[{"year":"2020","citation":{"ista":"Ölsböck K. 2020. The hole system of triangulated shapes. Institute of Science and Technology Austria.","short":"K. Ölsböck, The Hole System of Triangulated Shapes, Institute of Science and Technology Austria, 2020.","mla":"Ölsböck, Katharina. <i>The Hole System of Triangulated Shapes</i>. Institute of Science and Technology Austria, 2020, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:7460\">10.15479/AT:ISTA:7460</a>.","ieee":"K. Ölsböck, “The hole system of triangulated shapes,” Institute of Science and Technology Austria, 2020.","chicago":"Ölsböck, Katharina. “The Hole System of Triangulated Shapes.” Institute of Science and Technology Austria, 2020. <a href=\"https://doi.org/10.15479/AT:ISTA:7460\">https://doi.org/10.15479/AT:ISTA:7460</a>.","apa":"Ölsböck, K. (2020). <i>The hole system of triangulated shapes</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:7460\">https://doi.org/10.15479/AT:ISTA:7460</a>","ama":"Ölsböck K. The hole system of triangulated shapes. 2020. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:7460\">10.15479/AT:ISTA:7460</a>"},"date_updated":"2023-09-07T13:15:30Z","day":"10","doi":"10.15479/AT:ISTA:7460","degree_awarded":"PhD","abstract":[{"text":"Many methods for the reconstruction of shapes from sets of points produce ordered simplicial complexes, which are collections of vertices, edges, triangles, and their higher-dimensional analogues, called simplices, in which every simplex gets assigned a real value measuring its size. This thesis studies ordered simplicial complexes, with a focus on their topology, which reflects the connectedness of the represented shapes and the presence of holes. We are interested both in understanding better the structure of these complexes, as well as in developing algorithms for applications.\r\n\r\nFor the Delaunay triangulation, the most popular measure for a simplex is the radius of the smallest empty circumsphere. Based on it, we revisit Alpha and Wrap complexes and experimentally determine their probabilistic properties for random data. Also, we prove the existence of tri-partitions, propose algorithms to open and close holes, and extend the concepts from Euclidean to Bregman geometries.","lang":"eng"}],"ddc":["514"],"license":"https://creativecommons.org/licenses/by-nc-sa/4.0/","_id":"7460","author":[{"last_name":"Ölsböck","first_name":"Katharina","full_name":"Ölsböck, Katharina","orcid":"0000-0002-4672-8297","id":"4D4AA390-F248-11E8-B48F-1D18A9856A87"}],"date_created":"2020-02-06T14:56:53Z","department":[{"_id":"HeEd"},{"_id":"GradSch"}],"article_processing_charge":"No","publication_status":"published","alternative_title":["ISTA Thesis"],"title":"The hole system of triangulated shapes","page":"155","file_date_updated":"2020-07-14T12:47:58Z","publisher":"Institute of Science and Technology Austria","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode","name":"Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)","image":"/images/cc_by_nc_sa.png","short":"CC BY-NC-SA (4.0)"},"type":"dissertation","date_published":"2020-02-10T00:00:00Z","publication_identifier":{"issn":["2663-337X"]},"oa":1,"supervisor":[{"orcid":"0000-0002-9823-6833","full_name":"Edelsbrunner, Herbert","first_name":"Herbert","last_name":"Edelsbrunner","id":"3FB178DA-F248-11E8-B48F-1D18A9856A87"}],"file":[{"date_created":"2020-02-06T14:43:54Z","file_size":76195184,"checksum":"1df9f8c530b443c0e63a3f2e4fde412e","date_updated":"2020-07-14T12:47:58Z","content_type":"application/pdf","file_name":"thesis_ist-final_noack.pdf","relation":"main_file","access_level":"open_access","file_id":"7461","creator":"koelsboe"},{"date_updated":"2020-07-14T12:47:58Z","file_name":"latex-files.zip","content_type":"application/x-zip-compressed","date_created":"2020-02-06T14:52:45Z","file_size":122103715,"checksum":"7a52383c812b0be64d3826546509e5a4","file_id":"7462","creator":"koelsboe","access_level":"closed","relation":"source_file","description":"latex source files, figures"}],"status":"public","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","related_material":{"record":[{"relation":"part_of_dissertation","id":"6608","status":"public"}]},"has_accepted_license":"1","oa_version":"Published Version","month":"02","keyword":["shape reconstruction","hole manipulation","ordered complexes","Alpha complex","Wrap complex","computational topology","Bregman geometry"],"language":[{"iso":"eng"}]},{"file":[{"relation":"main_file","access_level":"open_access","creator":"dernst","file_id":"7515","checksum":"b4de7579ddc1dbdd44ff3f17c48395f6","file_size":1563429,"date_created":"2020-02-24T09:15:06Z","file_name":"thesis.pdf","content_type":"application/pdf","date_updated":"2020-07-14T12:47:59Z"},{"date_updated":"2020-07-14T12:47:59Z","content_type":"application/x-zip-compressed","file_name":"thesis_source.zip","date_created":"2020-02-24T09:15:16Z","file_size":2028038,"checksum":"ad7425867b52d7d9e72296e87bc9cb67","file_id":"7516","creator":"dernst","access_level":"closed","relation":"source_file"}],"related_material":{"record":[{"status":"public","id":"7524","relation":"part_of_dissertation"}]},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","status":"public","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"date_published":"2020-02-24T00:00:00Z","type":"dissertation","publication_identifier":{"issn":["2663-337X"]},"supervisor":[{"id":"4AFD0470-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-6781-0521","full_name":"Seiringer, Robert","first_name":"Robert","last_name":"Seiringer"}],"oa":1,"language":[{"iso":"eng"}],"has_accepted_license":"1","oa_version":"Published Version","project":[{"grant_number":"694227","name":"Analysis of quantum many-body systems","call_identifier":"H2020","_id":"25C6DC12-B435-11E9-9278-68D0E5697425"}],"month":"02","ddc":["510"],"date_updated":"2023-09-07T13:12:42Z","citation":{"mla":"Mayer, Simon. <i>The Free Energy of a Dilute Two-Dimensional Bose Gas</i>. Institute of Science and Technology Austria, 2020, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:7514\">10.15479/AT:ISTA:7514</a>.","short":"S. Mayer, The Free Energy of a Dilute Two-Dimensional Bose Gas, Institute of Science and Technology Austria, 2020.","ista":"Mayer S. 2020. The free energy of a dilute two-dimensional Bose gas. Institute of Science and Technology Austria.","apa":"Mayer, S. (2020). <i>The free energy of a dilute two-dimensional Bose gas</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:7514\">https://doi.org/10.15479/AT:ISTA:7514</a>","ama":"Mayer S. The free energy of a dilute two-dimensional Bose gas. 2020. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:7514\">10.15479/AT:ISTA:7514</a>","chicago":"Mayer, Simon. “The Free Energy of a Dilute Two-Dimensional Bose Gas.” Institute of Science and Technology Austria, 2020. <a href=\"https://doi.org/10.15479/AT:ISTA:7514\">https://doi.org/10.15479/AT:ISTA:7514</a>.","ieee":"S. Mayer, “The free energy of a dilute two-dimensional Bose gas,” Institute of Science and Technology Austria, 2020."