[{"status":"public","type":"conference","title":"Compositional specifications for IOCO testing","citation":{"ieee":"P. Daca, T. A. Henzinger, W. Krenn, and D. Nickovic, “Compositional specifications for IOCO testing,” in <i>IEEE 7th International Conference on Software Testing, Verification and Validation</i>, Cleveland, USA, 2014.","ista":"Daca P, Henzinger TA, Krenn W, Nickovic D. 2014. Compositional specifications for IOCO testing. IEEE 7th International Conference on Software Testing, Verification and Validation. ICST: International Conference on Software Testing, Verification and Validation, 6823899.","short":"P. Daca, T.A. Henzinger, W. Krenn, D. Nickovic, in:, IEEE 7th International Conference on Software Testing, Verification and Validation, IEEE, 2014.","chicago":"Daca, Przemyslaw, Thomas A Henzinger, Willibald Krenn, and Dejan Nickovic. “Compositional Specifications for IOCO Testing.” In <i>IEEE 7th International Conference on Software Testing, Verification and Validation</i>. IEEE, 2014. <a href=\"https://doi.org/10.1109/ICST.2014.50\">https://doi.org/10.1109/ICST.2014.50</a>.","ama":"Daca P, Henzinger TA, Krenn W, Nickovic D. Compositional specifications for IOCO testing. In: <i>IEEE 7th International Conference on Software Testing, Verification and Validation</i>. IEEE; 2014. doi:<a href=\"https://doi.org/10.1109/ICST.2014.50\">10.1109/ICST.2014.50</a>","mla":"Daca, Przemyslaw, et al. “Compositional Specifications for IOCO Testing.” <i>IEEE 7th International Conference on Software Testing, Verification and Validation</i>, 6823899, IEEE, 2014, doi:<a href=\"https://doi.org/10.1109/ICST.2014.50\">10.1109/ICST.2014.50</a>.","apa":"Daca, P., Henzinger, T. A., Krenn, W., &#38; Nickovic, D. (2014). Compositional specifications for IOCO testing. In <i>IEEE 7th International Conference on Software Testing, Verification and Validation</i>. Cleveland, USA: IEEE. <a href=\"https://doi.org/10.1109/ICST.2014.50\">https://doi.org/10.1109/ICST.2014.50</a>"},"article_processing_charge":"No","department":[{"_id":"ToHe"}],"quality_controlled":"1","_id":"2167","external_id":{"arxiv":["1904.07083"]},"doi":"10.1109/ICST.2014.50","article_number":"6823899","arxiv":1,"publication_identifier":{"issn":["2159-4848"],"isbn":["978-1-4799-2255-0"]},"date_updated":"2023-09-07T11:58:33Z","conference":{"location":"Cleveland, USA","name":"ICST: International Conference on Software Testing, Verification and Validation","end_date":"2014-04-04","start_date":"2014-03-31"},"publication_status":"published","oa":1,"related_material":{"record":[{"relation":"earlier_version","id":"5411","status":"public"},{"status":"public","id":"1155","relation":"dissertation_contains"}]},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publist_id":"4817","month":"03","oa_version":"Preprint","scopus_import":1,"main_file_link":[{"url":"https://arxiv.org/abs/1904.07083","open_access":"1"}],"publisher":"IEEE","date_created":"2018-12-11T11:56:06Z","project":[{"name":"Quantitative Reactive Modeling","_id":"25EE3708-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","grant_number":"267989"},{"grant_number":"S11402-N23","call_identifier":"FWF","_id":"25F5A88A-B435-11E9-9278-68D0E5697425","name":"Moderne Concurrency Paradigms"}],"date_published":"2014-03-01T00:00:00Z","abstract":[{"lang":"eng","text":"Model-based testing is a promising technology for black-box software and hardware testing, in which test cases are generated automatically from high-level specifications. Nowadays, systems typically consist of multiple interacting components and, due to their complexity, testing presents a considerable portion of the effort and cost in the design process. Exploiting the compositional structure of system specifications can considerably reduce the effort in model-based testing. Moreover, inferring properties about the system from testing its individual components allows the designer to reduce the amount of integration testing. In this paper, we study compositional properties of the ioco-testing theory. We propose a new approach to composition and hiding operations, inspired by contract-based design and interface theories. These operations preserve behaviors that are compatible under composition and hiding, and prune away incompatible ones. The resulting specification characterizes the input sequences for which the unit testing of components is sufficient to infer the correctness of component integration without the need for further tests. We provide a methodology that uses these results to minimize integration testing effort, but also to detect potential weaknesses in specifications. While we focus on asynchronous models and the ioco conformance relation, the resulting methodology can be applied to a broader class of systems."}],"author":[{"first_name":"Przemyslaw","last_name":"Daca","id":"49351290-F248-11E8-B48F-1D18A9856A87","full_name":"Daca, Przemyslaw"},{"orcid":"0000−0002−2985−7724","first_name":"Thomas A","last_name":"Henzinger","full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Krenn, Willibald","first_name":"Willibald","last_name":"Krenn"},{"full_name":"Nickovic, Dejan","first_name":"Dejan","last_name":"Nickovic"}],"ec_funded":1,"language":[{"iso":"eng"}],"year":"2014","day":"01","publication":"IEEE 7th International Conference on Software Testing, Verification and Validation"},{"project":[{"call_identifier":"FP7","grant_number":"250152","_id":"25B07788-B435-11E9-9278-68D0E5697425","name":"Limits to selection in biology and in evolutionary computation"}],"date_created":"2018-12-11T11:56:06Z","file":[{"content_type":"application/pdf","date_updated":"2020-07-14T12:45:31Z","access_level":"open_access","file_size":569005,"file_name":"IST-2015-391-v1+1_1-s2.0-S0040580914000355-main.pdf","file_id":"4839","checksum":"979d7a8034e9df198f068f0d251f31bd","relation":"main_file","creator":"system","date_created":"2018-12-12T10:10:49Z"}],"publisher":"Academic Press","scopus_import":1,"publication":"Theoretical Population Biology","language":[{"iso":"eng"}],"year":"2014","day":"01","ec_funded":1,"file_date_updated":"2020-07-14T12:45:31Z","author":[{"full_name":"Kelleher, Jerome","last_name":"Kelleher","first_name":"Jerome"},{"full_name":"Etheridge, Alison","last_name":"Etheridge","first_name":"Alison"},{"id":"4880FE40-F248-11E8-B48F-1D18A9856A87","full_name":"Barton, Nicholas H","first_name":"Nicholas H","last_name":"Barton","orcid":"0000-0002-8548-5240"}],"date_published":"2014-08-01T00:00:00Z","volume":95,"abstract":[{"lang":"eng","text":"Many species have an essentially continuous distribution in space, in which there are no natural divisions between randomly mating subpopulations. Yet, the standard approach to modelling these populations is to impose an arbitrary grid of demes, adjusting deme sizes and migration rates in an attempt to capture the important features of the population. Such indirect methods are required because of the failure of the classical models of isolation by distance, which have been shown to have major technical flaws. A recently introduced model of extinction and recolonisation in two dimensions solves these technical problems, and provides a rigorous technical foundation for the study of populations evolving in a spatial continuum. The coalescent process for this model is simply stated, but direct simulation is very inefficient for large neighbourhood sizes. We present efficient and exact algorithms to simulate this coalescent process for arbitrary sample sizes and numbers of loci, and analyse these algorithms in detail."}],"doi":"10.1016/j.tpb.2014.05.001","intvolume":"        95","_id":"2168","page":"13 - 23","quality_controlled":"1","department":[{"_id":"NiBa"}],"citation":{"ieee":"J. Kelleher, A. Etheridge, and N. H. Barton, “Coalescent simulation in continuous space: Algorithms for large neighbourhood size,” <i>Theoretical Population Biology</i>, vol. 95. Academic Press, pp. 13–23, 2014.","ista":"Kelleher J, Etheridge A, Barton NH. 2014. Coalescent simulation in continuous space: Algorithms for large neighbourhood size. Theoretical Population Biology. 95, 13–23.","mla":"Kelleher, Jerome, et al. “Coalescent Simulation in Continuous Space: Algorithms for Large Neighbourhood Size.” <i>Theoretical Population Biology</i>, vol. 95, Academic Press, 2014, pp. 13–23, doi:<a href=\"https://doi.org/10.1016/j.tpb.2014.05.001\">10.1016/j.tpb.2014.05.001</a>.","apa":"Kelleher, J., Etheridge, A., &#38; Barton, N. H. (2014). Coalescent simulation in continuous space: Algorithms for large neighbourhood size. <i>Theoretical Population Biology</i>. Academic Press. <a href=\"https://doi.org/10.1016/j.tpb.2014.05.001\">https://doi.org/10.1016/j.tpb.2014.05.001</a>","short":"J. Kelleher, A. Etheridge, N.H. Barton, Theoretical Population Biology 95 (2014) 13–23.","ama":"Kelleher J, Etheridge A, Barton NH. Coalescent simulation in continuous space: Algorithms for large neighbourhood size. <i>Theoretical Population Biology</i>. 2014;95:13-23. doi:<a href=\"https://doi.org/10.1016/j.tpb.2014.05.001\">10.1016/j.tpb.2014.05.001</a>","chicago":"Kelleher, Jerome, Alison Etheridge, and Nicholas H Barton. “Coalescent Simulation in Continuous Space: Algorithms for Large Neighbourhood Size.” <i>Theoretical Population Biology</i>. Academic Press, 2014. <a href=\"https://doi.org/10.1016/j.tpb.2014.05.001\">https://doi.org/10.1016/j.tpb.2014.05.001</a>."},"title":"Coalescent simulation in continuous space: Algorithms for large neighbourhood size","tmp":{"short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"pubrep_id":"391","type":"journal_article","status":"public","month":"08","oa_version":"Published Version","publist_id":"4816","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","oa":1,"publication_status":"published","ddc":["570"],"date_updated":"2021-01-12T06:55:44Z","has_accepted_license":"1"},{"quality_controlled":"1","department":[{"_id":"NiBa"}],"date_created":"2018-12-11T11:56:07Z","doi":"10.1073/pnas.1410107111","intvolume":"       111","page":"10398 - 10399","_id":"2169","title":"Diverse forms of selection in evolution and computer science","scopus_import":1,"status":"public","type":"journal_article","citation":{"chicago":"Barton, Nicholas H, Sebastian Novak, and Tiago Paixao. “Diverse Forms of Selection in Evolution and Computer Science.” <i>PNAS</i>. National Academy of Sciences, 2014. <a href=\"https://doi.org/10.1073/pnas.1410107111\">https://doi.org/10.1073/pnas.1410107111</a>.","ama":"Barton NH, Novak S, Paixao T. Diverse forms of selection in evolution and computer science. <i>PNAS</i>. 