[{"acknowledgement":"We dedicate this work to the memory of Michael J.O. Wakelam. We would like to acknowledge Michael Fasseas (Invermis, Magnitude Biosciences) for plasmid injections and Sunny Biotech for transgenics; Catalina Vallejos and John Marioni for statistical advice at the beginning of the work; Simon Walker, Imaging, Bioinformatics and Lipidomics Facilities at Babraham Institute for technical support; and Cindy Voisine, Michael Witting, Jon Houseley, Len Stephens, Carmen Nussbaum Krammer, Rebeca Aldunate, Patricija van Oosten-Hawle, Jean-Louis Bessereau, and Jane Alfred for feedback on the manuscript. We thank Andy Dillin, Atsushi Kuhara, Amy Walker, Andrew Leifer, Yun Zhang, and Michalis Barkoulas for reagents and Julie Ahringer, Anne Ferguson-Smith, and Anne Corcoran for support and helpful discussions. We also acknowledge Babraham Institute Facilities.","article_number":"e3001431","date_published":"2021-11-01T00:00:00Z","intvolume":"        19","month":"11","oa":1,"issue":"11","date_updated":"2023-08-14T11:53:27Z","external_id":{"isi":["000715818400001"],"pmid":["34723964"]},"year":"2021","volume":19,"pmid":1,"day":"01","status":"public","date_created":"2021-11-21T23:01:28Z","tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"ddc":["570"],"publication":"PLoS Biology","doi":"10.1371/journal.pbio.3001431","oa_version":"Published Version","isi":1,"related_material":{"record":[{"id":"13069","relation":"research_data","status":"public"}]},"publisher":"Public Library of Science","has_accepted_license":"1","title":"Neuronal HSF-1 coordinates the propagation of fat desaturation across tissues to enable adaptation to high temperatures in C. elegans","author":[{"full_name":"Chauve, Laetitia","first_name":"Laetitia","last_name":"Chauve"},{"full_name":"Hodge, Francesca","last_name":"Hodge","first_name":"Francesca"},{"full_name":"Murdoch, Sharlene","last_name":"Murdoch","first_name":"Sharlene"},{"full_name":"Masoudzadeh, Fatemah","last_name":"Masoudzadeh","first_name":"Fatemah"},{"first_name":"Harry Jack","last_name":"Mann","full_name":"Mann, Harry Jack"},{"first_name":"Andrea","last_name":"Lopez-Clavijo","full_name":"Lopez-Clavijo, Andrea"},{"first_name":"Hanneke","last_name":"Okkenhaug","full_name":"Okkenhaug, Hanneke"},{"first_name":"Greg","last_name":"West","full_name":"West, Greg"},{"first_name":"Bebiana C.","last_name":"Sousa","full_name":"Sousa, Bebiana C."},{"full_name":"Segonds-Pichon, Anne","first_name":"Anne","last_name":"Segonds-Pichon"},{"last_name":"Li","first_name":"Cheryl","full_name":"Li, Cheryl"},{"full_name":"Wingett, Steven","first_name":"Steven","last_name":"Wingett"},{"first_name":"Hermine","last_name":"Kienberger","full_name":"Kienberger, Hermine"},{"full_name":"Kleigrewe, Karin","first_name":"Karin","last_name":"Kleigrewe"},{"full_name":"De Bono, Mario","id":"4E3FF80E-F248-11E8-B48F-1D18A9856A87","first_name":"Mario","last_name":"De Bono","orcid":"0000-0001-8347-0443"},{"first_name":"Michael","last_name":"Wakelam","full_name":"Wakelam, Michael"},{"first_name":"Olivia","last_name":"Casanueva","full_name":"Casanueva, Olivia"}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","file":[{"success":1,"file_name":"2021_PLoSBio_Chauve.pdf","date_updated":"2021-11-22T09:34:03Z","date_created":"2021-11-22T09:34:03Z","file_id":"10330","content_type":"application/pdf","file_size":4069215,"creator":"cchlebak","relation":"main_file","access_level":"open_access","checksum":"0c61b667f814fd9435b3ac42036fc36d"}],"department":[{"_id":"MaDe"}],"article_processing_charge":"No","article_type":"original","language":[{"iso":"eng"}],"scopus_import":"1","abstract":[{"text":"To survive elevated temperatures, ectotherms adjust the fluidity of membranes by fine-tuning lipid desaturation levels in a process previously described to be cell autonomous. We have discovered that, in Caenorhabditis elegans, neuronal heat shock factor 1 (HSF-1), the conserved master regulator of the heat shock response (HSR), causes extensive fat remodeling in peripheral tissues. These changes include a decrease in fat desaturase and acid lipase expression in the intestine and a global shift in the saturation levels of plasma membrane’s phospholipids. The observed remodeling of plasma membrane is in line with ectothermic adaptive responses and gives worms a cumulative advantage to warm temperatures. We have determined that at least 6 TAX-2/TAX-4 cyclic guanosine monophosphate (cGMP) gated channel expressing sensory neurons, and transforming growth factor ß (TGF-β)/bone morphogenetic protein (BMP) are required for signaling across tissues to modulate fat desaturation. We also find neuronal hsf-1 is not only sufficient but also partially necessary to control the fat remodeling response and for survival at warm temperatures. This is the first study to show that a thermostat-based mechanism can cell nonautonomously coordinate membrane saturation and composition across tissues in a multicellular animal.","lang":"eng"}],"type":"journal_article","file_date_updated":"2021-11-22T09:34:03Z","citation":{"ama":"Chauve L, Hodge F, Murdoch S, et al. Neuronal HSF-1 coordinates the propagation of fat desaturation across tissues to enable adaptation to high temperatures in C. elegans. <i>PLoS Biology</i>. 2021;19(11). doi:<a href=\"https://doi.org/10.1371/journal.pbio.3001431\">10.1371/journal.pbio.3001431</a>","short":"L. Chauve, F. Hodge, S. Murdoch, F. Masoudzadeh, H.J. Mann, A. Lopez-Clavijo, H. Okkenhaug, G. West, B.C. Sousa, A. Segonds-Pichon, C. Li, S. Wingett, H. Kienberger, K. Kleigrewe, M. de Bono, M. Wakelam, O. Casanueva, PLoS Biology 19 (2021).","ista":"Chauve L, Hodge F, Murdoch S, Masoudzadeh F, Mann HJ, Lopez-Clavijo A, Okkenhaug H, West G, Sousa BC, Segonds-Pichon A, Li C, Wingett S, Kienberger H, Kleigrewe K, de Bono M, Wakelam M, Casanueva O. 2021. Neuronal HSF-1 coordinates the propagation of fat desaturation across tissues to enable adaptation to high temperatures in C. elegans. PLoS Biology. 19(11), e3001431.","ieee":"L. Chauve <i>et al.</i>, “Neuronal HSF-1 coordinates the propagation of fat desaturation across tissues to enable adaptation to high temperatures in C. elegans,” <i>PLoS Biology</i>, vol. 19, no. 11. Public Library of Science, 2021.","chicago":"Chauve, Laetitia, Francesca Hodge, Sharlene Murdoch, Fatemah Masoudzadeh, Harry Jack Mann, Andrea Lopez-Clavijo, Hanneke Okkenhaug, et al. “Neuronal HSF-1 Coordinates the Propagation of Fat Desaturation across Tissues to Enable Adaptation to High Temperatures in C. Elegans.” <i>PLoS Biology</i>. Public Library of Science, 2021. <a href=\"https://doi.org/10.1371/journal.pbio.3001431\">https://doi.org/10.1371/journal.pbio.3001431</a>.","apa":"Chauve, L., Hodge, F., Murdoch, S., Masoudzadeh, F., Mann, H. J., Lopez-Clavijo, A., … Casanueva, O. (2021). Neuronal HSF-1 coordinates the propagation of fat desaturation across tissues to enable adaptation to high temperatures in C. elegans. <i>PLoS Biology</i>. Public Library of Science. <a href=\"https://doi.org/10.1371/journal.pbio.3001431\">https://doi.org/10.1371/journal.pbio.3001431</a>","mla":"Chauve, Laetitia, et al. “Neuronal HSF-1 Coordinates the Propagation of Fat Desaturation across Tissues to Enable Adaptation to High Temperatures in C. Elegans.” <i>PLoS Biology</i>, vol. 19, no. 11, e3001431, Public Library of Science, 2021, doi:<a href=\"https://doi.org/10.1371/journal.pbio.3001431\">10.1371/journal.pbio.3001431</a>."},"publication_identifier":{"issn":["1544-9173"],"eissn":["1545-7885"]},"quality_controlled":"1","_id":"10322","publication_status":"published"},{"isi":1,"oa_version":"Published Version","doi":"10.3389/fmolb.2021.762005","publication":"Frontiers in Molecular Biosciences","date_created":"2021-11-21T23:01:29Z","tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"ddc":["547"],"day":"25","status":"public","pmid":1,"volume":8,"year":"2021","external_id":{"isi":["000717241700001"],"pmid":["34760928"]},"date_updated":"2023-08-14T11:55:04Z","oa":1,"month":"10","intvolume":"         8","date_published":"2021-10-25T00:00:00Z","acknowledgement":"We thank Juan C. Fontecilla-Camps for insightful discussions related to ATP-driven machineries, and Elif Karagöz for providing the structural model of the Hsp90-Tau complex. This study was supported by the European Research Council (StG-2012-311318-ProtDyn2Function) and the Agence Nationale de la Recherche (ANR-18-CE92-0032-MitoMemProtImp).","article_number":"762005","publication_status":"published","_id":"10323","quality_controlled":"1","publication_identifier":{"eissn":["2296-889X"]},"citation":{"ama":"Sučec I, Bersch B, Schanda P. How do chaperones bind (partly) unfolded client proteins? <i>Frontiers in Molecular Biosciences</i>. 2021;8. doi:<a href=\"https://doi.org/10.3389/fmolb.2021.762005\">10.3389/fmolb.2021.762005</a>","ieee":"I. Sučec, B. Bersch, and P. Schanda, “How do chaperones bind (partly) unfolded client proteins?,” <i>Frontiers in Molecular Biosciences</i>, vol. 8. Frontiers, 2021.","ista":"Sučec I, Bersch B, Schanda P. 2021. How do chaperones bind (partly) unfolded client proteins? Frontiers in Molecular Biosciences. 8, 762005.","short":"I. Sučec, B. Bersch, P. Schanda, Frontiers in Molecular Biosciences 8 (2021).","chicago":"Sučec, Iva, Beate Bersch, and Paul Schanda. “How Do Chaperones Bind (Partly) Unfolded Client Proteins?” <i>Frontiers in Molecular Biosciences</i>. Frontiers, 2021. <a href=\"https://doi.org/10.3389/fmolb.2021.762005\">https://doi.org/10.3389/fmolb.2021.762005</a>.","apa":"Sučec, I., Bersch, B., &#38; Schanda, P. (2021). How do chaperones bind (partly) unfolded client proteins? <i>Frontiers in Molecular Biosciences</i>. Frontiers. <a href=\"https://doi.org/10.3389/fmolb.2021.762005\">https://doi.org/10.3389/fmolb.2021.762005</a>","mla":"Sučec, Iva, et al. “How Do Chaperones Bind (Partly) Unfolded Client Proteins?” <i>Frontiers in Molecular Biosciences</i>, vol. 8, 762005, Frontiers, 2021, doi:<a href=\"https://doi.org/10.3389/fmolb.2021.762005\">10.3389/fmolb.2021.762005</a>."},"type":"journal_article","file_date_updated":"2021-11-23T15:06:58Z","abstract":[{"lang":"eng","text":"Molecular chaperones are central to cellular protein homeostasis. Dynamic disorder is a key feature of the complexes of molecular chaperones and their client proteins, and it facilitates the client release towards a folded state or the handover to downstream components. The dynamic nature also implies that a given chaperone can interact with many different client proteins, based on physico-chemical sequence properties rather than on structural complementarity of their (folded) 3D structure. Yet, the balance between this promiscuity and some degree of client specificity is poorly understood. Here, we review recent atomic-level descriptions of chaperones with client proteins, including chaperones in complex with intrinsically disordered proteins, with membrane-protein precursors, or partially folded client proteins. We focus hereby on chaperone-client interactions that are independent of ATP. The picture emerging from these studies highlights the importance of dynamics in these complexes, whereby several interaction types, not only hydrophobic ones, contribute to the complex formation. We discuss these features of chaperone-client complexes and possible factors that may contribute to this balance of promiscuity and specificity."}],"scopus_import":"1","language":[{"iso":"eng"}],"article_type":"original","article_processing_charge":"Yes (via OA deal)","department":[{"_id":"PaSc"}],"file":[{"checksum":"a5c9dbf80dc2c5aaa737f456c941d964","relation":"main_file","access_level":"open_access","content_type":"application/pdf","file_id":"10333","creator":"cchlebak","file_size":4700798,"date_updated":"2021-11-23T15:06:58Z","date_created":"2021-11-23T15:06:58Z","success":1,"file_name":"2021_FrontiersMolBioSc_Sučec.pdf"}],"title":"How do chaperones bind (partly) unfolded client proteins?","author":[{"first_name":"Iva","last_name":"Sučec","full_name":"Sučec, Iva"},{"first_name":"Beate","last_name":"Bersch","full_name":"Bersch, Beate"},{"last_name":"Schanda","orcid":"0000-0002-9350-7606","first_name":"Paul","id":"7B541462-FAF6-11E9-A490-E8DFE5697425","full_name":"Schanda, Paul"}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","has_accepted_license":"1","publisher":"Frontiers"},{"quality_controlled":"1","_id":"10324","scopus_import":"1","abstract":[{"text":"Off-chain protocols (channels) are a promising solution to the scalability and privacy challenges of blockchain payments. Current proposals, however, require synchrony assumptions to preserve the safety of a channel, leaking to an adversary the exact amount of time needed to control the network for a successful attack. In this paper, we introduce Brick, the first payment channel that remains secure under network asynchrony and concurrently provides correct incentives. The core idea is to incorporate the conflict resolution process within the channel by introducing a rational committee of external parties, called wardens. Hence, if a party wants to close a channel unilaterally, it can only get the committee’s approval for the last valid state. Additionally, Brick provides sub-second latency because it does not employ heavy-weight consensus. Instead, Brick uses consistent broadcast to announce updates and close the channel, a light-weight abstraction that is powerful enough to preserve safety and liveness to any rational parties. We formally define and prove for Brick the properties a payment channel construction should fulfill. We also design incentives for Brick such that honest and rational behavior aligns. Finally, we provide a reference implementation of the smart contracts in Solidity.","lang":"eng"}],"arxiv":1,"type":"conference","citation":{"ama":"Avarikioti Z, Kokoris Kogias E, Wattenhofer R, Zindros D. Brick: Asynchronous incentive-compatible payment channels. In: <i>25th International Conference on Financial Cryptography and Data Security</i>. Vol 12675. Springer Nature; 2021:209-230. doi:<a href=\"https://doi.org/10.1007/978-3-662-64331-0_11\">10.1007/978-3-662-64331-0_11</a>","ista":"Avarikioti Z, Kokoris Kogias E, Wattenhofer R, Zindros D. 2021. Brick: Asynchronous incentive-compatible payment channels. 