},"year":"2020","doi":"10.15479/AT:ISTA:7514","degree_awarded":"PhD","day":"24","abstract":[{"lang":"eng","text":"We study the interacting homogeneous Bose gas in two spatial dimensions in the thermodynamic limit at fixed density. We shall be concerned with some mathematical aspects of this complicated problem in many-body quantum mechanics. More specifically, we consider the dilute limit where the scattering length of the interaction potential, which is a measure for the effective range of the potential, is small compared to the average distance between the particles. We are interested in a setting with positive (i.e., non-zero) temperature. After giving a survey of the relevant literature in the field, we provide some facts and examples to set expectations for the two-dimensional system. The crucial difference to the three-dimensional system is that there is no Bose–Einstein condensate at positive temperature due to the Hohenberg–Mermin–Wagner theorem. However, it turns out that an asymptotic formula for the free energy holds similarly to the three-dimensional case.\r\nWe motivate this formula by considering a toy model with δ interaction potential. By restricting this model Hamiltonian to certain trial states with a quasi-condensate we obtain an upper bound for the free energy that still has the quasi-condensate fraction as a free parameter. When minimizing over the quasi-condensate fraction, we obtain the Berezinskii–Kosterlitz–Thouless critical temperature for superfluidity, which plays an important role in our rigorous contribution. The mathematically rigorous result that we prove concerns the specific free energy in the dilute limit. We give upper and lower bounds on the free energy in terms of the free energy of the non-interacting system and a correction term coming from the interaction. Both bounds match and thus we obtain the leading term of an asymptotic approximation in the dilute limit, provided the thermal wavelength of the particles is of the same order (or larger) than the average distance between the particles. The remarkable feature of this result is its generality: the correction term depends on the interaction potential only through its scattering length and it holds for all nonnegative interaction potentials with finite scattering length that are measurable. In particular, this allows to model an interaction of hard disks."}],"page":"148","ec_funded":1,"file_date_updated":"2020-07-14T12:47:59Z","publisher":"Institute of Science and Technology Austria","_id":"7514","author":[{"full_name":"Mayer, Simon","first_name":"Simon","last_name":"Mayer","id":"30C4630A-F248-11E8-B48F-1D18A9856A87"}],"publication_status":"published","date_created":"2020-02-24T09:17:27Z","department":[{"_id":"RoSe"},{"_id":"GradSch"}],"article_processing_charge":"No","title":"The free energy of a dilute two-dimensional Bose gas","alternative_title":["ISTA Thesis"]},{"publication_identifier":{"eissn":["1730-6337"],"issn":["0039-3223"]},"type":"journal_article","date_published":"2020-03-01T00:00:00Z","status":"public","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","month":"03","oa_version":"Preprint","publication":"Studia Mathematica","keyword":["General Mathematics"],"language":[{"iso":"eng"}],"abstract":[{"text":"In order to provide a local description of a regular function in a small neighbourhood of a point x, it is sufficient by Taylor’s theorem to know the value of the function as well as all of its derivatives up to the required order at the point x itself. In other words, one could say that a regular function is locally modelled by the set of polynomials. The theory of regularity structures due to Hairer generalizes this observation and provides an abstract setup, which in the application to singular SPDE extends the set of polynomials by functionals constructed from, e.g., white noise. In this context, the notion of Taylor polynomials is lifted to the notion of so-called modelled distributions. The celebrated reconstruction theorem, which in turn was inspired by Gubinelli’s \\textit {sewing lemma}, is of paramount importance for the theory. It enables one to reconstruct a modelled distribution as a true distribution on Rd which is locally approximated by this extended set of models or “monomials”. In the original work of Hairer, the error is measured by means of Hölder norms. This was then generalized to the whole scale of Besov spaces by Hairer and Labbé. It is the aim of this work to adapt the analytic part of the theory of regularity structures to the scale of Triebel–Lizorkin spaces.","lang":"eng"}],"day":"01","doi":"10.4064/sm180411-11-2","arxiv":1,"external_id":{"isi":["000558100500002"],"arxiv":["1709.05202"]},"isi":1,"year":"2020","citation":{"short":"S. Hensel, T. Rosati, Studia Mathematica 252 (2020) 251–297.","mla":"Hensel, Sebastian, and Tommaso Rosati. “Modelled Distributions of Triebel–Lizorkin Type.” <i>Studia Mathematica</i>, vol. 252, no. 3, Instytut Matematyczny, 2020, pp. 251–97, doi:<a href=\"https://doi.org/10.4064/sm180411-11-2\">10.4064/sm180411-11-2</a>.","ista":"Hensel S, Rosati T. 2020. Modelled distributions of Triebel–Lizorkin type. Studia Mathematica. 252(3), 251–297.","ama":"Hensel S, Rosati T. Modelled distributions of Triebel–Lizorkin type. <i>Studia Mathematica</i>. 2020;252(3):251-297. doi:<a href=\"https://doi.org/10.4064/sm180411-11-2\">10.4064/sm180411-11-2</a>","apa":"Hensel, S., &#38; Rosati, T. (2020). Modelled distributions of Triebel–Lizorkin type. <i>Studia Mathematica</i>. Instytut Matematyczny. <a href=\"https://doi.org/10.4064/sm180411-11-2\">https://doi.org/10.4064/sm180411-11-2</a>","ieee":"S. Hensel and T. Rosati, “Modelled distributions of Triebel–Lizorkin type,” <i>Studia Mathematica</i>, vol. 252, no. 3. Instytut Matematyczny, pp. 251–297, 2020.","chicago":"Hensel, Sebastian, and Tommaso Rosati. “Modelled Distributions of Triebel–Lizorkin Type.” <i>Studia Mathematica</i>. Instytut Matematyczny, 2020. <a href=\"https://doi.org/10.4064/sm180411-11-2\">https://doi.org/10.4064/sm180411-11-2</a>."