[{"abstract":[{"lang":"eng","text":"Plants have a remarkable capacity to adjust their growth and development to elevated ambient temperatures. Increased elongation growth of roots, hypocotyls and petioles in warm temperatures are hallmarks of seedling thermomorphogenesis. In the last decade, significant progress has been made to identify the molecular signaling components regulating these growth responses. Increased ambient temperature utilizes diverse components of the light sensing and signal transduction network to trigger growth adjustments. However, it remains unknown whether temperature sensing and responses are universal processes that occur uniformly in all plant organs. Alternatively, temperature sensing may be confined to specific tissues or organs, which would require a systemic signal that mediates responses in distal parts of the plant. Here we show that Arabidopsis (Arabidopsis thaliana) seedlings show organ-specific transcriptome responses to elevated temperatures, and that thermomorphogenesis involves both autonomous and organ-interdependent temperature sensing and signaling. Seedling roots can sense and respond to temperature in a shoot-independent manner, whereas shoot temperature responses require both local and systemic processes. The induction of cell elongation in hypocotyls requires temperature sensing in cotyledons, followed by generation of a mobile auxin signal. Subsequently, auxin travels to the hypocotyl where it triggers local brassinosteroid-induced cell elongation in seedling stems, which depends upon a distinct, permissive temperature sensor in the hypocotyl."}],"publication_status":"published","isi":1,"date_published":"2019-06-01T00:00:00Z","publisher":"ASPB","pmid":1,"title":"A mobile auxin signal connects temperature sensing in cotyledons with growth responses in hypocotyls","date_updated":"2023-09-05T12:25:19Z","department":[{"_id":"JiFr"}],"citation":{"ieee":"J. Bellstaedt <i>et al.</i>, “A mobile auxin signal connects temperature sensing in cotyledons with growth responses in hypocotyls,” <i>Plant Physiology</i>, vol. 180, no. 2. ASPB, pp. 757–766, 2019.","ama":"Bellstaedt J, Trenner J, Lippmann R, et al. A mobile auxin signal connects temperature sensing in cotyledons with growth responses in hypocotyls. <i>Plant Physiology</i>. 2019;180(2):757-766. doi:<a href=\"https://doi.org/10.1104/pp.18.01377\">10.1104/pp.18.01377</a>","ista":"Bellstaedt J, Trenner J, Lippmann R, Poeschl Y, Zhang X, Friml J, Quint M, Delker C. 2019. A mobile auxin signal connects temperature sensing in cotyledons with growth responses in hypocotyls. Plant Physiology. 180(2), 757–766.","chicago":"Bellstaedt, Julia, Jana Trenner, Rebecca Lippmann, Yvonne Poeschl, Xixi Zhang, Jiří Friml, Marcel Quint, and Carolin Delker. “A Mobile Auxin Signal Connects Temperature Sensing in Cotyledons with Growth Responses in Hypocotyls.” <i>Plant Physiology</i>. ASPB, 2019. <a href=\"https://doi.org/10.1104/pp.18.01377\">https://doi.org/10.1104/pp.18.01377</a>.","apa":"Bellstaedt, J., Trenner, J., Lippmann, R., Poeschl, Y., Zhang, X., Friml, J., … Delker, C. (2019). A mobile auxin signal connects temperature sensing in cotyledons with growth responses in hypocotyls. <i>Plant Physiology</i>. ASPB. <a href=\"https://doi.org/10.1104/pp.18.01377\">https://doi.org/10.1104/pp.18.01377</a>","mla":"Bellstaedt, Julia, et al. “A Mobile Auxin Signal Connects Temperature Sensing in Cotyledons with Growth Responses in Hypocotyls.” <i>Plant Physiology</i>, vol. 180, no. 2, ASPB, 2019, pp. 757–66, doi:<a href=\"https://doi.org/10.1104/pp.18.01377\">10.1104/pp.18.01377</a>.","short":"J. Bellstaedt, J. Trenner, R. Lippmann, Y. Poeschl, X. Zhang, J. Friml, M. Quint, C. Delker, Plant Physiology 180 (2019) 757–766."},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","external_id":{"isi":["000470086100019"],"pmid":["31000634"]},"scopus_import":"1","intvolume":"       180","publication":"Plant Physiology","oa":1,"doi":"10.1104/pp.18.01377","year":"2019","page":"757-766","day":"01","month":"06","issue":"2","language":[{"iso":"eng"}],"article_processing_charge":"No","volume":180,"quality_controlled":"1","oa_version":"Published Version","author":[{"last_name":"Bellstaedt","first_name":"Julia","full_name":"Bellstaedt, Julia"},{"first_name":"Jana","last_name":"Trenner","full_name":"Trenner, Jana"},{"full_name":"Lippmann, Rebecca","last_name":"Lippmann","first_name":"Rebecca"},{"last_name":"Poeschl","first_name":"Yvonne","full_name":"Poeschl, Yvonne"},{"full_name":"Zhang, Xixi","id":"61A66458-47E9-11EA-85BA-8AEAAF14E49A","orcid":"0000-0001-7048-4627","first_name":"Xixi","last_name":"Zhang"},{"last_name":"Friml","first_name":"Jiří","orcid":"0000-0002-8302-7596","id":"4159519E-F248-11E8-B48F-1D18A9856A87","full_name":"Friml, Jiří"},{"first_name":"Marcel","last_name":"Quint","full_name":"Quint, Marcel"},{"first_name":"Carolin","last_name":"Delker","full_name":"Delker, Carolin"}],"date_created":"2019-04-30T15:24:22Z","type":"journal_article","_id":"6366","article_type":"original","publication_identifier":{"issn":["0032-0889"],"eissn":["1532-2548"]},"status":"public","main_file_link":[{"url":"www.doi.org/10.1104/pp.18.01377","open_access":"1"}]},{"author":[{"last_name":"Igler","first_name":"Claudia","full_name":"Igler, Claudia","id":"46613666-F248-11E8-B48F-1D18A9856A87"}],"oa_version":"Published Version","project":[{"_id":"251EE76E-B435-11E9-9278-68D0E5697425","grant_number":"24573","name":"Design principles underlying genetic switch architecture (DOC Fellowship)"}],"article_processing_charge":"No","language":[{"iso":"eng"}],"file":[{"embargo":"2020-05-02","relation":"main_file","access_level":"open_access","file_size":12597663,"file_id":"6373","checksum":"c0085d47c58c9cbcab1b0a783480f6da","creator":"cigler","date_created":"2019-05-03T11:54:52Z","date_updated":"2021-02-11T11:17:13Z","content_type":"application/pdf","file_name":"IglerClaudia_OntheNatureofGeneRegulatoryDesign.pdf"},{"date_updated":"2020-07-14T12:47:28Z","date_created":"2019-05-03T11:54:54Z","content_type":"application/vnd.openxmlformats-officedocument.wordprocessingml.document","embargo_to":"open_access","file_name":"IglerClaudia_OntheNatureofGeneRegulatoryDesign.docx","relation":"source_file","file_size":34644426,"access_level":"closed","creator":"cigler","file_id":"6374","checksum":"2eac954de1c8bbf7e6fb35ed0221ae8c"}],"month":"05","has_accepted_license":"1","status":"public","publication_identifier":{"issn":["2663-337X"]},"type":"dissertation","_id":"6371","date_created":"2019-05-03T11:55:51Z","alternative_title":["ISTA Thesis"],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","degree_awarded":"PhD","citation":{"ieee":"C. Igler, “On the nature of gene regulatory design - The biophysics of transcription factor binding shapes gene regulation,” Institute of Science and Technology Austria, 2019.","apa":"Igler, C. (2019). <i>On the nature of gene regulatory design - The biophysics of transcription factor binding shapes gene regulation</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:6371\">https://doi.org/10.15479/AT:ISTA:6371</a>","ista":"Igler C. 2019. On the nature of gene regulatory design - The biophysics of transcription factor binding shapes gene regulation. Institute of Science and Technology Austria.","ama":"Igler C. On the nature of gene regulatory design - The biophysics of transcription factor binding shapes gene regulation. 2019. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:6371\">10.15479/AT:ISTA:6371</a>","chicago":"Igler, Claudia. “On the Nature of Gene Regulatory Design - The Biophysics of Transcription Factor Binding Shapes Gene Regulation.” Institute of Science and Technology Austria, 2019. <a href=\"https://doi.org/10.15479/AT:ISTA:6371\">https://doi.org/10.15479/AT:ISTA:6371</a>.","mla":"Igler, Claudia. <i>On the Nature of Gene Regulatory Design - The Biophysics of Transcription Factor Binding Shapes Gene Regulation</i>. Institute of Science and Technology Austria, 2019, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:6371\">10.15479/AT:ISTA:6371</a>.","short":"C. Igler, On the Nature of Gene Regulatory Design - The Biophysics of Transcription Factor Binding Shapes Gene Regulation, Institute of Science and Technology Austria, 2019."},"department":[{"_id":"CaGu"}],"date_updated":"2024-02-21T13:45:52Z","title":"On the nature of gene regulatory design - The biophysics of transcription factor binding shapes gene regulation","file_date_updated":"2021-02-11T11:17:13Z","publisher":"Institute of Science and Technology Austria","date_published":"2019-05-03T00:00:00Z","ddc":["576","579"],"publication_status":"published","abstract":[{"lang":"eng","text":"Decades of studies have revealed the mechanisms of gene regulation in molecular detail. We make use of such well-described regulatory systems to explore how the molecular mechanisms of protein-protein and protein-DNA interactions shape the dynamics and evolution of gene regulation. \r\n\r\ni) We uncover how the biophysics of protein-DNA binding determines the potential of regulatory networks to evolve and adapt, which can be captured using a simple mathematical model. \r\nii) The evolution of regulatory connections can lead to a significant amount of crosstalk between binding proteins. We explore the effect of crosstalk on gene expression from a target promoter, which seems to be modulated through binding competition at non-specific DNA sites. \r\niii) We investigate how the very same biophysical characteristics as in i) can generate significant fitness costs for cells through global crosstalk, meaning non-specific DNA binding across the genomic background. \r\niv) Binding competition between proteins at a target promoter is a prevailing regulatory feature due to the prevalence of co-regulation at bacterial promoters. However, the dynamics of these systems are not always straightforward to determine even if the molecular mechanisms of regulation are known. A detailed model of the biophysical interactions reveals that interference between the regulatory proteins can constitute a new, generic form of system memory that records the history of the input signals at the promoter. \r\n\r\nWe demonstrate how the biophysics of protein-DNA binding can be harnessed to investigate the principles that shape and ultimately limit cellular gene regulation. These results provide a basis for studies of higher-level functionality, which arises from the underlying regulation.   \r\n"}],"day":"03","year":"2019","doi":"10.15479/AT:ISTA:6371","page":"152","oa":1,"keyword":["gene regulation","biophysics","transcription factor binding","bacteria"],"related_material":{"record":[{"relation":"part_of_dissertation","id":"67","status":"public"},{"id":"5585","relation":"popular_science","status":"public"}]},"supervisor":[{"first_name":"Calin C","last_name":"Guet","orcid":"0000-0001-6220-2052","id":"47F8433E-F248-11E8-B48F-1D18A9856A87","full_name":"Guet, Calin C"}]},{"month":"06","issue":"6","language":[{"iso":"eng"}],"volume":15,"article_processing_charge":"No","quality_controlled":"1","oa_version":"None","author":[{"first_name":"Wim","last_name":"Dejonghe","full_name":"Dejonghe, Wim"},{"last_name":"Sharma","first_name":"Isha","full_name":"Sharma, Isha"},{"full_name":"Denoo, Bram","first_name":"Bram","last_name":"Denoo"},{"last_name":"De Munck","first_name":"Steven","full_name":"De Munck, Steven"},{"first_name":"Qing","last_name":"Lu","full_name":"Lu, Qing"},{"full_name":"Mishev, Kiril","first_name":"Kiril","last_name":"Mishev"},{"full_name":"Bulut, Haydar","last_name":"Bulut","first_name":"Haydar"},{"full_name":"Mylle, Evelien","last_name":"Mylle","first_name":"Evelien"},{"first_name":"Riet","last_name":"De Rycke","full_name":"De Rycke, Riet"},{"first_name":"Mina K","last_name":"Vasileva","full_name":"Vasileva, Mina K","id":"3407EB18-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Savatin, Daniel V.","first_name":"Daniel V.","last_name":"Savatin"},{"full_name":"Nerinckx, Wim","last_name":"Nerinckx","first_name":"Wim"},{"full_name":"Staes, An","first_name":"An","last_name":"Staes"},{"full_name":"Drozdzecki, Andrzej","first_name":"Andrzej","last_name":"Drozdzecki"},{"full_name":"Audenaert, Dominique","last_name":"Audenaert","first_name":"Dominique"},{"first_name":"Klaas","last_name":"Yperman","full_name":"Yperman, Klaas"},{"full_name":"Madder, Annemieke","last_name":"Madder","first_name":"Annemieke"},{"orcid":"0000-0002-8302-7596","last_name":"Friml","first_name":"Jiří","full_name":"Friml, Jiří","id":"4159519E-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Daniël","last_name":"Van Damme","full_name":"Van Damme, Daniël"},{"last_name":"Gevaert","first_name":"Kris","full_name":"Gevaert, Kris"},{"full_name":"Haucke, Volker","first_name":"Volker","last_name":"Haucke"},{"first_name":"Savvas N.","last_name":"Savvides","full_name":"Savvides, Savvas N."},{"last_name":"Winne","first_name":"Johan","full_name":"Winne, Johan"},{"full_name":"Russinova, Eugenia","last_name":"Russinova","first_name":"Eugenia"}],"date_created":"2019-05-05T21:59:11Z","article_type":"original","_id":"6377","type":"journal_article","status":"public","publication_identifier":{"eissn":["15524469"],"issn":["15524450"]},"publication_status":"published","abstract":[{"text":"Clathrin-mediated endocytosis (CME) is a highly conserved and essential cellular process in eukaryotic cells, but its dynamic and vital nature makes it challenging to study using classical genetics tools. In contrast, although small molecules can acutely and reversibly perturb CME, the few chemical CME inhibitors that have been applied to plants are either ineffective or show undesirable side effects. Here, we identify the previously described endosidin9 (ES9) as an inhibitor of clathrin heavy chain (CHC) function in both Arabidopsis and human cells through affinity-based target isolation, in vitro binding studies and X-ray crystallography. Moreover, we present a chemically improved ES9 analog, ES9-17, which lacks the undesirable side effects of ES9 while retaining the ability to target CHC. ES9 and ES9-17 have expanded the chemical toolbox used to probe CHC function, and present chemical scaffolds for further design of more specific and potent CHC inhibitors across different systems.","lang":"eng"}],"isi":1,"date_published":"2019-06-01T00:00:00Z","publisher":"Springer Nature","title":"Disruption of endocytosis through chemical inhibition of clathrin heavy chain function","department":[{"_id":"JiFr"}],"date_updated":"2023-09-07T12:54:35Z","citation":{"apa":"Dejonghe, W., Sharma, I., Denoo, B., De Munck, S., Lu, Q., Mishev, K., … Russinova, E. (2019). Disruption of endocytosis through chemical inhibition of clathrin heavy chain function. <i>Nature Chemical Biology</i>. Springer Nature. <a href=\"https://doi.org/10.1038/s41589-019-0262-1\">https://doi.org/10.1038/s41589-019-0262-1</a>","ama":"Dejonghe W, Sharma I, Denoo B, et al. Disruption of endocytosis through chemical inhibition of clathrin heavy chain function. <i>Nature Chemical Biology</i>. 2019;15(6):641–649. doi:<a href=\"https://doi.org/10.1038/s41589-019-0262-1\">10.1038/s41589-019-0262-1</a>","ista":"Dejonghe W, Sharma I, Denoo B, De Munck S, Lu Q, Mishev K, Bulut H, Mylle E, De Rycke R, Vasileva MK, Savatin DV, Nerinckx W, Staes A, Drozdzecki A, Audenaert D, Yperman K, Madder A, Friml J, Van Damme D, Gevaert K, Haucke V, Savvides SN, Winne J, Russinova E. 2019. Disruption of endocytosis through chemical inhibition of clathrin heavy chain function. Nature Chemical Biology. 15(6), 641–649.","chicago":"Dejonghe, Wim, Isha Sharma, Bram Denoo, Steven De Munck, Qing Lu, Kiril Mishev, Haydar Bulut, et al. “Disruption of Endocytosis through Chemical Inhibition of Clathrin Heavy Chain Function.” <i>Nature Chemical Biology</i>. Springer Nature, 2019. <a href=\"https://doi.org/10.1038/s41589-019-0262-1\">https://doi.org/10.1038/s41589-019-0262-1</a>.","ieee":"W. Dejonghe <i>et al.</i>, “Disruption of endocytosis through chemical inhibition of clathrin heavy chain function,” <i>Nature Chemical Biology</i>, vol. 15, no. 6. Springer Nature, pp. 641–649, 2019.","short":"W. Dejonghe, I. Sharma, B. Denoo, S. De Munck, Q. Lu, K. Mishev, H. Bulut, E. Mylle, R. De Rycke, M.K. Vasileva, D.V. Savatin, W. Nerinckx, A. Staes, A. Drozdzecki, D. Audenaert, K. Yperman, A. Madder, J. Friml, D. Van Damme, K. Gevaert, V. Haucke, S.N. Savvides, J. Winne, E. Russinova, Nature Chemical Biology 15 (2019) 641–649.","mla":"Dejonghe, Wim, et al. “Disruption of Endocytosis through Chemical Inhibition of Clathrin Heavy Chain Function.” <i>Nature Chemical Biology</i>, vol. 15, no. 6, Springer Nature, 2019, pp. 641–649, doi:<a href=\"https://doi.org/10.1038/s41589-019-0262-1\">10.1038/s41589-019-0262-1</a>."},"external_id":{"isi":["000468195600018"]},"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","scopus_import":"1","related_material":{"record":[{"id":"7172","relation":"dissertation_contains","status":"public"}]},"intvolume":"        15","publication":"Nature Chemical Biology","year":"2019","doi":"10.1038/s41589-019-0262-1","page":"641–649","day":"01"},{"author":[{"full_name":"Chatterjee, Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","last_name":"Chatterjee","first_name":"Krishnendu"},{"first_name":"Amir Kafshdar","last_name":"Goharshady","orcid":"0000-0003-1702-6584","id":"391365CE-F248-11E8-B48F-1D18A9856A87","full_name":"Goharshady, Amir Kafshdar"},{"last_name":"Pourdamghani","first_name":"Arash","full_name":"Pourdamghani, Arash"}],"project":[{"call_identifier":"FP7","grant_number":"279307","_id":"2581B60A-B435-11E9-9278-68D0E5697425","name":"Quantitative Graph Games: Theory and Applications"},{"_id":"25892FC0-B435-11E9-9278-68D0E5697425","grant_number":"ICT15-003","name":"Efficient Algorithms for Computer Aided Verification"},{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","name":"Rigorous Systems Engineering","call_identifier":"FWF"}],"quality_controlled":"1","oa_version":"Submitted Version","language":[{"iso":"eng"}],"article_processing_charge":"No","volume":"Part F147772","has_accepted_license":"1","month":"04","file":[{"checksum":"fbfbcd5a0c7a743862bfc3045539a614","file_id":"6379","creator":"dernst","access_level":"open_access","file_size":1023934,"relation":"main_file","file_name":"2019_ACM_Chatterjee.pdf","content_type":"application/pdf","date_created":"2019-05-06T12:09:27Z","date_updated":"2020-07-14T12:47:29Z"}],"status":"public","publication_identifier":{"isbn":["9781450359337"]},"date_created":"2019-05-06T12:11:36Z","type":"conference","_id":"6378","ec_funded":1,"conference":{"end_date":"2019-04-12","start_date":"2019-04-08","location":"Limassol, Cyprus","name":"ACM Symposium on Applied Computing"},"pubrep_id":"1069","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","external_id":{"isi":["000474685800049"]},"date_updated":"2025-06-02T08:53:46Z","department":[{"_id":"KrCh"}],"citation":{"short":"K. Chatterjee, A.K. Goharshady, A. Pourdamghani, in:, Proceedings of the 34th ACM Symposium on Applied Computing, ACM, 2019, pp. 374–381.","mla":"Chatterjee, Krishnendu, et al. “Hybrid Mining: Exploiting Blockchain’s Computational Power for Distributed Problem Solving.” <i>Proceedings of the 34th ACM Symposium on Applied Computing</i>, vol. Part F147772, ACM, 2019, pp. 374–81, doi:<a href=\"https://doi.org/10.1145/3297280.3297319\">10.1145/3297280.3297319</a>.","apa":"Chatterjee, K., Goharshady, A. K., &#38; Pourdamghani, A. (2019). Hybrid Mining: Exploiting blockchain’s computational power for distributed problem solving. In <i>Proceedings of the 