25th International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography, LNCS, vol. 12675, 209–230.","ieee":"Z. Avarikioti, E. Kokoris Kogias, R. Wattenhofer, and D. Zindros, “Brick: Asynchronous incentive-compatible payment channels,” in <i>25th International Conference on Financial Cryptography and Data Security</i>, Virtual, 2021, vol. 12675, pp. 209–230.","short":"Z. Avarikioti, E. Kokoris Kogias, R. Wattenhofer, D. Zindros, in:, 25th International Conference on Financial Cryptography and Data Security, Springer Nature, 2021, pp. 209–230.","chicago":"Avarikioti, Zeta, Eleftherios Kokoris Kogias, Roger Wattenhofer, and Dionysis Zindros. “Brick: Asynchronous Incentive-Compatible Payment Channels.” In <i>25th International Conference on Financial Cryptography and Data Security</i>, 12675:209–30. Springer Nature, 2021. <a href=\"https://doi.org/10.1007/978-3-662-64331-0_11\">https://doi.org/10.1007/978-3-662-64331-0_11</a>.","apa":"Avarikioti, Z., Kokoris Kogias, E., Wattenhofer, R., &#38; Zindros, D. (2021). Brick: Asynchronous incentive-compatible payment channels. In <i>25th International Conference on Financial Cryptography and Data Security</i> (Vol. 12675, pp. 209–230). Virtual: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-662-64331-0_11\">https://doi.org/10.1007/978-3-662-64331-0_11</a>","mla":"Avarikioti, Zeta, et al. “Brick: Asynchronous Incentive-Compatible Payment Channels.” <i>25th International Conference on Financial Cryptography and Data Security</i>, vol. 12675, Springer Nature, 2021, pp. 209–30, doi:<a href=\"https://doi.org/10.1007/978-3-662-64331-0_11\">10.1007/978-3-662-64331-0_11</a>."},"publication_identifier":{"issn":["0302-9743"],"eissn":["1611-3349"],"isbn":["9-783-6626-4330-3"],"eisbn":["978-3-662-64331-0"]},"publication_status":"published","author":[{"full_name":"Avarikioti, Zeta","last_name":"Avarikioti","first_name":"Zeta"},{"first_name":"Eleftherios","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","last_name":"Kokoris Kogias","full_name":"Kokoris Kogias, Eleftherios"},{"full_name":"Wattenhofer, Roger","last_name":"Wattenhofer","first_name":"Roger"},{"full_name":"Zindros, Dionysis","last_name":"Zindros","first_name":"Dionysis"}],"title":"Brick: Asynchronous incentive-compatible payment channels","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","publisher":"Springer Nature","language":[{"iso":"eng"}],"department":[{"_id":"ElKo"}],"article_processing_charge":"No","status":"public","day":"23","date_created":"2021-11-21T23:01:29Z","volume":"12675 ","oa_version":"Preprint","isi":1,"publication":"25th International Conference on Financial Cryptography and Data Security","doi":"10.1007/978-3-662-64331-0_11","main_file_link":[{"url":"https://arxiv.org/abs/1905.11360","open_access":"1"}],"oa":1,"date_updated":"2023-08-14T12:59:58Z","acknowledgement":"We would like to thank Kaoutar Elkhiyaoui for her valuable feedback as well as Jakub Sliwinski for his impactful contribution to this work.","date_published":"2021-10-23T00:00:00Z","alternative_title":["LNCS"],"month":"10","year":"2021","conference":{"location":"Virtual","name":"FC: Financial Cryptography","start_date":"2021-03-01","end_date":"2021-03-05"},"page":"209-230","external_id":{"isi":["000712016200011"],"arxiv":["1905.11360"]}},{"_id":"10325","quality_controlled":"1","publication_identifier":{"isbn":["9-783-6626-4330-3"],"eissn":["1611-3349"],"eisbn":["978-3-662-64331-0"],"issn":["0302-9743"]},"citation":{"chicago":"Zamyatin, Alexei, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, and William J. Knottenbelt. “SoK: Communication across Distributed Ledgers.” In <i>25th International Conference on Financial Cryptography and Data Security</i>, 12675:3–36. Springer Nature, 2021. <a href=\"https://doi.org/10.1007/978-3-662-64331-0_1\">https://doi.org/10.1007/978-3-662-64331-0_1</a>.","ama":"Zamyatin A, Al-Bassam M, Zindros D, et al. SoK: Communication across distributed ledgers. In: <i>25th International Conference on Financial Cryptography and Data Security</i>. Vol 12675. Springer Nature; 2021:3-36. doi:<a href=\"https://doi.org/10.1007/978-3-662-64331-0_1\">10.1007/978-3-662-64331-0_1</a>","short":"A. Zamyatin, M. Al-Bassam, D. Zindros, E. Kokoris Kogias, P. Moreno-Sanchez, A. Kiayias, W.J. Knottenbelt, in:, 25th International Conference on Financial Cryptography and Data Security, Springer Nature, 2021, pp. 3–36.","ista":"Zamyatin A, Al-Bassam M, Zindros D, Kokoris Kogias E, Moreno-Sanchez P, Kiayias A, Knottenbelt WJ. 2021. SoK: Communication across distributed ledgers. 25th International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography, LNCS, vol. 12675, 3–36.","ieee":"A. Zamyatin <i>et al.</i>, “SoK: Communication across distributed ledgers,” in <i>25th International Conference on Financial Cryptography and Data Security</i>, Virtual, 2021, vol. 12675, pp. 3–36.","mla":"Zamyatin, Alexei, et al. “SoK: Communication across Distributed Ledgers.” <i>25th International Conference on Financial Cryptography and Data Security</i>, vol. 12675, Springer Nature, 2021, pp. 3–36, doi:<a href=\"https://doi.org/10.1007/978-3-662-64331-0_1\">10.1007/978-3-662-64331-0_1</a>.","apa":"Zamyatin, A., Al-Bassam, M., Zindros, D., Kokoris Kogias, E., Moreno-Sanchez, P., Kiayias, A., &#38; Knottenbelt, W. J. (2021). SoK: Communication across distributed ledgers. In <i>25th International Conference on Financial Cryptography and Data Security</i> (Vol. 12675, pp. 3–36). Virtual: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-662-64331-0_1\">https://doi.org/10.1007/978-3-662-64331-0_1</a>"},"scopus_import":"1","abstract":[{"lang":"eng","text":"Since the inception of Bitcoin, a plethora of distributed ledgers differing in design and purpose has been created. While by design, blockchains provide no means to securely communicate with external systems, numerous attempts towards trustless cross-chain communication have been proposed over the years. Today, cross-chain communication (CCC) plays a fundamental role in cryptocurrency exchanges, scalability efforts via sharding, extension of existing systems through sidechains, and bootstrapping of new blockchains. Unfortunately, existing proposals are designed ad-hoc for specific use-cases, making it hard to gain confidence in their correctness and composability. We provide the first systematic exposition of cross-chain communication protocols. We formalize the underlying research problem and show that CCC is impossible without a trusted third party, contrary to common beliefs in the blockchain community. With this result in mind, we develop a framework to design new and evaluate existing CCC protocols, focusing on the inherent trust assumptions thereof, and derive a classification covering the field of cross-chain communication to date. We conclude by discussing open challenges for CCC research and the implications of interoperability on the security and privacy of blockchains."}],"type":"conference","publication_status":"published","title":"SoK: Communication across distributed ledgers","author":[{"last_name":"Zamyatin","first_name":"Alexei","full_name":"Zamyatin, Alexei"},{"full_name":"Al-Bassam, Mustafa","first_name":"Mustafa","last_name":"Al-Bassam"},{"full_name":"Zindros, Dionysis","last_name":"Zindros","first_name":"Dionysis"},{"full_name":"Kokoris Kogias, Eleftherios","first_name":"Eleftherios","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","last_name":"Kokoris Kogias"},{"full_name":"Moreno-Sanchez, Pedro","first_name":"Pedro","last_name":"Moreno-Sanchez"},{"full_name":"Kiayias, Aggelos","last_name":"Kiayias","first_name":"Aggelos"},{"last_name":"Knottenbelt","first_name":"William J.","full_name":"Knottenbelt, William J."}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","publisher":"Springer Nature","language":[{"iso":"eng"}],"article_processing_charge":"No","department":[{"_id":"ElKo"}],"date_created":"2021-11-21T23:01:29Z","day":"23","status":"public","volume":"12675 ","oa_version":"Preprint","isi":1,"publication":"25th International Conference on Financial Cryptography and Data Security","main_file_link":[{"url":"https://eprint.iacr.org/2019/1128","open_access":"1"}],"doi":"10.1007/978-3-662-64331-0_1","date_updated":"2023-08-14T12:59:26Z","oa":1,"date_published":"2021-10-23T00:00:00Z","alternative_title":["LNCS"],"month":"10","acknowledgement":"We would like express our gratitude to Georgia Avarikioti, Daniel Perez and Dominik Harz for helpful comments and feedback on earlier versions of this manuscript. We also thank Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl, and Alistair Stewart for insightful discussions during the early stages of this research. We also wish to thank the anonymous reviewers for their valuable comments that helped improve the presentation of our results. This research was funded by Bridge 1 858561 SESC; Bridge 1 864738 PR4DLT (all FFG); the Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle (CDL-SQI); the competence center SBA-K1 funded by COMET; Chaincode Labs through the project SLN: Scalability for the Lightning Network; and by the Austrian Science Fund (FWF) through the Meitner program (project M-2608). Mustafa Al-Bassam is funded by a scholarship from the Alan Turing Institute. Alexei Zamyatin conducted the early stages of this work during his time at SBA Research, and was supported by a Binance Research Fellowship.","year":"2021","external_id":{"isi":["000712016200001"]},"page":"3-36","conference":{"start_date":"2021-03-01","end_date":"2021-03-05","name":"FC: Financial Cryptography","location":"Virtual"}},{"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","author":[{"full_name":"Xu, Enjun","last_name":"Xu","first_name":"Enjun"},{"last_name":"Chai","first_name":"Liang","full_name":"Chai, Liang"},{"first_name":"Shiqi","last_name":"Zhang","full_name":"Zhang, Shiqi"},{"first_name":"Ruixue","last_name":"Yu","full_name":"Yu, Ruixue"},{"full_name":"Zhang, Xixi","id":"61A66458-47E9-11EA-85BA-8AEAAF14E49A","first_name":"Xixi","last_name":"Zhang","orcid":"0000-0001-7048-4627"},{"first_name":"Chongyi","last_name":"Xu","full_name":"Xu, Chongyi"},{"full_name":"Hu, Yuxin","last_name":"Hu","first_name":"Yuxin"}],"title":"Catabolism of strigolactones by a carboxylesterase","publisher":"Springer Nature","article_type":"original","language":[{"iso":"eng"}],"department":[{"_id":"JiFr"}],"article_processing_charge":"No","quality_controlled":"1","_id":"10326","scopus_import":"1","abstract":[{"text":"Strigolactones (SLs) are carotenoid-derived plant hormones that control shoot branching and communications between host plants and symbiotic fungi or root parasitic plants. Extensive studies have identified the key components participating in SL biosynthesis and signalling, whereas the catabolism or deactivation of endogenous SLs in planta remains largely unknown. Here, we report that the Arabidopsis carboxylesterase 15 (AtCXE15) and its orthologues function as efficient hydrolases of SLs. We show that overexpression of AtCXE15 promotes shoot branching by dampening SL-inhibited axillary bud outgrowth. We further demonstrate that AtCXE15 could bind and efficiently hydrolyse SLs both in vitro and in planta. We also provide evidence that AtCXE15 is capable of catalysing hydrolysis of diverse SL analogues and that such CXE15-dependent catabolism of SLs is evolutionarily conserved in seed plants. These results disclose a catalytic mechanism underlying homoeostatic regulation of SLs in plants, which also provides a rational approach to spatial-temporally manipulate the endogenous SLs and thus architecture of crops and ornamental plants.","lang":"eng"}],"type":"journal_article","publication_identifier":{"eissn":["2055-0278"]},"citation":{"apa":"Xu, E., Chai, L., Zhang, S., Yu, R., Zhang, X., Xu, C., &#38; Hu, Y. (2021). Catabolism of strigolactones by a carboxylesterase. <i>Nature Plants</i>. Springer Nature. <a href=\"https://doi.org/10.1038/s41477-021-01011-y\">https://doi.org/10.1038/s41477-021-01011-y</a>","mla":"Xu, Enjun, et al. “Catabolism of Strigolactones by a Carboxylesterase.” <i>Nature Plants</i>, vol. 7, Springer Nature, 2021, pp. 1495–1504, doi:<a href=\"https://doi.org/10.1038/s41477-021-01011-y\">10.1038/s41477-021-01011-y</a>.","ieee":"E. Xu <i>et al.</i>, “Catabolism of strigolactones by a carboxylesterase,” <i>Nature Plants</i>, vol. 7. Springer Nature, pp. 1495–1504, 2021.","ista":"Xu E, Chai L, Zhang S, Yu R, Zhang X, Xu C, Hu Y. 2021. Catabolism of strigolactones by a carboxylesterase. Nature Plants. 7, 1495–1504.","short":"E. Xu, L. Chai, S. Zhang, R. Yu, X. Zhang, C. Xu, Y. Hu, Nature Plants 7 (2021) 1495–1504.","ama":"Xu E, Chai L, Zhang S, et al. Catabolism of strigolactones by a carboxylesterase. <i>Nature Plants</i>. 2021;7:1495–1504. doi:<a href=\"https://doi.org/10.1038/s41477-021-01011-y\">10.1038/s41477-021-01011-y</a>","chicago":"Xu, Enjun, Liang Chai, Shiqi Zhang, Ruixue Yu, Xixi Zhang, Chongyi Xu, and Yuxin Hu. “Catabolism of Strigolactones by a Carboxylesterase.” <i>Nature Plants</i>. Springer Nature, 2021. <a href=\"https://doi.org/10.1038/s41477-021-01011-y\">https://doi.org/10.1038/s41477-021-01011-y</a>."