},"date_updated":"2023-10-17T09:15:53Z","volume":252,"intvolume":"       252","title":"Modelled distributions of Triebel–Lizorkin type","department":[{"_id":"JuFi"},{"_id":"GradSch"}],"date_created":"2021-02-25T08:55:03Z","article_processing_charge":"No","publication_status":"published","issue":"3","author":[{"last_name":"Hensel","first_name":"Sebastian","full_name":"Hensel, Sebastian","orcid":"0000-0001-7252-8072","id":"4D23B7DA-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Rosati","first_name":"Tommaso","full_name":"Rosati, Tommaso"}],"scopus_import":"1","_id":"9196","article_type":"original","publisher":"Instytut Matematyczny","quality_controlled":"1","page":"251-297"},{"abstract":[{"text":"The verification of concurrent programs remains an open challenge, as thread interaction has to be accounted for, which leads to state-space explosion. Stateless model checking battles this problem by exploring traces rather than states of the program. As there are exponentially many traces, dynamic partial-order reduction (DPOR) techniques are used to partition the trace space into equivalence classes, and explore a few representatives from each class. The standard equivalence that underlies most DPOR techniques is the happens-before equivalence, however recent works have spawned a vivid interest towards coarser equivalences. The efficiency of such approaches is a product of two parameters: (i) the size of the partitioning induced by the equivalence, and (ii) the time spent by the exploration algorithm in each class of the partitioning. In this work, we present a new equivalence, called value-happens-before and show that it has two appealing features. First, value-happens-before is always at least as coarse as the happens-before equivalence, and can be even exponentially coarser. Second, the value-happens-before partitioning is efficiently explorable when the number of threads is bounded. We present an algorithm called value-centric DPOR (VCDPOR), which explores the underlying partitioning using polynomial time per class. Finally, we perform an experimental evaluation of VCDPOR on various benchmarks, and compare it against other state-of-the-art approaches. Our results show that value-happens-before typically induces a significant reduction in the size of the underlying partitioning, which leads to a considerable reduction in the running time for exploring the whole partitioning.","lang":"eng"}],"day":"10","arxiv":1,"doi":"10.1145/3360550","external_id":{"arxiv":["1909.00989"]},"year":"2019","citation":{"ieee":"K. Chatterjee, A. Pavlogiannis, and V. Toman, “Value-centric dynamic partial order reduction,” in <i>Proceedings of the 34th ACM International Conference on Object-Oriented Programming, Systems, Languages, and Applications</i>, Athens, Greece, 2019, vol. 3.","chicago":"Chatterjee, Krishnendu, Andreas Pavlogiannis, and Viktor Toman. “Value-Centric Dynamic Partial Order Reduction.” In <i>Proceedings of the 34th ACM International Conference on Object-Oriented Programming, Systems, Languages, and Applications</i>, Vol. 3. ACM, 2019. <a href=\"https://doi.org/10.1145/3360550\">https://doi.org/10.1145/3360550</a>.","ama":"Chatterjee K, Pavlogiannis A, Toman V. Value-centric dynamic partial order reduction. In: <i>Proceedings of the 34th ACM International Conference on Object-Oriented Programming, Systems, Languages, and Applications</i>. Vol 3. ACM; 2019. doi:<a href=\"https://doi.org/10.1145/3360550\">10.1145/3360550</a>","apa":"Chatterjee, K., Pavlogiannis, A., &#38; Toman, V. (2019). Value-centric dynamic partial order reduction. In <i>Proceedings of the 34th ACM International Conference on Object-Oriented Programming, Systems, Languages, and Applications</i> (Vol. 3). Athens, Greece: ACM. <a href=\"https://doi.org/10.1145/3360550\">https://doi.org/10.1145/3360550</a>","ista":"Chatterjee K, Pavlogiannis A, Toman V. 2019. Value-centric dynamic partial order reduction. Proceedings of the 34th ACM International Conference on Object-Oriented Programming, Systems, Languages, and Applications. OOPSLA: Object-oriented Programming, Systems, Languages and Applications vol. 3, 124.","short":"K. Chatterjee, A. Pavlogiannis, V. Toman, in:, Proceedings of the 34th ACM International Conference on Object-Oriented Programming, Systems, Languages, and Applications, ACM, 2019.","mla":"Chatterjee, Krishnendu, et al. “Value-Centric Dynamic Partial Order Reduction.” <i>Proceedings of the 34th ACM International Conference on Object-Oriented Programming, Systems, Languages, and Applications</i>, vol. 3, 124, ACM, 2019, doi:<a href=\"https://doi.org/10.1145/3360550\">10.1145/3360550</a>."},"date_updated":"2025-07-14T09:10:15Z","ddc":["000"],"acknowledgement":"The authors would also like to thank anonymous referees for their valuable comments and helpful suggestions. This work is supported by the Austrian Science Fund (FWF) NFN grants S11407-N23 (RiSE/SHiNE) and S11402-N23 (RiSE/SHiNE), by the Vienna Science and Technology Fund (WWTF) Project ICT15-003, and by the Austrian Science Fund (FWF) Schrodinger grant J-4220.\r\n","volume":3,"intvolume":"         3","title":"Value-centric dynamic partial order reduction","date_created":"2021-10-27T14:57:06Z","article_processing_charge":"No","department":[{"_id":"GradSch"},{"_id":"KrCh"}],"publication_status":"published","author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu","orcid":"0000-0002-4561-241X","last_name":"Chatterjee","first_name":"Krishnendu"},{"id":"49704004-F248-11E8-B48F-1D18A9856A87","last_name":"Pavlogiannis","first_name":"Andreas","full_name":"Pavlogiannis, Andreas","orcid":"0000-0002-8943-0722"},{"first_name":"Viktor","last_name":"Toman","orcid":"0000-0001-9036-063X","full_name":"Toman, Viktor","id":"3AF3DA7C-F248-11E8-B48F-1D18A9856A87"}],"_id":"10190","publisher":"ACM","file_date_updated":"2021-11-12T11:41:56Z","quality_controlled":"1","oa":1,"publication_identifier":{"eissn":["2475-1421"]},"type":"conference","date_published":"2019-10-10T00:00:00Z","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"status":"public","related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"10199"}]},"user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","main_file_link":[{"open_access":"1","url":"https://dl.acm.org/doi/10.1145/3360550"}],"file":[{"file_size":570829,"checksum":"2149979c46964c4d117af06ccb6c0834","date_created":"2021-11-12T11:41:56Z","file_name":"2019_ACM_Chatterjee.pdf","content_type":"application/pdf","date_updated":"2021-11-12T11:41:56Z","success":1,"relation":"main_file","access_level":"open_access","creator":"cchlebak","file_id":"10278"}],"article_number":"124","month":"10","project":[{"_id":"25892FC0-B435-11E9-9278-68D0E5697425","name":"Efficient Algorithms for Computer Aided Verification","grant_number":"ICT15-003"},{"_id":"25863FF4-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","grant_number":"S11407","name":"Game Theory"},{"_id":"25832EC2-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Rigorous Systems Engineering","grant_number":"S 11407_N23"},{"grant_number":"S11402-N23","name":"Moderne Concurrency Paradigms","call_identifier":"FWF","_id":"25F5A88A-B435-11E9-9278-68D0E5697425"}],"oa_version":"Published Version","has_accepted_license":"1","publication":"Proceedings of the 34th ACM International Conference on Object-Oriented Programming, Systems, Languages, and Applications","conference":{"name":"OOPSLA: Object-oriented Programming, Systems, Languages and Applications","start_date":"2019-10-23","end_date":"2019-10-25","location":"Athens, Greece"},"keyword":["safety","risk","reliability and quality","software"],"language":[{"iso":"eng"}]},{"month":"09","oa_version":"Published