[{"day":"11","author":[{"full_name":"Fuchsbauer, Georg","id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","last_name":"Fuchsbauer","first_name":"Georg"},{"full_name":"Hanser, Christian","last_name":"Hanser","first_name":"Christian"},{"first_name":"Chethan","last_name":"Kamath Hosdurg","id":"4BD3F30E-F248-11E8-B48F-1D18A9856A87","full_name":"Kamath Hosdurg, Chethan"},{"last_name":"Slamanig","first_name":"Daniel","full_name":"Slamanig, Daniel"}],"project":[{"name":"Provable Security for Physical Cryptography","call_identifier":"FP7","grant_number":"259668","_id":"258C570E-B435-11E9-9278-68D0E5697425"},{"name":"Teaching Old Crypto New Tricks","call_identifier":"H2020","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","grant_number":"682815"}],"title":"Practical round-optimal blind signatures in the standard model from weaker assumptions","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","alternative_title":["LNCS"],"date_created":"2018-12-11T11:50:49Z","page":"391 - 408","department":[{"_id":"KrPi"}],"language":[{"iso":"eng"}],"type":"conference","publist_id":"6109","related_material":{"record":[{"relation":"earlier_version","status":"public","id":"1647"}]},"volume":9841,"quality_controlled":"1","year":"2016","abstract":[{"text":"At Crypto 2015 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standard-model construction of efficient roundoptimal blind signatures that does not require complexity leveraging. It is conceptually simple and builds on the primitive of structure-preserving signatures on equivalence classes (SPS-EQ). FHS prove the unforgeability of their scheme assuming EUF-CMA security of the SPS-EQ scheme and hardness of a version of the DH inversion problem. Blindness under adversarially chosen keys is proven under an interactive variant of the DDH assumption. We propose a variant of their scheme whose blindness can be proven under a non-interactive assumption, namely a variant of the bilinear DDH assumption. We moreover prove its unforgeability assuming only unforgeability of the underlying SPS-EQ but no additional assumptions as needed for the FHS scheme.","lang":"eng"}],"date_updated":"2023-02-23T10:08:16Z","_id":"1225","oa":1,"status":"public","ec_funded":1,"month":"08","doi":"10.1007/978-3-319-44618-9_21","conference":{"name":"SCN: Security and Cryptography for Networks","start_date":"2016-08-31","location":"Amalfi, Italy","end_date":"2016-09-02"},"publication_status":"published","date_published":"2016-08-11T00:00:00Z","oa_version":"Submitted Version","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2016/662"}],"scopus_import":1,"intvolume":"      9841","citation":{"ama":"Fuchsbauer G, Hanser C, Kamath Hosdurg C, Slamanig D. Practical round-optimal blind signatures in the standard model from weaker assumptions. In: Vol 9841. Springer; 2016:391-408. doi:<a href=\"https://doi.org/10.1007/978-3-319-44618-9_21\">10.1007/978-3-319-44618-9_21</a>","ieee":"G. Fuchsbauer, C. Hanser, C. Kamath Hosdurg, and D. Slamanig, “Practical round-optimal blind signatures in the standard model from weaker assumptions,” presented at the SCN: Security and Cryptography for Networks, Amalfi, Italy, 2016, vol. 9841, pp. 391–408.","short":"G. Fuchsbauer, C. Hanser, C. Kamath Hosdurg, D. Slamanig, in:, Springer, 2016, pp. 391–408.","chicago":"Fuchsbauer, Georg, Christian Hanser, Chethan Kamath Hosdurg, and Daniel Slamanig. “Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions,” 9841:391–408. Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-319-44618-9_21\">https://doi.org/10.1007/978-3-319-44618-9_21</a>.","mla":"Fuchsbauer, Georg, et al. <i>Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions</i>. Vol. 9841, Springer, 2016, pp. 391–408, doi:<a href=\"https://doi.org/10.1007/978-3-319-44618-9_21\">10.1007/978-3-319-44618-9_21</a>.","apa":"Fuchsbauer, G., Hanser, C., Kamath Hosdurg, C., &#38; Slamanig, D. (2016). Practical round-optimal blind signatures in the standard model from weaker assumptions (Vol. 9841, pp. 391–408). Presented at the SCN: Security and Cryptography for Networks, Amalfi, Italy: Springer. <a href=\"https://doi.org/10.1007/978-3-319-44618-9_21\">https://doi.org/10.1007/978-3-319-44618-9_21</a>","ista":"Fuchsbauer G, Hanser C, Kamath Hosdurg C, Slamanig D. 2016. Practical round-optimal blind signatures in the standard model from weaker assumptions. SCN: Security and Cryptography for Networks, LNCS, vol. 9841, 391–408."}},{"title":"Atomic structure of the entire mammalian mitochondrial complex i","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Nature Publishing Group","day":"20","pmid":1,"author":[{"full_name":"Fiedorczuk, Karol","id":"5BFF67CE-02D1-11E9-B11A-A5A4D7DFFFD0","last_name":"Fiedorczuk","first_name":"Karol"},{"full_name":"Letts, James A","orcid":"0000-0002-9864-3586","first_name":"James A","id":"322DA418-F248-11E8-B48F-1D18A9856A87","last_name":"Letts"},{"full_name":"Degliesposti, Gianluca","first_name":"Gianluca","last_name":"Degliesposti"},{"first_name":"Karol","last_name":"Kaszuba","id":"3FDF9472-F248-11E8-B48F-1D18A9856A87","full_name":"Kaszuba, Karol"},{"full_name":"Skehel, Mark","last_name":"Skehel","first_name":"Mark"},{"full_name":"Sazanov, Leonid A","id":"338D39FE-F248-11E8-B48F-1D18A9856A87","last_name":"Sazanov","first_name":"Leonid A","orcid":"0000-0002-0977-7989"}],"project":[{"name":"Atomic-Resolution Structures of Mitochondrial Respiratory Chain Supercomplexes (FEBS)","_id":"2593EBD6-B435-11E9-9278-68D0E5697425"},{"grant_number":"701309","_id":"2590DB08-B435-11E9-9278-68D0E5697425","call_identifier":"H2020","name":"Atomic-Resolution Structures of Mitochondrial Respiratory Chain Supercomplexes (H2020)"}],"article_type":"original","article_processing_charge":"No","publist_id":"6108","volume":538,"quality_controlled":"1","external_id":{"pmid":["27595392"]},"publication":"Nature","page":"406 - 410","date_created":"2018-12-11T11:50:49Z","department":[{"_id":"LeSa"}],"language":[{"iso":"eng"}],"type":"journal_article","oa":1,"status":"public","ec_funded":1,"month":"10","year":"2016","abstract":[{"lang":"eng","text":"Mitochondrial complex I (also known as NADH:ubiquinone oxidoreductase) contributes to cellular energy production by transferring electrons from NADH to ubiquinone coupled to proton translocation across the membrane. It is the largest protein assembly of the respiratory chain with a total mass of 970 kilodaltons. Here we present a nearly complete atomic structure of ovine (Ovis aries) mitochondrial complex I at 3.9 Å resolution, solved by cryo-electron microscopy with cross-linking and mass-spectrometry mapping experiments. All 14 conserved core subunits and 31 mitochondria-specific supernumerary subunits are resolved within the L-shaped molecule. The hydrophilic matrix arm comprises flavin mononucleotide and 8 iron-sulfur clusters involved in electron transfer, and the membrane arm contains 78 transmembrane helices, mostly contributed by antiporter-like subunits involved in proton translocation. Supernumerary subunits form an interlinked, stabilizing shell around the conserved core. Tightly bound lipids (including cardiolipins) further stabilize interactions between the hydrophobic subunits. Subunits with possible regulatory roles contain additional cofactors, NADPH and two phosphopantetheine molecules, which are shown to be involved in inter-subunit interactions. We observe two different conformations of the complex, which may be related to the conformationally driven coupling mechanism and to the active-deactive transition of the enzyme. Our structure provides insight into the mechanism, assembly, maturation and dysfunction of mitochondrial complex I, and allows detailed molecular analysis of disease-causing mutations."}],"issue":"7625","date_updated":"2021-01-12T06:49:13Z","_id":"1226","scopus_import":1,"main_file_link":[{"open_access":"1","url":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5164932/"}],"intvolume":"       538","citation":{"ieee":"K. Fiedorczuk, J. A. Letts, G. Degliesposti, K. Kaszuba, M. Skehel, and L. A. Sazanov, “Atomic structure of the entire mammalian mitochondrial complex i,” <i>Nature</i>, vol. 538, no. 7625. Nature Publishing Group, pp. 406–410, 2016.","ama":"Fiedorczuk K, Letts JA, Degliesposti G, Kaszuba K, Skehel M, Sazanov LA. Atomic structure of the entire mammalian mitochondrial complex i. <i>Nature</i>. 2016;538(7625):406-410. doi:<a href=\"https://doi.org/10.1038/nature19794\">10.1038/nature19794</a>","short":"K. Fiedorczuk, J.A. Letts, G. Degliesposti, K. Kaszuba, M. Skehel, L.A. Sazanov, Nature 538 (2016) 406–410.","chicago":"Fiedorczuk, Karol, James A Letts, Gianluca Degliesposti, Karol Kaszuba, Mark Skehel, and Leonid A Sazanov. “Atomic Structure of the Entire Mammalian Mitochondrial Complex I.” <i>Nature</i>. Nature Publishing Group, 2016. <a href=\"https://doi.org/10.1038/nature19794\">https://doi.org/10.1038/nature19794</a>.","ista":"Fiedorczuk K, Letts JA, Degliesposti G, Kaszuba K, Skehel M, Sazanov LA. 2016. Atomic structure of the entire mammalian mitochondrial complex i. Nature. 538(7625), 406–410.","apa":"Fiedorczuk, K., Letts, J. A., Degliesposti, G., Kaszuba, K., Skehel, M., &#38; Sazanov, L. A. (2016). Atomic structure of the entire mammalian mitochondrial complex i. <i>Nature</i>. Nature Publishing Group. <a href=\"https://doi.org/10.1038/nature19794\">https://doi.org/10.1038/nature19794</a>","mla":"Fiedorczuk, Karol, et al. “Atomic Structure of the Entire Mammalian Mitochondrial Complex I.” <i>Nature</i>, vol. 538, no. 7625, Nature Publishing Group, 2016, pp. 406–10, doi:<a href=\"https://doi.org/10.1038/nature19794\">10.1038/nature19794</a>."},"doi":"10.1038/nature19794","publication_status":"published","date_published":"2016-10-20T00:00:00Z","oa_version":"Submitted Version"},{"pubrep_id":"781","publist_id":"6107","volume":9957,"quality_controlled":"1","page":"128 - 144","date_created":"2018-12-11T11:50:49Z","has_accepted_license":"1","department":[{"_id":"ToHe"}],"language":[{"iso":"eng"}],"type":"conference","title":"Discrete abstraction of multiaffine systems","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","alternative_title":["LNCS"],"day":"25","acknowledgement":"This research was supported in part by the Austrian Science Fund (FWF) under grants S11402-N23, S11405-N23 and S11412-N23 (RiSE/SHiNE) and Z211-N23 (Wittgenstein Award).","file":[{"access_level":"open_access","creator":"system","checksum":"994e164b558c47bacf8dc066dd27c8fc","file_id":"4840","date_created":"2018-12-12T10:10:49Z","date_updated":"2020-07-14T12:44:39Z","file_name":"IST-2017-781-v1+1_main.pdf","file_size":683955,"content_type":"application/pdf","relation":"main_file"}],"author":[{"full_name":"Kong, Hui","last_name":"Kong","id":"3BDE25AA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-3066-6941","first_name":"Hui"},{"full_name":"Bartocci, Ezio","last_name":"Bartocci","first_name":"Ezio"},{"full_name":"Bogomolov, Sergiy","first_name":"Sergiy","orcid":"0000-0002-0686-0365","last_name":"Bogomolov","id":"369D9A44-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Grosu, Radu","first_name":"Radu","last_name":"Grosu"},{"orcid":"0000−0002−2985−7724","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","full_name":"Henzinger, Thomas A"},{"full_name":"Jiang, Yu","first_name":"Yu","last_name":"Jiang"},{"full_name":"Schilling, Christian","first_name":"Christian","orcid":"0000-0003-3658-1065","last_name":"Schilling","id":"3A2F4DCE-F248-11E8-B48F-1D18A9856A87"}],"project":[{"_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211","call_identifier":"FWF","name":"The Wittgenstein Prize"},{"_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23","name":"Rigorous Systems Engineering","call_identifier":"FWF"}],"ddc":["005"],"file_date_updated":"2020-07-14T12:44:39Z","scopus_import":1,"citation":{"short":"H. Kong, E. Bartocci, S. Bogomolov, R. Grosu, T.A. Henzinger, Y. Jiang, C. Schilling, in:, Springer, 2016, pp. 128–144.","ama":"Kong H, Bartocci E, Bogomolov S, et al. Discrete abstraction of multiaffine systems. In: Vol 9957. Springer; 2016:128-144. doi:<a href=\"https://doi.org/10.1007/978-3-319-47151-8_9\">10.1007/978-3-319-47151-8_9</a>","ieee":"H. Kong <i>et al.