec_funded":1,"abstract":[{"text":"POMDPs are standard models for probabilistic planning problems, where an agent interacts with an uncertain environment. We study the problem of almost-sure reachability, where given a set of target states, the question is to decide whether there is a policy to ensure that the target set is reached with probability 1 (almost-surely). While in general the problem is EXPTIMEcomplete, in many practical cases policies with a small amount of memory suffice. Moreover, the existing solution to the problem is explicit, which first requires to construct explicitly an exponential reduction to a belief-support MDP. In this work, we first study the existence of observation-stationary strategies, which is NP-complete, and then small-memory strategies. We present a symbolic algorithm by an efficient encoding to SAT and using a SAT solver for the problem. We report experimental results demonstrating the scalability of our symbolic (SAT-based) approach. © 2016, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved.","lang":"eng"}],"_id":"1166","year":"2016","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","intvolume":" 2016","publisher":"AAAI Press","department":[{"_id":"KrCh"},{"_id":"ToHe"}],"publication_status":"published","title":"A symbolic SAT based algorithm for almost sure reachability with small strategies in pomdps","status":"public","related_material":{"link":[{"relation":"table_of_contents","url":"https://dl.acm.org/citation.cfm?id=3016355"}],"record":[{"status":"public","relation":"earlier_version","id":"5443"}]},"author":[{"full_name":"Chatterjee, Krishnendu","first_name":"Krishnendu","last_name":"Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X"},{"id":"3624234E-F248-11E8-B48F-1D18A9856A87","first_name":"Martin","last_name":"Chmelik","full_name":"Chmelik, Martin"},{"last_name":"Davies","first_name":"Jessica","id":"378E0060-F248-11E8-B48F-1D18A9856A87","full_name":"Davies, Jessica"}],"volume":2016,"oa_version":"None","date_created":"2018-12-11T11:50:30Z","date_updated":"2023-02-23T12:26:41Z"},{"abstract":[{"text":"The fixation probability is the probability that a new mutant introduced in a homogeneous population eventually takes over the entire population.\r\nThe fixation probability is a fundamental quantity of natural selection, and known to depend on the population structure.\r\nAmplifiers of natural selection are population structures which increase the fixation probability of advantageous mutants, as compared to the baseline case of well-mixed populations. In this work we focus on symmetric population structures represented as undirected graphs. In the regime of undirected graphs, the strongest amplifier known has been the Star graph, and the existence of undirected graphs with stronger amplification properties has remained open for over a decade.\r\nIn this work we present the Comet and Comet-swarm families of undirected graphs. We show that for a range of fitness values of the mutants, the Comet and Comet-swarm graphs have fixation probability strictly larger than the fixation probability of the Star graph, for fixed population size and at the limit of large populations, respectively.","lang":"eng"}],"file_date_updated":"2020-07-14T12:46:58Z","alternative_title":["IST Austria Technical Report"],"type":"technical_report","file":[{"relation":"main_file","file_id":"5529","date_updated":"2020-07-14T12:46:58Z","date_created":"2018-12-12T11:54:07Z","checksum":"8345a8c1e7d7f0cd92516d182b7fc59e","file_name":"IST-2016-648-v1+1_tr.pdf","access_level":"open_access","content_type":"application/pdf","file_size":1264221,"creator":"system"}],"oa_version":"Updated Version","date_updated":"2023-02-23T12:22:21Z","date_created":"2018-12-12T11:39:24Z","related_material":{"record":[{"relation":"later_version","status":"public","id":"512"}]},"pubrep_id":"648","author":[{"last_name":"Pavlogiannis","first_name":"Andreas","orcid":"0000-0002-8943-0722","id":"49704004-F248-11E8-B48F-1D18A9856A87","full_name":"Pavlogiannis, Andreas"},{"full_name":"Tkadlec, Josef","id":"3F24CCC8-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-1097-9684","first_name":"Josef","last_name":"Tkadlec"},{"full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","first_name":"Krishnendu","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Martin","last_name":"Nowak","full_name":"Nowak, Martin"}],"department":[{"_id":"KrCh"}],"publisher":"IST Austria","status":"public","title":"Amplification on undirected population structures: Comets beat stars","ddc":["519"],"publication_status":"published","_id":"5449","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","year":"2016","publication_identifier":{"issn":["2664-1690"]},"has_accepted_license":"1","month":"11","day":"09","language":[{"iso":"eng"}],"doi":"10.15479/AT:IST-2016-648-v1-1","date_published":"2016-11-09T00:00:00Z","page":"22","citation":{"short":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, M. Nowak, Amplification on Undirected Population Structures: Comets Beat Stars, IST Austria, 2016.","mla":"Pavlogiannis, Andreas, et al. Amplification on Undirected Population Structures: Comets Beat Stars. IST Austria, 2016, doi:10.15479/AT:IST-2016-648-v1-1.","chicago":"Pavlogiannis, Andreas, Josef Tkadlec, Krishnendu Chatterjee, and Martin Nowak. Amplification on Undirected Population Structures: Comets Beat Stars. IST Austria, 2016. https://doi.org/10.15479/AT:IST-2016-648-v1-1.","ama":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. Amplification on Undirected Population Structures: Comets Beat Stars. IST Austria; 2016. doi:10.15479/AT:IST-2016-648-v1-1","apa":"Pavlogiannis, A., Tkadlec, J., Chatterjee, K., & Nowak, M. (2016). Amplification on undirected population structures: Comets beat stars. IST Austria. https://doi.org/10.15479/AT:IST-2016-648-v1-1","ieee":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, and M. Nowak, Amplification on undirected population structures: Comets beat stars. IST Austria, 2016.","ista":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. 2016. Amplification on undirected population structures: Comets beat stars, IST Austria, 22p."},"oa":1},{"file_date_updated":"2020-07-14T12:46:59Z","alternative_title":["IST Austria Technical Report"],"type":"technical_report","date_updated":"2023-02-23T12:27:07Z","date_created":"2018-12-12T11:39:25Z","oa_version":"Published Version","file":[{"checksum":"83b0313dab3bff4bdb6ac38695026fda","date_updated":"2020-07-14T12:46:59Z","date_created":"2018-12-12T11:53:13Z","relation":"main_file","file_id":"5474","file_size":1015647,"content_type":"application/pdf","creator":"system","access_level":"open_access","file_name":"IST-2017-749-v3+1_main.pdf"}],"author":[{"full_name":"Pavlogiannis, Andreas","last_name":"Pavlogiannis","first_name":"Andreas","orcid":"0000-0002-8943-0722","id":"49704004-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Tkadlec","first_name":"Josef","orcid":"0000-0002-1097-9684","id":"3F24CCC8-F248-11E8-B48F-1D18A9856A87","full_name":"Tkadlec, Josef"},{"last_name":"Chatterjee","first_name":"Krishnendu","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu"},{"full_name":"Nowak, Martin","first_name":"Martin","last_name":"Nowak"}],"related_material":{"record":[{"relation":"earlier_version","status":"public","id":"5452"}]},"pubrep_id":"755","status":"public","title":"Arbitrarily strong amplifiers of natural selection","publication_status":"published","ddc":["000"],"publisher":"IST Austria","department":[{"_id":"KrCh"}],"_id":"5453","year":"2016","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","day":"30","month":"12","has_accepted_license":"1","publication_identifier":{"issn":["2664-1690"]},"language":[{"iso":"eng"}],"date_published":"2016-12-30T00:00:00Z","doi":"10.15479/AT:IST-2017-749-v3-1","page":"34","oa":1,"citation":{"short":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, M. Nowak, Arbitrarily Strong Amplifiers of Natural Selection, IST Austria, 2016.","mla":"Pavlogiannis, Andreas, et al. Arbitrarily Strong Amplifiers of Natural Selection. IST Austria, 2016, doi:10.15479/AT:IST-2017-749-v3-1.","chicago":"Pavlogiannis, Andreas, Josef Tkadlec, Krishnendu Chatterjee, and Martin Nowak. Arbitrarily Strong Amplifiers of Natural Selection. IST Austria, 2016. https://doi.org/10.15479/AT:IST-2017-749-v3-1.","ama":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. Arbitrarily Strong Amplifiers of Natural Selection. IST Austria; 2016. doi:10.15479/AT:IST-2017-749-v3-1","apa":"Pavlogiannis, A., Tkadlec, J., Chatterjee, K., & Nowak, M. (2016). Arbitrarily strong amplifiers of natural selection. IST Austria. https://doi.org/10.15479/AT:IST-2017-749-v3-1","ieee":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, and M. Nowak, Arbitrarily strong amplifiers of natural selection. IST Austria, 2016.","ista":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. 2016. Arbitrarily strong amplifiers of natural selection, IST Austria, 34p."}},{"day":"30","month":"12","has_accepted_license":"1","publication_identifier":{"issn":["2664-1690"]},"date_published":"2016-12-30T00:00:00Z","doi":"10.15479/AT:IST-2016-728-v1-1","language":[{"iso":"eng"}],"citation":{"chicago":"Pavlogiannis, Andreas, Josef Tkadlec, Krishnendu Chatterjee, and Martin Nowak. Strong Amplifiers of Natural Selection. IST Austria, 2016. https://doi.org/10.15479/AT:IST-2016-728-v1-1.","short":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, M. Nowak, Strong Amplifiers of Natural Selection, IST Austria, 2016.","mla":"Pavlogiannis, Andreas, et al. Strong Amplifiers of Natural Selection. IST Austria, 2016, doi:10.15479/AT:IST-2016-728-v1-1.","apa":"Pavlogiannis, A., Tkadlec, J., Chatterjee, K., & Nowak, M. (2016). Strong amplifiers of natural selection. IST Austria. https://doi.org/10.15479/AT:IST-2016-728-v1-1","ieee":"A. Pavlogiannis, J. Tkadlec, K. Chatterjee, and M. Nowak, Strong amplifiers of natural selection. IST Austria, 2016.","ista":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. 2016. Strong amplifiers of natural selection, IST Austria, 34p.","ama":"Pavlogiannis A, Tkadlec J, Chatterjee K, Nowak M. Strong Amplifiers of Natural Selection. IST Austria; 2016. doi:10.15479/AT:IST-2016-728-v1-1"},"oa":1,"page":"34","file_date_updated":"2020-07-14T12:46:59Z","type":"technical_report","alternative_title":["IST Austria Technical Report"],"author":[{"full_name":"Pavlogiannis, Andreas","orcid":"0000-0002-8943-0722","id":"49704004-F248-11E8-B48F-1D18A9856A87","last_name":"Pavlogiannis","first_name":"Andreas"},{"first_name":"Josef","last_name":"Tkadlec","id":"3F24CCC8-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-1097-9684","full_name":"Tkadlec, Josef"},{"full_name":"Chatterjee, Krishnendu","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","last_name":"Chatterjee","first_name":"Krishnendu"},{"first_name":"Martin","last_name":"Nowak","full_name":"Nowak, Martin"}],"pubrep_id":"728","date_created":"2018-12-12T11:39:24Z","date_updated":"2023-02-23T12:27:05Z","oa_version":"Published Version","file":[{"file_id":"5465","relation":"main_file","checksum":"7b8bb17c322c0556acba6ac169fa71c1","date_created":"2018-12-12T11:53:04Z","date_updated":"2020-07-14T12:46:59Z","access_level":"open_access","file_name":"IST-2016-728-v1+1_main.pdf","creator":"system","content_type":"application/pdf","file_size":1014732}],"_id":"5451","year":"2016","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","status":"public","publication_status":"published","ddc":["000"],"title":"Strong amplifiers of natural selection","department":[{"_id":"KrCh"}],"publisher":"IST Austria"},{"page":"256-267","publication":"Discrete Geometry for Computer Imagery","citation":{"chicago":"Biswas, Ranita, and Partha Bhowmick. “On Functionality of Quadraginta Octants of Naive Sphere with Application to Circle Drawing.” In Discrete Geometry for Computer Imagery, 9647:256–67. Cham: Springer Nature, 2016. https://doi.org/10.1007/978-3-319-32360-2_20.","short":"R. Biswas, P. Bhowmick, in:, Discrete Geometry for Computer Imagery, Springer Nature, Cham, 2016, pp. 256–267.","mla":"Biswas, Ranita, and Partha Bhowmick. “On Functionality of Quadraginta Octants of Naive Sphere with Application to Circle Drawing.” Discrete Geometry for Computer Imagery, vol. 9647, Springer Nature, 2016, pp. 256–67, doi:10.1007/978-3-319-32360-2_20.","apa":"Biswas, R., & Bhowmick, P. (2016). On functionality of quadraginta octants of naive sphere with application to circle drawing. In Discrete Geometry for Computer Imagery (Vol. 9647, pp. 256–267). Cham: Springer Nature. https://doi.org/10.1007/978-3-319-32360-2_20","ieee":"R. Biswas and P. Bhowmick, “On functionality of quadraginta octants of naive sphere with application to circle drawing,” in Discrete Geometry for Computer Imagery, Nantes, France, 2016, vol. 9647, pp. 256–267.","ista":"Biswas R, Bhowmick P. 2016. On functionality of quadraginta octants of naive sphere with application to circle drawing. Discrete Geometry for Computer Imagery. DGCI: International Conference on Discrete Geometry for Computer Imagery, LNCS, vol. 9647, 256–267.","ama":"Biswas R, Bhowmick P. On functionality of quadraginta octants of naive sphere with application to circle drawing. In: Discrete Geometry for Computer Imagery. Vol 9647. Cham: Springer Nature; 2016:256-267. doi:10.1007/978-3-319-32360-2_20"},"date_published":"2016-04-09T00:00:00Z","day":"09","article_processing_charge":"No","status":"public","title":"On functionality of quadraginta octants of naive sphere with application to circle drawing","intvolume":" 9647","_id":"5806","user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","oa_version":"None","alternative_title":["LNCS"],"type":"conference","abstract":[{"text":"Although the concept of functional plane for naive plane is studied and reported in the literature in great detail, no similar study is yet found for naive sphere. This article exposes the first study in this line, opening up further prospects of analyzing the topological properties of sphere in the discrete space. We show that each quadraginta octant Q of a naive sphere forms a bijection with its projected pixel set on a unique coordinate plane, which thereby serves as the functional plane of Q, and hence gives rise to merely mono-jumps during back projection. The other two coordinate planes serve as para-functional and dia-functional planes for Q, as the former is ‘mono-jumping’ but not bijective, whereas the latter holds neither of the two. Owing to this, the quadraginta octants form symmetry groups and subgroups with equivalent jump conditions. We also show a potential application in generating a special class of discrete 3D circles based on back projection and jump bridging by Steiner voxels. A circle in this class possesses 4-symmetry, uniqueness, and bounded distance from the underlying real sphere and real plane.","lang":"eng"}],"quality_controlled":"1","language":[{"iso":"eng"}],"conference":{"start_date":"2016-04-18","location":"Nantes, France","end_date":"2016-04-20","name":"DGCI: International Conference on Discrete Geometry for Computer Imagery"},"doi":"10.1007/978-3-319-32360-2_20","month":"04","publication_identifier":{"isbn":["978-3-319-32359-6"],"eisbn":["978-3-319-32360-2"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","department":[{"_id":"HeEd"}],"publisher":"Springer Nature","year":"2016","date_created":"2019-01-08T20:44:37Z","date_updated":"2022-01-28T08:10:11Z","volume":9647,"author":[{"full_name":"Biswas, Ranita","orcid":"0000-0002-5372-7890","id":"3C2B033E-F248-11E8-B48F-1D18A9856A87","last_name":"Biswas","first_name":"Ranita"},{"full_name":"Bhowmick, Partha","first_name":"Partha","last_name":"Bhowmick"}],"place":"Cham","extern":"1"},{"quality_controlled":"1","language":[{"iso":"eng"}],"doi":"10.1007/978-3-319-39441-1_23","conference":{"name":"CTIC: Computational Topology in Image Context","location":"Marseille, France","start_date":"2016-06-15","end_date":"2016-06-17"},"publication_identifier":{"issn":["0302-9743"],"eisbn":["978-3-319-39441-1"],"eissn":["1611-3349"],"isbn":["978-3-319-39440-4"]},"month":"06","department":[{"_id":"HeEd"}],"publisher":"Springer Nature","publication_status":"published","year":"2016","volume":9667,"date_updated":"2022-01-28T08:01:22Z","date_created":"2019-01-08T20:44:24Z","author":[{"full_name":"Sen, Nabhasmita","first_name":"Nabhasmita","last_name":"Sen"},{"id":"3C2B033E-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-5372-7890","first_name":"Ranita","last_name":"Biswas","full_name":"Biswas, Ranita"},{"last_name":"Bhowmick","first_name":"Partha","full_name":"Bhowmick, Partha"}],"place":"Cham","extern":"1","page":"253-264","citation":{"ama":"Sen N, Biswas R, Bhowmick P. On some local topological properties of naive discrete sphere. In: Computational Topology in Image Context. Vol 9667. Cham: Springer Nature; 2016:253-264. doi:10.1007/978-3-319-39441-1_23","ista":"Sen N, Biswas R, Bhowmick P. 2016.On some local topological properties of naive discrete sphere. In: Computational Topology in Image Context. LNCS, vol. 9667, 253–264.","ieee":"N. Sen, R. Biswas, and P. Bhowmick, “On some local topological properties of naive discrete sphere,” in Computational Topology in Image Context, vol. 9667, Cham: Springer Nature, 2016, pp. 253–264.","apa":"Sen, N., Biswas, R., & Bhowmick, P. (2016). On some local topological properties of naive discrete sphere. In Computational Topology in Image Context (Vol. 9667, pp. 253–264). Cham: Springer Nature. https://doi.org/10.1007/978-3-319-39441-1_23","mla":"Sen, Nabhasmita, et al. “On Some Local Topological Properties of Naive Discrete Sphere.” Computational Topology in Image Context, vol. 9667, Springer Nature, 2016, pp. 253–64, doi:10.1007/978-3-319-39441-1_23.","short":"N. Sen, R. Biswas, P. Bhowmick, in:, Computational Topology in Image Context, Springer Nature, Cham, 2016, pp. 253–264.","chicago":"Sen, Nabhasmita, Ranita Biswas, and Partha Bhowmick. “On Some Local Topological Properties of Naive Discrete Sphere.” In Computational Topology in Image Context, 9667:253–64. Cham: Springer Nature, 2016. https://doi.org/10.1007/978-3-319-39441-1_23."},"publication":"Computational Topology in Image Context","date_published":"2016-06-02T00:00:00Z","article_processing_charge":"No","day":"02","intvolume":" 9667","status":"public","title":"On some local topological properties of naive discrete sphere","user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","_id":"5805","oa_version":"None","alternative_title":["LNCS"],"type":"book_chapter","abstract":[{"lang":"eng","text":"Discretization of sphere in the integer space follows a particular discretization scheme, which, in principle, conforms to some topological model. This eventually gives rise to interesting topological properties of a discrete spherical surface, which need to be investigated for its analytical characterization. This paper presents some novel results on the local topological properties of the naive model of discrete sphere. They follow from the bijection of each quadraginta octant of naive sphere with its projection map called f -map on the corresponding functional plane and from the characterization of certain jumps in the f-map. As an application, we have shown how these properties can be used in designing an efficient reconstruction algorithm for a naive spherical surface from an input voxel set when it is sparse or noisy."}]},{"language":[{"iso":"eng"}],"conference":{"name":"IWCIA: International Workshop on Combinatorial Image Analysis","start_date":"2015-11-24","location":"Kolkata, India","end_date":"2015-11-27"},"date_published":"2016-01-06T00:00:00Z","doi":"10.1007/978-3-319-26145-4_7","quality_controlled":"1","page":"86-100","publication":"Combinatorial image analysis","citation":{"ista":"Biswas R, Bhowmick P, Brimkov VE. 2016.On the connectivity and smoothness of discrete spherical circles. In: Combinatorial image analysis. vol. 9448, 86–100.","apa":"Biswas, R., Bhowmick, P., & Brimkov, V. E. (2016). On the connectivity and smoothness of discrete spherical circles. In Combinatorial image analysis (Vol. 9448, pp. 86–100). Cham: Springer Nature. https://doi.org/10.1007/978-3-319-26145-4_7","ieee":"R. Biswas, P. Bhowmick, and V. E. Brimkov, “On the connectivity and smoothness of discrete spherical circles,” in Combinatorial image analysis, vol. 9448, Cham: Springer Nature, 2016, pp. 86–100.","ama":"Biswas R, Bhowmick P, Brimkov VE. On the connectivity and smoothness of discrete spherical circles. In: Combinatorial Image Analysis. Vol 9448. Cham: Springer Nature; 2016:86-100. doi:10.1007/978-3-319-26145-4_7","chicago":"Biswas, Ranita, Partha Bhowmick, and Valentin E. Brimkov. “On the Connectivity and Smoothness of Discrete Spherical Circles.” In Combinatorial Image Analysis, 9448:86–100. Cham: Springer Nature, 2016. https://doi.org/10.1007/978-3-319-26145-4_7.","mla":"Biswas, Ranita, et al. “On the Connectivity and Smoothness of Discrete Spherical Circles.” Combinatorial Image Analysis, vol. 9448, Springer Nature, 2016, pp. 86–100, doi:10.1007/978-3-319-26145-4_7.","short":"R. Biswas, P. Bhowmick, V.E. Brimkov, in:, Combinatorial Image Analysis, Springer Nature, Cham, 2016, pp. 86–100."},"day":"06","month":"01","publication_identifier":{"eissn":["1611-3349"],"isbn":["978-3-319-26144-7"],"eisbn":["978-3-319-26145-4"],"issn":["0302-9743"]},"article_processing_charge":"No","date_updated":"2022-01-28T08:13:03Z","date_created":"2019-01-08T20:45:19Z","oa_version":"None","volume":9448,"author":[{"first_name":"Ranita","last_name":"Biswas","id":"3C2B033E-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-5372-7890","full_name":"Biswas, Ranita"},{"full_name":"Bhowmick, Partha","first_name":"Partha","last_name":"Bhowmick"},{"last_name":"Brimkov","first_name":"Valentin E.","full_name":"Brimkov, Valentin E."}],"publication_status":"published","status":"public","title":"On the connectivity and smoothness of discrete spherical circles","publisher":"Springer Nature","department":[{"_id":"HeEd"}],"intvolume":" 9448","_id":"5809","year":"2016","user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","extern":"1","abstract":[{"lang":"eng","text":"A discrete spherical circle is a topologically well-connected 3D circle in the integer space, which belongs to a discrete sphere as well as a discrete plane. It is one of the most important 3D geometric primitives, but has not possibly yet been studied up to its merit. This paper is a maiden exposition of some of its elementary properties, which indicates a sense of its profound theoretical prospects in the framework of digital geometry. We have shown how different types of discretization can lead to forbidden and admissible classes, when one attempts to define the discretization of a spherical circle in terms of intersection between a discrete sphere and a discrete plane. Several fundamental theoretical results have been presented, the algorithm for construction of discrete spherical circles has been discussed, and some test results have been furnished to demonstrate its practicality and usefulness."}],"place":"Cham","type":"book_chapter"},{"author":[{"id":"3A276B68-F248-11E8-B48F-1D18A9856A87","first_name":"Georg S","last_name":"Martius","full_name":"Martius, Georg S"},{"last_name":"Hostettler","first_name":"Rafael","full_name":"Hostettler, Rafael"},{"full_name":"Knoll, Alois","last_name":"Knoll","first_name":"Alois"},{"last_name":"Der","first_name":"Ralf","full_name":"Der, Ralf"}],"date_created":"2020-07-05T22:00:47Z","date_updated":"2021-01-12T08:16:53Z","volume":28,"year":"2016","publication_status":"published","publisher":"MIT Press","department":[{"_id":"ChLa"},{"_id":"GaTk"}],"file_date_updated":"2020-07-14T12:48:09Z","ec_funded":1,"conference":{"name":"ALIFE 2016: 15th International Conference on the Synthesis and Simulation of Living Systems","location":"Cancun, Mexico","start_date":"2016-07-04","end_date":"2016-07-08"},"doi":"10.7551/978-0-262-33936-0-ch029","language":[{"iso":"eng"}],"oa":1,"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"quality_controlled":"1","project":[{"grant_number":"291734","_id":"25681D80-B435-11E9-9278-68D0E5697425","name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7"}],"month":"09","publication_identifier":{"isbn":["9780262339360"]},"oa_version":"Published Version","file":[{"relation":"main_file","file_id":"8096","date_updated":"2020-07-14T12:48:09Z","date_created":"2020-07-06T12:59:09Z","checksum":"cff63e7a4b8ac466ba51a9c84153a940","file_name":"2016_ProcALIFE_Martius.pdf","access_level":"open_access","file_size":678670,"content_type":"application/pdf","creator":"cziletti"}],"user_id":"D865714E-FA4E-11E9-B85B-F5C5E5697425","_id":"8094","status":"public","ddc":["610"],"title":"Self-organized control of an tendon driven arm by differential extrinsic plasticity","intvolume":" 28","abstract":[{"text":"With the accelerated development of robot technologies, optimal control becomes one of the central themes of research. In traditional approaches, the controller, by its internal functionality, finds appropriate actions on the basis of the history of sensor values, guided by the goals, intentions, objectives, learning schemes, and so forth. The idea is that the controller controls the world---the body plus its environment---as reliably as possible. This paper focuses on new lines of self-organization for developmental robotics. We apply the recently developed differential extrinsic synaptic plasticity to a muscle-tendon driven arm-shoulder system from the Myorobotics toolkit. In the experiments, we observe a vast variety of self-organized behavior patterns: when left alone, the arm realizes pseudo-random sequences of different poses. By applying physical forces, the system can be entrained into definite motion patterns like wiping a table. Most interestingly, after attaching an object, the controller gets in a functional resonance with the object's internal dynamics, starting to shake spontaneously bottles half-filled with water or sensitively driving an attached pendulum into a circular mode. When attached to the crank of a wheel the neural system independently discovers how to rotate it. In this way, the robot discovers affordances of objects its body is interacting with.","lang":"eng"}],"type":"conference","date_published":"2016-09-01T00:00:00Z","publication":"Proceedings of the Artificial Life Conference 2016","citation":{"chicago":"Martius, Georg S, Rafael Hostettler, Alois Knoll, and Ralf Der. “Self-Organized Control of an Tendon Driven Arm by Differential Extrinsic Plasticity.” In Proceedings of the Artificial Life Conference 2016, 28:142–43. MIT Press, 2016. https://doi.org/10.7551/978-0-262-33936-0-ch029.","short":"G.S. Martius, R. Hostettler, A. Knoll, R. Der, in:, Proceedings of the Artificial Life Conference 2016, MIT Press, 2016, pp. 142–143.","mla":"Martius, Georg S., et al. “Self-Organized Control of an Tendon Driven Arm by Differential Extrinsic Plasticity.” Proceedings of the Artificial Life Conference 2016, vol. 28, MIT Press, 2016, pp. 142–43, doi:10.7551/978-0-262-33936-0-ch029.","apa":"Martius, G. S., Hostettler, R., Knoll, A., & Der, R. (2016). Self-organized control of an tendon driven arm by differential extrinsic plasticity. In Proceedings of the Artificial Life Conference 2016 (Vol. 28, pp. 142–143). Cancun, Mexico: MIT Press. https://doi.org/10.7551/978-0-262-33936-0-ch029","ieee":"G. S. Martius, R. Hostettler, A. Knoll, and R. Der, “Self-organized control of an tendon driven arm by differential extrinsic plasticity,” in Proceedings of the Artificial Life Conference 2016, Cancun, Mexico, 2016, vol. 28, pp. 142–143.","ista":"Martius GS, Hostettler R, Knoll A, Der R. 2016. Self-organized control of an tendon driven arm by differential extrinsic plasticity. Proceedings of the Artificial Life Conference 2016. ALIFE 2016: 15th International Conference on the Synthesis and Simulation of Living Systems vol. 28, 142–143.","ama":"Martius GS, Hostettler R, Knoll A, Der R. Self-organized control of an tendon driven arm by differential extrinsic plasticity. In: Proceedings of the Artificial Life Conference 2016. Vol 28. MIT Press; 2016:142-143. doi:10.7551/978-0-262-33936-0-ch029"},"page":"142-143","day":"01","has_accepted_license":"1","article_processing_charge":"No","scopus_import":1},{"citation":{"mla":"Prentice, Jason, et al. “Error-Robust Modes of the Retinal Population Code.” PLoS Computational Biology, vol. 12, no. 11, e1005855, Public Library of Science, 2016, doi:10.1371/journal.pcbi.1005148.","short":"J. Prentice, O. Marre, M. Ioffe, A. Loback, G. Tkačik, M. Berry, PLoS Computational Biology 12 (2016).","chicago":"Prentice, Jason, Olivier Marre, Mark Ioffe, Adrianna Loback, Gašper Tkačik, and Michael Berry. “Error-Robust Modes of the Retinal Population Code.” PLoS Computational Biology. Public Library of Science, 2016. https://doi.org/10.1371/journal.pcbi.1005148.","ama":"Prentice J, Marre O, Ioffe M, Loback A, Tkačik G, Berry M. Error-robust modes of the retinal population code. PLoS Computational Biology. 2016;12(11). doi:10.1371/journal.pcbi.1005148","ista":"Prentice J, Marre O, Ioffe M, Loback A, Tkačik G, Berry M. 2016. Error-robust modes of the retinal population code. PLoS Computational Biology. 12(11), e1005855.","apa":"Prentice, J., Marre, O., Ioffe, M., Loback, A., Tkačik, G., & Berry, M. (2016). Error-robust modes of the retinal population code. PLoS Computational Biology. Public Library of Science. https://doi.org/10.1371/journal.pcbi.1005148","ieee":"J. Prentice, O. Marre, M. Ioffe, A. Loback, G. Tkačik, and M. Berry, “Error-robust modes of the retinal population code,” PLoS Computational Biology, vol. 12, no. 11. Public Library of Science, 2016."},"publication":"PLoS Computational Biology","date_published":"2016-11-17T00:00:00Z","scopus_import":1,"has_accepted_license":"1","day":"17","_id":"1197","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","intvolume":" 12","status":"public","ddc":["570"],"title":"Error-robust modes of the retinal population code","file":[{"file_id":"5884","relation":"main_file","date_created":"2019-01-25T10:35:00Z","date_updated":"2020-07-14T12:44:38Z","checksum":"47b08cbd4dbf32b25ba161f5f4b262cc","file_name":"2016_PLOS_Prentice.pdf","access_level":"open_access","creator":"kschuh","file_size":4492021,"content_type":"application/pdf"}],"oa_version":"Published Version","type":"journal_article","issue":"11","abstract":[{"text":"Across the nervous system, certain population spiking patterns are observed far more frequently than others. A hypothesis about this structure is that these collective activity patterns function as population codewords–collective modes–carrying information distinct from that of any single cell. We investigate this phenomenon in recordings of ∼150 retinal ganglion cells, the retina’s output. We develop a novel statistical model that decomposes the population response into modes; it predicts the distribution of spiking activity in the ganglion cell population with high accuracy. We found that the modes represent localized features of the visual stimulus that are distinct from the features represented by single neurons. Modes form clusters of activity states that are readily discriminated from one another. When we repeated the same visual stimulus, we found that the same mode was robustly elicited. These results suggest that retinal ganglion cells’ collective signaling is endowed with a form of error-correcting code–a principle that may hold in brain areas beyond retina.","lang":"eng"}],"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"oa":1,"project":[{"_id":"254D1A94-B435-11E9-9278-68D0E5697425","grant_number":"P 25651-N26","call_identifier":"FWF","name":"Sensitivity to higher-order statistics in natural scenes"}],"quality_controlled":"1","doi":"10.1371/journal.pcbi.1005148","language":[{"iso":"eng"}],"month":"11","acknowledgement":"JSP was supported by a C.V. Starr Fellowship from the Starr Foundation (http://www.starrfoundation.org/). GT was supported by Austrian Research Foundation (https://www.fwf.ac.at/en/) grant FWF P25651. MJB received support from National Eye Institute (https://nei.nih.gov/) grant EY 14196 and from the National Science Foundation grant 1504977. The authors thank Cristina Savin and Vicent Botella-Soler for helpful comments on the manuscript.","year":"2016","publisher":"Public Library of Science","department":[{"_id":"GaTk"}],"publication_status":"published","related_material":{"record":[{"status":"public","relation":"research_data","id":"9709"}]},"author":[{"first_name":"Jason","last_name":"Prentice","full_name":"Prentice, Jason"},{"last_name":"Marre","first_name":"Olivier","full_name":"Marre, Olivier"},{"full_name":"Ioffe, Mark","first_name":"Mark","last_name":"Ioffe"},{"full_name":"Loback, Adrianna","last_name":"Loback","first_name":"Adrianna"},{"full_name":"Tkacik, Gasper","id":"3D494DCA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-6699-1455","first_name":"Gasper","last_name":"Tkacik"},{"full_name":"Berry, Michael","last_name":"Berry","first_name":"Michael"}],"volume":12,"date_created":"2018-12-11T11:50:40Z","date_updated":"2023-02-23T14:05:40Z","article_number":"e1005855","publist_id":"6153","file_date_updated":"2020-07-14T12:44:38Z"},{"date_published":"2016-01-22T00:00:00Z","doi":"10.5061/dryad.4b565","oa":1,"main_file_link":[{"url":"https://doi.org/10.5061/dryad.4b565","open_access":"1"}],"citation":{"chicago":"Mcmahon, Dino, Matthias Fürst, Jesicca Caspar, Panagiotis Theodorou, Mark Brown, and Robert Paxton. “Data from: A Sting in the Spit: Widespread Cross-Infection of Multiple RNA Viruses across Wild and Managed Bees.” Dryad, 2016. https://doi.org/10.5061/dryad.4b565.","mla":"Mcmahon, Dino, et al. Data from: A Sting in the Spit: Widespread Cross-Infection of Multiple RNA Viruses across Wild and Managed Bees. Dryad, 2016, doi:10.5061/dryad.4b565.","short":"D. Mcmahon, M. Fürst, J. Caspar, P. Theodorou, M. Brown, R. Paxton, (2016).","ista":"Mcmahon D, Fürst M, Caspar J, Theodorou P, Brown M, Paxton R. 2016. Data from: A sting in the spit: widespread cross-infection of multiple RNA viruses across wild and managed bees, Dryad, 10.5061/dryad.4b565.","apa":"Mcmahon, D., Fürst, M., Caspar, J., Theodorou, P., Brown, M., & Paxton, R. (2016). Data from: A sting in the spit: widespread cross-infection of multiple RNA viruses across wild and managed bees. Dryad. https://doi.org/10.5061/dryad.4b565","ieee":"D. Mcmahon, M. Fürst, J. Caspar, P. Theodorou, M. Brown, and R. Paxton, “Data from: A sting in the spit: widespread cross-infection of multiple RNA viruses across wild and managed bees.” Dryad, 2016.","ama":"Mcmahon D, Fürst M, Caspar J, Theodorou P, Brown M, Paxton R. Data from: A sting in the spit: widespread cross-infection of multiple RNA viruses across wild and managed bees. 2016. doi:10.5061/dryad.4b565"},"day":"22","month":"01","article_processing_charge":"No","author":[{"full_name":"Mcmahon, Dino","first_name":"Dino","last_name":"Mcmahon"},{"id":"393B1196-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-3712-925X","first_name":"Matthias","last_name":"Fürst","full_name":"Fürst, Matthias"},{"first_name":"Jesicca","last_name":"Caspar","full_name":"Caspar, Jesicca"},{"full_name":"Theodorou, Panagiotis","first_name":"Panagiotis","last_name":"Theodorou"},{"first_name":"Mark","last_name":"Brown","full_name":"Brown, Mark"},{"first_name":"Robert","last_name":"Paxton","full_name":"Paxton, Robert"}],"related_material":{"record":[{"relation":"used_in_publication","status":"public","id":"1855"}]},"date_created":"2021-07-26T09:14:19Z","date_updated":"2023-02-23T10:17:25Z","oa_version":"Published Version","year":"2016","_id":"9720","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","status":"public","title":"Data from: A sting in the spit: widespread cross-infection of multiple RNA viruses across wild and managed bees","publisher":"Dryad","department":[{"_id":"SyCr"}],"abstract":[{"text":"Summary: Declining populations of bee pollinators are a cause of concern, with major repercussions for biodiversity loss and food security. RNA viruses associated with honeybees represent a potential threat to other insect pollinators, but the extent of this threat is poorly understood. This study aims to attain a detailed understanding of the current and ongoing risk of emerging infectious disease (EID) transmission between managed and wild pollinator species across a wide range of RNA viruses. Within a structured large-scale national survey across 26 independent sites, we quantify the prevalence and pathogen loads of multiple RNA viruses in co-occurring managed honeybee (Apis mellifera) and wild bumblebee (Bombus spp.) populations. We then construct models that compare virus prevalence between wild and managed pollinators. Multiple RNA viruses associated with honeybees are widespread in sympatric wild bumblebee populations. Virus prevalence in honeybees is a significant predictor of virus prevalence in bumblebees, but we remain cautious in speculating over the principle direction of pathogen transmission. We demonstrate species-specific differences in prevalence, indicating significant variation in disease susceptibility or tolerance. Pathogen loads within individual bumblebees may be high and in the case of at least one RNA virus, prevalence is higher in wild bumblebees than in managed honeybee populations. Our findings indicate widespread transmission of RNA viruses between managed and wild bee pollinators, pointing to an interconnected network of potential disease pressures within and among pollinator species. In the context of the biodiversity crisis, our study emphasizes the importance of targeting a wide range of pathogens and defining host associations when considering potential drivers of population decline.","lang":"eng"}],"type":"research_data_reference"},{"publication":"PLoS Biology","citation":{"mla":"Roux, Camille, et al. “Shedding Light on the Grey Zone of Speciation along a Continuum of Genomic Divergence.” PLoS Biology, vol. 14, no. 12, e2000234, Public Library of Science, 2016, doi:10.1371/journal.pbio.2000234.","short":"C. Roux, C. Fraisse, J. Romiguier, Y. Anciaux, N. Galtier, N. Bierne, PLoS Biology 14 (2016).","chicago":"Roux, Camille, Christelle Fraisse, Jonathan Romiguier, Youann Anciaux, Nicolas Galtier, and Nicolas Bierne. “Shedding Light on the Grey Zone of Speciation along a Continuum of Genomic Divergence.” PLoS Biology. Public Library of Science, 2016. https://doi.org/10.1371/journal.pbio.2000234.","ama":"Roux C, Fraisse C, Romiguier J, Anciaux Y, Galtier N, Bierne N. Shedding light on the grey zone of speciation along a continuum of genomic divergence. PLoS Biology. 