34th ACM Symposium on Applied Computing</i> (Vol. Part F147772, pp. 374–381). Limassol, Cyprus: ACM. <a href=\"https://doi.org/10.1145/3297280.3297319\">https://doi.org/10.1145/3297280.3297319</a>","ista":"Chatterjee K, Goharshady AK, Pourdamghani A. 2019. Hybrid Mining: Exploiting blockchain’s computational power for distributed problem solving. Proceedings of the 34th ACM Symposium on Applied Computing. ACM Symposium on Applied Computing vol. Part F147772, 374–381.","chicago":"Chatterjee, Krishnendu, Amir Kafshdar Goharshady, and Arash Pourdamghani. “Hybrid Mining: Exploiting Blockchain’s Computational Power for Distributed Problem Solving.” In <i>Proceedings of the 34th ACM Symposium on Applied Computing</i>, Part F147772:374–81. ACM, 2019. <a href=\"https://doi.org/10.1145/3297280.3297319\">https://doi.org/10.1145/3297280.3297319</a>.","ama":"Chatterjee K, Goharshady AK, Pourdamghani A. Hybrid Mining: Exploiting blockchain’s computational power for distributed problem solving. In: <i>Proceedings of the 34th ACM Symposium on Applied Computing</i>. Vol Part F147772. ACM; 2019:374-381. doi:<a href=\"https://doi.org/10.1145/3297280.3297319\">10.1145/3297280.3297319</a>","ieee":"K. Chatterjee, A. K. Goharshady, and A. Pourdamghani, “Hybrid Mining: Exploiting blockchain’s computational power for distributed problem solving,” in <i>Proceedings of the 34th ACM Symposium on Applied Computing</i>, Limassol, Cyprus, 2019, vol. Part F147772, pp. 374–381."},"date_published":"2019-04-01T00:00:00Z","publisher":"ACM","file_date_updated":"2020-07-14T12:47:29Z","title":"Hybrid Mining: Exploiting blockchain’s computational power for distributed problem solving","abstract":[{"text":"In today's cryptocurrencies, Hashcash proof of work is the most commonly-adopted approach to mining. In Hashcash, when a miner decides to add a block to the chain, she has to solve the difficult computational puzzle of inverting a hash function. While Hashcash has been successfully adopted in both Bitcoin and Ethereum, it has attracted significant and harsh criticism due to its massive waste of electricity, its carbon footprint and environmental effects, and the inherent lack of usefulness in inverting a hash function. Various other mining protocols have been suggested, including proof of stake, in which a miner's chance of adding the next block is proportional to her current balance. However, such protocols lead to a higher entry cost for new miners who might not still have any stake in the cryptocurrency, and can in the worst case lead to an oligopoly, where the rich have complete control over mining. In this paper, we propose Hybrid Mining: a new mining protocol that combines solving real-world useful problems with Hashcash. Our protocol allows new miners to join the network by taking part in Hashcash mining without having to own an initial stake. It also allows nodes of the network to submit hard computational problems whose solutions are of interest in the real world, e.g.~protein folding problems. Then, miners can choose to compete in solving these problems, in lieu of Hashcash, for adding a new block. Hence, Hybrid Mining incentivizes miners to solve useful problems, such as hard computational problems arising in biology, in a distributed manner. It also gives researchers in other areas an easy-to-use tool to outsource their hard computations to the blockchain network, which has enormous computational power, by paying a reward to the miner who solves the problem for them. Moreover, our protocol provides strong security guarantees and is at least as resilient to double spending as Bitcoin.","lang":"eng"}],"publication_status":"published","ddc":["004"],"isi":1,"doi":"10.1145/3297280.3297319","page":"374-381","year":"2019","day":"01","oa":1,"publication":"Proceedings of the 34th ACM Symposium on Applied Computing","related_material":{"record":[{"status":"public","id":"8934","relation":"dissertation_contains"}]},"scopus_import":"1"},{"ec_funded":1,"pubrep_id":"1056","status":"public","publication_identifier":{"issn":["2475-1421"]},"date_created":"2019-05-06T12:18:17Z","_id":"6380","type":"journal_article","language":[{"iso":"eng"}],"volume":3,"has_accepted_license":"1","month":"01","article_number":"53","file":[{"file_name":"2019_ACM_POPL_Chatterjee.pdf","content_type":"application/pdf","date_created":"2019-05-06T12:23:11Z","date_updated":"2020-07-14T12:47:29Z","file_id":"6381","checksum":"c157752f96877b36685ad7063ada4524","creator":"dernst","access_level":"open_access","file_size":1294962,"relation":"main_file"}],"issue":"POPL","author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu","first_name":"Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X"},{"full_name":"Goharshady, Amir Kafshdar","id":"391365CE-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-1702-6584","last_name":"Goharshady","first_name":"Amir Kafshdar"},{"first_name":"Nastaran","last_name":"Okati","full_name":"Okati, Nastaran"},{"orcid":"0000-0002-8943-0722","last_name":"Pavlogiannis","first_name":"Andreas","full_name":"Pavlogiannis, Andreas","id":"49704004-F248-11E8-B48F-1D18A9856A87"}],"quality_controlled":"1","project":[{"_id":"25892FC0-B435-11E9-9278-68D0E5697425","grant_number":"ICT15-003","name":"Efficient Algorithms for Computer Aided Verification"},{"call_identifier":"FWF","name":"Rigorous Systems Engineering","grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425"},{"call_identifier":"FP7","_id":"2581B60A-B435-11E9-9278-68D0E5697425","grant_number":"279307","name":"Quantitative Graph Games: Theory and Applications"}],"oa_version":"Published Version","intvolume":"         3","publication":"Proceedings of the ACM on Programming Languages","related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"8934"}]},"doi":"10.1145/3290366","year":"2019","day":"01","oa":1,"file_date_updated":"2020-07-14T12:47:29Z","date_published":"2019-01-01T00:00:00Z","publisher":"ACM","title":"Efficient parameterized algorithms for data packing","publication_status":"published","abstract":[{"lang":"eng","text":"There is a huge gap between the speeds of modern caches and main memories, and therefore cache misses account for a considerable loss of efficiency in programs. The predominant technique to address this issue has been Data Packing: data elements that are frequently accessed within time proximity are packed into the same cache block, thereby minimizing accesses to the main memory. We consider the algorithmic problem of Data Packing on a two-level memory system. Given a reference sequence R of accesses to data elements, the task is to partition the elements into cache blocks such that the number of cache misses on R is minimized. The problem is notoriously difficult: it is NP-hard even when the cache has size 1, and is hard to approximate for any cache size larger than 4. Therefore, all existing techniques for Data Packing are based on heuristics and lack theoretical guarantees. In this work, we present the first positive theoretical results for Data Packing, along with new and stronger negative results. We consider the problem under the lens of the underlying access hypergraphs, which are hypergraphs of affinities between the data elements, where the order of an access hypergraph corresponds to the size of the affinity group. We study the problem parameterized by the treewidth of access hypergraphs, which is a standard notion in graph theory to measure the closeness of a graph to a tree. Our main results are as follows: We show there is a number q* depending on the cache parameters such that (a) if the access hypergraph of order q* has constant treewidth, then there is a linear-time algorithm for Data Packing; (b)the Data Packing problem remains NP-hard even if the access hypergraph of order q*-1 has constant treewidth. Thus, we establish a fine-grained dichotomy depending on a single parameter, namely, the highest order among access hypegraphs that have constant treewidth; and establish the optimal value q* of this parameter. Finally, we present an experimental evaluation of a prototype implementation of our algorithm. Our results demonstrate that, in practice, access hypergraphs of many commonly-used algorithms have small treewidth. We compare our approach with several state-of-the-art heuristic-based algorithms and show that our algorithm leads to significantly fewer cache-misses. "}],"ddc":["004"],"tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","department":[{"_id":"KrCh"}],"date_updated":"2024-03-25T23:30:18Z","citation":{"mla":"Chatterjee, Krishnendu, et al. “Efficient Parameterized Algorithms for Data Packing.” <i>Proceedings of the ACM on Programming Languages</i>, vol. 3, no. POPL, 53, ACM, 2019, doi:<a href=\"https://doi.org/10.1145/3290366\">10.1145/3290366</a>.","short":"K. Chatterjee, A.K. Goharshady, N. Okati, A. Pavlogiannis, Proceedings of the ACM on Programming Languages 3 (2019).","ieee":"K. Chatterjee, A. K. Goharshady, N. Okati, and A. Pavlogiannis, “Efficient parameterized algorithms for data packing,” <i>Proceedings of the ACM on Programming Languages</i>, vol. 3, no. POPL. ACM, 2019.","chicago":"Chatterjee, Krishnendu, Amir Kafshdar Goharshady, Nastaran Okati, and Andreas Pavlogiannis. “Efficient Parameterized Algorithms for Data Packing.” <i>Proceedings of the ACM on Programming Languages</i>. ACM, 2019. <a href=\"https://doi.org/10.1145/3290366\">https://doi.org/10.1145/3290366</a>.","ista":"Chatterjee K, Goharshady AK, Okati N, Pavlogiannis A. 2019. Efficient parameterized algorithms for data packing. Proceedings of the ACM on Programming Languages. 3(POPL), 53.","ama":"Chatterjee K, Goharshady AK, Okati N, Pavlogiannis A. Efficient parameterized algorithms for data packing. <i>Proceedings of the ACM on Programming Languages</i>. 