</i>, “Discrete abstraction of multiaffine systems,” presented at the HSB: Hybrid Systems Biology, Grenoble, France, 2016, vol. 9957, pp. 128–144.","ista":"Kong H, Bartocci E, Bogomolov S, Grosu R, Henzinger TA, Jiang Y, Schilling C. 2016. Discrete abstraction of multiaffine systems. HSB: Hybrid Systems Biology, LNCS, vol. 9957, 128–144.","mla":"Kong, Hui, et al. <i>Discrete Abstraction of Multiaffine Systems</i>. Vol. 9957, Springer, 2016, pp. 128–44, doi:<a href=\"https://doi.org/10.1007/978-3-319-47151-8_9\">10.1007/978-3-319-47151-8_9</a>.","apa":"Kong, H., Bartocci, E., Bogomolov, S., Grosu, R., Henzinger, T. A., Jiang, Y., &#38; Schilling, C. (2016). Discrete abstraction of multiaffine systems (Vol. 9957, pp. 128–144). Presented at the HSB: Hybrid Systems Biology, Grenoble, France: Springer. <a href=\"https://doi.org/10.1007/978-3-319-47151-8_9\">https://doi.org/10.1007/978-3-319-47151-8_9</a>","chicago":"Kong, Hui, Ezio Bartocci, Sergiy Bogomolov, Radu Grosu, Thomas A Henzinger, Yu Jiang, and Christian Schilling. “Discrete Abstraction of Multiaffine Systems,” 9957:128–44. Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-319-47151-8_9\">https://doi.org/10.1007/978-3-319-47151-8_9</a>."},"intvolume":"      9957","doi":"10.1007/978-3-319-47151-8_9","conference":{"start_date":"2016-10-20","name":"HSB: Hybrid Systems Biology","end_date":"2016-10-21","location":"Grenoble, France"},"publication_status":"published","date_published":"2016-09-25T00:00:00Z","oa_version":"Submitted Version","oa":1,"status":"public","month":"09","year":"2016","abstract":[{"lang":"eng","text":"Many biological systems can be modeled as multiaffine hybrid systems. Due to the nonlinearity of multiaffine systems, it is difficult to verify their properties of interest directly. A common strategy to tackle this problem is to construct and analyze a discrete overapproximation of the original system. However, the conservativeness of a discrete abstraction significantly determines the level of confidence we can have in the properties of the original system. In this paper, in order to reduce the conservativeness of a discrete abstraction, we propose a new method based on a sufficient and necessary decision condition for computing discrete transitions between states in the abstract system. We assume the state space partition of a multiaffine system to be based on a set of multivariate polynomials. Hence, a rectangular partition defined in terms of polynomials of the form (xi − c) is just a simple case of multivariate polynomial partition, and the new decision condition applies naturally. We analyze and demonstrate the improvement of our method over the existing methods using some examples."}],"date_updated":"2021-01-12T06:49:13Z","_id":"1227"},{"type":"conference","department":[{"_id":"KrPi"}],"language":[{"iso":"eng"}],"has_accepted_license":"1","date_created":"2018-12-11T11:50:50Z","page":"285 - 303","volume":9696,"quality_controlled":"1","related_material":{"record":[{"id":"83","status":"public","relation":"dissertation_contains"}]},"pubrep_id":"765","publist_id":"6105","author":[{"full_name":"Abusalah, Hamza M","first_name":"Hamza M","last_name":"Abusalah","id":"40297222-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Fuchsbauer, Georg","id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","last_name":"Fuchsbauer","first_name":"Georg"},{"full_name":"Pietrzak, Krzysztof Z","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","last_name":"Pietrzak"}],"project":[{"grant_number":"259668","_id":"258C570E-B435-11E9-9278-68D0E5697425","name":"Provable Security for Physical Cryptography","call_identifier":"FP7"},{"call_identifier":"H2020","name":"Teaching Old Crypto New Tricks","grant_number":"682815","_id":"258AA5B2-B435-11E9-9278-68D0E5697425"}],"file":[{"file_id":"5273","checksum":"34fa9ce681da845a1ba945ba3dc57867","creator":"system","access_level":"open_access","date_updated":"2020-07-14T12:44:39Z","file_name":"IST-2017-765-v1+1_838.pdf","date_created":"2018-12-12T10:17:20Z","content_type":"application/pdf","relation":"main_file","file_size":515000}],"acknowledgement":"Research  supported  by  the  European  Research  Council,  ERC  starting  grant (259668-PSPC) and ERC consolidator grant (682815 - TOCNeT).","day":"09","alternative_title":["LNCS"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","title":"Offline witness encryption","oa_version":"Submitted Version","date_published":"2016-06-09T00:00:00Z","doi":"10.1007/978-3-319-39555-5_16","publication_status":"published","conference":{"name":"ACNS: Applied Cryptography and Network Security","start_date":"2016-06-19","location":"Guildford, UK","end_date":"2016-06-22"},"intvolume":"      9696","citation":{"ista":"Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Offline witness encryption. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696, 285–303.","apa":"Abusalah, H. M., Fuchsbauer, G., &#38; Pietrzak, K. Z. (2016). Offline witness encryption (Vol. 9696, pp. 285–303). Presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK: Springer. <a href=\"https://doi.org/10.1007/978-3-319-39555-5_16\">https://doi.org/10.1007/978-3-319-39555-5_16</a>","mla":"Abusalah, Hamza M., et al. <i>Offline Witness Encryption</i>. Vol. 9696, Springer, 2016, pp. 285–303, doi:<a href=\"https://doi.org/10.1007/978-3-319-39555-5_16\">10.1007/978-3-319-39555-5_16</a>.","chicago":"Abusalah, Hamza M, Georg Fuchsbauer, and Krzysztof Z Pietrzak. “Offline Witness Encryption,” 9696:285–303. Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-319-39555-5_16\">https://doi.org/10.1007/978-3-319-39555-5_16</a>.","short":"H.M. Abusalah, G. Fuchsbauer, K.Z. Pietrzak, in:, Springer, 2016, pp. 285–303.","ama":"Abusalah HM, Fuchsbauer G, Pietrzak KZ. Offline witness encryption. In: Vol 9696. Springer; 2016:285-303. doi:<a href=\"https://doi.org/10.1007/978-3-319-39555-5_16\">10.1007/978-3-319-39555-5_16</a>","ieee":"H. M. Abusalah, G. Fuchsbauer, and K. Z. Pietrzak, “Offline witness encryption,” presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK, 2016, vol. 9696, pp. 285–303."},"scopus_import":1,"file_date_updated":"2020-07-14T12:44:39Z","ddc":["005","600"],"_id":"1229","abstract":[{"text":"Witness encryption (WE) was introduced by Garg et al. [GGSW13]. A WE scheme is defined for some NP language L and lets a sender encrypt messages relative to instances x. A ciphertext for x can be decrypted using w witnessing x ∈ L, but hides the message if x ∈ L. Garg et al. construct WE from multilinear maps and give another construction [GGH+13b] using indistinguishability obfuscation (iO) for circuits. Due to the reliance on such heavy tools, WE can cur- rently hardly be implemented on powerful hardware and will unlikely be realizable on constrained devices like smart cards any time soon. We construct a WE scheme where encryption is done by simply computing a Naor-Yung ciphertext (two CPA encryptions and a NIZK proof). To achieve this, our scheme has a setup phase, which outputs public parameters containing an obfuscated circuit (only required for decryption), two encryption keys and a common reference string (used for encryption). This setup need only be run once, and the parame- ters can be used for arbitrary many encryptions. Our scheme can also be turned into a functional WE scheme, where a message is encrypted w.r.t. a statement and a function f, and decryption with a witness w yields f (m, w). Our construction is inspired by the functional encryption scheme by Garg et al. and we prove (selective) security assuming iO and statistically simulation-sound NIZK. We give a construction of the latter in bilinear groups and combining it with ElGamal encryption, our ciphertexts are of size 1.3 kB at a 128-bit security level and can be computed on a smart card.","lang":"eng"}],"date_updated":"2023-09-07T12:30:22Z","year":"2016","month":"06","ec_funded":1,"status":"public","oa":1},{"citation":{"chicago":"Daca, Przemyslaw, Ashutosh Gupta, and Thomas A Henzinger. “Abstraction-Driven Concolic Testing,” 9583:328–47. Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-662-49122-5_16\">https://doi.org/10.1007/978-3-662-49122-5_16</a>.","apa":"Daca, P., Gupta, A., &#38; Henzinger, T. A. (2016). Abstraction-driven concolic testing (Vol. 9583, pp. 328–347). Presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, St. Petersburg, FL, USA: Springer. <a href=\"https://doi.org/10.1007/978-3-662-49122-5_16\">https://doi.org/10.1007/978-3-662-49122-5_16</a>","ista":"Daca P, Gupta A, Henzinger TA. 2016. Abstraction-driven concolic testing. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS, vol. 9583, 328–347.","mla":"Daca, Przemyslaw, et al. <i>Abstraction-Driven Concolic Testing</i>. Vol. 9583, Springer, 2016, pp. 328–47, doi:<a href=\"https://doi.org/10.1007/978-3-662-49122-5_16\">10.1007/978-3-662-49122-5_16</a>.","ieee":"P. Daca, A. Gupta, and T. A. Henzinger, “Abstraction-driven concolic testing,” presented at the VMCAI: Verification, Model Checking and Abstract Interpretation, St. Petersburg, FL, USA, 2016, vol. 9583, pp. 328–347.","ama":"Daca P, Gupta A, Henzinger TA. Abstraction-driven concolic testing. In: Vol 9583. Springer; 2016:328-347. doi:<a href=\"https://doi.org/10.1007/978-3-662-49122-5_16\">10.1007/978-3-662-49122-5_16</a>","short":"P. Daca, A. Gupta, T.A. Henzinger, in:, Springer, 2016, pp. 328–347."},"intvolume":"      9583","scopus_import":1,"main_file_link":[{"url":"https://arxiv.org/abs/1511.02615","open_access":"1"}],"date_published":"2016-01-01T00:00:00Z","oa_version":"Preprint","publication_status":"published","conference":{"start_date":"2016-01-17","name":"VMCAI: Verification, Model Checking and Abstract Interpretation","end_date":"2016-01-19","location":"St. Petersburg, FL, USA"},"doi":"10.1007/978-3-662-49122-5_16","ec_funded":1,"month":"01","oa":1,"status":"public","_id":"1230","year":"2016","date_updated":"2023-09-07T11:58:33Z","abstract":[{"lang":"eng","text":"Concolic testing is a promising method for generating test suites for large programs. However, it suffers from the path-explosion problem and often fails to find tests that cover difficult-to-reach parts of programs. In contrast, model checkers based on counterexample-guided abstraction refinement explore programs exhaustively, while failing to scale on large programs with precision. In this paper, we present a novel method that iteratively combines concolic testing and model checking to find a test suite for a given coverage criterion. If concolic testing fails to cover some test goals, then the model checker refines its program abstraction to prove more paths infeasible, which reduces the search space for concolic testing. We have implemented our method on top of the concolictesting tool Crest and the model checker CpaChecker. We evaluated our tool on a collection of programs and a category of SvComp benchmarks. In our experiments, we observed an improvement in branch coverage compared to Crest from 48% to 63% in the best case, and from 66% to 71% on average."}],"related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"1155"}]},"quality_controlled":"1","volume":9583,"publist_id":"6104","language":[{"iso":"eng"}],"department":[{"_id":"ToHe"}],"type":"conference","page":"328 - 347","date_created":"2018-12-11T11:50:50Z","alternative_title":["LNCS"],"title":"Abstraction-driven concolic testing","publisher":"Springer","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","project":[{"call_identifier":"FP7","name":"Quantitative Reactive Modeling","_id":"25EE3708-B435-11E9-9278-68D0E5697425","grant_number":"267989"},{"_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211","name":"The Wittgenstein Prize","call_identifier":"FWF"},{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Rigorous Systems Engineering"}],"author":[{"first_name":"Przemyslaw","last_name":"Daca","id":"49351290-F248-11E8-B48F-1D18A9856A87","full_name":"Daca, Przemyslaw"},{"id":"335E5684-F248-11E8-B48F-1D18A9856A87","last_name":"Gupta","first_name":"Ashutosh","full_name":"Gupta, Ashutosh"},{"full_name":"Henzinger, Thomas A","first_name":"Thomas A","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger"}],"day":"01","acknowledgement":"We thank Andrey Kupriyanov for feedback on the manuscript,\r\nand Michael Tautschnig for help with preparing the experiments. This research was supported in part by the European Research Council (ERC) under grant 267989 (QUAREM) and by the Austrian Science Fund (FWF) under grants S11402-N23 (RiSE) and Z211-N23 (Wittgenstein Award)."