2016;14(12). doi:10.1371/journal.pbio.2000234","ista":"Roux C, Fraisse C, Romiguier J, Anciaux Y, Galtier N, Bierne N. 2016. Shedding light on the grey zone of speciation along a continuum of genomic divergence. PLoS Biology. 14(12), e2000234.","apa":"Roux, C., Fraisse, C., Romiguier, J., Anciaux, Y., Galtier, N., & Bierne, N. (2016). Shedding light on the grey zone of speciation along a continuum of genomic divergence. PLoS Biology. Public Library of Science. https://doi.org/10.1371/journal.pbio.2000234","ieee":"C. Roux, C. Fraisse, J. Romiguier, Y. Anciaux, N. Galtier, and N. Bierne, “Shedding light on the grey zone of speciation along a continuum of genomic divergence,” PLoS Biology, vol. 14, no. 12. Public Library of Science, 2016."},"date_published":"2016-12-27T00:00:00Z","scopus_import":1,"day":"27","has_accepted_license":"1","ddc":["576"],"status":"public","title":"Shedding light on the grey zone of speciation along a continuum of genomic divergence","intvolume":" 14","_id":"1158","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","oa_version":"Published Version","file":[{"relation":"main_file","file_id":"5164","checksum":"2bab63b068a9840efd532b9ae583f9bb","date_updated":"2020-07-14T12:44:36Z","date_created":"2018-12-12T10:15:42Z","access_level":"open_access","file_name":"IST-2017-742-v1+1_journal.pbio.2000234.pdf","file_size":2494348,"content_type":"application/pdf","creator":"system"}],"pubrep_id":"742","type":"journal_article","abstract":[{"text":"Speciation results from the progressive accumulation of mutations that decrease the probability of mating between parental populations or reduce the fitness of hybrids—the so-called species barriers. The speciation genomic literature, however, is mainly a collection of case studies, each with its own approach and specificities, such that a global view of the gradual process of evolution from one to two species is currently lacking. Of primary importance is the prevalence of gene flow between diverging entities, which is central in most species concepts and has been widely discussed in recent years. Here, we explore the continuum of speciation thanks to a comparative analysis of genomic data from 61 pairs of populations/species of animals with variable levels of divergence. Gene flow between diverging gene pools is assessed under an approximate Bayesian computation (ABC) framework. We show that the intermediate "grey zone" of speciation, in which taxonomy is often controversial, spans from 0.5% to 2% of net synonymous divergence, irrespective of species life history traits or ecology. Thanks to appropriate modeling of among-locus variation in genetic drift and introgression rate, we clarify the status of the majority of ambiguous cases and uncover a number of cryptic species. Our analysis also reveals the high incidence in animals of semi-isolated species (when some but not all loci are affected by barriers to gene flow) and highlights the intrinsic difficulty, both statistical and conceptual, of delineating species in the grey zone of speciation.","lang":"eng"}],"issue":"12","quality_controlled":"1","tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"oa":1,"language":[{"iso":"eng"}],"doi":"10.1371/journal.pbio.2000234","month":"12","publication_status":"published","department":[{"_id":"BeVi"},{"_id":"NiBa"}],"publisher":"Public Library of Science","acknowledgement":"European Research Council (ERC) https://erc.europa.eu/ (grant number ERC grant 232971). PopPhyl project. The funder had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. French National Research Agency (ANR) http://www.agence-nationale-recherche.fr/en/project-based-funding-to-advance-french-research/ (grant number ANR-12-BSV7- 0011). HYSEA project.\r\nWe thank Aude Darracq, Vincent Castric, Pierre-Alexandre Gagnaire, Xavier Vekemans, and John Welch for insightful discussions. The computations were performed at the Vital-IT (http://www.vital-it.ch) Center for high-performance computing of the SIB Swiss Institute of Bioinformatics and the ISEM computing cluster at the platform Montpellier Bioinformatique et Biodiversité.","year":"2016","date_updated":"2023-02-23T14:11:16Z","date_created":"2018-12-11T11:50:28Z","volume":14,"author":[{"full_name":"Roux, Camille","last_name":"Roux","first_name":"Camille"},{"first_name":"Christelle","last_name":"Fraisse","id":"32DF5794-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-8441-5075","full_name":"Fraisse, Christelle"},{"full_name":"Romiguier, Jonathan","last_name":"Romiguier","first_name":"Jonathan"},{"first_name":"Youann","last_name":"Anciaux","full_name":"Anciaux, Youann"},{"first_name":"Nicolas","last_name":"Galtier","full_name":"Galtier, Nicolas"},{"full_name":"Bierne, Nicolas","last_name":"Bierne","first_name":"Nicolas"}],"related_material":{"record":[{"id":"9862","status":"public","relation":"research_data"},{"id":"9863","relation":"research_data","status":"public"}]},"article_number":"e2000234","file_date_updated":"2020-07-14T12:44:36Z","publist_id":"6200"},{"date_published":"2016-12-09T00:00:00Z","publication":"PLoS Computational Biology","citation":{"mla":"Zagórski, Marcin P., et al. “Beyond the Hypercube Evolutionary Accessibility of Fitness Landscapes with Realistic Mutational Networks.” PLoS Computational Biology, vol. 12, no. 12, e1005218, Public Library of Science, 2016, doi:10.1371/journal.pcbi.1005218.","short":"M.P. Zagórski, Z. Burda, B. Wacław, PLoS Computational Biology 12 (2016).","chicago":"Zagórski, Marcin P, Zdzisław Burda, and Bartłomiej Wacław. “Beyond the Hypercube Evolutionary Accessibility of Fitness Landscapes with Realistic Mutational Networks.” PLoS Computational Biology. Public Library of Science, 2016. https://doi.org/10.1371/journal.pcbi.1005218.","ama":"Zagórski MP, Burda Z, Wacław B. Beyond the hypercube evolutionary accessibility of fitness landscapes with realistic mutational networks. PLoS Computational Biology. 2016;12(12). doi:10.1371/journal.pcbi.1005218","ista":"Zagórski MP, Burda Z, Wacław B. 2016. Beyond the hypercube evolutionary accessibility of fitness landscapes with realistic mutational networks. PLoS Computational Biology. 12(12), e1005218.","ieee":"M. P. Zagórski, Z. Burda, and B. Wacław, “Beyond the hypercube evolutionary accessibility of fitness landscapes with realistic mutational networks,” PLoS Computational Biology, vol. 12, no. 12. Public Library of Science, 2016.","apa":"Zagórski, M. P., Burda, Z., & Wacław, B. (2016). Beyond the hypercube evolutionary accessibility of fitness landscapes with realistic mutational networks. PLoS Computational Biology. Public Library of Science. https://doi.org/10.1371/journal.pcbi.1005218"},"day":"09","has_accepted_license":"1","article_processing_charge":"No","scopus_import":"1","oa_version":"Published Version","file":[{"checksum":"84f44ae92866c52ff1ca8a574558dca7","date_created":"2018-12-12T10:12:08Z","date_updated":"2020-07-14T12:44:37Z","relation":"main_file","file_id":"4926","file_size":3822299,"content_type":"application/pdf","creator":"system","access_level":"open_access","file_name":"IST-2017-740-v1+1_journal.pcbi.1005218.pdf"}],"pubrep_id":"740","status":"public","title":"Beyond the hypercube evolutionary accessibility of fitness landscapes with realistic mutational networks","ddc":["570"],"intvolume":" 12","_id":"1167","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","abstract":[{"lang":"eng","text":"Evolutionary pathways describe trajectories of biological evolution in the space of different variants of organisms (genotypes). The probability of existence and the number of evolutionary pathways that lead from a given genotype to a better-adapted genotype are important measures of accessibility of local fitness optima and the reproducibility of evolution. Both quantities have been studied in simple mathematical models where genotypes are represented as binary sequences of two types of basic units, and the network of permitted mutations between the genotypes is a hypercube graph. However, it is unclear how these results translate to the biologically relevant case in which genotypes are represented by sequences of more than two units, for example four nucleotides (DNA) or 20 amino acids (proteins), and the mutational graph is not the hypercube. Here we investigate accessibility of the best-adapted genotype in the general case of K > 2 units. Using computer generated and experimental fitness landscapes we show that accessibility of the global fitness maximum increases with K and can be much higher than for binary sequences. The increase in accessibility comes from the increase in the number of indirect trajectories exploited by evolution for higher K. As one of the consequences, the fraction of genotypes that are accessible increases by three orders of magnitude when the number of units K increases from 2 to 16 for landscapes of size N ∼ 106genotypes. This suggests that evolution can follow many different trajectories on such landscapes and the reconstruction of evolutionary pathways from experimental data might be an extremely difficult task."}],"issue":"12","type":"journal_article","language":[{"iso":"eng"}],"doi":"10.1371/journal.pcbi.1005218","quality_controlled":"1","oa":1,"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"month":"12","date_created":"2018-12-11T11:50:30Z","date_updated":"2023-02-23T14:11:22Z","volume":12,"author":[{"first_name":"Marcin P","last_name":"Zagórski","id":"343DA0DC-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-7896-7762","full_name":"Zagórski, Marcin P"},{"full_name":"Burda, Zdzisław","last_name":"Burda","first_name":"Zdzisław"},{"full_name":"Wacław, Bartłomiej","last_name":"Wacław","first_name":"Bartłomiej"}],"related_material":{"record":[{"relation":"research_data","status":"public","id":"9866"}]},"publication_status":"published","publisher":"Public Library of Science","department":[{"_id":"AnKi"}],"year":"2016","acknowledgement":"MZ acknowledges the Polish National Science Centre grant no. DEC-2012/07/N/NZ2/00107. BW was supported by the Scottish Government/Royal Society of Edinburgh Personal Research Fellowship. We thank Marjon de Vos and Oliver Martin for critically reading the manuscript.","file_date_updated":"2020-07-14T12:44:37Z","publist_id":"6190","article_number":"e1005218"},{"doi":"10.1371/journal.pone.0163867.s008","citation":{"mla":"Hilbe, Christian, et al. Experimental Game Instructions. Public Library of Science, 2016, doi:10.1371/journal.pone.0163867.s008.","short":"C. Hilbe, K. Hagel, M. Milinski, (2016).","chicago":"Hilbe, Christian, Kristin Hagel, and Manfred Milinski. “Experimental Game Instructions.” Public Library of Science, 2016. https://doi.org/10.1371/journal.pone.0163867.s008.","ama":"Hilbe C, Hagel K, Milinski M. Experimental game instructions. 2016. doi:10.1371/journal.pone.0163867.s008","ista":"Hilbe C, Hagel K, Milinski M. 2016. Experimental game instructions, Public Library of Science, 10.1371/journal.pone.0163867.s008.","ieee":"C. Hilbe, K. Hagel, and M. Milinski, “Experimental game instructions.” Public Library of Science, 2016.","apa":"Hilbe, C., Hagel, K., & Milinski, M. (2016). Experimental game instructions. Public Library of Science. https://doi.org/10.1371/journal.pone.0163867.s008"},"article_processing_charge":"No","month":"10","day":"04","oa_version":"Published Version","date_updated":"2023-02-21T16:59:01Z","date_created":"2021-08-10T08:42:00Z","related_material":{"record":[{"id":"1322","relation":"used_in_publication","status":"public"}]},"author":[{"orcid":"0000-0001-5116-955X","id":"2FDF8F3C-F248-11E8-B48F-1D18A9856A87","last_name":"Hilbe","first_name":"Christian","full_name":"Hilbe, Christian"},{"first_name":"Kristin","last_name":"Hagel","full_name":"Hagel, Kristin"},{"full_name":"Milinski, Manfred","first_name":"Manfred","last_name":"Milinski"}],"department":[{"_id":"KrCh"}],"publisher":"Public Library of Science","title":"Experimental game instructions","status":"public","year":"2016","_id":"9867","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","abstract":[{"lang":"eng","text":"In the beginning of our experiment, subjects were asked to read a few pages on their computer screens that would explain the rules of the subsequent game. Here, we provide these instructions, translated from German."}],"type":"research_data_reference"},{"type":"research_data_reference","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","_id":"9862","year":"2016","status":"public","title":"Simulation study to test the robustness of ABC in face of recent times of divergence","department":[{"_id":"BeVi"},{"_id":"NiBa"}],"publisher":"Public Library of Science","author":[{"first_name":"Camille","last_name":"Roux","full_name":"Roux, Camille"},{"orcid":"0000-0001-8441-5075","id":"32DF5794-F248-11E8-B48F-1D18A9856A87","last_name":"Fraisse","first_name":"Christelle","full_name":"Fraisse, Christelle"},{"full_name":"Romiguier, Jonathan","first_name":"Jonathan","last_name":"Romiguier"},{"first_name":"Youann","last_name":"Anciaux","full_name":"Anciaux, Youann"},{"first_name":"Nicolas","last_name":"Galtier","full_name":"Galtier, Nicolas"},{"full_name":"Bierne, Nicolas","last_name":"Bierne","first_name":"Nicolas"}],"related_material":{"record":[{"id":"1158","relation":"used_in_publication","status":"public"}]},"date_created":"2021-08-10T08:20:17Z","date_updated":"2023-02-21T16:21:20Z","oa_version":"Published Version","month":"12","day":"27","article_processing_charge":"No","citation":{"ieee":"C. Roux, C. Fraisse, J. Romiguier, Y. Anciaux, N. Galtier, and N. Bierne, “Simulation study to test the robustness of ABC in face of recent times of divergence.” Public Library of Science, 2016.","apa":"Roux, C., Fraisse, C., Romiguier, J., Anciaux, Y., Galtier, N., & Bierne, N. (2016). Simulation study to test the robustness of ABC in face of recent times of divergence. Public Library of Science. https://doi.org/10.1371/journal.pbio.2000234.s016","ista":"Roux C, Fraisse C, Romiguier J, Anciaux Y, Galtier N, Bierne N. 2016. Simulation study to test the robustness of ABC in face of recent times of divergence, Public Library of Science, 10.1371/journal.pbio.2000234.s016.","ama":"Roux C, Fraisse C, Romiguier J, Anciaux Y, Galtier N, Bierne N. Simulation study to test the robustness of ABC in face of recent times of divergence. 2016. doi:10.1371/journal.pbio.2000234.s016","chicago":"Roux, Camille, Christelle Fraisse, Jonathan Romiguier, Youann Anciaux, Nicolas Galtier, and Nicolas Bierne. “Simulation Study to Test the Robustness of ABC in Face of Recent Times of Divergence.” Public Library of Science, 2016. https://doi.org/10.1371/journal.pbio.2000234.s016.","short":"C. Roux, C. Fraisse, J. Romiguier, Y. Anciaux, N. Galtier, N. Bierne, (2016).","mla":"Roux, Camille, et al. Simulation Study to Test the Robustness of ABC in Face of Recent Times of Divergence. Public Library of Science, 2016, doi:10.1371/journal.pbio.2000234.s016."},"doi":"10.1371/journal.pbio.2000234.s016"},{"type":"research_data_reference","related_material":{"record":[{"id":"1158","relation":"used_in_publication","status":"public"}]},"author":[{"full_name":"Roux, Camille","last_name":"Roux","first_name":"Camille"},{"last_name":"Fraisse","first_name":"Christelle","orcid":"0000-0001-8441-5075","id":"32DF5794-F248-11E8-B48F-1D18A9856A87","full_name":"Fraisse, Christelle"},{"first_name":"Jonathan","last_name":"Romiguier","full_name":"Romiguier, Jonathan"},{"full_name":"Anciaux, Youann","first_name":"Youann","last_name":"Anciaux"},{"last_name":"Galtier","first_name":"Nicolas","full_name":"Galtier, Nicolas"},{"last_name":"Bierne","first_name":"Nicolas","full_name":"Bierne, Nicolas"}],"oa_version":"Published Version","date_updated":"2023-02-21T16:21:20Z","date_created":"2021-08-10T08:22:52Z","_id":"9863","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","year":"2016","publisher":"Public Library of Science","department":[{"_id":"BeVi"},{"_id":"NiBa"}],"title":"Accessions of surveyed individuals, geographic locations and summary statistics","status":"public","article_processing_charge":"No","month":"12","day":"27","doi":"10.1371/journal.pbio.2000234.s017","citation":{"mla":"Roux, Camille, et al. Accessions of Surveyed Individuals, Geographic Locations and Summary Statistics. Public Library of Science, 2016, doi:10.1371/journal.pbio.2000234.s017.","short":"C. Roux, C. Fraisse, J. Romiguier, Y. Anciaux, N. Galtier, N. Bierne, (2016).","chicago":"Roux, Camille, Christelle Fraisse, Jonathan Romiguier, Youann Anciaux, Nicolas Galtier, and Nicolas Bierne. “Accessions of Surveyed Individuals, Geographic Locations and Summary Statistics.” Public Library of Science, 2016. https://doi.org/10.1371/journal.pbio.2000234.s017.","ama":"Roux C, Fraisse C, Romiguier J, Anciaux Y, Galtier N, Bierne N. Accessions of surveyed individuals, geographic locations and summary statistics. 2016. doi:10.1371/journal.pbio.2000234.s017","ista":"Roux C, Fraisse C, Romiguier J, Anciaux Y, Galtier N, Bierne N. 2016. Accessions of surveyed individuals, geographic locations and summary statistics, Public Library of Science, 10.1371/journal.pbio.2000234.s017.","ieee":"C. Roux, C. Fraisse, J. Romiguier, Y. Anciaux, N. Galtier, and N. Bierne, “Accessions of surveyed individuals, geographic locations and summary statistics.” Public Library of Science, 2016.","apa":"Roux, C., Fraisse, C., Romiguier, J., Anciaux, Y., Galtier, N., & Bierne, N. (2016). Accessions of surveyed individuals, geographic locations and summary statistics. Public Library of Science. https://doi.org/10.1371/journal.pbio.2000234.s017"}},{"date_updated":"2023-02-21T16:24:29Z","date_created":"2021-08-10T08:37:20Z","oa_version":"Published Version","author":[{"full_name":"Zagórski, Marcin P","last_name":"Zagórski","first_name":"Marcin P","orcid":"0000-0001-7896-7762","id":"343DA0DC-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Burda, Zdzisław","first_name":"Zdzisław","last_name":"Burda"},{"full_name":"Wacław, Bartłomiej","last_name":"Wacław","first_name":"Bartłomiej"}],"related_material":{"record":[{"id":"1167","status":"public","relation":"used_in_publication"}]},"status":"public","title":"ZIP-archived directory containing all data and computer programs","department":[{"_id":"AnKi"}],"publisher":"Public Library of Science","_id":"9866","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","year":"2016","type":"research_data_reference","date_published":"2016-12-09T00:00:00Z","doi":"10.1371/journal.pcbi.1005218.s009","citation":{"ista":"Zagórski MP, Burda Z, Wacław B. 2016. ZIP-archived directory containing all data and computer programs, Public Library of Science, 10.1371/journal.pcbi.1005218.s009.","apa":"Zagórski, M. P., Burda, Z., & Wacław, B. (2016). ZIP-archived directory containing all data and computer programs. Public Library of Science. https://doi.org/10.1371/journal.pcbi.1005218.s009","ieee":"M. P. Zagórski, Z. Burda, and B. Wacław, “ZIP-archived directory containing all data and computer programs.” Public Library of Science, 2016.","ama":"Zagórski MP, Burda Z, Wacław B. ZIP-archived directory containing all data and computer programs. 2016. doi:10.1371/journal.pcbi.1005218.s009","chicago":"Zagórski, Marcin P, Zdzisław Burda, and Bartłomiej Wacław. “ZIP-Archived Directory Containing All Data and Computer Programs.” Public Library of Science, 2016. https://doi.org/10.1371/journal.pcbi.1005218.s009.","mla":"Zagórski, Marcin P., et al. ZIP-Archived Directory Containing All Data and Computer Programs. Public Library of Science, 2016, doi:10.1371/journal.pcbi.1005218.s009.","short":"M.P. Zagórski, Z. Burda, B. Wacław, (2016)."},"day":"09","month":"12","article_processing_charge":"No"},{"date_published":"2016-10-27T00:00:00Z","citation":{"chicago":"Huff, Jason T., Daniel Zilberman, and Scott W. Roy. “Mechanism for DNA Transposons to Generate Introns on Genomic Scales.” Nature. Springer Nature , 2016. https://doi.org/10.1038/nature20110.","short":"J.T. Huff, D. Zilberman, S.W. Roy, Nature 538 (2016) 533–536.","mla":"Huff, Jason T., et al. “Mechanism for DNA Transposons to Generate Introns on Genomic Scales.” Nature, vol. 538, no. 7626, Springer Nature , 2016, pp. 533–36, doi:10.1038/nature20110.","apa":"Huff, J. T., Zilberman, D., & Roy, S. W. (2016). Mechanism for DNA transposons to generate introns on genomic scales. Nature. Springer Nature . https://doi.org/10.1038/nature20110","ieee":"J. T. Huff, D. Zilberman, and S. W. Roy, “Mechanism for DNA transposons to generate introns on genomic scales,” Nature, vol. 538, no. 7626. Springer Nature , pp. 533–536, 2016.","ista":"Huff JT, Zilberman D, Roy SW. 2016. Mechanism for DNA transposons to generate introns on genomic scales. Nature. 538(7626), 533–536.","ama":"Huff JT, Zilberman D, Roy SW. Mechanism for DNA transposons to generate introns on genomic scales. Nature. 2016;538(7626):533-536. doi:10.1038/nature20110"},"publication":"Nature","page":"533-536","article_type":"letter_note","article_processing_charge":"No","day":"27","scopus_import":"1","oa_version":"Submitted Version","user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","_id":"9456","intvolume":" 538","status":"public","title":"Mechanism for DNA transposons to generate introns on genomic scales","issue":"7626","abstract":[{"lang":"eng","text":"The discovery of introns four decades ago was one of the most unexpected findings in molecular biology. Introns are sequences interrupting genes that must be removed as part of messenger RNA production. Genome sequencing projects have shown that most eukaryotic genes contain at least one intron, and frequently many. Comparison of these genomes reveals a history of long evolutionary periods during which few introns were gained, punctuated by episodes of rapid, extensive gain. However, although several detailed mechanisms for such episodic intron generation have been proposed, none has been empirically supported on a genomic scale. Here we show how short, non-autonomous DNA transposons independently generated hundreds to thousands of introns in the prasinophyte Micromonas pusilla and the pelagophyte Aureococcus anophagefferens. Each transposon carries one splice site. The other splice site is co-opted from the gene sequence that is duplicated upon transposon insertion, allowing perfect splicing out of the RNA. The distributions of sequences that can be co-opted are biased with respect to codons, and phasing of transposon-generated introns is similarly biased. These transposons insert between pre-existing nucleosomes, so that multiple nearby insertions generate nucleosome-sized intervening segments. Thus, transposon insertion and sequence co-option may explain the intron phase biases and prevalence of nucleosome-sized exons observed in eukaryotes. Overall, the two independent examples of proliferating elements illustrate a general DNA transposon mechanism that can plausibly account for episodes of rapid, extensive intron gain during eukaryotic evolution."}],"type":"journal_article","doi":"10.1038/nature20110","language":[{"iso":"eng"}],"external_id":{"pmid":["27760113"]},"main_file_link":[{"open_access":"1","url":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5684705/"}],"oa":1,"quality_controlled":"1","publication_identifier":{"eissn":["1476-4687"],"issn":["0028-0836"]},"month":"10","author":[{"full_name":"Huff, Jason T.","first_name":"Jason T.","last_name":"Huff"},{"last_name":"Zilberman","first_name":"Daniel","orcid":"0000-0002-0123-8649","id":"6973db13-dd5f-11ea-814e-b3e5455e9ed1","full_name":"Zilberman, Daniel"},{"last_name":"Roy","first_name":"Scott W.","full_name":"Roy, Scott W."}],"volume":538,"date_updated":"2021-12-14T07:55:30Z","date_created":"2021-06-04T11:34:55Z","pmid":1,"year":"2016","publisher":"Springer Nature ","department":[{"_id":"DaZi"}],"publication_status":"published","extern":"1"},{"publist_id":"6469","ec_funded":1,"author":[{"first_name":"Travis","last_name":"Monk","full_name":"Monk, Travis"},{"full_name":"Savin, Cristina","id":"3933349E-F248-11E8-B48F-1D18A9856A87","last_name":"Savin","first_name":"Cristina"},{"full_name":"Lücke, Jörg","last_name":"Lücke","first_name":"Jörg"}],"date_created":"2018-12-11T11:49:21Z","date_updated":"2021-01-12T08:22:08Z","volume":29,"year":"2016","acknowledgement":"DFG Cluster of Excellence EXC 1077/1 (Hearing4all) and LU 1196/5-1 (JL and TM), People Programme (Marie Curie Actions) FP7/2007-2013 grant agreement no. 291734 (CS)","publication_status":"published","publisher":"Neural Information Processing Systems","department":[{"_id":"GaTk"}],"month":"01","conference":{"name":"NIPS: Neural Information Processing Systems","end_date":"2016-12-10","start_date":"2016-12-05","location":"Barcelona, Spaine"},"language":[{"iso":"eng"}],"main_file_link":[{"url":"https://papers.nips.cc/paper/6582-neurons-equipped-with-intrinsic-plasticity-learn-stimulus-intensity-statistics"}],"quality_controlled":"1","project":[{"grant_number":"291734","_id":"25681D80-B435-11E9-9278-68D0E5697425","name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7"}],"abstract":[{"text":"Experience constantly shapes neural circuits through a variety of plasticity mechanisms. While the functional roles of some plasticity mechanisms are well-understood, it remains unclear how changes in neural excitability contribute to learning. Here, we develop a normative interpretation of intrinsic plasticity (IP) as a key component of unsupervised learning. We introduce a novel generative mixture model that accounts for the class-specific statistics of stimulus intensities, and we derive a neural circuit that learns the input classes and their intensities. We will analytically show that inference and learning for our generative model can be achieved by a neural circuit with intensity-sensitive neurons equipped with a specific form of IP. Numerical experiments verify our analytical derivations and show robust behavior for artificial and natural stimuli. Our results link IP to non-trivial input statistics, in particular the statistics of stimulus intensities for classes to which a neuron is sensitive. More generally, our work paves the way toward new classification algorithms that are robust to intensity variations.","lang":"eng"}],"type":"conference","alternative_title":["Advances in Neural Information Processing Systems"],"oa_version":"None","_id":"948","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","status":"public","title":"Neurons equipped with intrinsic plasticity learn stimulus intensity statistics","intvolume":" 29","day":"01","scopus_import":1,"date_published":"2016-01-01T00:00:00Z","citation":{"chicago":"Monk, Travis, Cristina Savin, and Jörg Lücke. “Neurons Equipped with Intrinsic Plasticity Learn Stimulus Intensity Statistics,” 29:4285–93. Neural Information Processing Systems, 2016.","mla":"Monk, Travis, et al. Neurons Equipped with Intrinsic Plasticity Learn Stimulus Intensity Statistics. Vol. 29, Neural Information Processing Systems, 2016, pp. 4285–93.","short":"T. Monk, C. Savin, J. Lücke, in:, Neural Information Processing Systems, 2016, pp. 4285–4293.","ista":"Monk T, Savin C, Lücke J. 2016. Neurons equipped with intrinsic plasticity learn stimulus intensity statistics. NIPS: Neural Information Processing Systems, Advances in Neural Information Processing Systems, vol. 29, 4285–4293.","apa":"Monk, T., Savin, C., & Lücke, J. (2016). Neurons equipped with intrinsic plasticity learn stimulus intensity statistics (Vol. 29, pp. 4285–4293). Presented at the NIPS: Neural Information Processing Systems, Barcelona, Spaine: Neural Information Processing Systems.","ieee":"T. Monk, C. Savin, and J. Lücke, “Neurons equipped with intrinsic plasticity learn stimulus intensity statistics,” presented at the NIPS: Neural Information Processing Systems, Barcelona, Spaine, 2016, vol. 29, pp. 4285–4293.","ama":"Monk T, Savin C, Lücke J. Neurons equipped with intrinsic plasticity learn stimulus intensity statistics. In: Vol 29. Neural Information Processing Systems; 2016:4285-4293."},"page":"4285 - 4293"},{"_id":"1262","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","intvolume":" 283","title":"Elevated virulence of an emerging viral genotype as a driver of honeybee loss","ddc":["576","592"],"status":"public","pubrep_id":"701","file":[{"file_name":"IST-2016-701-v1+1_20160811.full.pdf","access_level":"open_access","content_type":"application/pdf","file_size":796872,"creator":"system","relation":"main_file","file_id":"4708","date_updated":"2020-07-14T12:44:42Z","date_created":"2018-12-12T10:08:46Z","checksum":"0b0d1be38b497d004064650acb3baced"}],"oa_version":"Published Version","type":"journal_article","issue":"1833","abstract":[{"text":"Emerging infectious diseases (EIDs) have contributed significantly to the current biodiversity crisis, leading to widespread epidemics and population loss. Owing to genetic variation in pathogen virulence, a complete understanding of species decline requires the accurate identification and characterization of EIDs. We explore this issue in the Western honeybee, where increasing mortality of populations in the Northern Hemisphere has caused major concern. Specifically, we investigate the importance of genetic identity of the main suspect in mortality, deformed wing virus (DWV), in driving honeybee loss. Using laboratory experiments and a systematic field survey, we demonstrate that an emerging DWV genotype (DWV-B) is more virulent than the established DWV genotype (DWV-A) and is widespread in the landscape. Furthermore, we show in a simple model that colonies infected with DWV-B collapse sooner than colonies infected with DWV-A. We also identify potential for rapid DWV evolution by revealing extensive genome-wide recombination in vivo. The emergence of DWV-B in naive honeybee populations, including via recombination with DWV-A, could be of significant ecological and economic importance. Our findings emphasize that knowledge of pathogen genetic identity and diversity is critical to understanding drivers of species decline.","lang":"eng"}],"citation":{"short":"D. Mcmahon, M. Natsopoulou, V. Doublet, M. Fürst, S. Weging, M. Brown, A. Gogol Döring, R. Paxton, Proceedings of the Royal Society of London Series B Biological Sciences 283 (2016).","mla":"Mcmahon, Dino, et al. “Elevated Virulence of an Emerging Viral Genotype as a Driver of Honeybee Loss.” Proceedings of the Royal Society of London Series B Biological Sciences, vol. 283, no. 1833, 20160811, Royal Society, The, 2016, doi:10.1098/rspb.2016.0811.","chicago":"Mcmahon, Dino, Myrsini Natsopoulou, Vincent Doublet, Matthias Fürst, Silvio Weging, Mark Brown, Andreas Gogol Döring, and Robert Paxton. “Elevated Virulence of an Emerging Viral Genotype as a Driver of Honeybee Loss.” Proceedings of the Royal Society of London Series B Biological Sciences. Royal Society, The, 2016. https://doi.org/10.1098/rspb.2016.0811.","ama":"Mcmahon D, Natsopoulou M, Doublet V, et al. Elevated virulence of an emerging viral genotype as a driver of honeybee loss. Proceedings of the Royal Society of London Series B Biological Sciences. 2016;283(1833). doi:10.1098/rspb.2016.0811","ieee":"D. Mcmahon et al., “Elevated virulence of an emerging viral genotype as a driver of honeybee loss,” Proceedings of the Royal Society of London Series B Biological Sciences, vol. 283, no. 1833. Royal Society, The, 2016.","apa":"Mcmahon, D., Natsopoulou, M., Doublet, V., Fürst, M., Weging, S., Brown, M., … Paxton, R. (2016). Elevated virulence of an emerging viral genotype as a driver of honeybee loss. Proceedings of the Royal Society of London Series B Biological Sciences. Royal Society, The. https://doi.org/10.1098/rspb.2016.0811","ista":"Mcmahon D, Natsopoulou M, Doublet V, Fürst M, Weging S, Brown M, Gogol Döring A, Paxton R. 2016. Elevated virulence of an emerging viral genotype as a driver of honeybee loss. Proceedings of the Royal Society of London Series B Biological Sciences. 283(1833), 20160811."