@article{6366,
  abstract     = {Plants have a remarkable capacity to adjust their growth and development to elevated ambient temperatures. Increased elongation growth of roots, hypocotyls and petioles in warm temperatures are hallmarks of seedling thermomorphogenesis. In the last decade, significant progress has been made to identify the molecular signaling components regulating these growth responses. Increased ambient temperature utilizes diverse components of the light sensing and signal transduction network to trigger growth adjustments. However, it remains unknown whether temperature sensing and responses are universal processes that occur uniformly in all plant organs. Alternatively, temperature sensing may be confined to specific tissues or organs, which would require a systemic signal that mediates responses in distal parts of the plant. Here we show that Arabidopsis (Arabidopsis thaliana) seedlings show organ-specific transcriptome responses to elevated temperatures, and that thermomorphogenesis involves both autonomous and organ-interdependent temperature sensing and signaling. Seedling roots can sense and respond to temperature in a shoot-independent manner, whereas shoot temperature responses require both local and systemic processes. The induction of cell elongation in hypocotyls requires temperature sensing in cotyledons, followed by generation of a mobile auxin signal. Subsequently, auxin travels to the hypocotyl where it triggers local brassinosteroid-induced cell elongation in seedling stems, which depends upon a distinct, permissive temperature sensor in the hypocotyl.},
  author       = {Bellstaedt, Julia and Trenner, Jana and Lippmann, Rebecca and Poeschl, Yvonne and Zhang, Xixi and Friml, Jiří and Quint, Marcel and Delker, Carolin},
  issn         = {1532-2548},
  journal      = {Plant Physiology},
  number       = {2},
  pages        = {757--766},
  publisher    = {ASPB},
  title        = {{A mobile auxin signal connects temperature sensing in cotyledons with growth responses in hypocotyls}},
  doi          = {10.1104/pp.18.01377},
  volume       = {180},
  year         = {2019},
}

@phdthesis{6371,
  abstract     = {Decades of studies have revealed the mechanisms of gene regulation in molecular detail. We make use of such well-described regulatory systems to explore how the molecular mechanisms of protein-protein and protein-DNA interactions shape the dynamics and evolution of gene regulation. 

i) We uncover how the biophysics of protein-DNA binding determines the potential of regulatory networks to evolve and adapt, which can be captured using a simple mathematical model. 
ii) The evolution of regulatory connections can lead to a significant amount of crosstalk between binding proteins. We explore the effect of crosstalk on gene expression from a target promoter, which seems to be modulated through binding competition at non-specific DNA sites. 
iii) We investigate how the very same biophysical characteristics as in i) can generate significant fitness costs for cells through global crosstalk, meaning non-specific DNA binding across the genomic background. 
iv) Binding competition between proteins at a target promoter is a prevailing regulatory feature due to the prevalence of co-regulation at bacterial promoters. However, the dynamics of these systems are not always straightforward to determine even if the molecular mechanisms of regulation are known. A detailed model of the biophysical interactions reveals that interference between the regulatory proteins can constitute a new, generic form of system memory that records the history of the input signals at the promoter. 

We demonstrate how the biophysics of protein-DNA binding can be harnessed to investigate the principles that shape and ultimately limit cellular gene regulation. These results provide a basis for studies of higher-level functionality, which arises from the underlying regulation.   
},
  author       = {Igler, Claudia},
  issn         = {2663-337X},
  keywords     = {gene regulation, biophysics, transcription factor binding, bacteria},
  pages        = {152},
  publisher    = {Institute of Science and Technology Austria},
  title        = {{On the nature of gene regulatory design - The biophysics of transcription factor binding shapes gene regulation}},
  doi          = {10.15479/AT:ISTA:6371},
  year         = {2019},
}