},{"year":"2016","abstract":[{"lang":"eng","text":"We study the time-and memory-complexities of the problem of computing labels of (multiple) randomly selected challenge-nodes in a directed acyclic graph. The w-bit label of a node is the hash of the labels of its parents, and the hash function is modeled as a random oracle. Specific instances of this problem underlie both proofs of space [Dziembowski et al. CRYPTO’15] as well as popular memory-hard functions like scrypt. As our main tool, we introduce the new notion of a probabilistic parallel entangled pebbling game, a new type of combinatorial pebbling game on a graph, which is closely related to the labeling game on the same graph. As a first application of our framework, we prove that for scrypt, when the underlying hash function is invoked n times, the cumulative memory complexity (CMC) (a notion recently introduced by Alwen and Serbinenko (STOC’15) to capture amortized memory-hardness for parallel adversaries) is at least Ω(w · (n/ log(n))2). This bound holds for adversaries that can store many natural functions of the labels (e.g., linear combinations), but still not arbitrary functions thereof. We then introduce and study a combinatorial quantity, and show how a sufficiently small upper bound on it (which we conjecture) extends our CMC bound for scrypt to hold against arbitrary adversaries. We also show that such an upper bound solves the main open problem for proofs-of-space protocols: namely, establishing that the time complexity of computing the label of a random node in a graph on n nodes (given an initial kw-bit state) reduces tightly to the time complexity for black pebbling on the same graph (given an initial k-node pebbling)."}],"date_updated":"2021-01-12T06:49:15Z","_id":"1231","oa":1,"status":"public","ec_funded":1,"month":"04","doi":"10.1007/978-3-662-49896-5_13","conference":{"name":"EUROCRYPT: Theory and Applications of Cryptographic Techniques","start_date":"2016-05-08","location":"Vienna, Austria","end_date":"2016-05-12"},"publication_status":"published","date_published":"2016-04-28T00:00:00Z","oa_version":"Submitted Version","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2016/100"}],"scopus_import":1,"citation":{"apa":"Alwen, J. F., Chen, B., Kamath Hosdurg, C., Kolmogorov, V., Pietrzak, K. Z., &#38; Tessaro, S. (2016). On the complexity of scrypt and proofs of space in the parallel random oracle model (Vol. 9666, pp. 358–387). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Vienna, Austria: Springer. <a href=\"https://doi.org/10.1007/978-3-662-49896-5_13\">https://doi.org/10.1007/978-3-662-49896-5_13</a>","mla":"Alwen, Joel F., et al. <i>On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model</i>. Vol. 9666, Springer, 2016, pp. 358–87, doi:<a href=\"https://doi.org/10.1007/978-3-662-49896-5_13\">10.1007/978-3-662-49896-5_13</a>.","ista":"Alwen JF, Chen B, Kamath Hosdurg C, Kolmogorov V, Pietrzak KZ, Tessaro S. 2016. On the complexity of scrypt and proofs of space in the parallel random oracle model. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 9666, 358–387.","chicago":"Alwen, Joel F, Binyi Chen, Chethan Kamath Hosdurg, Vladimir Kolmogorov, Krzysztof Z Pietrzak, and Stefano Tessaro. “On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model,” 9666:358–87. Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-662-49896-5_13\">https://doi.org/10.1007/978-3-662-49896-5_13</a>.","short":"J.F. Alwen, B. Chen, C. Kamath Hosdurg, V. Kolmogorov, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2016, pp. 358–387.","ieee":"J. F. Alwen, B. Chen, C. Kamath Hosdurg, V. Kolmogorov, K. Z. Pietrzak, and S. Tessaro, “On the complexity of scrypt and proofs of space in the parallel random oracle model,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Vienna, Austria, 2016, vol. 9666, pp. 358–387.","ama":"Alwen JF, Chen B, Kamath Hosdurg C, Kolmogorov V, Pietrzak KZ, Tessaro S. On the complexity of scrypt and proofs of space in the parallel random oracle model. In: Vol 9666. Springer; 2016:358-387. doi:<a href=\"https://doi.org/10.1007/978-3-662-49896-5_13\">10.1007/978-3-662-49896-5_13</a>"},"intvolume":"      9666","day":"28","acknowledgement":"Joël Alwen, Chethan Kamath, and Krzysztof Pietrzak’s research is partially supported by an ERC starting grant (259668-PSPC). Vladimir Kolmogorov is partially supported by an ERC consolidator grant (616160-DOICV). Binyi Chen was partially supported by NSF grants CNS-1423566 and CNS-1514526, and a gift from the Gareatis Foundation. Stefano Tessaro was partially supported by NSF grants CNS-1423566, CNS-1528178, a Hellman Fellowship, and the Glen and Susanne Culler Chair.\r\n\r\nThis work was done in part while the authors were visiting the Simons Institute for the Theory of Computing, supported by the Simons Foundation and by the DIMACS/Simons Collaboration in Cryptography through NSF grant CNS-1523467.","author":[{"full_name":"Alwen, Joel F","id":"2A8DFA8C-F248-11E8-B48F-1D18A9856A87","last_name":"Alwen","first_name":"Joel F"},{"full_name":"Chen, Binyi","first_name":"Binyi","last_name":"Chen"},{"full_name":"Kamath Hosdurg, Chethan","first_name":"Chethan","last_name":"Kamath Hosdurg","id":"4BD3F30E-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Kolmogorov","id":"3D50B0BA-F248-11E8-B48F-1D18A9856A87","first_name":"Vladimir","full_name":"Kolmogorov, Vladimir"},{"orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","full_name":"Pietrzak, Krzysztof Z"},{"full_name":"Tessaro, Stefano","last_name":"Tessaro","first_name":"Stefano"}],"project":[{"grant_number":"259668","_id":"258C570E-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","name":"Provable Security for Physical Cryptography"},{"call_identifier":"FP7","name":"Discrete Optimization in Computer Vision: Theory and Practice","grant_number":"616160","_id":"25FBA906-B435-11E9-9278-68D0E5697425"}],"title":"On the complexity of scrypt and proofs of space in the parallel random oracle model","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","alternative_title":["LNCS"],"page":"358 - 387","date_created":"2018-12-11T11:50:51Z","department":[{"_id":"KrPi"},{"_id":"VlKo"}],"language":[{"iso":"eng"}],"type":"conference","publist_id":"6103","volume":9666,"quality_controlled":"1"},{"publist_id":"6102","scopus_import":1,"quality_controlled":"1","citation":{"ieee":"J. A. Letts, K. Fiedorczuk, and L. A. Sazanov, “The architecture of respiratory supercomplexes,” <i>Nature</i>, vol. 537, no. 7622. Nature Publishing Group, pp. 644–648, 2016.","ama":"Letts JA, Fiedorczuk K, Sazanov LA. The architecture of respiratory supercomplexes. <i>Nature</i>. 2016;537(7622):644-648. doi:<a href=\"https://doi.org/10.1038/nature19774\">10.1038/nature19774</a>","short":"J.A. Letts, K. Fiedorczuk, L.A. Sazanov, Nature 537 (2016) 644–648.","apa":"Letts, J. A., Fiedorczuk, K., &#38; Sazanov, L. A. (2016). The architecture of respiratory supercomplexes. <i>Nature</i>. Nature Publishing Group. <a href=\"https://doi.org/10.1038/nature19774\">https://doi.org/10.1038/nature19774</a>","ista":"Letts JA, Fiedorczuk K, Sazanov LA. 2016. The architecture of respiratory supercomplexes. Nature. 537(7622), 644–648.","mla":"Letts, James A., et al. “The Architecture of Respiratory Supercomplexes.” <i>Nature</i>, vol. 537, no. 7622, Nature Publishing Group, 2016, pp. 644–48, doi:<a href=\"https://doi.org/10.1038/nature19774\">10.1038/nature19774</a>.","chicago":"Letts, James A, Karol Fiedorczuk, and Leonid A Sazanov. “The Architecture of Respiratory Supercomplexes.” <i>Nature</i>. Nature Publishing Group, 2016. <a href=\"https://doi.org/10.1038/nature19774\">https://doi.org/10.1038/nature19774</a>."},"intvolume":"       537","volume":537,"date_created":"2018-12-11T11:50:51Z","page":"644 - 648","publication":"Nature","publication_status":"published","doi":"10.1038/nature19774","language":[{"iso":"eng"}],"department":[{"_id":"LeSa"}],"date_published":"2016-09-29T00:00:00Z","type":"journal_article","oa_version":"None","title":"The architecture of respiratory supercomplexes","status":"public","publisher":"Nature Publishing Group","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","month":"09","day":"29","year":"2016","date_updated":"2021-01-12T06:49:16Z","acknowledgement":"We thank the MRC LMB Cambridge for the use of the Titan Krios microscope. Data processing was performed using the IST high-performance computer cluster. J.A.L. holds a long-term fellowship from FEBS. K.F. is partially funded by a MRC UK PhD fellowship.","abstract":[{"text":"Mitochondrial electron transport chain complexes are organized into supercomplexes responsible for carrying out cellular respiration. Here we present three architectures of mammalian (ovine) supercomplexes determined by cryo-electron microscopy. We identify two distinct arrangements of supercomplex CICIII 2 CIV (the respirasome) - a major 'tight' form and a minor 'loose' form (resolved at the resolution of 5.8 Å and 6.7 Å, respectively), which may represent different stages in supercomplex assembly or disassembly. We have also determined an architecture of supercomplex CICIII 2 at 7.8 Å resolution. All observed density can be attributed to the known 80 subunits of the individual complexes, including 132 transmembrane helices. The individual complexes form tight interactions that vary between the architectures, with complex IV subunit COX7a switching contact from complex III to complex I. The arrangement of active sites within the supercomplex may help control reactive oxygen species production. To our knowledge, these are the first complete architectures of the dominant, physiologically relevant state of the electron transport chain.","lang":"eng"}],"issue":"7622","_id":"1232","project":[{"name":"Atomic-Resolution Structures of Mitochondrial Respiratory Chain Supercomplexes (FEBS)","_id":"2593EBD6-B435-11E9-9278-68D0E5697425"}],"author":[{"id":"322DA418-F248-11E8-B48F-1D18A9856A87","last_name":"Letts","first_name":"James A","orcid":"0000-0002-9864-3586","full_name":"Letts, James A"},{"last_name":"Fiedorczuk","id":"5BFF67CE-02D1-11E9-B11A-A5A4D7DFFFD0","first_name":"Karol","full_name":"Fiedorczuk, Karol"},{"full_name":"Sazanov, Leonid A","last_name":"Sazanov","id":"338D39FE-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-0977-7989","first_name":"Leonid A"}]},{"month":"01","ec_funded":1,"status":"public","oa":1,"_id":"1233","date_updated":"2021-01-12T06:49:16Z","abstract":[{"text":"About three decades ago it was realized that implementing private channels between parties which can be adaptively corrupted requires an encryption scheme that is secure against selective opening attacks. Whether standard (IND-CPA) security implies security against selective opening attacks has been a major open question since. The only known reduction from selective opening to IND-CPA security loses an exponential factor. A polynomial reduction is only known for the very special case where the distribution considered in the selective opening security experiment is a product distribution, i.e., the messages are sampled independently from each other. In this paper we give a reduction whose loss is quantified via the dependence graph (where message dependencies correspond to edges) of the underlying message distribution. In particular, for some concrete distributions including Markov distributions, our reduction is polynomial.","lang":"eng"}],"year":"2016","intvolume":"      9562","citation":{"ieee":"G. Fuchsbauer, F. Heuer, E. Kiltz, and K. Z. Pietrzak, “Standard security does imply security against selective opening for markov distributions,” presented at the TCC: Theory of Cryptography Conference, Tel Aviv, Israel, 2016, vol. 9562, pp. 282–305.","ama":"Fuchsbauer G, Heuer F, Kiltz E, Pietrzak KZ. Standard security does imply security against selective opening for markov distributions. In: Vol 9562. Springer; 2016:282-305. doi:<a href=\"https://doi.org/10.1007/978-3-662-49096-9_12\">10.1007/978-3-662-49096-9_12</a>","short":"G. Fuchsbauer, F. Heuer, E. Kiltz, K.Z. Pietrzak, in:, Springer, 2016, pp. 282–305.","chicago":"Fuchsbauer, Georg, Felix Heuer, Eike Kiltz, and Krzysztof Z Pietrzak. “Standard Security Does Imply Security against Selective Opening for Markov Distributions,” 9562:282–305. Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-662-49096-9_12\">https://doi.org/10.1007/978-3-662-49096-9_12</a>.","apa":"Fuchsbauer, G., Heuer, F., Kiltz, E., &#38; Pietrzak, K. Z. (2016). Standard security does imply security against selective opening for markov distributions (Vol. 9562, pp. 282–305). Presented at the TCC: Theory of Cryptography Conference, Tel Aviv, Israel: Springer. <a href=\"https://doi.org/10.1007/978-3-662-49096-9_12\">https://doi.org/10.1007/978-3-662-49096-9_12</a>","ista":"Fuchsbauer G, Heuer F, Kiltz E, Pietrzak KZ. 2016. Standard security does imply security against selective opening for markov distributions. TCC: Theory of Cryptography Conference, LNCS, vol. 9562, 282–305.","mla":"Fuchsbauer, Georg, et al. <i>Standard Security Does Imply Security against Selective Opening for Markov Distributions</i>. Vol. 9562, Springer, 2016, pp. 282–305, doi:<a href=\"https://doi.org/10.1007/978-3-662-49096-9_12\">10.1007/978-3-662-49096-9_12</a>."