},"publication":"Proceedings of the Royal Society of London Series B Biological Sciences","date_published":"2016-06-29T00:00:00Z","scopus_import":1,"has_accepted_license":"1","day":"29","year":"2016","acknowledgement":"This work was supported by the Federal Ministry of Food, Agriculture and Consumer Protection (Germany): Fit Bee project (grant 511-06.01-28-1-71.007-10), the EU: BeeDoc (grant 244956), iDiv (2013 NGS-Fast Track grant W47004118) and the Insect Pollinators Initiative (IPI grant BB/I000100/1 and BB/I000151/1). The IPI is funded jointly by the Biotechnology and Biological Sciences Research Council, the Department for Environment, Food and Rural Affairs, the Natural Environment Research Council, the Scottish Government and the Wellcome Trust, under the Living with Environmental Change Partnership. We thank A. Abrahams, M. Husemann and A. Soro\r\nfor support in obtaining\r\nV. destructor\r\n-free honeybees; and BBKA\r\nPresident D. Aston for access to records of colony overwinter\r\n2011–2012 mortality in the UK. We also thank the anonymous refe-\r\nrees and Stephen Martin for comments that led to substantial\r\nimprovement of the manuscript.","publisher":"Royal Society, The","department":[{"_id":"SyCr"}],"publication_status":"published","related_material":{"record":[{"relation":"research_data","status":"public","id":"9704"}]},"author":[{"first_name":"Dino","last_name":"Mcmahon","full_name":"Mcmahon, Dino"},{"full_name":"Natsopoulou, Myrsini","last_name":"Natsopoulou","first_name":"Myrsini"},{"first_name":"Vincent","last_name":"Doublet","full_name":"Doublet, Vincent"},{"full_name":"Fürst, Matthias","first_name":"Matthias","last_name":"Fürst","id":"393B1196-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-3712-925X"},{"last_name":"Weging","first_name":"Silvio","full_name":"Weging, Silvio"},{"first_name":"Mark","last_name":"Brown","full_name":"Brown, Mark"},{"last_name":"Gogol Döring","first_name":"Andreas","full_name":"Gogol Döring, Andreas"},{"last_name":"Paxton","first_name":"Robert","full_name":"Paxton, Robert"}],"volume":283,"date_updated":"2023-02-23T14:05:30Z","date_created":"2018-12-11T11:51:00Z","article_number":"20160811","publist_id":"6060","file_date_updated":"2020-07-14T12:44:42Z","oa":1,"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"quality_controlled":"1","doi":"10.1098/rspb.2016.0811","language":[{"iso":"eng"}],"month":"06"},{"month":"05","day":"06","article_processing_charge":"No","doi":"10.5061/dryad.cq7t1","date_published":"2016-05-06T00:00:00Z","citation":{"mla":"Mcmahon, Dino, et al. Data from: Elevated Virulence of an Emerging Viral Genotype as a Driver of Honeybee Loss. Dryad, 2016, doi:10.5061/dryad.cq7t1.","short":"D. Mcmahon, M. Natsopoulou, V. Doublet, M. Fürst, S. Weging, M. Brown, A. Gogol Döring, R. Paxton, (2016).","chicago":"Mcmahon, Dino, Myrsini Natsopoulou, Vincent Doublet, Matthias Fürst, Silvio Weging, Mark Brown, Andreas Gogol Döring, and Robert Paxton. “Data from: Elevated Virulence of an Emerging Viral Genotype as a Driver of Honeybee Loss.” Dryad, 2016. https://doi.org/10.5061/dryad.cq7t1.","ama":"Mcmahon D, Natsopoulou M, Doublet V, et al. Data from: Elevated virulence of an emerging viral genotype as a driver of honeybee loss. 2016. doi:10.5061/dryad.cq7t1","ista":"Mcmahon D, Natsopoulou M, Doublet V, Fürst M, Weging S, Brown M, Gogol Döring A, Paxton R. 2016. Data from: Elevated virulence of an emerging viral genotype as a driver of honeybee loss, Dryad, 10.5061/dryad.cq7t1.","ieee":"D. Mcmahon et al., “Data from: Elevated virulence of an emerging viral genotype as a driver of honeybee loss.” Dryad, 2016.","apa":"Mcmahon, D., Natsopoulou, M., Doublet, V., Fürst, M., Weging, S., Brown, M., … Paxton, R. (2016). Data from: Elevated virulence of an emerging viral genotype as a driver of honeybee loss. Dryad. https://doi.org/10.5061/dryad.cq7t1"},"oa":1,"main_file_link":[{"open_access":"1","url":"https://doi.org/10.5061/dryad.cq7t1"}],"abstract":[{"lang":"eng","text":"Emerging infectious diseases (EIDs) have contributed significantly to the current biodiversity crisis, leading to widespread epidemics and population loss. Owing to genetic variation in pathogen virulence, a complete understanding of species decline requires the accurate identification and characterization of EIDs. We explore this issue in the Western honeybee, where increasing mortality of populations in the Northern Hemisphere has caused major concern. Specifically, we investigate the importance of genetic identity of the main suspect in mortality, deformed wing virus (DWV), in driving honeybee loss. Using laboratory experiments and a systematic field survey, we demonstrate that an emerging DWV genotype (DWV-B) is more virulent than the established DWV genotype (DWV-A) and is widespread in the landscape. Furthermore, we show in a simple model that colonies infected with DWV-B collapse sooner than colonies infected with DWV-A. We also identify potential for rapid DWV evolution by revealing extensive genome-wide recombination in vivo. The emergence of DWV-B in naive honeybee populations, including via recombination with DWV-A, could be of significant ecological and economic importance. Our findings emphasize that knowledge of pathogen genetic identity and diversity is critical to understanding drivers of species decline."}],"type":"research_data_reference","date_created":"2021-07-23T08:30:38Z","date_updated":"2023-02-21T16:54:31Z","oa_version":"Published Version","author":[{"first_name":"Dino","last_name":"Mcmahon","full_name":"Mcmahon, Dino"},{"last_name":"Natsopoulou","first_name":"Myrsini","full_name":"Natsopoulou, Myrsini"},{"last_name":"Doublet","first_name":"Vincent","full_name":"Doublet, Vincent"},{"orcid":"0000-0002-3712-925X","id":"393B1196-F248-11E8-B48F-1D18A9856A87","last_name":"Fürst","first_name":"Matthias","full_name":"Fürst, Matthias"},{"full_name":"Weging, Silvio","first_name":"Silvio","last_name":"Weging"},{"last_name":"Brown","first_name":"Mark","full_name":"Brown, Mark"},{"first_name":"Andreas","last_name":"Gogol Döring","full_name":"Gogol Döring, Andreas"},{"last_name":"Paxton","first_name":"Robert","full_name":"Paxton, Robert"}],"related_material":{"record":[{"id":"1262","relation":"used_in_publication","status":"public"}]},"status":"public","title":"Data from: Elevated virulence of an emerging viral genotype as a driver of honeybee loss","publisher":"Dryad","department":[{"_id":"SyCr"}],"_id":"9704","year":"2016","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf"},{"quality_controlled":"1","tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"oa":1,"language":[{"iso":"eng"}],"doi":"10.1371/journal.pone.0163867","month":"10","department":[{"_id":"KrCh"}],"publisher":"Public Library of Science","publication_status":"published","year":"2016","acknowledgement":"CH was funded by the Schrödinger program of the Austrian Science Fund (FWF) J3475. ","volume":11,"date_created":"2018-12-11T11:51:22Z","date_updated":"2023-02-23T14:11:27Z","related_material":{"record":[{"relation":"research_data","status":"public","id":"9867"},{"status":"public","relation":"research_data","id":"9868"}]},"author":[{"id":"2FDF8F3C-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-5116-955X","first_name":"Christian","last_name":"Hilbe","full_name":"Hilbe, Christian"},{"full_name":"Hagel, Kristin","first_name":"Kristin","last_name":"Hagel"},{"full_name":"Milinski, Manfred","last_name":"Milinski","first_name":"Manfred"}],"article_number":"e0163867","publist_id":"5948","file_date_updated":"2020-07-14T12:44:44Z","citation":{"chicago":"Hilbe, Christian, Kristin Hagel, and Manfred Milinski. “Asymmetric Power Boosts Extortion in an Economic Experiment.” PLoS One. Public Library of Science, 2016. https://doi.org/10.1371/journal.pone.0163867.","short":"C. Hilbe, K. Hagel, M. Milinski, PLoS One 11 (2016).","mla":"Hilbe, Christian, et al. “Asymmetric Power Boosts Extortion in an Economic Experiment.” PLoS One, vol. 11, no. 10, e0163867, Public Library of Science, 2016, doi:10.1371/journal.pone.0163867.","apa":"Hilbe, C., Hagel, K., & Milinski, M. (2016). Asymmetric power boosts extortion in an economic experiment. PLoS One. Public Library of Science. https://doi.org/10.1371/journal.pone.0163867","ieee":"C. Hilbe, K. Hagel, and M. Milinski, “Asymmetric power boosts extortion in an economic experiment,” PLoS One, vol. 11, no. 10. Public Library of Science, 2016.","ista":"Hilbe C, Hagel K, Milinski M. 2016. Asymmetric power boosts extortion in an economic experiment. PLoS One. 11(10), e0163867.","ama":"Hilbe C, Hagel K, Milinski M. Asymmetric power boosts extortion in an economic experiment. PLoS One. 2016;11(10). doi:10.1371/journal.pone.0163867"},"publication":"PLoS One","date_published":"2016-10-04T00:00:00Z","scopus_import":1,"has_accepted_license":"1","day":"04","intvolume":" 11","title":"Asymmetric power boosts extortion in an economic experiment","ddc":["004","006"],"status":"public","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1322","oa_version":"Published Version","file":[{"creator":"system","content_type":"application/pdf","file_size":2077905,"access_level":"open_access","file_name":"IST-2016-716-v1+1_journal.pone.0163867.PDF","checksum":"6b33e394003dfe8b4ca6be1858aaa8e3","date_created":"2018-12-12T10:08:08Z","date_updated":"2020-07-14T12:44:44Z","file_id":"4668","relation":"main_file"}],"pubrep_id":"716","type":"journal_article","issue":"10","abstract":[{"lang":"eng","text":"Direct reciprocity is a major mechanism for the evolution of cooperation. Several classical studies have suggested that humans should quickly learn to adopt reciprocal strategies to establish mutual cooperation in repeated interactions. On the other hand, the recently discovered theory of ZD strategies has found that subjects who use extortionate strategies are able to exploit and subdue cooperators. Although such extortioners have been predicted to succeed in any population of adaptive opponents, theoretical follow-up studies questioned whether extortion can evolve in reality. However, most of these studies presumed that individuals have similar strategic possibilities and comparable outside options, whereas asymmetries are ubiquitous in real world applications. Here we show with a model and an economic experiment that extortionate strategies readily emerge once subjects differ in their strategic power. Our experiment combines a repeated social dilemma with asymmetric partner choice. In our main treatment there is one randomly chosen group member who is unilaterally allowed to exchange one of the other group members after every ten rounds of the social dilemma. We find that this asymmetric replacement opportunity generally promotes cooperation, but often the resulting payoff distribution reflects the underlying power structure. Almost half of the subjects in a better strategic position turn into extortioners, who quickly proceed to exploit their peers. By adapting their cooperation probabilities consistent with ZD theory, extortioners force their co-players to cooperate without being similarly cooperative themselves. Comparison to non-extortionate players under the same conditions indicates a substantial net gain to extortion. Our results thus highlight how power asymmetries can endanger mutually beneficial interactions, and transform them into exploitative relationships. In particular, our results indicate that the extortionate strategies predicted from ZD theory could play a more prominent role in our daily interactions than previously thought."}]},{"month":"09","doi":"10.1371/journal.pone.0163628","language":[{"iso":"eng"}],"oa":1,"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"quality_controlled":"1","project":[{"_id":"254E9036-B435-11E9-9278-68D0E5697425","grant_number":"P28844-B27","call_identifier":"FWF","name":"Biophysics of information processing in gene regulation"}],"file_date_updated":"2020-07-14T12:44:42Z","publist_id":"6050","article_number":"e0163628","author":[{"full_name":"Hillenbrand, Patrick","first_name":"Patrick","last_name":"Hillenbrand"},{"first_name":"Ulrich","last_name":"Gerland","full_name":"Gerland, Ulrich"},{"orcid":"0000-0002-6699-1455","id":"3D494DCA-F248-11E8-B48F-1D18A9856A87","last_name":"Tkacik","first_name":"Gasper","full_name":"Tkacik, Gasper"}],"related_material":{"record":[{"relation":"research_data","status":"public","id":"9869"},{"id":"9870","relation":"research_data","status":"public"},{"id":"9871","status":"public","relation":"research_data"}]},"date_updated":"2023-02-23T14:11:37Z","date_created":"2018-12-11T11:51:03Z","volume":11,"acknowledgement":"The authors would like to thank Thomas Sokolowski and Filipe Tostevin for helpful discussions. PH and UG were funded by the German Excellence Initiative via the program \"Nanosystems Initiative Munich\" (https://www.nano-initiative-munich.de) and the German Research Foundation via the SFB 1032 \"Nanoagents for Spatiotemporal Control of Molecular and Cellular Reactions\" (http://www.sfb1032.physik.uni-muenchen.de). GT was funded by the Austrian Science Fund (FWF P 28844) (http://www.fwf.ac.at).","year":"2016","publication_status":"published","department":[{"_id":"GaTk"}],"publisher":"Public Library of Science","day":"27","has_accepted_license":"1","scopus_import":1,"date_published":"2016-09-27T00:00:00Z","publication":"PLoS One","citation":{"chicago":"Hillenbrand, Patrick, Ulrich Gerland, and Gašper Tkačik. “Beyond the French Flag Model: Exploiting Spatial and Gene Regulatory Interactions for Positional Information.” PLoS One. Public Library of Science, 2016. https://doi.org/10.1371/journal.pone.0163628.","mla":"Hillenbrand, Patrick, et al. “Beyond the French Flag Model: Exploiting Spatial and Gene Regulatory Interactions for Positional Information.” PLoS One, vol. 11, no. 9, e0163628, Public Library of Science, 2016, doi:10.1371/journal.pone.0163628.","short":"P. Hillenbrand, U. Gerland, G. Tkačik, PLoS One 11 (2016).","ista":"Hillenbrand P, Gerland U, Tkačik G. 2016. Beyond the French flag model: Exploiting spatial and gene regulatory interactions for positional information. PLoS One. 11(9), e0163628.","apa":"Hillenbrand, P., Gerland, U., & Tkačik, G. (2016). Beyond the French flag model: Exploiting spatial and gene regulatory interactions for positional information. PLoS One. Public Library of Science. https://doi.org/10.1371/journal.pone.0163628","ieee":"P. Hillenbrand, U. Gerland, and G. Tkačik, “Beyond the French flag model: Exploiting spatial and gene regulatory interactions for positional information,” PLoS One, vol. 11, no. 9. Public Library of Science, 2016.","ama":"Hillenbrand P, Gerland U, Tkačik G. Beyond the French flag model: Exploiting spatial and gene regulatory interactions for positional information. PLoS One. 2016;11(9). doi:10.1371/journal.pone.0163628"},"abstract":[{"lang":"eng","text":"A crucial step in the early development of multicellular organisms involves the establishment of spatial patterns of gene expression which later direct proliferating cells to take on different cell fates. These patterns enable the cells to infer their global position within a tissue or an organism by reading out local gene expression levels. The patterning system is thus said to encode positional information, a concept that was formalized recently in the framework of information theory. Here we introduce a toy model of patterning in one spatial dimension, which can be seen as an extension of Wolpert's paradigmatic "French Flag" model, to patterning by several interacting, spatially coupled genes subject to intrinsic and extrinsic noise. Our model, a variant of an Ising spin system, allows us to systematically explore expression patterns that optimally encode positional information. We find that optimal patterning systems use positional cues, as in the French Flag model, together with gene-gene interactions to generate combinatorial codes for position which we call "Counter" patterns. Counter patterns can also be stabilized against noise and variations in system size or morphogen dosage by longer-range spatial interactions of the type invoked in the Turing model. The simple setup proposed here qualitatively captures many of the experimentally observed properties of biological patterning systems and allows them to be studied in a single, theoretically consistent framework."}],"issue":"9","type":"journal_article","pubrep_id":"696","oa_version":"Published Version","file":[{"checksum":"3d0d55d373096a033bd9cf79288c8586","date_updated":"2020-07-14T12:44:42Z","date_created":"2018-12-12T10:10:47Z","relation":"main_file","file_id":"4837","file_size":4950415,"content_type":"application/pdf","creator":"system","access_level":"open_access","file_name":"IST-2016-696-v1+1_journal.pone.0163628.PDF"}],"_id":"1270","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","title":"Beyond the French flag model: Exploiting spatial and gene regulatory interactions for positional information","status":"public","ddc":["571"],"intvolume":" 11"},{"file":[{"date_updated":"2020-07-14T12:44:41Z","date_created":"2018-12-12T10:14:17Z","checksum":"53d22b2b39e5adc243d34f18b2615a85","relation":"main_file","file_id":"5067","content_type":"application/pdf","file_size":6273249,"creator":"system","file_name":"IST-2016-705-v1+1_journal.pgen.1005974.PDF","access_level":"open_access"}],"oa_version":"Published Version","pubrep_id":"705","intvolume":" 12","ddc":["576","579"],"status":"public","title":"Genetic manipulation of glycogen allocation affects replicative lifespan in E coli","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1250","issue":"4","abstract":[{"text":"In bacteria, replicative aging manifests as a difference in growth or survival between the two cells emerging from division. One cell can be regarded as an aging mother with a decreased potential for future survival and division, the other as a rejuvenated daughter. Here, we aimed at investigating some of the processes involved in aging in the bacterium Escherichia coli, where the two types of cells can be distinguished by the age of their cell poles. We found that certain changes in the regulation of the carbohydrate metabolism can affect aging. A mutation in the carbon storage regulator gene, csrA, leads to a dramatically shorter replicative lifespan; csrA mutants stop dividing once their pole exceeds an age of about five divisions. These old-pole cells accumulate glycogen at their old cell poles; after their last division, they do not contain a chromosome, presumably because of spatial exclusion by the glycogen aggregates. The new-pole daughters produced by these aging mothers are born young; they only express the deleterious phenotype once their pole is old. These results demonstrate how manipulations of nutrient allocation can lead to the exclusion of the chromosome and limit replicative lifespan in E. coli, and illustrate how mutations can have phenotypic effects that are specific for cells with old poles. This raises the question how bacteria can avoid the accumulation of such mutations in their genomes over evolutionary times, and how they can achieve the long replicative lifespans that have recently been reported.","lang":"eng"}],"type":"journal_article","date_published":"2016-04-19T00:00:00Z","citation":{"ieee":"A. Boehm, M. Arnoldini, T. Bergmiller, T. Röösli, C. Bigosch, and M. Ackermann, “Genetic manipulation of glycogen allocation affects replicative lifespan in E coli,” PLoS Genetics, vol. 12, no. 4. Public Library of Science, 2016.","apa":"Boehm, A., Arnoldini, M., Bergmiller, T., Röösli, T., Bigosch, C., & Ackermann, M. (2016). Genetic manipulation of glycogen allocation affects replicative lifespan in E coli. PLoS Genetics. Public Library of Science. https://doi.org/10.1371/journal.pgen.1005974","ista":"Boehm A, Arnoldini M, Bergmiller T, Röösli T, Bigosch C, Ackermann M. 2016. Genetic manipulation of glycogen allocation affects replicative lifespan in E coli. PLoS Genetics. 12(4), e1005974.","ama":"Boehm A, Arnoldini M, Bergmiller T, Röösli T, Bigosch C, Ackermann M. Genetic manipulation of glycogen allocation affects replicative lifespan in E coli. PLoS Genetics. 2016;12(4). doi:10.1371/journal.pgen.1005974","chicago":"Boehm, Alex, Markus Arnoldini, Tobias Bergmiller, Thomas Röösli, Colette Bigosch, and Martin Ackermann. “Genetic Manipulation of Glycogen Allocation Affects Replicative Lifespan in E Coli.” PLoS Genetics. Public Library of Science, 2016. https://doi.org/10.1371/journal.pgen.1005974.","short":"A. Boehm, M. Arnoldini, T. Bergmiller, T. Röösli, C. Bigosch, M. Ackermann, PLoS Genetics 12 (2016).","mla":"Boehm, Alex, et al. “Genetic Manipulation of Glycogen Allocation Affects Replicative Lifespan in E Coli.” PLoS Genetics, vol. 12, no. 4, e1005974, Public Library of Science, 2016, doi:10.1371/journal.pgen.1005974."},"publication":"PLoS Genetics","has_accepted_license":"1","day":"19","scopus_import":1,"volume":12,"date_updated":"2023-02-23T14:11:39Z","date_created":"2018-12-11T11:50:56Z","related_material":{"record":[{"id":"9873","status":"public","relation":"research_data"}]},"author":[{"last_name":"Boehm","first_name":"Alex","full_name":"Boehm, Alex"},{"first_name":"Markus","last_name":"Arnoldini","full_name":"Arnoldini, Markus"},{"orcid":"0000-0001-5396-4346","id":"2C471CFA-F248-11E8-B48F-1D18A9856A87","last_name":"Bergmiller","first_name":"Tobias","full_name":"Bergmiller, Tobias"},{"full_name":"Röösli, Thomas","last_name":"Röösli","first_name":"Thomas"},{"full_name":"Bigosch, Colette","last_name":"Bigosch","first_name":"Colette"},{"last_name":"Ackermann","first_name":"Martin","full_name":"Ackermann, Martin"}],"department":[{"_id":"CaGu"}],"publisher":"Public Library of Science","publication_status":"published","year":"2016","acknowledgement":"This manuscript is dedicated to the memory of Alex Böhm, who was a great friend and a passionate biologist. Alex passed away after the initial submission of this manuscript. We thank Vesna Olivera and Ursula Sauder from the Zentrum für Mikroskopie Uni Basel for excellent service, and Olin Silander, Nikki Freed, and Nela Nikolic for helpful discussions. This work was supported by the Swiss National Science Foundation grants to M. Ackermann and Urs Jenal (supporting AB).","publist_id":"6077","file_date_updated":"2020-07-14T12:44:41Z","article_number":"e1005974","language":[{"iso":"eng"}],"doi":"10.1371/journal.pgen.1005974","quality_controlled":"1","oa":1,"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"month":"04"},{"abstract":[{"lang":"eng","text":"The effect of noise in the input field on an Ising model is approximated. Furthermore, methods to compute positional information in an Ising model by transfer matrices and Monte Carlo sampling are outlined."}],"type":"research_data_reference","oa_version":"Published Version","date_created":"2021-08-10T09:23:45Z","date_updated":"2023-02-21T16:56:40Z","related_material":{"record":[{"id":"1270","relation":"used_in_publication","status":"public"}]},"author":[{"full_name":"Hillenbrand, Patrick","first_name":"Patrick","last_name":"Hillenbrand"},{"full_name":"Gerland, Ulrich","first_name":"Ulrich","last_name":"Gerland"},{"full_name":"Tkačik, Gašper","orcid":"0000-0002-6699-1455","id":"3D494DCA-F248-11E8-B48F-1D18A9856A87","last_name":"Tkačik","first_name":"Gašper"}],"department":[{"_id":"GaTk"}],"publisher":"Public Library of Science","status":"public","title":"Computation of positional information in an Ising model","year":"2016","_id":"9870","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","article_processing_charge":"No","day":"27","month":"09","date_published":"2016-09-27T00:00:00Z","doi":"10.1371/journal.pone.0163628.s002","citation":{"apa":"Hillenbrand, P., Gerland, U., & Tkačik, G. (2016). Computation of positional information in an Ising model. Public Library of Science. https://doi.org/10.1371/journal.pone.0163628.s002","ieee":"P. Hillenbrand, U. Gerland, and G. Tkačik, “Computation of positional information in an Ising model.” Public Library of Science, 2016.","ista":"Hillenbrand P, Gerland U, Tkačik G. 2016. Computation of positional information in an Ising model, Public Library of Science, 10.1371/journal.pone.0163628.s002.","ama":"Hillenbrand P, Gerland U, Tkačik G. Computation of positional information in an Ising model. 2016. doi:10.1371/journal.pone.0163628.s002","chicago":"Hillenbrand, Patrick, Ulrich Gerland, and Gašper Tkačik. “Computation of Positional Information in an Ising Model.” Public Library of Science, 2016. https://doi.org/10.1371/journal.pone.0163628.s002.","short":"P. Hillenbrand, U. Gerland, G. Tkačik, (2016).","mla":"Hillenbrand, Patrick, et al. Computation of Positional Information in an Ising Model. Public Library of Science, 2016, doi:10.1371/journal.pone.0163628.s002."}},{"doi":"10.1371/journal.pgen.1005974.s015","citation":{"short":"A. Boehm, M. Arnoldini, T. Bergmiller, T. Röösli, C. Bigosch, M. Ackermann, (2016).","mla":"Boehm, Alex, et al. Quantification of the Growth Rate Reduction as a Consequence of Age-Specific Mortality. Public Library of Science, 2016, doi:10.1371/journal.pgen.1005974.s015.","chicago":"Boehm, Alex, Markus Arnoldini, Tobias Bergmiller, Thomas Röösli, Colette Bigosch, and Martin Ackermann. “Quantification of the Growth Rate Reduction as a Consequence of Age-Specific Mortality.” Public Library of Science, 2016. https://doi.org/10.1371/journal.pgen.1005974.s015.","ama":"Boehm A, Arnoldini M, Bergmiller T, Röösli T, Bigosch C, Ackermann M. Quantification of the growth rate reduction as a consequence of age-specific mortality. 2016. doi:10.1371/journal.pgen.1005974.s015","ieee":"A. Boehm, M. Arnoldini, T. Bergmiller, T. Röösli, C. Bigosch, and M. Ackermann, “Quantification of the growth rate reduction as a consequence of age-specific mortality.” Public Library of Science, 2016.","apa":"Boehm, A., Arnoldini, M., Bergmiller, T., Röösli, T., Bigosch, C., & Ackermann, M. (2016). Quantification of the growth rate reduction as a consequence of age-specific mortality. Public Library of Science. https://doi.org/10.1371/journal.pgen.1005974.s015","ista":"Boehm A, Arnoldini M, Bergmiller T, Röösli T, Bigosch C, Ackermann M. 2016. Quantification of the growth rate reduction as a consequence of age-specific mortality, Public Library of Science, 10.1371/journal.pgen.1005974.s015."},"article_processing_charge":"No","month":"04","day":"19","oa_version":"Published Version","date_created":"2021-08-10T09:42:34Z","date_updated":"2023-02-21T16:50:13Z","related_material":{"record":[{"status":"public","relation":"used_in_publication","id":"1250"}]},"author":[{"first_name":"Alex","last_name":"Boehm","full_name":"Boehm, Alex"},{"last_name":"Arnoldini","first_name":"Markus","full_name":"Arnoldini, Markus"},{"full_name":"Bergmiller, Tobias","id":"2C471CFA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-5396-4346","first_name":"Tobias","last_name":"Bergmiller"},{"full_name":"Röösli, Thomas","last_name":"Röösli","first_name":"Thomas"},{"full_name":"Bigosch, Colette","first_name":"Colette","last_name":"Bigosch"},{"last_name":"Ackermann","first_name":"Martin","full_name":"Ackermann, Martin"}],"department":[{"_id":"CaGu"}],"publisher":"Public Library of Science","status":"public","title":"Quantification of the growth rate reduction as a consequence of age-specific mortality","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","_id":"9873","year":"2016","type":"research_data_reference"},{"related_material":{"record":[{"status":"public","relation":"used_in_publication","id":"1270"}]},"author":[{"first_name":"Patrick","last_name":"Hillenbrand","full_name":"Hillenbrand, Patrick"},{"full_name":"Gerland, Ulrich","first_name":"Ulrich","last_name":"Gerland"},{"full_name":"Tkačik, Gašper","orcid":"0000-0002-6699-1455","id":"3D494DCA-F248-11E8-B48F-1D18A9856A87","last_name":"Tkačik","first_name":"Gašper"}],"oa_version":"Published Version","date_created":"2021-08-10T08:53:48Z","date_updated":"2023-02-21T16:56:40Z","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","_id":"9869","year":"2016","publisher":"Public Library of Science","department":[{"_id":"GaTk"}],"title":"Error bound on an estimator of position","status":"public","abstract":[{"lang":"eng","text":"A lower bound on the error of a positional estimator with limited positional information is derived."}],"type":"research_data_reference","doi":"10.1371/journal.pone.0163628.s001","date_published":"2016-09-27T00:00:00Z","citation":{"ama":"Hillenbrand P, Gerland U, Tkačik G. Error bound on an estimator of position. 2016. doi:10.1371/journal.pone.0163628.s001","apa":"Hillenbrand, P., Gerland, U., & Tkačik, G. (2016). Error bound on an estimator of position. Public Library of Science. https://doi.org/10.1371/journal.pone.0163628.s001","ieee":"P. Hillenbrand, U. Gerland, and G. Tkačik, “Error bound on an estimator of position.” Public Library of Science, 2016.","ista":"Hillenbrand P, Gerland U, Tkačik G. 2016. Error bound on an estimator of position, Public Library of Science, 10.1371/journal.pone.0163628.s001.","short":"P. Hillenbrand, U. Gerland, G. Tkačik, (2016).","mla":"Hillenbrand, Patrick, et al. Error Bound on an Estimator of Position. Public Library of Science, 2016, doi:10.1371/journal.pone.0163628.s001.","chicago":"Hillenbrand, Patrick, Ulrich Gerland, and Gašper Tkačik. “Error Bound on an Estimator of Position.” Public Library of Science, 2016. https://doi.org/10.1371/journal.pone.0163628.s001."},"article_processing_charge":"No","month":"09","day":"27"},{"abstract":[{"lang":"eng","text":"The positional information in a discrete morphogen field with Gaussian noise is computed."}],"type":"research_data_reference","date_created":"2021-08-10T09:27:35Z","date_updated":"2023-02-21T16:56:40Z","oa_version":"Published Version","author":[{"full_name":"Hillenbrand, Patrick","last_name":"Hillenbrand","first_name":"Patrick"},{"first_name":"Ulrich","last_name":"Gerland","full_name":"Gerland, Ulrich"},{"full_name":"Tkačik, Gašper","last_name":"Tkačik","first_name":"Gašper","orcid":"0000-0002-6699-1455","id":"3D494DCA-F248-11E8-B48F-1D18A9856A87"}],"related_material":{"record":[{"id":"1270","relation":"used_in_publication","status":"public"}]},"title":"Computation of positional information in a discrete morphogen field","status":"public","publisher":"Public Library of Science","department":[{"_id":"GaTk"}],"_id":"9871","year":"2016","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","day":"27","month":"09","article_processing_charge":"No","doi":"10.1371/journal.pone.0163628.s003","citation":{"chicago":"Hillenbrand, Patrick, Ulrich Gerland, and Gašper Tkačik. “Computation of Positional Information in a Discrete Morphogen Field.” Public Library of Science, 2016. https://doi.org/10.1371/journal.pone.0163628.s003.","mla":"Hillenbrand, Patrick, et al. Computation of Positional Information in a Discrete Morphogen Field. Public Library of Science, 2016, doi:10.1371/journal.pone.0163628.s003.","short":"P. Hillenbrand, U. Gerland, G. Tkačik, (2016).","ista":"Hillenbrand P, Gerland U, Tkačik G. 2016. Computation of positional information in a discrete morphogen field, Public Library of Science, 10.1371/journal.pone.0163628.s003.","apa":"Hillenbrand, P., Gerland, U., & Tkačik, G. (2016). Computation of positional information in a discrete morphogen field. Public Library of Science. https://doi.org/10.1371/journal.pone.0163628.s003","ieee":"P. Hillenbrand, U. Gerland, and G. Tkačik, “Computation of positional information in a discrete morphogen field.” Public Library of Science, 2016.","ama":"Hillenbrand P, Gerland U, Tkačik G. Computation of positional information in a discrete morphogen field. 2016. doi:10.1371/journal.pone.0163628.s003"}},{"oa_version":"Published Version","date_created":"2021-08-10T08:45:00Z","date_updated":"2023-02-21T16:59:01Z","related_material":{"record":[{"status":"public","relation":"used_in_publication","id":"1322"}]},"author":[{"full_name":"Hilbe, Christian","first_name":"Christian","last_name":"Hilbe","id":"2FDF8F3C-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-5116-955X"},{"full_name":"Hagel, Kristin","last_name":"Hagel","first_name":"Kristin"},{"full_name":"Milinski, Manfred","first_name":"Manfred","last_name":"Milinski"}],"publisher":"Public Library of Science","department":[{"_id":"KrCh"}],"status":"public","title":"Experimental data","_id":"9868","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","year":"2016","abstract":[{"text":"The raw data file containing the experimental decisions of all our study subjects.","lang":"eng"}],"type":"research_data_reference","doi":"10.1371/journal.pone.0163867.s009","date_published":"2016-10-04T00:00:00Z","citation":{"chicago":"Hilbe, Christian, Kristin Hagel, and Manfred Milinski. “Experimental Data.” Public Library of Science, 2016. https://doi.org/10.1371/journal.pone.0163867.s009.","mla":"Hilbe, Christian, et al. Experimental Data. Public Library of Science, 2016, doi:10.1371/journal.pone.0163867.s009.","short":"C. Hilbe, K. Hagel, M. Milinski, (2016).","ista":"Hilbe C, Hagel K, Milinski M. 2016. Experimental data, Public Library of Science, 10.1371/journal.pone.0163867.s009.","apa":"Hilbe, C., Hagel, K., & Milinski, M. (2016). Experimental data. Public Library of Science. https://doi.org/10.1371/journal.pone.0163867.s009","ieee":"C. Hilbe, K. Hagel, and M. Milinski, “Experimental data.” Public Library of Science, 2016.","ama":"Hilbe C, Hagel K, Milinski M. Experimental data. 2016. doi:10.1371/journal.pone.0163867.s009"},"article_processing_charge":"No","day":"04","month":"10"},{"language":[{"iso":"eng"}],"date_published":"2016-11-10T00:00:00Z","doi":"10.1021/acssensors.6b00576","quality_controlled":"1","page":"1286 - 1290","publication":"ACS SENSORS","citation":{"ama":"Mitchell J, Whitfield J, Zhang W, et al. Rangefinder: A semisynthetic FRET sensor design algorithm. ACS SENSORS. 2016;1(11):1286-1290. doi:10.1021/acssensors.6b00576","ista":"Mitchell J, Whitfield J, Zhang W, Henneberger C, Janovjak HL, O’Mara M, Jackson C. 2016. Rangefinder: A semisynthetic FRET sensor design algorithm. ACS SENSORS. 1(11), 1286–1290.","apa":"Mitchell, J., Whitfield, J., Zhang, W., Henneberger, C., Janovjak, H. L., O’Mara, M., & Jackson, C. (2016). Rangefinder: A semisynthetic FRET sensor design algorithm. ACS SENSORS. American Chemical Society. https://doi.org/10.1021/acssensors.6b00576","ieee":"J. Mitchell et al., “Rangefinder: A semisynthetic FRET sensor design algorithm,” ACS SENSORS, vol. 1, no. 11. American Chemical Society, pp. 1286–1290, 2016.","mla":"Mitchell, Joshua, et al. “Rangefinder: A Semisynthetic FRET Sensor Design Algorithm.” ACS SENSORS, vol. 1, no. 11, American Chemical Society, 2016, pp. 1286–90, doi:10.1021/acssensors.6b00576.","short":"J. Mitchell, J. Whitfield, W. Zhang, C. Henneberger, H.L. Janovjak, M. O’Mara, C. Jackson, ACS SENSORS 1 (2016) 1286–1290.","chicago":"Mitchell, Joshua, Jason Whitfield, William Zhang, Christian Henneberger, Harald L Janovjak, Megan O’Mara, and Colin Jackson. “Rangefinder: A Semisynthetic FRET Sensor Design Algorithm.” ACS SENSORS. American Chemical Society, 2016. https://doi.org/10.1021/acssensors.6b00576."},"month":"11","day":"10","article_processing_charge":"No","scopus_import":"1","date_created":"2018-12-11T11:50:09Z","date_updated":"2023-03-30T11:32:33Z","volume":1,"oa_version":"None","author":[{"full_name":"Mitchell, Joshua","last_name":"Mitchell","first_name":"Joshua"},{"last_name":"Whitfield","first_name":"Jason","full_name":"Whitfield, Jason"},{"first_name":"William","last_name":"Zhang","full_name":"Zhang, William"},{"last_name":"Henneberger","first_name":"Christian","full_name":"Henneberger, Christian"},{"first_name":"Harald L","last_name":"Janovjak","id":"33BA6C30-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8023-9315","full_name":"Janovjak, Harald L"},{"first_name":"Megan","last_name":"O'Mara","full_name":"O'Mara, Megan"},{"last_name":"Jackson","first_name":"Colin","full_name":"Jackson, Colin"}],"publication_status":"published","title":"Rangefinder: A semisynthetic FRET sensor design algorithm","status":"public","publisher":"American Chemical Society","intvolume":" 1","department":[{"_id":"HaJa"}],"acknowledgement":"J.A.M., J.H.W., and W.H.Z. were supported by Australian\r\nPostgraduate Awards (APA), AS Sargeson Supplementary\r\nscholarships, and RSC supplementary scholarships. C.J.J.\r\nacknowledges support from a Human Frontiers in Science\r\nYoung Investigator Award and a Discovery Project and Future\r\nFellowship from the Australian Research Council. M.L.O. is\r\nsupported by an Australian Research Council Discovery Project\r\n(DP130102153) and the Merit Allocation Scheme of the\r\nNational Computational Infrastructure.","_id":"1101","year":"2016","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","abstract":[{"lang":"eng","text":"Optical sensors based on the phenomenon of Förster resonance energy transfer (FRET) are powerful tools that have advanced the study of small molecules in biological systems. However, sensor construction is not trivial and often requires multiple rounds of engineering or an ability to screen large numbers of variants. A method that would allow the accurate rational design of FRET sensors would expedite the production of biologically useful sensors. Here, we present Rangefinder, a computational algorithm that allows rapid in silico screening of dye attachment sites in a ligand-binding protein for the conjugation of a dye molecule to act as a Förster acceptor for a fused fluorescent protein. We present three ratiometric fluorescent sensors designed with Rangefinder, including a maltose sensor with a dynamic range of >300% and the first sensors for the most abundant sialic acid in human cells, N-acetylneuraminic acid. Provided a ligand-binding protein exists, it is our expectation that this model will facilitate the design of an optical sensor for any small molecule of interest."}],"issue":"11","publist_id":"6274","type":"journal_article"},{"doi":"10.1073/pnas.1619047114","language":[{"iso":"eng"}],"main_file_link":[{"open_access":"1","url":"https://doi.org/10.1073/pnas.1619047114"}],"external_id":{"pmid":["27956642"]},"oa":1,"quality_controlled":"1","month":"12","publication_identifier":{"issn":["0027-8424"],"eissn":["1091-6490"]},"author":[{"first_name":"Kyunghyuk","last_name":"Park","full_name":"Park, Kyunghyuk"},{"first_name":"M. Yvonne","last_name":"Kim","full_name":"Kim, M. Yvonne"},{"full_name":"Vickers, Martin","last_name":"Vickers","first_name":"Martin"},{"full_name":"Park, Jin-Sup","first_name":"Jin-Sup","last_name":"Park"},{"last_name":"Hyun","first_name":"Youbong","full_name":"Hyun, Youbong"},{"full_name":"Okamoto, Takashi","last_name":"Okamoto","first_name":"Takashi"},{"full_name":"Zilberman, Daniel","id":"6973db13-dd5f-11ea-814e-b3e5455e9ed1","orcid":"0000-0002-0123-8649","first_name":"Daniel","last_name":"Zilberman"},{"first_name":"Robert L.","last_name":"Fischer","full_name":"Fischer, Robert L."