2014;111(29):10398-10399. doi:<a href=\"https://doi.org/10.1073/pnas.1410107111\">10.1073/pnas.1410107111</a>","short":"N.H. Barton, S. Novak, T. Paixao, PNAS 111 (2014) 10398–10399.","mla":"Barton, Nicholas H., et al. “Diverse Forms of Selection in Evolution and Computer Science.” <i>PNAS</i>, vol. 111, no. 29, National Academy of Sciences, 2014, pp. 10398–99, doi:<a href=\"https://doi.org/10.1073/pnas.1410107111\">10.1073/pnas.1410107111</a>.","apa":"Barton, N. H., Novak, S., &#38; Paixao, T. (2014). Diverse forms of selection in evolution and computer science. <i>PNAS</i>. National Academy of Sciences. <a href=\"https://doi.org/10.1073/pnas.1410107111\">https://doi.org/10.1073/pnas.1410107111</a>","ista":"Barton NH, Novak S, Paixao T. 2014. Diverse forms of selection in evolution and computer science. PNAS. 111(29), 10398–10399.","ieee":"N. H. Barton, S. Novak, and T. Paixao, “Diverse forms of selection in evolution and computer science,” <i>PNAS</i>, vol. 111, no. 29. National Academy of Sciences, pp. 10398–10399, 2014."},"main_file_link":[{"url":"http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4115508/","open_access":"1"}],"publisher":"National Academy of Sciences","publication_status":"published","oa":1,"date_updated":"2021-01-12T06:55:45Z","oa_version":"Submitted Version","publication":"PNAS","month":"07","year":"2014","language":[{"iso":"eng"}],"day":"22","publist_id":"4815","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","author":[{"id":"4880FE40-F248-11E8-B48F-1D18A9856A87","full_name":"Barton, Nicholas H","last_name":"Barton","first_name":"Nicholas H","orcid":"0000-0002-8548-5240"},{"first_name":"Sebastian","last_name":"Novak","id":"461468AE-F248-11E8-B48F-1D18A9856A87","full_name":"Novak, Sebastian"},{"last_name":"Paixao","first_name":"Tiago","orcid":"0000-0003-2361-3953","id":"2C5658E6-F248-11E8-B48F-1D18A9856A87","full_name":"Paixao, Tiago"}],"date_published":"2014-07-22T00:00:00Z","volume":111,"issue":"29"},{"publication":"Molecular Ecology","language":[{"iso":"eng"}],"year":"2014","day":"01","file_date_updated":"2020-07-14T12:45:31Z","issue":"1","author":[{"full_name":"Hearn, Jack","first_name":"Jack","last_name":"Hearn"},{"full_name":"Stone, Graham","first_name":"Graham","last_name":"Stone"},{"first_name":"Lynsey","last_name":"Bunnefeld","full_name":"Bunnefeld, Lynsey"},{"last_name":"Nicholls","first_name":"James","full_name":"Nicholls, James"},{"full_name":"Barton, Nicholas H","id":"4880FE40-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8548-5240","last_name":"Barton","first_name":"Nicholas H"},{"first_name":"Konrad","last_name":"Lohse","full_name":"Lohse, Konrad"}],"date_published":"2014-01-01T00:00:00Z","volume":23,"abstract":[{"lang":"eng","text":" Short-read sequencing technologies have in principle made it feasible to draw detailed inferences about the recent history of any organism. In practice, however, this remains challenging due to the difficulty of genome assembly in most organisms and the lack of statistical methods powerful enough to discriminate between recent, nonequilibrium histories. We address both the assembly and inference challenges. We develop a bioinformatic pipeline for generating outgroup-rooted alignments of orthologous sequence blocks from de novo low-coverage short-read data for a small number of genomes, and show how such sequence blocks can be used to fit explicit models of population divergence and admixture in a likelihood framework. To illustrate our approach, we reconstruct the Pleistocene history of an oak-feeding insect (the oak gallwasp Biorhiza pallida), which, in common with many other taxa, was restricted during Pleistocene ice ages to a longitudinal series of southern refugia spanning the Western Palaearctic. Our analysis of sequence blocks sampled from a single genome from each of three major glacial refugia reveals support for an unexpected history dominated by recent admixture. Despite the fact that 80% of the genome is affected by admixture during the last glacial cycle, we are able to infer the deeper divergence history of these populations. These inferences are robust to variation in block length, mutation model and the sampling location of individual genomes within refugia. This combination of de novo assembly and numerical likelihood calculation provides a powerful framework for estimating recent population history that can be applied to any organism without the need for prior genetic resources."}],"date_created":"2018-12-11T11:56:07Z","publisher":"Wiley-Blackwell","file":[{"file_id":"4651","date_created":"2018-12-12T10:07:52Z","creator":"system","relation":"main_file","checksum":"4de1ab255976a8ae77eb0e55ad62ecc9","date_updated":"2020-07-14T12:45:31Z","content_type":"application/pdf","file_name":"IST-2016-559-v1+1_Hearn_et_al.pdf","access_level":"open_access","file_size":807444},{"date_updated":"2020-07-14T12:45:31Z","content_type":"application/pdf","file_name":"IST-2016-559-v1+2_Hearn_et_al_Suppl.pdf","file_size":1518088,"access_level":"open_access","file_id":"4652","date_created":"2018-12-12T10:07:53Z","creator":"system","relation":"main_file","checksum":"01a8073e071c088500425f910b0f1f71"}],"scopus_import":1,"oa_version":"Submitted Version","month":"01","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4814","related_material":{"record":[{"relation":"research_data","id":"9754","status":"public"}]},"oa":1,"publication_status":"published","ddc":["570"],"date_updated":"2023-02-23T14:07:09Z","has_accepted_license":"1","doi":"10.1111/mec.12578","intvolume":"        23","page":"198 - 211","_id":"2170","quality_controlled":"1","acknowledgement":"This work was funded by NERC grants to G Stone, J Nicholls, K Lohse and N Barton (NE/J010499, NBAF375, NE/E014453/1 and NER/B/S2003/00856).","department":[{"_id":"NiBa"}],"citation":{"ista":"Hearn J, Stone G, Bunnefeld L, Nicholls J, Barton NH, Lohse K. 2014. Likelihood-based inference of population history from low-coverage de novo genome assemblies. Molecular Ecology. 23(1), 198–211.","ieee":"J. Hearn, G. Stone, L. Bunnefeld, J. Nicholls, N. H. Barton, and K. Lohse, “Likelihood-based inference of population history from low-coverage de novo genome assemblies,” <i>Molecular Ecology</i>, vol. 23, no. 1. Wiley-Blackwell, pp. 198–211, 2014.","ama":"Hearn J, Stone G, Bunnefeld L, Nicholls J, Barton NH, Lohse K. Likelihood-based inference of population history from low-coverage de novo genome assemblies. <i>Molecular Ecology</i>. 2014;23(1):198-211. doi:<a href=\"https://doi.org/10.1111/mec.12578\">10.1111/mec.12578</a>","short":"J. Hearn, G. Stone, L. Bunnefeld, J. Nicholls, N.H. Barton, K. Lohse, Molecular Ecology 23 (2014) 198–211.","chicago":"Hearn, Jack, Graham Stone, Lynsey Bunnefeld, James Nicholls, Nicholas H Barton, and Konrad Lohse. “Likelihood-Based Inference of Population History from Low-Coverage de Novo Genome Assemblies.” <i>Molecular Ecology</i>. Wiley-Blackwell, 2014. <a href=\"https://doi.org/10.1111/mec.12578\">https://doi.org/10.1111/mec.12578</a>.","mla":"Hearn, Jack, et al. “Likelihood-Based Inference of Population History from Low-Coverage de Novo Genome Assemblies.” <i>Molecular Ecology</i>, vol. 23, no. 1, Wiley-Blackwell, 2014, pp. 198–211, doi:<a href=\"https://doi.org/10.1111/mec.12578\">10.1111/mec.12578</a>.","apa":"Hearn, J., Stone, G., Bunnefeld, L., Nicholls, J., Barton, N. H., &#38; Lohse, K. (2014). Likelihood-based inference of population history from low-coverage de novo genome assemblies. <i>Molecular Ecology</i>. Wiley-Blackwell. <a href=\"https://doi.org/10.1111/mec.12578\">https://doi.org/10.1111/mec.12578</a>"},"title":"Likelihood-based inference of population history from low-coverage de novo genome assemblies","pubrep_id":"559","status":"public","type":"journal_article"},{"scopus_import":1,"main_file_link":[{"url":"http://arxiv.org/abs/1403.7057","open_access":"1"}],"publisher":"Springer","project":[{"grant_number":"308036","call_identifier":"FP7","name":"Lifelong Learning of Visual Scene Understanding","_id":"2532554C-B435-11E9-9278-68D0E5697425"}],"date_created":"2018-12-11T11:56:07Z","author":[{"full_name":"Kolesnikov, Alexander","id":"2D157DB6-F248-11E8-B48F-1D18A9856A87","first_name":"Alexander","last_name":"Kolesnikov"},{"full_name":"Guillaumin, Matthieu","first_name":"Matthieu","last_name":"Guillaumin"},{"last_name":"Ferrari","first_name":"Vittorio","full_name":"Ferrari, Vittorio"},{"id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","full_name":"Lampert, Christoph","first_name":"Christoph","last_name":"Lampert","orcid":"0000-0001-8622-7887"}],"date_published":"2014-09-01T00:00:00Z","abstract":[{"text":"We present LS-CRF, a new method for training cyclic Conditional Random Fields (CRFs) from large datasets that is inspired by classical closed-form expressions for the maximum likelihood parameters of a generative graphical model with tree topology. Training a CRF with LS-CRF requires only solving a set of independent regression problems, each of which can be solved efficiently in closed form or by an iterative solver. This makes LS-CRF orders of magnitude faster than classical CRF training based on probabilistic inference, and at the same time more flexible and easier to implement than other approximate techniques, such as pseudolikelihood or piecewise training. We apply LS-CRF to the task of semantic image segmentation, showing that it achieves on par accuracy to other training techniques at higher speed, thereby allowing efficient CRF training from very large training sets. For example, training a linearly parameterized pairwise CRF on 150,000 images requires less than one hour on a modern workstation.","lang":"eng"}],"volume":8691,"issue":"PART 3","ec_funded":1,"publication":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","language":[{"iso":"eng"}],"year":"2014","day":"01","title":"Closed-form approximate CRF training for scalable image segmentation","type":"conference","status":"public","citation":{"mla":"Kolesnikov, Alexander, et al. “Closed-Form Approximate CRF Training for Scalable Image Segmentation.” <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, edited by David Fleet et al., vol. 8691, no. PART 3, Springer, 2014, pp. 550–65, doi:<a href=\"https://doi.org/10.1007/978-3-319-10578-9_36\">10.1007/978-3-319-10578-9_36</a>.","apa":"Kolesnikov, A., Guillaumin, M., Ferrari, V., &#38; Lampert, C. (2014). Closed-form approximate CRF training for scalable image segmentation. In D. Fleet, T. Pajdla, B. Schiele, &#38; T. Tuytelaars (Eds.), <i>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i> (Vol. 8691, pp. 550–565). Zurich, Switzerland: Springer. <a href=\"https://doi.org/10.1007/978-3-319-10578-9_36\">https://doi.org/10.1007/978-3-319-10578-9_36</a>","short":"A. Kolesnikov, M. Guillaumin, V. Ferrari, C. Lampert, in:, D. Fleet, T. Pajdla, B. Schiele, T. Tuytelaars (Eds.), Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 2014, pp. 550–565.","ama":"Kolesnikov A, Guillaumin M, Ferrari V, Lampert C. Closed-form approximate CRF training for scalable image segmentation. In: Fleet D, Pajdla T, Schiele B, Tuytelaars T, eds. <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>. Vol 8691. Springer; 2014:550-565. doi:<a href=\"https://doi.org/10.1007/978-3-319-10578-9_36\">10.1007/978-3-319-10578-9_36</a>","chicago":"Kolesnikov, Alexander, Matthieu Guillaumin, Vittorio Ferrari, and Christoph Lampert. “Closed-Form Approximate CRF Training for Scalable Image Segmentation.” In <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, edited by David Fleet, Tomas Pajdla, Bernt Schiele, and Tinne Tuytelaars, 8691:550–65. Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-319-10578-9_36\">https://doi.org/10.1007/978-3-319-10578-9_36</a>.","ieee":"A. Kolesnikov, M. Guillaumin, V. Ferrari, and C. Lampert, “Closed-form approximate CRF training for scalable image segmentation,” in <i>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, Zurich, Switzerland, 2014, vol. 8691, no. PART 3, pp. 550–565.","ista":"Kolesnikov A, Guillaumin M, Ferrari V, Lampert C. 2014. Closed-form approximate CRF training for scalable image segmentation. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). ECCV: European Conference on Computer Vision, LNCS, vol. 8691, 550–565."},"quality_controlled":"1","editor":[{"full_name":"Fleet, David","last_name":"Fleet","first_name":"David"},{"last_name":"Pajdla","first_name":"Tomas","full_name":"Pajdla, Tomas"},{"full_name":"Schiele, Bernt","last_name":"Schiele","first_name":"Bernt"},{"first_name":"Tinne","last_name":"Tuytelaars","full_name":"Tuytelaars, Tinne"}],"department":[{"_id":"ChLa"}],"doi":"10.1007/978-3-319-10578-9_36","intvolume":"      8691","_id":"2171","page":"550 - 565","alternative_title":["LNCS"],"conference":{"location":"Zurich, Switzerland","end_date":"2014-09-12","start_date":"2014-09-06","name":"ECCV: European Conference on Computer Vision"},"oa":1,"publication_status":"published","date_updated":"2021-01-12T06:55:46Z","month":"09","oa_version":"Submitted Version","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4813"},{"author":[{"first_name":"Vladyslav","last_name":"Sydorov","full_name":"Sydorov, Vladyslav"},{"last_name":"Sakurada","first_name":"Mayu","full_name":"Sakurada, Mayu"},{"id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","full_name":"Lampert, Christoph","orcid":"0000-0001-8622-7887","last_name":"Lampert","first_name":"Christoph"}],"abstract":[{"text":"Fisher Kernels and Deep Learning were two developments with significant impact on large-scale object categorization in the last years. Both approaches were shown to achieve state-of-the-art results on large-scale object categorization datasets, such as ImageNet. Conceptually, however, they are perceived as very different and it is not uncommon for heated debates to spring up when advocates of both paradigms meet at conferences or workshops. In this work, we emphasize the similarities between both architectures rather than their differences and we argue that such a unified view allows us to transfer ideas from one domain to the other. As a concrete example we introduce a method for learning a support vector machine classifier with Fisher kernel at the same time as a task-specific data representation. We reinterpret the setting as a multi-layer feed forward network. Its final layer is the classifier, parameterized by a weight vector, and the two previous layers compute Fisher vectors, parameterized by the coefficients of a Gaussian mixture model. We introduce a gradient descent based learning algorithm that, in contrast to other feature learning techniques, is not just derived from intuition or biological analogy, but has a theoretical justification in the framework of statistical learning theory. Our experiments show that the new training procedure leads to significant improvements in classification accuracy while preserving the modularity and geometric interpretability of a support vector machine setup.","lang":"eng"}],"date_published":"2014-09-24T00:00:00Z","publication":"Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition","month":"09","oa_version":"None","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4812","day":"24","language":[{"iso":"eng"}],"year":"2014","publication_status":"published","conference":{"location":"Columbus, USA","start_date":"2014-06-23","end_date":"2014-06-28","name":"CVPR: Computer Vision and Pattern Recognition"},"date_updated":"2021-01-12T06:55:46Z","ec_funded":1,"publisher":"IEEE","citation":{"apa":"Sydorov, V., Sakurada, M., &#38; Lampert, C. (2014). Deep Fisher Kernels – End to end learning of the Fisher Kernel GMM parameters. In <i>Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition</i> (pp. 1402–1409). Columbus, USA: IEEE. <a href=\"https://doi.org/10.1109/CVPR.2014.182\">https://doi.org/10.1109/CVPR.2014.182</a>","mla":"Sydorov, Vladyslav, et al. “Deep Fisher Kernels – End to End Learning of the Fisher Kernel GMM Parameters.” <i>Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition</i>, IEEE, 2014, pp. 1402–09, doi:<a href=\"https://doi.org/10.1109/CVPR.2014.182\">10.1109/CVPR.2014.182</a>.","short":"V. Sydorov, M. Sakurada, C. Lampert, in:, Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, IEEE, 2014, pp. 1402–1409.","chicago":"Sydorov, Vladyslav, Mayu Sakurada, and Christoph Lampert. “Deep Fisher Kernels – End to End Learning of the Fisher Kernel GMM Parameters.” In <i>Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition</i>, 1402–9. IEEE, 2014. <a href=\"https://doi.org/10.1109/CVPR.2014.182\">https://doi.org/10.1109/CVPR.2014.182</a>.","ama":"Sydorov V, Sakurada M, Lampert C. Deep Fisher Kernels – End to end learning of the Fisher Kernel GMM parameters. In: <i>Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition</i>. IEEE; 2014:1402-1409. doi:<a href=\"https://doi.org/10.1109/CVPR.2014.182\">10.1109/CVPR.2014.182</a>","ieee":"V. Sydorov, M. Sakurada, and C. Lampert, “Deep Fisher Kernels – End to end learning of the Fisher Kernel GMM parameters,” in <i>Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition</i>, Columbus, USA, 2014, pp. 1402–1409.","ista":"Sydorov V, Sakurada M, Lampert C. 2014. Deep Fisher Kernels – End to end learning of the Fisher Kernel GMM parameters. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR: Computer Vision and Pattern Recognition, 1402–1409."},"scopus_import":1,"title":"Deep Fisher Kernels – End to end learning of the Fisher Kernel GMM parameters","status":"public","type":"conference","date_created":"2018-12-11T11:56:08Z","project":[{"grant_number":"308036","call_identifier":"FP7","name":"Lifelong Learning of Visual Scene Understanding","_id":"2532554C-B435-11E9-9278-68D0E5697425"}],"doi":"10.1109/CVPR.2014.182","page":"1402 - 1409","_id":"2172","quality_controlled":"1","department":[{"_id":"ChLa"}]},{"project":[{"grant_number":"308036","call_identifier":"FP7","name":"Lifelong Learning of Visual Scene Understanding","_id":"2532554C-B435-11E9-9278-68D0E5697425"}],"date_created":"2018-12-11T11:56:08Z","file":[{"file_id":"4683","date_created":"2018-12-12T10:08:23Z","creator":"system","relation":"main_file","checksum":"c4c6d3efdb8ee648faf3e76849839ce2","date_updated":"2020-07-14T12:45:31Z","content_type":"application/pdf","file_name":"IST-2016-490-v1+1_khamis-bmvc2014.pdf","access_level":"open_access","file_size":408172}],"publisher":"BMVA Press","scopus_import":1,"publication":"Proceedings of the British Machine Vision Conference 2014","language":[{"iso":"eng"}],"year":"2014","day":"01","ec_funded":1,"file_date_updated":"2020-07-14T12:45:31Z","author":[{"first_name":"Sameh","last_name":"Khamis","full_name":"Khamis, Sameh"},{"orcid":"0000-0001-8622-7887","first_name":"Christoph","last_name":"Lampert","id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","full_name":"Lampert, Christoph"}],"date_published":"2014-09-01T00:00:00Z","abstract":[{"lang":"eng","text":"In this work we introduce a new approach to co-classification, i.e. the task of jointly classifying multiple, otherwise independent, data samples. The method we present, named CoConut, is based on the idea of adding a regularizer in the label space to encode certain priors on the resulting labelings. A regularizer that encourages labelings that are smooth across the test set, for instance, can be seen as a test-time variant of the cluster assumption, which has been proven useful at training time in semi-supervised learning. A regularizer that introduces a preference for certain class proportions can be regarded as a prior distribution on the class labels. CoConut can build on existing classifiers without making any assumptions on how they were obtained and without the need to re-train them. The use of a regularizer adds a new level of flexibility. It allows the integration of potentially new information at test time, even in other modalities than what the classifiers were trained on. We evaluate our framework on six datasets, reporting a clear performance gain in classification accuracy compared to the standard classification setup that predicts labels for each test sample separately.\r\n"}],"_id":"2173","quality_controlled":"1","department":[{"_id":"ChLa"}],"citation":{"ieee":"S. Khamis and C. Lampert, “CoConut: Co-classification with output space regularization,” in <i>Proceedings of the British Machine Vision Conference 2014</i>, Nottingham, UK, 2014.","ista":"Khamis S, Lampert C. 2014. CoConut: Co-classification with output space regularization. Proceedings of the British Machine Vision Conference 2014. BMVC: British Machine Vision Conference.","chicago":"Khamis, Sameh, and Christoph Lampert. “CoConut: Co-Classification with Output Space Regularization.” In <i>Proceedings of the British Machine Vision Conference 2014</i>. BMVA Press, 2014.","ama":"Khamis S, Lampert C. CoConut: Co-classification with output space regularization. In: <i>Proceedings of the British Machine Vision Conference 2014</i>. BMVA Press; 2014.","short":"S. Khamis, C. Lampert, in:, Proceedings of the British Machine Vision Conference 2014, BMVA Press, 2014.","apa":"Khamis, S., &#38; Lampert, C. (2014). CoConut: Co-classification with output space regularization. In <i>Proceedings of the British Machine Vision Conference 2014</i>. Nottingham, UK: BMVA Press.","mla":"Khamis, Sameh, and Christoph Lampert. “CoConut: Co-Classification with Output Space Regularization.” <i>Proceedings of the British Machine Vision Conference 2014</i>, BMVA Press, 2014."},"title":"CoConut: Co-classification with output space regularization","pubrep_id":"490","status":"public","type":"conference","oa_version":"Published Version","month":"09","publist_id":"4811","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","conference":{"end_date":"2014-09-05","name":"BMVC: British Machine Vision Conference","start_date":"2014-09-01","location":"Nottingham, UK"},"oa":1,"publication_status":"published","ddc":["000"],"date_updated":"2021-01-12T06:55:46Z","has_accepted_license":"1"},{"date_updated":"2021-01-12T06:55:47Z","publication_status":"published","oa":1,"publist_id":"4809","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","month":"06","oa_version":"Submitted Version","status":"public","type":"journal_article","title":"Stability and response of polygenic traits to stabilizing selection and mutation","citation":{"short":"H. De Vladar, N.H. Barton, Genetics 197 (2014) 749–767.","chicago":"De Vladar, Harold, and Nicholas H Barton. “Stability and Response of Polygenic Traits to Stabilizing Selection and Mutation.” <i>Genetics</i>. Genetics Society of America, 2014. <a href=\"https://doi.org/10.1534/genetics.113.159111\">https://doi.org/10.1534/genetics.113.159111</a>.","ama":"De Vladar H, Barton NH. Stability and response of polygenic traits to stabilizing selection and mutation. <i>Genetics</i>. 