Version","has_accepted_license":"1","language":[{"iso":"eng"}],"supervisor":[{"id":"38DB5788-F248-11E8-B48F-1D18A9856A87","full_name":"Katsaros, Georgios","orcid":"0000-0001-8342-202X","last_name":"Katsaros","first_name":"Georgios"}],"publist_id":"7985","oa":1,"publication_identifier":{"issn":["2663-337X"]},"date_published":"2018-09-01T00:00:00Z","type":"dissertation","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"related_material":{"record":[{"status":"public","relation":"part_of_dissertation","id":"23"},{"status":"public","relation":"part_of_dissertation","id":"840"}]},"status":"public","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","file":[{"relation":"main_file","access_level":"open_access","file_id":"6247","creator":"dernst","date_created":"2019-04-09T07:00:40Z","file_size":28452385,"checksum":"c570b656e30749cd65b1c7e13a9ce0a8","date_updated":"2020-07-14T12:47:44Z","file_name":"2018_Thesis_Vukusic.pdf","content_type":"application/pdf"},{"access_level":"closed","relation":"source_file","creator":"dernst","file_id":"6248","checksum":"7856771d9cd401fe0b311191076db6e1","file_size":53058704,"date_created":"2019-04-09T07:00:40Z","content_type":"application/zip","file_name":"2018_Thesis_Vukusic_source.zip","date_updated":"2020-07-14T12:47:44Z"}],"pubrep_id":"1047","alternative_title":["ISTA Thesis"],"title":"Charge sensing and spin relaxation times of holes in Ge hut wires","publication_status":"published","department":[{"_id":"GeKa"},{"_id":"GradSch"}],"article_processing_charge":"No","date_created":"2018-12-11T11:44:28Z","author":[{"orcid":"0000-0003-2424-8636","full_name":"Vukušić, Lada","first_name":"Lada","last_name":"Vukušić","id":"31E9F056-F248-11E8-B48F-1D18A9856A87"}],"_id":"69","publisher":"Institute of Science and Technology Austria","file_date_updated":"2020-07-14T12:47:44Z","page":"103","abstract":[{"lang":"eng","text":"A qubit, a unit of quantum information, is essentially any quantum mechanical two-level system which can be coherently controlled. Still, to be used for computation, it has to fulfill criteria. Qubits, regardless of the system in which they are realized, suffer from decoherence. This leads to loss of the information stored in the qubit. The upper bound of the time scale on which decoherence happens is set by the spin relaxation time. In this thesis I studied a two-level system consisting of a Zeeman-split hole spin confined in a quantum dot formed in a Ge hut wire. Such Ge hut wires have emerged as a promising material system for the realization of spin qubits, due to the combination of two significant properties: long spin coherence time as expected for group IV semiconductors due to the low hyperfine interaction and a strong valence band spin-orbit coupling. Here, I present how to fabricate quantum dot devices suitable for electrical transport measurements. Coupled quantum dot devices allowed the realization of a charge sensor, which is electrostatically and tunnel coupled to a quantum dot. By integrating the charge sensor into a radio-frequency reflectometry setup, I performed for the first time single-shot readout measurements of hole spins and extracted the hole spin relaxation times in Ge hut wires."}],"doi":"10.15479/AT:ISTA:TH_1047","degree_awarded":"PhD","day":"01","date_updated":"2023-09-26T15:50:22Z","citation":{"ama":"Vukušić L. Charge sensing and spin relaxation times of holes in Ge hut wires. 2018. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:TH_1047\">10.15479/AT:ISTA:TH_1047</a>","apa":"Vukušić, L. (2018). <i>Charge sensing and spin relaxation times of holes in Ge hut wires</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:TH_1047\">https://doi.org/10.15479/AT:ISTA:TH_1047</a>","ieee":"L. Vukušić, “Charge sensing and spin relaxation times of holes in Ge hut wires,” Institute of Science and Technology Austria, 2018.","chicago":"Vukušić, Lada. “Charge Sensing and Spin Relaxation Times of Holes in Ge Hut Wires.” Institute of Science and Technology Austria, 2018. <a href=\"https://doi.org/10.15479/AT:ISTA:TH_1047\">https://doi.org/10.15479/AT:ISTA:TH_1047</a>.","short":"L. Vukušić, Charge Sensing and Spin Relaxation Times of Holes in Ge Hut Wires, Institute of Science and Technology Austria, 2018.","mla":"Vukušić, Lada. <i>Charge Sensing and Spin Relaxation Times of Holes in Ge Hut Wires</i>. Institute of Science and Technology Austria, 2018, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:TH_1047\">10.15479/AT:ISTA:TH_1047</a>.","ista":"Vukušić L. 2018. Charge sensing and spin relaxation times of holes in Ge hut wires. Institute of Science and Technology Austria."},"year":"2018","ddc":["530","600"]},{"oa_version":"Published Version","month":"10","publication":"Molecular Plant Pathology","has_accepted_license":"1","language":[{"iso":"eng"}],"oa":1,"publist_id":"7950","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"date_published":"2018-10-01T00:00:00Z","type":"journal_article","file":[{"file_id":"5740","creator":"dernst","relation":"main_file","success":1,"access_level":"open_access","date_updated":"2018-12-18T09:46:00Z","file_name":"2018_MolecPlantPath_Seitner.pdf","content_type":"application/pdf","date_created":"2018-12-18T09:46:00Z","file_size":682335}],"status":"public","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","publication_status":"published","department":[{"_id":"GradSch"}],"date_created":"2018-12-11T11:44:39Z","article_processing_charge":"No","title":"The core effector Cce1 is required for early infection of maize by Ustilago maydis","intvolume":"        19","_id":"104","scopus_import":"1","author":[{"first_name":"Denise","last_name":"Seitner","full_name":"Seitner, Denise"},{"full_name":"Uhse, Simon","first_name":"Simon","last_name":"Uhse"},{"first_name":"Michelle C","last_name":"Gallei","orcid":"0000-0003-1286-7368","full_name":"Gallei, Michelle C","id":"35A03822-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Djamei","first_name":"Armin","full_name":"Djamei, Armin"}],"issue":"10","publisher":"Wiley","page":"2277 - 2287","quality_controlled":"1","file_date_updated":"2018-12-18T09:46:00Z","doi":"10.1111/mpp.12698","day":"01","abstract":[{"lang":"eng","text":"The biotrophic pathogen Ustilago maydis, the causative agent of corn smut disease, infects one of the most important crops worldwide – Zea mays. To successfully colonize its host, U. maydis secretes proteins, known as effectors, that suppress plant defense responses and facilitate the establishment of biotrophy. In this work, we describe the U. maydis effector protein Cce1. Cce1 is essential for virulence and is upregulated during infection. Through microscopic analysis and in vitro assays, we show that Cce1 is secreted from hyphae during filamentous growth of the fungus. Strikingly, Δcce1 mutants are blocked at early stages of infection and induce callose deposition as a plant defense response. Cce1 is highly conserved among smut fungi and the Ustilago bromivora ortholog complemented the virulence defect of the SG200Δcce1 deletion strain. These data indicate that Cce1 is a core effector with apoplastic localization that is essential for U. maydis to infect its host."