},"main_file_link":[{"url":"https://eprint.iacr.org/2015/853","open_access":"1"}],"scopus_import":1,"oa_version":"Submitted Version","date_published":"2016-01-01T00:00:00Z","publication_status":"published","conference":{"location":"Tel Aviv, Israel","end_date":"2016-01-13","name":"TCC: Theory of Cryptography Conference","start_date":"2016-01-10"},"doi":"10.1007/978-3-662-49096-9_12","alternative_title":["LNCS"],"publisher":"Springer","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","title":"Standard security does imply security against selective opening for markov distributions","project":[{"_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668","call_identifier":"FP7","name":"Provable Security for Physical Cryptography"}],"author":[{"full_name":"Fuchsbauer, Georg","id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","last_name":"Fuchsbauer","first_name":"Georg"},{"full_name":"Heuer, Felix","last_name":"Heuer","first_name":"Felix"},{"full_name":"Kiltz, Eike","first_name":"Eike","last_name":"Kiltz"},{"full_name":"Pietrzak, Krzysztof Z","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87"}],"acknowledgement":"G. Fuchsbauer and K. Pietrzak are supported by the European Research Council, ERC Starting Grant (259668-PSPC). F. Heuer is funded by a Sofja Kovalevskaja Award of the Alexander von Humboldt Foundation and DFG SPP 1736, Algorithms for BIG DATA. E. Kiltz is supported by a Sofja Kovalevskaja Award of the Alexander von Humboldt Foundation, the German Israel Foundation, and ERC Project ERCC (FP7/615074).","day":"01","quality_controlled":"1","volume":9562,"publist_id":"6100","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"KrPi"}],"page":"282 - 305","date_created":"2018-12-11T11:50:51Z"},{"quality_controlled":"1","volume":9636,"related_material":{"record":[{"status":"public","relation":"later_version","id":"471"},{"id":"1155","relation":"dissertation_contains","status":"public"}]},"publist_id":"6099","type":"conference","department":[{"_id":"ToHe"},{"_id":"CaGu"}],"language":[{"iso":"eng"}],"page":"112 - 129","date_created":"2018-12-11T11:50:51Z","alternative_title":["LNCS"],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","title":"Faster statistical model checking for unbounded temporal properties","author":[{"first_name":"Przemyslaw","last_name":"Daca","id":"49351290-F248-11E8-B48F-1D18A9856A87","full_name":"Daca, Przemyslaw"},{"full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724","first_name":"Thomas A","last_name":"Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Kretinsky, Jan","first_name":"Jan","orcid":"0000-0002-8122-2881","last_name":"Kretinsky","id":"44CEF464-F248-11E8-B48F-1D18A9856A87"},{"id":"3D5811FC-F248-11E8-B48F-1D18A9856A87","last_name":"Petrov","first_name":"Tatjana","orcid":"0000-0002-9041-0905","full_name":"Petrov, Tatjana"}],"project":[{"call_identifier":"FP7","name":"Quantitative Reactive Modeling","grant_number":"267989","_id":"25EE3708-B435-11E9-9278-68D0E5697425"},{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","name":"Rigorous Systems Engineering","call_identifier":"FWF"},{"call_identifier":"FWF","name":"The Wittgenstein Prize","grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425"},{"call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme","_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734"}],"acknowledgement":"This research was funded in part by the European Research Council (ERC) under\r\ngrant  agreement  267989  (QUAREM),  the  Austrian  Science  Fund  (FWF)  under\r\ngrants project S11402-N23 (RiSE) and Z211-N23 (Wittgenstein Award), the Peo-\r\nple Programme (Marie Curie Actions) of the European Union’s Seventh Framework\r\nProgramme (FP7/2007-2013) REA Grant No 291734, the SNSF Advanced Postdoc.\r\nMobility Fellowship – grant number P300P2\r\n161067, and the Czech Science Foun-\r\ndation under grant agreement P202/12/G061.","day":"01","intvolume":"      9636","citation":{"ama":"Daca P, Henzinger TA, Kretinsky J, Petrov T. Faster statistical model checking for unbounded temporal properties. In: Vol 9636. Springer; 2016:112-129. doi:<a href=\"https://doi.org/10.1007/978-3-662-49674-9_7\">10.1007/978-3-662-49674-9_7</a>","ieee":"P. Daca, T. A. Henzinger, J. Kretinsky, and T. Petrov, “Faster statistical model checking for unbounded temporal properties,” presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, Eindhoven, The Netherlands, 2016, vol. 9636, pp. 112–129.","short":"P. Daca, T.A. Henzinger, J. Kretinsky, T. Petrov, in:, Springer, 2016, pp. 112–129.","ista":"Daca P, Henzinger TA, Kretinsky J, Petrov T. 2016. Faster statistical model checking for unbounded temporal properties. TACAS: Tools and Algorithms for the Construction and Analysis of Systems, LNCS, vol. 9636, 112–129.","apa":"Daca, P., Henzinger, T. A., Kretinsky, J., &#38; Petrov, T. (2016). Faster statistical model checking for unbounded temporal properties (Vol. 9636, pp. 112–129). Presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, Eindhoven, The Netherlands: Springer. <a href=\"https://doi.org/10.1007/978-3-662-49674-9_7\">https://doi.org/10.1007/978-3-662-49674-9_7</a>","mla":"Daca, Przemyslaw, et al. <i>Faster Statistical Model Checking for Unbounded Temporal Properties</i>. Vol. 9636, Springer, 2016, pp. 112–29, doi:<a href=\"https://doi.org/10.1007/978-3-662-49674-9_7\">10.1007/978-3-662-49674-9_7</a>.","chicago":"Daca, Przemyslaw, Thomas A Henzinger, Jan Kretinsky, and Tatjana Petrov. “Faster Statistical Model Checking for Unbounded Temporal Properties,” 9636:112–29. Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-662-49674-9_7\">https://doi.org/10.1007/978-3-662-49674-9_7</a>."},"scopus_import":1,"main_file_link":[{"url":"https://arxiv.org/abs/1504.05739","open_access":"1"}],"oa_version":"Preprint","date_published":"2016-01-01T00:00:00Z","doi":"10.1007/978-3-662-49674-9_7","publication_status":"published","conference":{"end_date":"2016-04-08","location":"Eindhoven, The Netherlands","start_date":"2016-04-02","name":"TACAS: Tools and Algorithms for the Construction and Analysis of Systems"},"month":"01","ec_funded":1,"status":"public","oa":1,"_id":"1234","abstract":[{"text":"We present a new algorithm for the statistical model checking of Markov chains with respect to unbounded temporal properties, including full linear temporal logic. The main idea is that we monitor each simulation run on the fly, in order to detect quickly if a bottom strongly connected component is entered with high probability, in which case the simulation run can be terminated early. As a result, our simulation runs are often much shorter than required by termination bounds that are computed a priori for a desired level of confidence on a large state space. In comparison to previous algorithms for statistical model checking our method is not only faster in many cases but also requires less information about the system, namely, only the minimum transition probability that occurs in the Markov chain. In addition, our method can be generalised to unbounded quantitative properties such as mean-payoff bounds.","lang":"eng"}],"date_updated":"2023-09-07T11:58:33Z","year":"2016"},{"title":"Constrained PRFs for unbounded inputs with short keys","publisher":"Springer","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","alternative_title":["LNCS"],"day":"01","acknowledgement":"H. Abusalah—Research supported by the European Research Council, ERC starting grant (259668-PSPC) and ERC consolidator grant (682815 - TOCNeT).","project":[{"name":"Provable Security for Physical Cryptography","call_identifier":"FP7","grant_number":"259668","_id":"258C570E-B435-11E9-9278-68D0E5697425"},{"_id":"258AA5B2-B435-11E9-9278-68D0E5697425","grant_number":"682815","name":"Teaching Old Crypto New Tricks","call_identifier":"H2020"}],"author":[{"first_name":"Hamza M","last_name":"Abusalah","id":"40297222-F248-11E8-B48F-1D18A9856A87","full_name":"Abusalah, Hamza M"},{"full_name":"Fuchsbauer, Georg","first_name":"Georg","last_name":"Fuchsbauer","id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87"}],"publist_id":"6098","related_material":{"record":[{"relation":"dissertation_contains","status":"public","id":"83"}]},"volume":9696,"quality_controlled":"1","page":"445 - 463","date_created":"2018-12-11T11:50:52Z","language":[{"iso":"eng"}],"department":[{"_id":"KrPi"}],"type":"conference","oa":1,"status":"public","ec_funded":1,"month":"01","year":"2016","date_updated":"2023-09-07T12:30:22Z","abstract":[{"lang":"eng","text":"A constrained pseudorandom function (CPRF) F: K×X → Y for a family T of subsets of χ is a function where for any key k ∈ K and set S ∈ T one can efficiently compute a short constrained key kS, which allows to evaluate F(k, ·) on all inputs x ∈ S, while the outputs on all inputs x /∈ S look random even given kS. Abusalah et al. recently constructed the first constrained PRF for inputs of arbitrary length whose sets S are decided by Turing machines. They use their CPRF to build broadcast encryption and the first ID-based non-interactive key exchange for an unbounded number of users. Their constrained keys are obfuscated circuits and are therefore large. In this work we drastically reduce the key size and define a constrained key for a Turing machine M as a short signature on M. For this, we introduce a new signature primitive with constrained signing keys that let one only sign certain messages, while forging a signature on others is hard even when knowing the coins for key generation."}],"_id":"1235","scopus_import":1,"main_file_link":[{"url":"https://eprint.iacr.org/2016/279.pdf","open_access":"1"}],"intvolume":"      9696","citation":{"chicago":"Abusalah, Hamza M, and Georg Fuchsbauer. “Constrained PRFs for Unbounded Inputs with Short Keys,” 9696:445–63. Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-319-39555-5_24\">https://doi.org/10.1007/978-3-319-39555-5_24</a>.","ista":"Abusalah HM, Fuchsbauer G. 2016. Constrained PRFs for unbounded inputs with short keys. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696, 445–463.","apa":"Abusalah, H. M., &#38; Fuchsbauer, G. (2016). Constrained PRFs for unbounded inputs with short keys (Vol. 9696, pp. 445–463). Presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK: Springer. <a href=\"https://doi.org/10.1007/978-3-319-39555-5_24\">https://doi.org/10.1007/978-3-319-39555-5_24</a>","mla":"Abusalah, Hamza M., and Georg Fuchsbauer. <i>Constrained PRFs for Unbounded Inputs with Short Keys</i>. Vol. 9696, Springer, 2016, pp. 445–63, doi:<a href=\"https://doi.org/10.1007/978-3-319-39555-5_24\">10.1007/978-3-319-39555-5_24</a>.","ieee":"H. M. Abusalah and G. Fuchsbauer, “Constrained PRFs for unbounded inputs with short keys,” presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK, 2016, vol. 9696, pp. 445–463.","ama":"Abusalah HM, Fuchsbauer G. Constrained PRFs for unbounded inputs with short keys. In: Vol 9696. Springer; 2016:445-463. doi:<a href=\"https://doi.org/10.1007/978-3-319-39555-5_24\">10.1007/978-3-319-39555-5_24</a>","short":"H.M. Abusalah, G. Fuchsbauer, in:, Springer, 2016, pp. 445–463."