2014;197(2):749-767. doi:<a href=\"https://doi.org/10.1534/genetics.113.159111\">10.1534/genetics.113.159111</a>","mla":"De Vladar, Harold, and Nicholas H. Barton. “Stability and Response of Polygenic Traits to Stabilizing Selection and Mutation.” <i>Genetics</i>, vol. 197, no. 2, Genetics Society of America, 2014, pp. 749–67, doi:<a href=\"https://doi.org/10.1534/genetics.113.159111\">10.1534/genetics.113.159111</a>.","apa":"De Vladar, H., &#38; Barton, N. H. (2014). Stability and response of polygenic traits to stabilizing selection and mutation. <i>Genetics</i>. Genetics Society of America. <a href=\"https://doi.org/10.1534/genetics.113.159111\">https://doi.org/10.1534/genetics.113.159111</a>","ista":"De Vladar H, Barton NH. 2014. Stability and response of polygenic traits to stabilizing selection and mutation. Genetics. 197(2), 749–767.","ieee":"H. De Vladar and N. H. Barton, “Stability and response of polygenic traits to stabilizing selection and mutation,” <i>Genetics</i>, vol. 197, no. 2. Genetics Society of America, pp. 749–767, 2014."},"department":[{"_id":"NiBa"}],"quality_controlled":"1","intvolume":"       197","page":"749 - 767","_id":"2174","doi":"10.1534/genetics.113.159111","date_published":"2014-06-01T00:00:00Z","volume":197,"abstract":[{"text":"When polygenic traits are under stabilizing selection, many different combinations of alleles allow close adaptation to the optimum. If alleles have equal effects, all combinations that result in the same deviation from the optimum are equivalent. Furthermore, the genetic variance that is maintained by mutation-selection balance is 2μ/S per locus, where μ is the mutation rate and S the strength of stabilizing selection. In reality, alleles vary in their effects, making the fitness landscape asymmetric and complicating analysis of the equilibria. We show that that the resulting genetic variance depends on the fraction of alleles near fixation, which contribute by 2μ/S, and on the total mutational effects of alleles that are at intermediate frequency. The inpplayfi between stabilizing selection and mutation leads to a sharp transition: alleles with effects smaller than a threshold value of 2 remain polymorphic, whereas those with larger effects are fixed. The genetic load in equilibrium is less than for traits of equal effects, and the fitness equilibria are more similar. We find p the optimum is displaced, alleles with effects close to the threshold value sweep first, and their rate of increase is bounded by Long-term response leads in general to well-adapted traits, unlike the case of equal effects that often end up at a suboptimal fitness peak. However, the particular peaks to which the populations converge are extremely sensitive to the initial states and to the speed of the shift of the optimum trait value.","lang":"eng"}],"author":[{"full_name":"De Vladar, Harold","last_name":"De Vladar","first_name":"Harold"},{"orcid":"0000-0002-8548-5240","first_name":"Nicholas H","last_name":"Barton","full_name":"Barton, Nicholas H","id":"4880FE40-F248-11E8-B48F-1D18A9856A87"}],"issue":"2","ec_funded":1,"year":"2014","language":[{"iso":"eng"}],"day":"01","publication":"Genetics","scopus_import":1,"main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1404.1017"}],"publisher":"Genetics Society of America","date_created":"2018-12-11T11:56:08Z","project":[{"name":"Limits to selection in biology and in evolutionary computation","_id":"25B07788-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","grant_number":"250152"}]},{"publist_id":"4806","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","oa_version":"Published Version","month":"05","date_updated":"2023-10-17T08:34:27Z","ddc":["570"],"publication_identifier":{"eissn":["1748-6971"],"issn":["1479-6708"]},"oa":1,"publication_status":"published","has_accepted_license":"1","_id":"2175","license":"https://creativecommons.org/licenses/by-nc-nd/4.0/","page":"323 - 340","intvolume":"         9","doi":"10.2217/fnl.14.18","department":[{"_id":"SiHi"}],"quality_controlled":"1","article_processing_charge":"No","citation":{"short":"M.P. Postiglione, S. Hippenmeyer, Future Neurology 9 (2014) 323–340.","ama":"Postiglione MP, Hippenmeyer S. Monitoring neurogenesis in the cerebral cortex: an update. <i>Future Neurology</i>. 2014;9(3):323-340. doi:<a href=\"https://doi.org/10.2217/fnl.14.18\">10.2217/fnl.14.18</a>","chicago":"Postiglione, Maria P, and Simon Hippenmeyer. “Monitoring Neurogenesis in the Cerebral Cortex: An Update.” <i>Future Neurology</i>. Future Science Group, 2014. <a href=\"https://doi.org/10.2217/fnl.14.18\">https://doi.org/10.2217/fnl.14.18</a>.","apa":"Postiglione, M. P., &#38; Hippenmeyer, S. (2014). Monitoring neurogenesis in the cerebral cortex: an update. <i>Future Neurology</i>. Future Science Group. <a href=\"https://doi.org/10.2217/fnl.14.18\">https://doi.org/10.2217/fnl.14.18</a>","mla":"Postiglione, Maria P., and Simon Hippenmeyer. “Monitoring Neurogenesis in the Cerebral Cortex: An Update.” <i>Future Neurology</i>, vol. 9, no. 3, Future Science Group, 2014, pp. 323–40, doi:<a href=\"https://doi.org/10.2217/fnl.14.18\">10.2217/fnl.14.18</a>.","ista":"Postiglione MP, Hippenmeyer S. 2014. Monitoring neurogenesis in the cerebral cortex: an update. Future Neurology. 9(3), 323–340.","ieee":"M. P. Postiglione and S. Hippenmeyer, “Monitoring neurogenesis in the cerebral cortex: an update,” <i>Future Neurology</i>, vol. 9, no. 3. Future Science Group, pp. 323–340, 2014."},"type":"journal_article","status":"public","pubrep_id":"528","tmp":{"short":"CC BY-NC-ND (4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","image":"/images/cc_by_nc_nd.png","name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)"},"title":"Monitoring neurogenesis in the cerebral cortex: an update","day":"01","year":"2014","language":[{"iso":"eng"}],"publication":"Future Neurology","ec_funded":1,"issue":"3","file_date_updated":"2020-07-14T12:45:31Z","abstract":[{"text":"The cerebral cortex, the seat of our cognitive abilities, is composed of an intricate network of billions of excitatory projection and inhibitory interneurons. Postmitotic cortical neurons are generated by a diverse set of neural stem cell progenitors within dedicated zones and defined periods of neurogenesis during embryonic development. Disruptions in neurogenesis can lead to alterations in the neuronal cytoarchitecture, which is thought to represent a major underlying cause for several neurological disorders, including microcephaly, autism and epilepsy. Although a number of signaling pathways regulating neurogenesis have been described, the precise cellular and molecular mechanisms regulating the functional neural stem cell properties in cortical neurogenesis remain unclear. Here, we discuss the most up-to-date strategies to monitor the fundamental mechanistic parameters of neuronal progenitor proliferation, and recent advances deciphering the logic and dynamics of neurogenesis.","lang":"eng"}],"volume":9,"date_published":"2014-05-01T00:00:00Z","author":[{"full_name":"Postiglione, Maria P","id":"2C67902A-F248-11E8-B48F-1D18A9856A87","first_name":"Maria P","last_name":"Postiglione"},{"orcid":"0000-0003-2279-1061","last_name":"Hippenmeyer","first_name":"Simon","full_name":"Hippenmeyer, Simon","id":"37B36620-F248-11E8-B48F-1D18A9856A87"}],"date_created":"2018-12-11T11:56:09Z","project":[{"call_identifier":"FP7","grant_number":"618444","_id":"25D61E48-B435-11E9-9278-68D0E5697425","name":"Molecular Mechanisms of Cerebral Cortex Development"}],"file":[{"file_id":"4812","creator":"system","date_created":"2018-12-12T10:10:25Z","checksum":"ba06659ecadabceec9a37dd8c4586dce","relation":"main_file","date_updated":"2020-07-14T12:45:31Z","content_type":"application/pdf","file_name":"IST-2016-528-v1+1_fnl.14.18.pdf","access_level":"open_access","file_size":3848424}],"publisher":"Future Science Group","scopus_import":"1"},{"scopus_import":1,"title":"Capture of activity-induced ultrastructural changes at synapses by high-pressure freezing of brain tissue","type":"journal_article","status":"public","publisher":"Nature Publishing Group","citation":{"short":"D. Studer, S. Zhao, X. Chai, P.M. Jonas, W. Graber, S. Nestel, M. Frotscher, Nature Protocols 9 (2014) 1480–1495.","ama":"Studer D, Zhao S, Chai X, et al. Capture of activity-induced ultrastructural changes at synapses by high-pressure freezing of brain tissue. <i>Nature Protocols</i>. 2014;9(6):1480-1495. doi:<a href=\"https://doi.org/10.1038/nprot.2014.099\">10.1038/nprot.2014.099</a>","chicago":"Studer, Daniel, Shanting Zhao, Xuejun Chai, Peter M Jonas, Werner Graber, Sigrun Nestel, and Michael Frotscher. “Capture of Activity-Induced Ultrastructural Changes at Synapses by High-Pressure Freezing of Brain Tissue.” <i>Nature Protocols</i>. Nature Publishing Group, 2014. <a href=\"https://doi.org/10.1038/nprot.2014.099\">https://doi.org/10.1038/nprot.2014.099</a>.","mla":"Studer, Daniel, et al. “Capture of Activity-Induced Ultrastructural Changes at Synapses by High-Pressure Freezing of Brain Tissue.” <i>Nature Protocols</i>, vol. 9, no. 6, Nature Publishing Group, 2014, pp. 1480–95, doi:<a href=\"https://doi.org/10.1038/nprot.2014.099\">10.1038/nprot.2014.099</a>.","apa":"Studer, D., Zhao, S., Chai, X., Jonas, P. M., Graber, W., Nestel, S., &#38; Frotscher, M. (2014). Capture of activity-induced ultrastructural changes at synapses by high-pressure freezing of brain tissue. <i>Nature Protocols</i>. Nature Publishing Group. <a href=\"https://doi.org/10.1038/nprot.2014.099\">https://doi.org/10.1038/nprot.2014.099</a>","ieee":"D. Studer <i>et al.</i>, “Capture of activity-induced ultrastructural changes at synapses by high-pressure freezing of brain tissue,” <i>Nature Protocols</i>, vol. 9, no. 6. Nature Publishing Group, pp. 1480–1495, 2014.","ista":"Studer D, Zhao S, Chai X, Jonas PM, Graber W, Nestel S, Frotscher M. 2014. Capture of activity-induced ultrastructural changes at synapses by high-pressure freezing of brain tissue. Nature Protocols. 9(6), 1480–1495."