}],"date_updated":"2023-09-19T10:06:42Z","citation":{"apa":"Seitner, D., Uhse, S., Gallei, M. C., &#38; Djamei, A. (2018). The core effector Cce1 is required for early infection of maize by Ustilago maydis. <i>Molecular Plant Pathology</i>. Wiley. <a href=\"https://doi.org/10.1111/mpp.12698\">https://doi.org/10.1111/mpp.12698</a>","ama":"Seitner D, Uhse S, Gallei MC, Djamei A. The core effector Cce1 is required for early infection of maize by Ustilago maydis. <i>Molecular Plant Pathology</i>. 2018;19(10):2277-2287. doi:<a href=\"https://doi.org/10.1111/mpp.12698\">10.1111/mpp.12698</a>","chicago":"Seitner, Denise, Simon Uhse, Michelle C Gallei, and Armin Djamei. “The Core Effector Cce1 Is Required for Early Infection of Maize by Ustilago Maydis.” <i>Molecular Plant Pathology</i>. Wiley, 2018. <a href=\"https://doi.org/10.1111/mpp.12698\">https://doi.org/10.1111/mpp.12698</a>.","ieee":"D. Seitner, S. Uhse, M. C. Gallei, and A. Djamei, “The core effector Cce1 is required for early infection of maize by Ustilago maydis,” <i>Molecular Plant Pathology</i>, vol. 19, no. 10. Wiley, pp. 2277–2287, 2018.","short":"D. Seitner, S. Uhse, M.C. Gallei, A. Djamei, Molecular Plant Pathology 19 (2018) 2277–2287.","mla":"Seitner, Denise, et al. “The Core Effector Cce1 Is Required for Early Infection of Maize by Ustilago Maydis.” <i>Molecular Plant Pathology</i>, vol. 19, no. 10, Wiley, 2018, pp. 2277–87, doi:<a href=\"https://doi.org/10.1111/mpp.12698\">10.1111/mpp.12698</a>.","ista":"Seitner D, Uhse S, Gallei MC, Djamei A. 2018. The core effector Cce1 is required for early infection of maize by Ustilago maydis. Molecular Plant Pathology. 19(10), 2277–2287."},"year":"2018","isi":1,"external_id":{"isi":["000445624100006"]},"acknowledgement":"the Austrian Science Fund (FWF): [P27429‐B22, P27818‐B22, I 3033‐B22], and the Austrian Academy of Science (OEAW).","volume":19,"ddc":["580"]},{"title":"Automatic synthesis of synchronisation primitives for concurrent programs","alternative_title":["ISTA Thesis"],"publication_status":"published","department":[{"_id":"ToHe"},{"_id":"GradSch"}],"date_created":"2018-12-11T11:50:19Z","article_processing_charge":"No","author":[{"id":"3D6E8F2C-F248-11E8-B48F-1D18A9856A87","first_name":"Thorsten","last_name":"Tarrach","orcid":"0000-0003-4409-8487","full_name":"Tarrach, Thorsten"}],"_id":"1130","publisher":"Institute of Science and Technology Austria","file_date_updated":"2021-11-17T13:46:55Z","page":"151","ec_funded":1,"abstract":[{"lang":"eng","text":"In this thesis we present a computer-aided programming approach to concurrency. Our approach helps the programmer by automatically fixing concurrency-related bugs, i.e. bugs that occur when the program is executed using an aggressive preemptive scheduler, but not when using a non-preemptive (cooperative) scheduler. Bugs are program behaviours that are incorrect w.r.t. a specification. We consider both user-provided explicit specifications in the form of assertion\r\nstatements in the code as well as an implicit specification. The implicit specification is inferred from the non-preemptive behaviour. Let us consider sequences of calls that the program makes to an external interface. The implicit specification requires that any such sequence produced under a preemptive scheduler should be included in the set of sequences produced under a non-preemptive scheduler. We consider several semantics-preserving fixes that go beyond atomic sections typically explored in the synchronisation synthesis literature. Our synthesis is able to place locks, barriers and wait-signal statements and last, but not least reorder independent statements. The latter may be useful if a thread is released to early, e.g., before some initialisation is completed. We guarantee that our synthesis does not introduce deadlocks and that the synchronisation inserted is optimal w.r.t. a given objective function. We dub our solution trace-based synchronisation synthesis and it is loosely based on counterexample-guided inductive synthesis (CEGIS). The synthesis works by discovering a trace that is incorrect w.r.t. the specification and identifying ordering constraints crucial to trigger the specification violation. Synchronisation may be placed immediately (greedy approach) or delayed until all incorrect traces are found (non-greedy approach). For the non-greedy approach we construct a set of global constraints over synchronisation placements. Each model of the global constraints set corresponds to a correctness-ensuring synchronisation placement. The placement that is optimal w.r.t. the given objective function is chosen as the synchronisation solution. We evaluate our approach on a number of realistic (albeit simplified) Linux device-driver\r\nbenchmarks. The benchmarks are versions of the drivers with known concurrency-related bugs. For the experiments with an explicit specification we added assertions that would detect the bugs in the experiments. Device drivers lend themselves to implicit specification, where the device and the operating system are the external interfaces. Our experiments demonstrate that our synthesis method is precise and efficient. We implemented objective functions for coarse-grained and fine-grained locking and observed that different synchronisation placements are produced for our experiments, favouring e.g. a minimal number of synchronisation operations or maximum concurrency."}],"doi":"10.15479/at:ista:1130","degree_awarded":"PhD","day":"07","date_updated":"2023-09-07T11:57:01Z","year":"2016","citation":{"chicago":"Tarrach, Thorsten. “Automatic Synthesis of Synchronisation Primitives for Concurrent Programs.” Institute of Science and Technology Austria, 2016. <a href=\"https://doi.org/10.15479/at:ista:1130\">https://doi.org/10.15479/at:ista:1130</a>.","ieee":"T. Tarrach, “Automatic synthesis of synchronisation primitives for concurrent programs,” Institute of Science and Technology Austria, 2016.","ama":"Tarrach T. Automatic synthesis of synchronisation primitives for concurrent programs. 2016. doi:<a href=\"https://doi.org/10.15479/at:ista:1130\">10.15479/at:ista:1130</a>","apa":"Tarrach, T. (2016). <i>Automatic synthesis of synchronisation primitives for concurrent programs</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/at:ista:1130\">https://doi.org/10.15479/at:ista:1130</a>","ista":"Tarrach T. 2016. Automatic synthesis of synchronisation primitives for concurrent programs. Institute of Science and Technology Austria.","short":"T. Tarrach, Automatic Synthesis of Synchronisation Primitives for Concurrent Programs, Institute of Science and Technology Austria, 2016.","mla":"Tarrach, Thorsten. <i>Automatic Synthesis of Synchronisation Primitives for Concurrent Programs</i>. Institute of Science and Technology Austria, 2016, doi:<a href=\"https://doi.org/10.15479/at:ista:1130\">10.15479/at:ista:1130</a>."