},"publication_status":"published","date_updated":"2023-08-14T11:54:02Z","acknowledgement":"We thank J. Li (Institute of Genetics and Developmental Biology, China) for providing the at14-1, atmax2-1, atmax3-9, atmax4-1, atmax1-1, kai2-2 (Col-0 background) mutants and B. Xu for providing the complementary DNA of P. patens. We are grateful to L. Wang for assistance with MST, B. Han for assistance with UPLC–MS, J. Li for assistance with confocal microscopy and B. Mikael and J. Zhang for their comments on the manuscript. This work was supported by grants from Strategic Priority Research Program of Chinese Academy of Sciences (Y.H., XDB27030102) and the National Natural Science Foundation of China (E.X., 31700253; Y.H., 31830055).","date_published":"2021-11-11T00:00:00Z","intvolume":"         7","month":"11","year":"2021","external_id":{"isi":["000717408000002"],"pmid":["34764442"]},"page":"1495–1504 ","day":"11","status":"public","date_created":"2021-11-21T23:01:30Z","volume":7,"pmid":1,"oa_version":"None","isi":1,"publication":"Nature Plants","doi":"10.1038/s41477-021-01011-y"},{"article_type":"original","language":[{"iso":"eng"}],"department":[{"_id":"MaIb"}],"article_processing_charge":"No","title":"PbS–Pb–CuxS composites for thermoelectric application","author":[{"first_name":"Mengyao","last_name":"Li","full_name":"Li, Mengyao"},{"full_name":"Liu, Yu","first_name":"Yu","id":"2A70014E-F248-11E8-B48F-1D18A9856A87","last_name":"Liu","orcid":"0000-0001-7313-6740"},{"full_name":"Zhang, Yu","first_name":"Yu","last_name":"Zhang"},{"full_name":"Han, Xu","last_name":"Han","first_name":"Xu"},{"last_name":"Xiao","first_name":"Ke","full_name":"Xiao, Ke"},{"full_name":"Nabahat, Mehran","last_name":"Nabahat","first_name":"Mehran"},{"full_name":"Arbiol, Jordi","last_name":"Arbiol","first_name":"Jordi"},{"full_name":"Llorca, Jordi","first_name":"Jordi","last_name":"Llorca"},{"orcid":"0000-0001-5013-2843","last_name":"Ibáñez","first_name":"Maria","id":"43C61214-F248-11E8-B48F-1D18A9856A87","full_name":"Ibáñez, Maria"},{"last_name":"Cabot","first_name":"Andreu","full_name":"Cabot, Andreu"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"American Chemical Society ","publication_status":"published","project":[{"name":"ISTplus - Postdoctoral Fellowships","_id":"260C2330-B435-11E9-9278-68D0E5697425","call_identifier":"H2020","grant_number":"754411"},{"_id":"9B8F7476-BA93-11EA-9121-9846C619BF3A","name":"HighTE: The Werner Siemens Laboratory for the High Throughput Discovery of Semiconductors for Waste Heat Recovery"}],"quality_controlled":"1","_id":"10327","scopus_import":"1","abstract":[{"text":"Composite materials offer numerous advantages in a wide range of applications, including thermoelectrics. Here, semiconductor–metal composites are produced by just blending nanoparticles of a sulfide semiconductor obtained in aqueous solution and at room temperature with a metallic Cu powder. The obtained blend is annealed in a reducing atmosphere and afterward consolidated into dense polycrystalline pellets through spark plasma sintering (SPS). We observe that, during the annealing process, the presence of metallic copper activates a partial reduction of the PbS, resulting in the formation of PbS–Pb–CuxS composites. The presence of metallic lead during the SPS process habilitates the liquid-phase sintering of the composite. Besides, by comparing the transport properties of PbS, the PbS–Pb–CuxS composites, and PbS–CuxS composites obtained by blending PbS and CuxS nanoparticles, we demonstrate that the presence of metallic lead decisively contributes to a strong increase of the charge carrier concentration through spillover of charge carriers enabled by the low work function of lead. The increase in charge carrier concentration translates into much higher electrical conductivities and moderately lower Seebeck coefficients. These properties translate into power factors up to 2.1 mW m–1 K–2 at ambient temperature, well above those of PbS and PbS + CuxS. Additionally, the presence of multiple phases in the final composite results in a notable decrease in the lattice thermal conductivity. Overall, the introduction of metallic copper in the initial blend results in a significant improvement of the thermoelectric performance of PbS, reaching a dimensionless thermoelectric figure of merit ZT = 1.1 at 750 K, which represents about a 400% increase over bare PbS. Besides, an average ZTave = 0.72 in the temperature range 320–773 K is demonstrated.","lang":"eng"}],"type":"journal_article","publication_identifier":{"issn":["1944-8244"],"eissn":["1944-8252"]},"citation":{"apa":"Li, M., Liu, Y., Zhang, Y., Han, X., Xiao, K., Nabahat, M., … Cabot, A. (2021). PbS–Pb–CuxS composites for thermoelectric application. <i>ACS Applied Materials and Interfaces</i>. American Chemical Society . <a href=\"https://doi.org/10.1021/acsami.1c15609\">https://doi.org/10.1021/acsami.1c15609</a>","mla":"Li, Mengyao, et al. “PbS–Pb–CuxS Composites for Thermoelectric Application.” <i>ACS Applied Materials and Interfaces</i>, vol. 13, no. 43, American Chemical Society , 2021, pp. 51373–51382, doi:<a href=\"https://doi.org/10.1021/acsami.1c15609\">10.1021/acsami.1c15609</a>.","short":"M. Li, Y. Liu, Y. Zhang, X. Han, K. Xiao, M. Nabahat, J. Arbiol, J. Llorca, M. Ibáñez, A. Cabot, ACS Applied Materials and Interfaces 13 (2021) 51373–51382.","ieee":"M. Li <i>et al.</i>, “PbS–Pb–CuxS composites for thermoelectric application,” <i>ACS Applied Materials and Interfaces</i>, vol. 13, no. 43. American Chemical Society , pp. 51373–51382, 2021.","ista":"Li M, Liu Y, Zhang Y, Han X, Xiao K, Nabahat M, Arbiol J, Llorca J, Ibáñez M, Cabot A. 2021. PbS–Pb–CuxS composites for thermoelectric application. ACS Applied Materials and Interfaces. 13(43), 51373–51382.","ama":"Li M, Liu Y, Zhang Y, et al. PbS–Pb–CuxS composites for thermoelectric application. <i>ACS Applied Materials and Interfaces</i>. 2021;13(43):51373–51382. doi:<a href=\"https://doi.org/10.1021/acsami.1c15609\">10.1021/acsami.1c15609</a>","chicago":"Li, Mengyao, Yu Liu, Yu Zhang, Xu Han, Ke Xiao, Mehran Nabahat, Jordi Arbiol, Jordi Llorca, Maria Ibáñez, and Andreu Cabot. “PbS–Pb–CuxS Composites for Thermoelectric Application.” <i>ACS Applied Materials and Interfaces</i>. American Chemical Society , 2021. <a href=\"https://doi.org/10.1021/acsami.1c15609\">https://doi.org/10.1021/acsami.1c15609</a>."},"year":"2021","page":"51373–51382","external_id":{"pmid":["34665616"],"isi":["000715852100070"]},"oa":1,"issue":"43","keyword":["CuxS","PbS","energy conversion","nanocomposite","nanoparticle","solution synthesis","thermoelectric"],"date_updated":"2023-10-03T09:55:33Z","acknowledgement":"This work was supported by the European Regional Development Funds. M.L., Y.Z., X.H., and K.X. thank the China Scholarship Council for scholarship support. M. I. has been financially supported by IST Austria and the Werner Siemens Foundation. Y.L. acknowledges funding from the European Union’s Horizon 2020 research and innovation program under the Marie Sklodowska-Curie grant agreement No. 754411. J.L. is a Serra Húnter fellow and is grateful to ICREA Academia program and projects MICINN/FEDER RTI2018-093996-B-C31 and GC 2017 SGR 128. ICN2 acknowledges funding from Generalitat de Catalunya 2017 SGR 327 and the Spanish MINECO project NANOGEN (PID2020-116093RB-C43). ICN2 was supported by the Severo Ochoa program from Spanish MINECO (grant no. SEV-2017-0706) and was funded by the CERCA Programme/Generalitat de Catalunya. X.H. thanks China Scholarship Council for scholarship support (201804910551). Part of the present work was performed in the framework of Universitat Autònoma de Barcelona Materials Science Ph.D. program.","date_published":"2021-10-19T00:00:00Z","intvolume":"        13","month":"10","ec_funded":1,"oa_version":"Submitted Version","isi":1,"publication":"ACS Applied Materials and Interfaces","doi":"10.1021/acsami.1c15609","main_file_link":[{"url":"https://upcommons.upc.edu/bitstream/2117/363528/1/Pb%20mengyao.pdf","open_access":"1"}],"status":"public","day":"19","date_created":"2021-11-21T23:01:30Z","volume":13,"pmid":1},{"publication_status":"published","_id":"10363","quality_controlled":"1","citation":{"ama":"Lee J, Vernet A, Gruber N, et al. Rational engineering of an erythropoietin fusion protein to treat hypoxia. <i>Protein Engineering, Design and Selection</i>. 2021;34. doi:<a href=\"https://doi.org/10.1093/protein/gzab025\">10.1093/protein/gzab025</a>","short":"J. Lee, A. Vernet, N. Gruber, K.M. Kready, D.R. Burrill, J.C. Way, P.A. Silver, Protein Engineering, Design and Selection 34 (2021).","ista":"Lee J, Vernet A, Gruber N, Kready KM, Burrill DR, Way JC, Silver PA. 2021. Rational engineering of an erythropoietin fusion protein to treat hypoxia. Protein Engineering, Design and Selection. 34, gzab025.","ieee":"J. Lee <i>et al.</i>, “Rational engineering of an erythropoietin fusion protein to treat hypoxia,” <i>Protein Engineering, Design and Selection</i>, vol. 34. Oxford University Press, 2021.","chicago":"Lee, Jungmin, Andyna Vernet, Nathalie Gruber, Kasia M. Kready, Devin R. Burrill, Jeffrey C. Way, and Pamela A. Silver. “Rational Engineering of an Erythropoietin Fusion Protein to Treat Hypoxia.” <i>Protein Engineering, Design and Selection</i>. Oxford University Press, 2021. <a href=\"https://doi.org/10.1093/protein/gzab025\">https://doi.org/10.1093/protein/gzab025</a>.","apa":"Lee, J., Vernet, A., Gruber, N., Kready, K. M., Burrill, D. R., Way, J. C., &#38; Silver, P. A. (2021). Rational engineering of an erythropoietin fusion protein to treat hypoxia. <i>Protein Engineering, Design and Selection</i>. Oxford University Press. <a href=\"https://doi.org/10.1093/protein/gzab025\">https://doi.org/10.1093/protein/gzab025</a>","mla":"Lee, Jungmin, et al. “Rational Engineering of an Erythropoietin Fusion Protein to Treat Hypoxia.” <i>Protein Engineering, Design and Selection</i>, vol. 34, gzab025, Oxford University Press, 2021, doi:<a href=\"https://doi.org/10.1093/protein/gzab025\">10.1093/protein/gzab025</a>."},"publication_identifier":{"eissn":["1741-0134"],"issn":["1741-0126"]},"type":"journal_article","scopus_import":"1","abstract":[{"lang":"eng","text":"Erythropoietin enhances oxygen delivery and reduces hypoxia-induced cell death, but its pro-thrombotic activity is problematic for use of erythropoietin in treating hypoxia. We constructed a fusion protein that stimulates red blood cell production and neuroprotection without triggering platelet production, a marker for thrombosis. The protein consists of an anti-glycophorin A nanobody and an erythropoietin mutant (L108A). The mutation reduces activation of erythropoietin receptor homodimers that induce erythropoiesis and thrombosis, but maintains the tissue-protective signaling. The binding of the nanobody element to glycophorin A rescues homodimeric erythropoietin receptor activation on red blood cell precursors. In a cell proliferation assay, the fusion protein is active at 10−14 M, allowing an estimate of the number of receptor–ligand complexes needed for signaling. This fusion protein stimulates erythroid cell proliferation in vitro and in mice, and shows neuroprotective activity in vitro. Our erythropoietin fusion protein presents a novel molecule for treating hypoxia."}],"language":[{"iso":"eng"}],"article_type":"original","article_processing_charge":"No","department":[{"_id":"CaGu"}],"author":[{"last_name":"Lee","first_name":"Jungmin","full_name":"Lee, Jungmin"},{"first_name":"Andyna","last_name":"Vernet","full_name":"Vernet, Andyna"},{"last_name":"Gruber","first_name":"Nathalie","id":"2C9C8316-AA17-11E9-B5C2-8BC2E5697425","full_name":"Gruber, Nathalie"},{"full_name":"Kready, Kasia M.","last_name":"Kready","first_name":"Kasia M."},{"last_name":"Burrill","first_name":"Devin R.","full_name":"Burrill, Devin R."},{"first_name":"Jeffrey C.","last_name":"Way","full_name":"Way, Jeffrey C."},{"full_name":"Silver, Pamela A.","last_name":"Silver","first_name":"Pamela A."}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","title":"Rational engineering of an erythropoietin fusion protein to treat hypoxia","publisher":"Oxford University Press","isi":1,"oa_version":"Published Version","main_file_link":[{"open_access":"1","url":"https://doi.org/10.1093/protein/gzab025"}],"doi":"10.1093/protein/gzab025","publication":"Protein Engineering, Design and Selection","date_created":"2021-11-28T23:01:28Z","day":"01","status":"public","pmid":1,"volume":34,"year":"2021","external_id":{"pmid":["34725710"],"isi":["000746596900001"]},"date_updated":"2023-08-14T13:01:38Z","oa":1,"intvolume":"        34","month":"11","date_published":"2021-11-01T00:00:00Z","acknowledgement":"This work was supported by funds from the Wyss Institute for Biologically Inspired Engineering and the Boston Biomedical Innovation Center (Pilot Award 112475; Drive Award U54HL119145). J.L., K.M.K., D.R.B., J.C.W. and P.A.S. were supported by the Harvard Medical School Department of Systems Biology. J.C.W. was further supported by the Harvard Medical School Laboratory of Systems Pharmacology. A.V., D.R.B. and P.A.S. were further supported by the Wyss Institute for Biologically Inspired Engineering. N.G.G. was sponsored by the Army Research Office under Grant Number W911NF-17-2-0092. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Office or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein. We sincerely thank Amanda Graveline and the Wyss Institute at Harvard for their scientific support.","article_number":"gzab025"},{"related_material":{"link":[{"relation":"press_release","description":"News on IST Webpage","url":"https://ist.ac.at/en/news/how-cells-feel-curvature/"}]},"oa_version":"Submitted Version","ec_funded":1,"isi":1,"publication":"Nature Physics","doi":"10.1038/s41567-021-01374-1","date_created":"2021-11-28T23:01:29Z","ddc":["530"],"day":"18","status":"public","volume":17,"year":"2021","external_id":{"isi":["000720204300004"]},"page":"1382–1390","date_updated":"2023-10-16T06:31:54Z","oa":1,"issue":"12","date_published":"2021-11-18T00:00:00Z","intvolume":"        17","month":"11","acknowledgement":"S.G. acknowledges funding from FEDER Prostem Research Project no. 1510614 (Wallonia DG06), F.R.S.-FNRS Epiforce Research Project no. T.0092.21 and Interreg MAT(T)ISSE project, which is financially supported by Interreg France-Wallonie-Vlaanderen (Fonds Européen de Développement Régional, FEDER-ERDF). This project was supported by the European Research Council under the European Union’s Horizon 2020 Research and Innovation Programme grant agreement 851288 (to E.H.), and by the Austrian Science Fund (FWF) (P 31639; to E.H.). L.R.M. acknowledges funding from the Agence National de la Recherche (ANR), as part of the ‘Investments d’Avenir’ Programme (I-SITE ULNE/ANR-16-IDEX-0004 ULNE). This work benefited from ANR-10-EQPX-04-01 and FEDER 12001407 grants to F.L. W.D.V. is supported by the Research Foundation Flanders (FWO 1516619N, FWO GOO5819N, FWO I003420N, FWO IRI I000321N) and is member of the Research Excellence Consortium µNEURO at the University of Antwerp. M.L. is financially supported by FRIA (F.R.S.-FNRS). M.S. is a Senior Research Associate of the Fund for Scientific Research (F.R.S.-FNRS) and acknowledges EOS grant no. 30650939 (PRECISION). Sketches in Figs. 1a and 5e and Extended Data Fig. 9 were drawn by C. Levicek.","project":[{"_id":"05943252-7A3F-11EA-A408-12923DDC885E","name":"Design Principles of Branching Morphogenesis","call_identifier":"H2020","grant_number":"851288"},{"call_identifier":"FWF","grant_number":"P31639","name":"Active mechano-chemical description of the cell cytoskeleton","_id":"268294B6-B435-11E9-9278-68D0E5697425"}],"publication_status":"published","_id":"10365","quality_controlled":"1","citation":{"chicago":"Luciano, Marine, Shi-lei Xue, Winnok H. De Vos, Lorena Redondo-Morata, Mathieu Surin, Frank Lafont, Edouard B Hannezo, and Sylvain Gabriele. “Cell Monolayers Sense Curvature by Exploiting Active Mechanics and Nuclear Mechanoadaptation.” <i>Nature Physics</i>. Springer Nature, 2021. <a href=\"https://doi.org/10.1038/s41567-021-01374-1\">https://doi.org/10.1038/s41567-021-01374-1</a>.","ieee":"M. Luciano <i>et al.