},"publication_status":"published","conference":{"start_date":"2016-06-19","name":"ACNS: Applied Cryptography and Network Security","end_date":"2016-06-22","location":"Guildford, UK"},"doi":"10.1007/978-3-319-39555-5_24","date_published":"2016-01-01T00:00:00Z","oa_version":"Submitted Version"},{"date_created":"2018-12-11T11:50:52Z","page":"413 - 428","has_accepted_license":"1","department":[{"_id":"KrPi"}],"language":[{"iso":"eng"}],"type":"conference","pubrep_id":"764","publist_id":"6097","related_material":{"record":[{"id":"83","relation":"dissertation_contains","status":"public"}]},"volume":9610,"quality_controlled":"1","day":"02","acknowledgement":"Supported by the European Research Council, ERC Starting Grant (259668-PSPC).","file":[{"access_level":"open_access","file_id":"4664","checksum":"3851cee49933ae13b1272e516f213e13","creator":"system","date_created":"2018-12-12T10:08:05Z","file_name":"IST-2017-764-v1+1_279.pdf","date_updated":"2020-07-14T12:44:41Z","file_size":495176,"content_type":"application/pdf","relation":"main_file"}],"author":[{"full_name":"Abusalah, Hamza M","first_name":"Hamza M","id":"40297222-F248-11E8-B48F-1D18A9856A87","last_name":"Abusalah"},{"full_name":"Fuchsbauer, Georg","first_name":"Georg","id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","last_name":"Fuchsbauer"},{"full_name":"Pietrzak, Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","last_name":"Pietrzak","first_name":"Krzysztof Z","orcid":"0000-0002-9139-1654"}],"project":[{"grant_number":"259668","_id":"258C570E-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","name":"Provable Security for Physical Cryptography"}],"title":"Constrained PRFs for unbounded inputs","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","alternative_title":["LNCS"],"doi":"10.1007/978-3-319-29485-8_24","publication_status":"published","conference":{"start_date":"2016-02-29","name":"CT-RSA: Topics in Cryptology","end_date":"2016-03-04","location":"San Francisco, CA, USA"},"date_published":"2016-02-02T00:00:00Z","oa_version":"Submitted Version","ddc":["005","600"],"scopus_import":1,"file_date_updated":"2020-07-14T12:44:41Z","intvolume":"      9610","citation":{"ieee":"H. M. Abusalah, G. Fuchsbauer, and K. Z. Pietrzak, “Constrained PRFs for unbounded inputs,” presented at the CT-RSA: Topics in Cryptology, San Francisco, CA, USA, 2016, vol. 9610, pp. 413–428.","ama":"Abusalah HM, Fuchsbauer G, Pietrzak KZ. Constrained PRFs for unbounded inputs. In: Vol 9610. Springer; 2016:413-428. doi:<a href=\"https://doi.org/10.1007/978-3-319-29485-8_24\">10.1007/978-3-319-29485-8_24</a>","short":"H.M. Abusalah, G. Fuchsbauer, K.Z. Pietrzak, in:, Springer, 2016, pp. 413–428.","chicago":"Abusalah, Hamza M, Georg Fuchsbauer, and Krzysztof Z Pietrzak. “Constrained PRFs for Unbounded Inputs,” 9610:413–28. Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-319-29485-8_24\">https://doi.org/10.1007/978-3-319-29485-8_24</a>.","mla":"Abusalah, Hamza M., et al. <i>Constrained PRFs for Unbounded Inputs</i>. Vol. 9610, Springer, 2016, pp. 413–28, doi:<a href=\"https://doi.org/10.1007/978-3-319-29485-8_24\">10.1007/978-3-319-29485-8_24</a>.","apa":"Abusalah, H. M., Fuchsbauer, G., &#38; Pietrzak, K. Z. (2016). Constrained PRFs for unbounded inputs (Vol. 9610, pp. 413–428). Presented at the CT-RSA: Topics in Cryptology, San Francisco, CA, USA: Springer. <a href=\"https://doi.org/10.1007/978-3-319-29485-8_24\">https://doi.org/10.1007/978-3-319-29485-8_24</a>","ista":"Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Constrained PRFs for unbounded inputs. CT-RSA: Topics in Cryptology, LNCS, vol. 9610, 413–428."},"year":"2016","abstract":[{"lang":"eng","text":"A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function where for any key k ∈ K and set S ∈ T one can efficiently compute a constrained key kS which allows to evaluate F (k, ·) on all inputs x ∈ S, while even given this key, the outputs on all inputs x ∉ S look random. At Asiacrypt’13 Boneh and Waters gave a construction which supports the most general set family so far. Its keys kc are defined for sets decided by boolean circuits C and enable evaluation of the PRF on any x ∈ X where C(x) = 1. In their construction the PRF input length and the size of the circuits C for which constrained keys can be computed must be fixed beforehand during key generation. We construct a constrained PRF that has an unbounded input length and whose constrained keys can be defined for any set recognized by a Turing machine. The only a priori bound we make is on the description size of the machines. We prove our construction secure assuming publiccoin differing-input obfuscation. As applications of our constrained PRF we build a broadcast encryption scheme where the number of potential receivers need not be fixed at setup (in particular, the length of the keys is independent of the number of parties) and the first identity-based non-interactive key exchange protocol with no bound on the number of parties that can agree on a shared key."}],"date_updated":"2023-09-07T12:30:22Z","_id":"1236","oa":1,"status":"public","ec_funded":1,"month":"02"},{"_id":"1237","year":"2016","abstract":[{"text":"Bitmap images of arbitrary dimension may be formally perceived as unions of m-dimensional boxes aligned with respect to a rectangular grid in ℝm. Cohomology and homology groups are well known topological invariants of such sets. Cohomological operations, such as the cup product, provide higher-order algebraic topological invariants, especially important for digital images of dimension higher than 3. If such an operation is determined at the level of simplicial chains [see e.g. González-Díaz, Real, Homology, Homotopy Appl, 2003, 83-93], then it is effectively computable. However, decomposing a cubical complex into a simplicial one deleteriously affects the efficiency of such an approach. In order to avoid this overhead, a direct cubical approach was applied in [Pilarczyk, Real, Adv. Comput. Math., 2015, 253-275] for the cup product in cohomology, and implemented in the ChainCon software package [http://www.pawelpilarczyk.com/chaincon/]. We establish a formula for the Steenrod square operations [see Steenrod, Annals of Mathematics. Second Series, 1947, 290-320] directly at the level of cubical chains, and we prove the correctness of this formula. An implementation of this formula is programmed in C++ within the ChainCon software framework. We provide a few examples and discuss the effectiveness of this approach. One specific application follows from the fact that Steenrod squares yield tests for the topological extension problem: Can a given map A → Sd to a sphere Sd be extended to a given super-complex X of A? In particular, the ROB-SAT problem, which is to decide for a given function f: X → ℝm and a value r &gt; 0 whether every g: X → ℝm with ∥g - f ∥∞ ≤ r has a root, reduces to the extension problem.","lang":"eng"}],"date_updated":"2021-01-12T06:49:18Z","ec_funded":1,"month":"06","status":"public","date_published":"2016-06-02T00:00:00Z","oa_version":"None","doi":"10.1007/978-3-319-39441-1_13","conference":{"start_date":"2016-06-15","name":"CTIC: Computational Topology in Image Context","end_date":"2016-06-17","location":"Marseille, France"},"publication_status":"published","citation":{"chicago":"Krcál, Marek, and Pawel Pilarczyk. “Computation of Cubical Steenrod Squares,” 9667:140–51. Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-319-39441-1_13\">https://doi.org/10.1007/978-3-319-39441-1_13</a>.","apa":"Krcál, M., &#38; Pilarczyk, P. (2016). Computation of cubical Steenrod squares (Vol. 9667, pp. 140–151). Presented at the CTIC: Computational Topology in Image Context, Marseille, France: Springer. <a href=\"https://doi.org/10.1007/978-3-319-39441-1_13\">https://doi.org/10.1007/978-3-319-39441-1_13</a>","ista":"Krcál M, Pilarczyk P. 2016. Computation of cubical Steenrod squares. CTIC: Computational Topology in Image Context, LNCS, vol. 9667, 140–151.","mla":"Krcál, Marek, and Pawel Pilarczyk. <i>Computation of Cubical Steenrod Squares</i>. Vol. 9667, Springer, 2016, pp. 140–51, doi:<a href=\"https://doi.org/10.1007/978-3-319-39441-1_13\">10.1007/978-3-319-39441-1_13</a>.","ama":"Krcál M, Pilarczyk P. Computation of cubical Steenrod squares. In: Vol 9667. Springer; 2016:140-151. doi:<a href=\"https://doi.org/10.1007/978-3-319-39441-1_13\">10.1007/978-3-319-39441-1_13</a>","ieee":"M. Krcál and P. Pilarczyk, “Computation of cubical Steenrod squares,” presented at the CTIC: Computational Topology in Image Context, Marseille, France, 2016, vol. 9667, pp. 140–151.","short":"M. Krcál, P. Pilarczyk, in:, Springer, 2016, pp. 140–151."},"intvolume":"      9667","scopus_import":1,"author":[{"full_name":"Krcál, Marek","id":"33E21118-F248-11E8-B48F-1D18A9856A87","last_name":"Krcál","first_name":"Marek"},{"id":"3768D56A-F248-11E8-B48F-1D18A9856A87","last_name":"Pilarczyk","first_name":"Pawel","full_name":"Pilarczyk, Pawel"}],"project":[{"grant_number":"291734","_id":"25681D80-B435-11E9-9278-68D0E5697425","name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7"},{"_id":"255F06BE-B435-11E9-9278-68D0E5697425","grant_number":"622033","call_identifier":"FP7","name":"Persistent Homology - Images, Data and Maps"}],"day":"02","acknowledgement":"The research conducted by both authors has received funding from the People Programme (Marie Curie Actions) of the European Union’s Seventh Framework Programme (FP7/2007-2013) under REA grant agreements no. 291734 (for M. K.) and no. 622033 (for P. P.).","alternative_title":["LNCS"],"title":"Computation of cubical Steenrod squares","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","department":[{"_id":"UlWa"},{"_id":"HeEd"}],"language":[{"iso":"eng"}],"type":"conference","page":"140 - 151","date_created":"2018-12-11T11:50:52Z","volume":9667,"quality_controlled":"1","publist_id":"6096"},{"oa_version":"Published Version","date_published":"2016-01-29T00:00:00Z","doi":"10.3389/fpls.2015.01262","publication_status":"published","intvolume":"         6","citation":{"short":"D. von Wangenheim, A. Rosero, G. Komis, O. Šamajová, M. Ovečka, B. Voigt, J. Šamaj, Frontiers in Plant Science 6 (2016).","ama":"von Wangenheim D, Rosero A, Komis G, et al. Endosomal interactions during root hair growth. <i>Frontiers in Plant Science</i>. 2016;6(JAN2016). doi:<a href=\"https://doi.org/10.3389/fpls.2015.01262\">10.3389/fpls.2015.01262</a>","ieee":"D. von Wangenheim <i>et al.</i>, “Endosomal interactions during root hair growth,” <i>Frontiers in Plant Science</i>, vol. 6, no. JAN2016. Frontiers Research Foundation, 2016.","ista":"von Wangenheim D, Rosero A, Komis G, Šamajová O, Ovečka M, Voigt B, Šamaj J. 2016. Endosomal interactions during root hair growth. Frontiers in Plant Science. 6(JAN2016), 1262.","mla":"von Wangenheim, Daniel, et al. “Endosomal Interactions during Root Hair Growth.” <i>Frontiers in Plant Science</i>, vol. 6, no. JAN2016, 1262, Frontiers Research Foundation, 2016, doi:<a href=\"https://doi.org/10.3389/fpls.2015.01262\">10.3389/fpls.2015.01262</a>.","apa":"von Wangenheim, D., Rosero, A., Komis, G., Šamajová, O., Ovečka, M., Voigt, B., &#38; Šamaj, J. (2016). Endosomal interactions during root hair growth. <i>Frontiers in Plant Science</i>. Frontiers Research Foundation. <a href=\"https://doi.org/10.3389/fpls.2015.01262\">https://doi.org/10.3389/fpls.2015.01262</a>","chicago":"Wangenheim, Daniel von, Amparo Rosero, George Komis, Olga Šamajová, Miroslav Ovečka, Boris Voigt, and Jozef Šamaj. “Endosomal Interactions during Root Hair Growth.” <i>Frontiers in Plant Science</i>. Frontiers Research Foundation, 2016. <a href=\"https://doi.org/10.3389/fpls.2015.01262\">https://doi.org/10.3389/fpls.2015.01262</a>."},"scopus_import":1,"file_date_updated":"2020-07-14T12:44:41Z","ddc":["581"],"article_number":"1262","_id":"1238","abstract":[{"text":"The dynamic localization of endosomal compartments labeled with targeted fluorescent protein tags is routinely followed by time lapse fluorescence microscopy approaches and single particle tracking algorithms. In this way trajectories of individual endosomes can be mapped and linked to physiological processes as cell growth. However, other aspects of dynamic behavior including endosomal interactions are difficult to follow in this manner. Therefore, we characterized the localization and dynamic properties of early and late endosomes throughout the entire course of root hair formation by means of spinning disc time lapse imaging and post-acquisition automated multitracking and quantitative analysis. Our results show differential motile behavior of early and late endosomes and interactions of late endosomes that may be specified to particular root hair domains. Detailed data analysis revealed a particular transient interaction between late endosomes—termed herein as dancing-endosomes—which is not concluding to vesicular fusion. Endosomes preferentially located in the root hair tip interacted as dancing-endosomes and traveled short distances during this interaction. Finally, sizes of early and late endosomes were addressed by means of super-resolution structured illumination microscopy (SIM) to corroborate measurements on the spinning disc. This is a first study providing quantitative microscopic data on dynamic spatio-temporal interactions of endosomes during root hair tip growth.","lang":"eng"}],"issue":"JAN2016","date_updated":"2021-01-12T06:49:18Z","year":"2016","month":"01","status":"public","oa":1,"type":"journal_article","department":[{"_id":"JiFr"}],"language":[{"iso":"eng"}],"has_accepted_license":"1","publication":"Frontiers in Plant Science","date_created":"2018-12-11T11:50:53Z","quality_controlled":"1","volume":6,"pubrep_id":"710","publist_id":"6094","author":[{"full_name":"Von Wangenheim, Daniel","orcid":"0000-0002-6862-1247","first_name":"Daniel","id":"49E91952-F248-11E8-B48F-1D18A9856A87","last_name":"Von Wangenheim"},{"first_name":"Amparo","last_name":"Rosero","full_name":"Rosero, Amparo"},{"last_name":"Komis","first_name":"George","full_name":"Komis, George"},{"full_name":"Šamajová, Olga","last_name":"Šamajová","first_name":"Olga"},{"last_name":"Ovečka","first_name":"Miroslav","full_name":"Ovečka, Miroslav"},{"full_name":"Voigt, Boris","last_name":"Voigt","first_name":"Boris"},{"last_name":"Šamaj","first_name":"Jozef","full_name":"Šamaj, Jozef"}],"file":[{"file_size":1640550,"relation":"main_file","content_type":"application/pdf","access_level":"open_access","file_id":"4760","creator":"system","checksum":"3127eab844d53564bf47e2b6b42f1ca0","date_created":"2018-12-12T10:09:36Z","date_updated":"2020-07-14T12:44:41Z","file_name":"IST-2016-710-v1+1_fpls-06-01262.pdf"}],"acknowledgement":"This work was supported by National Program for Sustainability I (grant no. LO1204) provided by the Czech Ministry of Education and by Institutional Fund of Palacký University Olomouc (GK and OŠ).