},"ddc":["000"],"month":"07","oa_version":"Published Version","project":[{"call_identifier":"FP7","_id":"25EE3708-B435-11E9-9278-68D0E5697425","grant_number":"267989","name":"Quantitative Reactive Modeling"},{"_id":"25832EC2-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","grant_number":"S 11407_N23","name":"Rigorous Systems Engineering"},{"_id":"25F42A32-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"The Wittgenstein Prize","grant_number":"Z211"}],"has_accepted_license":"1","language":[{"iso":"eng"}],"supervisor":[{"full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"}],"publist_id":"6230","oa":1,"publication_identifier":{"issn":["2663-337X"]},"date_published":"2016-07-07T00:00:00Z","type":"dissertation","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","related_material":{"record":[{"status":"public","relation":"part_of_dissertation","id":"1729"},{"status":"public","id":"2218","relation":"part_of_dissertation"},{"status":"public","id":"2445","relation":"part_of_dissertation"}]},"status":"public","main_file_link":[{"url":"http://thorstent.github.io/theses/phd_thorsten_tarrach.pdf","open_access":"1"}],"file":[{"success":1,"access_level":"open_access","relation":"main_file","creator":"dernst","file_id":"9179","checksum":"319a506831650327e85376db41fc1094","file_size":1523935,"date_created":"2021-02-22T11:39:32Z","file_name":"2016_Tarrach_Thesis.pdf","content_type":"application/pdf","date_updated":"2021-02-22T11:39:32Z"},{"date_updated":"2021-11-17T13:46:55Z","file_name":"2016_Tarrach_Thesispdfa.pdf","content_type":"application/pdf","date_created":"2021-11-16T14:14:38Z","file_size":1306068,"checksum":"39efcd789f0ad859ff15652cb7afc412","file_id":"10296","creator":"cchlebak","access_level":"closed","relation":"main_file"}]},{"date_published":"2015-04-01T00:00:00Z","type":"dissertation","supervisor":[{"id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","first_name":"Christoph","last_name":"Lampert","orcid":"0000-0001-8622-7887","full_name":"Lampert, Christoph"}],"publist_id":"5806","oa":1,"publication_identifier":{"issn":["2663-337X"]},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","status":"public","main_file_link":[{"url":"http://users.sussex.ac.uk/~nq28/viktoriia/Thesis_Sharmanska.pdf"}],"file":[{"date_created":"2021-02-22T11:33:17Z","file_size":7964342,"checksum":"3605b402bb6934e09ae4cf672c84baf7","date_updated":"2021-02-22T11:33:17Z","content_type":"application/pdf","file_name":"2015_Thesis_Sharmanska.pdf","access_level":"open_access","relation":"main_file","success":1,"file_id":"9177","creator":"dernst"},{"relation":"main_file","access_level":"closed","file_id":"10297","creator":"cchlebak","date_created":"2021-11-16T14:40:45Z","checksum":"e37593b3ee75bf3180629df2d6ca8f4e","file_size":7372241,"date_updated":"2021-11-17T13:47:24Z","file_name":"2015_Thesis_Sharmanska_pdfa.pdf","content_type":"application/pdf"}],"has_accepted_license":"1","month":"04","oa_version":"Published Version","language":[{"iso":"eng"}],"date_updated":"2023-09-07T11:40:11Z","citation":{"ama":"Sharmanska V. Learning with attributes for object recognition: Parametric and non-parametrics views. 2015. doi:<a href=\"https://doi.org/10.15479/at:ista:1401\">10.15479/at:ista:1401</a>","apa":"Sharmanska, V. (2015). <i>Learning with attributes for object recognition: Parametric and non-parametrics views</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/at:ista:1401\">https://doi.org/10.15479/at:ista:1401</a>","ieee":"V. Sharmanska, “Learning with attributes for object recognition: Parametric and non-parametrics views,” Institute of Science and Technology Austria, 2015.","chicago":"Sharmanska, Viktoriia. “Learning with Attributes for Object Recognition: Parametric and Non-Parametrics Views.” Institute of Science and Technology Austria, 2015. <a href=\"https://doi.org/10.15479/at:ista:1401\">https://doi.org/10.15479/at:ista:1401</a>.","mla":"Sharmanska, Viktoriia. <i>Learning with Attributes for Object Recognition: Parametric and Non-Parametrics Views</i>. Institute of Science and Technology Austria, 2015, doi:<a href=\"https://doi.org/10.15479/at:ista:1401\">10.15479/at:ista:1401</a>.","short":"V. Sharmanska, Learning with Attributes for Object Recognition: Parametric and Non-Parametrics Views, Institute of Science and Technology Austria, 2015.","ista":"Sharmanska V. 2015. Learning with attributes for object recognition: Parametric and non-parametrics views. Institute of Science and Technology Austria."},"year":"2015","abstract":[{"lang":"eng","text":"The human ability to recognize objects in complex scenes has driven research in the computer vision field over couple of decades. This thesis focuses on the object recognition task in images. That is, given the image, we want the computer system to be able to predict the class of the object that appears in the image. A recent successful attempt to bridge semantic understanding of the image perceived by humans and by computers uses attribute-based models. Attributes are semantic properties of the objects shared across different categories, which humans and computers can decide on. To explore the attribute-based models we take a statistical machine learning approach, and address two key learning challenges in view of object recognition task: learning augmented attributes as mid-level discriminative feature representation, and learning with attributes as privileged information. Our main contributions are parametric and non-parametric models and algorithms to solve these frameworks. In the parametric approach, we explore an autoencoder model combined with the large margin nearest neighbor principle for mid-level feature learning, and linear support vector machines for learning with privileged information. In the non-parametric approach, we propose a supervised Indian Buffet Process for automatic augmentation of semantic attributes, and explore the Gaussian Processes classification framework for learning with privileged information. A thorough experimental analysis shows the effectiveness of the proposed models in both parametric and non-parametric views."