@article{6377,
  abstract     = {Clathrin-mediated endocytosis (CME) is a highly conserved and essential cellular process in eukaryotic cells, but its dynamic and vital nature makes it challenging to study using classical genetics tools. In contrast, although small molecules can acutely and reversibly perturb CME, the few chemical CME inhibitors that have been applied to plants are either ineffective or show undesirable side effects. Here, we identify the previously described endosidin9 (ES9) as an inhibitor of clathrin heavy chain (CHC) function in both Arabidopsis and human cells through affinity-based target isolation, in vitro binding studies and X-ray crystallography. Moreover, we present a chemically improved ES9 analog, ES9-17, which lacks the undesirable side effects of ES9 while retaining the ability to target CHC. ES9 and ES9-17 have expanded the chemical toolbox used to probe CHC function, and present chemical scaffolds for further design of more specific and potent CHC inhibitors across different systems.},
  author       = {Dejonghe, Wim and Sharma, Isha and Denoo, Bram and De Munck, Steven and Lu, Qing and Mishev, Kiril and Bulut, Haydar and Mylle, Evelien and De Rycke, Riet and Vasileva, Mina K and Savatin, Daniel V. and Nerinckx, Wim and Staes, An and Drozdzecki, Andrzej and Audenaert, Dominique and Yperman, Klaas and Madder, Annemieke and Friml, Jiří and Van Damme, Daniël and Gevaert, Kris and Haucke, Volker and Savvides, Savvas N. and Winne, Johan and Russinova, Eugenia},
  issn         = {15524469},
  journal      = {Nature Chemical Biology},
  number       = {6},
  pages        = {641–649},
  publisher    = {Springer Nature},
  title        = {{Disruption of endocytosis through chemical inhibition of clathrin heavy chain function}},
  doi          = {10.1038/s41589-019-0262-1},
  volume       = {15},
  year         = {2019},
}

@inproceedings{6378,
  abstract     = {In today's cryptocurrencies, Hashcash proof of work is the most commonly-adopted approach to mining. In Hashcash, when a miner decides to add a block to the chain, she has to solve the difficult computational puzzle of inverting a hash function. While Hashcash has been successfully adopted in both Bitcoin and Ethereum, it has attracted significant and harsh criticism due to its massive waste of electricity, its carbon footprint and environmental effects, and the inherent lack of usefulness in inverting a hash function. Various other mining protocols have been suggested, including proof of stake, in which a miner's chance of adding the next block is proportional to her current balance. However, such protocols lead to a higher entry cost for new miners who might not still have any stake in the cryptocurrency, and can in the worst case lead to an oligopoly, where the rich have complete control over mining. In this paper, we propose Hybrid Mining: a new mining protocol that combines solving real-world useful problems with Hashcash. Our protocol allows new miners to join the network by taking part in Hashcash mining without having to own an initial stake. It also allows nodes of the network to submit hard computational problems whose solutions are of interest in the real world, e.g.~protein folding problems. Then, miners can choose to compete in solving these problems, in lieu of Hashcash, for adding a new block. Hence, Hybrid Mining incentivizes miners to solve useful problems, such as hard computational problems arising in biology, in a distributed manner. It also gives researchers in other areas an easy-to-use tool to outsource their hard computations to the blockchain network, which has enormous computational power, by paying a reward to the miner who solves the problem for them. Moreover, our protocol provides strong security guarantees and is at least as resilient to double spending as Bitcoin.},
  author       = {Chatterjee, Krishnendu and Goharshady, Amir Kafshdar and Pourdamghani, Arash},
  booktitle    = {Proceedings of the 34th ACM Symposium on Applied Computing},
  isbn         = {9781450359337},
  location     = {Limassol, Cyprus},
  pages        = {374--381},
  publisher    = {ACM},
  title        = {{Hybrid Mining: Exploiting blockchain’s computational power for distributed problem solving}},
  doi          = {10.1145/3297280.3297319},
  volume       = {Part F147772},
  year         = {2019},
}