},"quality_controlled":"1","department":[{"_id":"PeJo"}],"doi":"10.1038/nprot.2014.099","project":[{"grant_number":"SFB-TR3-TP10B","name":"Glutamaterge synaptische Übertragung und Plastizität in hippocampalen Mikroschaltkreisen","_id":"25BDE9A4-B435-11E9-9278-68D0E5697425"}],"date_created":"2018-12-11T11:56:09Z","page":"1480 - 1495","_id":"2176","intvolume":"         9","author":[{"first_name":"Daniel","last_name":"Studer","full_name":"Studer, Daniel"},{"first_name":"Shanting","last_name":"Zhao","full_name":"Zhao, Shanting"},{"last_name":"Chai","first_name":"Xuejun","full_name":"Chai, Xuejun"},{"full_name":"Jonas, Peter M","id":"353C1B58-F248-11E8-B48F-1D18A9856A87","first_name":"Peter M","last_name":"Jonas","orcid":"0000-0001-5001-4804"},{"last_name":"Graber","first_name":"Werner","full_name":"Graber, Werner"},{"full_name":"Nestel, Sigrun","first_name":"Sigrun","last_name":"Nestel"},{"full_name":"Frotscher, Michael","last_name":"Frotscher","first_name":"Michael"}],"abstract":[{"lang":"eng","text":"Electron microscopy (EM) allows for the simultaneous visualization of all tissue components at high resolution. However, the extent to which conventional aldehyde fixation and ethanol dehydration of the tissue alter the fine structure of cells and organelles, thereby preventing detection of subtle structural changes induced by an experiment, has remained an issue. Attempts have been made to rapidly freeze tissue to preserve native ultrastructure. Shock-freezing of living tissue under high pressure (high-pressure freezing, HPF) followed by cryosubstitution of the tissue water avoids aldehyde fixation and dehydration in ethanol; the tissue water is immobilized in â ̂1/450 ms, and a close-to-native fine structure of cells, organelles and molecules is preserved. Here we describe a protocol for HPF that is useful to monitor ultrastructural changes associated with functional changes at synapses in the brain but can be applied to many other tissues as well. The procedure requires a high-pressure freezer and takes a minimum of 7 d but can be paused at several points."}],"volume":9,"date_published":"2014-05-29T00:00:00Z","issue":"6","publication_status":"published","date_updated":"2021-01-12T06:55:47Z","publication":"Nature Protocols","month":"05","oa_version":"None","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","day":"29","publist_id":"4807","year":"2014","language":[{"iso":"eng"}]},{"date_updated":"2021-01-12T06:55:48Z","publication_status":"published","conference":{"start_date":"2014-01-05","name":"SODA: Symposium on Discrete Algorithms","end_date":"2014-01-07","location":"Portland, USA"},"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4805","day":"01","year":"2014","language":[{"iso":"eng"}],"oa_version":"None","month":"01","publication":"Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms","abstract":[{"text":"We give evidence for the difficulty of computing Betti numbers of simplicial complexes over a finite field. We do this by reducing the rank computation for sparse matrices with to non-zero entries to computing Betti numbers of simplicial complexes consisting of at most a constant times to simplices. Together with the known reduction in the other direction, this implies that the two problems have the same computational complexity.","lang":"eng"}],"date_published":"2014-01-01T00:00:00Z","author":[{"id":"3FB178DA-F248-11E8-B48F-1D18A9856A87","full_name":"Edelsbrunner, Herbert","first_name":"Herbert","last_name":"Edelsbrunner","orcid":"0000-0002-9823-6833"},{"first_name":"Salman","last_name":"Parsa","full_name":"Parsa, Salman","id":"4BDBD4F2-F248-11E8-B48F-1D18A9856A87"}],"department":[{"_id":"HeEd"}],"quality_controlled":"1","_id":"2177","page":"152 - 160","doi":"10.1137/1.9781611973402.11","date_created":"2018-12-11T11:56:09Z","status":"public","type":"conference","scopus_import":1,"title":"On the computational complexity of betti numbers reductions from matrix rank","publisher":"SIAM","citation":{"mla":"Edelsbrunner, Herbert, and Salman Parsa. “On the Computational Complexity of Betti Numbers Reductions from Matrix Rank.” <i>Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms</i>, SIAM, 2014, pp. 152–60, doi:<a href=\"https://doi.org/10.1137/1.9781611973402.11\">10.1137/1.9781611973402.11</a>.","apa":"Edelsbrunner, H., &#38; Parsa, S. (2014). On the computational complexity of betti numbers reductions from matrix rank. In <i>Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms</i> (pp. 152–160). Portland, USA: SIAM. <a href=\"https://doi.org/10.1137/1.9781611973402.11\">https://doi.org/10.1137/1.9781611973402.11</a>","ama":"Edelsbrunner H, Parsa S. On the computational complexity of betti numbers reductions from matrix rank. In: <i>Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms</i>. SIAM; 2014:152-160. doi:<a href=\"https://doi.org/10.1137/1.9781611973402.11\">10.1137/1.9781611973402.11</a>","short":"H. Edelsbrunner, S. Parsa, in:, Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms, SIAM, 2014, pp. 152–160.","chicago":"Edelsbrunner, Herbert, and Salman Parsa. “On the Computational Complexity of Betti Numbers Reductions from Matrix Rank.” In <i>Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms</i>, 152–60. SIAM, 2014. <a href=\"https://doi.org/10.1137/1.9781611973402.11\">https://doi.org/10.1137/1.9781611973402.11</a>.","ieee":"H. Edelsbrunner and S. Parsa, “On the computational complexity of betti numbers reductions from matrix rank,” in <i>Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms</i>, Portland, USA, 2014, pp. 152–160.","ista":"Edelsbrunner H, Parsa S. 2014. On the computational complexity of betti numbers reductions from matrix rank. Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms. SODA: Symposium on Discrete Algorithms, 152–160."}},{"date_created":"2018-12-11T11:56:10Z","publisher":"Springer","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1204.3070"}],"scopus_import":1,"day":"01","language":[{"iso":"eng"}],"year":"2014","publication":"Beitrage zur Algebra und Geometrie","issue":"1","volume":55,"abstract":[{"lang":"eng","text":"We consider the three-state toric homogeneous Markov chain model (THMC) without loops and initial parameters. At time T, the size of the design matrix is 6 × 3 · 2T-1 and the convex hull of its columns is the model polytope. We study the behavior of this polytope for T ≥ 3 and we show that it is defined by 24 facets for all T ≥ 5. Moreover, we give a complete description of these facets. From this, we deduce that the toric ideal associated with the design matrix is generated by binomials of degree at most 6. Our proof is based on a result due to Sturmfels, who gave a bound on the degree of the generators of a toric ideal, provided the normality of the corresponding toric variety. In our setting, we established the normality of the toric variety associated to the THMC model by studying the geometric properties of the model polytope."}],"date_published":"2014-03-01T00:00:00Z","author":[{"first_name":"David","last_name":"Haws","full_name":"Haws, David"},{"last_name":"Martin Del Campo Sanchez","first_name":"Abraham","id":"4CF47F6A-F248-11E8-B48F-1D18A9856A87","full_name":"Martin Del Campo Sanchez, Abraham"},{"full_name":"Takemura, Akimichi","first_name":"Akimichi","last_name":"Takemura"},{"last_name":"Yoshida","first_name":"Ruriko","full_name":"Yoshida, Ruriko"}],"page":"161 - 188","_id":"2178","intvolume":"        55","doi":"10.1007/s13366-013-0178-y","department":[{"_id":"CaUh"}],"acknowledgement":"Research of Martín del Campo supported in part by NSF Grant DMS-915211.","quality_controlled":"1","citation":{"ieee":"D. Haws, A. Martin del Campo Sanchez, A. Takemura, and R. Yoshida, “Markov degree of the three-state toric homogeneous Markov chain model,” <i>Beitrage zur Algebra und Geometrie</i>, vol. 55, no. 1. Springer, pp. 161–188, 2014.","ista":"Haws D, Martin del Campo Sanchez A, Takemura A, Yoshida R. 2014. Markov degree of the three-state toric homogeneous Markov chain model. Beitrage zur Algebra und Geometrie. 55(1), 161–188.","chicago":"Haws, David, Abraham Martin del Campo Sanchez, Akimichi Takemura, and Ruriko Yoshida. “Markov Degree of the Three-State Toric Homogeneous Markov Chain Model.” <i>Beitrage Zur Algebra Und Geometrie</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s13366-013-0178-y\">https://doi.org/10.1007/s13366-013-0178-y</a>.","short":"D. Haws, A. Martin del Campo Sanchez, A. Takemura, R. Yoshida, Beitrage Zur Algebra Und Geometrie 55 (2014) 161–188.","ama":"Haws D, Martin del Campo Sanchez A, Takemura A, Yoshida R. Markov degree of the three-state toric homogeneous Markov chain model. <i>Beitrage zur Algebra und Geometrie</i>. 2014;55(1):161-188. doi:<a href=\"https://doi.org/10.1007/s13366-013-0178-y\">10.1007/s13366-013-0178-y</a>","apa":"Haws, D., Martin del Campo Sanchez, A., Takemura, A., &#38; Yoshida, R. (2014). Markov degree of the three-state toric homogeneous Markov chain model. <i>Beitrage Zur Algebra Und Geometrie</i>. Springer. <a href=\"https://doi.org/10.1007/s13366-013-0178-y\">https://doi.org/10.1007/s13366-013-0178-y</a>","mla":"Haws, David, et al. “Markov Degree of the Three-State Toric Homogeneous Markov Chain Model.” <i>Beitrage Zur Algebra Und Geometrie</i>, vol. 55, no. 1, Springer, 2014, pp. 161–88, doi:<a href=\"https://doi.org/10.1007/s13366-013-0178-y\">10.1007/s13366-013-0178-y</a>."},"status":"public","type":"journal_article","title":"Markov degree of the three-state toric homogeneous Markov chain model","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4804","oa_version":"Submitted Version","month":"03","date_updated":"2021-01-12T06:55:48Z","publication_status":"published","oa":1},{"quality_controlled":"1","department":[{"_id":"LaEr"}],"doi":"10.1214/ECP.v19-3121","intvolume":"        19","_id":"2179","title":"Local semicircle law with imprimitive variance matrix","tmp":{"short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"pubrep_id":"426","status":"public","type":"journal_article","citation":{"ieee":"O. H. Ajanki, L. Erdös, and T. H. Krüger, “Local semicircle law with imprimitive variance matrix,” <i>Electronic Communications in Probability</i>, vol. 19. Institute of Mathematical Statistics, 2014.","ista":"Ajanki OH, Erdös L, Krüger TH. 2014. Local semicircle law with imprimitive variance matrix. Electronic Communications in Probability. 19.","apa":"Ajanki, O. H., Erdös, L., &#38; Krüger, T. H. (2014). Local semicircle law with imprimitive variance matrix. <i>Electronic Communications in Probability</i>. Institute of Mathematical Statistics. <a href=\"https://doi.org/10.1214/ECP.v19-3121\">https://doi.org/10.1214/ECP.v19-3121</a>","mla":"Ajanki, Oskari H., et al. “Local Semicircle Law with Imprimitive Variance Matrix.” <i>Electronic Communications in Probability</i>, vol. 19, Institute of Mathematical Statistics, 2014, doi:<a href=\"https://doi.org/10.1214/ECP.v19-3121\">10.1214/ECP.v19-3121</a>.","ama":"Ajanki OH, Erdös L, Krüger TH. Local semicircle law with imprimitive variance matrix. <i>Electronic Communications in Probability</i>. 2014;19. doi:<a href=\"https://doi.org/10.1214/ECP.v19-3121\">10.1214/ECP.v19-3121</a>","short":"O.H. Ajanki, L. Erdös, T.H. Krüger, Electronic Communications in Probability 19 (2014).","chicago":"Ajanki, Oskari H, László Erdös, and Torben H Krüger. “Local Semicircle Law with Imprimitive Variance Matrix.” <i>Electronic Communications in Probability</i>. Institute of Mathematical Statistics, 2014. <a href=\"https://doi.org/10.1214/ECP.v19-3121\">https://doi.org/10.1214/ECP.v19-3121</a>."