}],"degree_awarded":"PhD","doi":"10.15479/at:ista:1401","day":"01","ddc":["000"],"acknowledgement":"I would like to thank my supervisor, Christoph Lampert, for guidance throughout my studies and for patience in transforming me into a scientist, and my thesis committee, Chris Wojtan and Horst Bischof, for their help and advice. \r\n\r\nI would like to thank Elisabeth Hacker who perfectly assisted all my administrative needs and was always nice and friendly to me, and the campus team for making the IST Austria campus my second home. \r\nI was honored to collaborate with brilliant researchers and to learn from their experience. Undoubtedly, I learned most of all from Novi Quadrianto: brainstorming our projects and getting exciting results was the most enjoyable part of my work – thank you! I am also grateful to David Knowles, Zoubin Ghahramani, Daniel Hernández-Lobato, Kristian Kersting and Anastasia Pentina for the fantastic projects we worked on together, and to Kristen Grauman and Adriana Kovashka for the exceptional experience working with user studies. I would like to thank my colleagues at IST Austria and my office mates who shared their happy moods, scientific breakthroughs and thought-provoking conversations with me: Chao, Filip, Rustem, Asya, Sameh, Alex, Vlad, Mayu, Neel, Csaba, Thomas, Vladimir, Cristina, Alex Z., Avro, Amelie and Emilie, Andreas H. and Andreas E., Chris, Lena, Michael, Ali and Ipek, Vera, Igor, Katia. Special thanks to Morten for the countless games of table soccer we played together and the tournaments we teamed up for: we will definitely win next time:) A very warm hug to Asya for always being so inspiring and supportive to me, and for helping me to increase the proportion of female computer scientists in our group. ","author":[{"id":"2EA6D09E-F248-11E8-B48F-1D18A9856A87","last_name":"Sharmanska","first_name":"Viktoriia","full_name":"Sharmanska, Viktoriia","orcid":"0000-0003-0192-9308"}],"_id":"1401","title":"Learning with attributes for object recognition: Parametric and non-parametrics views","alternative_title":["ISTA Thesis"],"publication_status":"published","date_created":"2018-12-11T11:51:48Z","article_processing_charge":"No","department":[{"_id":"ChLa"},{"_id":"GradSch"}],"file_date_updated":"2021-11-17T13:47:24Z","page":"144","publisher":"Institute of Science and Technology Austria"},{"publication_status":"published","department":[{"_id":"ToHe"},{"_id":"GradSch"}],"article_processing_charge":"No","date_created":"2018-12-11T11:51:50Z","alternative_title":["ISTA Thesis"],"title":"Analysis of dynamic message passing programs","_id":"1405","author":[{"id":"4397AC76-F248-11E8-B48F-1D18A9856A87","first_name":"Damien","last_name":"Zufferey","orcid":"0000-0002-3197-8736","full_name":"Zufferey, Damien"}],"publisher":"Institute of Science and Technology Austria","page":"134","ec_funded":1,"file_date_updated":"2021-11-17T13:47:58Z","doi":"10.15479/at:ista:1405","degree_awarded":"PhD","day":"05","abstract":[{"text":"Motivated by the analysis of highly dynamic message-passing systems, i.e. unbounded thread creation, mobility, etc. we present a framework for the analysis of depth-bounded systems. Depth-bounded systems are one of the most expressive known fragment of the π-calculus for which interesting verification problems are still decidable. Even though they are infinite state systems depth-bounded systems are well-structured, thus can be analyzed algorithmically. We give an interpretation of depth-bounded systems as graph-rewriting systems. This gives more flexibility and ease of use to apply depth-bounded systems to other type of systems like shared memory concurrency.\r\n\r\nFirst, we develop an adequate domain of limits for depth-bounded systems, a prerequisite for the effective representation of downward-closed sets. Downward-closed sets are needed by forward saturation-based algorithms to represent potentially infinite sets of states. Then, we present an abstract interpretation framework to compute the covering set of well-structured transition systems. Because, in general, the covering set is not computable, our abstraction over-approximates the actual covering set. Our abstraction captures the essence of acceleration based-algorithms while giving up enough precision to ensure convergence. We have implemented the analysis in the PICASSO tool and show that it is accurate in practice. Finally, we build some further analyses like termination using the covering set as starting point.","lang":"eng"}],"date_updated":"2023-09-07T11:36:37Z","year":"2013","citation":{"chicago":"Zufferey, Damien. “Analysis of Dynamic Message Passing Programs.” Institute of Science and Technology Austria, 2013. <a href=\"https://doi.org/10.15479/at:ista:1405\">https://doi.org/10.15479/at:ista:1405</a>.","ieee":"D. Zufferey, “Analysis of dynamic message passing programs,” Institute of Science and Technology Austria, 2013.","apa":"Zufferey, D. (2013). <i>Analysis of dynamic message passing programs</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/at:ista:1405\">https://doi.org/10.15479/at:ista:1405</a>","ama":"Zufferey D. Analysis of dynamic message passing programs. 2013. doi:<a href=\"https://doi.org/10.15479/at:ista:1405\">10.15479/at:ista:1405</a>","ista":"Zufferey D. 2013. Analysis of dynamic message passing programs. Institute of Science and Technology Austria.","short":"D. Zufferey, Analysis of Dynamic Message Passing Programs, Institute of Science and Technology Austria, 2013.","mla":"Zufferey, Damien. <i>Analysis of Dynamic Message Passing Programs</i>. Institute of Science and Technology Austria, 2013, doi:<a href=\"https://doi.org/10.15479/at:ista:1405\">10.15479/at:ista:1405</a>."},"acknowledgement":"This work was supported in part by the Austrian Science Fund NFN RiSE (Rigorous Systems Engineering) and by the ERC Advanced Grant QUAREM (Quantitative Reactve Modeling).\r\nChapter 2, 3, and 4 are joint work with Thomas A. Henzinger and Thomas Wies. Chapter 2 was published in FoSSaCS 2010 as “Forward Analysis of Depth-Bounded Processes” [112]. Chapter 3 was published in VMCAI 2012 as “Ideal Abstractions for Well-Structured Transition Systems” [114]. Chap- ter 5.1 is joint work with Kshitij Bansal, Eric Koskinen, and Thomas Wies. It was published in TACAS 2013 as “Structural Counter Abstraction” [13]. The author’s contribution in this part is mostly related to the implementation. The theory required to understand the method and its implementation is quickly recalled to make the thesis self-contained, but should not be considered as a contribution. For the details of the methods, we refer the reader to the orig- inal publication [13] and the corresponding technical report [14]. Chapter 5.2 is ongoing work with Shahram Esmaeilsabzali, Rupak Majumdar, and Thomas Wies. I also would like to thank the people who supported over the past 4 years. My advisor Thomas A. Henzinger who gave me a lot of freedom to work on projects I was interested in. My collaborators, especially Thomas Wies with whom I worked since the beginning. The members of my thesis committee, Viktor Kun- cak and Rupak Majumdar, who also agreed to advise me. Simon Aeschbacher, Pavol Cerny, Cezara Dragoi, Arjun Radhakrishna, my family, friends and col- leagues who created an enjoyable environment. ","ddc":["000"],"oa_version":"Published Version","project":[{"_id":"25832EC2-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Rigorous Systems Engineering","grant_number":"S 