},{"full_name":"Feng, Xiaoqi","id":"e0164712-22ee-11ed-b12a-d80fcdf35958","orcid":"0000-0002-4008-1234","first_name":"Xiaoqi","last_name":"Feng"},{"first_name":"Yeonhee","last_name":"Choi","full_name":"Choi, Yeonhee"},{"full_name":"Scholten, Stefan","last_name":"Scholten","first_name":"Stefan"}],"date_created":"2021-06-07T07:10:59Z","date_updated":"2023-05-08T11:00:07Z","volume":113,"year":"2016","pmid":1,"publication_status":"published","department":[{"_id":"DaZi"},{"_id":"XiFe"}],"publisher":"National Academy of Sciences","extern":"1","date_published":"2016-12-27T00:00:00Z","publication":"Proceedings of the National Academy of Sciences","citation":{"mla":"Park, Kyunghyuk, et al. “DNA Demethylation Is Initiated in the Central Cells of Arabidopsis and Rice.” Proceedings of the National Academy of Sciences, vol. 113, no. 52, National Academy of Sciences, 2016, pp. 15138–43, doi:10.1073/pnas.1619047114.","short":"K. Park, M.Y. Kim, M. Vickers, J.-S. Park, Y. Hyun, T. Okamoto, D. Zilberman, R.L. Fischer, X. Feng, Y. Choi, S. Scholten, Proceedings of the National Academy of Sciences 113 (2016) 15138–15143.","chicago":"Park, Kyunghyuk, M. Yvonne Kim, Martin Vickers, Jin-Sup Park, Youbong Hyun, Takashi Okamoto, Daniel Zilberman, et al. “DNA Demethylation Is Initiated in the Central Cells of Arabidopsis and Rice.” Proceedings of the National Academy of Sciences. National Academy of Sciences, 2016. https://doi.org/10.1073/pnas.1619047114.","ama":"Park K, Kim MY, Vickers M, et al. DNA demethylation is initiated in the central cells of Arabidopsis and rice. Proceedings of the National Academy of Sciences. 2016;113(52):15138-15143. doi:10.1073/pnas.1619047114","ista":"Park K, Kim MY, Vickers M, Park J-S, Hyun Y, Okamoto T, Zilberman D, Fischer RL, Feng X, Choi Y, Scholten S. 2016. DNA demethylation is initiated in the central cells of Arabidopsis and rice. Proceedings of the National Academy of Sciences. 113(52), 15138–15143.","apa":"Park, K., Kim, M. Y., Vickers, M., Park, J.-S., Hyun, Y., Okamoto, T., … Scholten, S. (2016). DNA demethylation is initiated in the central cells of Arabidopsis and rice. Proceedings of the National Academy of Sciences. National Academy of Sciences. https://doi.org/10.1073/pnas.1619047114","ieee":"K. Park et al., “DNA demethylation is initiated in the central cells of Arabidopsis and rice,” Proceedings of the National Academy of Sciences, vol. 113, no. 52. National Academy of Sciences, pp. 15138–15143, 2016."},"article_type":"original","page":"15138-15143","day":"27","article_processing_charge":"No","scopus_import":"1","keyword":["Multidisciplinary"],"oa_version":"Published Version","_id":"9477","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","status":"public","title":"DNA demethylation is initiated in the central cells of Arabidopsis and rice","intvolume":" 113","abstract":[{"lang":"eng","text":"Cytosine methylation is a DNA modification with important regulatory functions in eukaryotes. In flowering plants, sexual reproduction is accompanied by extensive DNA demethylation, which is required for proper gene expression in the endosperm, a nutritive extraembryonic seed tissue. Endosperm arises from a fusion of a sperm cell carried in the pollen and a female central cell. Endosperm DNA demethylation is observed specifically on the chromosomes inherited from the central cell in Arabidopsis thaliana, rice, and maize, and requires the DEMETER DNA demethylase in Arabidopsis. DEMETER is expressed in the central cell before fertilization, suggesting that endosperm demethylation patterns are inherited from the central cell. Down-regulation of the MET1 DNA methyltransferase has also been proposed to contribute to central cell demethylation. However, with the exception of three maize genes, central cell DNA methylation has not been directly measured, leaving the origin and mechanism of endosperm demethylation uncertain. Here, we report genome-wide analysis of DNA methylation in the central cells of Arabidopsis and rice—species that diverged 150 million years ago—as well as in rice egg cells. We find that DNA demethylation in both species is initiated in central cells, which requires DEMETER in Arabidopsis. However, we do not observe a global reduction of CG methylation that would be indicative of lowered MET1 activity; on the contrary, CG methylation efficiency is elevated in female gametes compared with nonsexual tissues. Our results demonstrate that locus-specific, active DNA demethylation in the central cell is the origin of maternal chromosome hypomethylation in the endosperm."}],"issue":"52","type":"journal_article"},{"external_id":{"pmid":["27956643"]},"oa":1,"main_file_link":[{"open_access":"1","url":"https://doi.org/10.1073/pnas.1619074114"}],"quality_controlled":"1","doi":"10.1073/pnas.1619074114","language":[{"iso":"eng"}],"month":"12","publication_identifier":{"issn":["0027-8424"],"eissn":["1091-6490"]},"year":"2016","pmid":1,"publication_status":"published","department":[{"_id":"DaZi"},{"_id":"XiFe"}],"publisher":"National Academy of Sciences","author":[{"full_name":"Hsieh, Ping-Hung","first_name":"Ping-Hung","last_name":"Hsieh"},{"full_name":"He, Shengbo","first_name":"Shengbo","last_name":"He"},{"last_name":"Buttress","first_name":"Toby","full_name":"Buttress, Toby"},{"full_name":"Gao, Hongbo","first_name":"Hongbo","last_name":"Gao"},{"last_name":"Couchman","first_name":"Matthew","full_name":"Couchman, Matthew"},{"last_name":"Fischer","first_name":"Robert L.","full_name":"Fischer, Robert L."},{"full_name":"Zilberman, Daniel","id":"6973db13-dd5f-11ea-814e-b3e5455e9ed1","orcid":"0000-0002-0123-8649","first_name":"Daniel","last_name":"Zilberman"},{"orcid":"0000-0002-4008-1234","id":"e0164712-22ee-11ed-b12a-d80fcdf35958","last_name":"Feng","first_name":"Xiaoqi","full_name":"Feng, Xiaoqi"}],"date_created":"2021-06-07T06:21:39Z","date_updated":"2023-05-08T11:00:40Z","volume":113,"extern":"1","publication":"Proceedings of the National Academy of Sciences","citation":{"ama":"Hsieh P-H, He S, Buttress T, et al. Arabidopsis male sexual lineage exhibits more robust maintenance of CG methylation than somatic tissues. Proceedings of the National Academy of Sciences. 2016;113(52):15132-15137. doi:10.1073/pnas.1619074114","ista":"Hsieh P-H, He S, Buttress T, Gao H, Couchman M, Fischer RL, Zilberman D, Feng X. 2016. Arabidopsis male sexual lineage exhibits more robust maintenance of CG methylation than somatic tissues. Proceedings of the National Academy of Sciences. 113(52), 15132–15137.","apa":"Hsieh, P.-H., He, S., Buttress, T., Gao, H., Couchman, M., Fischer, R. L., … Feng, X. (2016). Arabidopsis male sexual lineage exhibits more robust maintenance of CG methylation than somatic tissues. Proceedings of the National Academy of Sciences. National Academy of Sciences. https://doi.org/10.1073/pnas.1619074114","ieee":"P.-H. Hsieh et al., “Arabidopsis male sexual lineage exhibits more robust maintenance of CG methylation than somatic tissues,” Proceedings of the National Academy of Sciences, vol. 113, no. 52. National Academy of Sciences, pp. 15132–15137, 2016.","mla":"Hsieh, Ping-Hung, et al. “Arabidopsis Male Sexual Lineage Exhibits More Robust Maintenance of CG Methylation than Somatic Tissues.” Proceedings of the National Academy of Sciences, vol. 113, no. 52, National Academy of Sciences, 2016, pp. 15132–37, doi:10.1073/pnas.1619074114.","short":"P.-H. Hsieh, S. He, T. Buttress, H. Gao, M. Couchman, R.L. Fischer, D. Zilberman, X. Feng, Proceedings of the National Academy of Sciences 113 (2016) 15132–15137.","chicago":"Hsieh, Ping-Hung, Shengbo He, Toby Buttress, Hongbo Gao, Matthew Couchman, Robert L. Fischer, Daniel Zilberman, and Xiaoqi Feng. “Arabidopsis Male Sexual Lineage Exhibits More Robust Maintenance of CG Methylation than Somatic Tissues.” Proceedings of the National Academy of Sciences. National Academy of Sciences, 2016. https://doi.org/10.1073/pnas.1619074114."},"article_type":"original","page":"15132-15137","date_published":"2016-12-27T00:00:00Z","scopus_import":"1","day":"27","article_processing_charge":"No","_id":"9473","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"Arabidopsis male sexual lineage exhibits more robust maintenance of CG methylation than somatic tissues","status":"public","intvolume":" 113","oa_version":"Published Version","type":"journal_article","abstract":[{"text":"Cytosine DNA methylation regulates the expression of eukaryotic genes and transposons. Methylation is copied by methyltransferases after DNA replication, which results in faithful transmission of methylation patterns during cell division and, at least in flowering plants, across generations. Transgenerational inheritance is mediated by a small group of cells that includes gametes and their progenitors. However, methylation is usually analyzed in somatic tissues that do not contribute to the next generation, and the mechanisms of transgenerational inheritance are inferred from such studies. To gain a better understanding of how DNA methylation is inherited, we analyzed purified Arabidopsis thaliana sperm and vegetative cells-the cell types that comprise pollen-with mutations in the DRM, CMT2, and CMT3 methyltransferases. We find that DNA methylation dependency on these enzymes is similar in sperm, vegetative cells, and somatic tissues, although DRM activity extends into heterochromatin in vegetative cells, likely reflecting transcription of heterochromatic transposons in this cell type. We also show that lack of histone H1, which elevates heterochromatic DNA methylation in somatic tissues, does not have this effect in pollen. Instead, levels of CG methylation in wild-type sperm and vegetative cells, as well as in wild-type microspores from which both pollen cell types originate, are substantially higher than in wild-type somatic tissues and similar to those of H1-depleted roots. Our results demonstrate that the mechanisms of methylation maintenance are similar between pollen and somatic cells, but the efficiency of CG methylation is higher in pollen, allowing methylation patterns to be accurately inherited across generations.","lang":"eng"}],"issue":"52"},{"file":[{"relation":"main_file","file_id":"12968","date_created":"2023-05-16T07:03:56Z","date_updated":"2023-05-16T07:03:56Z","checksum":"4a7b00362e81358d568f5e216fa03c3e","success":1,"file_name":"2016_AHPC_Schloegl.pdf","access_level":"open_access","file_size":1073523,"content_type":"application/pdf","creator":"dernst"}],"oa_version":"Published Version","date_updated":"2023-05-16T07:15:14Z","date_created":"2023-05-05T12:54:47Z","author":[{"last_name":"Schlögl","first_name":"Alois","orcid":"0000-0002-5621-8100","id":"45BF87EE-F248-11E8-B48F-1D18A9856A87","full_name":"Schlögl, Alois"},{"full_name":"Stadlbauer, Stephan","first_name":"Stephan","last_name":"Stadlbauer","id":"4D0BC184-F248-11E8-B48F-1D18A9856A87"}],"department":[{"_id":"ScienComp"},{"_id":"PeJo"}],"publisher":"VSC - Vienna Scientific Cluster","status":"public","ddc":["000"],"publication_status":"published","title":"High performance computing at IST Austria: Modelling the human hippocampus","_id":"12903","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","year":"2016","file_date_updated":"2023-05-16T07:03:56Z","type":"conference_abstract","language":[{"iso":"eng"}],"date_published":"2016-02-24T00:00:00Z","conference":{"name":"AHPC: Austrian HPC Meeting","location":"Grundlsee, Austria","start_date":"2016-02-22","end_date":"2016-02-24"},"page":"37","quality_controlled":"1","oa":1,"citation":{"chicago":"Schlögl, Alois, and Stephan Stadlbauer. “High Performance Computing at IST Austria: Modelling the Human Hippocampus.” In AHPC16 - Austrian HPC Meeting 2016, 37. VSC - Vienna Scientific Cluster, 2016.","mla":"Schlögl, Alois, and Stephan Stadlbauer. “High Performance Computing at IST Austria: Modelling the Human Hippocampus.” AHPC16 - Austrian HPC Meeting 2016, VSC - Vienna Scientific Cluster, 2016, p. 37.","short":"A. Schlögl, S. Stadlbauer, in:, AHPC16 - Austrian HPC Meeting 2016, VSC - Vienna Scientific Cluster, 2016, p. 37.","ista":"Schlögl A, Stadlbauer S. 2016. High performance computing at IST Austria: Modelling the human hippocampus. AHPC16 - Austrian HPC Meeting 2016. AHPC: Austrian HPC Meeting, 37.","apa":"Schlögl, A., & Stadlbauer, S. (2016). High performance computing at IST Austria: Modelling the human hippocampus. In AHPC16 - Austrian HPC Meeting 2016 (p. 37). Grundlsee, Austria: VSC - Vienna Scientific Cluster.","ieee":"A. Schlögl and S. Stadlbauer, “High performance computing at IST Austria: Modelling the human hippocampus,” in AHPC16 - Austrian HPC Meeting 2016, Grundlsee, Austria, 2016, p. 37.","ama":"Schlögl A, Stadlbauer S. High performance computing at IST Austria: Modelling the human hippocampus. In: AHPC16 - Austrian HPC Meeting 2016. VSC - Vienna Scientific Cluster; 2016:37."},"main_file_link":[{"url":"https://vsc.ac.at/fileadmin/user_upload/vsc/conferences/ahpc16/BOOKLET_AHPC16.pdf","open_access":"1"}],"publication":"AHPC16 - Austrian HPC Meeting 2016","has_accepted_license":"1","article_processing_charge":"No","day":"24","month":"02"},{"quality_controlled":"1","project":[{"grant_number":"267989","_id":"25EE3708-B435-11E9-9278-68D0E5697425","name":"Quantitative Reactive Modeling","call_identifier":"FP7"},{"name":"Rigorous Systems Engineering","call_identifier":"FWF","grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425"},{"name":"The Wittgenstein Prize","call_identifier":"FWF","grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425"}],"oa":1,"language":[{"iso":"eng"}],"conference":{"name":"SAGT: Symposium on Algorithmic Game Theory","start_date":"2016-09-19","location":"Liverpool, United Kingdom","end_date":"2016-09-21"},"doi":"10.1007/978-3-662-53354-3_13","month":"09","publication_status":"published","publisher":"Springer","department":[{"_id":"ToHe"}],"year":"2016","acknowledgement":"This research was supported in part by the European Research Council (ERC) under grants 267989 (QUAREM) and 278410 (QUALITY), and by the Austrian Science Fund (FWF) under grants S11402-N23 (RiSE) and Z211-N23 (Wittgenstein Award).","date_created":"2018-12-11T11:51:28Z","date_updated":"2023-08-17T13:52:49Z","volume":9928,"author":[{"full_name":"Avni, Guy","orcid":"0000-0001-5588-8287","id":"463C8BC2-F248-11E8-B48F-1D18A9856A87","last_name":"Avni","first_name":"Guy"},{"orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","first_name":"Thomas A","full_name":"Henzinger, Thomas A"},{"full_name":"Kupferman, Orna","last_name":"Kupferman","first_name":"Orna"}],"related_material":{"record":[{"id":"6761","relation":"later_version","status":"public"}]},"file_date_updated":"2020-07-14T12:44:45Z","ec_funded":1,"publist_id":"5926","page":"153 - 166","citation":{"ama":"Avni G, Henzinger TA, Kupferman O. Dynamic resource allocation games. In: Vol 9928. Springer; 2016:153-166. doi:10.1007/978-3-662-53354-3_13","apa":"Avni, G., Henzinger, T. A., & Kupferman, O. (2016). Dynamic resource allocation games (Vol. 9928, pp. 153–166). Presented at the SAGT: Symposium on Algorithmic Game Theory, Liverpool, United Kingdom: Springer. https://doi.org/10.1007/978-3-662-53354-3_13","ieee":"G. Avni, T. A. Henzinger, and O. Kupferman, “Dynamic resource allocation games,” presented at the SAGT: Symposium on Algorithmic Game Theory, Liverpool, United Kingdom, 2016, vol. 9928, pp. 153–166.","ista":"Avni G, Henzinger TA, Kupferman O. 2016. Dynamic resource allocation games. SAGT: Symposium on Algorithmic Game Theory, LNCS, vol. 9928, 153–166.","short":"G. Avni, T.A. Henzinger, O. Kupferman, in:, Springer, 2016, pp. 153–166.","mla":"Avni, Guy, et al. Dynamic Resource Allocation Games. Vol. 9928, Springer, 2016, pp. 153–66, doi:10.1007/978-3-662-53354-3_13.","chicago":"Avni, Guy, Thomas A Henzinger, and Orna Kupferman. “Dynamic Resource Allocation Games,” 9928:153–66. Springer, 2016. https://doi.org/10.1007/978-3-662-53354-3_13."},"date_published":"2016-09-01T00:00:00Z","scopus_import":1,"day":"01","has_accepted_license":"1","status":"public","title":"Dynamic resource allocation games","ddc":["000"],"intvolume":" 9928","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1341","oa_version":"Preprint","file":[{"file_id":"5073","relation":"main_file","date_created":"2018-12-12T10:14:22Z","date_updated":"2020-07-14T12:44:45Z","checksum":"0825eefd4e22774f6f62cb7d7389b05a","file_name":"IST-2016-645-v1+1_sagt-cr.pdf","access_level":"open_access","creator":"system","file_size":243458,"content_type":"application/pdf"}],"pubrep_id":"645","alternative_title":["LNCS"],"type":"conference","abstract":[{"lang":"eng","text":"In resource allocation games, selfish players share resources that are needed in order to fulfill their objectives. The cost of using a resource depends on the load on it. In the traditional setting, the players make their choices concurrently and in one-shot. That is, a strategy for a player is a subset of the resources. We introduce and study dynamic resource allocation games. In this setting, the game proceeds in phases. In each phase each player chooses one resource. A scheduler dictates the order in which the players proceed in a phase, possibly scheduling several players to proceed concurrently. The game ends when each player has collected a set of resources that fulfills his objective. The cost for each player then depends on this set as well as on the load on the resources in it – we consider both congestion and cost-sharing games. We argue that the dynamic setting is the suitable setting for many applications in practice. We study the stability of dynamic resource allocation games, where the appropriate notion of stability is that of subgame perfect equilibrium, study the inefficiency incurred due to selfish behavior, and also study problems that are particular to the dynamic setting, like constraints on the order in which resources can be chosen or the problem of finding a scheduler that achieves stability."}]},{"oa_version":"Published Version","file":[{"content_type":"application/pdf","file_size":634037,"creator":"dernst","access_level":"open_access","file_name":"2016_MolBiolEvol_Wielgoss.pdf","checksum":"47d9010690b6c5c17f2ac830cc63ac5c","date_updated":"2020-07-14T12:47:10Z","date_created":"2018-12-18T13:21:45Z","relation":"main_file","file_id":"5750"}],"pubrep_id":"587","intvolume":" 33","title":"Adaptation to parasites and costs of parasite resistance in mutator and nonmutator bacteria","status":"public","ddc":["576"],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","_id":"5749","issue":"3","abstract":[{"text":"Parasitism creates selection for resistance mechanisms in host populations and is hypothesized to promote increased host evolvability. However, the influence of these traits on host evolution when parasites are no longer present is unclear. We used experimental evolution and whole-genome sequencing of Escherichia coli to determine the effects of past and present exposure to parasitic viruses (phages) on the spread of mutator alleles, resistance, and bacterial competitive fitness. We found that mutator alleles spread rapidly during adaptation to any of four different phage species, and this pattern was even more pronounced with multiple phages present simultaneously. However, hypermutability did not detectably accelerate adaptation in the absence of phages and recovery of fitness costs associated with resistance. Several lineages evolved phage resistance through elevated mucoidy, and during subsequent evolution in phage-free conditions they rapidly reverted to nonmucoid, phage-susceptible phenotypes. Genome sequencing revealed that this phenotypic reversion was achieved by additional genetic changes rather than by genotypic reversion of the initial resistance mutations. Insertion sequence (IS) elements played a key role in both the acquisition of resistance and adaptation in the absence of parasites; unlike single nucleotide polymorphisms, IS insertions were not more frequent in mutator lineages. Our results provide a genetic explanation for rapid reversion of mucoidy, a phenotype observed in other bacterial species including human pathogens. Moreover, this demonstrates that the types of genetic change underlying adaptation to fitness costs, and consequently the impact of evolvability mechanisms such as increased point-mutation rates, depend critically on the mechanism of resistance.","lang":"eng"}],"type":"journal_article","date_published":"2016-03-01T00:00:00Z","page":"770-782","citation":{"ama":"Wielgoss S, Bergmiller T, Bischofberger AM, Hall AR. Adaptation to parasites and costs of parasite resistance in mutator and nonmutator bacteria. Molecular Biology and Evolution. 2016;33(3):770-782. doi:10.1093/molbev/msv270","ista":"Wielgoss S, Bergmiller T, Bischofberger AM, Hall AR. 2016. Adaptation to parasites and costs of parasite resistance in mutator and nonmutator bacteria. Molecular Biology and Evolution. 33(3), 770–782.","apa":"Wielgoss, S., Bergmiller, T., Bischofberger, A. M., & Hall, A. R. (2016). Adaptation to parasites and costs of parasite resistance in mutator and nonmutator bacteria. Molecular Biology and Evolution. Oxford University Press. https://doi.org/10.1093/molbev/msv270","ieee":"S. Wielgoss, T. Bergmiller, A. M. Bischofberger, and A. R. Hall, “Adaptation to parasites and costs of parasite resistance in mutator and nonmutator bacteria,” Molecular Biology and Evolution, vol. 33, no. 3. Oxford University Press, pp. 770–782, 2016.","mla":"Wielgoss, Sébastien, et al. “Adaptation to Parasites and Costs of Parasite Resistance in Mutator and Nonmutator Bacteria.” Molecular Biology and Evolution, vol. 33, no. 3, Oxford University Press, 2016, pp. 770–82, doi:10.1093/molbev/msv270.","short":"S. Wielgoss, T. Bergmiller, A.M. Bischofberger, A.R. Hall, Molecular Biology and Evolution 33 (2016) 770–782.","chicago":"Wielgoss, Sébastien, Tobias Bergmiller, Anna M. Bischofberger, and Alex R. Hall. “Adaptation to Parasites and Costs of Parasite Resistance in Mutator and Nonmutator Bacteria.” Molecular Biology and Evolution. Oxford University Press, 2016. https://doi.org/10.1093/molbev/msv270."},"publication":"Molecular Biology and Evolution","has_accepted_license":"1","article_processing_charge":"No","day":"01","scopus_import":"1","volume":33,"date_created":"2018-12-18T13:18:10Z","date_updated":"2023-09-05T13:46:05Z","related_material":{"record":[{"id":"9719","relation":"research_data","status":"public"}]},"author":[{"last_name":"Wielgoss","first_name":"Sébastien","full_name":"Wielgoss, Sébastien"},{"full_name":"Bergmiller, Tobias","id":"2C471CFA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-5396-4346","first_name":"Tobias","last_name":"Bergmiller"},{"first_name":"Anna M.","last_name":"Bischofberger","full_name":"Bischofberger, Anna M."},{"full_name":"Hall, Alex R.","last_name":"Hall","first_name":"Alex R."}],"department":[{"_id":"CaGu"}],"publisher":"Oxford University Press","publication_status":"published","pmid":1,"acknowledgement":"The authors thank three anonymous reviewers and the editor for helpful comments on the manuscript, as well as Dominique Schneider for feedback on an earlier draft, Jenna Gallie for lytic λ and Julien Capelle for T5 and T6. This work was supported by the Swiss National Science Foundation (PZ00P3_148255 to A.H.) and an EU Marie Curie PEOPLE Postdoctoral Fellowship for Career Development (FP7-PEOPLE-2012-IEF-331824 to S.W.).","year":"2016","file_date_updated":"2020-07-14T12:47:10Z","language":[{"iso":"eng"}],"doi":"10.1093/molbev/msv270","quality_controlled":"1","tmp":{"name":"Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nc/4.0/legalcode","image":"/images/cc_by_nc.png","short":"CC BY-NC (4.0)"},"oa":1,"external_id":{"pmid":["26609077"]},"publication_identifier":{"eissn":["1537-1719"],"issn":["0737-4038"]},"month":"03"},{"quality_controlled":"1","project":[{"_id":"25CD3DD2-B435-11E9-9278-68D0E5697425","grant_number":"604102","call_identifier":"FP7","name":"Localization of ion channels and receptors by two and three-dimensional immunoelectron microscopic approaches"}],"acknowledged_ssus":[{"_id":"EM-Fac"}],"language":[{"iso":"eng"}],"doi":"10.1007/978-1-4939-6352-2_12","month":"08","publication_identifier":{"eissn":["1611-3349"],"issn":["0302-9743"]},"publication_status":"published","department":[{"_id":"RySh"}],"publisher":"Springer","acknowledgement":"We thank Prof. Elek Molnár for providing us a pan-AMPAR anti-body used in Fig.2 and Dr. Ludek Lovicar for technical assistance in scanning electron microscope imaging. This work was supported by the European Union (HBP—Project Ref. 604102). ","year":"2016","date_created":"2018-12-11T11:50:06Z","date_updated":"2023-09-05T14:09:01Z","volume":1474,"author":[{"full_name":"Harada, Harumi","id":"2E55CDF2-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-7429-7896","first_name":"Harumi","last_name":"Harada"},{"full_name":"Shigemoto, Ryuichi","last_name":"Shigemoto","first_name":"Ryuichi","orcid":"0000-0001-8761-9444","id":"499F3ABC-F248-11E8-B48F-1D18A9856A87"}],"ec_funded":1,"publist_id":"6281","page":"203 - 216","publication":"High-Resolution Imaging of Cellular Proteins","citation":{"mla":"Harada, Harumi, and Ryuichi Shigemoto. “Immunogold Protein Localization on Grid-Glued Freeze-Fracture Replicas.” High-Resolution Imaging of Cellular Proteins, vol. 1474, Springer, 2016, pp. 203–16, doi:10.1007/978-1-4939-6352-2_12.","short":"H. Harada, R. Shigemoto, in:, High-Resolution Imaging of Cellular Proteins, Springer, 2016, pp. 203–216.","chicago":"Harada, Harumi, and Ryuichi Shigemoto. “Immunogold Protein Localization on Grid-Glued Freeze-Fracture Replicas.” In High-Resolution Imaging of Cellular Proteins, 1474:203–16. Springer, 2016. https://doi.org/10.1007/978-1-4939-6352-2_12.","ama":"Harada H, Shigemoto R. Immunogold protein localization on grid-glued freeze-fracture replicas. In: High-Resolution Imaging of Cellular Proteins. Vol 1474. Springer; 2016:203-216. doi:10.1007/978-1-4939-6352-2_12","ista":"Harada H, Shigemoto R. 2016.Immunogold protein localization on grid-glued freeze-fracture replicas. In: High-Resolution Imaging of Cellular Proteins. Methods in Molecular Biology, vol. 1474, 203–216.","ieee":"H. Harada and R. Shigemoto, “Immunogold protein localization on grid-glued freeze-fracture replicas,” in High-Resolution Imaging of Cellular Proteins, vol. 1474, Springer, 2016, pp. 203–216.","apa":"Harada, H., & Shigemoto, R. (2016). Immunogold protein localization on grid-glued freeze-fracture replicas. In High-Resolution Imaging of Cellular Proteins (Vol. 1474, pp. 203–216). Springer. https://doi.org/10.1007/978-1-4939-6352-2_12"},"date_published":"2016-08-12T00:00:00Z","day":"12","article_processing_charge":"No","title":"Immunogold protein localization on grid-glued freeze-fracture replicas","status":"public","intvolume":" 1474","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","_id":"1094","oa_version":"None","alternative_title":["Methods in Molecular Biology"],"type":"book_chapter","abstract":[{"lang":"eng","text":"Immunogold labeling of freeze-fracture replicas has recently been used for high-resolution visualization of protein localization in electron microscopy. This method has higher labeling efficiency than conventional immunogold methods for membrane molecules allowing precise quantitative measurements. However, one of the limitations of freeze-fracture replica immunolabeling is difficulty in keeping structural orientation and identifying labeled profiles in complex tissues like brain. The difficulty is partly due to fragmentation of freeze-fracture replica preparations during labeling procedures and limited morphological clues on the replica surface. To overcome these issues, we introduce here a grid-glued replica method combined with SEM observation. This method allows histological staining before dissolving the tissue and easy handling of replicas during immunogold labeling, and keeps the whole replica surface intact without fragmentation. The procedure described here is also useful for matched double-replica analysis allowing further identification of labeled profiles in corresponding P-face and E-face."}]},{"author":[{"full_name":"Acar, Hande","orcid":"0000-0003-1986-9753","id":"2DDF136A-F248-11E8-B48F-1D18A9856A87","last_name":"Acar","first_name":"Hande"}],"date_updated":"2023-09-07T11:42:26Z","date_created":"2018-12-11T11:50:16Z","year":"2016","acknowledgement":"This study was supported by European Research Council ERC CoG 2014 – EVOLHGT,\r\nunder the grant number 648440.\r\n\r\nIt is a pleasure to thank the many people who made this thesis possible.\r\nI would like to first thank my advisor, Jonathan Paul Bollback for providing guidance in\r\nall aspects of my life, encouragement, sound advice, and good teaching over the last six\r\nyears.\r\nI would also like to thank the members of my dissertation committee – Călin C. Guet\r\nand John F. Baines – not only for their time and guidance, but for their intellectual\r\ncontributions to my development as a scientist.\r\nI would like to thank Flavia Gama and Rodrigo Redondo who have taught me all the\r\nskills in the laboratory with their graciousness and friendship. Also special thanks to\r\nBollback group for their support and for providing a stimulating and fun environment:\r\nIsabella Tomanek, Fabienne Jesse, Claudia Igler, and Pavel Payne.\r\nJerneja Beslagic is not only an amazing assistant, she also has a smile brighter and\r\nwarmer than the sunshine, bringing happiness to every moment. Always keep your light\r\nNeja, I will miss our invaluable chatters a lot.","publication_status":"published","department":[{"_id":"JoBo"}],"publisher":"Institute of Science and Technology Austria","file_date_updated":"2021-02-22T11:51:13Z","publist_id":"6239","ec_funded":1,"supervisor":[{"full_name":"Bollback, Jonathan P","id":"2C6FA9CC-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4624-4612","first_name":"Jonathan P","last_name":"Bollback"}],"degree_awarded":"PhD","language":[{"iso":"eng"}],"oa":1,"project":[{"grant_number":"648440","_id":"2578D616-B435-11E9-9278-68D0E5697425","call_identifier":"H2020","name":"Selective Barriers to Horizontal Gene Transfer"}],"month":"12","publication_identifier":{"issn":["2663-337X"]},"oa_version":"Published Version","file":[{"relation":"main_file","file_id":"6814","date_updated":"2019-08-13T11:17:50Z","date_created":"2019-08-13T11:17:50Z","checksum":"94bbbc754c36115bf37f8fc11fad43c4","file_name":"PhDThesis_HandeAcar_1230.pdf","access_level":"closed","content_type":"application/pdf","file_size":3682711,"creator":"dernst"},{"success":1,"checksum":"94bbbc754c36115bf37f8fc11fad43c4","date_updated":"2021-02-22T11:51:13Z","date_created":"2021-02-22T11:51:13Z","file_id":"9184","relation":"main_file","creator":"dernst","content_type":"application/pdf","file_size":3682711,"access_level":"open_access","file_name":"2016_Thesis_HandeAcar.pdf"}],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","_id":"1121","title":"Selective barriers to horizontal gene transfer","ddc":["570"],"status":"public","abstract":[{"lang":"eng","text":"Horizontal gene transfer (HGT), the lateral acquisition of genes across existing species\r\nboundaries, is a major evolutionary force shaping microbial genomes that facilitates\r\nadaptation to new environments as well as resistance to antimicrobial drugs. As such,\r\nunderstanding the mechanisms and constraints that determine the outcomes of HGT\r\nevents is crucial to understand the dynamics of HGT and to design better strategies to\r\novercome the challenges that originate from it.\r\nFollowing the insertion and expression of a newly transferred gene, the success of an\r\nHGT event will depend on the fitness effect it has on the recipient (host) cell. Therefore,\r\npredicting the impact of HGT on the genetic composition of a population critically\r\ndepends on the distribution of fitness effects (DFE) of horizontally transferred genes.\r\nHowever, to date, we have little knowledge of the DFE of newly transferred genes, and\r\nhence little is known about the shape and scale of this distribution.\r\nIt is particularly important to better understand the selective barriers that determine\r\nthe fitness effects of newly transferred genes. In spite of substantial bioinformatics\r\nefforts to identify horizontally transferred genes and selective barriers, a systematic\r\nexperimental approach to elucidate the roles of different selective barriers in defining\r\nthe fate of a transfer event has largely been absent. Similarly, although the fact that\r\nenvironment might alter the fitness effect of a horizontally transferred gene may seem\r\nobvious, little attention has been given to it in a systematic experimental manner.\r\nIn this study, we developed a systematic experimental approach that consists of\r\ntransferring 44 arbitrarily selected Salmonella typhimurium orthologous genes into an\r\nEscherichia coli host, and estimating the fitness effects of these transferred genes at a\r\nconstant expression level by performing competition assays against the wild type.\r\nIn chapter 2, we performed one-to-one competition assays between a mutant strain\r\ncarrying a transferred gene and the wild type strain. By using flow cytometry we\r\nestimated selection coefficients for the transferred genes with a precision level of 10-3,and obtained the DFE of horizontally transferred genes. We then investigated if these\r\nfitness effects could be predicted by any of the intrinsic properties of the genes, namely,\r\nfunctional category, degree of complexity (protein-protein interactions), GC content,\r\ncodon usage and length. Our analyses revealed that the functional category and length\r\nof the genes act as potential selective barriers. Finally, using the same procedure with\r\nthe endogenous E. coli orthologs of these 44 genes, we demonstrated that gene dosage is\r\nthe most prominent selective barrier to HGT.\r\nIn chapter 3, using the same set of genes we investigated the role of environment on the\r\nsuccess of HGT events. Under six different environments with different levels of stress\r\nwe performed more complex competition assays, where we mixed all 44 mutant strains\r\ncarrying transferred genes with the wild type strain. To estimate the fitness effects of\r\ngenes relative to wild type we used next generation sequencing. We found that the DFEs\r\nof horizontally transferred genes are highly dependent on the environment, with\r\nabundant gene–by-environment interactions. Furthermore, we demonstrated a\r\nrelationship between average fitness effect of a gene across all environments and its\r\nenvironmental variance, and thus its predictability. Finally, in spite of the fitness effects\r\nof genes being highly environment-dependent, we still observed a common shape of\r\nDFEs across all tested environments."}],"type":"dissertation","alternative_title":["ISTA Thesis"],"date_published":"2016-12-01T00:00:00Z","citation":{"ama":"Acar H. Selective barriers to horizontal gene transfer. 2016.","ieee":"H. Acar, “Selective barriers to horizontal gene transfer,” Institute of Science and Technology Austria, 2016.","apa":"Acar, H. (2016). Selective barriers to horizontal gene transfer. Institute of Science and Technology Austria.","ista":"Acar H. 2016. Selective barriers to horizontal gene transfer. Institute of Science and Technology Austria.","short":"H. Acar, Selective Barriers to Horizontal Gene Transfer, Institute of Science and Technology Austria, 2016.","mla":"Acar, Hande. Selective Barriers to Horizontal Gene Transfer. Institute of Science and Technology Austria, 2016.","chicago":"Acar, Hande. “Selective Barriers to Horizontal Gene Transfer.” Institute of Science and Technology Austria, 2016."