2019;3(POPL). doi:<a href=\"https://doi.org/10.1145/3290366\">10.1145/3290366</a>","apa":"Chatterjee, K., Goharshady, A. K., Okati, N., &#38; Pavlogiannis, A. (2019). Efficient parameterized algorithms for data packing. <i>Proceedings of the ACM on Programming Languages</i>. ACM. <a href=\"https://doi.org/10.1145/3290366\">https://doi.org/10.1145/3290366</a>"}},{"intvolume":"        10","publication":"Nature Communications","scopus_import":"1","day":"29","year":"2019","doi":"10.1038/s41467-019-09628-6","oa":1,"file_date_updated":"2020-07-14T12:47:29Z","date_published":"2019-04-29T00:00:00Z","publisher":"Springer Nature","title":"Canonical PRC1 controls sequence-independent propagation of Polycomb-mediated gene silencing","abstract":[{"lang":"eng","text":"Polycomb group (PcG) proteins play critical roles in the epigenetic inheritance of cell fate. The Polycomb Repressive Complexes PRC1 and PRC2 catalyse distinct chromatin modifications to enforce gene silencing, but how transcriptional repression is propagated through mitotic cell divisions remains a key unresolved question. Using reversible tethering of PcG proteins to ectopic sites in mouse embryonic stem cells, here we show that PRC1 can trigger transcriptional repression and Polycomb-dependent chromatin modifications. We find that canonical PRC1 (cPRC1), but not variant PRC1, maintains gene silencing through cell division upon reversal of tethering. Propagation of gene repression is sustained by cis-acting histone modifications, PRC2-mediated H3K27me3 and cPRC1-mediated H2AK119ub1, promoting a sequence-independent feedback mechanism for PcG protein recruitment. Thus, the distinct PRC1 complexes present in vertebrates can differentially regulate epigenetic maintenance of gene silencing, potentially enabling dynamic heritable responses to complex stimuli. Our findings reveal how PcG repression is potentially inherited in vertebrates."}],"publication_status":"published","isi":1,"ddc":["570"],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"external_id":{"isi":["000466118700002"]},"date_updated":"2023-08-25T10:31:56Z","department":[{"_id":"SaSi"}],"citation":{"ista":"Moussa HF, Bsteh D, Yelagandula R, Pribitzer C, Stecher K, Bartalska K, Michetti L, Wang J, Zepeda-Martinez JA, Elling U, Stuckey JI, James LI, Frye SV, Bell O. 2019. Canonical PRC1 controls sequence-independent propagation of Polycomb-mediated gene silencing. Nature Communications. 10(1), 1931.","ama":"Moussa HF, Bsteh D, Yelagandula R, et al. Canonical PRC1 controls sequence-independent propagation of Polycomb-mediated gene silencing. <i>Nature Communications</i>. 2019;10(1). doi:<a href=\"https://doi.org/10.1038/s41467-019-09628-6\">10.1038/s41467-019-09628-6</a>","chicago":"Moussa, Hagar F., Daniel Bsteh, Ramesh Yelagandula, Carina Pribitzer, Karin Stecher, Katarina Bartalska, Luca Michetti, et al. “Canonical PRC1 Controls Sequence-Independent Propagation of Polycomb-Mediated Gene Silencing.” <i>Nature Communications</i>. Springer Nature, 2019. <a href=\"https://doi.org/10.1038/s41467-019-09628-6\">https://doi.org/10.1038/s41467-019-09628-6</a>.","apa":"Moussa, H. F., Bsteh, D., Yelagandula, R., Pribitzer, C., Stecher, K., Bartalska, K., … Bell, O. (2019). Canonical PRC1 controls sequence-independent propagation of Polycomb-mediated gene silencing. <i>Nature Communications</i>. Springer Nature. <a href=\"https://doi.org/10.1038/s41467-019-09628-6\">https://doi.org/10.1038/s41467-019-09628-6</a>","ieee":"H. F. Moussa <i>et al.</i>, “Canonical PRC1 controls sequence-independent propagation of Polycomb-mediated gene silencing,” <i>Nature Communications</i>, vol. 10, no. 1. Springer Nature, 2019.","mla":"Moussa, Hagar F., et al. “Canonical PRC1 Controls Sequence-Independent Propagation of Polycomb-Mediated Gene Silencing.” <i>Nature Communications</i>, vol. 10, no. 1, 1931, Springer Nature, 2019, doi:<a href=\"https://doi.org/10.1038/s41467-019-09628-6\">10.1038/s41467-019-09628-6</a>.","short":"H.F. Moussa, D. Bsteh, R. Yelagandula, C. Pribitzer, K. Stecher, K. Bartalska, L. Michetti, J. Wang, J.A. Zepeda-Martinez, U. Elling, J.I. Stuckey, L.I. James, S.V. Frye, O. Bell, Nature Communications 10 (2019)."},"publication_identifier":{"eissn":["20411723"]},"status":"public","date_created":"2019-05-13T07:58:35Z","_id":"6412","type":"journal_article","language":[{"iso":"eng"}],"article_processing_charge":"No","volume":10,"month":"04","has_accepted_license":"1","issue":"1","article_number":"1931","file":[{"relation":"main_file","file_id":"6448","checksum":"6550a328335396c856db4cbdda7d2994","creator":"dernst","access_level":"open_access","file_size":1223647,"content_type":"application/pdf","date_created":"2019-05-14T08:45:51Z","date_updated":"2020-07-14T12:47:29Z","file_name":"2019_NatureComm_Moussa.pdf"}],"author":[{"last_name":"Moussa","first_name":"Hagar F.","full_name":"Moussa, Hagar F."},{"full_name":"Bsteh, Daniel","first_name":"Daniel","last_name":"Bsteh"},{"first_name":"Ramesh","last_name":"Yelagandula","full_name":"Yelagandula, Ramesh"},{"first_name":"Carina","last_name":"Pribitzer","full_name":"Pribitzer, Carina"},{"full_name":"Stecher, Karin","last_name":"Stecher","first_name":"Karin"},{"full_name":"Bartalska, Katarina","id":"4D883232-F248-11E8-B48F-1D18A9856A87","first_name":"Katarina","last_name":"Bartalska"},{"full_name":"Michetti, Luca","first_name":"Luca","last_name":"Michetti"},{"full_name":"Wang, Jingkui","first_name":"Jingkui","last_name":"Wang"},{"last_name":"Zepeda-Martinez","first_name":"Jorge A.","full_name":"Zepeda-Martinez, Jorge A."},{"last_name":"Elling","first_name":"Ulrich","full_name":"Elling, Ulrich"},{"full_name":"Stuckey, Jacob I.","last_name":"Stuckey","first_name":"Jacob I."},{"full_name":"James, Lindsey I.","first_name":"Lindsey I.","last_name":"James"},{"first_name":"Stephen V.","last_name":"Frye","full_name":"Frye, Stephen V."},{"full_name":"Bell, Oliver","first_name":"Oliver","last_name":"Bell"}],"quality_controlled":"1","oa_version":"Published Version"},{"type":"journal_article","_id":"6413","article_type":"original","date_created":"2019-05-13T07:58:35Z","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1902.07351"}],"status":"public","publication_identifier":{"issn":["03019322"]},"oa_version":"Preprint","quality_controlled":"1","author":[{"last_name":"Song","first_name":"Baofang","full_name":"Song, Baofang"},{"full_name":"Plana, Carlos","last_name":"Plana","first_name":"Carlos"},{"id":"40770848-F248-11E8-B48F-1D18A9856A87","full_name":"Lopez Alonso, Jose M","first_name":"Jose M","last_name":"Lopez Alonso","orcid":"0000-0002-0384-2022"},{"full_name":"Avila, Marc","last_name":"Avila","first_name":"Marc"}],"month":"08","article_processing_charge":"No","volume":117,"language":[{"iso":"eng"}],"oa":1,"year":"2019","day":"01","page":"14-24","doi":"10.1016/j.ijmultiphaseflow.2019.04.027","scopus_import":"1","publication":"International Journal of Multiphase Flow","intvolume":"       117","arxiv":1,"citation":{"short":"B. Song, C. Plana, J.M. Lopez Alonso, M. Avila, International Journal of Multiphase Flow 117 (2019) 14–24.","mla":"Song, Baofang, et al. “Phase-Field Simulation of Core-Annular Pipe Flow.” <i>International Journal of Multiphase Flow</i>, vol. 117, Elsevier, 2019, pp. 14–24, doi:<a href=\"https://doi.org/10.1016/j.ijmultiphaseflow.2019.04.027\">10.1016/j.ijmultiphaseflow.2019.04.027</a>.","ista":"Song B, Plana C, Lopez Alonso JM, Avila M. 2019. Phase-field simulation of core-annular pipe flow. International Journal of Multiphase Flow. 117, 14–24.","ama":"Song B, Plana C, Lopez Alonso JM, Avila M. Phase-field simulation of core-annular pipe flow. <i>International Journal of Multiphase Flow</i>. 2019;117:14-24. doi:<a href=\"https://doi.org/10.1016/j.ijmultiphaseflow.2019.04.027\">10.1016/j.ijmultiphaseflow.2019.04.027</a>","chicago":"Song, Baofang, Carlos Plana, Jose M Lopez Alonso, and Marc Avila. “Phase-Field Simulation of Core-Annular Pipe Flow.” <i>International Journal of Multiphase Flow</i>. Elsevier, 2019. <a href=\"https://doi.org/10.1016/j.ijmultiphaseflow.2019.04.027\">https://doi.org/10.1016/j.ijmultiphaseflow.2019.04.027</a>.","apa":"Song, B., Plana, C., Lopez Alonso, J. M., &#38; Avila, M. (2019). Phase-field simulation of core-annular pipe flow. <i>International Journal of Multiphase Flow</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.ijmultiphaseflow.2019.04.027\">https://doi.org/10.1016/j.ijmultiphaseflow.2019.04.027</a>","ieee":"B. Song, C. Plana, J. M. Lopez Alonso, and M. Avila, “Phase-field simulation of core-annular pipe flow,” <i>International Journal of Multiphase Flow</i>, vol. 117. Elsevier, pp. 14–24, 2019."},"date_updated":"2023-08-25T10:19:55Z","department":[{"_id":"BjHo"}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","external_id":{"isi":["000474496000002"],"arxiv":["1902.07351"]},"isi":1,"abstract":[{"text":"Phase-field methods have long been used to model the flow of immiscible fluids. Their ability to naturally capture interface topological changes is widely recognized, but their accuracy in simulating flows of real fluids in practical geometries is not established. We here quantitatively investigate the convergence of the phase-field method to the sharp-interface limit with simulations of two-phase pipe flow. We focus on core-annular flows, in which a highly viscous fluid is lubricated by a less viscous fluid, and validate our simulations with an analytic laminar solution, a formal linear stability analysis and also in the fully nonlinear regime. We demonstrate the ability of the phase-field method to accurately deal with non-rectangular geometry, strong advection, unsteady fluctuations and large viscosity contrast. We argue that phase-field methods are very promising for quantitatively studying moderately turbulent flows, especially at high concentrations of the disperse phase.","lang":"eng"}],"publication_status":"published","title":"Phase-field simulation of core-annular pipe flow","publisher":"Elsevier","date_published":"2019-08-01T00:00:00Z"},{"quality_controlled":"1","department":[{"_id":"SyCr"}],"date_updated":"2023-08-25T10:31:31Z","citation":{"ieee":"S. Cremer, “Pathogens and disease defense of invasive ants,” <i>Current Opinion in Insect Science</i>, vol. 33. Elsevier, pp. 63–68, 2019.","ista":"Cremer S. 2019. Pathogens and disease defense of invasive ants. Current Opinion in Insect Science. 