11407_N23"},{"_id":"25EE3708-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","name":"Quantitative Reactive Modeling","grant_number":"267989"}],"month":"09","has_accepted_license":"1","language":[{"iso":"eng"}],"publication_identifier":{"issn":["2663-337X"]},"supervisor":[{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724","last_name":"Henzinger","first_name":"Thomas A"}],"publist_id":"5802","oa":1,"date_published":"2013-09-05T00:00:00Z","type":"dissertation","file":[{"relation":"main_file","success":1,"access_level":"open_access","creator":"dernst","file_id":"9176","checksum":"ed2d7b52933d134e8dc69d569baa284e","file_size":1514906,"date_created":"2021-02-22T11:28:36Z","file_name":"2013_Zufferey_thesis_final.pdf","content_type":"application/pdf","date_updated":"2021-02-22T11:28:36Z"},{"relation":"main_file","access_level":"closed","creator":"cchlebak","file_id":"10298","checksum":"cecc4c4b14225bee973d32e3dba91a55","file_size":1378313,"date_created":"2021-11-16T14:42:52Z","file_name":"2013_Zufferey_thesis_final_pdfa.pdf","content_type":"application/pdf","date_updated":"2021-11-17T13:47:58Z"}],"main_file_link":[{"url":"http://dzufferey.github.io/files/2013_thesis.pdf"}],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","status":"public","related_material":{"record":[{"id":"2847","relation":"part_of_dissertation","status":"public"},{"relation":"part_of_dissertation","id":"3251","status":"public"},{"status":"public","id":"4361","relation":"part_of_dissertation"}]}},{"related_material":{"record":[{"id":"3258","relation":"part_of_dissertation","status":"public"}]},"status":"public","user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","publist_id":"3755","supervisor":[{"full_name":"Jonas, Peter M","orcid":"0000-0001-5001-4804","last_name":"Jonas","first_name":"Peter M","id":"353C1B58-F248-11E8-B48F-1D18A9856A87"}],"abstract":[{"text":"CA3 pyramidal neurons are important for memory formation and pattern completion in the hippocampal network. These neurons receive multiple excitatory inputs from numerous sources. Therefore, the rules of spatiotemporal integration of multiple synaptic inputs and propagation of action potentials are important to understand how CA3 neurons contribute to higher brain functions at cellular level. By using confocally targeted patch-clamp recording techniques, we investigated the biophysical properties of rat CA3 pyramidal neuron dendrites. We found two distinct dendritic domains critical for action potential initiation and propagation: In the proximal domain, action potentials initiated in the axon backpropagate actively with large amplitude and fast time course. In the distal domain, Na+-channel mediated dendritic spikes are efficiently evoked by local dendritic depolarization or waveforms mimicking synaptic events. These findings can be explained by a high Na+-to-K+ conductance density ratio of CA3 pyramidal neuron dendrites. The results challenge the prevailing view that proximal mossy fiber inputs activate CA3 pyramidal neurons more efficiently than distal perforant inputs by showing that the distal synapses trigger a different form of activity represented by dendritic spikes. The high probability of dendritic spike initiation in the distal area may enhance the computational power of CA3 pyramidal neurons in the hippocampal network.  ","lang":"eng"}],"publication_identifier":{"issn":["2663-337X"]},"day":"01","degree_awarded":"PhD","type":"dissertation","date_published":"2012-06-01T00:00:00Z","citation":{"ista":"Kim S. 2012. Active properties of hippocampal CA3 pyramidal neuron dendrites. Institute of Science and Technology Austria.","mla":"Kim, Sooyun. <i>Active Properties of Hippocampal CA3 Pyramidal Neuron Dendrites</i>. Institute of Science and Technology Austria, 2012.","short":"S. Kim, Active Properties of Hippocampal CA3 Pyramidal Neuron Dendrites, Institute of Science and Technology Austria, 2012.","chicago":"Kim, Sooyun. “Active Properties of Hippocampal CA3 Pyramidal Neuron Dendrites.” Institute of Science and Technology Austria, 2012.","ieee":"S. Kim, “Active properties of hippocampal CA3 pyramidal neuron dendrites,” Institute of Science and Technology Austria, 2012.","apa":"Kim, S. (2012). <i>Active properties of hippocampal CA3 pyramidal neuron dendrites</i>. Institute of Science and Technology Austria.","ama":"Kim S. Active properties of hippocampal CA3 pyramidal neuron dendrites. 2012."},"year":"2012","date_updated":"2023-09-07T11:43:51Z","publisher":"Institute of Science and Technology Austria","language":[{"iso":"eng"}],"page":"65","title":"Active properties of hippocampal CA3 pyramidal neuron dendrites","month":"06","alternative_title":["ISTA Thesis"],"department":[{"_id":"PeJo"},{"_id":"GradSch"}],"article_processing_charge":"No","date_created":"2018-12-11T12:00:35Z","oa_version":"None","publication_status":"published","author":[{"full_name":"Kim, Sooyun","last_name":"Kim","first_name":"Sooyun","id":"394AB1C8-F248-11E8-B48F-1D18A9856A87"}],"_id":"2964"},{"publisher":"Institute of Science and Technology Austria","language":[{"iso":"eng"}],"alternative_title":["ISTA Thesis"],"title":"﻿﻿Dendritic cell migration across basement membranes in the skin","month":"07","publication_status":"published","oa_version":"None","date_created":"2018-12-11T12:06:08Z","department":[{"_id":"CaHe"},{"_id":"GradSch"}],"article_processing_charge":"No","author":[{"full_name":"Pflicke, Holger","last_name":"Pflicke","first_name":"Holger","id":"CAA57A9A-5B61-11E9-B130-E0C1E1F2C83D"}],"_id":"3962","status":"public","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","supervisor":[{"last_name":"Heisenberg","first_name":"Carl-Philipp J","full_name":"Heisenberg, Carl-Philipp J","orcid":"0000-0002-0912-4566","id":"39427864-F248-11E8-B48F-1D18A9856A87"}],"publist_id":"2165","degree_awarded":"PhD","publication_identifier":{"issn":["2663-337X"]},"day":"01","date_published":"2010-07-01T00:00:00Z","type":"dissertation","date_updated":"2023-09-07T11:28:47Z","year":"2010","citation":{"short":"H. Pflicke,   Dendritic Cell Migration across Basement Membranes in the Skin, Institute of Science and Technology Austria, 2010.","mla":"Pflicke, Holger. <i>  Dendritic Cell Migration across Basement Membranes in the Skin</i>. Institute of Science and Technology Austria, 2010.","ista":"Pflicke H. 2010.   Dendritic cell migration across basement membranes in the skin. Institute of Science and Technology Austria.","ama":"Pflicke H.   Dendritic cell migration across basement membranes in the skin. 2010.","apa":"Pflicke, H. (2010). <i>  Dendritic cell migration across basement membranes in the skin</i>. Institute of Science and Technology Austria.","chicago":"Pflicke, Holger. “  Dendritic Cell Migration across Basement Membranes in the Skin.” Institute of Science and Technology Austria, 2010.","ieee":"H. Pflicke, “  Dendritic cell migration across basement membranes in the skin,” Institute of Science and Technology Austria, 2010."}}]