},"oa":1,"publication_status":"published","ddc":["570"],"date_updated":"2021-01-12T06:55:48Z","month":"06","oa_version":"Published Version","publist_id":"4803","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","has_accepted_license":"1","date_created":"2018-12-11T11:56:10Z","scopus_import":1,"file":[{"file_id":"4729","date_created":"2018-12-12T10:09:06Z","creator":"system","relation":"main_file","checksum":"bd8a041c76d62fe820bf73ff13ce7d1b","date_updated":"2020-07-14T12:45:31Z","content_type":"application/pdf","file_name":"IST-2016-426-v1+1_3121-17518-1-PB.pdf","access_level":"open_access","file_size":327322}],"publisher":"Institute of Mathematical Statistics","publication":"Electronic Communications in Probability","year":"2014","language":[{"iso":"eng"}],"day":"09","author":[{"last_name":"Ajanki","first_name":"Oskari H","full_name":"Ajanki, Oskari H","id":"36F2FB7E-F248-11E8-B48F-1D18A9856A87"},{"orcid":"0000-0001-5366-9603","last_name":"Erdös","first_name":"László","id":"4DBD5372-F248-11E8-B48F-1D18A9856A87","full_name":"Erdös, László"},{"first_name":"Torben H","last_name":"Krüger","orcid":"0000-0002-4821-3297","full_name":"Krüger, Torben H","id":"3020C786-F248-11E8-B48F-1D18A9856A87"}],"date_published":"2014-06-09T00:00:00Z","abstract":[{"text":"We extend the proof of the local semicircle law for generalized Wigner matrices given in MR3068390 to the case when the matrix of variances has an eigenvalue -1. In particular, this result provides a short proof of the optimal local Marchenko-Pastur law at the hard edge (i.e. around zero) for sample covariance matrices X*X, where the variances of the entries of X may vary.","lang":"eng"}],"volume":19,"file_date_updated":"2020-07-14T12:45:31Z"},{"publication":"Machine Learning","day":"01","language":[{"iso":"eng"}],"year":"2014","ec_funded":1,"issue":"1-2","author":[{"full_name":"Bellet, Aurélien","first_name":"Aurélien","last_name":"Bellet"},{"first_name":"Amaury","last_name":"Habrard","full_name":"Habrard, Amaury"},{"full_name":"Morvant, Emilie","id":"4BAC2A72-F248-11E8-B48F-1D18A9856A87","first_name":"Emilie","last_name":"Morvant","orcid":"0000-0002-8301-7240"},{"first_name":"Marc","last_name":"Sebban","full_name":"Sebban, Marc"}],"abstract":[{"text":"Weighted majority votes allow one to combine the output of several classifiers or voters. MinCq is a recent algorithm for optimizing the weight of each voter based on the minimization of a theoretical bound over the risk of the vote with elegant PAC-Bayesian generalization guarantees. However, while it has demonstrated good performance when combining weak classifiers, MinCq cannot make use of the useful a priori knowledge that one may have when using a mixture of weak and strong voters. In this paper, we propose P-MinCq, an extension of MinCq that can incorporate such knowledge in the form of a  constraint over the distribution of the weights, along with general proofs of convergence that stand in the sample compression setting for data-dependent voters. The approach is applied to a vote of k-NN classifiers with a specific modeling of the voters' performance. P-MinCq significantly outperforms the classic k-NN classifier, a symmetric NN and MinCq using the same voters. We show that it is also competitive with LMNN, a popular metric learning algorithm, and that combining both approaches further reduces the error.","lang":"eng"}],"volume":97,"date_published":"2014-10-01T00:00:00Z","project":[{"call_identifier":"FP7","grant_number":"308036","_id":"2532554C-B435-11E9-9278-68D0E5697425","name":"Lifelong Learning of Visual Scene Understanding"}],"date_created":"2018-12-11T11:56:10Z","publisher":"Springer","main_file_link":[{"url":"https://hal.archives-ouvertes.fr/hal-01009578/document","open_access":"1"}],"scopus_import":1,"oa_version":"Submitted Version","month":"10","publist_id":"4802","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","oa":1,"publication_status":"published","date_updated":"2021-01-12T06:55:49Z","doi":"10.1007/s10994-014-5462-z","page":"129 - 154","_id":"2180","intvolume":"        97","acknowledgement":"This work was funded by the French project SoLSTiCe ANR-13-BS02-01 of the ANR. ","quality_controlled":"1","department":[{"_id":"ChLa"}],"citation":{"mla":"Bellet, Aurélien, et al. “Learning a Priori Constrained Weighted Majority Votes.” <i>Machine Learning</i>, vol. 97, no. 1–2, Springer, 2014, pp. 129–54, doi:<a href=\"https://doi.org/10.1007/s10994-014-5462-z\">10.1007/s10994-014-5462-z</a>.","apa":"Bellet, A., Habrard, A., Morvant, E., &#38; Sebban, M. (2014). Learning a priori constrained weighted majority votes. <i>Machine Learning</i>. Springer. <a href=\"https://doi.org/10.1007/s10994-014-5462-z\">https://doi.org/10.1007/s10994-014-5462-z</a>","chicago":"Bellet, Aurélien, Amaury Habrard, Emilie Morvant, and Marc Sebban. “Learning a Priori Constrained Weighted Majority Votes.” <i>Machine Learning</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s10994-014-5462-z\">https://doi.org/10.1007/s10994-014-5462-z</a>.","ama":"Bellet A, Habrard A, Morvant E, Sebban M. Learning a priori constrained weighted majority votes. <i>Machine Learning</i>. 2014;97(1-2):129-154. doi:<a href=\"https://doi.org/10.1007/s10994-014-5462-z\">10.1007/s10994-014-5462-z</a>","short":"A. Bellet, A. Habrard, E. Morvant, M. Sebban, Machine Learning 97 (2014) 129–154.","ista":"Bellet A, Habrard A, Morvant E, Sebban M. 2014. Learning a priori constrained weighted majority votes. Machine Learning. 97(1–2), 129–154.","ieee":"A. Bellet, A. Habrard, E. Morvant, and M. Sebban, “Learning a priori constrained weighted majority votes,” <i>Machine Learning</i>, vol. 97, no. 1–2. Springer, pp. 129–154, 2014."},"title":"Learning a priori constrained weighted majority votes","type":"journal_article","status":"public"},{"article_number":"062809","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publist_id":"4798","oa_version":"Preprint","month":"06","date_updated":"2022-08-25T14:04:45Z","oa":1,"publication_status":"published","article_processing_charge":"No","citation":{"ama":"Botella Soler V, Glendinning P. Hierarchy and polysynchrony in an adaptive network . <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>. 2014;89(6). doi:<a href=\"https://doi.org/10.1103/PhysRevE.89.062809\">10.1103/PhysRevE.89.062809</a>","short":"V. Botella Soler, P. Glendinning, Physical Review E Statistical Nonlinear and Soft Matter Physics 89 (2014).","chicago":"Botella Soler, Vicente, and Paul Glendinning. “Hierarchy and Polysynchrony in an Adaptive Network .” <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>. American Institute of Physics, 2014. <a href=\"https://doi.org/10.1103/PhysRevE.89.062809\">https://doi.org/10.1103/PhysRevE.89.062809</a>.","apa":"Botella Soler, V., &#38; Glendinning, P. (2014). Hierarchy and polysynchrony in an adaptive network . <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>. American Institute of Physics. <a href=\"https://doi.org/10.1103/PhysRevE.89.062809\">https://doi.org/10.1103/PhysRevE.89.062809</a>","mla":"Botella Soler, Vicente, and Paul Glendinning. “Hierarchy and Polysynchrony in an Adaptive Network .” <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>, vol. 89, no. 6, 062809, American Institute of Physics, 2014, doi:<a href=\"https://doi.org/10.1103/PhysRevE.89.062809\">10.1103/PhysRevE.89.062809</a>.","ieee":"V. Botella Soler and P. Glendinning, “Hierarchy and polysynchrony in an adaptive network ,” <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>, vol. 89, no. 6. American Institute of Physics, 2014.","ista":"Botella Soler V, Glendinning P. 2014. Hierarchy and polysynchrony in an adaptive network . Physical Review E Statistical Nonlinear and Soft Matter Physics. 89(6), 062809."},"type":"journal_article","status":"public","title":"Hierarchy and polysynchrony in an adaptive network ","_id":"2183","intvolume":"        89","doi":"10.1103/PhysRevE.89.062809","department":[{"_id":"GaTk"}],"acknowledgement":"V.B.S. is partially supported by contract MEC (Grant No. AYA2010-22111-C03-02).\r\n","quality_controlled":"1","issue":"6","abstract":[{"lang":"eng","text":"We describe a simple adaptive network of coupled chaotic maps. The network reaches a stationary state (frozen topology) for all values of the coupling parameter, although the dynamics of the maps at the nodes of the network can be nontrivial. The structure of the network shows interesting hierarchical properties and in certain parameter regions the dynamics is polysynchronous: Nodes can be divided in differently synchronized classes but, contrary to cluster synchronization, nodes in the same class need not be connected to each other. These complicated synchrony patterns have been conjectured to play roles in systems biology and circuits. The adaptive system we study describes ways whereby this behavior can evolve from undifferentiated nodes."}],"volume":89,"date_published":"2014-06-16T00:00:00Z","author":[{"last_name":"Botella Soler","first_name":"Vicente","orcid":"0000-0002-8790-1914","id":"421234E8-F248-11E8-B48F-1D18A9856A87","full_name":"Botella Soler, Vicente"},{"first_name":"Paul","last_name":"Glendinning","full_name":"Glendinning, Paul"}],"day":"16","language":[{"iso":"eng"}],"year":"2014","publication":"Physical Review E Statistical Nonlinear and Soft Matter Physics","ec_funded":1,"publisher":"American Institute of Physics","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1403.3209"}],"scopus_import":"1","project":[{"grant_number":"291734","call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme","_id":"25681D80-B435-11E9-9278-68D0E5697425"}],"date_created":"2018-12-11T11:56:11Z"},{"scopus_import":1,"publisher":"ACM","main_file_link":[{"url":"http://arxiv.org/abs/1105.6257","open_access":"1"}],"date_created":"2018-12-11T11:56:12Z","author":[{"full_name":"Čadek, Martin","first_name":"Martin","last_name":"Čadek"},{"full_name":"Krcál, Marek","id":"33E21118-F248-11E8-B48F-1D18A9856A87","last_name":"Krcál","first_name":"Marek"},{"first_name":"Jiří","last_name":"Matoušek","full_name":"Matoušek, Jiří"},{"first_name":"Francis","last_name":"Sergeraert","full_name":"Sergeraert, Francis"},{"full_name":"Vokřínek, Lukáš","last_name":"Vokřínek","first_name":"Lukáš"},{"full_name":"Wagner, Uli","id":"36690CA2-F248-11E8-B48F-1D18A9856A87","last_name":"Wagner","first_name":"Uli","orcid":"0000-0002-1494-0568"}],"volume":61,"abstract":[{"text":"Given topological spaces X,Y, a fundamental problem of algebraic topology is understanding the structure of all continuous maps X→ Y. We consider a computational version, where X,Y are given as finite simplicial complexes, and the goal is to compute [X,Y], that is, all homotopy classes of suchmaps.We solve this problem in the stable range, where for some d ≥ 2, we have dim X ≤ 2d-2 and Y is (d-1)-connected; in particular, Y can be the d-dimensional sphere Sd. The algorithm combines classical tools and ideas from homotopy theory (obstruction theory, Postnikov systems, and simplicial sets) with algorithmic tools from effective algebraic topology (locally effective simplicial sets and objects with effective homology). In contrast, [X,Y] is known to be uncomputable for general X,Y, since for X = S1 it includes a well known undecidable problem: testing triviality of the fundamental group of Y. In follow-up papers, the algorithm is shown to run in polynomial time for d fixed, and extended to other problems, such as the extension problem, where we are given a subspace A ⊂ X and a map A→ Y and ask whether it extends to a map X → Y, or computing the Z2-index-everything in the stable range. Outside the stable range, the extension problem is undecidable.","lang":"eng"}],"date_published":"2014-05-01T00:00:00Z","issue":"3","publication":"Journal of the ACM","day":"01","year":"2014","language":[{"iso":"eng"}],"title":"Computing all maps into a sphere","type":"journal_article","status":"public","citation":{"ieee":"M. Čadek, M. Krcál, J. Matoušek, F. Sergeraert, L. Vokřínek, and U. Wagner, “Computing all maps into a sphere,” <i>Journal of the ACM</i>, vol. 61, no. 3. ACM, 2014.","ista":"Čadek M, Krcál M, Matoušek J, Sergeraert F, Vokřínek L, Wagner U. 2014. Computing all maps into a sphere. Journal of the ACM. 61(3), 17.","ama":"Čadek M, Krcál M, Matoušek J, Sergeraert F, Vokřínek L, Wagner U. Computing all maps into a sphere. <i>Journal of the ACM</i>. 