@article{6380,
  abstract     = {There is a huge gap between the speeds of modern caches and main memories, and therefore cache misses account for a considerable loss of efficiency in programs. The predominant technique to address this issue has been Data Packing: data elements that are frequently accessed within time proximity are packed into the same cache block, thereby minimizing accesses to the main memory. We consider the algorithmic problem of Data Packing on a two-level memory system. Given a reference sequence R of accesses to data elements, the task is to partition the elements into cache blocks such that the number of cache misses on R is minimized. The problem is notoriously difficult: it is NP-hard even when the cache has size 1, and is hard to approximate for any cache size larger than 4. Therefore, all existing techniques for Data Packing are based on heuristics and lack theoretical guarantees. In this work, we present the first positive theoretical results for Data Packing, along with new and stronger negative results. We consider the problem under the lens of the underlying access hypergraphs, which are hypergraphs of affinities between the data elements, where the order of an access hypergraph corresponds to the size of the affinity group. We study the problem parameterized by the treewidth of access hypergraphs, which is a standard notion in graph theory to measure the closeness of a graph to a tree. Our main results are as follows: We show there is a number q* depending on the cache parameters such that (a) if the access hypergraph of order q* has constant treewidth, then there is a linear-time algorithm for Data Packing; (b)the Data Packing problem remains NP-hard even if the access hypergraph of order q*-1 has constant treewidth. Thus, we establish a fine-grained dichotomy depending on a single parameter, namely, the highest order among access hypegraphs that have constant treewidth; and establish the optimal value q* of this parameter. Finally, we present an experimental evaluation of a prototype implementation of our algorithm. Our results demonstrate that, in practice, access hypergraphs of many commonly-used algorithms have small treewidth. We compare our approach with several state-of-the-art heuristic-based algorithms and show that our algorithm leads to significantly fewer cache-misses. },
  author       = {Chatterjee, Krishnendu and Goharshady, Amir Kafshdar and Okati, Nastaran and Pavlogiannis, Andreas},
  issn         = {2475-1421},
  journal      = {Proceedings of the ACM on Programming Languages},
  number       = {POPL},
  publisher    = {ACM},
  title        = {{Efficient parameterized algorithms for data packing}},
  doi          = {10.1145/3290366},
  volume       = {3},
  year         = {2019},
}

@article{6412,
  abstract     = {Polycomb group (PcG) proteins play critical roles in the epigenetic inheritance of cell fate. The Polycomb Repressive Complexes PRC1 and PRC2 catalyse distinct chromatin modifications to enforce gene silencing, but how transcriptional repression is propagated through mitotic cell divisions remains a key unresolved question. Using reversible tethering of PcG proteins to ectopic sites in mouse embryonic stem cells, here we show that PRC1 can trigger transcriptional repression and Polycomb-dependent chromatin modifications. We find that canonical PRC1 (cPRC1), but not variant PRC1, maintains gene silencing through cell division upon reversal of tethering. Propagation of gene repression is sustained by cis-acting histone modifications, PRC2-mediated H3K27me3 and cPRC1-mediated H2AK119ub1, promoting a sequence-independent feedback mechanism for PcG protein recruitment. Thus, the distinct PRC1 complexes present in vertebrates can differentially regulate epigenetic maintenance of gene silencing, potentially enabling dynamic heritable responses to complex stimuli. Our findings reveal how PcG repression is potentially inherited in vertebrates.},
  author       = {Moussa, Hagar F. and Bsteh, Daniel and Yelagandula, Ramesh and Pribitzer, Carina and Stecher, Karin and Bartalska, Katarina and Michetti, Luca and Wang, Jingkui and Zepeda-Martinez, Jorge A. and Elling, Ulrich and Stuckey, Jacob I. and James, Lindsey I. and Frye, Stephen V. and Bell, Oliver},
  issn         = {20411723},
  journal      = {Nature Communications},
  number       = {1},
  publisher    = {Springer Nature},
  title        = {{Canonical PRC1 controls sequence-independent propagation of Polycomb-mediated gene silencing}},
  doi          = {10.1038/s41467-019-09628-6},
  volume       = {10},
  year         = {2019},
}

@article{6413,
  abstract     = {Phase-field methods have long been used to model the flow of immiscible fluids. Their ability to naturally capture interface topological changes is widely recognized, but their accuracy in simulating flows of real fluids in practical geometries is not established. We here quantitatively investigate the convergence of the phase-field method to the sharp-interface limit with simulations of two-phase pipe flow. We focus on core-annular flows, in which a highly viscous fluid is lubricated by a less viscous fluid, and validate our simulations with an analytic laminar solution, a formal linear stability analysis and also in the fully nonlinear regime. We demonstrate the ability of the phase-field method to accurately deal with non-rectangular geometry, strong advection, unsteady fluctuations and large viscosity contrast. We argue that phase-field methods are very promising for quantitatively studying moderately turbulent flows, especially at high concentrations of the disperse phase.},
  author       = {Song, Baofang and Plana, Carlos and Lopez Alonso, Jose M and Avila, Marc},
  issn         = {03019322},
  journal      = {International Journal of Multiphase Flow},
  pages        = {14--24},
  publisher    = {Elsevier},
  title        = {{Phase-field simulation of core-annular pipe flow}},
  doi          = {10.1016/j.ijmultiphaseflow.2019.04.027},
  volume       = {117},
  year         = {2019},
}