33, 63–68.","chicago":"Cremer, Sylvia. “Pathogens and Disease Defense of Invasive Ants.” <i>Current Opinion in Insect Science</i>. Elsevier, 2019. <a href=\"https://doi.org/10.1016/j.cois.2019.03.011\">https://doi.org/10.1016/j.cois.2019.03.011</a>.","ama":"Cremer S. Pathogens and disease defense of invasive ants. <i>Current Opinion in Insect Science</i>. 2019;33:63-68. doi:<a href=\"https://doi.org/10.1016/j.cois.2019.03.011\">10.1016/j.cois.2019.03.011</a>","apa":"Cremer, S. (2019). Pathogens and disease defense of invasive ants. <i>Current Opinion in Insect Science</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.cois.2019.03.011\">https://doi.org/10.1016/j.cois.2019.03.011</a>","mla":"Cremer, Sylvia. “Pathogens and Disease Defense of Invasive Ants.” <i>Current Opinion in Insect Science</i>, vol. 33, Elsevier, 2019, pp. 63–68, doi:<a href=\"https://doi.org/10.1016/j.cois.2019.03.011\">10.1016/j.cois.2019.03.011</a>.","short":"S. Cremer, Current Opinion in Insect Science 33 (2019) 63–68."},"oa_version":"None","author":[{"id":"2F64EC8C-F248-11E8-B48F-1D18A9856A87","full_name":"Cremer, Sylvia","last_name":"Cremer","first_name":"Sylvia","orcid":"0000-0002-2193-3868"}],"external_id":{"isi":["000477666000012"]},"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","month":"06","publication_status":"published","abstract":[{"text":"Ant invasions are often harmful to native species communities. Their pathogens and host disease defense mechanisms may be one component of their devastating success. First, they can introduce harmful diseases to their competitors in the introduced range, to which they themselves are tolerant. Second, their supercolonial social structure of huge multi-queen nest networks means that they will harbor a broad pathogen spectrum and high pathogen load while remaining resilient, unlike the smaller, territorial colonies of the native species. Thus, it is likely that invasive ants act as a disease reservoir, promoting their competitive advantage and invasive success.","lang":"eng"}],"isi":1,"publisher":"Elsevier","language":[{"iso":"eng"}],"date_published":"2019-06-01T00:00:00Z","title":"Pathogens and disease defense of invasive ants","volume":33,"article_processing_charge":"No","date_created":"2019-05-13T07:58:36Z","type":"journal_article","_id":"6415","status":"public","day":"01","year":"2019","publication_identifier":{"eissn":["22145753"],"issn":["22145745"]},"page":"63-68","doi":"10.1016/j.cois.2019.03.011","scopus_import":"1","intvolume":"        33","publication":"Current Opinion in Insect Science"},{"ec_funded":1,"status":"public","publication_identifier":{"eissn":["1759-6653"]},"date_created":"2019-05-13T07:58:38Z","type":"journal_article","_id":"6418","language":[{"iso":"eng"}],"volume":11,"acknowledged_ssus":[{"_id":"ScienComp"}],"article_processing_charge":"No","has_accepted_license":"1","month":"04","file":[{"checksum":"7d0ede297b6741f3dc89cd59017c7642","file_id":"6446","creator":"dernst","access_level":"open_access","file_size":1256303,"relation":"main_file","file_name":"2019_GBE_Huylmans.pdf","content_type":"application/pdf","date_created":"2019-05-14T08:29:38Z","date_updated":"2020-07-14T12:47:29Z"}],"issue":"4","author":[{"orcid":"0000-0001-8871-4961","last_name":"Huylmans","first_name":"Ann K","full_name":"Huylmans, Ann K","id":"4C0A3874-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Toups, Melissa A","id":"4E099E4E-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9752-7380","last_name":"Toups","first_name":"Melissa A"},{"id":"2A0848E2-F248-11E8-B48F-1D18A9856A87","full_name":"Macon, Ariana","first_name":"Ariana","last_name":"Macon"},{"orcid":"0000-0001-9638-1220","first_name":"William J","last_name":"Gammerdinger","full_name":"Gammerdinger, William J","id":"3A7E01BC-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Vicoso, Beatriz","id":"49E1C5C6-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4579-8306","last_name":"Vicoso","first_name":"Beatriz"}],"quality_controlled":"1","project":[{"call_identifier":"H2020","name":"Prevalence and Influence of Sexual Antagonism on Genome Evolution","grant_number":"715257","_id":"250BDE62-B435-11E9-9278-68D0E5697425"}],"oa_version":"Published Version","intvolume":"        11","publication":"Genome biology and evolution","scopus_import":"1","related_material":{"record":[{"relation":"popular_science","id":"6060","status":"public"}]},"day":"01","year":"2019","doi":"10.1093/gbe/evz053","page":"1033-1044","oa":1,"file_date_updated":"2020-07-14T12:47:29Z","date_published":"2019-04-01T00:00:00Z","publisher":"Oxford University Press","title":"Sex-biased gene expression and dosage compensation on the Artemia franciscana Z-chromosome","publication_status":"published","abstract":[{"text":"Males and females of Artemia franciscana, a crustacean commonly used in the aquarium trade, are highly dimorphic. Sex is determined by a pair of ZW chromosomes, but the nature and extent of differentiation of these chromosomes is unknown. Here, we characterize the Z chromosome by detecting genomic regions that show lower genomic coverage in female than in male samples, and regions that harbor an excess of female-specific SNPs. We detect many Z-specific genes, which no longer have homologs on the W, but also Z-linked genes that appear to have diverged very recently from their existing W-linked homolog. We assess patterns of male and female expression in two tissues with extensive morphological dimorphism, gonads, and heads. In agreement with their morphology, sex-biased expression is common in both tissues. Interestingly, the Z chromosome is not enriched for sex-biased genes, and seems to in fact have a mechanism of dosage compensation that leads to equal expression in males and in females. Both of these patterns are contrary to most ZW systems studied so far, making A. franciscana an excellent model for investigating the interplay between the evolution of sexual dimorphism and dosage compensation, as well as Z chromosome evolution in general.","lang":"eng"}],"isi":1,"ddc":["570"],"external_id":{"isi":["000476569800003"]},"tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","department":[{"_id":"BeVi"}],"date_updated":"2024-02-21T12:45:41Z","citation":{"short":"A.K. Huylmans, M.A. Toups, A. Macon, W.J. Gammerdinger, B. Vicoso, Genome Biology and Evolution 11 (2019) 1033–1044.","mla":"Huylmans, Ann K., et al. “Sex-Biased Gene Expression and Dosage Compensation on the Artemia Franciscana Z-Chromosome.” <i>Genome Biology and Evolution</i>, vol. 11, no. 4, Oxford University Press, 2019, pp. 1033–44, doi:<a href=\"https://doi.org/10.1093/gbe/evz053\">10.1093/gbe/evz053</a>.","ista":"Huylmans AK, Toups MA, Macon A, Gammerdinger WJ, Vicoso B. 2019. Sex-biased gene expression and dosage compensation on the Artemia franciscana Z-chromosome. Genome biology and evolution. 11(4), 1033–1044.","chicago":"Huylmans, Ann K, Melissa A Toups, Ariana Macon, William J Gammerdinger, and Beatriz Vicoso. “Sex-Biased Gene Expression and Dosage Compensation on the Artemia Franciscana Z-Chromosome.” <i>Genome Biology and Evolution</i>. Oxford University Press, 2019. <a href=\"https://doi.org/10.1093/gbe/evz053\">https://doi.org/10.1093/gbe/evz053</a>.","ama":"Huylmans AK, Toups MA, Macon A, Gammerdinger WJ, Vicoso B. Sex-biased gene expression and dosage compensation on the Artemia franciscana Z-chromosome. <i>Genome biology and evolution</i>. 2019;11(4):1033-1044. doi:<a href=\"https://doi.org/10.1093/gbe/evz053\">10.1093/gbe/evz053</a>","apa":"Huylmans, A. K., Toups, M. A., Macon, A., Gammerdinger, W. J., &#38; Vicoso, B. (2019). Sex-biased gene expression and dosage compensation on the Artemia franciscana Z-chromosome. <i>Genome Biology and Evolution</i>. Oxford University Press. <a href=\"https://doi.org/10.1093/gbe/evz053\">https://doi.org/10.1093/gbe/evz053</a>","ieee":"A. K. Huylmans, M. A. Toups, A. Macon, W. J. Gammerdinger, and B. Vicoso, “Sex-biased gene expression and dosage compensation on the Artemia franciscana Z-chromosome,” <i>Genome biology and evolution</i>, vol. 11, no. 4. Oxford University Press, pp. 1033–1044, 2019."}},{"title":"An experimental assay of the interactions of amino acids from orthologous sequences shaping a complex fitness landscape","date_published":"2019-04-10T00:00:00Z","file_date_updated":"2020-07-14T12:47:30Z","publisher":"Public Library of Science","isi":1,"ddc":["570"],"publication_status":"published","abstract":[{"lang":"eng","text":"Characterizing the fitness landscape, a representation of fitness for a large set of genotypes, is key to understanding how genetic information is interpreted to create functional organisms. Here we determined the evolutionarily-relevant segment of the fitness landscape of His3, a gene coding for an enzyme in the histidine synthesis pathway, focusing on combinations of amino acid states found at orthologous sites of extant species. Just 15% of amino acids found in yeast His3 orthologues were always neutral while the impact on fitness of the remaining 85% depended on the genetic background. Furthermore, at 67% of sites, amino acid replacements were under sign epistasis, having both strongly positive and negative effect in different genetic backgrounds. 