</i>, “Cell monolayers sense curvature by exploiting active mechanics and nuclear mechanoadaptation,” <i>Nature Physics</i>, vol. 17, no. 12. Springer Nature, pp. 1382–1390, 2021.","short":"M. Luciano, S. Xue, W.H. De Vos, L. Redondo-Morata, M. Surin, F. Lafont, E.B. Hannezo, S. Gabriele, Nature Physics 17 (2021) 1382–1390.","ista":"Luciano M, Xue S, De Vos WH, Redondo-Morata L, Surin M, Lafont F, Hannezo EB, Gabriele S. 2021. Cell monolayers sense curvature by exploiting active mechanics and nuclear mechanoadaptation. Nature Physics. 17(12), 1382–1390.","ama":"Luciano M, Xue S, De Vos WH, et al. Cell monolayers sense curvature by exploiting active mechanics and nuclear mechanoadaptation. <i>Nature Physics</i>. 2021;17(12):1382–1390. doi:<a href=\"https://doi.org/10.1038/s41567-021-01374-1\">10.1038/s41567-021-01374-1</a>","mla":"Luciano, Marine, et al. “Cell Monolayers Sense Curvature by Exploiting Active Mechanics and Nuclear Mechanoadaptation.” <i>Nature Physics</i>, vol. 17, no. 12, Springer Nature, 2021, pp. 1382–1390, doi:<a href=\"https://doi.org/10.1038/s41567-021-01374-1\">10.1038/s41567-021-01374-1</a>.","apa":"Luciano, M., Xue, S., De Vos, W. H., Redondo-Morata, L., Surin, M., Lafont, F., … Gabriele, S. (2021). Cell monolayers sense curvature by exploiting active mechanics and nuclear mechanoadaptation. <i>Nature Physics</i>. Springer Nature. <a href=\"https://doi.org/10.1038/s41567-021-01374-1\">https://doi.org/10.1038/s41567-021-01374-1</a>"},"publication_identifier":{"eissn":["1745-2481"],"issn":["1745-2473"]},"abstract":[{"lang":"eng","text":"The early development of many organisms involves the folding of cell monolayers, but this behaviour is difficult to reproduce in vitro; therefore, both mechanistic causes and effects of local curvature remain unclear. Here we study epithelial cell monolayers on corrugated hydrogels engineered into wavy patterns, examining how concave and convex curvatures affect cellular and nuclear shape. We find that substrate curvature affects monolayer thickness, which is larger in valleys than crests. We show that this feature generically arises in a vertex model, leading to the hypothesis that cells may sense curvature by modifying the thickness of the tissue. We find that local curvature also affects nuclear morphology and positioning, which we explain by extending the vertex model to take into account membrane–nucleus interactions, encoding thickness modulation in changes to nuclear deformation and position. We propose that curvature governs the spatial distribution of yes-associated proteins via nuclear shape and density changes. We show that curvature also induces significant variations in lamins, chromatin condensation and cell proliferation rate in folded epithelial tissues. Together, this work identifies active cell mechanics and nuclear mechanoadaptation as the key players of the mechanistic regulation of epithelia to substrate curvature."}],"scopus_import":"1","type":"journal_article","file_date_updated":"2023-10-11T09:31:43Z","language":[{"iso":"eng"}],"article_type":"original","article_processing_charge":"No","department":[{"_id":"EdHa"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","author":[{"full_name":"Luciano, Marine","first_name":"Marine","last_name":"Luciano"},{"full_name":"Xue, Shi-lei","last_name":"Xue","first_name":"Shi-lei","id":"31D2C804-F248-11E8-B48F-1D18A9856A87"},{"full_name":"De Vos, Winnok H.","last_name":"De Vos","first_name":"Winnok H."},{"last_name":"Redondo-Morata","first_name":"Lorena","full_name":"Redondo-Morata, Lorena"},{"last_name":"Surin","first_name":"Mathieu","full_name":"Surin, Mathieu"},{"first_name":"Frank","last_name":"Lafont","full_name":"Lafont, Frank"},{"full_name":"Hannezo, Edouard B","id":"3A9DB764-F248-11E8-B48F-1D18A9856A87","first_name":"Edouard B","last_name":"Hannezo","orcid":"0000-0001-6005-1561"},{"first_name":"Sylvain","last_name":"Gabriele","full_name":"Gabriele, Sylvain"}],"title":"Cell monolayers sense curvature by exploiting active mechanics and nuclear mechanoadaptation","file":[{"file_name":"50145_4_merged_1630498627.pdf","success":1,"date_created":"2023-10-11T09:31:43Z","date_updated":"2023-10-11T09:31:43Z","creator":"channezo","file_size":40285498,"content_type":"application/pdf","file_id":"14420","relation":"main_file","checksum":"5d6d76750a71d7cb632bb15417c38ef7","access_level":"open_access"}],"has_accepted_license":"1","publisher":"Springer Nature"},{"volume":168,"pmid":1,"day":"17","status":"public","date_created":"2021-11-28T23:01:30Z","publication":"Cells and Development","doi":"10.1016/j.cdev.2021.203758","main_file_link":[{"open_access":"1","url":"https://doi.org/10.1016/j.cdev.2021.203758"}],"oa_version":"Published Version","isi":1,"article_number":"203758","date_published":"2021-11-17T00:00:00Z","intvolume":"       168","month":"11","oa":1,"issue":"12","date_updated":"2023-08-14T13:02:40Z","external_id":{"pmid":["34800748"],"isi":["000974771600028"]},"year":"2021","scopus_import":"1","type":"journal_article","publication_identifier":{"issn":["2667-2901"]},"citation":{"ama":"Heisenberg C-PJ, Lennon AM, Mayor R, Salbreux G. Special rebranding issue: “Quantitative cell and developmental biology.” <i>Cells and Development</i>. 2021;168(12). doi:<a href=\"https://doi.org/10.1016/j.cdev.2021.203758\">10.1016/j.cdev.2021.203758</a>","short":"C.-P.J. Heisenberg, A.M. Lennon, R. Mayor, G. Salbreux, Cells and Development 168 (2021).","ieee":"C.-P. J. Heisenberg, A. M. Lennon, R. Mayor, and G. Salbreux, “Special rebranding issue: ‘Quantitative cell and developmental biology,’” <i>Cells and Development</i>, vol. 168, no. 12. Elsevier, 2021.","ista":"Heisenberg C-PJ, Lennon AM, Mayor R, Salbreux G. 2021. Special rebranding issue: “Quantitative cell and developmental biology”. Cells and Development. 168(12), 203758.","chicago":"Heisenberg, Carl-Philipp J, Ana Maria Lennon, Roberto Mayor, and Guillaume Salbreux. “Special Rebranding Issue: ‘Quantitative Cell and Developmental Biology.’” <i>Cells and Development</i>. Elsevier, 2021. <a href=\"https://doi.org/10.1016/j.cdev.2021.203758\">https://doi.org/10.1016/j.cdev.2021.203758</a>.","apa":"Heisenberg, C.-P. J., Lennon, A. M., Mayor, R., &#38; Salbreux, G. (2021). Special rebranding issue: “Quantitative cell and developmental biology.” <i>Cells and Development</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.cdev.2021.203758\">https://doi.org/10.1016/j.cdev.2021.203758</a>","mla":"Heisenberg, Carl-Philipp J., et al. “Special Rebranding Issue: ‘Quantitative Cell and Developmental Biology.’” <i>Cells and Development</i>, vol. 168, no. 12, 203758, Elsevier, 2021, doi:<a href=\"https://doi.org/10.1016/j.cdev.2021.203758\">10.1016/j.cdev.2021.203758</a>."},"quality_controlled":"1","_id":"10366","publication_status":"published","publisher":"Elsevier","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","title":"Special rebranding issue: “Quantitative cell and developmental biology”","author":[{"full_name":"Heisenberg, Carl-Philipp J","orcid":"0000-0002-0912-4566","last_name":"Heisenberg","id":"39427864-F248-11E8-B48F-1D18A9856A87","first_name":"Carl-Philipp J"},{"full_name":"Lennon, Ana Maria","first_name":"Ana Maria","last_name":"Lennon"},{"full_name":"Mayor, Roberto","first_name":"Roberto","last_name":"Mayor"},{"full_name":"Salbreux, Guillaume","last_name":"Salbreux","first_name":"Guillaume"}],"department":[{"_id":"CaHe"}],"article_processing_charge":"No","article_type":"letter_note","language":[{"iso":"eng"}]},{"publisher":"Association for Computational Linguistics","has_accepted_license":"1","file":[{"file_size":1227703,"creator":"cchlebak","file_id":"10368","content_type":"application/pdf","relation":"main_file","access_level":"open_access","checksum":"b14052a025a6ecf675bdfe51db98c0d7","file_name":"2021_ACL_Ilharco.pdf","success":1,"date_updated":"2021-11-29T08:41:00Z","date_created":"2021-11-29T08:41:00Z"}],"title":"Recognizing multimodal entailment","user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","author":[{"full_name":"Ilharco, Cesar","last_name":"Ilharco","first_name":"Cesar"},{"full_name":"Shirazi, Afsaneh","last_name":"Shirazi","first_name":"Afsaneh"},{"last_name":"Gopalan","first_name":"Arjun","full_name":"Gopalan, Arjun"},{"full_name":"Nagrani, Arsha","first_name":"Arsha","last_name":"Nagrani"},{"last_name":"Bratanič","first_name":"Blaž","full_name":"Bratanič, Blaž"},{"first_name":"Chris","last_name":"Bregler","full_name":"Bregler, Chris"},{"full_name":"Liu, Christina","first_name":"Christina","last_name":"Liu"},{"first_name":"Felipe","last_name":"Ferreira","full_name":"Ferreira, Felipe"},{"first_name":"Gabriek","last_name":"Barcik","full_name":"Barcik, Gabriek"},{"last_name":"Ilharco","first_name":"Gabriel","full_name":"Ilharco, Gabriel"},{"last_name":"Osang","first_name":"Georg F","id":"464B40D6-F248-11E8-B48F-1D18A9856A87","full_name":"Osang, Georg F"},{"full_name":"Bulian, Jannis","first_name":"Jannis","last_name":"Bulian"},{"last_name":"Frank","first_name":"Jared","full_name":"Frank, Jared"},{"first_name":"Lucas","last_name":"Smaira","full_name":"Smaira, Lucas"},{"full_name":"Cao, Qin","last_name":"Cao","first_name":"Qin"},{"last_name":"Marino","first_name":"Ricardo","full_name":"Marino, Ricardo"},{"first_name":"Roma","last_name":"Patel","full_name":"Patel, Roma"},{"full_name":"Leung, Thomas","first_name":"Thomas","last_name":"Leung"},{"last_name":"Imbrasaite","first_name":"Vaiva","full_name":"Imbrasaite, Vaiva"}],"department":[{"_id":"HeEd"}],"article_processing_charge":"No","language":[{"iso":"eng"}],"type":"conference","file_date_updated":"2021-11-29T08:41:00Z","scopus_import":"1","abstract":[{"lang":"eng","text":"How information is created, shared and consumed has changed rapidly in recent decades, in part thanks to new social platforms and technologies on the web. With ever-larger amounts of unstructured and limited labels, organizing and reconciling information from different sources and modalities is a central challenge in machine learning. This cutting-edge tutorial aims to introduce the multimodal entailment task, which can be useful for detecting semantic alignments when a single modality alone does not suffice for a whole content understanding. Starting with a brief overview of natural language processing, computer vision, structured data and neural graph learning, we lay the foundations for the multimodal sections to follow. We then discuss recent multimodal learning literature covering visual, audio and language streams, and explore case studies focusing on tasks which require fine-grained understanding of visual and linguistic semantics question answering, veracity and hatred classification. Finally, we introduce a new dataset for recognizing multimodal entailment, exploring it in a hands-on collaborative section. Overall, this tutorial gives an overview of multimodal learning, introduces a multimodal entailment dataset, and encourages future research in the topic."}],"publication_identifier":{"isbn":["9-781-9540-8557-2"]},"citation":{"apa":"Ilharco, C., Shirazi, A., Gopalan, A., Nagrani, A., Bratanič, B., Bregler, C., … Imbrasaite, V. (2021). Recognizing multimodal entailment. In <i>59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Tutorial Abstracts</i> (pp. 29–30). Bangkok, Thailand: Association for Computational Linguistics. <a href=\"https://doi.org/10.18653/v1/2021.acl-tutorials.6\">https://doi.org/10.18653/v1/2021.acl-tutorials.6</a>","mla":"Ilharco, Cesar, et al. “Recognizing Multimodal Entailment.” <i>59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Tutorial Abstracts</i>, Association for Computational Linguistics, 2021, pp. 29–30, doi:<a href=\"https://doi.org/10.18653/v1/2021.acl-tutorials.6\">10.18653/v1/2021.acl-tutorials.6</a>.","ama":"Ilharco C, Shirazi A, Gopalan A, et al. Recognizing multimodal entailment. In: <i>59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Tutorial Abstracts</i>. Association for Computational Linguistics; 2021:29-30. doi:<a href=\"https://doi.org/10.18653/v1/2021.acl-tutorials.6\">10.18653/v1/2021.acl-tutorials.6</a>","ista":"Ilharco C, Shirazi A, Gopalan A, Nagrani A, Bratanič B, Bregler C, Liu C, Ferreira F, Barcik G, Ilharco G, Osang GF, Bulian J, Frank J, Smaira L, Cao Q, Marino R, Patel R, Leung T, Imbrasaite V. 2021. Recognizing multimodal entailment. 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Tutorial Abstracts. ACL: Association for Computational Linguistics ; IJCNLP: International Joint Conference on Natural Language Processing, 29–30.","ieee":"C. Ilharco <i>et al.</i>, “Recognizing multimodal entailment,” in <i>59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Tutorial Abstracts</i>, Bangkok, Thailand, 2021, pp. 29–30.","short":"C. Ilharco, A. Shirazi, A. Gopalan, A. Nagrani, B. Bratanič, C. Bregler, C. Liu, F. Ferreira, G. Barcik, G. Ilharco, G.F. Osang, J. Bulian, J. Frank, L. Smaira, Q. Cao, R. Marino, R. Patel, T. Leung, V. Imbrasaite, in:, 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Tutorial Abstracts, Association for Computational Linguistics, 2021, pp. 29–30.","chicago":"Ilharco, Cesar, Afsaneh Shirazi, Arjun Gopalan, Arsha Nagrani, Blaž Bratanič, Chris Bregler, Christina Liu, et al. “Recognizing Multimodal Entailment.” In <i>59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Tutorial Abstracts</i>, 29–30. Association for Computational Linguistics, 2021. <a href=\"https://doi.org/10.18653/v1/2021.acl-tutorials.6\">https://doi.org/10.18653/v1/2021.acl-tutorials.6</a>."