},"page":"75","day":"01","article_processing_charge":"No","has_accepted_license":"1"},{"month":"01","doi":"10.1016/j.aim.2015.10.004","language":[{"iso":"eng"}],"oa":1,"tmp":{"name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","short":"CC BY-NC-ND (4.0)","image":"/images/cc_by_nc_nd.png"},"project":[{"name":"Topological Complex Systems","call_identifier":"FP7","_id":"255D761E-B435-11E9-9278-68D0E5697425","grant_number":"318493"}],"quality_controlled":"1","ec_funded":1,"publist_id":"5488","file_date_updated":"2020-07-14T12:45:10Z","related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"1399"}]},"author":[{"full_name":"Edelsbrunner, Herbert","id":"3FB178DA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9823-6833","first_name":"Herbert","last_name":"Edelsbrunner"},{"last_name":"Pausinger","first_name":"Florian","orcid":"0000-0002-8379-3768","id":"2A77D7A2-F248-11E8-B48F-1D18A9856A87","full_name":"Pausinger, Florian"}],"volume":287,"date_created":"2018-12-11T11:53:20Z","date_updated":"2023-09-07T11:41:25Z","acknowledgement":"This research is partially supported by the Toposys project FP7-ICT-318493-STREP, and by ESF under the ACAT Research Network Programme.\r\nBoth authors thank Anne Marie Svane for her comments on an early version of this paper. The second author wishes to thank Eva B. Vedel Jensen and Markus Kiderlen from Aarhus University for enlightening discussions and their kind hospitality during a visit of their department in 2014.","year":"2016","publisher":"Academic Press","department":[{"_id":"HeEd"}],"publication_status":"published","has_accepted_license":"1","day":"10","scopus_import":1,"date_published":"2016-01-10T00:00:00Z","citation":{"ieee":"H. Edelsbrunner and F. Pausinger, “Approximation and convergence of the intrinsic volume,” Advances in Mathematics, vol. 287. Academic Press, pp. 674–703, 2016.","apa":"Edelsbrunner, H., & Pausinger, F. (2016). Approximation and convergence of the intrinsic volume. Advances in Mathematics. Academic Press. https://doi.org/10.1016/j.aim.2015.10.004","ista":"Edelsbrunner H, Pausinger F. 2016. Approximation and convergence of the intrinsic volume. Advances in Mathematics. 287, 674–703.","ama":"Edelsbrunner H, Pausinger F. Approximation and convergence of the intrinsic volume. Advances in Mathematics. 2016;287:674-703. doi:10.1016/j.aim.2015.10.004","chicago":"Edelsbrunner, Herbert, and Florian Pausinger. “Approximation and Convergence of the Intrinsic Volume.” Advances in Mathematics. Academic Press, 2016. https://doi.org/10.1016/j.aim.2015.10.004.","short":"H. Edelsbrunner, F. Pausinger, Advances in Mathematics 287 (2016) 674–703.","mla":"Edelsbrunner, Herbert, and Florian Pausinger. “Approximation and Convergence of the Intrinsic Volume.” Advances in Mathematics, vol. 287, Academic Press, 2016, pp. 674–703, doi:10.1016/j.aim.2015.10.004."},"publication":"Advances in Mathematics","page":"674 - 703","abstract":[{"text":"We introduce a modification of the classic notion of intrinsic volume using persistence moments of height functions. Evaluating the modified first intrinsic volume on digital approximations of a compact body with smoothly embedded boundary in Rn, we prove convergence to the first intrinsic volume of the body as the resolution of the approximation improves. We have weaker results for the other modified intrinsic volumes, proving they converge to the corresponding intrinsic volumes of the n-dimensional unit ball.","lang":"eng"}],"type":"journal_article","pubrep_id":"774","oa_version":"Published Version","file":[{"access_level":"open_access","file_name":"IST-2017-774-v1+1_2016-J-03-FirstIntVolume.pdf","content_type":"application/pdf","file_size":248985,"creator":"system","relation":"main_file","file_id":"4928","checksum":"f8869ec110c35c852ef6a37425374af7","date_created":"2018-12-12T10:12:10Z","date_updated":"2020-07-14T12:45:10Z"}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1662","intvolume":" 287","ddc":["004"],"status":"public","title":"Approximation and convergence of the intrinsic volume"},{"publication_identifier":{"issn":["2663-337X"]},"month":"08","language":[{"iso":"eng"}],"supervisor":[{"orcid":"0000-0002-6699-1455","id":"3D494DCA-F248-11E8-B48F-1D18A9856A87","last_name":"Tkacik","first_name":"Gasper","full_name":"Tkacik, Gasper"}],"degree_awarded":"PhD","oa":1,"publist_id":"6232","file_date_updated":"2020-09-21T11:30:40Z","author":[{"full_name":"Rieckh, Georg","id":"34DA8BD6-F248-11E8-B48F-1D18A9856A87","first_name":"Georg","last_name":"Rieckh"}],"date_updated":"2023-09-07T11:44:34Z","date_created":"2018-12-11T11:50:18Z","year":"2016","publisher":"Institute of Science and Technology Austria","department":[{"_id":"GaTk"}],"publication_status":"published","article_processing_charge":"No","has_accepted_license":"1","day":"01","date_published":"2016-08-01T00:00:00Z","citation":{"chicago":"Rieckh, Georg. “Studying the Complexities of Transcriptional Regulation.” Institute of Science and Technology Austria, 2016.","mla":"Rieckh, Georg. Studying the Complexities of Transcriptional Regulation. Institute of Science and Technology Austria, 2016.","short":"G. Rieckh, Studying the Complexities of Transcriptional Regulation, Institute of Science and Technology Austria, 2016.","ista":"Rieckh G. 2016. Studying the complexities of transcriptional regulation. Institute of Science and Technology Austria.","ieee":"G. Rieckh, “Studying the complexities of transcriptional regulation,” Institute of Science and Technology Austria, 2016.","apa":"Rieckh, G. (2016). Studying the complexities of transcriptional regulation. Institute of Science and Technology Austria.","ama":"Rieckh G. Studying the complexities of transcriptional regulation. 2016."},"page":"114","abstract":[{"text":"The process of gene expression is central to the modern understanding of how cellular systems\r\nfunction. In this process, a special kind of regulatory proteins, called transcription factors,\r\nare important to determine how much protein is produced from a given gene. As biological\r\ninformation is transmitted from transcription factor concentration to mRNA levels to amounts of\r\nprotein, various sources of noise arise and pose limits to the fidelity of intracellular signaling.\r\nThis thesis concerns itself with several aspects of stochastic gene expression: (i) the mathematical\r\ndescription of complex promoters responsible for the stochastic production of biomolecules,\r\n(ii) fundamental limits to information processing the cell faces due to the interference from multiple\r\nfluctuating signals, (iii) how the presence of gene expression noise influences the evolution\r\nof regulatory sequences, (iv) and tools for the experimental study of origins and consequences\r\nof cell-cell heterogeneity, including an application to bacterial stress response systems.","lang":"eng"}],"type":"dissertation","alternative_title":["ISTA Thesis"],"file":[{"file_id":"6815","relation":"main_file","checksum":"ec453918c3bf8e6f460fd1156ef7b493","date_created":"2019-08-13T11:46:25Z","date_updated":"2019-08-13T11:46:25Z","access_level":"closed","file_name":"Thesis_Georg_Rieckh_w_signature_page.pdf","creator":"dernst","file_size":2614660,"content_type":"application/pdf"},{"relation":"main_file","file_id":"8542","checksum":"51ae398166370d18fd22478b6365c4da","success":1,"date_updated":"2020-09-21T11:30:40Z","date_created":"2020-09-21T11:30:40Z","access_level":"open_access","file_name":"Thesis_Georg_Rieckh.pdf","file_size":6096178,"content_type":"application/pdf","creator":"dernst"}],"oa_version":"Published Version","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","_id":"1128","title":"Studying the complexities of transcriptional regulation","status":"public","ddc":["570"]},{"file_date_updated":"2021-02-22T11:42:06Z","publist_id":"6236","alternative_title":["ISTA Thesis"],"type":"dissertation","date_updated":"2023-09-07T11:43:03Z","date_created":"2018-12-11T11:50:17Z","oa_version":"Published Version","file":[{"relation":"main_file","file_id":"6812","checksum":"b439803ac0827cdddd56562a54e3b53b","date_updated":"2019-08-13T10:50:00Z","date_created":"2019-08-13T10:50:00Z","access_level":"closed","file_name":"MORRI_PhD_thesis_FINALPLUSSIGNATURES (2).pdf","content_type":"application/pdf","file_size":4785167,"creator":"dernst"},{"access_level":"open_access","file_name":"2016_MORRI_Thesis.pdf","content_type":"application/pdf","file_size":4495669,"creator":"dernst","relation":"main_file","file_id":"9180","checksum":"dd4136247fe472e7d47880ec68ac8de0","success":1,"date_updated":"2021-02-22T11:42:06Z","date_created":"2021-02-22T11:42:06Z"}],"author":[{"id":"4863116E-F248-11E8-B48F-1D18A9856A87","last_name":"Morri","first_name":"Maurizio","full_name":"Morri, Maurizio"}],"title":"Optical functionalization of human class A orphan G-protein coupled receptors","ddc":["570"],"publication_status":"published","status":"public","publisher":"Institute of Science and Technology Austria","department":[{"_id":"HaJa"}],"_id":"1124","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","year":"2016","month":"03","day":"01","has_accepted_license":"1","article_processing_charge":"No","publication_identifier":{"issn":["2663-337X"]},"degree_awarded":"PhD","supervisor":[{"last_name":"Janovjak","first_name":"Harald L","orcid":"0000-0002-8023-9315","id":"33BA6C30-F248-11E8-B48F-1D18A9856A87","full_name":"Janovjak, Harald L"}],"language":[{"iso":"eng"}],"date_published":"2016-03-01T00:00:00Z","page":"129","oa":1,"citation":{"chicago":"Morri, Maurizio. “Optical Functionalization of Human Class A Orphan G-Protein Coupled Receptors.” Institute of Science and Technology Austria, 2016.","mla":"Morri, Maurizio. Optical Functionalization of Human Class A Orphan G-Protein Coupled Receptors. Institute of Science and Technology Austria, 2016.","short":"M. Morri, Optical Functionalization of Human Class A Orphan G-Protein Coupled Receptors, Institute of Science and Technology Austria, 2016.","ista":"Morri M. 2016. Optical functionalization of human class A orphan G-protein coupled receptors. Institute of Science and Technology Austria.","ieee":"M. Morri, “Optical functionalization of human class A orphan G-protein coupled receptors,” Institute of Science and Technology Austria, 2016.","apa":"Morri, M. (2016). Optical functionalization of human class A orphan G-protein coupled receptors. Institute of Science and Technology Austria.","ama":"Morri M. Optical functionalization of human class A orphan G-protein coupled receptors. 2016."}},{"oa_version":"Published Version","file":[{"date_updated":"2019-08-13T10:55:35Z","date_created":"2019-08-13T10:55:35Z","checksum":"e3cd6b28f9c5cccb8891855565a2dade","file_id":"6813","relation":"main_file","creator":"dernst","content_type":"application/pdf","file_size":32044069,"file_name":"Thesis_JSchwarz_final.pdf","access_level":"closed"},{"file_size":8396717,"content_type":"application/pdf","creator":"dernst","file_name":"2016_Thesis_JSchwarz.pdf","access_level":"open_access","date_updated":"2021-02-22T11:43:14Z","date_created":"2021-02-22T11:43:14Z","checksum":"c3dbe219acf87eed2f46d21d5cca00de","success":1,"relation":"main_file","file_id":"9181"}],"status":"public","ddc":["570"],"title":"Quantitative analysis of haptotactic cell migration","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","_id":"1129","abstract":[{"lang":"eng","text":"Directed cell migration is a hallmark feature, present in almost all multi-cellular\r\norganisms. Despite its importance, basic questions regarding force transduction\r\nor directional sensing are still heavily investigated. Directed migration of cells\r\nguided by immobilized guidance cues - haptotaxis - occurs in key-processes,\r\nsuch as embryonic development and immunity (Middleton et al., 1997; Nguyen\r\net al., 2000; Thiery, 1984; Weber et al., 2013). Immobilized guidance cues\r\ncomprise adhesive ligands, such as collagen and fibronectin (Barczyk et al.,\r\n2009), or chemokines - the main guidance cues for migratory leukocytes\r\n(Middleton et al., 1997; Weber et al., 2013). While adhesive ligands serve as\r\nattachment sites guiding cell migration (Carter, 1965), chemokines instruct\r\nhaptotactic migration by inducing adhesion to adhesive ligands and directional\r\nguidance (Rot and Andrian, 2004; Schumann et al., 2010). Quantitative analysis\r\nof the cellular response to immobilized guidance cues requires in vitro assays\r\nthat foster cell migration, offer accurate control of the immobilized cues on a\r\nsubcellular scale and in the ideal case closely reproduce in vivo conditions. The\r\nexploration of haptotactic cell migration through design and employment of such\r\nassays represents the main focus of this work.\r\nDendritic cells (DCs) are leukocytes, which after encountering danger\r\nsignals such as pathogens in peripheral organs instruct naïve T-cells and\r\nconsequently the adaptive immune response in the lymph node (Mellman and\r\nSteinman, 2001). To reach the lymph node from the periphery, DCs follow\r\nhaptotactic gradients of the chemokine CCL21 towards lymphatic vessels\r\n(Weber et al., 2013). Questions about how DCs interpret haptotactic CCL21\r\ngradients have not yet been addressed. The main reason for this is the lack of\r\nan assay that offers diverse haptotactic environments, hence allowing the study\r\nof DC migration as a response to different signals of immobilized guidance cue.\r\nIn this work, we developed an in vitro assay that enables us to\r\nquantitatively assess DC haptotaxis, by combining precisely controllable\r\nchemokine photo-patterning with physically confining migration conditions. With this tool at hand, we studied the influence of CCL21 gradient properties and\r\nconcentration on DC haptotaxis. We found that haptotactic gradient sensing\r\ndepends on the absolute CCL21 concentration in combination with the local\r\nsteepness of the gradient. Our analysis suggests that the directionality of\r\nmigrating DCs is governed by the signal-to-noise ratio of CCL21 binding to its\r\nreceptor CCR7. Moreover, the haptotactic CCL21 gradient formed in vivo\r\nprovides an optimal shape for DCs to recognize haptotactic guidance cue.\r\nBy reconstitution of the CCL21 gradient in vitro we were also able to\r\nstudy the influence of CCR7 signal termination on DC haptotaxis. To this end,\r\nwe used DCs lacking the G-protein coupled receptor kinase GRK6, which is\r\nresponsible for CCL21 induced CCR7 receptor phosphorylation and\r\ndesensitization (Zidar et al., 2009). We found that CCR7 desensitization by\r\nGRK6 is crucial for maintenance of haptotactic CCL21 gradient sensing in vitro\r\nand confirm those observations in vivo.\r\nIn the context of the organism, immobilized haptotactic guidance cues\r\noften coincide and compete with soluble chemotactic guidance cues. During\r\nwound healing, fibroblasts are exposed and influenced by adhesive cues and\r\nsoluble factors at the same time (Wu et al., 2012; Wynn, 2008). Similarly,\r\nmigrating DCs are exposed to both, soluble chemokines (CCL19 and truncated\r\nCCL21) inducing chemotactic behavior as well as the immobilized CCL21. To\r\nquantitatively assess these complex coinciding immobilized and soluble\r\nguidance cues, we implemented our chemokine photo-patterning technique in a\r\nmicrofluidic system allowing for chemotactic gradient generation. To validate\r\nthe assay, we observed DC migration in competing CCL19/CCL21\r\nenvironments.\r\nAdhesiveness guided haptotaxis has been studied intensively over the\r\nlast century. However, quantitative studies leading to conceptual models are\r\nlargely missing, again due to the lack of a precisely controllable in vitro assay. A\r\nrequirement for such an in vitro assay is that it must prevent any uncontrolled\r\ncell adhesion. This can be accomplished by stable passivation of the surface. In\r\naddition, controlled adhesion must be sustainable, quantifiable and dose\r\ndependent in order to create homogenous gradients. Therefore, we developed a novel covalent photo-patterning technique satisfying all these needs. In\r\ncombination with a sustainable poly-vinyl alcohol (PVA) surface coating we\r\nwere able to generate gradients of adhesive cue to direct cell migration. This\r\napproach allowed us to characterize the haptotactic migratory behavior of\r\nzebrafish keratocytes in vitro. Furthermore, defined patterns of adhesive cue\r\nallowed us to control for cell shape and growth on a subcellular scale."}],"alternative_title":["ISTA Thesis"],"type":"dissertation","date_published":"2016-07-01T00:00:00Z","page":"178","citation":{"short":"J. Schwarz, Quantitative Analysis of Haptotactic Cell Migration, Institute of Science and Technology Austria, 2016.","mla":"Schwarz, Jan. Quantitative Analysis of Haptotactic Cell Migration. Institute of Science and Technology Austria, 2016.","chicago":"Schwarz, Jan. “Quantitative Analysis of Haptotactic Cell Migration.” Institute of Science and Technology Austria, 2016.","ama":"Schwarz J. Quantitative analysis of haptotactic cell migration. 2016.","apa":"Schwarz, J. (2016). Quantitative analysis of haptotactic cell migration. Institute of Science and Technology Austria.","ieee":"J. Schwarz, “Quantitative analysis of haptotactic cell migration,” Institute of Science and Technology Austria, 2016.","ista":"Schwarz J. 2016. Quantitative analysis of haptotactic cell migration. Institute of Science and Technology Austria."},"has_accepted_license":"1","article_processing_charge":"No","day":"01","date_updated":"2023-09-07T11:54:33Z","date_created":"2018-12-11T11:50:18Z","author":[{"first_name":"Jan","last_name":"Schwarz","id":"346C1EC6-F248-11E8-B48F-1D18A9856A87","full_name":"Schwarz, Jan"}],"publisher":"Institute of Science and Technology Austria","department":[{"_id":"MiSi"}],"publication_status":"published","acknowledgement":"First, I would like to thank Michael Sixt for being a great supervisor, mentor and\r\nscientist. I highly appreciate his guidance and continued support. Furthermore, I\r\nam very grateful that he gave me the exceptional opportunity to pursue many\r\nideas of which some managed to be included in this thesis.\r\nI owe sincere thanks to the members of my PhD thesis committee, Daria\r\nSiekhaus, Daniel Legler and Harald Janovjak. Especially I would like to thank\r\nDaria for her advice and encouragement during our regular progress meetings.\r\nI also want to thank the team and fellows of the Boehringer Ingelheim Fond\r\n(BIF) PhD Fellowship for amazing and inspiring meetings and the BIF for\r\nfinancial support.\r\nImportant factors for the success of this thesis were the warm, creative\r\nand helpful atmosphere as well as the team spirit of the whole Sixt Lab.\r\nTherefore I would like to thank my current and former colleagues Frank Assen,\r\nMarkus Brown, Ingrid de Vries, Michelle Duggan, Alexander Eichner, Miroslav\r\nHons, Eva Kiermaier, Aglaja Kopf, Alexander Leithner, Christine Moussion, Jan\r\nMüller, Maria Nemethova, Jörg Renkawitz, Anne Reversat, Kari Vaahtomeri,\r\nMichele Weber and Stefan Wieser. We had an amazing time with many\r\nlegendary evenings and events. Along these lines I want to thank the in vitro\r\ncrew of the lab, Jörg, Anne and Alex, for lots of ideas and productive\r\ndiscussions. I am sure, some day we will reveal the secret of the ‘splodge’.\r\nI want to thank the members of the Heisenberg Lab for a great time and\r\nthrilling kicker matches. In this regard I especially want to thank Maurizio\r\n‘Gnocci’ Monti, Gabriel Krens, Alex Eichner, Martin Behrndt, Vanessa Barone,Philipp Schmalhorst, Michael Smutny, Daniel Capek, Anne Reversat, Eva\r\nKiermaier, Frank Assen and Jan Müller for wonderful after-lunch matches.\r\nI would not have been able to analyze the thousands of cell trajectories\r\nand probably hundreds of thousands of mouse clicks without the productive\r\ncollaboration with Veronika Bierbaum and Tobias Bollenbach. Thanks Vroni for\r\ncountless meetings, discussions and graphs and of course for proofreading and\r\nadvice for this thesis. For proofreading I also want to thank Evi, Jörg, Jack and\r\nAnne.\r\nI would like to acknowledge Matthias Mehling for a very productive\r\ncollaboration and for introducing me into the wild world of microfluidics. Jack\r\nMerrin, for countless wafers, PDMS coated coverslips and help with anything\r\nmicro-fabrication related. And Maria Nemethova for establishing the ‘click’\r\npatterning approach with me. Without her it still would be just one of the ideas…\r\nMany thanks to Ekaterina Papusheva, Robert Hauschild, Doreen Milius\r\nand Nasser Darwish from the Bioimaging Facility as well as the Preclinical and\r\nthe Life Science facilities of IST Austria for excellent technical support. At this\r\npoint I especially want to thank Robert for countless image analyses and\r\ntechnical ideas. Always interested and creative he played an essential role in all\r\nof my projects.\r\nAdditionally I want to thank Ingrid and Gabby for welcoming me warmly\r\nwhen I first started at IST, for scientific and especially mental support in all\r\nthose years, countless coffee sessions and Heurigen evenings. #BioimagingFacility #LifeScienceFacility #PreClinicalFacility","year":"2016","publist_id":"6231","file_date_updated":"2021-02-22T11:43:14Z","language":[{"iso":"eng"}],"acknowledged_ssus":[{"_id":"Bio"},{"_id":"PreCl"},{"_id":"LifeSc"}],"degree_awarded":"PhD","supervisor":[{"orcid":"0000-0002-6620-9179","id":"41E9FBEA-F248-11E8-B48F-1D18A9856A87","last_name":"Sixt","first_name":"Michael K","full_name":"Sixt, Michael K"}],"oa":1,"publication_identifier":{"issn":["2663-337X"]},"month":"07"},{"date_published":"2016-11-01T00:00:00Z","citation":{"ama":"Pentina A. Theoretical foundations of multi-task lifelong learning. 2016. doi:10.15479/AT:ISTA:TH_776","ista":"Pentina A. 2016. Theoretical foundations of multi-task lifelong learning. Institute of Science and Technology Austria.","ieee":"A. Pentina, “Theoretical foundations of multi-task lifelong learning,” Institute of Science and Technology Austria, 2016.","apa":"Pentina, A. (2016). Theoretical foundations of multi-task lifelong learning. Institute of Science and Technology Austria. https://doi.org/10.15479/AT:ISTA:TH_776","mla":"Pentina, Anastasia. Theoretical Foundations of Multi-Task Lifelong Learning. Institute of Science and Technology Austria, 2016, doi:10.15479/AT:ISTA:TH_776.","short":"A. Pentina, Theoretical Foundations of Multi-Task Lifelong Learning, Institute of Science and Technology Austria, 2016.","chicago":"Pentina, Anastasia. “Theoretical Foundations of Multi-Task Lifelong Learning.” Institute of Science and Technology Austria, 2016. https://doi.org/10.15479/AT:ISTA:TH_776."},"page":"127","article_processing_charge":"No","has_accepted_license":"1","day":"01","pubrep_id":"776","oa_version":"Published Version","file":[{"content_type":"application/pdf","file_size":2140062,"creator":"system","access_level":"open_access","file_name":"IST-2017-776-v1+1_Pentina_Thesis_2016.pdf","date_updated":"2018-12-12T10:14:07Z","date_created":"2018-12-12T10:14:07Z","relation":"main_file","file_id":"5056"}],"_id":"1126","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","ddc":["006"],"status":"public","title":"Theoretical foundations of multi-task lifelong learning","abstract":[{"lang":"eng","text":"Traditionally machine learning has been focusing on the problem of solving a single\r\ntask in isolation. While being quite well understood, this approach disregards an\r\nimportant aspect of human learning: when facing a new problem, humans are able to\r\nexploit knowledge acquired from previously learned tasks. Intuitively, access to several\r\nproblems simultaneously or sequentially could also be advantageous for a machine\r\nlearning system, especially if these tasks are closely related. Indeed, results of many\r\nempirical studies have provided justification for this intuition. However, theoretical\r\njustifications of this idea are rather limited.\r\nThe focus of this thesis is to expand the understanding of potential benefits of information\r\ntransfer between several related learning problems. We provide theoretical\r\nanalysis for three scenarios of multi-task learning - multiple kernel learning, sequential\r\nlearning and active task selection. We also provide a PAC-Bayesian perspective on\r\nlifelong learning and investigate how the task generation process influences the generalization\r\nguarantees in this scenario. In addition, we show how some of the obtained\r\ntheoretical results can be used to derive principled multi-task and lifelong learning\r\nalgorithms and illustrate their performance on various synthetic and real-world datasets."}],"type":"dissertation","alternative_title":["ISTA Thesis"],"doi":"10.15479/AT:ISTA:TH_776","language":[{"iso":"eng"}],"degree_awarded":"PhD","supervisor":[{"first_name":"Christoph","last_name":"Lampert","id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-8622-7887","full_name":"Lampert, Christoph"}],"oa":1,"project":[{"call_identifier":"FP7","name":"Lifelong Learning of Visual Scene Understanding","grant_number":"308036","_id":"2532554C-B435-11E9-9278-68D0E5697425"}],"publication_identifier":{"issn":["2663-337X"]},"month":"11","author":[{"id":"42E87FC6-F248-11E8-B48F-1D18A9856A87","first_name":"Anastasia","last_name":"Pentina","full_name":"Pentina, Anastasia"}],"date_updated":"2023-09-07T11:52:03Z","date_created":"2018-12-11T11:50:17Z","year":"2016","acknowledgement":"First and foremost I would like to express my gratitude to my supervisor, Christoph\r\nLampert. Thank you for your patience in teaching me all aspects of doing research\r\n(including English grammar), for your trust in my capabilities and endless support. Thank\r\nyou for granting me freedom in my research and, at the same time, having time and\r\nhelping me cope with the consequences whenever I needed it. Thank you for creating\r\nan excellent atmosphere in the group, it was a great pleasure and honor to be a part of\r\nit. There could not have been a better and more inspiring adviser and mentor.\r\nI thank Shai Ben-David for welcoming me into his group at the University of Waterloo,\r\nfor inspiring discussions and support. It was a great pleasure to work together. I am\r\nalso thankful to Ruth Urner for hosting me at the Max-Planck Institute Tübingen, for the\r\nfruitful collaboration and for taking care of me during that not-so-sunny month of May.\r\nI thank Jan Maas for kindly joining my thesis committee despite the short notice and\r\nproviding me with insightful comments.\r\nI would like to thank my colleagues for their support, entertaining conversations and\r\nendless table soccer games we shared together: Georg, Jan, Amelie and Emilie, Michal\r\nand Alex, Alex K. and Alex Z., Thomas, Sameh, Vlad, Mayu, Nathaniel, Silvester, Neel,\r\nCsaba, Vladimir, Morten. Thank you, Mabel and Ram, for the wonderful time we spent\r\ntogether. I am thankful to Shrinu and Samira for taking care of me during my stay at the\r\nUniversity of Waterloo. Special thanks to Viktoriia for her never-ending optimism and for\r\nbeing so inspiring and supportive, especially at the beginning of my PhD journey.\r\nThanks to IST administration, in particular, Vlad and Elisabeth for shielding me from\r\nmost of the bureaucratic paperwork.\r\n\r\nThis dissertation would not have been possible without funding from the European\r\nResearch Council under the European Union's Seventh Framework Programme\r\n(FP7/2007-2013)/ERC grant agreement no 308036.","department":[{"_id":"ChLa"}],"publisher":"Institute of Science and Technology Austria","publication_status":"published","ec_funded":1,"publist_id":"6234","file_date_updated":"2018-12-12T10:14:07Z"},{"type":"dissertation","alternative_title":["ISTA Thesis"],"publist_id":"5810","abstract":[{"text":"We study partially observable Markov decision processes (POMDPs) with objectives used in verification and artificial intelligence. The qualitative analysis problem given a POMDP and an objective asks whether there is a strategy (policy) to ensure that the objective is satisfied almost surely (with probability 1), resp. with positive probability (with probability greater than 0). For POMDPs with limit-average payoff, where a reward value in the interval [0,1] is associated to every transition, and the payoff of an infinite path is the long-run average of the rewards, we consider two types of path constraints: (i) a quantitative limit-average constraint defines the set of paths where the payoff is at least a given threshold L1 = 1. Our main results for qualitative limit-average constraint under almost-sure winning are as follows: (i) the problem of deciding the existence of a finite-memory controller is EXPTIME-complete; and (ii) the problem of deciding the existence of an infinite-memory controller is undecidable. For quantitative limit-average constraints we show that the problem of deciding the existence of a finite-memory controller is undecidable. We present a prototype implementation of our EXPTIME algorithm. For POMDPs with w-regular conditions specified as parity objectives, while the qualitative analysis problems are known to be undecidable even for very special case of parity objectives, we establish decidability (with optimal complexity) of the qualitative analysis problems for POMDPs with parity objectives under finite-memory strategies. We establish optimal (exponential) memory bounds and EXPTIME-completeness of the qualitative analysis problems under finite-memory strategies for POMDPs with parity objectives. Based on our theoretical algorithms we also present a practical approach, where we design heuristics to deal with the exponential complexity, and have applied our implementation on a number of well-known POMDP examples for robotics applications. For POMDPs with a set of target states and an integer cost associated with every transition, we study the optimization objective that asks to minimize the expected total cost of reaching a state in the target set, while ensuring that the target set is reached almost surely. We show that for general integer costs approximating the optimal cost is undecidable. For positive costs, our results are as follows: (i) we establish matching lower and upper bounds for the optimal cost, both double and exponential in the POMDP state space size; (ii) we show that the problem of approximating the optimal cost is decidable and present approximation algorithms that extend existing algorithms for POMDPs with finite-horizon objectives. We show experimentally that it performs well in many examples of interest. We study more deeply the problem of almost-sure reachability, where given a set of target states, the question is to decide whether there is a strategy to ensure that the target set is reached almost surely. While in general the problem EXPTIME-complete, in many practical cases strategies with a small amount of memory suffice. Moreover, the existing solution to the problem is explicit, which first requires to construct explicitly an exponential reduction to a belief-support MDP. We first study the existence of observation-stationary strategies, which is NP-complete, and then small-memory strategies. We present a symbolic algorithm by an efficient encoding to SAT and using a SAT solver for the problem. We report experimental results demonstrating the scalability of our symbolic (SAT-based) approach. Decentralized POMDPs (DEC-POMDPs) extend POMDPs to a multi-agent setting, where several agents operate in an uncertain environment independently to achieve a joint objective. In this work we consider Goal DEC-POMDPs, where given a set of target states, the objective is to ensure that the target set is reached with minimal cost. We consider the indefinite-horizon (infinite-horizon with either discounted-sum, or undiscounted-sum, where absorbing goal states have zero-cost) problem. We present a new and novel method to solve the problem that extends methods for finite-horizon DEC-POMDPs and the real-time dynamic programming approach for POMDPs. We present experimental results on several examples, and show that our approach presents promising results. In the end we present a short summary of a few other results related to verification of MDPs and POMDPs.","lang":"eng"}],"_id":"1397","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","year":"2016","publisher":"Institute of Science and Technology Austria","department":[{"_id":"KrCh"}],"publication_status":"published","title":"Algorithms for partially observable markov decision processes","status":"public","author":[{"full_name":"Chmelik, Martin","id":"3624234E-F248-11E8-B48F-1D18A9856A87","first_name":"Martin","last_name":"Chmelik"}],"oa_version":"None","date_updated":"2023-09-07T11:54:58Z","date_created":"2018-12-11T11:51:47Z","publication_identifier":{"issn":["2663-337X"]},"article_processing_charge":"No","day":"01","month":"02","citation":{"ista":"Chmelik M. 2016. Algorithms for partially observable markov decision processes. Institute of Science and Technology Austria.","ieee":"M. Chmelik, “Algorithms for partially observable markov decision processes,” Institute of Science and Technology Austria, 2016.","apa":"Chmelik, M. (2016). Algorithms for partially observable markov decision processes. Institute of Science and Technology Austria.","ama":"Chmelik M. Algorithms for partially observable markov decision processes. 2016.","chicago":"Chmelik, Martin. “Algorithms for Partially Observable Markov Decision Processes.” Institute of Science and Technology Austria, 2016.","mla":"Chmelik, Martin. Algorithms for Partially Observable Markov Decision Processes. Institute of Science and Technology Austria, 2016.","short":"M. Chmelik, Algorithms for Partially Observable Markov Decision Processes, Institute of Science and Technology Austria, 2016."},"page":"232","date_published":"2016-02-01T00:00:00Z","language":[{"iso":"eng"}],"supervisor":[{"full_name":"Chatterjee, Krishnendu","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","last_name":"Chatterjee","first_name":"Krishnendu"}],"degree_awarded":"PhD"},{"file_date_updated":"2021-02-22T11:36:34Z","publist_id":"6237","acknowledgement":"Foremost, I would like to thank Uli Wagner for introducing me to the exciting interface between\r\ntopology and combinatorics, and for our subsequent years of fruitful collaboration.\r\nIn our creative endeavors to eliminate intersection points, we had the chance to be joined later\r\nby Sergey Avvakumov and Arkadiy Skopenkov, which led us to new surprises in dimension 12.\r\nMy stay at EPFL and IST Austria was made very agreeable thanks to all these wonderful\r\npeople: Cyril Becker, Marek Filakovsky, Peter Franek, Radoslav Fulek, Peter Gazi, Kristof Huszar,\r\nMarek Krcal, Zuzana Masarova, Arnaud de Mesmay, Filip Moric, Michal Rybar, Martin Tancer,\r\nand Stephan Zhechev.\r\nFinally, I would like to thank my thesis committee Herbert Edelsbrunner and Roman Karasev\r\nfor their careful reading of the present manuscript and for the many improvements they suggested.","year":"2016","publication_status":"published","department":[{"_id":"UlWa"}],"publisher":"Institute of Science and Technology Austria","author":[{"id":"32BF9DAA-F248-11E8-B48F-1D18A9856A87","first_name":"Isaac","last_name":"Mabillard","full_name":"Mabillard, Isaac"}],"related_material":{"record":[{"status":"public","relation":"part_of_dissertation","id":"2159"}]},"date_created":"2018-12-11T11:50:16Z","date_updated":"2023-09-07T11:56:28Z","month":"08","publication_identifier":{"issn":["2663-337X"]},"oa":1,"degree_awarded":"PhD","supervisor":[{"last_name":"Wagner","first_name":"Uli","orcid":"0000-0002-1494-0568","id":"36690CA2-F248-11E8-B48F-1D18A9856A87","full_name":"Wagner, Uli"}],"language":[{"iso":"eng"}],"type":"dissertation","alternative_title":["ISTA Thesis"],"abstract":[{"text":"Motivated by topological Tverberg-type problems in topological combinatorics and by classical\r\nresults about embeddings (maps without double points), we study the question whether a finite\r\nsimplicial complex K can be mapped into Rd without triple, quadruple, or, more generally, r-fold points (image points with at least r distinct preimages), for a given multiplicity r ≤ 2. In particular, we are interested in maps f : K → Rd that have no global r -fold intersection points, i.e., no r -fold points with preimages in r pairwise disjoint simplices of K , and we seek necessary and sufficient conditions for the existence of such maps.