46% of sites were under reciprocal sign epistasis. The fitness impact of amino acid replacements was influenced by only a few genetic backgrounds but involved interaction of multiple sites, shaping a rugged fitness landscape in which many of the shortest paths between highly fit genotypes are inaccessible."}],"external_id":{"isi":["000466866000029"]},"tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","citation":{"apa":"Pokusaeva, V., Usmanova, D. R., Putintseva, E. V., Espinar, L., Sarkisyan, K., Mishin, A. S., … Kondrashov, F. (2019). An experimental assay of the interactions of amino acids from orthologous sequences shaping a complex fitness landscape. <i>PLoS Genetics</i>. Public Library of Science. <a href=\"https://doi.org/10.1371/journal.pgen.1008079\">https://doi.org/10.1371/journal.pgen.1008079</a>","ista":"Pokusaeva V, Usmanova DR, Putintseva EV, Espinar L, Sarkisyan K, Mishin AS, Bogatyreva NS, Ivankov D, Akopyan A, Avvakumov S, Povolotskaya IS, Filion GJ, Carey LB, Kondrashov F. 2019. An experimental assay of the interactions of amino acids from orthologous sequences shaping a complex fitness landscape. PLoS Genetics. 15(4), e1008079.","ama":"Pokusaeva V, Usmanova DR, Putintseva EV, et al. An experimental assay of the interactions of amino acids from orthologous sequences shaping a complex fitness landscape. <i>PLoS Genetics</i>. 2019;15(4). doi:<a href=\"https://doi.org/10.1371/journal.pgen.1008079\">10.1371/journal.pgen.1008079</a>","chicago":"Pokusaeva, Victoria, Dinara R. Usmanova, Ekaterina V. Putintseva, Lorena Espinar, Karen Sarkisyan, Alexander S. Mishin, Natalya S. Bogatyreva, et al. “An Experimental Assay of the Interactions of Amino Acids from Orthologous Sequences Shaping a Complex Fitness Landscape.” <i>PLoS Genetics</i>. Public Library of Science, 2019. <a href=\"https://doi.org/10.1371/journal.pgen.1008079\">https://doi.org/10.1371/journal.pgen.1008079</a>.","ieee":"V. Pokusaeva <i>et al.</i>, “An experimental assay of the interactions of amino acids from orthologous sequences shaping a complex fitness landscape,” <i>PLoS Genetics</i>, vol. 15, no. 4. Public Library of Science, 2019.","mla":"Pokusaeva, Victoria, et al. “An Experimental Assay of the Interactions of Amino Acids from Orthologous Sequences Shaping a Complex Fitness Landscape.” <i>PLoS Genetics</i>, vol. 15, no. 4, e1008079, Public Library of Science, 2019, doi:<a href=\"https://doi.org/10.1371/journal.pgen.1008079\">10.1371/journal.pgen.1008079</a>.","short":"V. Pokusaeva, D.R. Usmanova, E.V. Putintseva, L. Espinar, K. Sarkisyan, A.S. Mishin, N.S. Bogatyreva, D. Ivankov, A. Akopyan, S. Avvakumov, I.S. Povolotskaya, G.J. Filion, L.B. Carey, F. Kondrashov, PLoS Genetics 15 (2019)."},"department":[{"_id":"FyKo"}],"date_updated":"2023-08-25T10:30:37Z","publication":"PLoS Genetics","intvolume":"        15","scopus_import":"1","related_material":{"record":[{"status":"public","relation":"research_data","id":"9789"},{"relation":"research_data","id":"9790","status":"public"},{"id":"9797","relation":"research_data","status":"public"}]},"day":"10","year":"2019","doi":"10.1371/journal.pgen.1008079","oa":1,"volume":15,"article_processing_charge":"No","language":[{"iso":"eng"}],"file":[{"access_level":"open_access","file_size":3726017,"file_id":"6445","checksum":"cf3889c8a8a16053dacf9c3776cbe217","creator":"dernst","relation":"main_file","file_name":"2019_PLOSGenetics_Pokusaeva.pdf","date_created":"2019-05-14T08:26:08Z","date_updated":"2020-07-14T12:47:30Z","content_type":"application/pdf"}],"article_number":"e1008079","issue":"4","month":"04","has_accepted_license":"1","author":[{"full_name":"Pokusaeva, Victoria","id":"3184041C-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-7660-444X","first_name":"Victoria","last_name":"Pokusaeva"},{"first_name":"Dinara R.","last_name":"Usmanova","full_name":"Usmanova, Dinara R."},{"last_name":"Putintseva","first_name":"Ekaterina V.","full_name":"Putintseva, Ekaterina V."},{"full_name":"Espinar, Lorena","first_name":"Lorena","last_name":"Espinar"},{"full_name":"Sarkisyan, Karen","id":"39A7BF80-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-5375-6341","last_name":"Sarkisyan","first_name":"Karen"},{"full_name":"Mishin, Alexander S.","last_name":"Mishin","first_name":"Alexander S."},{"full_name":"Bogatyreva, Natalya S.","first_name":"Natalya S.","last_name":"Bogatyreva"},{"last_name":"Ivankov","first_name":"Dmitry","id":"49FF1036-F248-11E8-B48F-1D18A9856A87","full_name":"Ivankov, Dmitry"},{"id":"430D2C90-F248-11E8-B48F-1D18A9856A87","full_name":"Akopyan, Arseniy","first_name":"Arseniy","last_name":"Akopyan","orcid":"0000-0002-2548-617X"},{"first_name":"Sergey","last_name":"Avvakumov","id":"3827DAC8-F248-11E8-B48F-1D18A9856A87","full_name":"Avvakumov, Sergey"},{"full_name":"Povolotskaya, Inna S.","first_name":"Inna S.","last_name":"Povolotskaya"},{"first_name":"Guillaume J.","last_name":"Filion","full_name":"Filion, Guillaume J."},{"last_name":"Carey","first_name":"Lucas B.","full_name":"Carey, Lucas B."},{"id":"44FDEF62-F248-11E8-B48F-1D18A9856A87","full_name":"Kondrashov, Fyodor","first_name":"Fyodor","last_name":"Kondrashov","orcid":"0000-0001-8243-4694"}],"oa_version":"Published Version","quality_controlled":"1","project":[{"call_identifier":"H2020","_id":"2564DBCA-B435-11E9-9278-68D0E5697425","grant_number":"665385","name":"International IST Doctoral Program"}],"ec_funded":1,"publication_identifier":{"eissn":["15537404"]},"status":"public","type":"journal_article","_id":"6419","date_created":"2019-05-13T07:58:38Z"},{"date_created":"2019-05-13T08:13:46Z","type":"conference","_id":"6428","publication_identifier":{"isbn":["9781450362825"]},"status":"public","conference":{"start_date":"2019-04-16","end_date":"2019-04-18","location":"Montreal, Canada","name":"HSCC: Hybrid Systems Computation and Control"},"project":[{"call_identifier":"FWF","grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","name":"Rigorous Systems Engineering"},{"name":"The Wittgenstein Prize","grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425","call_identifier":"FWF"}],"quality_controlled":"1","oa_version":"Submitted Version","author":[{"full_name":"Ferrere, Thomas","id":"40960E6E-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-5199-3143","first_name":"Thomas","last_name":"Ferrere"},{"full_name":"Nickovic, Dejan","id":"41BCEE5C-F248-11E8-B48F-1D18A9856A87","first_name":"Dejan","last_name":"Nickovic"},{"full_name":"Donzé, Alexandre","last_name":"Donzé","first_name":"Alexandre"},{"full_name":"Ito, Hisahiro","first_name":"Hisahiro","last_name":"Ito"},{"full_name":"Kapinski, James","first_name":"James","last_name":"Kapinski"}],"has_accepted_license":"1","month":"04","file":[{"date_updated":"2020-10-08T17:25:45Z","date_created":"2020-10-08T17:25:45Z","content_type":"application/pdf","file_name":"2019_ACM_Ferrere.pdf","success":1,"relation":"main_file","file_size":1055421,"access_level":"open_access","creator":"dernst","checksum":"b8e967081e051d1c55ca5d18fb187890","file_id":"8633"}],"language":[{"iso":"eng"}],"article_processing_charge":"No","oa":1,"year":"2019","doi":"10.1145/3302504.3311800","day":"16","page":"57-66","scopus_import":"1","publication":"Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control","date_updated":"2023-08-25T10:19:23Z","department":[{"_id":"ToHe"}],"citation":{"chicago":"Ferrere, Thomas, Dejan Nickovic, Alexandre Donzé, Hisahiro Ito, and James Kapinski. “Interface-Aware Signal Temporal Logic.” In <i>Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control</i>, 57–66. ACM, 2019. <a href=\"https://doi.org/10.1145/3302504.3311800\">https://doi.org/10.1145/3302504.3311800</a>.","ista":"Ferrere T, Nickovic D, Donzé A, Ito H, Kapinski J. 2019. Interface-aware signal temporal logic. Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control. HSCC: Hybrid Systems Computation and Control, 57–66.","ama":"Ferrere T, Nickovic D, Donzé A, Ito H, Kapinski J. Interface-aware signal temporal logic. In: <i>Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control</i>. ACM; 2019:57-66. doi:<a href=\"https://doi.org/10.1145/3302504.3311800\">10.1145/3302504.3311800</a>","apa":"Ferrere, T., Nickovic, D., Donzé, A., Ito, H., &#38; Kapinski, J. (2019). Interface-aware signal temporal logic. In <i>Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control</i> (pp. 57–66). Montreal, Canada: ACM. <a href=\"https://doi.org/10.1145/3302504.3311800\">https://doi.org/10.1145/3302504.3311800</a>","ieee":"T. Ferrere, D. Nickovic, A. Donzé, H. Ito, and J. Kapinski, “Interface-aware signal temporal logic,” in <i>Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control</i>, Montreal, Canada, 2019, pp. 57–66.","mla":"Ferrere, Thomas, et al. “Interface-Aware Signal Temporal Logic.” <i>Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control</i>, ACM, 2019, pp. 57–66, doi:<a href=\"https://doi.org/10.1145/3302504.3311800\">10.1145/3302504.3311800</a>.","short":"T. Ferrere, D. Nickovic, A. Donzé, H. Ito, J. Kapinski, in:, Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control, ACM, 2019, pp. 57–66."