@article{6415,
  abstract     = {Ant invasions are often harmful to native species communities. Their pathogens and host disease defense mechanisms may be one component of their devastating success. First, they can introduce harmful diseases to their competitors in the introduced range, to which they themselves are tolerant. Second, their supercolonial social structure of huge multi-queen nest networks means that they will harbor a broad pathogen spectrum and high pathogen load while remaining resilient, unlike the smaller, territorial colonies of the native species. Thus, it is likely that invasive ants act as a disease reservoir, promoting their competitive advantage and invasive success.},
  author       = {Cremer, Sylvia},
  issn         = {22145753},
  journal      = {Current Opinion in Insect Science},
  pages        = {63--68},
  publisher    = {Elsevier},
  title        = {{Pathogens and disease defense of invasive ants}},
  doi          = {10.1016/j.cois.2019.03.011},
  volume       = {33},
  year         = {2019},
}

@article{6418,
  abstract     = {Males and females of Artemia franciscana, a crustacean commonly used in the aquarium trade, are highly dimorphic. Sex is determined by a pair of ZW chromosomes, but the nature and extent of differentiation of these chromosomes is unknown. Here, we characterize the Z chromosome by detecting genomic regions that show lower genomic coverage in female than in male samples, and regions that harbor an excess of female-specific SNPs. We detect many Z-specific genes, which no longer have homologs on the W, but also Z-linked genes that appear to have diverged very recently from their existing W-linked homolog. We assess patterns of male and female expression in two tissues with extensive morphological dimorphism, gonads, and heads. In agreement with their morphology, sex-biased expression is common in both tissues. Interestingly, the Z chromosome is not enriched for sex-biased genes, and seems to in fact have a mechanism of dosage compensation that leads to equal expression in males and in females. Both of these patterns are contrary to most ZW systems studied so far, making A. franciscana an excellent model for investigating the interplay between the evolution of sexual dimorphism and dosage compensation, as well as Z chromosome evolution in general.},
  author       = {Huylmans, Ann K and Toups, Melissa A and Macon, Ariana and Gammerdinger, William J and Vicoso, Beatriz},
  issn         = {1759-6653},
  journal      = {Genome biology and evolution},
  number       = {4},
  pages        = {1033--1044},
  publisher    = {Oxford University Press},
  title        = {{Sex-biased gene expression and dosage compensation on the Artemia franciscana Z-chromosome}},
  doi          = {10.1093/gbe/evz053},
  volume       = {11},
  year         = {2019},
}

@article{6419,
  abstract     = {Characterizing the fitness landscape, a representation of fitness for a large set of genotypes, is key to understanding how genetic information is interpreted to create functional organisms. Here we determined the evolutionarily-relevant segment of the fitness landscape of His3, a gene coding for an enzyme in the histidine synthesis pathway, focusing on combinations of amino acid states found at orthologous sites of extant species. Just 15% of amino acids found in yeast His3 orthologues were always neutral while the impact on fitness of the remaining 85% depended on the genetic background. Furthermore, at 67% of sites, amino acid replacements were under sign epistasis, having both strongly positive and negative effect in different genetic backgrounds. 46% of sites were under reciprocal sign epistasis. The fitness impact of amino acid replacements was influenced by only a few genetic backgrounds but involved interaction of multiple sites, shaping a rugged fitness landscape in which many of the shortest paths between highly fit genotypes are inaccessible.},
  author       = {Pokusaeva, Victoria and Usmanova, Dinara R. and Putintseva, Ekaterina V. and Espinar, Lorena and Sarkisyan, Karen and Mishin, Alexander S. and Bogatyreva, Natalya S. and Ivankov, Dmitry and Akopyan, Arseniy and Avvakumov, Sergey and Povolotskaya, Inna S. and Filion, Guillaume J. and Carey, Lucas B. and Kondrashov, Fyodor},
  issn         = {15537404},
  journal      = {PLoS Genetics},
  number       = {4},
  publisher    = {Public Library of Science},
  title        = {{An experimental assay of the interactions of amino acids from orthologous sequences shaping a complex fitness landscape}},
  doi          = {10.1371/journal.pgen.1008079},
  volume       = {15},
  year         = {2019},
}