},"quality_controlled":"1","_id":"10367","publication_status":"published","acknowledgement":"We would like to thank Abby Schantz, Abe Ittycheriah, Aliaksei Severyn, Allan Heydon, Aly\r\nGrealish, Andrey Vlasov, Arkaitz Zubiaga, Ashwin Kakarla, Chen Sun, Clayton Williams, Cong\r\nYu, Cordelia Schmid, Da-Cheng Juan, Dan Finnie, Dani Valevski, Daniel Rocha, David Price, David Sklar, Devi Krishna, Elena Kochkina, Enrique Alfonseca, Franc¸oise Beaufays, Isabelle Augenstein, Jialu Liu, John Cantwell, John Palowitch, Jordan Boyd-Graber, Lei Shi, Luis Valente, Maria Voitovich, Mehmet Aktuna, Mogan Brown, Mor Naaman, Natalia P, Nidhi Hebbar, Pete Aykroyd, Rahul Sukthankar, Richa Dixit, Steve Pucci, Tania Bedrax-Weiss, Tobias Kaufmann, Tom Boulos, Tu Tsao, Vladimir Chtchetkine, Yair Kurzion, Yifan Xu and Zach Hynes.","month":"08","date_published":"2021-08-01T00:00:00Z","oa":1,"date_updated":"2022-01-26T14:26:36Z","conference":{"location":"Bangkok, Thailand","start_date":"2021-08-01","end_date":"2021-08-06","name":"ACL: Association for Computational Linguistics ; IJCNLP: International Joint Conference on Natural Language Processing"},"page":"29-30","year":"2021","day":"01","status":"public","tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"date_created":"2021-11-28T23:01:30Z","ddc":["000"],"main_file_link":[{"open_access":"1","url":"https://aclanthology.org/2021.acl-tutorials.6/"}],"doi":"10.18653/v1/2021.acl-tutorials.6","publication":"59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Tutorial Abstracts","oa_version":"Published Version"},{"department":[{"_id":"MiLe"}],"article_processing_charge":"No","article_type":"original","language":[{"iso":"eng"}],"publisher":"Springer Nature","has_accepted_license":"1","title":"Generation of spin currents by a temperature gradient in a two-terminal device","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","author":[{"full_name":"Barfknecht, Rafael E.","first_name":"Rafael E.","last_name":"Barfknecht"},{"full_name":"Foerster, Angela","first_name":"Angela","last_name":"Foerster"},{"full_name":"Zinner, Nikolaj T.","last_name":"Zinner","first_name":"Nikolaj T."},{"full_name":"Volosniev, Artem","id":"37D278BC-F248-11E8-B48F-1D18A9856A87","first_name":"Artem","orcid":"0000-0003-0393-5525","last_name":"Volosniev"}],"file":[{"success":1,"file_name":"2021_NatComm_Barfknecht.pdf","date_updated":"2021-12-06T14:53:41Z","date_created":"2021-12-06T14:53:41Z","content_type":"application/pdf","file_id":"10420","creator":"alisjak","file_size":1068984,"relation":"main_file","checksum":"9097319952cb9a3d96e7fd3aa9813a03","access_level":"open_access"}],"publication_status":"published","project":[{"grant_number":"754411","call_identifier":"H2020","name":"ISTplus - Postdoctoral Fellowships","_id":"260C2330-B435-11E9-9278-68D0E5697425"}],"arxiv":1,"abstract":[{"lang":"eng","text":"Theoretical and experimental studies of the interaction between spins and temperature are vital for the development of spin caloritronics, as they dictate the design of future devices. In this work, we propose a two-terminal cold-atom simulator to study that interaction. The proposed quantum simulator consists of strongly interacting atoms that occupy two temperature reservoirs connected by a one-dimensional link. First, we argue that the dynamics in the link can be described using an inhomogeneous Heisenberg spin chain whose couplings are defined by the local temperature. Second, we show the existence of a spin current in a system with a temperature difference by studying the dynamics that follows the spin-flip of an atom in the link. A temperature gradient accelerates the impurity in one direction more than in the other, leading to an overall spin current similar to the spin Seebeck effect."}],"scopus_import":"1","file_date_updated":"2021-12-06T14:53:41Z","type":"journal_article","citation":{"mla":"Barfknecht, Rafael E., et al. “Generation of Spin Currents by a Temperature Gradient in a Two-Terminal Device.” <i>Communications Physics</i>, vol. 4, no. 1, 252, Springer Nature, 2021, doi:<a href=\"https://doi.org/10.1038/s42005-021-00753-7\">10.1038/s42005-021-00753-7</a>.","apa":"Barfknecht, R. E., Foerster, A., Zinner, N. T., &#38; Volosniev, A. (2021). Generation of spin currents by a temperature gradient in a two-terminal device. <i>Communications Physics</i>. Springer Nature. <a href=\"https://doi.org/10.1038/s42005-021-00753-7\">https://doi.org/10.1038/s42005-021-00753-7</a>","chicago":"Barfknecht, Rafael E., Angela Foerster, Nikolaj T. Zinner, and Artem Volosniev. “Generation of Spin Currents by a Temperature Gradient in a Two-Terminal Device.” <i>Communications Physics</i>. Springer Nature, 2021. <a href=\"https://doi.org/10.1038/s42005-021-00753-7\">https://doi.org/10.1038/s42005-021-00753-7</a>.","ieee":"R. E. Barfknecht, A. Foerster, N. T. Zinner, and A. Volosniev, “Generation of spin currents by a temperature gradient in a two-terminal device,” <i>Communications Physics</i>, vol. 4, no. 1. Springer Nature, 2021.","ista":"Barfknecht RE, Foerster A, Zinner NT, Volosniev A. 2021. Generation of spin currents by a temperature gradient in a two-terminal device. Communications Physics. 4(1), 252.","short":"R.E. Barfknecht, A. Foerster, N.T. Zinner, A. Volosniev, Communications Physics 4 (2021).","ama":"Barfknecht RE, Foerster A, Zinner NT, Volosniev A. Generation of spin currents by a temperature gradient in a two-terminal device. <i>Communications Physics</i>. 2021;4(1). doi:<a href=\"https://doi.org/10.1038/s42005-021-00753-7\">10.1038/s42005-021-00753-7</a>"},"publication_identifier":{"eissn":["23993650"]},"quality_controlled":"1","_id":"10401","external_id":{"arxiv":["2101.02020"],"isi":["10.1038/s42005-021-00753-7"]},"year":"2021","acknowledgement":"The authors acknowledge support from the European QuantERA ERA-NET Cofund in Quantum Technologies (Project QTFLAG Grant Agreement No. 731473) (R.E.B), CNPq (Conselho Nacional de Desenvolvimento Científico e Tecnológico) Brazil (A.F.), the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie Grant Agreement No. 754411 (A.G.V.), the Independent Research Fund Denmark, the Carlsberg Foundation, and Aarhus University Research Foundation under the Jens Christian Skou fellowship program (N.T.Z).","article_number":"252","date_published":"2021-11-26T00:00:00Z","intvolume":"         4","month":"11","oa":1,"issue":"1","date_updated":"2023-08-14T13:04:34Z","publication":"Communications Physics","doi":"10.1038/s42005-021-00753-7","ec_funded":1,"oa_version":"Published Version","volume":4,"status":"public","day":"26","ddc":["530"],"tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"date_created":"2021-12-05T23:01:39Z"},{"article_number":"6830","acknowledgement":"We thank all members of our respective groups for helpful discussion on the paper. The authors are also grateful to Prof. Abdel El. Manira for support and sharing Tg(HUC:Gal4;UAS:Synaptohysin-GFP), to Haohao Wu for discussion, and thank Elena Zabalueva for the zebrafish schematic. The authors also acknowledge Zebrafish core facility, Genome Engineering Zebrafish and Biomedicum Imaging Core from the Karolinska Institutet for technical support. This work received funding from the ERC under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 851288 to E.H.) and under the Marie Skłodowska-Curie grant agreement No. 754411 (to M.C.U.); Swedish Research Council (to F.L., I.A. and S.H.); Knut and Alice Wallenberg Foundation (F.L. and I.A.); Swedish Brain Foundation (F.L. and S.H.); Ming Wai Lau Foundation (to F.L.); StratRegen (to F.L.); ERC Consolidator grant STEMMING-FROM-NERVE and ERC Synergy Grant KILL-OR-DIFFERENTIATE (to I.A.); Bertil Hallsten Research Foundation (to I.A.); Cancerfonden (to I.A.); the Paradifference Foundation (to I.A.); Austrian Science Fund (to I.A.); and StratNeuro (to S.H.).","month":"11","intvolume":"        12","date_published":"2021-11-24T00:00:00Z","oa":1,"date_updated":"2023-08-14T13:18:46Z","external_id":{"pmid":["34819507"],"isi":["000722322900020"]},"year":"2021","pmid":1,"volume":12,"day":"24","status":"public","date_created":"2021-12-05T23:01:40Z","tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"ddc":["573"],"doi":"10.1038/s41467-021-27135-5","publication":"Nature Communications","isi":1,"ec_funded":1,"oa_version":"Published Version","related_material":{"record":[{"id":"13058","relation":"research_data","status":"public"}]},"publisher":"Springer Nature","has_accepted_license":"1","file":[{"date_updated":"2021-12-10T08:54:09Z","date_created":"2021-12-10T08:54:09Z","success":1,"file_name":"2021_NatComm_Ucar.pdf","checksum":"63c56ec75314a71e63e7dd2920b3c5b5","relation":"main_file","access_level":"open_access","content_type":"application/pdf","file_id":"10529","file_size":2303405,"creator":"cchlebak"}],"author":[{"full_name":"Ucar, Mehmet C","first_name":"Mehmet C","id":"50B2A802-6007-11E9-A42B-EB23E6697425","last_name":"Ucar","orcid":"0000-0003-0506-4217"},{"last_name":"Kamenev","first_name":"Dmitrii","full_name":"Kamenev, Dmitrii"},{"full_name":"Sunadome, Kazunori","last_name":"Sunadome","first_name":"Kazunori"},{"full_name":"Fachet, Dominik C","first_name":"Dominik C","id":"14FDD550-AA41-11E9-A0E5-1ACCE5697425","last_name":"Fachet"},{"full_name":"Lallemend, Francois","first_name":"Francois","last_name":"Lallemend"},{"full_name":"Adameyko, Igor","last_name":"Adameyko","first_name":"Igor"},{"full_name":"Hadjab, Saida","last_name":"Hadjab","first_name":"Saida"},{"last_name":"Hannezo","orcid":"0000-0001-6005-1561","first_name":"Edouard B","id":"3A9DB764-F248-11E8-B48F-1D18A9856A87","full_name":"Hannezo, Edouard B"}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","title":"Theory of branching morphogenesis by local interactions and global guidance","department":[{"_id":"EdHa"}],"article_processing_charge":"No","article_type":"original","language":[{"iso":"eng"}],"file_date_updated":"2021-12-10T08:54:09Z","type":"journal_article","abstract":[{"lang":"eng","text":"Branching morphogenesis governs the formation of many organs such as lung, kidney, and the neurovascular system. Many studies have explored system-specific molecular and cellular regulatory mechanisms, as well as self-organizing rules underlying branching morphogenesis. However, in addition to local cues, branched tissue growth can also be influenced by global guidance. Here, we develop a theoretical framework for a stochastic self-organized branching process in the presence of external cues. Combining analytical theory with numerical simulations, we predict differential signatures of global vs. local regulatory mechanisms on the branching pattern, such as angle distributions, domain size, and space-filling efficiency. We find that branch alignment follows a generic scaling law determined by the strength of global guidance, while local interactions influence the tissue density but not its overall territory. Finally, using zebrafish innervation as a model system, we test these key features of the model experimentally. Our work thus provides quantitative predictions to disentangle the role of different types of cues in shaping branched structures across scales."}],"scopus_import":"1","citation":{"mla":"Ucar, Mehmet C., et al. “Theory of Branching Morphogenesis by Local Interactions and Global Guidance.” <i>Nature Communications</i>, vol. 12, 6830, Springer Nature, 2021, doi:<a href=\"https://doi.org/10.1038/s41467-021-27135-5\">10.1038/s41467-021-27135-5</a>.","apa":"Ucar, M. C., Kamenev, D., Sunadome, K., Fachet, D. C., Lallemend, F., Adameyko, I., … Hannezo, E. B. (2021). Theory of branching morphogenesis by local interactions and global guidance. <i>Nature Communications</i>. Springer Nature. <a href=\"https://doi.org/10.1038/s41467-021-27135-5\">https://doi.org/10.1038/s41467-021-27135-5</a>","chicago":"Ucar, Mehmet C, Dmitrii Kamenev, Kazunori Sunadome, Dominik C Fachet, Francois Lallemend, Igor Adameyko, Saida Hadjab, and Edouard B Hannezo. “Theory of Branching Morphogenesis by Local Interactions and Global Guidance.” <i>Nature Communications</i>. Springer Nature, 2021. <a href=\"https://doi.org/10.1038/s41467-021-27135-5\">https://doi.org/10.1038/s41467-021-27135-5</a>.","ama":"Ucar MC, Kamenev D, Sunadome K, et al. Theory of branching morphogenesis by local interactions and global guidance. <i>Nature Communications</i>. 2021;12. doi:<a href=\"https://doi.org/10.1038/s41467-021-27135-5\">10.1038/s41467-021-27135-5</a>","ista":"Ucar MC, Kamenev D, Sunadome K, Fachet DC, Lallemend F, Adameyko I, Hadjab S, Hannezo EB. 2021. Theory of branching morphogenesis by local interactions and global guidance. Nature Communications. 12, 6830.","short":"M.C. Ucar, D. Kamenev, K. Sunadome, D.C. Fachet, F. Lallemend, I. Adameyko, S. Hadjab, E.B. Hannezo, Nature Communications 12 (2021).","ieee":"M. C. Ucar <i>et al.</i>, “Theory of branching morphogenesis by local interactions and global guidance,” <i>Nature Communications</i>, vol. 12. Springer Nature, 2021."},"publication_identifier":{"eissn":["2041-1723"]},"quality_controlled":"1","_id":"10402","publication_status":"published","project":[{"_id":"05943252-7A3F-11EA-A408-12923DDC885E","name":"Design Principles of Branching Morphogenesis","grant_number":"851288","call_identifier":"H2020"},{"_id":"260C2330-B435-11E9-9278-68D0E5697425","name":"ISTplus - Postdoctoral Fellowships","call_identifier":"H2020","grant_number":"754411"}]},{"_id":"10403","quality_controlled":"1","citation":{"chicago":"Biane, Celia, Florian Rückerl, Therese Abrahamsson, Cécile Saint-Cloment, Jean Mariani, Ryuichi Shigemoto, David A. Digregorio, Rachel M. Sherrard, and Laurence Cathala. “Developmental Emergence of Two-Stage Nonlinear Synaptic Integration in Cerebellar Interneurons.” <i>ELife</i>. eLife Sciences Publications, 2021. <a href=\"https://doi.org/10.7554/eLife.65954\">https://doi.org/10.7554/eLife.65954</a>.","ieee":"C. Biane <i>et al.</i>, “Developmental emergence of two-stage nonlinear synaptic integration in cerebellar interneurons,” <i>eLife</i>, vol. 10. eLife Sciences Publications, 2021.","short":"C. Biane, F. Rückerl, T. Abrahamsson, C. Saint-Cloment, J. Mariani, R. Shigemoto, D.A. Digregorio, R.M. Sherrard, L. Cathala, ELife 10 (2021).","ista":"Biane C, Rückerl F, Abrahamsson T, Saint-Cloment C, Mariani J, Shigemoto R, Digregorio DA, Sherrard RM, Cathala L. 2021. Developmental emergence of two-stage nonlinear synaptic integration in cerebellar interneurons. eLife. 10, e65954.","ama":"Biane C, Rückerl F, Abrahamsson T, et al. Developmental emergence of two-stage nonlinear synaptic integration in cerebellar interneurons. <i>eLife</i>. 