},"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","external_id":{"isi":["000516713900007"]},"abstract":[{"text":"Safety and security are major concerns in the development of Cyber-Physical Systems (CPS). Signal temporal logic (STL) was proposedas a language to specify and monitor the correctness of CPS relativeto formalized requirements. Incorporating STL into a developmentprocess enables designers to automatically monitor and diagnosetraces, compute robustness estimates based on requirements, andperform requirement falsification, leading to productivity gains inverification and validation activities; however, in its current formSTL is agnostic to the input/output classification of signals, andthis negatively impacts the relevance of the analysis results.In this paper we propose to make the interface explicit in theSTL language by introducing input/output signal declarations. Wethen define new measures of input vacuity and output robustnessthat better reflect the nature of the system and the specification in-tent. The resulting framework, which we call interface-aware signaltemporal logic (IA-STL), aids verification and validation activities.We demonstrate the benefits of IA-STL on several CPS analysisactivities: (1) robustness-driven sensitivity analysis, (2) falsificationand (3) fault localization. We describe an implementation of our en-hancement to STL and associated notions of robustness and vacuityin a prototype extension of Breach, a MATLAB®/Simulink®toolboxfor CPS verification and validation. We explore these methodologi-cal improvements and evaluate our results on two examples fromthe automotive domain: a benchmark powertrain control systemand a hydrogen fuel cell system.","lang":"eng"}],"publication_status":"published","ddc":["000"],"isi":1,"date_published":"2019-04-16T00:00:00Z","file_date_updated":"2020-10-08T17:25:45Z","publisher":"ACM","title":"Interface-aware signal temporal logic"},{"alternative_title":["LNCS"],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","department":[{"_id":"KrPi"}],"date_updated":"2023-09-08T11:33:20Z","citation":{"mla":"Fuchsbauer, Georg, et al. <i>Adaptively Secure Proxy Re-Encryption</i>. Vol. 11443, Springer Nature, 2019, pp. 317–46, doi:<a href=\"https://doi.org/10.1007/978-3-030-17259-6_11\">10.1007/978-3-030-17259-6_11</a>.","short":"G. Fuchsbauer, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, Springer Nature, 2019, pp. 317–346.","ieee":"G. Fuchsbauer, C. Kamath Hosdurg, K. Klein, and K. Z. Pietrzak, “Adaptively secure proxy re-encryption,” presented at the PKC: Public-Key Cryptograhy, Beijing, China, 2019, vol. 11443, pp. 317–346.","apa":"Fuchsbauer, G., Kamath Hosdurg, C., Klein, K., &#38; Pietrzak, K. Z. (2019). Adaptively secure proxy re-encryption (Vol. 11443, pp. 317–346). Presented at the PKC: Public-Key Cryptograhy, Beijing, China: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-17259-6_11\">https://doi.org/10.1007/978-3-030-17259-6_11</a>","chicago":"Fuchsbauer, Georg, Chethan Kamath Hosdurg, Karen Klein, and Krzysztof Z Pietrzak. “Adaptively Secure Proxy Re-Encryption,” 11443:317–46. Springer Nature, 2019. <a href=\"https://doi.org/10.1007/978-3-030-17259-6_11\">https://doi.org/10.1007/978-3-030-17259-6_11</a>.","ista":"Fuchsbauer G, Kamath Hosdurg C, Klein K, Pietrzak KZ. 2019. Adaptively secure proxy re-encryption. PKC: Public-Key Cryptograhy, LNCS, vol. 11443, 317–346.","ama":"Fuchsbauer G, Kamath Hosdurg C, Klein K, Pietrzak KZ. Adaptively secure proxy re-encryption. In: Vol 11443. Springer Nature; 2019:317-346. doi:<a href=\"https://doi.org/10.1007/978-3-030-17259-6_11\">10.1007/978-3-030-17259-6_11</a>"},"date_published":"2019-04-06T00:00:00Z","publisher":"Springer Nature","title":"Adaptively secure proxy re-encryption","publication_status":"published","abstract":[{"lang":"eng","text":"A proxy re-encryption (PRE) scheme is a public-key encryption scheme that allows the holder of a key pk to derive a re-encryption key for any other key 𝑝𝑘′. This re-encryption key lets anyone transform ciphertexts under pk into ciphertexts under 𝑝𝑘′ without having to know the underlying message, while transformations from 𝑝𝑘′ to pk should not be possible (unidirectional). Security is defined in a multi-user setting against an adversary that gets the users’ public keys and can ask for re-encryption keys and can corrupt users by requesting their secret keys. Any ciphertext that the adversary cannot trivially decrypt given the obtained secret and re-encryption keys should be secure.\r\n\r\nAll existing security proofs for PRE only show selective security, where the adversary must first declare the users it wants to corrupt. This can be lifted to more meaningful adaptive security by guessing the set of corrupted users among the n users, which loses a factor exponential in  Open image in new window , rendering the result meaningless already for moderate Open image in new window .\r\n\r\nJafargholi et al. (CRYPTO’17) proposed a framework that in some cases allows to give adaptive security proofs for schemes which were previously only known to be selectively secure, while avoiding the exponential loss that results from guessing the adaptive choices made by an adversary. We apply their framework to PREs that satisfy some natural additional properties. Concretely, we give a more fine-grained reduction for several unidirectional PREs, proving adaptive security at a much smaller loss. The loss depends on the graph of users whose edges represent the re-encryption keys queried by the adversary. For trees and chains the loss is quasi-polynomial in the size and for general graphs it is exponential in their depth and indegree (instead of their size as for previous reductions). Fortunately, trees and low-depth graphs cover many, if not most, interesting applications.\r\n\r\nOur results apply e.g. to the bilinear-map based PRE schemes by Ateniese et al. (NDSS’05 and CT-RSA’09), Gentry’s FHE-based scheme (STOC’09) and the LWE-based scheme by Chandran et al. (PKC’14)."}],"year":"2019","page":"317-346","doi":"10.1007/978-3-030-17259-6_11","day":"06","oa":1,"intvolume":"     11443","scopus_import":"1","related_material":{"record":[{"id":"10035","relation":"dissertation_contains","status":"public"}]},"author":[{"id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","full_name":"Fuchsbauer, Georg","first_name":"Georg","last_name":"Fuchsbauer"},{"last_name":"Kamath Hosdurg","first_name":"Chethan","full_name":"Kamath Hosdurg, Chethan","id":"4BD3F30E-F248-11E8-B48F-1D18A9856A87"},{"id":"3E83A2F8-F248-11E8-B48F-1D18A9856A87","full_name":"Klein, Karen","last_name":"Klein","first_name":"Karen"},{"orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z","last_name":"Pietrzak","full_name":"Pietrzak, Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87"}],"project":[{"grant_number":"682815","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","name":"Teaching Old Crypto New Tricks","call_identifier":"H2020"}],"quality_controlled":"1","oa_version":"Preprint","language":[{"iso":"eng"}],"volume":11443,"article_processing_charge":"No","month":"04","status":"public","publication_identifier":{"isbn":["9783030172589"],"eissn":["16113349"],"issn":["03029743"]},"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2018/426"}],"date_created":"2019-05-13T08:13:46Z","type":"conference","_id":"6430","conference":{"end_date":"2019-04-17","start_date":"2019-04-14","name":"PKC: Public-Key Cryptograhy","location":"Beijing, China"},"ec_funded":1},{"day":"07","doi":"10.15479/AT:ISTA:6435","page":"183","year":"2019","oa":1,"keyword":["Social Immunity","Sanitary care","Social Insects","Organisational Immunity","Colony development","Multi-target tracking"],"related_material":{"record":[{"relation":"part_of_dissertation","id":"1999","status":"public"}]},"supervisor":[{"id":"2F64EC8C-F248-11E8-B48F-1D18A9856A87","full_name":"Cremer, Sylvia M","first_name":"Sylvia M","last_name":"Cremer","orcid":"0000-0002-2193-3868"}],"alternative_title":["ISTA Thesis"],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","degree_awarded":"PhD","citation":{"mla":"Casillas Perez, Barbara E. <i>Collective Defenses of Garden Ants against a Fungal Pathogen</i>. Institute of Science and Technology Austria, 2019, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:6435\">10.15479/AT:ISTA:6435</a>.","short":"B.E. Casillas Perez, Collective Defenses of Garden Ants against a Fungal Pathogen, Institute of Science and Technology Austria, 2019.","chicago":"Casillas Perez, Barbara E. “Collective Defenses of Garden Ants against a Fungal Pathogen.” Institute of Science and Technology Austria, 2019. <a href=\"https://doi.org/10.15479/AT:ISTA:6435\">https://doi.org/10.15479/AT:ISTA:6435</a>.","ista":"Casillas Perez BE. 2019. Collective defenses of garden ants against a fungal pathogen. Institute of Science and Technology Austria.","ama":"Casillas Perez BE. Collective defenses of garden ants against a fungal pathogen. 2019. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:6435\">10.15479/AT:ISTA:6435</a>","apa":"Casillas Perez, B. E. (2019). <i>Collective defenses of garden ants against a fungal pathogen</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:6435\">https://doi.org/10.15479/AT:ISTA:6435</a>","ieee":"B. E. Casillas Perez, “Collective defenses of garden ants against a fungal pathogen,” Institute of Science and Technology Austria, 2019."},"department":[{"_id":"SyCr"}],"date_updated":"2023-09-07T12:57:04Z","title":"Collective defenses of garden ants against a fungal pathogen","file_date_updated":"2021-02-11T11:17:15Z","date_published":"2019-05-07T00:00:00Z","publisher":"Institute of Science and Technology Austria","ddc":["570","006","578","592"],"publication_status":"published","abstract":[{"text":"Social insect colonies tend to have numerous members which function together like a single organism in such harmony that the term ``super-organism'' is often used. In this analogy the reproductive caste is analogous to the primordial germ\r\ncells of a metazoan, while the sterile worker caste corresponds to somatic cells. The worker castes, like tissues, are\r\nin charge of all functions of a living being, besides reproduction. The establishment of new super-organismal units\r\n(i.e. new colonies) is accomplished by the co-dependent castes. The term oftentimes goes beyond a metaphor. We invoke it when we speak about the metabolic rate, thermoregulation, nutrient regulation and gas exchange of a social insect colony. Furthermore, we assert that the super-organism has an immune system, and benefits from ``social immunity''.