@inproceedings{6428,
  abstract     = {Safety and security are major concerns in the development of Cyber-Physical Systems (CPS). Signal temporal logic (STL) was proposedas a language to specify and monitor the correctness of CPS relativeto formalized requirements. Incorporating STL into a developmentprocess enables designers to automatically monitor and diagnosetraces, compute robustness estimates based on requirements, andperform requirement falsification, leading to productivity gains inverification and validation activities; however, in its current formSTL is agnostic to the input/output classification of signals, andthis negatively impacts the relevance of the analysis results.In this paper we propose to make the interface explicit in theSTL language by introducing input/output signal declarations. Wethen define new measures of input vacuity and output robustnessthat better reflect the nature of the system and the specification in-tent. The resulting framework, which we call interface-aware signaltemporal logic (IA-STL), aids verification and validation activities.We demonstrate the benefits of IA-STL on several CPS analysisactivities: (1) robustness-driven sensitivity analysis, (2) falsificationand (3) fault localization. We describe an implementation of our en-hancement to STL and associated notions of robustness and vacuityin a prototype extension of Breach, a MATLAB®/Simulink®toolboxfor CPS verification and validation. We explore these methodologi-cal improvements and evaluate our results on two examples fromthe automotive domain: a benchmark powertrain control systemand a hydrogen fuel cell system.},
  author       = {Ferrere, Thomas and Nickovic, Dejan and Donzé, Alexandre and Ito, Hisahiro and Kapinski, James},
  booktitle    = {Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control},
  isbn         = {9781450362825},
  location     = {Montreal, Canada},
  pages        = {57--66},
  publisher    = {ACM},
  title        = {{Interface-aware signal temporal logic}},
  doi          = {10.1145/3302504.3311800},
  year         = {2019},
}

@inproceedings{6430,
  abstract     = {A proxy re-encryption (PRE) scheme is a public-key encryption scheme that allows the holder of a key pk to derive a re-encryption key for any other key 𝑝𝑘′. This re-encryption key lets anyone transform ciphertexts under pk into ciphertexts under 𝑝𝑘′ without having to know the underlying message, while transformations from 𝑝𝑘′ to pk should not be possible (unidirectional). Security is defined in a multi-user setting against an adversary that gets the users’ public keys and can ask for re-encryption keys and can corrupt users by requesting their secret keys. Any ciphertext that the adversary cannot trivially decrypt given the obtained secret and re-encryption keys should be secure.

All existing security proofs for PRE only show selective security, where the adversary must first declare the users it wants to corrupt. This can be lifted to more meaningful adaptive security by guessing the set of corrupted users among the n users, which loses a factor exponential in  Open image in new window , rendering the result meaningless already for moderate Open image in new window .

Jafargholi et al. (CRYPTO’17) proposed a framework that in some cases allows to give adaptive security proofs for schemes which were previously only known to be selectively secure, while avoiding the exponential loss that results from guessing the adaptive choices made by an adversary. We apply their framework to PREs that satisfy some natural additional properties. Concretely, we give a more fine-grained reduction for several unidirectional PREs, proving adaptive security at a much smaller loss. The loss depends on the graph of users whose edges represent the re-encryption keys queried by the adversary. For trees and chains the loss is quasi-polynomial in the size and for general graphs it is exponential in their depth and indegree (instead of their size as for previous reductions). Fortunately, trees and low-depth graphs cover many, if not most, interesting applications.

Our results apply e.g. to the bilinear-map based PRE schemes by Ateniese et al. (NDSS’05 and CT-RSA’09), Gentry’s FHE-based scheme (STOC’09) and the LWE-based scheme by Chandran et al. (PKC’14).},
  author       = {Fuchsbauer, Georg and Kamath Hosdurg, Chethan and Klein, Karen and Pietrzak, Krzysztof Z},
  isbn         = {9783030172589},
  issn         = {16113349},
  location     = {Beijing, China},
  pages        = {317--346},
  publisher    = {Springer Nature},
  title        = {{Adaptively secure proxy re-encryption}},
  doi          = {10.1007/978-3-030-17259-6_11},
  volume       = {11443},
  year         = {2019},
}

@phdthesis{6435,
  abstract     = {Social insect colonies tend to have numerous members which function together like a single organism in such harmony that the term ``super-organism'' is often used. In this analogy the reproductive caste is analogous to the primordial germ
cells of a metazoan, while the sterile worker caste corresponds to somatic cells. The worker castes, like tissues, are
in charge of all functions of a living being, besides reproduction. The establishment of new super-organismal units
(i.e. new colonies) is accomplished by the co-dependent castes. The term oftentimes goes beyond a metaphor. We invoke it when we speak about the metabolic rate, thermoregulation, nutrient regulation and gas exchange of a social insect colony. Furthermore, we assert that the super-organism has an immune system, and benefits from ``social immunity''.