2021;10. doi:<a href=\"https://doi.org/10.7554/eLife.65954\">10.7554/eLife.65954</a>","mla":"Biane, Celia, et al. “Developmental Emergence of Two-Stage Nonlinear Synaptic Integration in Cerebellar Interneurons.” <i>ELife</i>, vol. 10, e65954, eLife Sciences Publications, 2021, doi:<a href=\"https://doi.org/10.7554/eLife.65954\">10.7554/eLife.65954</a>.","apa":"Biane, C., Rückerl, F., Abrahamsson, T., Saint-Cloment, C., Mariani, J., Shigemoto, R., … Cathala, L. (2021). Developmental emergence of two-stage nonlinear synaptic integration in cerebellar interneurons. <i>ELife</i>. eLife Sciences Publications. <a href=\"https://doi.org/10.7554/eLife.65954\">https://doi.org/10.7554/eLife.65954</a>"},"publication_identifier":{"eissn":["2050-084X"]},"type":"journal_article","file_date_updated":"2021-12-10T08:31:41Z","abstract":[{"lang":"eng","text":"Synaptic transmission, connectivity, and dendritic morphology mature in parallel during brain development and are often disrupted in neurodevelopmental disorders. Yet how these changes influence the neuronal computations necessary for normal brain function are not well understood. To identify cellular mechanisms underlying the maturation of synaptic integration in interneurons, we combined patch-clamp recordings of excitatory inputs in mouse cerebellar stellate cells (SCs), three-dimensional reconstruction of SC morphology with excitatory synapse location, and biophysical modeling. We found that postnatal maturation of postsynaptic strength was homogeneously reduced along the somatodendritic axis, but dendritic integration was always sublinear. However, dendritic branching increased without changes in synapse density, leading to a substantial gain in distal inputs. Thus, changes in synapse distribution, rather than dendrite cable properties, are the dominant mechanism underlying the maturation of neuronal computation. These mechanisms favor the emergence of a spatially compartmentalized two-stage integration model promoting location-dependent integration within dendritic subunits."}],"scopus_import":"1","publication_status":"published","file":[{"success":1,"file_name":"2021_eLife_Biane.pdf","date_created":"2021-12-10T08:31:41Z","date_updated":"2021-12-10T08:31:41Z","file_id":"10528","content_type":"application/pdf","file_size":13131322,"creator":"cchlebak","relation":"main_file","checksum":"c7c33c3319428d56e332e22349c50ed3","access_level":"open_access"}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","title":"Developmental emergence of two-stage nonlinear synaptic integration in cerebellar interneurons","author":[{"last_name":"Biane","first_name":"Celia","full_name":"Biane, Celia"},{"full_name":"Rückerl, Florian","last_name":"Rückerl","first_name":"Florian"},{"full_name":"Abrahamsson, Therese","first_name":"Therese","last_name":"Abrahamsson"},{"full_name":"Saint-Cloment, Cécile","last_name":"Saint-Cloment","first_name":"Cécile"},{"last_name":"Mariani","first_name":"Jean","full_name":"Mariani, Jean"},{"full_name":"Shigemoto, Ryuichi","orcid":"0000-0001-8761-9444","last_name":"Shigemoto","first_name":"Ryuichi","id":"499F3ABC-F248-11E8-B48F-1D18A9856A87"},{"first_name":"David A.","last_name":"Digregorio","full_name":"Digregorio, David A."},{"last_name":"Sherrard","first_name":"Rachel M.","full_name":"Sherrard, Rachel M."},{"first_name":"Laurence","last_name":"Cathala","full_name":"Cathala, Laurence"}],"has_accepted_license":"1","publisher":"eLife Sciences Publications","language":[{"iso":"eng"}],"article_type":"original","article_processing_charge":"No","department":[{"_id":"RySh"}],"tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"ddc":["570"],"date_created":"2021-12-05T23:01:40Z","day":"03","status":"public","volume":10,"isi":1,"oa_version":"Published Version","doi":"10.7554/eLife.65954","publication":"eLife","date_updated":"2023-08-14T13:12:07Z","oa":1,"intvolume":"        10","month":"11","date_published":"2021-11-03T00:00:00Z","acknowledgement":"This study was supported by the Centre National de la Recherche Scientifique and the Agence Nationale de la Recherche (ANR-13-BSV4-00166, to LC and DAD). TA was supported by fellowships from the Fondation pour la Recherche Medicale and the Swedish Research Council. We thank Dmitry Ershov from the Image Analysis Hub of the Institut Pasteur, Elodie Le Monnier, Elena Hollergschwandtner, Vanessa Zheden, and Corinne Nantet for technical support and Haining Zhong for providing the Venus-tagged PSD95 mouse line. We would like to thank Alberto Bacci, Ann Lohof, and Nelson Rebola for comments on the manuscript.","article_number":"e65954","year":"2021","external_id":{"isi":["000715789500001"]}},{"year":"2021","page":"253-264","external_id":{"arxiv":["2110.07667"],"isi":["000722952000024"]},"issue":"7","oa":1,"date_updated":"2023-08-14T13:11:42Z","acknowledgement":"We thank Robert Geirhos and Roland Zimmermann for their participation in the case study and valuable feedback, Chris Olah and Nick Cammarata for valuable discussions in the early phase of the project, as well as the Distill Slack workspace as a platform for discussions. M.L. is supported in part by the Austrian Science Fund (FWF) under grant Z211-N23 (Wittgenstein Award). J.B. is supported by the German Federal Ministry of Education and Research\r\n(BMBF) through the Competence Center for Machine Learning (TUE.AI, FKZ 01IS18039A) and the International Max Planck Research School for Intelligent Systems (IMPRS-IS). R.H. is partially supported by Boeing and Horizon-2020 ECSEL (grant 783163, iDev40).\r\n","intvolume":"        40","month":"11","date_published":"2021-11-27T00:00:00Z","isi":1,"oa_version":"Preprint","main_file_link":[{"url":"https://arxiv.org/abs/2110.07667","open_access":"1"}],"doi":"10.1111/cgf.14418","publication":"Computer Graphics Forum","day":"27","status":"public","date_created":"2021-12-05T23:01:40Z","volume":40,"article_type":"original","language":[{"iso":"eng"}],"department":[{"_id":"ToHe"}],"article_processing_charge":"No","title":"Interactive analysis of CNN robustness","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","author":[{"last_name":"Sietzen","first_name":"Stefan","full_name":"Sietzen, Stefan"},{"last_name":"Lechner","id":"3DC22916-F248-11E8-B48F-1D18A9856A87","first_name":"Mathias","full_name":"Lechner, Mathias"},{"full_name":"Borowski, Judy","first_name":"Judy","last_name":"Borowski"},{"last_name":"Hasani","first_name":"Ramin","full_name":"Hasani, Ramin"},{"last_name":"Waldner","first_name":"Manuela","full_name":"Waldner, Manuela"}],"publisher":"Wiley","publication_status":"published","project":[{"name":"The Wittgenstein Prize","_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211","call_identifier":"FWF"}],"quality_controlled":"1","_id":"10404","type":"journal_article","scopus_import":"1","abstract":[{"text":"While convolutional neural networks (CNNs) have found wide adoption as state-of-the-art models for image-related tasks, their predictions are often highly sensitive to small input perturbations, which the human vision is robust against. This paper presents Perturber, a web-based application that allows users to instantaneously explore how CNN activations and predictions evolve when a 3D input scene is interactively perturbed. Perturber offers a large variety of scene modifications, such as camera controls, lighting and shading effects, background modifications, object morphing, as well as adversarial attacks, to facilitate the discovery of potential vulnerabilities. Fine-tuned model versions can be directly compared for qualitative evaluation of their robustness. Case studies with machine learning experts have shown that Perturber helps users to quickly generate hypotheses about model vulnerabilities and to qualitatively compare model behavior. Using quantitative analyses, we could replicate users’ insights with other CNN architectures and input images, yielding new insights about the vulnerability of adversarially trained models.","lang":"eng"}],"arxiv":1,"publication_identifier":{"eissn":["1467-8659"],"issn":["0167-7055"]},"citation":{"mla":"Sietzen, Stefan, et al. “Interactive Analysis of CNN Robustness.” <i>Computer Graphics Forum</i>, vol. 40, no. 7, Wiley, 2021, pp. 253–64, doi:<a href=\"https://doi.org/10.1111/cgf.14418\">10.1111/cgf.14418</a>.","apa":"Sietzen, S., Lechner, M., Borowski, J., Hasani, R., &#38; Waldner, M. (2021). Interactive analysis of CNN robustness. <i>Computer Graphics Forum</i>. Wiley. <a href=\"https://doi.org/10.1111/cgf.14418\">https://doi.org/10.1111/cgf.14418</a>","chicago":"Sietzen, Stefan, Mathias Lechner, Judy Borowski, Ramin Hasani, and Manuela Waldner. “Interactive Analysis of CNN Robustness.” <i>Computer Graphics Forum</i>. Wiley, 2021. <a href=\"https://doi.org/10.1111/cgf.14418\">https://doi.org/10.1111/cgf.14418</a>.","ista":"Sietzen S, Lechner M, Borowski J, Hasani R, Waldner M. 2021. Interactive analysis of CNN robustness. Computer Graphics Forum. 40(7), 253–264.","ieee":"S. Sietzen, M. Lechner, J. Borowski, R. Hasani, and M. Waldner, “Interactive analysis of CNN robustness,” <i>Computer Graphics Forum</i>, vol. 40, no. 7. Wiley, pp. 253–264, 2021.","short":"S. Sietzen, M. Lechner, J. Borowski, R. Hasani, M. Waldner, Computer Graphics Forum 40 (2021) 253–264.","ama":"Sietzen S, Lechner M, Borowski J, Hasani R, Waldner M. Interactive analysis of CNN robustness. <i>Computer Graphics Forum</i>. 2021;40(7):253-264. doi:<a href=\"https://doi.org/10.1111/cgf.14418\">10.1111/cgf.14418</a>"}},{"isi":1,"ec_funded":1,"oa_version":"None","doi":"10.1146/annurev-genet-071819-103748","publication":"Annual Review of Genetics","date_created":"2021-12-05T23:01:41Z","day":"30","status":"public","pmid":1,"volume":55,"year":"2021","external_id":{"isi":["000747220900010"],"pmid":["34460295"]},"page":"209-233","date_updated":"2023-08-14T13:05:13Z","keyword":["morphogenesis","forward genetics","high-resolution microscopy","biophysics","biochemistry","patterning"],"intvolume":"        55","month":"08","date_published":"2021-08-30T00:00:00Z","acknowledgement":"The authors would like to thank Feyza Nur Arslan, Suyash Naik, Diana Pinheiro, Alexandra Schauer, and Shayan Shamipour for their comments on the draft. N.M. is supported by an ISTplus postdoctoral fellowship (H2020 Marie-Sklodowska-Curie COFUND Action).","project":[{"grant_number":"754411","call_identifier":"H2020","name":"ISTplus - Postdoctoral Fellowships","_id":"260C2330-B435-11E9-9278-68D0E5697425"}],"publication_status":"published","_id":"10406","quality_controlled":"1","citation":{"chicago":"Mishra, Nikhil, and Carl-Philipp J Heisenberg. “Dissecting Organismal Morphogenesis by Bridging Genetics and Biophysics.” <i>Annual Review of Genetics</i>. Annual Reviews, 2021. <a href=\"https://doi.org/10.1146/annurev-genet-071819-103748\">https://doi.org/10.1146/annurev-genet-071819-103748</a>.","ista":"Mishra N, Heisenberg C-PJ. 2021. Dissecting organismal morphogenesis by bridging genetics and biophysics. Annual Review of Genetics. 55, 209–233.","short":"N. Mishra, C.-P.J. Heisenberg, Annual Review of Genetics 55 (2021) 209–233.","ieee":"N. Mishra and C.-P. J. Heisenberg, “Dissecting organismal morphogenesis by bridging genetics and biophysics,” <i>Annual Review of Genetics</i>, vol. 55. Annual Reviews, pp. 209–233, 2021.","ama":"Mishra N, Heisenberg C-PJ. Dissecting organismal morphogenesis by bridging genetics and biophysics. <i>Annual Review of Genetics</i>. 2021;55:209-233. doi:<a href=\"https://doi.org/10.1146/annurev-genet-071819-103748\">10.1146/annurev-genet-071819-103748</a>","mla":"Mishra, Nikhil, and Carl-Philipp J. Heisenberg. “Dissecting Organismal Morphogenesis by Bridging Genetics and Biophysics.” <i>Annual Review of Genetics</i>, vol. 55, Annual Reviews, 2021, pp. 209–33, doi:<a href=\"https://doi.org/10.1146/annurev-genet-071819-103748\">10.1146/annurev-genet-071819-103748</a>.","apa":"Mishra, N., &#38; Heisenberg, C.-P. J. (2021). Dissecting organismal morphogenesis by bridging genetics and biophysics. <i>Annual Review of Genetics</i>. Annual Reviews. <a href=\"https://doi.org/10.1146/annurev-genet-071819-103748\">https://doi.org/10.1146/annurev-genet-071819-103748</a>"},"publication_identifier":{"eissn":["1545-2948"],"issn":["0066-4197"]},"type":"journal_article","abstract":[{"text":"Multicellular organisms develop complex shapes from much simpler, single-celled zygotes through a process commonly called morphogenesis. Morphogenesis involves an interplay between several factors, ranging from the gene regulatory networks determining cell fate and differentiation to the mechanical processes underlying cell and tissue shape changes. Thus, the study of morphogenesis has historically been based on multidisciplinary approaches at the interface of biology with physics and mathematics. Recent technological advances have further improved our ability to study morphogenesis by bridging the gap between the genetic and biophysical factors through the development of new tools for visualizing, analyzing, and perturbing these factors and their biochemical intermediaries. Here, we review how a combination of genetic, microscopic, biophysical, and biochemical approaches has aided our attempts to understand morphogenesis and discuss potential approaches that may be beneficial to such an inquiry in the future.","lang":"eng"}],"scopus_import":"1","language":[{"iso":"eng"}],"article_type":"original","article_processing_charge":"No","department":[{"_id":"CaHe"}],"title":"Dissecting organismal morphogenesis by bridging genetics and biophysics","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","author":[{"full_name":"Mishra, Nikhil","orcid":"0000-0002-6425-5788","last_name":"Mishra","first_name":"Nikhil","id":"C4D70E82-1081-11EA-B3ED-9A4C3DDC885E"},{"first_name":"Carl-Philipp J","id":"39427864-F248-11E8-B48F-1D18A9856A87","last_name":"Heisenberg","orcid":"0000-0002-0912-4566","full_name":"Heisenberg, Carl-Philipp J"}],"publisher":"Annual Reviews"},{"_id":"10407","quality_controlled":"1","citation":{"chicago":"Chakraborty, Suvradip, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, Krzysztof Z Pietrzak, and Michelle X Yeo. “Trojan-Resilience without Cryptography,” 13043:397–428. Springer Nature, 2021. <a href=\"https://doi.org/10.1007/978-3-030-90453-1_14\">https://doi.org/10.1007/978-3-030-90453-1_14</a>.","ista":"Chakraborty S, Dziembowski S, Gałązka M, Lizurej T, Pietrzak KZ, Yeo MX. 2021. Trojan-resilience without cryptography. TCC: Theory of Cryptography Conference, LNCS, vol. 13043, 397–428.","ieee":"S. Chakraborty, S. Dziembowski, M. Gałązka, T. Lizurej, K. Z. Pietrzak, and M. X. Yeo, “Trojan-resilience without cryptography,” presented at the TCC: Theory of Cryptography Conference, Raleigh, NC, United States, 2021, vol. 13043, pp. 397–428.","short":"S. Chakraborty, S. Dziembowski, M. Gałązka, T. Lizurej, K.Z. Pietrzak, M.X. Yeo, in:, Springer Nature, 2021, pp. 397–428.","ama":"Chakraborty S, Dziembowski S, Gałązka M, Lizurej T, Pietrzak KZ, Yeo