2014;61(3). doi:<a href=\"https://doi.org/10.1145/2597629\">10.1145/2597629</a>","short":"M. Čadek, M. Krcál, J. Matoušek, F. Sergeraert, L. Vokřínek, U. Wagner, Journal of the ACM 61 (2014).","chicago":"Čadek, Martin, Marek Krcál, Jiří Matoušek, Francis Sergeraert, Lukáš Vokřínek, and Uli Wagner. “Computing All Maps into a Sphere.” <i>Journal of the ACM</i>. ACM, 2014. <a href=\"https://doi.org/10.1145/2597629\">https://doi.org/10.1145/2597629</a>.","apa":"Čadek, M., Krcál, M., Matoušek, J., Sergeraert, F., Vokřínek, L., &#38; Wagner, U. (2014). Computing all maps into a sphere. <i>Journal of the ACM</i>. ACM. <a href=\"https://doi.org/10.1145/2597629\">https://doi.org/10.1145/2597629</a>","mla":"Čadek, Martin, et al. “Computing All Maps into a Sphere.” <i>Journal of the ACM</i>, vol. 61, no. 3, 17, ACM, 2014, doi:<a href=\"https://doi.org/10.1145/2597629\">10.1145/2597629</a>."},"acknowledgement":"The research by M. K. was supported by project GAUK 49209. The research by M. K. was also supported by project 1M0545 by the Ministry of Education of the Czech Republic and by Center of Excellence { Inst. for Theor. Comput. Sci., Prague (project P202/12/G061 of GACR). The research by U. W. was supported by the Swiss National Science Foundation (SNF Projects 200021-125309, 200020-138230, and PP00P2-138948).","quality_controlled":"1","department":[{"_id":"UlWa"},{"_id":"HeEd"}],"doi":"10.1145/2597629","_id":"2184","intvolume":"        61","article_number":"17 ","publication_status":"published","oa":1,"date_updated":"2021-01-12T06:55:50Z","oa_version":"Preprint","month":"05","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4797"},{"date_created":"2018-12-11T11:56:12Z","scopus_import":1,"file":[{"creator":"system","date_created":"2018-12-12T10:08:43Z","checksum":"da1aa01221086083b23c92e547b48ff4","relation":"main_file","file_id":"4705","file_name":"IST-2016-680-v1+1_708.pdf","access_level":"open_access","file_size":505389,"date_updated":"2020-07-14T12:45:31Z","content_type":"application/pdf"}],"publisher":"Springer","language":[{"iso":"eng"}],"year":"2014","day":"01","date_published":"2014-04-01T00:00:00Z","volume":8441,"abstract":[{"text":"We revisit the classical problem of converting an imperfect source of randomness into a usable cryptographic key. Assume that we have some cryptographic application P that expects a uniformly random m-bit key R and ensures that the best attack (in some complexity class) against P(R) has success probability at most δ. Our goal is to design a key-derivation function (KDF) h that converts any random source X of min-entropy k into a sufficiently &quot;good&quot; key h(X), guaranteeing that P(h(X)) has comparable security δ′ which is 'close' to δ. Seeded randomness extractors provide a generic way to solve this problem for all applications P, with resulting security δ′ = O(δ), provided that we start with entropy k ≥ m + 2 log (1/δ) - O(1). By a result of Radhakrishnan and Ta-Shma, this bound on k (called the &quot;RT-bound&quot;) is also known to be tight in general. Unfortunately, in many situations the loss of 2 log (1/δ) bits of entropy is unacceptable. This motivates the study KDFs with less entropy waste by placing some restrictions on the source X or the application P. In this work we obtain the following new positive and negative results in this regard: - Efficient samplability of the source X does not help beat the RT-bound for general applications. This resolves the SRT (samplable RT) conjecture of Dachman-Soled et al. [DGKM12] in the affirmative, and also shows that the existence of computationally-secure extractors beating the RT-bound implies the existence of one-way functions. - We continue in the line of work initiated by Barak et al. [BDK+11] and construct new information-theoretic KDFs which beat the RT-bound for large but restricted classes of applications. Specifically, we design efficient KDFs that work for all unpredictability applications P (e.g., signatures, MACs, one-way functions, etc.) and can either: (1) extract all of the entropy k = m with a very modest security loss δ′ = O(δ·log (1/δ)), or alternatively, (2) achieve essentially optimal security δ′ = O(δ) with a very modest entropy loss k ≥ m + loglog (1/δ). In comparison, the best prior results from [BDK+11] for this class of applications would only guarantee δ′ = O(√δ) when k = m, and would need k ≥ m + log (1/δ) to get δ′ = O(δ). - The weaker bounds of [BDK+11] hold for a larger class of so-called &quot;square- friendly&quot; applications (which includes all unpredictability, but also some important indistinguishability, applications). Unfortunately, we show that these weaker bounds are tight for the larger class of applications. - We abstract out a clean, information-theoretic notion of (k,δ,δ′)- unpredictability extractors, which guarantee &quot;induced&quot; security δ′ for any δ-secure unpredictability application P, and characterize the parameters achievable for such unpredictability extractors. Of independent interest, we also relate this notion to the previously-known notion of (min-entropy) condensers, and improve the state-of-the-art parameters for such condensers.","lang":"eng"}],"author":[{"full_name":"Dodis, Yevgeniy","last_name":"Dodis","first_name":"Yevgeniy"},{"last_name":"Pietrzak","first_name":"Krzysztof Z","orcid":"0000-0002-9139-1654","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","full_name":"Pietrzak, Krzysztof Z"},{"last_name":"Wichs","first_name":"Daniel","full_name":"Wichs, Daniel"}],"file_date_updated":"2020-07-14T12:45:31Z","editor":[{"first_name":"Phong","last_name":"Nguyen","full_name":"Nguyen, Phong"},{"first_name":"Elisabeth","last_name":"Oswald","full_name":"Oswald, Elisabeth"}],"department":[{"_id":"KrPi"}],"quality_controlled":"1","intvolume":"      8441","page":"93 - 110","_id":"2185","doi":"10.1007/978-3-642-55220-5_6","pubrep_id":"680","type":"conference","status":"public","title":"Key derivation without entropy waste","citation":{"ama":"Dodis Y, Pietrzak KZ, Wichs D. Key derivation without entropy waste. In: Nguyen P, Oswald E, eds. Vol 8441. Springer; 2014:93-110. doi:<a href=\"https://doi.org/10.1007/978-3-642-55220-5_6\">10.1007/978-3-642-55220-5_6</a>","short":"Y. Dodis, K.Z. Pietrzak, D. Wichs, in:, P. Nguyen, E. Oswald (Eds.), Springer, 2014, pp. 93–110.","chicago":"Dodis, Yevgeniy, Krzysztof Z Pietrzak, and Daniel Wichs. “Key Derivation without Entropy Waste.” edited by Phong Nguyen and Elisabeth Oswald, 8441:93–110. Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-642-55220-5_6\">https://doi.org/10.1007/978-3-642-55220-5_6</a>.","apa":"Dodis, Y., Pietrzak, K. Z., &#38; Wichs, D. (2014). Key derivation without entropy waste. In P. Nguyen &#38; E. Oswald (Eds.) (Vol. 8441, pp. 93–110). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark: Springer. <a href=\"https://doi.org/10.1007/978-3-642-55220-5_6\">https://doi.org/10.1007/978-3-642-55220-5_6</a>","mla":"Dodis, Yevgeniy, et al. <i>Key Derivation without Entropy Waste</i>. Edited by Phong Nguyen and Elisabeth Oswald, vol. 8441, Springer, 2014, pp. 93–110, doi:<a href=\"https://doi.org/10.1007/978-3-642-55220-5_6\">10.1007/978-3-642-55220-5_6</a>.","ista":"Dodis Y, Pietrzak KZ, Wichs D. 2014. Key derivation without entropy waste. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 8441, 93–110.","ieee":"Y. Dodis, K. Z. Pietrzak, and D. Wichs, “Key derivation without entropy waste,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, 2014, vol. 8441, pp. 93–110."},"date_updated":"2021-01-12T06:55:51Z","ddc":["000","004"],"conference":{"name":"EUROCRYPT: Theory and Applications of Cryptographic Techniques","start_date":"2014-05-11","end_date":"2014-05-15","location":"Copenhagen, Denmark"},"oa":1,"publication_status":"published","publist_id":"4795","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","oa_version":"Submitted Version","month":"04","alternative_title":["LNCS"],"has_accepted_license":"1"},{"publication_status":"published","oa":1,"date_updated":"2021-01-12T06:55:51Z","month":"05","oa_version":"Submitted Version","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4793","title":"On the well-posedness and scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti","type":"journal_article","status":"public","citation":{"ista":"Chen T, Hainzl C, Pavlović N, Seiringer R. 2014. On the well-posedness and scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti. Letters in Mathematical Physics. 104(7), 871–891.","ieee":"T. Chen, C. Hainzl, N. Pavlović, and R. Seiringer, “On the well-posedness and scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti,” <i>Letters in Mathematical Physics</i>, vol. 104, no. 7. Springer, pp. 871–891, 2014.","ama":"Chen T, Hainzl C, Pavlović N, Seiringer R. On the well-posedness and scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti. <i>Letters in Mathematical Physics</i>. 2014;104(7):871-891. doi:<a href=\"https://doi.org/10.1007/s11005-014-0693-2\">10.1007/s11005-014-0693-2</a>","chicago":"Chen, Thomas, Christian Hainzl, Nataša Pavlović, and Robert Seiringer. “On the Well-Posedness and Scattering for the Gross-Pitaevskii Hierarchy via Quantum de Finetti.” <i>Letters in Mathematical Physics</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s11005-014-0693-2\">https://doi.org/10.1007/s11005-014-0693-2</a>.","short":"T. Chen, C. Hainzl, N. Pavlović, R. Seiringer, Letters in Mathematical Physics 104 (2014) 871–891.","apa":"Chen, T., Hainzl, C., Pavlović, N., &#38; Seiringer, R. (2014). On the well-posedness and scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti. <i>Letters in Mathematical Physics</i>. Springer. <a href=\"https://doi.org/10.1007/s11005-014-0693-2\">https://doi.org/10.1007/s11005-014-0693-2</a>","mla":"Chen, Thomas, et al. “On the Well-Posedness and Scattering for the Gross-Pitaevskii Hierarchy via Quantum de Finetti.” <i>Letters in Mathematical Physics</i>, vol. 104, no. 7, Springer, 2014, pp. 871–91, doi:<a href=\"https://doi.org/10.1007/s11005-014-0693-2\">10.1007/s11005-014-0693-2</a>."