\r\nWe thank Sabine Fischer for help with the statistics.","tmp":{"short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"day":"29","license":"https://creativecommons.org/licenses/by/4.0/","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publisher":"Frontiers Research Foundation","title":"Endosomal interactions during root hair growth"},{"volume":116,"citation":{"ama":"Callan Jones A, Ruprecht V, Wieser S, Heisenberg C-PJ, Voituriez R. Cortical flow-driven shapes of nonadherent cells. <i>Physical Review Letters</i>. 2016;116(2). doi:<a href=\"https://doi.org/10.1103/PhysRevLett.116.028102\">10.1103/PhysRevLett.116.028102</a>","ieee":"A. Callan Jones, V. Ruprecht, S. Wieser, C.-P. J. Heisenberg, and R. Voituriez, “Cortical flow-driven shapes of nonadherent cells,” <i>Physical Review Letters</i>, vol. 116, no. 2. American Physical Society, 2016.","short":"A. Callan Jones, V. Ruprecht, S. Wieser, C.-P.J. Heisenberg, R. Voituriez, Physical Review Letters 116 (2016).","apa":"Callan Jones, A., Ruprecht, V., Wieser, S., Heisenberg, C.-P. J., &#38; Voituriez, R. (2016). Cortical flow-driven shapes of nonadherent cells. <i>Physical Review Letters</i>. American Physical Society. <a href=\"https://doi.org/10.1103/PhysRevLett.116.028102\">https://doi.org/10.1103/PhysRevLett.116.028102</a>","ista":"Callan Jones A, Ruprecht V, Wieser S, Heisenberg C-PJ, Voituriez R. 2016. Cortical flow-driven shapes of nonadherent cells. Physical Review Letters. 116(2), 028102.","mla":"Callan Jones, Andrew, et al. “Cortical Flow-Driven Shapes of Nonadherent Cells.” <i>Physical Review Letters</i>, vol. 116, no. 2, 028102, American Physical Society, 2016, doi:<a href=\"https://doi.org/10.1103/PhysRevLett.116.028102\">10.1103/PhysRevLett.116.028102</a>.","chicago":"Callan Jones, Andrew, Verena Ruprecht, Stefan Wieser, Carl-Philipp J Heisenberg, and Raphaël Voituriez. “Cortical Flow-Driven Shapes of Nonadherent Cells.” <i>Physical Review Letters</i>. American Physical Society, 2016. <a href=\"https://doi.org/10.1103/PhysRevLett.116.028102\">https://doi.org/10.1103/PhysRevLett.116.028102</a>."},"quality_controlled":"1","intvolume":"       116","scopus_import":1,"publist_id":"6095","oa_version":"None","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"CaHe"}],"date_published":"2016-01-15T00:00:00Z","publication_status":"published","doi":"10.1103/PhysRevLett.116.028102","date_created":"2018-12-11T11:50:53Z","publication":"Physical Review Letters","month":"01","publisher":"American Physical Society","status":"public","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","title":"Cortical flow-driven shapes of nonadherent cells","project":[{"call_identifier":"FWF","name":"Cell- and Tissue Mechanics in Zebrafish Germ Layer Formation","grant_number":"T 560-B17","_id":"2529486C-B435-11E9-9278-68D0E5697425"}],"article_number":"028102","author":[{"full_name":"Callan Jones, Andrew","first_name":"Andrew","last_name":"Callan Jones"},{"id":"4D71A03A-F248-11E8-B48F-1D18A9856A87","last_name":"Ruprecht","first_name":"Verena","orcid":"0000-0003-4088-8633","full_name":"Ruprecht, Verena"},{"full_name":"Wieser, Stefan","orcid":"0000-0002-2670-2217","first_name":"Stefan","id":"355AA5A0-F248-11E8-B48F-1D18A9856A87","last_name":"Wieser"},{"first_name":"Carl-Philipp J","orcid":"0000-0002-0912-4566","last_name":"Heisenberg","id":"39427864-F248-11E8-B48F-1D18A9856A87","full_name":"Heisenberg, Carl-Philipp J"},{"first_name":"Raphaël","last_name":"Voituriez","full_name":"Voituriez, Raphaël"}],"_id":"1239","date_updated":"2021-01-12T06:49:19Z","abstract":[{"lang":"eng","text":"Nonadherent polarized cells have been observed to have a pearlike, elongated shape. Using a minimal model that describes the cell cortex as a thin layer of contractile active gel, we show that the anisotropy of active stresses, controlled by cortical viscosity and filament ordering, can account for this morphology. The predicted shapes can be determined from the flow pattern only; they prove to be independent of the mechanism at the origin of the cortical flow, and are only weakly sensitive to the cytoplasmic rheology. In the case of actin flows resulting from a contractile instability, we propose a phase diagram of three-dimensional cell shapes that encompasses nonpolarized spherical, elongated, as well as oblate shapes, all of which have been observed in experiment."}],"acknowledgement":"V. R. acknowledges support by the Austrian Science Fund (FWF): (Grant No. T560-B17).","issue":"2","day":"15","year":"2016"},{"tmp":{"short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"day":"29","acknowledgement":"This study was partly funded by the Austrian Science Fund (FWF F43-B09, FWF W1207-B09). PMG is a recipient of a DOC Fellowship of the Austrian Academy of Sciences.\r\nWe thank Ruth Klement, Tomasz Kulinski, Elisangela Valente, Elisabeth Salzer,\r\nand Roland Jäger for technical/bioinformatic assistance and advice, the CeMM\r\nIT department and José Manuel Molero for help and advice on software usage,\r\nthe Biomedical Sequencing Facility (http://biomedical-sequencing.at/) for\r\nsequencing and advice, Jacques Colinge, Daniel Andergassen, and Tomasz\r\nKulinski for discussions, Quanah Hudson and Jörg Menche for reading and\r\ncommenting on the manuscript.","file":[{"file_size":2914601,"relation":"main_file","content_type":"application/pdf","access_level":"open_access","checksum":"a268beee1a690801c83ec6729f9ebc5b","file_id":"4789","creator":"system","date_created":"2018-12-12T10:10:05Z","file_name":"IST-2016-709-v1+1_s13059-016-0873-8.pdf","date_updated":"2020-07-14T12:44:41Z"}],"author":[{"last_name":"Kornienko","first_name":"Aleksandra","full_name":"Kornienko, Aleksandra"},{"first_name":"Christoph","id":"4C66542E-F248-11E8-B48F-1D18A9856A87","last_name":"Dotter","full_name":"Dotter, Christoph"},{"first_name":"Philipp","last_name":"Guenzl","full_name":"Guenzl, Philipp"},{"last_name":"Gisslinger","first_name":"Heinz","full_name":"Gisslinger, Heinz"},{"full_name":"Gisslinger, Bettina","last_name":"Gisslinger","first_name":"Bettina"},{"full_name":"Cleary, Ciara","last_name":"Cleary","first_name":"Ciara"},{"first_name":"Robert","last_name":"Kralovics","full_name":"Kralovics, Robert"},{"full_name":"Pauler, Florian","first_name":"Florian","id":"48EA0138-F248-11E8-B48F-1D18A9856A87","last_name":"Pauler"},{"full_name":"Barlow, Denise","first_name":"Denise","last_name":"Barlow"}],"title":"Long non-coding RNAs display higher natural expression variation than protein-coding genes in healthy humans","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publisher":"BioMed Central","publication":"Genome Biology","date_created":"2018-12-11T11:50:53Z","has_accepted_license":"1","department":[{"_id":"GaNo"}],"language":[{"iso":"eng"}],"type":"journal_article","pubrep_id":"709","publist_id":"6093","volume":17,"quality_controlled":"1","year":"2016","abstract":[{"lang":"eng","text":"Background: Long non-coding RNAs (lncRNAs) are increasingly implicated as gene regulators and may ultimately be more numerous than protein-coding genes in the human genome. Despite large numbers of reported lncRNAs, reference annotations are likely incomplete due to their lower and tighter tissue-specific expression compared to mRNAs. An unexplored factor potentially confounding lncRNA identification is inter-individual expression variability. Here, we characterize lncRNA natural expression variability in human primary granulocytes. Results: We annotate granulocyte lncRNAs and mRNAs in RNA-seq data from 10 healthy individuals, identifying multiple lncRNAs absent from reference annotations, and use this to investigate three known features (higher tissue-specificity, lower expression, and reduced splicing efficiency) of lncRNAs relative to mRNAs. Expression variability was examined in seven individuals sampled three times at 1- or more than 1-month intervals. We show that lncRNAs display significantly more inter-individual expression variability compared to mRNAs. We confirm this finding in two independent human datasets by analyzing multiple tissues from the GTEx project and lymphoblastoid cell lines from the GEUVADIS project. Using the latter dataset we also show that including more human donors into the transcriptome annotation pipeline allows identification of an increasing number of lncRNAs, but minimally affects mRNA gene number. Conclusions: A comprehensive annotation of lncRNAs is known to require an approach that is sensitive to low and tight tissue-specific expression. Here we show that increased inter-individual expression variability is an additional general lncRNA feature to consider when creating a comprehensive annotation of human lncRNAs or proposing their use as prognostic or disease markers."}],"issue":"1","date_updated":"2021-01-12T06:49:20Z","_id":"1240","article_number":"14","oa":1,"status":"public","month":"01","doi":"10.1186/s13059-016-0873-8","publication_status":"published","date_published":"2016-01-29T00:00:00Z","oa_version":"Published Version","ddc":["576"],"file_date_updated":"2020-07-14T12:44:41Z","scopus_import":1,"citation":{"chicago":"Kornienko, Aleksandra, Christoph Dotter, Philipp Guenzl, Heinz Gisslinger, Bettina Gisslinger, Ciara Cleary, Robert Kralovics, Florian Pauler, and Denise Barlow. “Long Non-Coding RNAs Display Higher Natural Expression Variation than Protein-Coding Genes in Healthy Humans.” <i>Genome Biology</i>. BioMed Central, 2016. <a href=\"https://doi.org/10.1186/s13059-016-0873-8\">https://doi.org/10.1186/s13059-016-0873-8</a>.","ista":"Kornienko A, Dotter C, Guenzl P, Gisslinger H, Gisslinger B, Cleary C, Kralovics R, Pauler F, Barlow D. 2016. Long non-coding RNAs display higher natural expression variation than protein-coding genes in healthy humans. Genome Biology. 17(1), 14.","mla":"Kornienko, Aleksandra, et al. “Long Non-Coding RNAs Display Higher Natural Expression Variation than Protein-Coding Genes in Healthy Humans.” <i>Genome Biology</i>, vol. 17, no. 1, 14, BioMed Central, 2016, doi:<a href=\"https://doi.org/10.1186/s13059-016-0873-8\">10.1186/s13059-016-0873-8</a>.","apa":"Kornienko, A., Dotter, C., Guenzl, P., Gisslinger, H., Gisslinger, B., Cleary, C., … Barlow, D. (2016). Long non-coding RNAs display higher natural expression variation than protein-coding genes in healthy humans. <i>Genome Biology</i>. BioMed Central. <a href=\"https://doi.org/10.1186/s13059-016-0873-8\">https://doi.org/10.1186/s13059-016-0873-8</a>","short":"A. Kornienko, C. Dotter, P. Guenzl, H. Gisslinger, B. Gisslinger, C. Cleary, R. Kralovics, F. Pauler, D. Barlow, Genome Biology 17 (2016).","ama":"Kornienko A, Dotter C, Guenzl P, et al. Long non-coding RNAs display higher natural expression variation than protein-coding genes in healthy humans. <i>Genome Biology</i>. 2016;17(1). doi:<a href=\"https://doi.org/10.1186/s13059-016-0873-8\">10.1186/s13059-016-0873-8</a>","ieee":"A. Kornienko <i>et al.</i>, “Long non-coding RNAs display higher natural expression variation than protein-coding genes in healthy humans,” <i>Genome Biology</i>, vol. 17, no. 1. BioMed Central, 2016."