MX. Trojan-resilience without cryptography. In: Vol 13043. Springer Nature; 2021:397-428. doi:<a href=\"https://doi.org/10.1007/978-3-030-90453-1_14\">10.1007/978-3-030-90453-1_14</a>","mla":"Chakraborty, Suvradip, et al. <i>Trojan-Resilience without Cryptography</i>. Vol. 13043, Springer Nature, 2021, pp. 397–428, doi:<a href=\"https://doi.org/10.1007/978-3-030-90453-1_14\">10.1007/978-3-030-90453-1_14</a>.","apa":"Chakraborty, S., Dziembowski, S., Gałązka, M., Lizurej, T., Pietrzak, K. Z., &#38; Yeo, M. X. (2021). Trojan-resilience without cryptography (Vol. 13043, pp. 397–428). Presented at the TCC: Theory of Cryptography Conference, Raleigh, NC, United States: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-90453-1_14\">https://doi.org/10.1007/978-3-030-90453-1_14</a>"},"publication_identifier":{"issn":["0302-9743"],"eissn":["1611-3349"],"isbn":["9-783-0309-0452-4"]},"type":"conference","abstract":[{"lang":"eng","text":"Digital hardware Trojans are integrated circuits whose implementation differ from the specification in an arbitrary and malicious way. For example, the circuit can differ from its specified input/output behavior after some fixed number of queries (known as “time bombs”) or on some particular input (known as “cheat codes”). To detect such Trojans, countermeasures using multiparty computation (MPC) or verifiable computation (VC) have been proposed. On a high level, to realize a circuit with specification   F  one has more sophisticated circuits   F⋄  manufactured (where   F⋄  specifies a MPC or VC of   F ), and then embeds these   F⋄ ’s into a master circuit which must be trusted but is relatively simple compared to   F . Those solutions impose a significant overhead as   F⋄  is much more complex than   F , also the master circuits are not exactly trivial. In this work, we show that in restricted settings, where   F  has no evolving state and is queried on independent inputs, we can achieve a relaxed security notion using very simple constructions. In particular, we do not change the specification of the circuit at all (i.e.,   F=F⋄ ). Moreover the master circuit basically just queries a subset of its manufactured circuits and checks if they’re all the same. The security we achieve guarantees that, if the manufactured circuits are initially tested on up to T inputs, the master circuit will catch Trojans that try to deviate on significantly more than a 1/T fraction of the inputs. This bound is optimal for the type of construction considered, and we provably achieve it using a construction where 12 instantiations of   F  need to be embedded into the master. We also discuss an extremely simple construction with just 2 instantiations for which we conjecture that it already achieves the optimal bound."}],"scopus_import":"1","project":[{"name":"Teaching Old Crypto New Tricks","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","call_identifier":"H2020","grant_number":"682815"}],"publication_status":"published","title":"Trojan-resilience without cryptography","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","author":[{"first_name":"Suvradip","id":"B9CD0494-D033-11E9-B219-A439E6697425","last_name":"Chakraborty","full_name":"Chakraborty, Suvradip"},{"full_name":"Dziembowski, Stefan","first_name":"Stefan","last_name":"Dziembowski"},{"full_name":"Gałązka, Małgorzata","last_name":"Gałązka","first_name":"Małgorzata"},{"full_name":"Lizurej, Tomasz","first_name":"Tomasz","last_name":"Lizurej"},{"full_name":"Pietrzak, Krzysztof Z","orcid":"0000-0002-9139-1654","last_name":"Pietrzak","first_name":"Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Yeo, Michelle X","last_name":"Yeo","id":"2D82B818-F248-11E8-B48F-1D18A9856A87","first_name":"Michelle X"}],"publisher":"Springer Nature","language":[{"iso":"eng"}],"article_processing_charge":"No","department":[{"_id":"KrPi"}],"date_created":"2021-12-05T23:01:42Z","day":"04","status":"public","volume":13043,"isi":1,"oa_version":"Preprint","ec_funded":1,"doi":"10.1007/978-3-030-90453-1_14","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2021/1224"}],"date_updated":"2023-08-14T13:07:46Z","oa":1,"month":"11","intvolume":"     13043","alternative_title":["LNCS"],"date_published":"2021-11-04T00:00:00Z","year":"2021","page":"397-428","external_id":{"isi":["000728364000014"]},"conference":{"name":"TCC: Theory of Cryptography Conference","start_date":"2021-11-08","end_date":"2021-11-11","location":"Raleigh, NC, United States"}},{"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","author":[{"full_name":"Alwen, Joel F","last_name":"Alwen","first_name":"Joel F","id":"2A8DFA8C-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Auerbach, Benedikt","first_name":"Benedikt","id":"D33D2B18-E445-11E9-ABB7-15F4E5697425","orcid":"0000-0002-7553-6606","last_name":"Auerbach"},{"full_name":"Baig, Mirza Ahad","id":"3EDE6DE4-AA5A-11E9-986D-341CE6697425","first_name":"Mirza Ahad","last_name":"Baig"},{"full_name":"Cueto Noval, Miguel","last_name":"Cueto Noval","first_name":"Miguel","id":"ffc563a3-f6e0-11ea-865d-e3cce03d17cc"},{"full_name":"Klein, Karen","id":"3E83A2F8-F248-11E8-B48F-1D18A9856A87","first_name":"Karen","last_name":"Klein"},{"orcid":"0000-0001-8630-415X","last_name":"Pascual Perez","first_name":"Guillermo","id":"2D7ABD02-F248-11E8-B48F-1D18A9856A87","full_name":"Pascual Perez, Guillermo"},{"last_name":"Pietrzak","orcid":"0000-0002-9139-1654","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","first_name":"Krzysztof Z","full_name":"Pietrzak, Krzysztof Z"},{"full_name":"Walter, Michael","last_name":"Walter","orcid":"0000-0003-3186-2482","first_name":"Michael","id":"488F98B0-F248-11E8-B48F-1D18A9856A87"}],"title":"Grafting key trees: Efficient key management for overlapping groups","publisher":"Springer Nature","language":[{"iso":"eng"}],"article_processing_charge":"No","department":[{"_id":"KrPi"}],"_id":"10408","quality_controlled":"1","citation":{"chicago":"Alwen, Joel F, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto Noval, Karen Klein, Guillermo Pascual Perez, Krzysztof Z Pietrzak, and Michael Walter. “Grafting Key Trees: Efficient Key Management for Overlapping Groups.” In <i>19th International Conference</i>, 13044:222–53. Springer Nature, 2021. <a href=\"https://doi.org/10.1007/978-3-030-90456-2_8\">https://doi.org/10.1007/978-3-030-90456-2_8</a>.","ama":"Alwen JF, Auerbach B, Baig MA, et al. Grafting key trees: Efficient key management for overlapping groups. In: <i>19th International Conference</i>. Vol 13044. Springer Nature; 2021:222-253. doi:<a href=\"https://doi.org/10.1007/978-3-030-90456-2_8\">10.1007/978-3-030-90456-2_8</a>","ista":"Alwen JF, Auerbach B, Baig MA, Cueto Noval M, Klein K, Pascual Perez G, Pietrzak KZ, Walter M. 2021. Grafting key trees: Efficient key management for overlapping groups. 19th International Conference. TCC: Theory of Cryptography, LNCS, vol. 13044, 222–253.","short":"J.F. Alwen, B. Auerbach, M.A. Baig, M. Cueto Noval, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, in:, 19th International Conference, Springer Nature, 2021, pp. 222–253.","ieee":"J. F. Alwen <i>et al.</i>, “Grafting key trees: Efficient key management for overlapping groups,” in <i>19th International Conference</i>, Raleigh, NC, United States, 2021, vol. 13044, pp. 222–253.","mla":"Alwen, Joel F., et al. “Grafting Key Trees: Efficient Key Management for Overlapping Groups.” <i>19th International Conference</i>, vol. 13044, Springer Nature, 2021, pp. 222–53, doi:<a href=\"https://doi.org/10.1007/978-3-030-90456-2_8\">10.1007/978-3-030-90456-2_8</a>.","apa":"Alwen, J. F., Auerbach, B., Baig, M. A., Cueto Noval, M., Klein, K., Pascual Perez, G., … Walter, M. (2021). Grafting key trees: Efficient key management for overlapping groups. In <i>19th International Conference</i> (Vol. 13044, pp. 222–253). Raleigh, NC, United States: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-90456-2_8\">https://doi.org/10.1007/978-3-030-90456-2_8</a>"},"publication_identifier":{"eisbn":["978-3-030-90456-2"],"isbn":["9-783-0309-0455-5"],"eissn":["1611-3349"],"issn":["0302-9743"]},"abstract":[{"text":"Key trees are often the best solution in terms of transmission cost and storage requirements for managing keys in a setting where a group needs to share a secret key, while being able to efficiently rotate the key material of users (in order to recover from a potential compromise, or to add or remove users). Applications include multicast encryption protocols like LKH (Logical Key Hierarchies) or group messaging like the current IETF proposal TreeKEM. A key tree is a (typically balanced) binary tree, where each node is identified with a key: leaf nodes hold users’ secret keys while the root is the shared group key. For a group of size N, each user just holds   log(N)  keys (the keys on the path from its leaf to the root) and its entire key material can be rotated by broadcasting   2log(N)  ciphertexts (encrypting each fresh key on the path under the keys of its parents). In this work we consider the natural setting where we have many groups with partially overlapping sets of users, and ask if we can find solutions where the cost of rotating a key is better than in the trivial one where we have a separate key tree for each group. We show that in an asymptotic setting (where the number m of groups is fixed while the number N of users grows) there exist more general key graphs whose cost converges to the cost of a single group, thus saving a factor linear in the number of groups over the trivial solution. As our asymptotic “solution” converges very slowly and performs poorly on concrete examples, we propose an algorithm that uses a natural heuristic to compute a key graph for any given group structure. Our algorithm combines two greedy algorithms, and is thus very efficient: it first converts the group structure into a “lattice graph”, which is then turned into a key graph by repeatedly applying the algorithm for constructing a Huffman code. To better understand how far our proposal is from an optimal solution, we prove lower bounds on the update cost of continuous group-key agreement and multicast encryption in a symbolic model admitting (asymmetric) encryption, pseudorandom generators, and secret sharing as building blocks.","lang":"eng"}],"scopus_import":"1","type":"conference","project":[{"call_identifier":"H2020","grant_number":"682815","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","name":"Teaching Old Crypto New Tricks"},{"name":"International IST Doctoral Program","_id":"2564DBCA-B435-11E9-9278-68D0E5697425","grant_number":"665385","call_identifier":"H2020"}],"publication_status":"published","date_updated":"2023-08-14T13:19:39Z","oa":1,"date_published":"2021-11-04T00:00:00Z","alternative_title":["LNCS"],"intvolume":"     13044","month":"11","acknowledgement":"B. Auerbach, M.A. Baig and K. Pietrzak—received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (682815 - TOCNeT); Karen Klein was supported in part by ERC CoG grant 724307 and conducted part of this work at IST Austria, funded by the ERC under the European Union’s Horizon 2020 research and innovation programme (682815 - TOCNeT); Guillermo Pascual-Perez was funded by the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie Grant Agreement No. 665385; Michael Walter conducted part of this work at IST Austria, funded by the ERC under the European Union’s Horizon 2020 research and innovation programme (682815 - TOCNeT).","year":"2021","external_id":{"isi":["000728363700008"]},"page":"222-253","conference":{"location":"Raleigh, NC, United States","start_date":"2021-11-08","end_date":"2021-11-11","name":"TCC: Theory of Cryptography"},"date_created":"2021-12-05T23:01:42Z","day":"04","status":"public","volume":13044,"oa_version":"Preprint","ec_funded":1,"isi":1,"publication":"19th International Conference","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2021/1158"}],"doi":"10.1007/978-3-030-90456-2_8"},{"language":[{"iso":"eng"}],"department":[{"_id":"KrPi"}],"article_processing_charge":"No","author":[{"last_name":"Kamath Hosdurg","id":"4BD3F30E-F248-11E8-B48F-1D18A9856A87","first_name":"Chethan","full_name":"Kamath Hosdurg, Chethan"},{"full_name":"Klein, Karen","last_name":"Klein","id":"3E83A2F8-F248-11E8-B48F-1D18A9856A87","first_name":"Karen"},{"full_name":"Pietrzak, Krzysztof Z","first_name":"Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","last_name":"Pietrzak","orcid":"0000-0002-9139-1654"}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","title":"On treewidth, separators and Yao’s garbling","publisher":"Springer Nature","publication_status":"published","project":[{"name":"Teaching Old Crypto New Tricks","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","grant_number":"682815","call_identifier":"H2020"}],"quality_controlled":"1","_id":"10409","type":"conference","scopus_import":"1","abstract":[{"text":"We show that Yao’s garbling scheme is adaptively indistinguishable for the class of Boolean circuits of size   S  and treewidth   w  with only a   SO(w)  loss in security. For instance, circuits with constant treewidth are as a result adaptively indistinguishable with only a polynomial loss. This (partially) complements a negative result of Applebaum et al. (Crypto 2013), which showed (assuming one-way functions) that Yao’s garbling scheme cannot be adaptively simulatable. As main technical contributions, we introduce a new pebble game that abstracts out our security reduction and then present a pebbling strategy for this game where the number of pebbles used is roughly   O(δwlog(S)) ,   δ  being the fan-out of the circuit. The design of the strategy relies on separators, a graph-theoretic notion with connections to circuit complexity.  