Social immunity was first summoned by evolutionary biologists to resolve the apparent discrepancy between the expected high frequency of disease outbreak amongst numerous, closely related tightly-interacting hosts, living in stable and microbially-rich environments, against the exceptionally scarce epidemic accounts in natural populations. Social
immunity comprises a multi-layer assembly of behaviours which have evolved to effectively keep the pathogenic enemies of a colony at bay. The field of social immunity has drawn interest, as it becomes increasingly urgent to stop
the collapse of pollinator species and curb the growth of invasive pests. In the past decade, several mechanisms of
social immune responses have been dissected, but many more questions remain open.

I present my work in two experimental chapters. In the first, I use invasive garden ants (*Lasius neglectus*) to study how pathogen load and its distribution among nestmates affect the grooming response of the group. Any given group of ants will carry out the same total grooming work, but will direct their grooming effort towards individuals
carrying a relatively higher spore load. Contrary to expectation, the highest risk of transmission does not stem from grooming highly contaminated ants, but instead, we suggest that the grooming response likely minimizes spore loss to the environment, reducing contamination from inadvertent pickup from the substrate.

The second is a comparative developmental approach. I follow black garden ant queens (*Lasius niger*) and their colonies from mating flight, through hibernation for a year. Colonies which grow fast from the start, have a lower chance of survival through hibernation, and those which survive grow at a lower pace later. This is true for colonies of naive
and challenged queens. Early pathogen exposure of the queens changes colony dynamics in an unexpected way: colonies from exposed queens are more likely to grow slowly and recover in numbers only after they survive hibernation.

In addition to the two experimental chapters, this thesis includes a co-authored published review on organisational
immunity, where we enlist the experimental evidence and theoretical framework on which this hypothesis is built,
identify the caveats and underline how the field is ripe to overcome them. In a final chapter, I describe my part in
two collaborative efforts, one to develop an image-based tracker, and the second to develop a classifier for ant
behaviour.},
  author       = {Casillas Perez, Barbara E},
  issn         = {2663-337X},
  keywords     = {Social Immunity, Sanitary care, Social Insects, Organisational Immunity, Colony development, Multi-target tracking},
  pages        = {183},
  publisher    = {Institute of Science and Technology Austria},
  title        = {{Collective defenses of garden ants against a fungal pathogen}},
  doi          = {10.15479/AT:ISTA:6435},
  year         = {2019},
}

@article{6442,
  abstract     = {This paper investigates the use of fundamental solutions for animating detailed linear water surface waves. We first propose an analytical solution for efficiently animating circular ripples in closed form. We then show how to adapt the method of fundamental solutions (MFS) to create ambient waves interacting with complex obstacles. Subsequently, we present a novel wavelet-based discretization which outperforms the state of the art MFS approach for simulating time-varying water surface waves with moving obstacles. Our results feature high-resolution spatial details, interactions with complex boundaries, and large open ocean domains. Our method compares favorably with previous work as well as known analytical solutions. We also present comparisons between our method and real world examples.},
  author       = {Schreck, Camille and Hafner, Christian and Wojtan, Christopher J},
  journal      = {ACM Transactions on Graphics},
  number       = {4},
  publisher    = {ACM},
  title        = {{Fundamental solutions for water wave animation}},
  doi          = {10.1145/3306346.3323002},
  volume       = {38},
  year         = {2019},
}

@article{6451,
  abstract     = {Epidermal growth factor receptor (EGFR) signaling controls skin development and homeostasis inmice and humans, and its deficiency causes severe skin inflammation, which might affect epidermalstem cell behavior. Here, we describe the inflammation-independent effects of EGFR deficiency dur-ing skin morphogenesis and in adult hair follicle stem cells. Expression and alternative splicing analysisof RNA sequencing data from interfollicular epidermis and outer root sheath indicate that EGFR con-trols genes involved in epidermal differentiation and also in centrosome function, DNA damage, cellcycle, and apoptosis. Genetic experiments employingp53deletion in EGFR-deficient epidermis revealthat EGFR signaling exhibitsp53-dependent functions in proliferative epidermal compartments, aswell asp53-independent functions in differentiated hair shaft keratinocytes. Loss of EGFR leads toabsence of LEF1 protein specifically in the innermost epithelial hair layers, resulting in disorganizationof medulla cells. Thus, our results uncover important spatial and temporal features of cell-autonomousEGFR functions in the epidermis.},
  author       = {Amberg, Nicole and Sotiropoulou, Panagiota A. and Heller, Gerwin and Lichtenberger, Beate M. and Holcmann, Martin and Camurdanoglu, Bahar and Baykuscheva-Gentscheva, Temenuschka and Blanpain, Cedric and Sibilia, Maria},
  issn         = {2589-0042},
  journal      = {iScience},
  pages        = {243--256},
  publisher    = {Elsevier},
  title        = {{EGFR controls hair shaft differentiation in a p53-independent manner}},
  doi          = {10.1016/j.isci.2019.04.018},
  volume       = {15},
  year         = {2019},
}