\r\n\r\nWe present higher-multiplicity analogues of several classical results for embeddings, in particular of the completeness of the Van Kampen obstruction for embeddability of k -dimensional\r\ncomplexes into R2k , k ≥ 3. Speciffically, we show that under suitable restrictions on the dimensions(viz., if dimK = (r ≥ 1)k and d = rk \\ for some k ≥ 3), a well-known deleted product criterion (DPC ) is not only necessary but also sufficient for the existence of maps without global r -fold points. Our main technical tool is a higher-multiplicity version of the classical Whitney trick , by which pairs of isolated r -fold points of opposite sign can be eliminated by local modiffications of the map, assuming codimension d – dimK ≥ 3.\r\n\r\nAn important guiding idea for our work was that suffciency of the DPC, together with an old\r\nresult of Özaydin's on the existence of equivariant maps, might yield an approach to disproving the remaining open cases of the the long-standing topological Tverberg conjecture , i.e., to construct maps from the N -simplex σN to Rd without r-Tverberg points when r not a prime power and\r\nN = (d + 1)(r – 1). Unfortunately, our proof of the sufficiency of the DPC requires codimension d – dimK ≥ 3, which is not satisfied for K = σN .\r\n\r\nIn 2015, Frick [16] found a very elegant way to overcome this \\codimension 3 obstacle" and\r\nto construct the first counterexamples to the topological Tverberg conjecture for all parameters(d; r ) with d ≥ 3r + 1 and r not a prime power, by a reduction1 to a suitable lower-dimensional skeleton, for which the codimension 3 restriction is satisfied and maps without r -Tverberg points exist by Özaydin's result and sufficiency of the DPC.\r\n\r\nIn this thesis, we present a different construction (which does not use the constraint method) that yields counterexamples for d ≥ 3r , r not a prime power. ","lang":"eng"}],"_id":"1123","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","title":"Eliminating higher-multiplicity intersections: an r-fold Whitney trick for the topological Tverberg conjecture","ddc":["500"],"status":"public","oa_version":"Published Version","file":[{"checksum":"2d140cc924cd1b764544906fc22684ef","date_created":"2019-08-13T08:45:27Z","date_updated":"2019-08-13T08:45:27Z","file_id":"6809","relation":"main_file","creator":"dernst","content_type":"application/pdf","file_size":2227916,"access_level":"closed","file_name":"Thesis_final version_Mabillard_w_signature_page.pdf"},{"access_level":"open_access","file_name":"2016_Mabillard_Thesis.pdf","file_size":2227916,"content_type":"application/pdf","creator":"dernst","relation":"main_file","file_id":"9178","checksum":"2d140cc924cd1b764544906fc22684ef","success":1,"date_created":"2021-02-22T11:36:34Z","date_updated":"2021-02-22T11:36:34Z"}],"day":"01","has_accepted_license":"1","article_processing_charge":"No","citation":{"short":"I. Mabillard, Eliminating Higher-Multiplicity Intersections: An r-Fold Whitney Trick for the Topological Tverberg Conjecture, Institute of Science and Technology Austria, 2016.","mla":"Mabillard, Isaac. Eliminating Higher-Multiplicity Intersections: An r-Fold Whitney Trick for the Topological Tverberg Conjecture. Institute of Science and Technology Austria, 2016.","chicago":"Mabillard, Isaac. “Eliminating Higher-Multiplicity Intersections: An r-Fold Whitney Trick for the Topological Tverberg Conjecture.” Institute of Science and Technology Austria, 2016.","ama":"Mabillard I. Eliminating higher-multiplicity intersections: an r-fold Whitney trick for the topological Tverberg conjecture. 2016.","apa":"Mabillard, I. (2016). Eliminating higher-multiplicity intersections: an r-fold Whitney trick for the topological Tverberg conjecture. Institute of Science and Technology Austria.","ieee":"I. Mabillard, “Eliminating higher-multiplicity intersections: an r-fold Whitney trick for the topological Tverberg conjecture,” Institute of Science and Technology Austria, 2016.","ista":"Mabillard I. 2016. Eliminating higher-multiplicity intersections: an r-fold Whitney trick for the topological Tverberg conjecture. Institute of Science and Technology Austria."},"page":"55","date_published":"2016-08-01T00:00:00Z"},{"year":"2016","acknowledgement":"We thank Jozsef Csicsvari and Nelson Spruston for critically reading the manuscript. We also thank A. Schlögl for programming, F. Marr for technical assistance and E. Kramberger for manuscript editing. ","publication_status":"published","publisher":"Nature Publishing Group","department":[{"_id":"PeJo"}],"author":[{"full_name":"Mishra, Rajiv Kumar","id":"46CB58F2-F248-11E8-B48F-1D18A9856A87","first_name":"Rajiv Kumar","last_name":"Mishra"},{"full_name":"Kim, Sooyun","last_name":"Kim","first_name":"Sooyun","id":"394AB1C8-F248-11E8-B48F-1D18A9856A87"},{"id":"30CC5506-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-2209-5242","first_name":"José","last_name":"Guzmán","full_name":"Guzmán, José"},{"full_name":"Jonas, Peter M","first_name":"Peter M","last_name":"Jonas","id":"353C1B58-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-5001-4804"}],"related_material":{"record":[{"relation":"dissertation_contains","status":"public","id":"1396"}]},"date_updated":"2023-09-07T11:55:25Z","date_created":"2018-12-11T11:51:59Z","volume":7,"article_number":"11552","file_date_updated":"2020-07-14T12:44:53Z","ec_funded":1,"publist_id":"5766","oa":1,"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"quality_controlled":"1","project":[{"_id":"25C26B1E-B435-11E9-9278-68D0E5697425","grant_number":"P24909-B24","name":"Mechanisms of transmitter release at GABAergic synapses","call_identifier":"FWF"},{"call_identifier":"FP7","name":"Nanophysiology of fast-spiking, parvalbumin-expressing GABAergic interneurons","grant_number":"268548","_id":"25C0F108-B435-11E9-9278-68D0E5697425"}],"doi":"10.1038/ncomms11552","language":[{"iso":"eng"}],"month":"05","_id":"1432","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","status":"public","title":"Symmetric spike timing-dependent plasticity at CA3–CA3 synapses optimizes storage and recall in autoassociative networks","ddc":["570"],"intvolume":" 7","pubrep_id":"582","oa_version":"Published Version","file":[{"checksum":"7e84d0392348c874d473b62f1042de22","date_updated":"2020-07-14T12:44:53Z","date_created":"2018-12-12T10:18:33Z","file_id":"5355","relation":"main_file","creator":"system","file_size":4510512,"content_type":"application/pdf","access_level":"open_access","file_name":"IST-2016-582-v1+1_ncomms11552.pdf"}],"type":"journal_article","abstract":[{"lang":"eng","text":"CA3–CA3 recurrent excitatory synapses are thought to play a key role in memory storage and pattern completion. Whether the plasticity properties of these synapses are consistent with their proposed network functions remains unclear. Here, we examine the properties of spike timing-dependent plasticity (STDP) at CA3–CA3 synapses. Low-frequency pairing of excitatory postsynaptic potentials (EPSPs) and action potentials (APs) induces long-term potentiation (LTP), independent of temporal order. The STDP curve is symmetric and broad (half-width ~150 ms). Consistent with these STDP induction properties, AP–EPSP sequences lead to supralinear summation of spine [Ca2+] transients. Furthermore, afterdepolarizations (ADPs) following APs efficiently propagate into dendrites of CA3 pyramidal neurons, and EPSPs summate with dendritic ADPs. In autoassociative network models, storage and recall are more robust with symmetric than with asymmetric STDP rules. Thus, a specialized STDP induction rule allows reliable storage and recall of information in the hippocampal CA3 network."}],"publication":"Nature Communications","citation":{"ieee":"R. K. Mishra, S. Kim, J. Guzmán, and P. M. Jonas, “Symmetric spike timing-dependent plasticity at CA3–CA3 synapses optimizes storage and recall in autoassociative networks,” Nature Communications, vol. 7. Nature Publishing Group, 2016.","apa":"Mishra, R. K., Kim, S., Guzmán, J., & Jonas, P. M. (2016). Symmetric spike timing-dependent plasticity at CA3–CA3 synapses optimizes storage and recall in autoassociative networks. Nature Communications. Nature Publishing Group. https://doi.org/10.1038/ncomms11552","ista":"Mishra RK, Kim S, Guzmán J, Jonas PM. 2016. Symmetric spike timing-dependent plasticity at CA3–CA3 synapses optimizes storage and recall in autoassociative networks. Nature Communications. 7, 11552.","ama":"Mishra RK, Kim S, Guzmán J, Jonas PM. Symmetric spike timing-dependent plasticity at CA3–CA3 synapses optimizes storage and recall in autoassociative networks. Nature Communications. 2016;7. doi:10.1038/ncomms11552","chicago":"Mishra, Rajiv Kumar, Sooyun Kim, José Guzmán, and Peter M Jonas. “Symmetric Spike Timing-Dependent Plasticity at CA3–CA3 Synapses Optimizes Storage and Recall in Autoassociative Networks.” Nature Communications. Nature Publishing Group, 2016. https://doi.org/10.1038/ncomms11552.","short":"R.K. Mishra, S. Kim, J. Guzmán, P.M. Jonas, Nature Communications 7 (2016).","mla":"Mishra, Rajiv Kumar, et al. “Symmetric Spike Timing-Dependent Plasticity at CA3–CA3 Synapses Optimizes Storage and Recall in Autoassociative Networks.” Nature Communications, vol. 7, 11552, Nature Publishing Group, 2016, doi:10.1038/ncomms11552."},"date_published":"2016-05-13T00:00:00Z","scopus_import":1,"day":"13","has_accepted_license":"1"},{"oa":1,"supervisor":[{"last_name":"Jonas","first_name":"Peter M","orcid":"0000-0001-5001-4804","id":"353C1B58-F248-11E8-B48F-1D18A9856A87","full_name":"Jonas, Peter M"}],"degree_awarded":"PhD","language":[{"iso":"eng"}],"month":"03","publication_identifier":{"issn":["2663-337X"]},"year":"2016","publication_status":"published","department":[{"_id":"PeJo"}],"publisher":"Institute of Science and Technology Austria","author":[{"full_name":"Mishra, Rajiv Kumar","last_name":"Mishra","first_name":"Rajiv Kumar","id":"46CB58F2-F248-11E8-B48F-1D18A9856A87"}],"related_material":{"record":[{"relation":"part_of_dissertation","status":"public","id":"1432"}]},"date_updated":"2023-09-07T11:55:26Z","date_created":"2018-12-11T11:51:46Z","file_date_updated":"2021-02-22T11:48:44Z","publist_id":"5811","citation":{"mla":"Mishra, Rajiv Kumar. Synaptic Plasticity Rules at CA3-CA3 Recurrent Synapses in Hippocampus. Institute of Science and Technology Austria, 2016.","short":"R.K. Mishra, Synaptic Plasticity Rules at CA3-CA3 Recurrent Synapses in Hippocampus, Institute of Science and Technology Austria, 2016.","chicago":"Mishra, Rajiv Kumar. “Synaptic Plasticity Rules at CA3-CA3 Recurrent Synapses in Hippocampus.” Institute of Science and Technology Austria, 2016.","ama":"Mishra RK. Synaptic plasticity rules at CA3-CA3 recurrent synapses in hippocampus. 2016.","ista":"Mishra RK. 2016. Synaptic plasticity rules at CA3-CA3 recurrent synapses in hippocampus. Institute of Science and Technology Austria.","ieee":"R. K. Mishra, “Synaptic plasticity rules at CA3-CA3 recurrent synapses in hippocampus,” Institute of Science and Technology Austria, 2016.","apa":"Mishra, R. K. (2016). Synaptic plasticity rules at CA3-CA3 recurrent synapses in hippocampus. Institute of Science and Technology Austria."},"page":"83","date_published":"2016-03-01T00:00:00Z","day":"01","article_processing_charge":"No","has_accepted_license":"1","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","_id":"1396","ddc":["570"],"status":"public","title":"Synaptic plasticity rules at CA3-CA3 recurrent synapses in hippocampus","file":[{"access_level":"closed","file_name":"Thesis_Mishra_Rajiv (Final).pdf","content_type":"application/pdf","file_size":2407572,"creator":"dernst","relation":"main_file","file_id":"6782","checksum":"5a010a838faf040f7064f3cfb802f743","date_created":"2019-08-09T12:14:46Z","date_updated":"2020-07-14T12:44:48Z"},{"date_created":"2021-02-22T11:48:44Z","date_updated":"2021-02-22T11:48:44Z","checksum":"81b26d9ede92c99f1d8cc6fa1d04cbbb","success":1,"relation":"main_file","file_id":"9183","file_size":2407572,"content_type":"application/pdf","creator":"dernst","file_name":"2016_RajivMishra_Thesis.pdf","access_level":"open_access"}],"oa_version":"Published Version","type":"dissertation","alternative_title":["ISTA Thesis"],"abstract":[{"text":"CA3 pyramidal neurons are thought to pay a key role in memory storage and pattern completion by activity-dependent synaptic plasticity between CA3-CA3 recurrent excitatory synapses. To examine the induction rules of synaptic plasticity at CA3-CA3 synapses, we performed whole-cell patch-clamp recordings in acute hippocampal slices from rats (postnatal 21-24 days) at room temperature. Compound excitatory postsynaptic potentials (ESPSs) were recorded by tract stimulation in stratum oriens in the presence of 10 µM gabazine. High-frequency stimulation (HFS) induced N-methyl-D-aspartate (NMDA) receptor-dependent long-term potentiation (LTP). Although LTP by HFS did not requier postsynaptic spikes, it was blocked by Na+-channel blockers suggesting that local active processes (e.g.) dendritic spikes) may contribute to LTP induction without requirement of a somatic action potential (AP). We next examined the properties of spike timing-dependent plasticity (STDP) at CA3-CA3 synapses. Unexpectedly, low-frequency pairing of EPSPs and backpropagated action potentialy (bAPs) induced LTP, independent of temporal order. The STDP curve was symmetric and broad, with a half-width of ~150 ms. Consistent with these specific STDP induction properties, post-presynaptic sequences led to a supralinear summation of spine [Ca2+] transients. Furthermore, in autoassociative network models, storage and recall was substantially more robust with symmetric than with asymmetric STDP rules. In conclusion, we found associative forms of LTP at CA3-CA3 recurrent collateral synapses with distinct induction rules. LTP induced by HFS may be associated with dendritic spikes. In contrast, low frequency pairing of pre- and postsynaptic activity induced LTP only if EPSP-AP were temporally very close. Together, these induction mechanisms of synaptiic plasticity may contribute to memory storage in the CA3-CA3 microcircuit at different ranges of activity.","lang":"eng"}]},{"publication_identifier":{"issn":["2663-337X"]},"month":"07","language":[{"iso":"eng"}],"supervisor":[{"full_name":"Barton, Nicholas H","id":"4880FE40-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8548-5240","first_name":"Nicholas H","last_name":"Barton"}],"degree_awarded":"PhD","oa":1,"publist_id":"6235","file_date_updated":"2021-02-22T13:42:47Z","related_material":{"record":[{"status":"public","relation":"part_of_dissertation","id":"2023"}]},"author":[{"id":"461468AE-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-2519-824X","first_name":"Sebastian","last_name":"Novak","full_name":"Novak, Sebastian"}],"date_created":"2018-12-11T11:50:17Z","date_updated":"2023-09-07T11:55:53Z","year":"2016","department":[{"_id":"NiBa"}],"publisher":"Institute of Science and Technology Austria","publication_status":"published","has_accepted_license":"1","article_processing_charge":"No","day":"01","date_published":"2016-07-01T00:00:00Z","citation":{"ama":"Novak S. Evolutionary proccesses in variable emvironments. 2016.","ista":"Novak S. 2016. Evolutionary proccesses in variable emvironments. Institute of Science and Technology Austria.","ieee":"S. Novak, “Evolutionary proccesses in variable emvironments,” Institute of Science and Technology Austria, 2016.","apa":"Novak, S. (2016). Evolutionary proccesses in variable emvironments. Institute of Science and Technology Austria.","mla":"Novak, Sebastian. Evolutionary Proccesses in Variable Emvironments. Institute of Science and Technology Austria, 2016.","short":"S. Novak, Evolutionary Proccesses in Variable Emvironments, Institute of Science and Technology Austria, 2016.","chicago":"Novak, Sebastian. “Evolutionary Proccesses in Variable Emvironments.” Institute of Science and Technology Austria, 2016."},"page":"124","abstract":[{"text":"Natural environments are never constant but subject to spatial and temporal change on\r\nall scales, increasingly so due to human activity. Hence, it is crucial to understand the\r\nimpact of environmental variation on evolutionary processes. In this thesis, I present\r\nthree topics that share the common theme of environmental variation, yet illustrate its\r\neffect from different perspectives.\r\nFirst, I show how a temporally fluctuating environment gives rise to second-order\r\nselection on a modifier for stress-induced mutagenesis. Without fluctuations, when\r\npopulations are adapted to their environment, mutation rates are minimized. I argue\r\nthat a stress-induced mutator mechanism may only be maintained if the population is\r\nrepeatedly subjected to diverse environmental challenges, and I outline implications of\r\nthe presented results to antibiotic treatment strategies.\r\nSecond, I discuss my work on the evolution of dispersal. Besides reproducing\r\nknown results about the effect of heterogeneous habitats on dispersal, it identifies\r\nspatial changes in dispersal type frequencies as a source for selection for increased\r\npropensities to disperse. This concept contains effects of relatedness that are known\r\nto promote dispersal, and I explain how it identifies other forces selecting for dispersal\r\nand puts them on a common scale.\r\nThird, I analyse genetic variances of phenotypic traits under multivariate stabilizing\r\nselection. For the case of constant environments, I generalize known formulae of\r\nequilibrium variances to multiple traits and discuss how the genetic variance of a focal\r\ntrait is influenced by selection on background traits. I conclude by presenting ideas and\r\npreliminary work aiming at including environmental fluctuations in the form of moving\r\ntrait optima into the model.","lang":"eng"}],"type":"dissertation","alternative_title":["ISTA Thesis"],"file":[{"date_created":"2019-08-13T09:01:00Z","date_updated":"2019-08-13T09:01:00Z","checksum":"81dcc838dfcf7aa0b1a27ecf4fe2da4e","file_id":"6811","relation":"main_file","creator":"dernst","file_size":3564901,"content_type":"application/pdf","file_name":"Novak_thesis.pdf","access_level":"closed"},{"access_level":"open_access","file_name":"2016_Novak_Thesis.pdf","content_type":"application/pdf","file_size":2814384,"creator":"dernst","relation":"main_file","file_id":"9186","checksum":"30808d2f7ca920e09f63a95cdc49bffd","success":1,"date_updated":"2021-02-22T13:42:47Z","date_created":"2021-02-22T13:42:47Z"}],"oa_version":"Published Version","_id":"1125","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","title":"Evolutionary proccesses in variable emvironments","status":"public","ddc":["576"]},{"_id":"1130","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","status":"public","ddc":["000"],"title":"Automatic synthesis of synchronisation primitives for concurrent programs","file":[{"date_created":"2021-02-22T11:39:32Z","date_updated":"2021-02-22T11:39:32Z","success":1,"checksum":"319a506831650327e85376db41fc1094","file_id":"9179","relation":"main_file","creator":"dernst","file_size":1523935,"content_type":"application/pdf","file_name":"2016_Tarrach_Thesis.pdf","access_level":"open_access"},{"file_name":"2016_Tarrach_Thesispdfa.pdf","access_level":"closed","content_type":"application/pdf","file_size":1306068,"creator":"cchlebak","relation":"main_file","file_id":"10296","date_updated":"2021-11-17T13:46:55Z","date_created":"2021-11-16T14:14:38Z","checksum":"39efcd789f0ad859ff15652cb7afc412"}],"oa_version":"Published Version","type":"dissertation","alternative_title":["ISTA Thesis"],"abstract":[{"lang":"eng","text":"In this thesis we present a computer-aided programming approach to concurrency. Our approach helps the programmer by automatically fixing concurrency-related bugs, i.e. bugs that occur when the program is executed using an aggressive preemptive scheduler, but not when using a non-preemptive (cooperative) scheduler. Bugs are program behaviours that are incorrect w.r.t. a specification. We consider both user-provided explicit specifications in the form of assertion\r\nstatements in the code as well as an implicit specification. The implicit specification is inferred from the non-preemptive behaviour. Let us consider sequences of calls that the program makes to an external interface. The implicit specification requires that any such sequence produced under a preemptive scheduler should be included in the set of sequences produced under a non-preemptive scheduler. We consider several semantics-preserving fixes that go beyond atomic sections typically explored in the synchronisation synthesis literature. Our synthesis is able to place locks, barriers and wait-signal statements and last, but not least reorder independent statements. The latter may be useful if a thread is released to early, e.g., before some initialisation is completed. We guarantee that our synthesis does not introduce deadlocks and that the synchronisation inserted is optimal w.r.t. a given objective function. We dub our solution trace-based synchronisation synthesis and it is loosely based on counterexample-guided inductive synthesis (CEGIS). The synthesis works by discovering a trace that is incorrect w.r.t. the specification and identifying ordering constraints crucial to trigger the specification violation. Synchronisation may be placed immediately (greedy approach) or delayed until all incorrect traces are found (non-greedy approach). For the non-greedy approach we construct a set of global constraints over synchronisation placements. Each model of the global constraints set corresponds to a correctness-ensuring synchronisation placement. The placement that is optimal w.r.t. the given objective function is chosen as the synchronisation solution. We evaluate our approach on a number of realistic (albeit simplified) Linux device-driver\r\nbenchmarks. The benchmarks are versions of the drivers with known concurrency-related bugs. For the experiments with an explicit specification we added assertions that would detect the bugs in the experiments. Device drivers lend themselves to implicit specification, where the device and the operating system are the external interfaces. Our experiments demonstrate that our synthesis method is precise and efficient. We implemented objective functions for coarse-grained and fine-grained locking and observed that different synchronisation placements are produced for our experiments, favouring e.g. a minimal number of synchronisation operations or maximum concurrency."}],"citation":{"ieee":"T. Tarrach, “Automatic synthesis of synchronisation primitives for concurrent programs,” Institute of Science and Technology Austria, 2016.","apa":"Tarrach, T. (2016). Automatic synthesis of synchronisation primitives for concurrent programs. Institute of Science and Technology Austria. https://doi.org/10.15479/at:ista:1130","ista":"Tarrach T. 2016. Automatic synthesis of synchronisation primitives for concurrent programs. Institute of Science and Technology Austria.","ama":"Tarrach T. Automatic synthesis of synchronisation primitives for concurrent programs. 2016. doi:10.15479/at:ista:1130","chicago":"Tarrach, Thorsten. “Automatic Synthesis of Synchronisation Primitives for Concurrent Programs.” Institute of Science and Technology Austria, 2016. https://doi.org/10.15479/at:ista:1130.","short":"T. Tarrach, Automatic Synthesis of Synchronisation Primitives for Concurrent Programs, Institute of Science and Technology Austria, 2016.","mla":"Tarrach, Thorsten. Automatic Synthesis of Synchronisation Primitives for Concurrent Programs. Institute of Science and Technology Austria, 2016, doi:10.15479/at:ista:1130."},"page":"151","date_published":"2016-07-07T00:00:00Z","day":"07","article_processing_charge":"No","has_accepted_license":"1","year":"2016","publication_status":"published","publisher":"Institute of Science and Technology Austria","department":[{"_id":"ToHe"},{"_id":"GradSch"}],"author":[{"full_name":"Tarrach, Thorsten","first_name":"Thorsten","last_name":"Tarrach","id":"3D6E8F2C-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-4409-8487"}],"related_material":{"record":[{"status":"public","relation":"part_of_dissertation","id":"1729"},{"status":"public","relation":"part_of_dissertation","id":"2218"},{"id":"2445","status":"public","relation":"part_of_dissertation"}]},"date_updated":"2023-09-07T11:57:01Z","date_created":"2018-12-11T11:50:19Z","file_date_updated":"2021-11-17T13:46:55Z","ec_funded":1,"publist_id":"6230","oa":1,"main_file_link":[{"url":"http://thorstent.github.io/theses/phd_thorsten_tarrach.pdf","open_access":"1"}],"project":[{"grant_number":"267989","_id":"25EE3708-B435-11E9-9278-68D0E5697425","name":"Quantitative Reactive Modeling","call_identifier":"FP7"},{"name":"Rigorous Systems Engineering","call_identifier":"FWF","_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23"},{"name":"The Wittgenstein Prize","call_identifier":"FWF","grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425"}],"doi":"10.15479/at:ista:1130","supervisor":[{"full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724","first_name":"Thomas A","last_name":"Henzinger"}],"degree_awarded":"PhD","language":[{"iso":"eng"}],"month":"07","publication_identifier":{"issn":["2663-337X"]}},{"has_accepted_license":"1","day":"01","scopus_import":1,"date_published":"2016-08-01T00:00:00Z","citation":{"chicago":"Daca, Przemyslaw, Thomas A Henzinger, Jan Kretinsky, and Tatjana Petrov. “Linear Distances between Markov Chains,” Vol. 59. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2016. https://doi.org/10.4230/LIPIcs.CONCUR.2016.20.","short":"P. Daca, T.A. Henzinger, J. Kretinsky, T. Petrov, in:, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2016.","mla":"Daca, Przemyslaw, et al. Linear Distances between Markov Chains. Vol. 59, 20, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2016, doi:10.4230/LIPIcs.CONCUR.2016.20.","apa":"Daca, P., Henzinger, T. A., Kretinsky, J., & Petrov, T. (2016). Linear distances between Markov chains (Vol. 59). Presented at the CONCUR: Concurrency Theory, Quebec City; Canada: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.CONCUR.2016.20","ieee":"P. Daca, T. A. Henzinger, J. Kretinsky, and T. Petrov, “Linear distances between Markov chains,” presented at the CONCUR: Concurrency Theory, Quebec City; Canada, 2016, vol. 59.","ista":"Daca P, Henzinger TA, Kretinsky J, Petrov T. 2016. Linear distances between Markov chains. CONCUR: Concurrency Theory, LIPIcs, vol. 59, 20.","ama":"Daca P, Henzinger TA, Kretinsky J, Petrov T. Linear distances between Markov chains. In: Vol 59. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2016. doi:10.4230/LIPIcs.CONCUR.2016.20"},"abstract":[{"lang":"eng","text":"We introduce a general class of distances (metrics) between Markov chains, which are based on linear behaviour. This class encompasses distances given topologically (such as the total variation distance or trace distance) as well as by temporal logics or automata. We investigate which of the distances can be approximated by observing the systems, i.e. by black-box testing or simulation, and we provide both negative and positive results. "}],"alternative_title":["LIPIcs"],"type":"conference","oa_version":"Published Version","file":[{"creator":"system","file_size":501827,"content_type":"application/pdf","file_name":"IST-2017-794-v1+1_LIPIcs-CONCUR-2016-20.pdf","access_level":"open_access","date_updated":"2018-12-12T10:11:39Z","date_created":"2018-12-12T10:11:39Z","file_id":"4895","relation":"main_file"}],"pubrep_id":"794","intvolume":" 59","ddc":["004"],"title":"Linear distances between Markov chains","status":"public","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1093","month":"08","language":[{"iso":"eng"}],"doi":"10.4230/LIPIcs.CONCUR.2016.20","conference":{"start_date":"2016-08-23","location":"Quebec City; Canada","end_date":"2016-08-26","name":"CONCUR: Concurrency Theory"},"project":[{"_id":"25EE3708-B435-11E9-9278-68D0E5697425","grant_number":"267989","call_identifier":"FP7","name":"Quantitative Reactive Modeling"},{"name":"Rigorous Systems Engineering","call_identifier":"FWF","_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23"},{"name":"The Wittgenstein Prize","call_identifier":"FWF","_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211"}],"quality_controlled":"1","oa":1,"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"ec_funded":1,"publist_id":"6283","file_date_updated":"2018-12-12T10:11:39Z","article_number":"20","volume":59,"date_created":"2018-12-11T11:50:06Z","date_updated":"2023-09-07T11:58:33Z","related_material":{"record":[{"id":"1155","relation":"dissertation_contains","status":"public"}]},"author":[{"full_name":"Daca, Przemyslaw","first_name":"Przemyslaw","last_name":"Daca","id":"49351290-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Henzinger","first_name":"Thomas A","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A"},{"first_name":"Jan","last_name":"Kretinsky","id":"44CEF464-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8122-2881","full_name":"Kretinsky, Jan"},{"orcid":"0000-0002-9041-0905","id":"3D5811FC-F248-11E8-B48F-1D18A9856A87","last_name":"Petrov","first_name":"Tatjana","full_name":"Petrov, Tatjana"}],"department":[{"_id":"ToHe"},{"_id":"KrCh"},{"_id":"CaGu"}],"publisher":"Schloss Dagstuhl - Leibniz-Zentrum für Informatik","publication_status":"published","year":"2016","acknowledgement":"This research was funded in part by the European Research Council (ERC) under grant agreement 267989\r\n(QUAREM), the Austrian Science Fund (FWF) under grants project S11402-N23 (RiSE and SHiNE)\r\nand Z211-N23 (Wittgenstein Award), by the Czech Science Foundation Grant No. P202/12/G061, and\r\nby the SNSF Advanced Postdoc. Mobility Fellowship – grant number P300P2_161067."},{"month":"01","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1504.05739"}],"oa":1,"project":[{"name":"Quantitative Reactive Modeling","call_identifier":"FP7","grant_number":"267989","_id":"25EE3708-B435-11E9-9278-68D0E5697425"},{"name":"Rigorous Systems Engineering","call_identifier":"FWF","grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425"},{"grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"The Wittgenstein Prize"},{"call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme","grant_number":"291734","_id":"25681D80-B435-11E9-9278-68D0E5697425"}],"quality_controlled":"1","doi":"10.1007/978-3-662-49674-9_7","conference":{"name":"TACAS: Tools and Algorithms for the Construction and Analysis of Systems","start_date":"2016-04-02","location":"Eindhoven, The Netherlands","end_date":"2016-04-08"},"language":[{"iso":"eng"}],"publist_id":"6099","ec_funded":1,"acknowledgement":"This research was funded in part by the European Research Council (ERC) under\r\ngrant agreement 267989 (QUAREM), the Austrian Science Fund (FWF) under\r\ngrants project S11402-N23 (RiSE) and Z211-N23 (Wittgenstein Award), the Peo-\r\nple Programme (Marie Curie Actions) of the European Union’s Seventh Framework\r\nProgramme (FP7/2007-2013) REA Grant No 291734, the SNSF Advanced Postdoc.\r\nMobility Fellowship – grant number P300P2\r\n161067, and the Czech Science Foun-\r\ndation under grant agreement P202/12/G061.","year":"2016","publisher":"Springer","department":[{"_id":"ToHe"},{"_id":"CaGu"}],"publication_status":"published","related_material":{"record":[{"status":"public","relation":"later_version","id":"471"},{"id":"1155","relation":"dissertation_contains","status":"public"}]},"author":[{"first_name":"Przemyslaw","last_name":"Daca","id":"49351290-F248-11E8-B48F-1D18A9856A87","full_name":"Daca, Przemyslaw"},{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724","first_name":"Thomas A","last_name":"Henzinger","full_name":"Henzinger, Thomas A"},{"first_name":"Jan","last_name":"Kretinsky","id":"44CEF464-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8122-2881","full_name":"Kretinsky, Jan"},{"full_name":"Petrov, Tatjana","orcid":"0000-0002-9041-0905","id":"3D5811FC-F248-11E8-B48F-1D18A9856A87","last_name":"Petrov","first_name":"Tatjana"}],"volume":9636,"date_updated":"2023-09-07T11:58:33Z","date_created":"2018-12-11T11:50:51Z","scopus_import":1,"day":"01","citation":{"ama":"Daca P, Henzinger TA, Kretinsky J, Petrov T. Faster statistical model checking for unbounded temporal properties. In: Vol 9636. Springer; 2016:112-129. doi:10.1007/978-3-662-49674-9_7","apa":"Daca, P., Henzinger, T. A., Kretinsky, J., & Petrov, T. (2016). Faster statistical model checking for unbounded temporal properties (Vol. 9636, pp. 112–129). Presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, Eindhoven, The Netherlands: Springer. https://doi.org/10.1007/978-3-662-49674-9_7","ieee":"P. Daca, T. A. Henzinger, J. Kretinsky, and T. Petrov, “Faster statistical model checking for unbounded temporal properties,” presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, Eindhoven, The Netherlands, 2016, vol. 9636, pp. 112–129.","ista":"Daca P, Henzinger TA, Kretinsky J, Petrov T. 2016. Faster statistical model checking for unbounded temporal properties. TACAS: Tools and Algorithms for the Construction and Analysis of Systems, LNCS, vol. 9636, 112–129.","short":"P. Daca, T.A. Henzinger, J. Kretinsky, T. Petrov, in:, Springer, 2016, pp. 112–129.","mla":"Daca, Przemyslaw, et al. Faster Statistical Model Checking for Unbounded Temporal Properties. Vol. 9636, Springer, 2016, pp. 112–29, doi:10.1007/978-3-662-49674-9_7.","chicago":"Daca, Przemyslaw, Thomas A Henzinger, Jan Kretinsky, and Tatjana Petrov. “Faster Statistical Model Checking for Unbounded Temporal Properties,” 9636:112–29. Springer, 2016. https://doi.org/10.1007/978-3-662-49674-9_7."},"page":"112 - 129","date_published":"2016-01-01T00:00:00Z","type":"conference","alternative_title":["LNCS"],"abstract":[{"lang":"eng","text":"We present a new algorithm for the statistical model checking of Markov chains with respect to unbounded temporal properties, including full linear temporal logic. The main idea is that we monitor each simulation run on the fly, in order to detect quickly if a bottom strongly connected component is entered with high probability, in which case the simulation run can be terminated early. As a result, our simulation runs are often much shorter than required by termination bounds that are computed a priori for a desired level of confidence on a large state space. In comparison to previous algorithms for statistical model checking our method is not only faster in many cases but also requires less information about the system, namely, only the minimum transition probability that occurs in the Markov chain. In addition, our method can be generalised to unbounded quantitative properties such as mean-payoff bounds."}],"_id":"1234","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","intvolume":" 9636","status":"public","title":"Faster statistical model checking for unbounded temporal properties","oa_version":"Preprint"},{"abstract":[{"lang":"eng","text":"Concolic testing is a promising method for generating test suites for large programs. However, it suffers from the path-explosion problem and often fails to find tests that cover difficult-to-reach parts of programs. In contrast, model checkers based on counterexample-guided abstraction refinement explore programs exhaustively, while failing to scale on large programs with precision. In this paper, we present a novel method that iteratively combines concolic testing and model checking to find a test suite for a given coverage criterion. If concolic testing fails to cover some test goals, then the model checker refines its program abstraction to prove more paths infeasible, which reduces the search space for concolic testing. We have implemented our method on top of the concolictesting tool Crest and the model checker CpaChecker. We evaluated our tool on a collection of programs and a category of SvComp benchmarks. In our experiments, we observed an improvement in branch coverage compared to Crest from 48% to 63% in the best case, and from 66% to 71% on average."}],"type":"conference","alternative_title":["LNCS"],"oa_version":"Preprint","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","_id":"1230","title":"Abstraction-driven concolic testing","status":"public","intvolume":" 9583","day":"01","scopus_import":1,"date_published":"2016-01-01T00:00:00Z","citation":{"chicago":"Daca, Przemyslaw, Ashutosh Gupta, and Thomas A Henzinger. “Abstraction-Driven Concolic Testing,” 9583:328–47. Springer, 2016. https://doi.org/10.1007/978-3-662-49122-5_16.","mla":"Daca, Przemyslaw, et al. Abstraction-Driven Concolic Testing. Vol. 9583, Springer, 2016, pp. 328–47, doi:10.1007/978-3-662-49122-5_16.","short":"P. Daca, A. Gupta, T.A. Henzinger, in:, Springer, 2016, pp. 328–347.","ista":"Daca P, Gupta A, Henzinger TA. 2016. Abstraction-driven concolic testing. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS, vol. 9583, 328–347.","ieee":"P. Daca, A. Gupta, and T. A. Henzinger, “Abstraction-driven concolic testing,” presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, St. Petersburg, FL, USA, 2016, vol. 9583, pp. 328–347.","apa":"Daca, P., Gupta, A., & Henzinger, T. A. (2016). Abstraction-driven concolic testing (Vol. 9583, pp. 328–347). Presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, St. Petersburg, FL, USA: Springer. https://doi.org/10.1007/978-3-662-49122-5_16","ama":"Daca P, Gupta A, Henzinger TA. Abstraction-driven concolic testing. In: Vol 9583. Springer; 2016:328-347. doi:10.1007/978-3-662-49122-5_16"},"page":"328 - 347","publist_id":"6104","ec_funded":1,"author":[{"full_name":"Daca, Przemyslaw","last_name":"Daca","first_name":"Przemyslaw","id":"49351290-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Gupta, Ashutosh","last_name":"Gupta","first_name":"Ashutosh","id":"335E5684-F248-11E8-B48F-1D18A9856A87"},{"orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","first_name":"Thomas A","full_name":"Henzinger, Thomas A"}],"related_material":{"record":[{"id":"1155","relation":"dissertation_contains","status":"public"}]},"date_updated":"2023-09-07T11:58:33Z","date_created":"2018-12-11T11:50:50Z","volume":9583,"acknowledgement":"We thank Andrey Kupriyanov for feedback on the manuscript,\r\nand Michael Tautschnig for help with preparing the experiments. This research was supported in part by the European Research Council (ERC) under grant 267989 (QUAREM) and by the Austrian Science Fund (FWF) under grants S11402-N23 (RiSE) and Z211-N23 (Wittgenstein Award).","year":"2016","publication_status":"published","department":[{"_id":"ToHe"}],"publisher":"Springer","month":"01","conference":{"name":"VMCAI: Verification, Model Checking and Abstract Interpretation","start_date":"2016-01-17","location":"St. Petersburg, FL, USA","end_date":"2016-01-19"},"doi":"10.1007/978-3-662-49122-5_16","language":[{"iso":"eng"}],"oa":1,"main_file_link":[{"url":"https://arxiv.org/abs/1511.02615","open_access":"1"}],"quality_controlled":"1","project":[{"grant_number":"267989","_id":"25EE3708-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","name":"Quantitative Reactive Modeling"},{"grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425","name":"The Wittgenstein Prize","call_identifier":"FWF"},{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Rigorous Systems Engineering"}]},{"scopus_import":1,"day":"13","citation":{"mla":"Daca, Przemyslaw, et al. Array Folds Logic. Vol. 9780, Springer, 2016, pp. 230–48, doi:10.1007/978-3-319-41540-6_13.","short":"P. Daca, T.A. Henzinger, A. Kupriyanov, in:, Springer, 2016, pp. 230–248.","chicago":"Daca, Przemyslaw, Thomas A Henzinger, and Andrey Kupriyanov. “Array Folds Logic,” 9780:230–48. Springer, 2016. https://doi.org/10.1007/978-3-319-41540-6_13.","ama":"Daca P, Henzinger TA, Kupriyanov A. Array folds logic. In: Vol 9780. Springer; 2016:230-248. doi:10.1007/978-3-319-41540-6_13","ista":"Daca P, Henzinger TA, Kupriyanov A. 2016. Array folds logic. CAV: Computer Aided Verification, LNCS, vol. 9780, 230–248.","apa":"Daca, P., Henzinger, T. A., & Kupriyanov, A. (2016). Array folds logic (Vol. 9780, pp. 230–248). Presented at the CAV: Computer Aided Verification, Toronto, Canada: Springer. https://doi.org/10.1007/978-3-319-41540-6_13","ieee":"P. Daca, T. A. Henzinger, and A. Kupriyanov, “Array folds logic,” presented at the CAV: Computer Aided Verification, Toronto, Canada, 2016, vol. 9780, pp. 230–248."},"page":"230 - 248","date_published":"2016-07-13T00:00:00Z","type":"conference","alternative_title":["LNCS"],"abstract":[{"lang":"eng","text":"We present an extension to the quantifier-free theory of integer arrays which allows us to express counting. The properties expressible in Array Folds Logic (AFL) include statements such as "the first array cell contains the array length," and "the array contains equally many minimal and maximal elements." These properties cannot be expressed in quantified fragments of the theory of arrays, nor in the theory of concatenation. Using reduction to counter machines, we show that the satisfiability problem of AFL is PSPACE-complete, and with a natural restriction the complexity decreases to NP. We also show that adding either universal quantifiers or concatenation leads to undecidability.\r\nAFL contains terms that fold a function over an array. We demonstrate that folding, a well-known concept from functional languages, allows us to concisely summarize loops that count over arrays, which occurs frequently in real-life programs. We provide a tool that can discharge proof obligations in AFL, and we demonstrate on practical examples that our decision procedure can solve a broad range of problems in symbolic testing and program verification."}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1391","intvolume":" 9780","status":"public","title":"Array folds logic","oa_version":"Preprint","month":"07","oa":1,"main_file_link":[{"url":"http://arxiv.org/abs/1603.06850","open_access":"1"}],"project":[{"_id":"25EE3708-B435-11E9-9278-68D0E5697425","grant_number":"267989","call_identifier":"FP7","name":"Quantitative Reactive Modeling"},{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Rigorous Systems Engineering"},{"grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"The Wittgenstein Prize"}],"quality_controlled":"1","doi":"10.1007/978-3-319-41540-6_13","conference":{"name":"CAV: Computer Aided Verification","end_date":"2016-07-23","start_date":"2016-07-17","location":"Toronto, Canada"},"language":[{"iso":"eng"}],"ec_funded":1,"publist_id":"5818","year":"2016","publisher":"Springer","department":[{"_id":"ToHe"}],"publication_status":"published","related_material":{"record":[{"id":"1155","status":"public","relation":"dissertation_contains"}]},"author":[{"last_name":"Daca","first_name":"Przemyslaw","id":"49351290-F248-11E8-B48F-1D18A9856A87","full_name":"Daca, Przemyslaw"},{"first_name":"Thomas A","last_name":"Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724","full_name":"Henzinger, Thomas A"},{"full_name":"Kupriyanov, Andrey","first_name":"Andrey","last_name":"Kupriyanov","id":"2C311BF8-F248-11E8-B48F-1D18A9856A87"}],"volume":9780,"date_created":"2018-12-11T11:51:45Z","date_updated":"2023-09-07T11:58:33Z"},{"type":"journal_article","issue":"3","abstract":[{"lang":"eng","text":"Restriction-modification (RM) systems represent a minimal and ubiquitous biological system of self/non-self discrimination in prokaryotes [1], which protects hosts from exogenous DNA [2]. The mechanism is based on the balance between methyltransferase (M) and cognate restriction endonuclease (R). M tags endogenous DNA as self by methylating short specific DNA sequences called restriction sites, whereas R recognizes unmethylated restriction sites as non-self and introduces a double-stranded DNA break [3]. Restriction sites are significantly underrepresented in prokaryotic genomes [4-7], suggesting that the discrimination mechanism is imperfect and occasionally leads to autoimmunity due to self-DNA cleavage (self-restriction) [8]. Furthermore, RM systems can promote DNA recombination [9] and contribute to genetic variation in microbial populations, thus facilitating adaptive evolution [10]. However, cleavage of self-DNA by RM systems as elements shaping prokaryotic genomes has not been directly detected, and its cause, frequency, and outcome are unknown. We quantify self-restriction caused by two RM systems of Escherichia coli and find that, in agreement with levels of restriction site avoidance, EcoRI, but not EcoRV, cleaves self-DNA at a measurable rate. Self-restriction is a stochastic process, which temporarily induces the SOS response, and is followed by DNA repair, maintaining cell viability. We find that RM systems with higher restriction efficiency against bacteriophage infections exhibit a higher rate of self-restriction, and that this rate can be further increased by stochastic imbalance between R and M. Our results identify molecular noise in RM systems as a factor shaping prokaryotic genomes."}],"_id":"1243","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","intvolume":" 26","title":"Bacterial autoimmunity due to a restriction-modification system","status":"public","oa_version":"None","scopus_import":1,"day":"08","citation":{"mla":"Pleska, Maros, et al. “Bacterial Autoimmunity Due to a Restriction-Modification System.” Current Biology, vol. 26, no. 3, Cell Press, 2016, pp. 404–09, doi:10.1016/j.cub.2015.12.041.","short":"M. Pleska, L. Qian, R. Okura, T. Bergmiller, Y. Wakamoto, E. Kussell, C.C. Guet, Current Biology 26 (2016) 404–409.","chicago":"Pleska, Maros, Long Qian, Reiko Okura, Tobias Bergmiller, Yuichi Wakamoto, Edo Kussell, and Calin C Guet. “Bacterial Autoimmunity Due to a Restriction-Modification System.” Current Biology. Cell Press, 2016. https://doi.org/10.1016/j.cub.2015.12.041.","ama":"Pleska M, Qian L, Okura R, et al. Bacterial autoimmunity due to a restriction-modification system. Current Biology. 2016;26(3):404-409. doi:10.1016/j.cub.2015.12.041","ista":"Pleska M, Qian L, Okura R, Bergmiller T, Wakamoto Y, Kussell E, Guet CC. 2016. Bacterial autoimmunity due to a restriction-modification system. Current Biology. 26(3), 404–409.","apa":"Pleska, M., Qian, L., Okura, R., Bergmiller, T., Wakamoto, Y., Kussell, E., & Guet, C. C. (2016). Bacterial autoimmunity due to a restriction-modification system. Current Biology. Cell Press. https://doi.org/10.1016/j.cub.2015.12.041","ieee":"M. Pleska et al., “Bacterial autoimmunity due to a restriction-modification system,” Current Biology, vol. 26, no. 3. Cell Press, pp. 404–409, 2016."},"publication":"Current Biology","page":"404 - 409","date_published":"2016-02-08T00:00:00Z","publist_id":"6087","acknowledgement":"This work was funded by an HFSP Young Investigators’ grant. M.P. is a recipient of a DOC Fellowship of the Austrian Academy of Science at the Institute of Science and Technology Austria. R.O. and Y.W. were supported by the Platform for Dynamic Approaches to Living System from MEXT, Japan. We wish to thank I. Kobayashi for providing us with the EcoRI and EcoRV plasmids, and A. Campbell for providing us with the λ vir phage. We thank D. Siekhaus and C. Uhler and members of the C.C.G. and J.P. Bollback laboratories for in-depth discussions. We thank B. Stern for comments on an earlier version of the manuscript. We especially thank B.R. Levin for advice and comments, and the anonymous reviewers for significantly improving the manuscript.","year":"2016","publisher":"Cell Press","department":[{"_id":"CaGu"}],"publication_status":"published","related_material":{"record":[{"relation":"dissertation_contains","status":"public","id":"202"}]},"author":[{"full_name":"Pleska, Maros","id":"4569785E-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-7460-7479","first_name":"Maros","last_name":"Pleska"},{"last_name":"Qian","first_name":"Long","full_name":"Qian, Long"},{"last_name":"Okura","first_name":"Reiko","full_name":"Okura, Reiko"},{"full_name":"Bergmiller, Tobias","first_name":"Tobias","last_name":"Bergmiller","id":"2C471CFA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-5396-4346"},{"last_name":"Wakamoto","first_name":"Yuichi","full_name":"Wakamoto, Yuichi"},{"full_name":"Kussell, Edo","last_name":"Kussell","first_name":"Edo"},{"first_name":"Calin C","last_name":"Guet","id":"47F8433E-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-6220-2052","full_name":"Guet, Calin C"}],"volume":26,"date_updated":"2023-09-07T11:59:32Z","date_created":"2018-12-11T11:50:54Z","month":"02","project":[{"grant_number":"24210","_id":"251D65D8-B435-11E9-9278-68D0E5697425","name":"Effects of Stochasticity on the Function of Restriction-Modi cation Systems at the Single-Cell Level (DOC Fellowship)"}],"quality_controlled":"1","doi":"10.1016/j.cub.2015.12.041","language":[{"iso":"eng"}]},{"project":[{"name":"Modern Graph Algorithmic Techniques in Formal Verification","call_identifier":"FWF","_id":"2584A770-B435-11E9-9278-68D0E5697425","grant_number":"P 23499-N23"},{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Rigorous Systems Engineering"},{"grant_number":"279307","_id":"2581B60A-B435-11E9-9278-68D0E5697425","name":"Quantitative Graph Games: Theory and Applications","call_identifier":"FP7"}],"quality_controlled":"1","oa":1,"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"language":[{"iso":"eng"}],"doi":"10.4230/LIPIcs.ESA.2016.28","conference":{"name":"ESA: European Symposium on Algorithms","end_date":"2016-08-24","start_date":"2016-08-22","location":"Aarhus, Denmark"},"month":"08","publisher":"Schloss Dagstuhl- Leibniz-Zentrum fur Informatik","department":[{"_id":"KrCh"}],"publication_status":"published","acknowledgement":"The research was partly supported by Austrian Science Fund (FWF) Grant No P23499-N23, FWF NFN Grant No S11407-N23 (RiSE/SHiNE) and ERC Start grant (279307: Graph Games).","year":"2016","volume":57,"date_created":"2018-12-11T11:49:59Z","date_updated":"2023-09-07T12:01:58Z","related_material":{"record":[{"id":"821","relation":"dissertation_contains","status":"public"}]},"author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","first_name":"Krishnendu","last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu"},{"id":"3B699956-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-4783-0389","first_name":"Rasmus","last_name":"Ibsen-Jensen","full_name":"Ibsen-Jensen, Rasmus"},{"first_name":"Andreas","last_name":"Pavlogiannis","id":"49704004-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8943-0722","full_name":"Pavlogiannis, Andreas"}],"article_number":"28","publist_id":"6312","ec_funded":1,"file_date_updated":"2018-12-12T10:14:31Z","citation":{"chicago":"Chatterjee, Krishnendu, Rasmus Ibsen-Jensen, and Andreas Pavlogiannis. “Optimal Reachability and a Space Time Tradeoff for Distance Queries in Constant Treewidth Graphs,” Vol. 57. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik, 2016. https://doi.org/10.4230/LIPIcs.ESA.2016.28.","mla":"Chatterjee, Krishnendu, et al. Optimal Reachability and a Space Time Tradeoff for Distance Queries in Constant Treewidth Graphs. Vol. 57, 28, Schloss Dagstuhl- Leibniz-Zentrum fur Informatik, 2016, doi:10.4230/LIPIcs.ESA.2016.28.","short":"K. Chatterjee, R. Ibsen-Jensen, A. Pavlogiannis, in:, Schloss Dagstuhl- Leibniz-Zentrum fur Informatik, 2016.","ista":"Chatterjee K, Ibsen-Jensen R, Pavlogiannis A. 2016. Optimal reachability and a space time tradeoff for distance queries in constant treewidth graphs. ESA: European Symposium on Algorithms, LIPIcs, vol. 57, 28.","ieee":"K. Chatterjee, R. Ibsen-Jensen, and A. Pavlogiannis, “Optimal reachability and a space time tradeoff for distance queries in constant treewidth graphs,” presented at the ESA: European Symposium on Algorithms, Aarhus, Denmark, 2016, vol. 57.","apa":"Chatterjee, K., Ibsen-Jensen, R., & Pavlogiannis, A. (2016). Optimal reachability and a space time tradeoff for distance queries in constant treewidth graphs (Vol. 57). Presented at the ESA: European Symposium on Algorithms, Aarhus, Denmark: Schloss Dagstuhl- Leibniz-Zentrum fur Informatik. https://doi.org/10.4230/LIPIcs.ESA.2016.28","ama":"Chatterjee K, Ibsen-Jensen R, Pavlogiannis A. Optimal reachability and a space time tradeoff for distance queries in constant treewidth graphs. In: Vol 57. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik; 2016. doi:10.4230/LIPIcs.ESA.2016.28"},"date_published":"2016-08-01T00:00:00Z","scopus_import":1,"has_accepted_license":"1","day":"01","intvolume":" 57","title":"Optimal reachability and a space time tradeoff for distance queries in constant treewidth graphs","status":"public","ddc":["004","006"],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1071","file":[{"file_name":"IST-2017-777-v1+1_LIPIcs-ESA-2016-28.pdf","access_level":"open_access","file_size":579225,"content_type":"application/pdf","creator":"system","relation":"main_file","file_id":"5084","date_created":"2018-12-12T10:14:31Z","date_updated":"2018-12-12T10:14:31Z"}],"oa_version":"Published Version","pubrep_id":"777","alternative_title":["LIPIcs"],"type":"conference","abstract":[{"text":"We consider data-structures for answering reachability and distance queries on constant-treewidth graphs with n nodes, on the standard RAM computational model with wordsize W=Theta(log n). Our first contribution is a data-structure that after O(n) preprocessing time, allows (1) pair reachability queries in O(1) time; and (2) single-source reachability queries in O(n/log n) time. This is (asymptotically) optimal and is faster than DFS/BFS when answering more than a constant number of single-source queries. The data-structure uses at all times O(n) space. Our second contribution is a space-time tradeoff data-structure for distance queries. For any epsilon in [1/2,1], we provide a data-structure with polynomial preprocessing time that allows pair queries in O(n^{1-\\epsilon} alpha(n)) time, where alpha is the inverse of the Ackermann function, and at all times uses O(n^epsilon) space. The input graph G is not considered in the space complexity. ","lang":"eng"}]},{"abstract":[{"lang":"eng","text":"We present a boundary element based method for fast simulation of brittle fracture. By introducing simplifying assumptions that allow us to quickly estimate stress intensities and opening displacements during crack propagation, we build a fracture algorithm where the cost of each time step scales linearly with the length of the crackfront. The transition from a full boundary element method to our faster variant is possible at the beginning of any time step. This allows us to build a hybrid method, which uses the expensive but more accurate BEM while the number of degrees of freedom is low, and uses the fast method once that number exceeds a given threshold as the crack geometry becomes more complicated. Furthermore, we integrate this fracture simulation with a standard rigid-body solver. Our rigid-body coupling solves a Neumann boundary value problem by carefully separating translational, rotational and deformational components of the collision forces and then applying a Tikhonov regularizer to the resulting linear system. We show that our method produces physically reasonable results in standard test cases and is capable of dealing with complex scenes faster than previous finite- or boundary element approaches."}],"issue":"4","type":"conference","alternative_title":["ACM Transactions on Graphics"],"pubrep_id":"632","oa_version":"Published Version","file":[{"creator":"system","file_size":12453704,"content_type":"application/pdf","file_name":"IST-2016-632-v1+2_a104-hahn.pdf","access_level":"open_access","date_updated":"2020-07-14T12:44:46Z","date_created":"2018-12-12T10:15:04Z","checksum":"943712d9c9dc8bb5048d4adc561d7d38","file_id":"5121","relation":"main_file"}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1362","ddc":["000"],"title":"Fast approximations for boundary element based brittle fracture simulation","status":"public","intvolume":" 35","day":"01","has_accepted_license":"1","date_published":"2016-07-01T00:00:00Z","citation":{"chicago":"Hahn, David, and Chris Wojtan. “Fast Approximations for Boundary Element Based Brittle Fracture Simulation,” Vol. 35. ACM, 2016. https://doi.org/10.1145/2897824.2925902.","mla":"Hahn, David, and Chris Wojtan. Fast Approximations for Boundary Element Based Brittle Fracture Simulation. Vol. 35, no. 4, 104, ACM, 2016, doi:10.1145/2897824.2925902.","short":"D. Hahn, C. Wojtan, in:, ACM, 2016.","ista":"Hahn D, Wojtan C. 2016. Fast approximations for boundary element based brittle fracture simulation. ACM SIGGRAPH, ACM Transactions on Graphics, vol. 35, 104.","ieee":"D. Hahn and C. Wojtan, “Fast approximations for boundary element based brittle fracture simulation,” presented at the ACM SIGGRAPH, Anaheim, CA, USA, 2016, vol. 35, no. 4.","apa":"Hahn, D., & Wojtan, C. (2016). Fast approximations for boundary element based brittle fracture simulation (Vol. 35). Presented at the ACM SIGGRAPH, Anaheim, CA, USA: ACM. https://doi.org/10.1145/2897824.2925902","ama":"Hahn D, Wojtan C. Fast approximations for boundary element based brittle fracture simulation. In: Vol 35. ACM; 2016. doi:10.1145/2897824.2925902"},"file_date_updated":"2020-07-14T12:44:46Z","publist_id":"5880","ec_funded":1,"article_number":"104","author":[{"id":"357A6A66-F248-11E8-B48F-1D18A9856A87","first_name":"David","last_name":"Hahn","full_name":"Hahn, David"},{"full_name":"Wojtan, Christopher J","first_name":"Christopher J","last_name":"Wojtan","id":"3C61F1D2-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-6646-5546"}],"related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"839"}]},"date_created":"2018-12-11T11:51:35Z","date_updated":"2023-09-07T12:02:56Z","volume":35,"year":"2016","publication_status":"published","publisher":"ACM","department":[{"_id":"ChWo"}],"month":"07","conference":{"start_date":"2016-07-24","location":"Anaheim, CA, USA","end_date":"2016-07-28","name":"ACM SIGGRAPH"},"doi":"10.1145/2897824.2925902","language":[{"iso":"eng"}],"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"oa":1,"quality_controlled":"1","project":[{"_id":"2533E772-B435-11E9-9278-68D0E5697425","grant_number":"638176","call_identifier":"H2020","name":"Efficient Simulation of Natural Phenomena at Extremely Large Scales"}]},{"publist_id":"6105","ec_funded":1,"file_date_updated":"2020-07-14T12:44:39Z","year":"2016","acknowledgement":"Research supported by the European Research Council, ERC starting grant (259668-PSPC) and ERC consolidator grant (682815 - TOCNeT).","publisher":"Springer","department":[{"_id":"KrPi"}],"publication_status":"published","related_material":{"record":[{"id":"83","relation":"dissertation_contains","status":"public"}]},"author":[{"id":"40297222-F248-11E8-B48F-1D18A9856A87","first_name":"Hamza M","last_name":"Abusalah","full_name":"Abusalah, Hamza M"},{"first_name":"Georg","last_name":"Fuchsbauer","id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","full_name":"Fuchsbauer, Georg"},{"full_name":"Pietrzak, Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z","last_name":"Pietrzak"}],"volume":9696,"date_created":"2018-12-11T11:50:50Z","date_updated":"2023-09-07T12:30:22Z","month":"06","oa":1,"project":[{"_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668","call_identifier":"FP7","name":"Provable Security for Physical Cryptography"},{"call_identifier":"H2020","name":"Teaching Old Crypto New Tricks","grant_number":"682815","_id":"258AA5B2-B435-11E9-9278-68D0E5697425"}],"quality_controlled":"1","doi":"10.1007/978-3-319-39555-5_16","conference":{"name":"ACNS: Applied Cryptography and Network Security","end_date":"2016-06-22","start_date":"2016-06-19","location":"Guildford, UK"},"language":[{"iso":"eng"}],"type":"conference","alternative_title":["LNCS"],"abstract":[{"lang":"eng","text":"Witness encryption (WE) was introduced by Garg et al. [GGSW13]. A WE scheme is defined for some NP language L and lets a sender encrypt messages relative to instances x. A ciphertext for x can be decrypted using w witnessing x ∈ L, but hides the message if x ∈ L. Garg et al. construct WE from multilinear maps and give another construction [GGH+13b] using indistinguishability obfuscation (iO) for circuits. Due to the reliance on such heavy tools, WE can cur- rently hardly be implemented on powerful hardware and will unlikely be realizable on constrained devices like smart cards any time soon. We construct a WE scheme where encryption is done by simply computing a Naor-Yung ciphertext (two CPA encryptions and a NIZK proof). To achieve this, our scheme has a setup phase, which outputs public parameters containing an obfuscated circuit (only required for decryption), two encryption keys and a common reference string (used for encryption). This setup need only be run once, and the parame- ters can be used for arbitrary many encryptions. Our scheme can also be turned into a functional WE scheme, where a message is encrypted w.r.t. a statement and a function f, and decryption with a witness w yields f (m, w). Our construction is inspired by the functional encryption scheme by Garg et al. and we prove (selective) security assuming iO and statistically simulation-sound NIZK. We give a construction of the latter in bilinear groups and combining it with ElGamal encryption, our ciphertexts are of size 1.3 kB at a 128-bit security level and can be computed on a smart card."}],"_id":"1229","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","intvolume":" 9696","status":"public","ddc":["005","600"],"title":"Offline witness encryption","pubrep_id":"765","oa_version":"Submitted Version","file":[{"creator":"system","file_size":515000,"content_type":"application/pdf","file_name":"IST-2017-765-v1+1_838.pdf","access_level":"open_access","date_updated":"2020-07-14T12:44:39Z","date_created":"2018-12-12T10:17:20Z","checksum":"34fa9ce681da845a1ba945ba3dc57867","file_id":"5273","relation":"main_file"}],"scopus_import":1,"has_accepted_license":"1","day":"09","citation":{"ista":"Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Offline witness encryption. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696, 285–303.","apa":"Abusalah, H. M., Fuchsbauer, G., & Pietrzak, K. Z. (2016). Offline witness encryption (Vol. 9696, pp. 285–303). Presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK: Springer. https://doi.org/10.1007/978-3-319-39555-5_16","ieee":"H. M. Abusalah, G. Fuchsbauer, and K. Z. Pietrzak, “Offline witness encryption,” presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK, 2016, vol. 9696, pp. 285–303.","ama":"Abusalah HM, Fuchsbauer G, Pietrzak KZ. Offline witness encryption. In: Vol 9696. Springer; 2016:285-303. doi:10.1007/978-3-319-39555-5_16","chicago":"Abusalah, Hamza M, Georg Fuchsbauer, and Krzysztof Z Pietrzak. “Offline Witness Encryption,” 9696:285–303. Springer, 2016. https://doi.org/10.1007/978-3-319-39555-5_16.","mla":"Abusalah, Hamza M., et al. Offline Witness Encryption. Vol. 9696, Springer, 2016, pp. 285–303, doi:10.1007/978-3-319-39555-5_16.","short":"H.M. Abusalah, G. Fuchsbauer, K.Z. Pietrzak, in:, Springer, 2016, pp. 285–303."},"page":"285 - 303","date_published":"2016-06-09T00:00:00Z"},{"ec_funded":1,"publist_id":"6097","file_date_updated":"2020-07-14T12:44:41Z","related_material":{"record":[{"id":"83","relation":"dissertation_contains","status":"public"}]},"author":[{"full_name":"Abusalah, Hamza M","first_name":"Hamza M","last_name":"Abusalah","id":"40297222-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Fuchsbauer, Georg","first_name":"Georg","last_name":"Fuchsbauer","id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Krzysztof Z","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9139-1654","full_name":"Pietrzak, Krzysztof Z"}],"volume":9610,"date_updated":"2023-09-07T12:30:22Z","date_created":"2018-12-11T11:50:52Z","year":"2016","acknowledgement":"Supported by the European Research Council, ERC Starting Grant (259668-PSPC).","publisher":"Springer","department":[{"_id":"KrPi"}],"publication_status":"published","month":"02","doi":"10.1007/978-3-319-29485-8_24","conference":{"name":"CT-RSA: Topics in Cryptology","location":"San Francisco, CA, USA","start_date":"2016-02-29","end_date":"2016-03-04"},"language":[{"iso":"eng"}],"oa":1,"project":[{"_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668","call_identifier":"FP7","name":"Provable Security for Physical Cryptography"}],"quality_controlled":"1","abstract":[{"lang":"eng","text":"A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function where for any key k ∈ K and set S ∈ T one can efficiently compute a constrained key kS which allows to evaluate F (k, ·) on all inputs x ∈ S, while even given this key, the outputs on all inputs x ∉ S look random. At Asiacrypt’13 Boneh and Waters gave a construction which supports the most general set family so far. Its keys kc are defined for sets decided by boolean circuits C and enable evaluation of the PRF on any x ∈ X where C(x) = 1. In their construction the PRF input length and the size of the circuits C for which constrained keys can be computed must be fixed beforehand during key generation. We construct a constrained PRF that has an unbounded input length and whose constrained keys can be defined for any set recognized by a Turing machine. The only a priori bound we make is on the description size of the machines. We prove our construction secure assuming publiccoin differing-input obfuscation. As applications of our constrained PRF we build a broadcast encryption scheme where the number of potential receivers need not be fixed at setup (in particular, the length of the keys is independent of the number of parties) and the first identity-based non-interactive key exchange protocol with no bound on the number of parties that can agree on a shared key."}],"type":"conference","alternative_title":["LNCS"],"pubrep_id":"764","oa_version":"Submitted Version","file":[{"relation":"main_file","file_id":"4664","checksum":"3851cee49933ae13b1272e516f213e13","date_created":"2018-12-12T10:08:05Z","date_updated":"2020-07-14T12:44:41Z","access_level":"open_access","file_name":"IST-2017-764-v1+1_279.pdf","content_type":"application/pdf","file_size":495176,"creator":"system"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","_id":"1236","intvolume":" 9610","ddc":["005","600"],"title":"Constrained PRFs for unbounded inputs","status":"public","has_accepted_license":"1","day":"02","scopus_import":1,"date_published":"2016-02-02T00:00:00Z","citation":{"ieee":"H. M. Abusalah, G. Fuchsbauer, and K. Z. Pietrzak, “Constrained PRFs for unbounded inputs,” presented at the CT-RSA: Topics in Cryptology, San Francisco, CA, USA, 2016, vol. 9610, pp. 413–428.","apa":"Abusalah, H. M., Fuchsbauer, G., & Pietrzak, K. Z. (2016). Constrained PRFs for unbounded inputs (Vol. 9610, pp. 413–428). Presented at the CT-RSA: Topics in Cryptology, San Francisco, CA, USA: Springer. https://doi.org/10.1007/978-3-319-29485-8_24","ista":"Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Constrained PRFs for unbounded inputs. CT-RSA: Topics in Cryptology, LNCS, vol. 9610, 413–428.","ama":"Abusalah HM, Fuchsbauer G, Pietrzak KZ. Constrained PRFs for unbounded inputs. In: Vol 9610. Springer; 2016:413-428. doi:10.1007/978-3-319-29485-8_24","chicago":"Abusalah, Hamza M, Georg Fuchsbauer, and Krzysztof Z Pietrzak. “Constrained PRFs for Unbounded Inputs,” 9610:413–28. Springer, 2016. https://doi.org/10.1007/978-3-319-29485-8_24.","short":"H.M. Abusalah, G. Fuchsbauer, K.Z. Pietrzak, in:, Springer, 2016, pp. 413–428.","mla":"Abusalah, Hamza M., et al. Constrained PRFs for Unbounded Inputs. Vol. 9610, Springer, 2016, pp. 413–28, doi:10.1007/978-3-319-29485-8_24."},"page":"413 - 428"},{"volume":9696,"date_created":"2018-12-11T11:50:52Z","date_updated":"2023-09-07T12:30:22Z","related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"83"}]},"author":[{"full_name":"Abusalah, Hamza M","id":"40297222-F248-11E8-B48F-1D18A9856A87","first_name":"Hamza M","last_name":"Abusalah"},{"last_name":"Fuchsbauer","first_name":"Georg","id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","full_name":"Fuchsbauer, Georg"}],"publisher":"Springer","department":[{"_id":"KrPi"}],"publication_status":"published","year":"2016","acknowledgement":"H. Abusalah—Research supported by the European Research Council, ERC starting grant (259668-PSPC) and ERC consolidator grant (682815 - TOCNeT).","ec_funded":1,"publist_id":"6098","language":[{"iso":"eng"}],"doi":"10.1007/978-3-319-39555-5_24","conference":{"end_date":"2016-06-22","location":"Guildford, UK","start_date":"2016-06-19","name":"ACNS: Applied Cryptography and Network Security"},"project":[{"_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668","name":"Provable Security for Physical Cryptography","call_identifier":"FP7"},{"name":"Teaching Old Crypto New Tricks","call_identifier":"H2020","grant_number":"682815","_id":"258AA5B2-B435-11E9-9278-68D0E5697425"}],"quality_controlled":"1","oa":1,"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2016/279.pdf"}],"month":"01","oa_version":"Submitted Version","intvolume":" 9696","title":"Constrained PRFs for unbounded inputs with short keys","status":"public","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1235","abstract":[{"lang":"eng","text":"A constrained pseudorandom function (CPRF) F: K×X → Y for a family T of subsets of χ is a function where for any key k ∈ K and set S ∈ T one can efficiently compute a short constrained key kS, which allows to evaluate F(k, ·) on all inputs x ∈ S, while the outputs on all inputs x /∈ S look random even given kS. Abusalah et al. recently constructed the first constrained PRF for inputs of arbitrary length whose sets S are decided by Turing machines. They use their CPRF to build broadcast encryption and the first ID-based non-interactive key exchange for an unbounded number of users. Their constrained keys are obfuscated circuits and are therefore large. In this work we drastically reduce the key size and define a constrained key for a Turing machine M as a short signature on M. For this, we introduce a new signature primitive with constrained signing keys that let one only sign certain messages, while forging a signature on others is hard even when knowing the coins for key generation."}],"alternative_title":["LNCS"],"type":"conference","date_published":"2016-01-01T00:00:00Z","page":"445 - 463","citation":{"apa":"Abusalah, H. M., & Fuchsbauer, G. (2016). Constrained PRFs for unbounded inputs with short keys (Vol. 9696, pp. 445–463). Presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK: Springer. https://doi.org/10.1007/978-3-319-39555-5_24","ieee":"H. M. Abusalah and G. Fuchsbauer, “Constrained PRFs for unbounded inputs with short keys,” presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK, 2016, vol. 9696, pp. 445–463.","ista":"Abusalah HM, Fuchsbauer G. 2016. Constrained PRFs for unbounded inputs with short keys. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696, 445–463.","ama":"Abusalah HM, Fuchsbauer G. Constrained PRFs for unbounded inputs with short keys. In: Vol 9696. Springer; 2016:445-463. doi:10.1007/978-3-319-39555-5_24","chicago":"Abusalah, Hamza M, and Georg Fuchsbauer. “Constrained PRFs for Unbounded Inputs with Short Keys,” 9696:445–63. Springer, 2016. https://doi.org/10.1007/978-3-319-39555-5_24.","short":"H.M. Abusalah, G. Fuchsbauer, in:, Springer, 2016, pp. 445–463.","mla":"Abusalah, Hamza M., and Georg Fuchsbauer. Constrained PRFs for Unbounded Inputs with Short Keys. Vol. 9696, Springer, 2016, pp. 445–63, doi:10.1007/978-3-319-39555-5_24."},"day":"01","scopus_import":1},{"oa":1,"project":[{"grant_number":"303564","_id":"25548C20-B435-11E9-9278-68D0E5697425","name":"Microbial Ion Channels for Synthetic Neurobiology","call_identifier":"FP7"},{"_id":"255A6082-B435-11E9-9278-68D0E5697425","grant_number":"W1232-B24","call_identifier":"FWF","name":"Molecular Drug Targets"}],"quality_controlled":"1","doi":"10.1002/anie.201601736","language":[{"iso":"eng"}],"month":"05","acknowledgement":"A.I.-P. was supported by a Ramon Areces fellowship, and E.R. by the graduate program MolecularDrugTargets (Austrian Science Fund (FWF): W1232) and a FemTech fellowship (Austrian Research Promotion Agency: 3580812).","year":"2016","department":[{"_id":"HaJa"}],"publisher":"Wiley","publication_status":"published","related_material":{"record":[{"id":"418","status":"public","relation":"dissertation_contains"}]},"author":[{"id":"3FEE232A-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-7218-7738","first_name":"Eva","last_name":"Gschaider-Reichhart","full_name":"Gschaider-Reichhart, Eva"},{"full_name":"Inglés Prieto, Álvaro","id":"2A9DB292-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-5409-8571","first_name":"Álvaro","last_name":"Inglés Prieto"},{"full_name":"Tichy, Alexandra-Madelaine","id":"29D8BB2C-F248-11E8-B48F-1D18A9856A87","first_name":"Alexandra-Madelaine","last_name":"Tichy"},{"full_name":"Mckenzie, Catherine","first_name":"Catherine","last_name":"Mckenzie","id":"3EEDE19A-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Janovjak, Harald L","orcid":"0000-0002-8023-9315","id":"33BA6C30-F248-11E8-B48F-1D18A9856A87","last_name":"Janovjak","first_name":"Harald L"}],"volume":55,"date_updated":"2023-09-07T12:49:08Z","date_created":"2018-12-11T11:52:02Z","publist_id":"5755","ec_funded":1,"file_date_updated":"2020-07-14T12:44:55Z","citation":{"ama":"Gschaider-Reichhart E, Inglés Prieto Á, Tichy A-M, Mckenzie C, Janovjak HL. A phytochrome sensory domain permits receptor activation by red light. Angewandte Chemie - International Edition. 