with only a   SO(w)  loss in security. For instance, circuits with constant treewidth are as a result adaptively indistinguishable with only a polynomial loss. This (partially) complements a negative result of Applebaum et al. (Crypto 2013), which showed (assuming one-way functions) that Yao’s garbling scheme cannot be adaptively simulatable. As main technical contributions, we introduce a new pebble game that abstracts out our security reduction and then present a pebbling strategy for this game where the number of pebbles used is roughly   O(δwlog(S)) ,   δ  being the fan-out of the circuit. The design of the strategy relies on separators, a graph-theoretic notion with connections to circuit complexity.","lang":"eng"}],"publication_identifier":{"eissn":["1611-3349"],"isbn":["9-783-0309-0452-4"],"issn":["0302-9743"]},"citation":{"chicago":"Kamath Hosdurg, Chethan, Karen Klein, and Krzysztof Z Pietrzak. “On Treewidth, Separators and Yao’s Garbling.” In <i>19th International Conference</i>, 13043:486–517. Springer Nature, 2021. <a href=\"https://doi.org/10.1007/978-3-030-90453-1_17\">https://doi.org/10.1007/978-3-030-90453-1_17</a>.","ama":"Kamath Hosdurg C, Klein K, Pietrzak KZ. On treewidth, separators and Yao’s garbling. In: <i>19th International Conference</i>. Vol 13043. Springer Nature; 2021:486-517. doi:<a href=\"https://doi.org/10.1007/978-3-030-90453-1_17\">10.1007/978-3-030-90453-1_17</a>","ieee":"C. Kamath Hosdurg, K. Klein, and K. Z. Pietrzak, “On treewidth, separators and Yao’s garbling,” in <i>19th International Conference</i>, Raleigh, NC, United States, 2021, vol. 13043, pp. 486–517.","short":"C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, 19th International Conference, Springer Nature, 2021, pp. 486–517.","ista":"Kamath Hosdurg C, Klein K, Pietrzak KZ. 2021. On treewidth, separators and Yao’s garbling. 19th International Conference. TCC: Theory of Cryptography, LNCS, vol. 13043, 486–517.","mla":"Kamath Hosdurg, Chethan, et al. “On Treewidth, Separators and Yao’s Garbling.” <i>19th International Conference</i>, vol. 13043, Springer Nature, 2021, pp. 486–517, doi:<a href=\"https://doi.org/10.1007/978-3-030-90453-1_17\">10.1007/978-3-030-90453-1_17</a>.","apa":"Kamath Hosdurg, C., Klein, K., &#38; Pietrzak, K. Z. (2021). On treewidth, separators and Yao’s garbling. In <i>19th International Conference</i> (Vol. 13043, pp. 486–517). Raleigh, NC, United States: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-90453-1_17\">https://doi.org/10.1007/978-3-030-90453-1_17</a>"},"year":"2021","conference":{"location":"Raleigh, NC, United States","start_date":"2021-11-08","end_date":"2021-11-11","name":"TCC: Theory of Cryptography"},"page":"486-517","external_id":{"isi":["000728364000017"]},"oa":1,"date_updated":"2023-08-17T06:21:38Z","acknowledgement":"We are grateful to Daniel Wichs for helpful discussions on the landscape of adaptive security of Yao’s garbling. We would also like to thank Crypto 2021 and TCC 2021 reviewers for their detailed review and suggestions, which helped improve presentation considerably.","month":"11","date_published":"2021-11-04T00:00:00Z","alternative_title":["LNCS"],"isi":1,"oa_version":"Preprint","ec_funded":1,"related_material":{"record":[{"status":"public","relation":"earlier_version","id":"10044"}]},"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2021/926"}],"doi":"10.1007/978-3-030-90453-1_17","publication":"19th International Conference","day":"04","status":"public","date_created":"2021-12-05T23:01:43Z","volume":"13043 "},{"volume":13043,"day":"04","status":"public","date_created":"2021-12-05T23:01:43Z","doi":"10.1007/978-3-030-90453-1_19","main_file_link":[{"url":"https://ia.cr/2021/059","open_access":"1"}],"publication":"19th International Conference","isi":1,"oa_version":"Preprint","ec_funded":1,"related_material":{"record":[{"id":"10048","relation":"earlier_version","status":"public"}]},"acknowledgement":"C. Kamath—Supported by Azrieli International Postdoctoral Fellowship. Most of the work was done while the author was at Northeastern University and Charles University, funded by the IARPA grant IARPA/2019-19-020700009 and project PRIMUS/17/SCI/9, respectively. K. Klein—Supported in part by ERC CoG grant 724307. Most of the work was done while the author was at IST Austria funded by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (682815 - TOCNeT). K. Pietrzak—Funded by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (682815 - TOCNeT).","month":"11","intvolume":"     13043","date_published":"2021-11-04T00:00:00Z","alternative_title":["LNCS"],"oa":1,"date_updated":"2023-10-17T09:24:07Z","conference":{"name":"TCC: Theory of Cryptography","end_date":"2021-11-11","start_date":"2021-11-08","location":"Raleigh, NC, United States"},"page":"550-581","external_id":{"isi":["000728364000019"]},"year":"2021","type":"conference","scopus_import":"1","abstract":[{"text":"The security of cryptographic primitives and protocols against adversaries that are allowed to make adaptive choices (e.g., which parties to corrupt or which queries to make) is notoriously difficult to establish. A broad theoretical framework was introduced by Jafargholi et al. [Crypto’17] for this purpose. In this paper we initiate the study of lower bounds on loss in adaptive security for certain cryptographic protocols considered in the framework. We prove lower bounds that almost match the upper bounds (proven using the framework) for proxy re-encryption, prefix-constrained PRFs and generalized selective decryption, a security game that captures the security of certain group messaging and broadcast encryption schemes. Those primitives have in common that their security game involves an underlying graph that can be adaptively built by the adversary. Some of our lower bounds only apply to a restricted class of black-box reductions which we term “oblivious” (the existing upper bounds are of this restricted type), some apply to the broader but still restricted class of non-rewinding reductions, while our lower bound for proxy re-encryption applies to all black-box reductions. The fact that some of our lower bounds seem to crucially rely on obliviousness or at least a non-rewinding reduction hints to the exciting possibility that the existing upper bounds can be improved by using more sophisticated reductions. Our main conceptual contribution is a two-player multi-stage game called the Builder-Pebbler Game. We can translate bounds on the winning probabilities for various instantiations of this game into cryptographic lower bounds for the above-mentioned primitives using oracle separation techniques.","lang":"eng"}],"citation":{"apa":"Kamath Hosdurg, C., Klein, K., Pietrzak, K. Z., &#38; Walter, M. (2021). The cost of adaptivity in security games on graphs. In <i>19th International Conference</i> (Vol. 13043, pp. 550–581). Raleigh, NC, United States: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-90453-1_19\">https://doi.org/10.1007/978-3-030-90453-1_19</a>","mla":"Kamath Hosdurg, Chethan, et al. “The Cost of Adaptivity in Security Games on Graphs.” <i>19th International Conference</i>, vol. 13043, Springer Nature, 2021, pp. 550–81, doi:<a href=\"https://doi.org/10.1007/978-3-030-90453-1_19\">10.1007/978-3-030-90453-1_19</a>.","short":"C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, 19th International Conference, Springer Nature, 2021, pp. 550–581.","ieee":"C. Kamath Hosdurg, K. Klein, K. Z. Pietrzak, and M. Walter, “The cost of adaptivity in security games on graphs,” in <i>19th International Conference</i>, Raleigh, NC, United States, 2021, vol. 13043, pp. 550–581.","ista":"Kamath Hosdurg C, Klein K, Pietrzak KZ, Walter M. 2021. The cost of adaptivity in security games on graphs. 19th International Conference. TCC: Theory of Cryptography, LNCS, vol. 13043, 550–581.","ama":"Kamath Hosdurg C, Klein K, Pietrzak KZ, Walter M. The cost of adaptivity in security games on graphs. In: <i>19th International Conference</i>. Vol 13043. Springer Nature; 2021:550-581. doi:<a href=\"https://doi.org/10.1007/978-3-030-90453-1_19\">10.1007/978-3-030-90453-1_19</a>","chicago":"Kamath Hosdurg, Chethan, Karen Klein, Krzysztof Z Pietrzak, and Michael Walter. “The Cost of Adaptivity in Security Games on Graphs.” In <i>19th International Conference</i>, 13043:550–81. Springer Nature, 2021. <a href=\"https://doi.org/10.1007/978-3-030-90453-1_19\">https://doi.org/10.1007/978-3-030-90453-1_19</a>."},"publication_identifier":{"issn":["0302-9743"],"eissn":["1611-3349"],"isbn":["9-783-0309-0452-4"]},"quality_controlled":"1","_id":"10410","publication_status":"published","project":[{"call_identifier":"H2020","grant_number":"682815","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","name":"Teaching Old Crypto New Tricks"}],"publisher":"Springer Nature","title":"The cost of adaptivity in security games on graphs","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","author":[{"last_name":"Kamath Hosdurg","id":"4BD3F30E-F248-11E8-B48F-1D18A9856A87","first_name":"Chethan","full_name":"Kamath Hosdurg, Chethan"},{"full_name":"Klein, Karen","last_name":"Klein","first_name":"Karen","id":"3E83A2F8-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9139-1654","last_name":"Pietrzak","full_name":"Pietrzak, Krzysztof Z"},{"orcid":"0000-0003-3186-2482","last_name":"Walter","first_name":"Michael","id":"488F98B0-F248-11E8-B48F-1D18A9856A87","full_name":"Walter, Michael"}],"department":[{"_id":"KrPi"}],"article_processing_charge":"No","language":[{"iso":"eng"}]},{"related_material":{"record":[{"id":"14539","relation":"dissertation_contains","status":"public"},{"status":"public","relation":"later_version","id":"14778"}]},"isi":1,"oa_version":"Preprint","ec_funded":1,"doi":"10.1007/978-3-030-90870-6_33","main_file_link":[{"url":"https://arxiv.org/abs/2108.02188","open_access":"1"}],"publication":"24th International Symposium on Formal Methods","date_created":"2021-12-05T23:01:45Z","status":"public","day":"10","volume":13047,"year":"2021","external_id":{"arxiv":["2108.02188"],"isi":["000758218600033"]},"page":"619-639","conference":{"start_date":"2021-11-20","end_date":"2021-11-26","name":"FM: Formal Methods","location":"Virtual"},"date_updated":"2025-07-14T09:10:11Z","oa":1,"month":"11","intvolume":"     13047","alternative_title":["LNCS"],"date_published":"2021-11-10T00:00:00Z","acknowledgement":"This research was partially supported by the ERC CoG 863818 (ForM-SMArt), the Czech Science Foundation grant No. GJ19-15134Y, and the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie Grant Agreement No. 665385.","project":[{"_id":"0599E47C-7A3F-11EA-A408-12923DDC885E","name":"Formal Methods for Stochastic Models: Algorithms and Applications","call_identifier":"H2020","grant_number":"863818"},{"_id":"2564DBCA-B435-11E9-9278-68D0E5697425","name":"International IST Doctoral Program","grant_number":"665385","call_identifier":"H2020"}],"publication_status":"published","_id":"10414","quality_controlled":"1","publication_identifier":{"issn":["0302-9743"],"eisbn":["978-3-030-90870-6"],"isbn":["9-783-0309-0869-0"],"eissn":["1611-3349"]},"citation":{"apa":"Chatterjee, K., Goharshady, E. K., Novotný, P., Zárevúcky, J., &#38; Zikelic, D. (2021). On lexicographic proof rules for probabilistic termination. In <i>24th International Symposium on Formal Methods</i> (Vol. 13047, pp. 619–639). Virtual: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-90870-6_33\">https://doi.org/10.1007/978-3-030-90870-6_33</a>","mla":"Chatterjee, Krishnendu, et al. “On Lexicographic Proof Rules for Probabilistic Termination.” <i>24th International Symposium on Formal Methods</i>, vol. 13047, Springer Nature, 2021, pp. 619–39, doi:<a href=\"https://doi.org/10.1007/978-3-030-90870-6_33\">10.1007/978-3-030-90870-6_33</a>.","ama":"Chatterjee K, Goharshady EK, Novotný P, Zárevúcky J, Zikelic D. On lexicographic proof rules for probabilistic termination. In: <i>24th International Symposium on Formal Methods</i>. Vol 13047. Springer Nature; 2021:619-639. doi:<a href=\"https://doi.org/10.1007/978-3-030-90870-6_33\">10.1007/978-3-030-90870-6_33</a>","short":"K. Chatterjee, E.K. Goharshady, P. Novotný, J. Zárevúcky, D. Zikelic, in:, 24th International Symposium on Formal Methods, Springer Nature, 2021, pp. 619–639.","ieee":"K. Chatterjee, E. K. Goharshady, P. Novotný, J. Zárevúcky, and D. Zikelic, “On lexicographic proof rules for probabilistic termination,” in <i>24th International Symposium on Formal Methods</i>, Virtual, 2021, vol. 13047, pp. 619–639.","ista":"Chatterjee K, Goharshady EK, Novotný P, Zárevúcky J, Zikelic D. 2021. On lexicographic proof rules for probabilistic termination. 24th International Symposium on Formal Methods. FM: Formal Methods, LNCS, vol. 13047, 619–639.","chicago":"Chatterjee, Krishnendu, Ehsan Kafshdar Goharshady, Petr Novotný, Jiří Zárevúcky, and Dorde Zikelic. “On Lexicographic Proof Rules for Probabilistic Termination.” In <i>24th International Symposium on Formal Methods</i>, 13047:619–39. Springer Nature, 2021. <a href=\"https://doi.org/10.1007/978-3-030-90870-6_33\">https://doi.org/10.1007/978-3-030-90870-6_33</a>."},"type":"conference","scopus_import":"1","arxiv":1,"abstract":[{"lang":"eng","text":"We consider the almost-sure (a.s.) termination problem for probabilistic programs, which are a stochastic extension of classical imperative programs. Lexicographic ranking functions provide a sound and practical approach for termination of non-probabilistic programs, and their extension to probabilistic programs is achieved via lexicographic ranking supermartingales (LexRSMs). However, LexRSMs introduced in the previous work have a limitation that impedes their automation: all of their components have to be non-negative in all reachable states. This might result in LexRSM not existing even for simple terminating programs. Our contributions are twofold: First, we introduce a generalization of LexRSMs which allows for some components to be negative. This standard feature of non-probabilistic termination proofs was hitherto not known to be sound in the probabilistic setting, as the soundness proof requires a careful analysis of the underlying stochastic process. Second, we present polynomial-time algorithms using our generalized LexRSMs for proving a.s. termination in broad classes of linear-arithmetic programs."}],"language":[{"iso":"eng"}],"article_processing_charge":"No","department":[{"_id":"KrCh"}],"author":[{"orcid":"0000-0002-4561-241X","last_name":"Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","full_name":"Chatterjee, Krishnendu"},{"first_name":"Ehsan Kafshdar","last_name":"Goharshady","full_name":"Goharshady, Ehsan Kafshdar"},{"first_name":"Petr","id":"3CC3B868-F248-11E8-B48F-1D18A9856A87","last_name":"Novotný","full_name":"Novotný, Petr"},{"full_name":"Zárevúcky, Jiří","last_name":"Zárevúcky","first_name":"Jiří"},{"first_name":"Dorde","id":"294AA7A6-F248-11E8-B48F-1D18A9856A87","last_name":"Zikelic","orcid":"0000-0002-4681-1699","full_name":"Zikelic, Dorde"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"On lexicographic proof rules for probabilistic termination","publisher":"Springer Nature"}]