@article{6454,
  abstract     = {Adult neural stem cells and multiciliated ependymalcells are glial cells essential for neurological func-tions. Together, they make up the adult neurogenicniche. Using both high-throughput clonal analysisand single-cell resolution of progenitor division pat-terns and fate, we show that these two componentsof the neurogenic niche are lineally related: adult neu-ral stem cells are sister cells to ependymal cells,whereas most ependymal cells arise from the termi-nal symmetric divisions of the lineage. Unexpectedly,we found that the antagonist regulators of DNA repli-cation, GemC1 and Geminin, can tune the proportionof neural stem cells and ependymal cells. Our find-ings reveal the controlled dynamic of the neurogenicniche ontogeny and identify the Geminin familymembers as key regulators of the initial pool of adultneural stem cells.},
  author       = {Ortiz-Álvarez, G and Daclin, M and Shihavuddin, A and Lansade, P and Fortoul, A and Faucourt, M and Clavreul, S and Lalioti, ME and Taraviras, S and Hippenmeyer, Simon and Livet, J and Meunier, A and Genovesio, A and Spassky, N},
  issn         = {1097-4199},
  journal      = {Neuron},
  number       = {1},
  pages        = {159--172.e7},
  publisher    = {Elsevier},
  title        = {{Adult neural stem cells and multiciliated ependymal cells share a common lineage regulated by the Geminin family members}},
  doi          = {10.1016/j.neuron.2019.01.051},
  volume       = {102},
  year         = {2019},
}

@article{6455,
  abstract     = {During corticogenesis, distinct subtypes of neurons are sequentially born from ventricular zone progenitors. How these cells are molecularly temporally patterned is poorly understood. We used single-cell RNA sequencing at high temporal resolution to trace the lineage of the molecular identities of successive generations of apical progenitors (APs) and their daughter neurons in mouse embryos. We identified a core set of evolutionarily conserved, temporally patterned genes that drive APs from internally driven to more exteroceptive states. We found that the Polycomb repressor complex 2 (PRC2) epigenetically regulates AP temporal progression. Embryonic age–dependent AP molecular states are transmitted to their progeny as successive ground states, onto which essentially conserved early postmitotic differentiation programs are applied, and are complemented by later-occurring environment-dependent signals. Thus, epigenetically regulated temporal molecular birthmarks present in progenitors act in their postmitotic progeny to seed adult neuronal diversity.},
  author       = {Telley, L and Agirman, G and Prados, J and Amberg, Nicole and Fièvre, S and Oberst, P and Bartolini, G and Vitali, I and Cadilhac, C and Hippenmeyer, Simon and Nguyen, L and Dayer, A and Jabaudon, D},
  issn         = {1095-9203},
  journal      = {Science},
  number       = {6440},
  publisher    = {AAAS},
  title        = {{Temporal patterning of apical progenitors and their daughter neurons in the developing neocortex}},
  doi          = {10.1126/science.aav2522},
  volume       = {364},
  year         = {2019},
}