2016;55(21):6339-6342. doi:10.1002/anie.201601736","ista":"Gschaider-Reichhart E, Inglés Prieto Á, Tichy A-M, Mckenzie C, Janovjak HL. 2016. A phytochrome sensory domain permits receptor activation by red light. Angewandte Chemie - International Edition. 55(21), 6339–6342.","apa":"Gschaider-Reichhart, E., Inglés Prieto, Á., Tichy, A.-M., Mckenzie, C., & Janovjak, H. L. (2016). A phytochrome sensory domain permits receptor activation by red light. Angewandte Chemie - International Edition. Wiley. https://doi.org/10.1002/anie.201601736","ieee":"E. Gschaider-Reichhart, Á. Inglés Prieto, A.-M. Tichy, C. Mckenzie, and H. L. Janovjak, “A phytochrome sensory domain permits receptor activation by red light,” Angewandte Chemie - International Edition, vol. 55, no. 21. Wiley, pp. 6339–6342, 2016.","mla":"Gschaider-Reichhart, Eva, et al. “A Phytochrome Sensory Domain Permits Receptor Activation by Red Light.” Angewandte Chemie - International Edition, vol. 55, no. 21, Wiley, 2016, pp. 6339–42, doi:10.1002/anie.201601736.","short":"E. Gschaider-Reichhart, Á. Inglés Prieto, A.-M. Tichy, C. Mckenzie, H.L. Janovjak, Angewandte Chemie - International Edition 55 (2016) 6339–6342.","chicago":"Gschaider-Reichhart, Eva, Álvaro Inglés Prieto, Alexandra-Madelaine Tichy, Catherine Mckenzie, and Harald L Janovjak. “A Phytochrome Sensory Domain Permits Receptor Activation by Red Light.” Angewandte Chemie - International Edition. Wiley, 2016. https://doi.org/10.1002/anie.201601736."},"publication":"Angewandte Chemie - International Edition","page":"6339 - 6342","date_published":"2016-05-17T00:00:00Z","scopus_import":1,"has_accepted_license":"1","day":"17","_id":"1441","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","intvolume":" 55","ddc":["571","576"],"status":"public","title":"A phytochrome sensory domain permits receptor activation by red light","pubrep_id":"840","file":[{"relation":"main_file","file_id":"5255","date_updated":"2020-07-14T12:44:55Z","date_created":"2018-12-12T10:17:03Z","checksum":"26da07960e57ac4750b54179197ce57f","file_name":"IST-2017-840-v1+1_reichhart.pdf","access_level":"open_access","file_size":1268662,"content_type":"application/pdf","creator":"system"}],"oa_version":"Submitted Version","type":"journal_article","issue":"21","abstract":[{"text":"Optogenetics and photopharmacology enable the spatio-temporal control of cell and animal behavior by light. Although red light offers deep-tissue penetration and minimal phototoxicity, very few red-light-sensitive optogenetic methods are currently available. We have now developed a red-light-induced homodimerization domain. We first showed that an optimized sensory domain of the cyanobacterial phytochrome 1 can be expressed robustly and without cytotoxicity in human cells. We then applied this domain to induce the dimerization of two receptor tyrosine kinases—the fibroblast growth factor receptor 1 and the neurotrophin receptor trkB. This new optogenetic method was then used to activate the MAPK/ERK pathway non-invasively in mammalian tissue and in multicolor cell-signaling experiments. The light-controlled dimerizer and red-light-activated receptor tyrosine kinases will prove useful to regulate a variety of cellular processes with light. Go deep with red: The sensory domain (S) of the cyanobacterial phytochrome 1 (CPH1) was repurposed to induce the homodimerization of proteins in living cells by red light. By using this domain, light-activated protein kinases were engineered that can be activated orthogonally from many fluorescent proteins and through mammalian tissue. Pr/Pfr=red-/far-red-absorbing state of CPH1.","lang":"eng"}]},{"month":"08","doi":"10.1038/ncomms12307","language":[{"iso":"eng"}],"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"oa":1,"project":[{"_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734","name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7"},{"name":"Limits to selection in biology and in evolutionary computation","call_identifier":"FP7","grant_number":"250152","_id":"25B07788-B435-11E9-9278-68D0E5697425"},{"grant_number":"P28844-B27","_id":"254E9036-B435-11E9-9278-68D0E5697425","name":"Biophysics of information processing in gene regulation","call_identifier":"FWF"}],"quality_controlled":"1","ec_funded":1,"publist_id":"5887","file_date_updated":"2020-07-14T12:44:46Z","article_number":"12307","related_material":{"record":[{"id":"6071","status":"public","relation":"dissertation_contains"}]},"author":[{"id":"36A5845C-F248-11E8-B48F-1D18A9856A87","first_name":"Tamar","last_name":"Friedlander","full_name":"Friedlander, Tamar"},{"full_name":"Prizak, Roshan","first_name":"Roshan","last_name":"Prizak","id":"4456104E-F248-11E8-B48F-1D18A9856A87"},{"orcid":"0000-0001-6220-2052","id":"47F8433E-F248-11E8-B48F-1D18A9856A87","last_name":"Guet","first_name":"Calin C","full_name":"Guet, Calin C"},{"id":"4880FE40-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8548-5240","first_name":"Nicholas H","last_name":"Barton","full_name":"Barton, Nicholas H"},{"full_name":"Tkacik, Gasper","first_name":"Gasper","last_name":"Tkacik","id":"3D494DCA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-6699-1455"}],"volume":7,"date_created":"2018-12-11T11:51:34Z","date_updated":"2023-09-07T12:53:49Z","year":"2016","publisher":"Nature Publishing Group","department":[{"_id":"GaTk"},{"_id":"NiBa"},{"_id":"CaGu"}],"publication_status":"published","has_accepted_license":"1","day":"04","scopus_import":1,"date_published":"2016-08-04T00:00:00Z","citation":{"chicago":"Friedlander, Tamar, Roshan Prizak, Calin C Guet, Nicholas H Barton, and Gašper Tkačik. “Intrinsic Limits to Gene Regulation by Global Crosstalk.” Nature Communications. Nature Publishing Group, 2016. https://doi.org/10.1038/ncomms12307.","short":"T. Friedlander, R. Prizak, C.C. Guet, N.H. Barton, G. Tkačik, Nature Communications 7 (2016).","mla":"Friedlander, Tamar, et al. “Intrinsic Limits to Gene Regulation by Global Crosstalk.” Nature Communications, vol. 7, 12307, Nature Publishing Group, 2016, doi:10.1038/ncomms12307.","apa":"Friedlander, T., Prizak, R., Guet, C. C., Barton, N. H., & Tkačik, G. (2016). Intrinsic limits to gene regulation by global crosstalk. Nature Communications. Nature Publishing Group. https://doi.org/10.1038/ncomms12307","ieee":"T. Friedlander, R. Prizak, C. C. Guet, N. H. Barton, and G. Tkačik, “Intrinsic limits to gene regulation by global crosstalk,” Nature Communications, vol. 7. Nature Publishing Group, 2016.","ista":"Friedlander T, Prizak R, Guet CC, Barton NH, Tkačik G. 2016. Intrinsic limits to gene regulation by global crosstalk. Nature Communications. 7, 12307.","ama":"Friedlander T, Prizak R, Guet CC, Barton NH, Tkačik G. Intrinsic limits to gene regulation by global crosstalk. Nature Communications. 2016;7. doi:10.1038/ncomms12307"},"publication":"Nature Communications","abstract":[{"lang":"eng","text":"Gene regulation relies on the specificity of transcription factor (TF)–DNA interactions. Limited specificity may lead to crosstalk: a regulatory state in which a gene is either incorrectly activated due to noncognate TF–DNA interactions or remains erroneously inactive. As each TF can have numerous interactions with noncognate cis-regulatory elements, crosstalk is inherently a global problem, yet has previously not been studied as such. We construct a theoretical framework to analyse the effects of global crosstalk on gene regulation. We find that crosstalk presents a significant challenge for organisms with low-specificity TFs, such as metazoans. Crosstalk is not easily mitigated by known regulatory schemes acting at equilibrium, including variants of cooperativity and combinatorial regulation. Our results suggest that crosstalk imposes a previously unexplored global constraint on the functioning and evolution of regulatory networks, which is qualitatively distinct from the known constraints that act at the level of individual gene regulatory elements."}],"type":"journal_article","pubrep_id":"627","oa_version":"Published Version","file":[{"checksum":"fe3f3a1526d180b29fe691ab11435b78","date_updated":"2020-07-14T12:44:46Z","date_created":"2018-12-12T10:12:01Z","file_id":"4919","relation":"main_file","creator":"system","file_size":861805,"content_type":"application/pdf","access_level":"open_access","file_name":"IST-2016-627-v1+1_ncomms12307.pdf"},{"relation":"main_file","file_id":"4920","date_created":"2018-12-12T10:12:02Z","date_updated":"2020-07-14T12:44:46Z","checksum":"164864a1a675f3ad80e9917c27aba07f","file_name":"IST-2016-627-v1+2_ncomms12307-s1.pdf","access_level":"open_access","file_size":1084703,"content_type":"application/pdf","creator":"system"}],"_id":"1358","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","intvolume":" 7","ddc":["576"],"status":"public","title":"Intrinsic limits to gene regulation by global crosstalk"},{"ddc":["570"],"title":"Mitochondrial uncouplers inhibit clathrin-mediated endocytosis largely through cytoplasmic acidification","status":"public","intvolume":" 7","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1346","oa_version":"Published Version","file":[{"content_type":"application/pdf","file_size":3532505,"creator":"system","file_name":"IST-2016-653-v1+1_ncomms11710_1_.pdf","access_level":"open_access","date_updated":"2020-07-14T12:44:45Z","date_created":"2018-12-12T10:18:47Z","checksum":"e8dc81b3e44db5a7718d7f1501ce1aa7","relation":"main_file","file_id":"5369"}],"pubrep_id":"653","type":"journal_article","abstract":[{"lang":"eng","text":"ATP production requires the establishment of an electrochemical proton gradient across the inner mitochondrial membrane. Mitochondrial uncouplers dissipate this proton gradient and disrupt numerous cellular processes, including vesicular trafficking, mainly through energy depletion. Here we show that Endosidin9 (ES9), a novel mitochondrial uncoupler, is a potent inhibitor of clathrin-mediated endocytosis (CME) in different systems and that ES9 induces inhibition of CME not because of its effect on cellular ATP, but rather due to its protonophore activity that leads to cytoplasm acidification. We show that the known tyrosine kinase inhibitor tyrphostinA23, which is routinely used to block CME, displays similar properties, thus questioning its use as a specific inhibitor of cargo recognition by the AP-2 adaptor complex via tyrosine motif-based endocytosis signals. Furthermore, we show that cytoplasm acidification dramatically affects the dynamics and recruitment of clathrin and associated adaptors, and leads to reduction of phosphatidylinositol 4,5-biphosphate from the plasma membrane."}],"publication":"Nature Communications","citation":{"short":"W. Dejonghe, S. Kuenen, E. Mylle, M.K. Vasileva, O. Keech, C. Viotti, J. Swerts, M. Fendrych, F. Ortiz Morea, K. Mishev, S. Delang, S. Scholl, X. Zarza, M. Heilmann, J. Kourelis, J. Kasprowicz, L. Nguyen, A. Drozdzecki, I. Van Houtte, A. Szatmári, M. Majda, G. Baisa, S. Bednarek, S. Robert, D. Audenaert, C. Testerink, T. Munnik, D. Van Damme, I. Heilmann, K. Schumacher, J. Winne, J. Friml, P. Verstreken, E. Russinova, Nature Communications 7 (2016).","mla":"Dejonghe, Wim, et al. “Mitochondrial Uncouplers Inhibit Clathrin-Mediated Endocytosis Largely through Cytoplasmic Acidification.” Nature Communications, vol. 7, 11710, Nature Publishing Group, 2016, doi:10.1038/ncomms11710.","chicago":"Dejonghe, Wim, Sabine Kuenen, Evelien Mylle, Mina K Vasileva, Olivier Keech, Corrado Viotti, Jef Swerts, et al. “Mitochondrial Uncouplers Inhibit Clathrin-Mediated Endocytosis Largely through Cytoplasmic Acidification.” Nature Communications. Nature Publishing Group, 2016. https://doi.org/10.1038/ncomms11710.","ama":"Dejonghe W, Kuenen S, Mylle E, et al. Mitochondrial uncouplers inhibit clathrin-mediated endocytosis largely through cytoplasmic acidification. Nature Communications. 2016;7. doi:10.1038/ncomms11710","ieee":"W. Dejonghe et al., “Mitochondrial uncouplers inhibit clathrin-mediated endocytosis largely through cytoplasmic acidification,” Nature Communications, vol. 7. Nature Publishing Group, 2016.","apa":"Dejonghe, W., Kuenen, S., Mylle, E., Vasileva, M. K., Keech, O., Viotti, C., … Russinova, E. (2016). Mitochondrial uncouplers inhibit clathrin-mediated endocytosis largely through cytoplasmic acidification. Nature Communications. Nature Publishing Group. https://doi.org/10.1038/ncomms11710","ista":"Dejonghe W, Kuenen S, Mylle E, Vasileva MK, Keech O, Viotti C, Swerts J, Fendrych M, Ortiz Morea F, Mishev K, Delang S, Scholl S, Zarza X, Heilmann M, Kourelis J, Kasprowicz J, Nguyen L, Drozdzecki A, Van Houtte I, Szatmári A, Majda M, Baisa G, Bednarek S, Robert S, Audenaert D, Testerink C, Munnik T, Van Damme D, Heilmann I, Schumacher K, Winne J, Friml J, Verstreken P, Russinova E. 2016. Mitochondrial uncouplers inhibit clathrin-mediated endocytosis largely through cytoplasmic acidification. Nature Communications. 7, 11710."},"date_published":"2016-06-08T00:00:00Z","scopus_import":1,"day":"08","has_accepted_license":"1","publication_status":"published","department":[{"_id":"JiFr"}],"publisher":"Nature Publishing Group","year":"2016","acknowledgement":"We thank Yvon Jaillais, Ikuko Hara-Nishimura, Akihiko Nakano, Takashi Ueda and Jinxing Lin for providing materials, Natasha Raikhel, Glenn Hicks, Steffen Vanneste, and Ricardo Tejos for useful suggestions, Patrick Callaerts for providing S2 Drosophila cell cultures, Michael Sixt for providing HeLa cells, Annick Bleys for literature searches, VIB Bio Imaging Core for help with imaging conditions and Martine De Cock for help in preparing the article. This work was supported by the Agency for Innovation by Science\r\nand Technology for a pre-doctoral fellowship to W.D.; the Research fund KU Leuven\r\n(GOA), a Methusalem grant of the Flemish government and VIB to S.K., J.K. and P.V.;\r\nby the Netherlands Organisation for Scientific Research (NWO) for ALW grants\r\n846.11.002 (C.T.) and 867.15.020 (T.M.); the European Research Council (project\r\nERC-2011-StG-20101109 PSDP) (to J.F.); a European Research Council (ERC) Starting\r\nGrant (grant 260678) (to P.V.), the Research Foundation-Flanders (grants G.0747.09,\r\nG094011 and G095511) (to P.V.), the Hercules Foundation, an Interuniversity Attraction\r\nPoles Poles Program, initiated by the Belgian State, Science Policy Office (to P.V.),\r\nthe Swedish VetenskapsRådet grant to O.K., the Ghent University ‘Bijzonder\r\nOnderzoek Fonds’ (BOF) for a predoctoral fellowship to F.A.O.-M., the Research\r\nFoundation-Flanders (FWO) to K.M. and E.R.","date_created":"2018-12-11T11:51:30Z","date_updated":"2023-09-07T12:54:35Z","volume":7,"author":[{"first_name":"Wim","last_name":"Dejonghe","full_name":"Dejonghe, Wim"},{"full_name":"Kuenen, Sabine","last_name":"Kuenen","first_name":"Sabine"},{"full_name":"Mylle, Evelien","last_name":"Mylle","first_name":"Evelien"},{"first_name":"Mina K","last_name":"Vasileva","id":"3407EB18-F248-11E8-B48F-1D18A9856A87","full_name":"Vasileva, Mina K"},{"full_name":"Keech, Olivier","first_name":"Olivier","last_name":"Keech"},{"full_name":"Viotti, Corrado","last_name":"Viotti","first_name":"Corrado"},{"first_name":"Jef","last_name":"Swerts","full_name":"Swerts, Jef"},{"full_name":"Fendrych, Matyas","orcid":"0000-0002-9767-8699","id":"43905548-F248-11E8-B48F-1D18A9856A87","last_name":"Fendrych","first_name":"Matyas"},{"last_name":"Ortiz Morea","first_name":"Fausto","full_name":"Ortiz Morea, Fausto"},{"first_name":"Kiril","last_name":"Mishev","full_name":"Mishev, Kiril"},{"first_name":"Simon","last_name":"Delang","full_name":"Delang, Simon"},{"last_name":"Scholl","first_name":"Stefan","full_name":"Scholl, Stefan"},{"last_name":"Zarza","first_name":"Xavier","full_name":"Zarza, Xavier"},{"last_name":"Heilmann","first_name":"Mareike","full_name":"Heilmann, Mareike"},{"full_name":"Kourelis, Jiorgos","first_name":"Jiorgos","last_name":"Kourelis"},{"last_name":"Kasprowicz","first_name":"Jaroslaw","full_name":"Kasprowicz, Jaroslaw"},{"full_name":"Nguyen, Le","last_name":"Nguyen","first_name":"Le"},{"full_name":"Drozdzecki, Andrzej","first_name":"Andrzej","last_name":"Drozdzecki"},{"last_name":"Van Houtte","first_name":"Isabelle","full_name":"Van Houtte, Isabelle"},{"full_name":"Szatmári, Anna","last_name":"Szatmári","first_name":"Anna"},{"last_name":"Majda","first_name":"Mateusz","full_name":"Majda, Mateusz"},{"first_name":"Gary","last_name":"Baisa","full_name":"Baisa, Gary"},{"first_name":"Sebastian","last_name":"Bednarek","full_name":"Bednarek, Sebastian"},{"last_name":"Robert","first_name":"Stéphanie","full_name":"Robert, Stéphanie"},{"full_name":"Audenaert, Dominique","first_name":"Dominique","last_name":"Audenaert"},{"first_name":"Christa","last_name":"Testerink","full_name":"Testerink, Christa"},{"full_name":"Munnik, Teun","first_name":"Teun","last_name":"Munnik"},{"full_name":"Van Damme, Daniël","last_name":"Van Damme","first_name":"Daniël"},{"last_name":"Heilmann","first_name":"Ingo","full_name":"Heilmann, Ingo"},{"full_name":"Schumacher, Karin","last_name":"Schumacher","first_name":"Karin"},{"full_name":"Winne, Johan","first_name":"Johan","last_name":"Winne"},{"full_name":"Friml, Jirí","orcid":"0000-0002-8302-7596","id":"4159519E-F248-11E8-B48F-1D18A9856A87","last_name":"Friml","first_name":"Jirí"},{"first_name":"Patrik","last_name":"Verstreken","full_name":"Verstreken, Patrik"},{"first_name":"Eugenia","last_name":"Russinova","full_name":"Russinova, Eugenia"}],"related_material":{"record":[{"id":"7172","relation":"dissertation_contains","status":"public"}]},"article_number":"11710","file_date_updated":"2020-07-14T12:44:45Z","ec_funded":1,"publist_id":"5906","quality_controlled":"1","project":[{"call_identifier":"FP7","name":"Polarity and subcellular dynamics in plants","_id":"25716A02-B435-11E9-9278-68D0E5697425","grant_number":"282300"}],"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"oa":1,"language":[{"iso":"eng"}],"doi":"10.1038/ncomms11710","month":"06"},{"quality_controlled":"1","page":"493 - 506","publication":"Developmental Cell","citation":{"short":"C. Schwayer, M.K. Sikora, J. Slovakova, R. Kardos, C.-P.J. Heisenberg, Developmental Cell 37 (2016) 493–506.","mla":"Schwayer, Cornelia, et al. “Actin Rings of Power.” Developmental Cell, vol. 37, no. 6, Cell Press, 2016, pp. 493–506, doi:10.1016/j.devcel.2016.05.024.","chicago":"Schwayer, Cornelia, Mateusz K Sikora, Jana Slovakova, Roland Kardos, and Carl-Philipp J Heisenberg. “Actin Rings of Power.” Developmental Cell. Cell Press, 2016. https://doi.org/10.1016/j.devcel.2016.05.024.","ama":"Schwayer C, Sikora MK, Slovakova J, Kardos R, Heisenberg C-PJ. Actin rings of power. Developmental Cell. 2016;37(6):493-506. doi:10.1016/j.devcel.2016.05.024","apa":"Schwayer, C., Sikora, M. K., Slovakova, J., Kardos, R., & Heisenberg, C.-P. J. (2016). Actin rings of power. Developmental Cell. Cell Press. https://doi.org/10.1016/j.devcel.2016.05.024","ieee":"C. Schwayer, M. K. Sikora, J. Slovakova, R. Kardos, and C.-P. J. Heisenberg, “Actin rings of power,” Developmental Cell, vol. 37, no. 6. Cell Press, pp. 493–506, 2016.","ista":"Schwayer C, Sikora MK, Slovakova J, Kardos R, Heisenberg C-PJ. 2016. Actin rings of power. Developmental Cell. 37(6), 493–506."},"language":[{"iso":"eng"}],"doi":"10.1016/j.devcel.2016.05.024","date_published":"2016-06-20T00:00:00Z","scopus_import":1,"day":"20","month":"06","publication_status":"published","status":"public","title":"Actin rings of power","publisher":"Cell Press","department":[{"_id":"CaHe"}],"intvolume":" 37","year":"2016","_id":"1096","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","date_created":"2018-12-11T11:50:07Z","date_updated":"2023-09-07T12:56:41Z","oa_version":"None","volume":37,"author":[{"full_name":"Schwayer, Cornelia","orcid":"0000-0001-5130-2226","id":"3436488C-F248-11E8-B48F-1D18A9856A87","last_name":"Schwayer","first_name":"Cornelia"},{"full_name":"Sikora, Mateusz K","last_name":"Sikora","first_name":"Mateusz K","id":"2F74BCDE-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Slovakova, Jana","last_name":"Slovakova","first_name":"Jana","id":"30F3F2F0-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Kardos, Roland","id":"4039350E-F248-11E8-B48F-1D18A9856A87","first_name":"Roland","last_name":"Kardos"},{"full_name":"Heisenberg, Carl-Philipp J","first_name":"Carl-Philipp J","last_name":"Heisenberg","id":"39427864-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-0912-4566"}],"related_material":{"record":[{"id":"7186","relation":"part_of_dissertation","status":"public"}]},"type":"journal_article","publist_id":"6279","issue":"6"},{"file_date_updated":"2020-07-14T12:44:44Z","publist_id":"5941","ec_funded":1,"acknowledgement":"The work was supported by the EC FP7 ICT project SiSPIN no. 323841, the EC FP7 ICT project PAMS no. 610446, the ERC Starting Grant no. 335497, the FWF-I-1190-N20 project, and the Swiss NSF. We acknowledge F. Schäffler for fruitful discussions related to the hut wire growth and for giving us access to the molecular beam epitaxy system, M. Schatzl for her support in electron beam lithography, and V. Jadris ̌ko for helping us with the COMSOL simulations. Finally, we thank G. Bauer for his continuous support. ","year":"2016","publication_status":"published","department":[{"_id":"GeKa"}],"publisher":"American Chemical Society","author":[{"full_name":"Watzinger, Hannes","id":"35DF8E50-F248-11E8-B48F-1D18A9856A87","first_name":"Hannes","last_name":"Watzinger"},{"full_name":"Kloeffel, Christoph","first_name":"Christoph","last_name":"Kloeffel"},{"full_name":"Vukusic, Lada","last_name":"Vukusic","first_name":"Lada","orcid":"0000-0003-2424-8636","id":"31E9F056-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Rossell, Marta","last_name":"Rossell","first_name":"Marta"},{"full_name":"Sessi, Violetta","last_name":"Sessi","first_name":"Violetta"},{"first_name":"Josip","last_name":"Kukucka","id":"3F5D8856-F248-11E8-B48F-1D18A9856A87","full_name":"Kukucka, Josip"},{"first_name":"Raimund","last_name":"Kirchschlager","full_name":"Kirchschlager, Raimund"},{"full_name":"Lausecker, Elisabeth","last_name":"Lausecker","first_name":"Elisabeth","id":"33662F76-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Truhlar, Alisha","id":"49CBC780-F248-11E8-B48F-1D18A9856A87","last_name":"Truhlar","first_name":"Alisha"},{"full_name":"Glaser, Martin","last_name":"Glaser","first_name":"Martin"},{"full_name":"Rastelli, Armando","first_name":"Armando","last_name":"Rastelli"},{"last_name":"Fuhrer","first_name":"Andreas","full_name":"Fuhrer, Andreas"},{"full_name":"Loss, Daniel","last_name":"Loss","first_name":"Daniel"},{"last_name":"Katsaros","first_name":"Georgios","orcid":"0000-0001-8342-202X","id":"38DB5788-F248-11E8-B48F-1D18A9856A87","full_name":"Katsaros, Georgios"}],"related_material":{"record":[{"relation":"popular_science","status":"for_moderation","id":"7977"},{"relation":"dissertation_contains","status":"public","id":"7996"}]},"date_updated":"2023-09-07T13:15:02Z","date_created":"2018-12-11T11:51:24Z","volume":16,"month":"09","oa":1,"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"quality_controlled":"1","project":[{"call_identifier":"FP7","name":"Towards Spin qubits and Majorana fermions in Germanium selfassembled hut-wires","_id":"25517E86-B435-11E9-9278-68D0E5697425","grant_number":"335497"}],"doi":"10.1021/acs.nanolett.6b02715","language":[{"iso":"eng"}],"type":"journal_article","abstract":[{"text":"Hole spins have gained considerable interest in the past few years due to their potential for fast electrically controlled qubits. Here, we study holes confined in Ge hut wires, a so-far unexplored type of nanostructure. Low-temperature magnetotransport measurements reveal a large anisotropy between the in-plane and out-of-plane g-factors of up to 18. Numerical simulations verify that this large anisotropy originates from a confined wave function of heavy-hole character. A light-hole admixture of less than 1% is estimated for the states of lowest energy, leading to a surprisingly large reduction of the out-of-plane g-factors compared with those for pure heavy holes. Given this tiny light-hole contribution, the spin lifetimes are expected to be very long, even in isotopically nonpurified samples.","lang":"eng"}],"issue":"11","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","_id":"1328","ddc":["539"],"title":"Heavy-hole states in germanium hut wires","status":"public","intvolume":" 16","pubrep_id":"664","file":[{"content_type":"application/pdf","file_size":535121,"creator":"system","file_name":"IST-2016-664-v1+1_acs.nanolett.6b02715.pdf","access_level":"open_access","date_created":"2018-12-12T10:14:04Z","date_updated":"2020-07-14T12:44:44Z","checksum":"b63feece90d7b620ece49ca632e34ff3","relation":"main_file","file_id":"5053"}],"oa_version":"Published Version","scopus_import":1,"day":"22","has_accepted_license":"1","publication":"Nano Letters","citation":{"ieee":"H. Watzinger et al., “Heavy-hole states in germanium hut wires,” Nano Letters, vol. 16, no. 11. American Chemical Society, pp. 6879–6885, 2016.","apa":"Watzinger, H., Kloeffel, C., Vukušić, L., Rossell, M., Sessi, V., Kukucka, J., … Katsaros, G. (2016). Heavy-hole states in germanium hut wires. Nano Letters. American Chemical Society. https://doi.org/10.1021/acs.nanolett.6b02715","ista":"Watzinger H, Kloeffel C, Vukušić L, Rossell M, Sessi V, Kukucka J, Kirchschlager R, Lausecker E, Truhlar A, Glaser M, Rastelli A, Fuhrer A, Loss D, Katsaros G. 2016. Heavy-hole states in germanium hut wires. Nano Letters. 16(11), 6879–6885.","ama":"Watzinger H, Kloeffel C, Vukušić L, et al. Heavy-hole states in germanium hut wires. Nano Letters. 2016;16(11):6879-6885. doi:10.1021/acs.nanolett.6b02715","chicago":"Watzinger, Hannes, Christoph Kloeffel, Lada Vukušić, Marta Rossell, Violetta Sessi, Josip Kukucka, Raimund Kirchschlager, et al. “Heavy-Hole States in Germanium Hut Wires.” Nano Letters. American Chemical Society, 2016. https://doi.org/10.1021/acs.nanolett.6b02715.","short":"H. Watzinger, C. Kloeffel, L. Vukušić, M. Rossell, V. Sessi, J. Kukucka, R. Kirchschlager, E. Lausecker, A. Truhlar, M. Glaser, A. Rastelli, A. Fuhrer, D. Loss, G. Katsaros, Nano Letters 16 (2016) 6879–6885.","mla":"Watzinger, Hannes, et al. “Heavy-Hole States in Germanium Hut Wires.” Nano Letters, vol. 16, no. 11, American Chemical Society, 2016, pp. 6879–85, doi:10.1021/acs.nanolett.6b02715."},"page":"6879 - 6885","date_published":"2016-09-22T00:00:00Z"},{"file_date_updated":"2020-07-14T12:44:39Z","publist_id":"6144","year":"2016","acknowledgement":"This research is sponsored in part by NSFC Program (No. 91218302, No. 61527812), National Science and Technology Major Project (No. 2016ZX01038101), Tsinghua University Initiative Scientific Research Program (20131089331), MIIT IT funds (Research and application of TCN key technologies) of China, and the National Key Technology R&D Program (No. 2015BAG14B01-02), Austrian Science Fund (FWF) under grants S11402-N23 (RiSE/SHiNE) and Z211-N23.\r\n","publication_status":"published","publisher":"Springer","department":[{"_id":"ToHe"}],"author":[{"last_name":"Jiang","first_name":"Yu","full_name":"Jiang, Yu"},{"first_name":"Han","last_name":"Liu","full_name":"Liu, Han"},{"full_name":"Song, Houbing","first_name":"Houbing","last_name":"Song"},{"orcid":"0000-0002-3066-6941","id":"3BDE25AA-F248-11E8-B48F-1D18A9856A87","last_name":"Kong","first_name":"Hui","full_name":"Kong, Hui"},{"full_name":"Gu, Ming","last_name":"Gu","first_name":"Ming"},{"first_name":"Jiaguang","last_name":"Sun","full_name":"Sun, Jiaguang"},{"full_name":"Sha, Lui","last_name":"Sha","first_name":"Lui"}],"related_material":{"record":[{"id":"434","relation":"later_version","status":"public"}]},"date_updated":"2023-09-18T08:12:48Z","date_created":"2018-12-11T11:50:42Z","volume":9995,"month":"11","oa":1,"quality_controlled":"1","project":[{"call_identifier":"FWF","name":"Rigorous Systems Engineering","grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425"},{"call_identifier":"FWF","name":"The Wittgenstein Prize","_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211"}],"conference":{"name":"FM: International Symposium on Formal Methods","end_date":"2016-11-11","start_date":"2016-11-09","location":"Limassol, Cyprus"},"doi":"10.1007/978-3-319-48989-6_47","language":[{"iso":"eng"}],"type":"conference","alternative_title":["LNCS"],"abstract":[{"text":"In this paper, we present a formal model-driven engineering approach to establishing a safety-assured implementation of Multifunction vehicle bus controller (MVBC) based on the generic reference models and requirements described in the International Electrotechnical Commission (IEC) standard IEC-61375. First, the generic models described in IEC-61375 are translated into a network of timed automata, and some safety requirements tested in IEC-61375 are formalized as timed computation tree logic (TCTL) formulas. With the help of Uppaal, we check and debug whether the timed automata satisfy the formulas or not. Within this step, several logic inconsistencies in the original standard are detected and corrected. Then, we apply the tool Times to generate C code from the verified model, which was later synthesized into a real MVBC chip. Finally, the runtime verification tool RMOR is applied to verify some safety requirements at the implementation level. We set up a real platform with worldwide mostly used MVBC D113, and verify the correctness and the scalability of the synthesized MVBC chip more comprehensively. The errors in the standard has been confirmed and the resulted MVBC has been deployed in real train communication network.","lang":"eng"}],"_id":"1205","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","status":"public","ddc":["004"],"title":"Safety assured formal model driven design of the multifunction vehicle bus controller","intvolume":" 9995","pubrep_id":"783","file":[{"date_updated":"2020-07-14T12:44:39Z","date_created":"2018-12-12T10:08:13Z","checksum":"fea0b3fae9a2a42e8bfec59840e30d8c","relation":"main_file","file_id":"4673","file_size":281501,"content_type":"application/pdf","creator":"system","file_name":"IST-2017-783-v1+1_FM-Safety-Assured-Development-of-MVBC.pdf","access_level":"open_access"}],"oa_version":"Submitted Version","scopus_import":1,"day":"08","has_accepted_license":"1","citation":{"ista":"Jiang Y, Liu H, Song H, Kong H, Gu M, Sun J, Sha L. 2016. Safety assured formal model driven design of the multifunction vehicle bus controller. FM: International Symposium on Formal Methods, LNCS, vol. 9995, 757–763.","apa":"Jiang, Y., Liu, H., Song, H., Kong, H., Gu, M., Sun, J., & Sha, L. (2016). Safety assured formal model driven design of the multifunction vehicle bus controller (Vol. 9995, pp. 757–763). Presented at the FM: International Symposium on Formal Methods, Limassol, Cyprus: Springer. https://doi.org/10.1007/978-3-319-48989-6_47","ieee":"Y. Jiang et al., “Safety assured formal model driven design of the multifunction vehicle bus controller,” presented at the FM: International Symposium on Formal Methods, Limassol, Cyprus, 2016, vol. 9995, pp. 757–763.","ama":"Jiang Y, Liu H, Song H, et al. Safety assured formal model driven design of the multifunction vehicle bus controller. In: Vol 9995. Springer; 2016:757-763. doi:10.1007/978-3-319-48989-6_47","chicago":"Jiang, Yu, Han Liu, Houbing Song, Hui Kong, Ming Gu, Jiaguang Sun, and Lui Sha. “Safety Assured Formal Model Driven Design of the Multifunction Vehicle Bus Controller,” 9995:757–63. Springer, 2016. https://doi.org/10.1007/978-3-319-48989-6_47.","mla":"Jiang, Yu, et al. Safety Assured Formal Model Driven Design of the Multifunction Vehicle Bus Controller. Vol. 9995, Springer, 2016, pp. 757–63, doi:10.1007/978-3-319-48989-6_47.","short":"Y. Jiang, H. Liu, H. Song, H. Kong, M. Gu, J. Sun, L. Sha, in:, Springer, 2016, pp. 757–763."},"page":"757 - 763","date_published":"2016-11-08T00:00:00Z"},{"related_material":{"record":[{"status":"public","relation":"later_version","id":"5975"}]},"author":[{"id":"3D50B0BA-F248-11E8-B48F-1D18A9856A87","first_name":"Vladimir","last_name":"Kolmogorov","full_name":"Kolmogorov, Vladimir"}],"volume":"2016-December","date_created":"2018-12-11T11:50:38Z","date_updated":"2023-09-19T14:24:57Z","year":"2016","acknowledgement":"European Unions Seventh Framework Programme (FP7/2007-2013)/ERC grant agreement no 616160","publisher":"IEEE","department":[{"_id":"VlKo"}],"publication_status":"published","publist_id":"6158","ec_funded":1,"article_number":"7782993","doi":"10.1109/FOCS.2016.88","conference":{"name":"FOCS: Foundations of Computer Science","location":"New Brunswick, NJ, USA ","start_date":"2016-09-09","end_date":"2016-09-11"},"language":[{"iso":"eng"}],"main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1506.08547v7"}],"oa":1,"external_id":{"arxiv":["1506.08547"]},"project":[{"grant_number":"616160","_id":"25FBA906-B435-11E9-9278-68D0E5697425","name":"Discrete Optimization in Computer Vision: Theory and Practice","call_identifier":"FP7"}],"quality_controlled":"1","month":"12","oa_version":"Preprint","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","_id":"1193","status":"public","title":"Commutativity in the algorithmic Lovasz local lemma","abstract":[{"lang":"eng","text":"We consider the recent formulation of the Algorithmic Lovász Local Lemma [1], [2] for finding objects that avoid "bad features", or "flaws". It extends the Moser-Tardos resampling algorithm [3] to more general discrete spaces. At each step the method picks a flaw present in the current state and "resamples" it using a "resampling oracle" provided by the user. However, it is less flexible than the Moser-Tardos method since [1], [2] require a specific flaw selection rule, whereas [3] allows an arbitrary rule (and thus can potentially be implemented more efficiently). We formulate a new "commutativity" condition, and prove that it is sufficient for an arbitrary rule to work. It also enables an efficient parallelization under an additional assumption. We then show that existing resampling oracles for perfect matchings and permutations do satisfy this condition. Finally, we generalize the precondition in [2] (in the case of symmetric potential causality graphs). This unifies special cases that previously were treated separately."}],"type":"conference","date_published":"2016-12-15T00:00:00Z","citation":{"chicago":"Kolmogorov, Vladimir. “Commutativity in the Algorithmic Lovasz Local Lemma.” In Proceedings - Annual IEEE Symposium on Foundations of Computer Science, Vol. 2016–December. IEEE, 2016. https://doi.org/10.1109/FOCS.2016.88.","mla":"Kolmogorov, Vladimir. “Commutativity in the Algorithmic Lovasz Local Lemma.” Proceedings - Annual IEEE Symposium on Foundations of Computer Science, vol. 2016–December, 7782993, IEEE, 2016, doi:10.1109/FOCS.2016.88.","short":"V. Kolmogorov, in:, Proceedings - Annual IEEE Symposium on Foundations of Computer Science, IEEE, 2016.","ista":"Kolmogorov V. 2016. Commutativity in the algorithmic Lovasz local lemma. Proceedings - Annual IEEE Symposium on Foundations of Computer Science. FOCS: Foundations of Computer Science vol. 2016–December, 7782993.","apa":"Kolmogorov, V. (2016). Commutativity in the algorithmic Lovasz local lemma. In Proceedings - Annual IEEE Symposium on Foundations of Computer Science (Vol. 2016–December). New Brunswick, NJ, USA : IEEE. https://doi.org/10.1109/FOCS.2016.88","ieee":"V. Kolmogorov, “Commutativity in the algorithmic Lovasz local lemma,” in Proceedings - Annual IEEE Symposium on Foundations of Computer Science, New Brunswick, NJ, USA , 2016, vol. 2016–December.","ama":"Kolmogorov V. Commutativity in the algorithmic Lovasz local lemma. In: Proceedings - Annual IEEE Symposium on Foundations of Computer Science. Vol 2016-December. IEEE; 2016. doi:10.1109/FOCS.2016.88"},"publication":"Proceedings - Annual IEEE Symposium on Foundations of Computer Science","article_processing_charge":"No","day":"15","scopus_import":1}]