},"intvolume":"        17"},{"acknowledgement":"This work was made possible by a “For Women in Science” fellowship (L’Oréal Österreich in cooperation with the Austrian Commission for the United Nations Educational, Scientific, and Cultural Organization and the Austrian Academy of Sciences with financial support from the Federal Ministry for Science and Research Austria) and European Research Council grant 250152 (to Nick Barton).","day":"01","author":[{"orcid":"0000-0001-9435-2813","first_name":"Hildegard","last_name":"Uecker","id":"2DB8F68A-F248-11E8-B48F-1D18A9856A87","full_name":"Uecker, Hildegard"},{"full_name":"Hermisson, Joachim","last_name":"Hermisson","first_name":"Joachim"}],"project":[{"name":"Limits to selection in biology and in evolutionary computation","call_identifier":"FP7","_id":"25B07788-B435-11E9-9278-68D0E5697425","grant_number":"250152"},{"name":"L'OREAL Fellowship","_id":"25B67606-B435-11E9-9278-68D0E5697425"}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publisher":"Genetics Society of America","title":"The role of recombination in evolutionary rescue","publication":"Genetics","date_created":"2018-12-11T11:50:54Z","page":"721 - 732","type":"journal_article","department":[{"_id":"NiBa"}],"language":[{"iso":"eng"}],"publist_id":"6091","volume":202,"quality_controlled":"1","issue":"2","abstract":[{"text":"How likely is it that a population escapes extinction through adaptive evolution? The answer to this question is of great relevance in conservation biology, where we aim at species’ rescue and the maintenance of biodiversity, and in agriculture and medicine, where we seek to hamper the emergence of pesticide or drug resistance. By reshuffling the genome, recombination has two antagonistic effects on the probability of evolutionary rescue: It generates and it breaks up favorable gene combinations. Which of the two effects prevails depends on the fitness effects of mutations and on the impact of stochasticity on the allele frequencies. In this article, we analyze a mathematical model for rescue after a sudden environmental change when adaptation is contingent on mutations at two loci. The analysis reveals a complex nonlinear dependence of population survival on recombination. We moreover find that, counterintuitively, a fast eradication of the wild type can promote rescue in the presence of recombination. The model also shows that two-step rescue is not unlikely to happen and can even be more likely than single-step rescue (where adaptation relies on a single mutation), depending on the circumstances.","lang":"eng"}],"date_updated":"2023-02-21T10:24:19Z","year":"2016","_id":"1241","status":"public","oa":1,"month":"02","ec_funded":1,"doi":"10.1534/genetics.115.180299","publication_status":"published","oa_version":"Preprint","date_published":"2016-02-01T00:00:00Z","scopus_import":1,"main_file_link":[{"open_access":"1","url":"http://biorxiv.org/content/early/2015/07/06/022020.abstract"}],"intvolume":"       202","citation":{"short":"H. Uecker, J. Hermisson, Genetics 202 (2016) 721–732.","ama":"Uecker H, Hermisson J. The role of recombination in evolutionary rescue. <i>Genetics</i>. 2016;202(2):721-732. doi:<a href=\"https://doi.org/10.1534/genetics.115.180299\">10.1534/genetics.115.180299</a>","ieee":"H. Uecker and J. Hermisson, “The role of recombination in evolutionary rescue,” <i>Genetics</i>, vol. 202, no. 2. Genetics Society of America, pp. 721–732, 2016.","chicago":"Uecker, Hildegard, and Joachim Hermisson. “The Role of Recombination in Evolutionary Rescue.” <i>Genetics</i>. Genetics Society of America, 2016. <a href=\"https://doi.org/10.1534/genetics.115.180299\">https://doi.org/10.1534/genetics.115.180299</a>.","apa":"Uecker, H., &#38; Hermisson, J. (2016). The role of recombination in evolutionary rescue. <i>Genetics</i>. Genetics Society of America. <a href=\"https://doi.org/10.1534/genetics.115.180299\">https://doi.org/10.1534/genetics.115.180299</a>","mla":"Uecker, Hildegard, and Joachim Hermisson. “The Role of Recombination in Evolutionary Rescue.” <i>Genetics</i>, vol. 202, no. 2, Genetics Society of America, 2016, pp. 721–32, doi:<a href=\"https://doi.org/10.1534/genetics.115.180299\">10.1534/genetics.115.180299</a>.","ista":"Uecker H, Hermisson J. 2016. The role of recombination in evolutionary rescue. Genetics. 202(2), 721–732."}},{"title":"Extending the dynamic range of transcription factor action by translational regulation","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publisher":"American Institute of Physics","day":"04","acknowledgement":"We thank T. Gregor, A. Prochaintz, and others for\r\nhelpful discussions. This work was supported in part by\r\nGrants No. PHY-1305525 and No. CCF-0939370 from the\r\nUS National Science Foundation and by the W.M. Keck\r\nFoundation. A.M.W. acknowledges the support by European\r\nResearch Council (ERC) Grant No. MCCIG PCIG10–GA-\r\n2011–303561. G.T. and T.R.S. were supported by Austrian\r\nScience Fund (FWF) Grant No. P28844S.","author":[{"first_name":"Thomas R","orcid":"0000-0002-1287-3779","last_name":"Sokolowski","id":"3E999752-F248-11E8-B48F-1D18A9856A87","full_name":"Sokolowski, Thomas R"},{"first_name":"Aleksandra","last_name":"Walczak","full_name":"Walczak, Aleksandra"},{"full_name":"Bialek, William","last_name":"Bialek","first_name":"William"},{"id":"3D494DCA-F248-11E8-B48F-1D18A9856A87","last_name":"Tkacik","orcid":"0000-0002-6699-1455","first_name":"Gasper","full_name":"Tkacik, Gasper"}],"project":[{"name":"Biophysics of information processing in gene regulation","call_identifier":"FWF","_id":"254E9036-B435-11E9-9278-68D0E5697425","grant_number":"P28844-B27"}],"publist_id":"6088","volume":93,"quality_controlled":"1","publication":"Physical Review E Statistical Nonlinear and Soft Matter Physics","date_created":"2018-12-11T11:50:54Z","department":[{"_id":"GaTk"}],"language":[{"iso":"eng"}],"type":"journal_article","oa":1,"status":"public","month":"02","year":"2016","issue":"2","abstract":[{"lang":"eng","text":"A crucial step in the regulation of gene expression is binding of transcription factor (TF) proteins to regulatory sites along the DNA. But transcription factors act at nanomolar concentrations, and noise due to random arrival of these molecules at their binding sites can severely limit the precision of regulation. Recent work on the optimization of information flow through regulatory networks indicates that the lower end of the dynamic range of concentrations is simply inaccessible, overwhelmed by the impact of this noise. Motivated by the behavior of homeodomain proteins, such as the maternal morphogen Bicoid in the fruit fly embryo, we suggest a scheme in which transcription factors also act as indirect translational regulators, binding to the mRNA of other regulatory proteins. Intuitively, each mRNA molecule acts as an independent sensor of the input concentration, and averaging over these multiple sensors reduces the noise. We analyze information flow through this scheme and identify conditions under which it outperforms direct transcriptional regulation. Our results suggest that the dual role of homeodomain proteins is not just a historical accident, but a solution to a crucial physics problem in the regulation of gene expression."}],"date_updated":"2021-01-12T06:49:20Z","_id":"1242","article_number":"022404","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1507.02562"}],"scopus_import":1,"citation":{"short":"T.R. Sokolowski, A. Walczak, W. Bialek, G. Tkačik, Physical Review E Statistical Nonlinear and Soft Matter Physics 93 (2016).","ama":"Sokolowski TR, Walczak A, Bialek W, Tkačik G. Extending the dynamic range of transcription factor action by translational regulation. <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>. 2016;93(2). doi:<a href=\"https://doi.org/10.1103/PhysRevE.93.022404\">10.1103/PhysRevE.93.022404</a>","ieee":"T. R. Sokolowski, A. Walczak, W. Bialek, and G. Tkačik, “Extending the dynamic range of transcription factor action by translational regulation,” <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>, vol. 93, no. 2. American Institute of Physics, 2016.","chicago":"Sokolowski, Thomas R, Aleksandra Walczak, William Bialek, and Gašper Tkačik. “Extending the Dynamic Range of Transcription Factor Action by Translational Regulation.” <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>. American Institute of Physics, 2016. <a href=\"https://doi.org/10.1103/PhysRevE.93.022404\">https://doi.org/10.1103/PhysRevE.93.022404</a>.","apa":"Sokolowski, T. R., Walczak, A., Bialek, W., &#38; Tkačik, G. (2016). Extending the dynamic range of transcription factor action by translational regulation. <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>. American Institute of Physics. <a href=\"https://doi.org/10.1103/PhysRevE.93.022404\">https://doi.org/10.1103/PhysRevE.93.022404</a>","ista":"Sokolowski TR, Walczak A, Bialek W, Tkačik G. 2016. Extending the dynamic range of transcription factor action by translational regulation. Physical Review E Statistical Nonlinear and Soft Matter Physics. 93(2), 022404.","mla":"Sokolowski, Thomas R., et al. “Extending the Dynamic Range of Transcription Factor Action by Translational Regulation.” <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>, vol. 93, no. 2, 022404, American Institute of Physics, 2016, doi:<a href=\"https://doi.org/10.1103/PhysRevE.93.022404\">10.1103/PhysRevE.93.022404</a>."},"intvolume":"        93","doi":"10.1103/PhysRevE.93.022404","publication_status":"published","date_published":"2016-02-04T00:00:00Z","oa_version":"Preprint"},{"date_published":"2016-02-08T00:00:00Z","oa_version":"None","publication_status":"published","doi":"10.1016/j.cub.2015.12.041","intvolume":"        26","citation":{"chicago":"Pleska, Maros, Long Qian, Reiko Okura, Tobias Bergmiller, Yuichi Wakamoto, Edo Kussell, and Calin C Guet. “Bacterial Autoimmunity Due to a Restriction-Modification System.” <i>Current Biology</i>. Cell Press, 2016. <a href=\"https://doi.org/10.1016/j.cub.2015.12.041\">https://doi.org/10.1016/j.cub.2015.12.041</a>.","apa":"Pleska, M., Qian, L., Okura, R., Bergmiller, T., Wakamoto, Y., Kussell, E., &#38; Guet, C. C. (2016). Bacterial autoimmunity due to a restriction-modification system. <i>Current Biology</i>. Cell Press. <a href=\"https://doi.org/10.1016/j.cub.2015.12.041\">https://doi.org/10.1016/j.cub.2015.12.041</a>","mla":"Pleska, Maros, et al. “Bacterial Autoimmunity Due to a Restriction-Modification System.” <i>Current Biology</i>, vol. 26, no. 3, Cell Press, 2016, pp. 404–09, doi:<a href=\"https://doi.org/10.1016/j.cub.2015.12.041\">10.1016/j.cub.2015.12.041</a>.","ista":"Pleska M, Qian L, Okura R, Bergmiller T, Wakamoto Y, Kussell E, Guet CC. 2016. Bacterial autoimmunity due to a restriction-modification system. Current Biology. 26(3), 404–409.","short":"M. Pleska, L. Qian, R. Okura, T. Bergmiller, Y. Wakamoto, E. Kussell, C.C. Guet, Current Biology 26 (2016) 404–409.","ama":"Pleska M, Qian L, Okura R, et al. Bacterial autoimmunity due to a restriction-modification system. <i>Current Biology</i>. 2016;26(3):404-409. doi:<a href=\"https://doi.org/10.1016/j.cub.2015.12.041\">10.1016/j.cub.2015.12.041</a>","ieee":"M. Pleska <i>et al.</i>, “Bacterial autoimmunity due to a restriction-modification system,” <i>Current Biology</i>, vol. 26, no. 3. Cell Press, pp. 404–409, 2016."},"scopus_import":1,"_id":"1243","year":"2016","date_updated":"2023-09-07T11:59:32Z","abstract":[{"text":"Restriction-modification (RM) systems represent a minimal and ubiquitous biological system of self/non-self discrimination in prokaryotes [1], which protects hosts from exogenous DNA [2]. The mechanism is based on the balance between methyltransferase (M) and cognate restriction endonuclease (R). M tags endogenous DNA as self by methylating short specific DNA sequences called restriction sites, whereas R recognizes unmethylated restriction sites as non-self and introduces a double-stranded DNA break [3]. Restriction sites are significantly underrepresented in prokaryotic genomes [4-7], suggesting that the discrimination mechanism is imperfect and occasionally leads to autoimmunity due to self-DNA cleavage (self-restriction) [8]. Furthermore, RM systems can promote DNA recombination [9] and contribute to genetic variation in microbial populations, thus facilitating adaptive evolution [10]. However, cleavage of self-DNA by RM systems as elements shaping prokaryotic genomes has not been directly detected, and its cause, frequency, and outcome are unknown. We quantify self-restriction caused by two RM systems of Escherichia coli and find that, in agreement with levels of restriction site avoidance, EcoRI, but not EcoRV, cleaves self-DNA at a measurable rate. Self-restriction is a stochastic process, which temporarily induces the SOS response, and is followed by DNA repair, maintaining cell viability. We find that RM systems with higher restriction efficiency against bacteriophage infections exhibit a higher rate of self-restriction, and that this rate can be further increased by stochastic imbalance between R and M. Our results identify molecular noise in RM systems as a factor shaping prokaryotic genomes.","lang":"eng"}],"issue":"3","month":"02","status":"public","language":[{"iso":"eng"}],"department":[{"_id":"CaGu"}],"type":"journal_article","page":"404 - 409","date_created":"2018-12-11T11:50:54Z","publication":"Current Biology","related_material":{"record":[{"id":"202","relation":"dissertation_contains","status":"public"}]},"volume":26,"quality_controlled":"1","publist_id":"6087","project":[{"name":"Effects of Stochasticity on the Function of Restriction-Modi cation Systems at the Single-Cell Level (DOC Fellowship)","_id":"251D65D8-B435-11E9-9278-68D0E5697425","grant_number":"24210"}],"author":[{"id":"4569785E-F248-11E8-B48F-1D18A9856A87","last_name":"Pleska","orcid":"0000-0001-7460-7479","first_name":"Maros","full_name":"Pleska, Maros"},{"last_name":"Qian","first_name":"Long","full_name":"Qian, Long"},{"full_name":"Okura, Reiko","last_name":"Okura","first_name":"Reiko"},{"id":"2C471CFA-F248-11E8-B48F-1D18A9856A87","last_name":"Bergmiller","first_name":"Tobias","orcid":"0000-0001-5396-4346","full_name":"Bergmiller, Tobias"},{"last_name":"Wakamoto","first_name":"Yuichi","full_name":"Wakamoto, Yuichi"},{"last_name":"Kussell","first_name":"Edo","full_name":"Kussell, Edo"},{"full_name":"Guet, Calin C","id":"47F8433E-F248-11E8-B48F-1D18A9856A87","last_name":"Guet","first_name":"Calin C","orcid":"0000-0001-6220-2052"}],"day":"08","acknowledgement":"This work was funded by an HFSP Young Investigators’ grant. M.P. is a recipient of a DOC Fellowship of the Austrian Academy of Science at the Institute of Science and Technology Austria. R.O. and Y.W. were supported by the Platform for Dynamic Approaches to Living System from MEXT, Japan. We wish to thank I. Kobayashi for providing us with the EcoRI and EcoRV plasmids, and A. Campbell for providing us with the λ vir phage. We thank D. Siekhaus and C. Uhler and members of the C.C.G. and J.P. Bollback laboratories for in-depth discussions. We thank B. Stern for comments on an earlier version of the manuscript. We especially thank B.R. Levin for advice and comments, and the anonymous reviewers for significantly improving the manuscript.","title":"Bacterial autoimmunity due to a restriction-modification system","publisher":"Cell Press","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87"},{"publication":"PNAS","page":"1811 - 1816","date_created":"2018-12-11T11:50:55Z","type":"journal_article","department":[{"_id":"GaTk"}],"language":[{"iso":"eng"}],"publist_id":"6085","quality_controlled":"1","volume":113,"acknowledgement":"We thank Sophie Martin, Ken Sawin, Stephen Huisman,\r\nand Damian Brunner for strains; Julianne\r\nTeapal, Marcel Janson, Sergio Rincon,\r\nand Phong Tran for technical assistance; Andrew Mugler and Bela Mulder for\r\ndiscussions; and Sander Tans, Phong Tran,\r\nand Anne Paoletti for critical reading\r\nof the manuscript. This work is part of the research program of the\r\n“\r\nStichting\r\nvoor Fundamenteel Onderzoek de Materie,\r\n”\r\nwhich is financially supported by\r\nthe\r\n“\r\nNederlandse organisatie voor Wete\r\nnschappelijk Onderzoek (NWO).\r\n”","day":"16","author":[{"full_name":"Recouvreux, Pierre","first_name":"Pierre","last_name":"Recouvreux"},{"first_name":"Thomas R","orcid":"0000-0002-1287-3779","last_name":"Sokolowski","id":"3E999752-F248-11E8-B48F-1D18A9856A87","full_name":"Sokolowski, Thomas R"},{"full_name":"Grammoustianou, Aristea","first_name":"Aristea","last_name":"Grammoustianou"},{"last_name":"Tenwolde","first_name":"Pieter","full_name":"Tenwolde, Pieter"},{"full_name":"Dogterom, Marileen","first_name":"Marileen","last_name":"Dogterom"}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publisher":"National Academy of Sciences","title":"Chimera proteins with affinity for membranes and microtubule tips polarize in the membrane of fission yeast cells","doi":"10.1073/pnas.1419248113","publication_status":"published","oa_version":"Submitted Version","date_published":"2016-02-16T00:00:00Z","main_file_link":[{"url":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4763754/","open_access":"1"}],"scopus_import":1,"intvolume":"       113","citation":{"ieee":"P. Recouvreux, T. R. Sokolowski, A. Grammoustianou, P. Tenwolde, and M. Dogterom, “Chimera proteins with affinity for membranes and microtubule tips polarize in the membrane of fission yeast cells,” <i>PNAS</i>, vol. 113, no. 7. National Academy of Sciences, pp. 1811–1816, 2016.","ama":"Recouvreux P, Sokolowski TR, Grammoustianou A, Tenwolde P, Dogterom M. Chimera proteins with affinity for membranes and microtubule tips polarize in the membrane of fission yeast cells. <i>PNAS</i>. 2016;113(7):1811-1816. doi:<a href=\"https://doi.org/10.1073/pnas.1419248113\">10.1073/pnas.1419248113</a>","short":"P. Recouvreux, T.R. Sokolowski, A. Grammoustianou, P. Tenwolde, M. Dogterom, PNAS 113 (2016) 1811–1816.","ista":"Recouvreux P, Sokolowski TR, Grammoustianou A, Tenwolde P, Dogterom M. 2016. Chimera proteins with affinity for membranes and microtubule tips polarize in the membrane of fission yeast cells. PNAS. 113(7), 1811–1816.","mla":"Recouvreux, Pierre, et al. “Chimera Proteins with Affinity for Membranes and Microtubule Tips Polarize in the Membrane of Fission Yeast Cells.” <i>PNAS</i>, vol. 113, no. 7, National Academy of Sciences, 2016, pp. 1811–16, doi:<a href=\"https://doi.org/10.1073/pnas.1419248113\">10.1073/pnas.1419248113</a>.","apa":"Recouvreux, P., Sokolowski, T. R., Grammoustianou, A., Tenwolde, P., &#38; Dogterom, M. (2016). Chimera proteins with affinity for membranes and microtubule tips polarize in the membrane of fission yeast cells. <i>PNAS</i>. National Academy of Sciences. <a href=\"https://doi.org/10.1073/pnas.1419248113\">https://doi.org/10.1073/pnas.1419248113</a>","chicago":"Recouvreux, Pierre, Thomas R Sokolowski, Aristea Grammoustianou, Pieter Tenwolde, and Marileen Dogterom. “Chimera Proteins with Affinity for Membranes and Microtubule Tips Polarize in the Membrane of Fission Yeast Cells.” <i>PNAS</i>. National Academy of Sciences, 2016. <a href=\"https://doi.org/10.1073/pnas.1419248113\">https://doi.org/10.1073/pnas.1419248113</a>."},"abstract":[{"lang":"eng","text":"Cell polarity refers to a functional spatial organization of proteins that is crucial for the control of essential cellular processes such as growth and division. To establish polarity, cells rely on elaborate regulation networks that control the distribution of proteins at the cell membrane. In fission yeast cells, a microtubule-dependent network has been identified that polarizes the distribution of signaling proteins that restricts growth to cell ends and targets the cytokinetic machinery to the middle of the cell. Although many molecular components have been shown to play a role in this network, it remains unknown which molecular functionalities are minimally required to establish a polarized protein distribution in this system. Here we show that a membrane-binding protein fragment, which distributes homogeneously in wild-type fission yeast cells, can be made to concentrate at cell ends by attaching it to a cytoplasmic microtubule end-binding protein. This concentration results in a polarized pattern of chimera proteins with a spatial extension that is very reminiscent of natural polarity patterns in fission yeast. However, chimera levels fluctuate in response to microtubule dynamics, and disruption of microtubules leads to disappearance of the pattern. Numerical simulations confirm that the combined functionality of membrane anchoring and microtubule tip affinity is in principle sufficient to create polarized patterns. Our chimera protein may thus represent a simple molecular functionality that is able to polarize the membrane, onto which additional layers of molecular complexity may be built to provide the temporal robustness that is typical of natural polarity patterns."}],"issue":"7","date_updated":"2021-01-12T06:49:21Z","year":"2016","_id":"1244","status":"public","oa":1,"month":"02"},{"author":[{"first_name":"Vineet","last_name":"Pandey","full_name":"Pandey, Vineet"},{"first_name":"Krishnendu","orcid":"0000-0002-4561-241X","last_name":"Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu"}],"project":[{"call_identifier":"FP7","name":"Quantitative Graph Games: Theory and Applications","_id":"2581B60A-B435-11E9-9278-68D0E5697425","grant_number":"279307"}],"day":"27","acknowledgement":"ERC Start Grant Graph Games 279307 supported this  research. ","title":"Game-theoretic models identify useful principles for peer collaboration in online learning platforms","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publisher":"ACM","department":[{"_id":"KrCh"}],"language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the ACM Conference on Computer Supported Cooperative Work","date_created":"2018-12-11T11:50:55Z","page":"365 - 368","quality_controlled":"1","volume":26,"publist_id":"6083","_id":"1245","year":"2016","abstract":[{"text":"To facilitate collaboration in massive online classrooms, instructors must make many decisions. For instance, the following parameters need to be decided when designing a peer-feedback system where students review each others' essays: the number of students each student must provide feedback to, an algorithm to map feedback providers to receivers, constraints that ensure students do not become free-riders (receiving feedback but not providing it), the best times to receive feedback to improve learning etc. While instructors can answer these questions by running experiments or invoking past experience, game-theoretic models with data from online learning platforms can identify better initial designs for further improvements. As an example, we explore the design space of a peer feedback system by modeling it using game theory. Our simulations show that incentivizing students to provide feedback requires the value obtained from receiving a feedback to exceed the cost of providing it by a large factor (greater than 7). Furthermore, hiding feedback from low-effort students incentivizes them to provide more feedback.","lang":"eng"}],"issue":"Februar-2016","date_updated":"2021-01-12T06:49:22Z","ec_funded":1,"month":"02","status":"public","date_published":"2016-02-27T00:00:00Z","oa_version":"None","doi":"10.1145/2818052.2869122","publication_status":"published","conference":{"start_date":"2016-02-26","name":"CSCW: Computer Supported Cooperative Work and Social Computing","end_date":"2016-03-02","location":"San Francisco, CA, USA"},"intvolume":"        26","citation":{"ieee":"V. Pandey and K. Chatterjee, “Game-theoretic models identify useful principles for peer collaboration in online learning platforms,” in <i>Proceedings of the ACM Conference on Computer Supported Cooperative Work</i>, San Francisco, CA, USA, 2016, vol. 26, no. Februar-2016, pp. 365–368.","ama":"Pandey V, Chatterjee K. Game-theoretic models identify useful principles for peer collaboration in online learning platforms. In: <i>Proceedings of the ACM Conference on Computer Supported Cooperative Work</i>. Vol 26. ACM; 2016:365-368. doi:<a href=\"https://doi.org/10.1145/2818052.2869122\">10.1145/2818052.2869122</a>","short":"V. Pandey, K. Chatterjee, in:, Proceedings of the ACM Conference on Computer Supported Cooperative Work, ACM, 2016, pp. 365–368.","apa":"Pandey, V., &#38; Chatterjee, K. (2016). Game-theoretic models identify useful principles for peer collaboration in online learning platforms. In <i>Proceedings of the ACM Conference on Computer Supported Cooperative Work</i> (Vol. 26, pp. 365–368). San Francisco, CA, USA: ACM. <a href=\"https://doi.org/10.1145/2818052.2869122\">https://doi.org/10.1145/2818052.2869122</a>","ista":"Pandey V, Chatterjee K. 2016. Game-theoretic models identify useful principles for peer collaboration in online learning platforms. Proceedings of the ACM Conference on Computer Supported Cooperative Work. CSCW: Computer Supported Cooperative Work and Social Computing vol. 26, 365–368.","mla":"Pandey, Vineet, and Krishnendu Chatterjee. “Game-Theoretic Models Identify Useful Principles for Peer Collaboration in Online Learning Platforms.” <i>Proceedings of the ACM Conference on Computer Supported Cooperative Work</i>, vol. 26, no. Februar-2016, ACM, 2016, pp. 365–68, doi:<a href=\"https://doi.org/10.1145/2818052.2869122\">10.1145/2818052.2869122</a>.","chicago":"Pandey, Vineet, and Krishnendu Chatterjee. “Game-Theoretic Models Identify Useful Principles for Peer Collaboration in Online Learning Platforms.” In <i>Proceedings of the ACM Conference on Computer Supported Cooperative Work</i>, 26:365–68. ACM, 2016. <a href=\"https://doi.org/10.1145/2818052.2869122\">https://doi.org/10.1145/2818052.2869122</a>."},"scopus_import":1}]