@inproceedings{6462,
  abstract     = {A controller is a device that interacts with a plant. At each time point,it reads the plant’s state and issues commands with the goal that the plant oper-ates optimally. Constructing optimal controllers is a fundamental and challengingproblem. Machine learning techniques have recently been successfully applied totrain controllers, yet they have limitations. Learned controllers are monolithic andhard to reason about. In particular, it is difficult to add features without retraining,to guarantee any level of performance, and to achieve acceptable performancewhen encountering untrained scenarios. These limitations can be addressed bydeploying quantitative run-timeshieldsthat serve as a proxy for the controller.At each time point, the shield reads the command issued by the controller andmay choose to alter it before passing it on to the plant. We show how optimalshields that interfere as little as possible while guaranteeing a desired level ofcontroller performance, can be generated systematically and automatically usingreactive  synthesis.  First,  we  abstract  the  plant  by  building  a  stochastic  model.Second, we consider the learned controller to be a black box. Third, we mea-surecontroller performanceandshield interferenceby two quantitative run-timemeasures that are formally defined using weighted automata. Then, the problemof constructing a shield that guarantees maximal performance with minimal inter-ference is the problem of finding an optimal strategy in a stochastic2-player game“controller versus shield” played on the abstract state space of the plant with aquantitative objective obtained from combining the performance and interferencemeasures. We illustrate the effectiveness of our approach by automatically con-structing lightweight shields for learned traffic-light controllers in various roadnetworks. The shields we generate avoid liveness bugs, improve controller per-formance in untrained and changing traffic situations, and add features to learnedcontrollers, such as giving priority to emergency vehicles.},
  author       = {Avni, Guy and Bloem, Roderick and Chatterjee, Krishnendu and Henzinger, Thomas A and Konighofer, Bettina and Pranger, Stefan},
  booktitle    = {31st International Conference on Computer-Aided Verification},
  isbn         = {9783030255398},
  issn         = {0302-9743},
  location     = {New York, NY, United States},
  pages        = {630--649},
  publisher    = {Springer},
  title        = {{Run-time optimization for learned controllers through quantitative games}},
  doi          = {10.1007/978-3-030-25540-4_36},
  volume       = {11561},
  year         = {2019},
}

@article{6465,
  abstract     = {Tight control over protein degradation is a fundamental requirement for cells to respond rapidly to various stimuli and adapt to a fluctuating environment. Here we develop a versatile, easy-to-handle library of destabilizing tags (degrons) for the precise regulation of protein expression profiles in mammalian cells by modulating target protein half-lives in a predictable manner. Using the well-established tetracycline gene-regulation system as a model, we show that the dynamics of protein expression can be tuned by fusing appropriate degron tags to gene regulators. Next, we apply this degron library to tune a synthetic pulse-generating circuit in mammalian cells. With this toolbox we establish a set of pulse generators with tailored pulse lengths and magnitudes of protein expression. This methodology will prove useful in the functional roles of essential proteins, fine-tuning of gene-expression systems, and enabling a higher complexity in the design of synthetic biological systems in mammalian cells.},
  author       = {Chassin, Hélène and Müller, Marius and Tigges, Marcel and Scheller, Leo and Lang, Moritz and Fussenegger, Martin},
  issn         = {20411723},
  journal      = {Nature Communications},
  number       = {1},
  publisher    = {Springer Nature},
  title        = {{A modular degron library for synthetic circuits in mammalian cells}},
  doi          = {10.1038/s41467-019-09974-5},
  volume       = {10},
  year         = {2019},
}

@article{6466,
  abstract     = {One of the most striking and consistent results in speciation genomics is the heterogeneous divergence observed across the genomes of closely related species. This pattern was initially attributed to different levels of gene exchange—with divergence preserved at loci generating a barrier to gene flow but homogenized at unlinked neutral loci. Although there is evidence to support this model, it is now recognized that interpreting patterns of divergence across genomes is not so straightforward. One 
problem is that heterogenous divergence between populations can also be generated by other processes (e.g. recurrent selective sweeps or background selection) without any involvement of differential gene flow. Thus, integrated studies that identify which loci are likely subject to divergent selection are required to shed light on the interplay between selection and gene flow during the early phases of speciation. In this issue of Molecular Ecology, Rifkin et al. (2019) confront this challenge using a pair of sister morning glory species. They wisely design their sampling to take the geographic context of individuals into account, including geographically isolated (allopatric) and co‐occurring (sympatric) populations. This enabled them to show that individuals are phenotypically less differentiated in sympatry. They also found that the loci that resist introgression are enriched for those most differentiated in allopatry and loci that exhibit signals of divergent selection. One great strength of the 
study is the combination of methods from population genetics and molecular evolution, including the development of a model to simultaneously infer admixture proportions and selfing rates.},
  author       = {Field, David and Fraisse, Christelle},
  issn         = {1365294X},
  journal      = {Molecular ecology},
  number       = {7},
  pages        = {1579--1581},
  publisher    = {Wiley},
  title        = {{Breaking down barriers in morning glories}},
  doi          = {10.1111/mec.15048},
  volume       = {28},
  year         = {2019},
}