},"quality_controlled":"1","department":[{"_id":"RoSe"}],"doi":"10.1007/s11005-014-0693-2","intvolume":"       104","page":"871 - 891","_id":"2186","author":[{"last_name":"Chen","first_name":"Thomas","full_name":"Chen, Thomas"},{"full_name":"Hainzl, Christian","last_name":"Hainzl","first_name":"Christian"},{"first_name":"Nataša","last_name":"Pavlović","full_name":"Pavlović, Nataša"},{"id":"4AFD0470-F248-11E8-B48F-1D18A9856A87","full_name":"Seiringer, Robert","orcid":"0000-0002-6781-0521","last_name":"Seiringer","first_name":"Robert"}],"date_published":"2014-05-07T00:00:00Z","abstract":[{"text":"We prove the existence of scattering states for the defocusing cubic Gross-Pitaevskii (GP) hierarchy in ℝ3. Moreover, we show that an exponential energy growth condition commonly used in the well-posedness theory of the GP hierarchy is, in a specific sense, necessary. In fact, we prove that without the latter, there exist initial data for the focusing cubic GP hierarchy for which instantaneous blowup occurs.","lang":"eng"}],"volume":104,"issue":"7","publication":"Letters in Mathematical Physics","language":[{"iso":"eng"}],"year":"2014","day":"07","scopus_import":1,"main_file_link":[{"url":"http://arxiv.org/abs/1311.2136","open_access":"1"}],"publisher":"Springer","project":[{"name":"NSERC Postdoctoral fellowship","_id":"26450934-B435-11E9-9278-68D0E5697425"}],"date_created":"2018-12-11T11:56:12Z"},{"citation":{"ista":"Bloem R, Chatterjee K, Greimel K, Henzinger TA, Hofferek G, Jobstmann B, Könighofer B, Könighofer R. 2014. Synthesizing robust systems. Acta Informatica. 51(3–4), 193–220.","ieee":"R. Bloem <i>et al.</i>, “Synthesizing robust systems,” <i>Acta Informatica</i>, vol. 51, no. 3–4. Springer, pp. 193–220, 2014.","mla":"Bloem, Roderick, et al. “Synthesizing Robust Systems.” <i>Acta Informatica</i>, vol. 51, no. 3–4, Springer, 2014, pp. 193–220, doi:<a href=\"https://doi.org/10.1007/s00236-013-0191-5\">10.1007/s00236-013-0191-5</a>.","apa":"Bloem, R., Chatterjee, K., Greimel, K., Henzinger, T. A., Hofferek, G., Jobstmann, B., … Könighofer, R. (2014). Synthesizing robust systems. <i>Acta Informatica</i>. Springer. <a href=\"https://doi.org/10.1007/s00236-013-0191-5\">https://doi.org/10.1007/s00236-013-0191-5</a>","short":"R. Bloem, K. Chatterjee, K. Greimel, T.A. Henzinger, G. Hofferek, B. Jobstmann, B. Könighofer, R. Könighofer, Acta Informatica 51 (2014) 193–220.","chicago":"Bloem, Roderick, Krishnendu Chatterjee, Karin Greimel, Thomas A Henzinger, Georg Hofferek, Barbara Jobstmann, Bettina Könighofer, and Robert Könighofer. “Synthesizing Robust Systems.” <i>Acta Informatica</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s00236-013-0191-5\">https://doi.org/10.1007/s00236-013-0191-5</a>.","ama":"Bloem R, Chatterjee K, Greimel K, et al. Synthesizing robust systems. <i>Acta Informatica</i>. 2014;51(3-4):193-220. doi:<a href=\"https://doi.org/10.1007/s00236-013-0191-5\">10.1007/s00236-013-0191-5</a>"},"article_processing_charge":"No","title":"Synthesizing robust systems","status":"public","type":"journal_article","pubrep_id":"71","doi":"10.1007/s00236-013-0191-5","_id":"2187","page":"193 - 220","intvolume":"        51","quality_controlled":"1","department":[{"_id":"KrCh"},{"_id":"ToHe"}],"has_accepted_license":"1","month":"06","oa_version":"Submitted Version","publist_id":"4787","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","oa":1,"publication_status":"published","ddc":["621"],"date_updated":"2021-01-12T06:55:51Z","publisher":"Springer","file":[{"file_id":"5234","relation":"main_file","checksum":"d7f560f3d923f0f00aa10a0652f83273","creator":"system","date_created":"2018-12-12T10:16:44Z","content_type":"application/pdf","date_updated":"2020-07-14T12:45:31Z","access_level":"open_access","file_size":169523,"file_name":"IST-2012-71-v1+1_Synthesizing_robust_systems.pdf"}],"scopus_import":1,"article_type":"original","project":[{"call_identifier":"FWF","grant_number":"S11402-N23","_id":"25F5A88A-B435-11E9-9278-68D0E5697425","name":"Moderne Concurrency Paradigms"},{"_id":"2584A770-B435-11E9-9278-68D0E5697425","name":"Modern Graph Algorithmic Techniques in Formal Verification","call_identifier":"FWF","grant_number":"P 23499-N23"},{"call_identifier":"FP7","grant_number":"279307","_id":"2581B60A-B435-11E9-9278-68D0E5697425","name":"Quantitative Graph Games: Theory and Applications"},{"_id":"2587B514-B435-11E9-9278-68D0E5697425","name":"Microsoft Research Faculty Fellowship"},{"_id":"25EE3708-B435-11E9-9278-68D0E5697425","name":"Quantitative Reactive Modeling","call_identifier":"FP7","grant_number":"267989"}],"date_created":"2018-12-11T11:56:13Z","file_date_updated":"2020-07-14T12:45:31Z","issue":"3-4","author":[{"last_name":"Bloem","first_name":"Roderick","full_name":"Bloem, Roderick"},{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu","first_name":"Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X"},{"full_name":"Greimel, Karin","last_name":"Greimel","first_name":"Karin"},{"first_name":"Thomas A","last_name":"Henzinger","orcid":"0000−0002−2985−7724","full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Hofferek","first_name":"Georg","full_name":"Hofferek, Georg"},{"full_name":"Jobstmann, Barbara","first_name":"Barbara","last_name":"Jobstmann"},{"last_name":"Könighofer","first_name":"Bettina","full_name":"Könighofer, Bettina"},{"last_name":"Könighofer","first_name":"Robert","full_name":"Könighofer, Robert"}],"volume":51,"abstract":[{"lang":"eng","text":"Systems should not only be correct but also robust in the sense that they behave reasonably in unexpected situations. This article addresses synthesis of robust reactive systems from temporal specifications. Existing methods allow arbitrary behavior if assumptions in the specification are violated. To overcome this, we define two robustness notions, combine them, and show how to enforce them in synthesis. The first notion applies to safety properties: If safety assumptions are violated temporarily, we require that the system recovers to normal operation with as few errors as possible. The second notion requires that, if liveness assumptions are violated, as many guarantees as possible should be fulfilled nevertheless. We present a synthesis procedure achieving this for the important class of GR(1) specifications, and establish complexity bounds. We also present an implementation of a special case of robustness, and show experimental results."}],"date_published":"2014-06-01T00:00:00Z","publication":"Acta Informatica","day":"01","year":"2014","language":[{"iso":"eng"}],"ec_funded":1},{"issue":"APRIL","file_date_updated":"2020-07-14T12:45:31Z","abstract":[{"text":"Although plant and animal cells use a similar core mechanism to deliver proteins to the plasma membrane, their different lifestyle, body organization and specific cell structures resulted in the acquisition of regulatory mechanisms that vary in the two kingdoms. In particular, cell polarity regulators do not seem to be conserved, because genes encoding key components are absent in plant genomes. In plants, the broad knowledge on polarity derives from the study of auxin transporters, the PIN-FORMED proteins, in the model plant Arabidopsis thaliana. In animals, much information is provided from the study of polarity in epithelial cells that exhibit basolateral and luminal apical polarities, separated by tight junctions. In this review, we summarize the similarities and differences of the polarization mechanisms between plants and animals and survey the main genetic approaches that have been used to characterize new genes involved in polarity establishment in plants, including the frequently used forward and reverse genetics screens as well as a novel chemical genetics approach that is expected to overcome the limitation of classical genetics methods.","lang":"eng"}],"volume":4,"date_published":"2014-04-16T00:00:00Z","author":[{"last_name":"Kania","first_name":"Urszula","id":"4AE5C486-F248-11E8-B48F-1D18A9856A87","full_name":"Kania, Urszula"},{"last_name":"Fendrych","first_name":"Matyas","full_name":"Fendrych, Matyas"},{"id":"4159519E-F248-11E8-B48F-1D18A9856A87","full_name":"Friml, Jiřĺ","last_name":"Friml","first_name":"Jiřĺ","orcid":"0000-0002-8302-7596"}],"day":"16","year":"2014","language":[{"iso":"eng"}],"publication":"Open Biology","file":[{"date_updated":"2020-07-14T12:45:31Z","content_type":"application/pdf","file_name":"IST-2016-441-v1+1_140017.full.pdf","access_level":"open_access","file_size":682570,"file_id":"5025","creator":"system","date_created":"2018-12-12T10:13:40Z","relation":"main_file","checksum":"2020627feff36cf0799167c84149fa75"}],"publisher":"Royal Society","scopus_import":1,"date_created":"2018-12-11T11:56:13Z","has_accepted_license":"1","article_number":"140017","publist_id":"4786","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","month":"04","oa_version":"Published Version","ddc":["570"],"date_updated":"2021-01-12T06:55:52Z","publication_status":"published","oa":1,"citation":{"ama":"Kania U, Fendrych M, Friml J. Polar delivery in plants; commonalities and differences to animal epithelial cells. <i>Open Biology</i>. 2014;4(APRIL). doi:<a href=\"https://doi.org/10.1098/rsob.140017\">10.1098/rsob.140017</a>","short":"U. Kania, M. Fendrych, J. Friml, Open Biology 4 (2014).","chicago":"Kania, Urszula, Matyas Fendrych, and Jiří Friml. “Polar Delivery in Plants; Commonalities and Differences to Animal Epithelial Cells.” <i>Open Biology</i>. Royal Society, 2014. <a href=\"https://doi.org/10.1098/rsob.140017\">https://doi.org/10.1098/rsob.140017</a>.","mla":"Kania, Urszula, et al. “Polar Delivery in Plants; Commonalities and Differences to Animal Epithelial Cells.” <i>Open Biology</i>, vol. 4, no. APRIL, 140017, Royal Society, 2014, doi:<a href=\"https://doi.org/10.1098/rsob.140017\">10.1098/rsob.140017</a>.","apa":"Kania, U., Fendrych, M., &#38; Friml, J. (2014). Polar delivery in plants; commonalities and differences to animal epithelial cells. <i>Open Biology</i>. Royal Society. <a href=\"https://doi.org/10.1098/rsob.140017\">https://doi.org/10.1098/rsob.140017</a>","ieee":"U. Kania, M. Fendrych, and J. Friml, “Polar delivery in plants; commonalities and differences to animal epithelial cells,” <i>Open Biology</i>, vol. 4, no. APRIL. Royal Society, 2014.","ista":"Kania U, Fendrych M, Friml J. 2014. Polar delivery in plants; commonalities and differences to animal epithelial cells. Open Biology. 4(APRIL), 140017."},"status":"public","type":"journal_article","pubrep_id":"441","tmp":{"short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"title":"Polar delivery in plants; commonalities and differences to animal epithelial cells","_id":"2188","intvolume":"         4","doi":"10.1098/rsob.140017","department":[{"_id":"JiFr"}],"acknowledgement":"This work was supported by a grant from the Research Foundation-Flanders (Odysseus).\r\n\r\n","quality_controlled":"1"}]