\r\n\r\nSocial immunity was first summoned by evolutionary biologists to resolve the apparent discrepancy between the expected high frequency of disease outbreak amongst numerous, closely related tightly-interacting hosts, living in stable and microbially-rich environments, against the exceptionally scarce epidemic accounts in natural populations. Social\r\nimmunity comprises a multi-layer assembly of behaviours which have evolved to effectively keep the pathogenic enemies of a colony at bay. The field of social immunity has drawn interest, as it becomes increasingly urgent to stop\r\nthe collapse of pollinator species and curb the growth of invasive pests. In the past decade, several mechanisms of\r\nsocial immune responses have been dissected, but many more questions remain open.\r\n\r\nI present my work in two experimental chapters. In the first, I use invasive garden ants (*Lasius neglectus*) to study how pathogen load and its distribution among nestmates affect the grooming response of the group. Any given group of ants will carry out the same total grooming work, but will direct their grooming effort towards individuals\r\ncarrying a relatively higher spore load. Contrary to expectation, the highest risk of transmission does not stem from grooming highly contaminated ants, but instead, we suggest that the grooming response likely minimizes spore loss to the environment, reducing contamination from inadvertent pickup from the substrate.\r\n\r\nThe second is a comparative developmental approach. I follow black garden ant queens (*Lasius niger*) and their colonies from mating flight, through hibernation for a year. Colonies which grow fast from the start, have a lower chance of survival through hibernation, and those which survive grow at a lower pace later. This is true for colonies of naive\r\nand challenged queens. Early pathogen exposure of the queens changes colony dynamics in an unexpected way: colonies from exposed queens are more likely to grow slowly and recover in numbers only after they survive hibernation.\r\n\r\nIn addition to the two experimental chapters, this thesis includes a co-authored published review on organisational\r\nimmunity, where we enlist the experimental evidence and theoretical framework on which this hypothesis is built,\r\nidentify the caveats and underline how the field is ripe to overcome them. In a final chapter, I describe my part in\r\ntwo collaborative efforts, one to develop an image-based tracker, and the second to develop a classifier for ant\r\nbehaviour.","lang":"eng"}],"status":"public","publication_identifier":{"issn":["2663-337X"]},"_id":"6435","type":"dissertation","date_created":"2019-05-13T08:58:35Z","ec_funded":1,"author":[{"full_name":"Casillas Perez, Barbara E","id":"351ED2AA-F248-11E8-B48F-1D18A9856A87","last_name":"Casillas Perez","first_name":"Barbara E"}],"oa_version":"Published Version","project":[{"call_identifier":"H2020","name":"Epidemics in ant societies on a chip","grant_number":"771402","_id":"2649B4DE-B435-11E9-9278-68D0E5697425"}],"article_processing_charge":"No","acknowledged_ssus":[{"_id":"Bio"},{"_id":"ScienComp"},{"_id":"M-Shop"},{"_id":"LifeSc"}],"language":[{"iso":"eng"}],"file":[{"file_id":"6438","checksum":"6daf2d2086111aa8fd3fbc919a3e2833","creator":"casillas","access_level":"open_access","file_size":3895187,"relation":"main_file","embargo":"2020-05-08","file_name":"tesisDoctoradoBC.pdf","content_type":"application/pdf","date_created":"2019-05-13T09:16:20Z","date_updated":"2021-02-11T11:17:15Z"},{"file_size":7365118,"access_level":"closed","creator":"casillas","checksum":"3d221aaff7559a7060230a1ff610594f","file_id":"6439","relation":"source_file","embargo_to":"open_access","file_name":"tesisDoctoradoBC.zip","date_updated":"2020-07-14T12:47:30Z","date_created":"2019-05-13T09:16:20Z","content_type":"application/zip"}],"has_accepted_license":"1","month":"05"},{"ddc":["000","005"],"isi":1,"publication_status":"published","abstract":[{"lang":"eng","text":"This paper investigates the use of fundamental solutions for animating detailed linear water surface waves. We first propose an analytical solution for efficiently animating circular ripples in closed form. We then show how to adapt the method of fundamental solutions (MFS) to create ambient waves interacting with complex obstacles. Subsequently, we present a novel wavelet-based discretization which outperforms the state of the art MFS approach for simulating time-varying water surface waves with moving obstacles. Our results feature high-resolution spatial details, interactions with complex boundaries, and large open ocean domains. Our method compares favorably with previous work as well as known analytical solutions. We also present comparisons between our method and real world examples."}],"title":"Fundamental solutions for water wave animation","publisher":"ACM","file_date_updated":"2020-07-14T12:47:30Z","date_published":"2019-07-01T00:00:00Z","citation":{"short":"C. Schreck, C. Hafner, C. Wojtan, ACM Transactions on Graphics 38 (2019).","mla":"Schreck, Camille, et al. “Fundamental Solutions for Water Wave Animation.” <i>ACM Transactions on Graphics</i>, vol. 38, no. 4, 130, ACM, 2019, doi:<a href=\"https://doi.org/10.1145/3306346.3323002\">10.1145/3306346.3323002</a>.","ieee":"C. Schreck, C. Hafner, and C. Wojtan, “Fundamental solutions for water wave animation,” <i>ACM Transactions on Graphics</i>, vol. 38, no. 4. ACM, 2019.","chicago":"Schreck, Camille, Christian Hafner, and Chris Wojtan. “Fundamental Solutions for Water Wave Animation.” <i>ACM Transactions on Graphics</i>. ACM, 2019. <a href=\"https://doi.org/10.1145/3306346.3323002\">https://doi.org/10.1145/3306346.3323002</a>.","ista":"Schreck C, Hafner C, Wojtan C. 2019. Fundamental solutions for water wave animation. ACM Transactions on Graphics. 38(4), 130.","ama":"Schreck C, Hafner C, Wojtan C. Fundamental solutions for water wave animation. <i>ACM Transactions on Graphics</i>. 2019;38(4). doi:<a href=\"https://doi.org/10.1145/3306346.3323002\">10.1145/3306346.3323002</a>","apa":"Schreck, C., Hafner, C., &#38; Wojtan, C. (2019). Fundamental solutions for water wave animation. <i>ACM Transactions on Graphics</i>. ACM. <a href=\"https://doi.org/10.1145/3306346.3323002\">https://doi.org/10.1145/3306346.3323002</a>"},"department":[{"_id":"ChWo"}],"date_updated":"2023-08-25T10:18:46Z","external_id":{"isi":["000475740600104"]},"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","scopus_import":"1","related_material":{"link":[{"url":"https://ist.ac.at/en/news/new-method-makes-realistic-water-wave-animations-more-efficient/","description":"News on IST Homepage","relation":"press_release"}]},"publication":"ACM Transactions on Graphics","intvolume":"        38","oa":1,"doi":"10.1145/3306346.3323002","year":"2019","day":"01","article_number":"130","file":[{"date_created":"2019-05-14T07:03:55Z","date_updated":"2020-07-14T12:47:30Z","content_type":"application/pdf","file_name":"2019_ACM_Schreck.pdf","relation":"main_file","access_level":"open_access","file_size":44328918,"checksum":"1b737dfe3e051aba8f3f4ab1dceda673","file_id":"6443","creator":"dernst"}],"issue":"4","has_accepted_license":"1","month":"07","volume":38,"article_processing_charge":"No","acknowledged_ssus":[{"_id":"ScienComp"}],"language":[{"iso":"eng"}],"oa_version":"Submitted Version","quality_controlled":"1","project":[{"name":"Efficient Simulation of Natural Phenomena at Extremely Large Scales","_id":"2533E772-B435-11E9-9278-68D0E5697425","grant_number":"638176","call_identifier":"H2020"},{"name":"MATERIALIZABLE: Intelligent fabrication-oriented Computational Design and Modeling","_id":"24F9549A-B435-11E9-9278-68D0E5697425","grant_number":"715767","call_identifier":"H2020"},{"name":"International IST Doctoral Program","_id":"2564DBCA-B435-11E9-9278-68D0E5697425","grant_number":"665385","call_identifier":"H2020"}],"author":[{"last_name":"Schreck","first_name":"Camille","full_name":"Schreck, Camille","id":"2B14B676-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Hafner","first_name":"Christian","full_name":"Hafner, Christian","id":"400429CC-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Wojtan","first_name":"Christopher J","orcid":"0000-0001-6646-5546","id":"3C61F1D2-F248-11E8-B48F-1D18A9856A87","full_name":"Wojtan, Christopher J"}],"ec_funded":1,"_id":"6442","type":"journal_article","date_created":"2019-05-14T07:04:06Z","status":"public"},{"author":[{"full_name":"Amberg, Nicole","id":"4CD6AAC6-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-3183-8207","first_name":"Nicole","last_name":"Amberg"},{"first_name":"Panagiota A.","last_name":"Sotiropoulou","full_name":"Sotiropoulou, Panagiota A."},{"full_name":"Heller, Gerwin","last_name":"Heller","first_name":"Gerwin"},{"full_name":"Lichtenberger, Beate M.","last_name":"Lichtenberger","first_name":"Beate M."},{"last_name":"Holcmann","first_name":"Martin","full_name":"Holcmann, Martin"},{"full_name":"Camurdanoglu, Bahar","first_name":"Bahar","last_name":"Camurdanoglu"},{"full_name":"Baykuscheva-Gentscheva, Temenuschka","first_name":"Temenuschka","last_name":"Baykuscheva-Gentscheva"},{"full_name":"Blanpain, Cedric","first_name":"Cedric","last_name":"Blanpain"},{"first_name":"Maria","last_name":"Sibilia","full_name":"Sibilia, Maria"}],"quality_controlled":"1","oa_version":"Published Version","language":[{"iso":"eng"}],"article_processing_charge":"No","volume":15,"month":"05","has_accepted_license":"1","file":[{"date_updated":"2020-07-14T12:47:30Z","date_created":"2019-05-14T11:51:51Z","content_type":"application/pdf","file_name":"2019_iScience_Amberg.pdf","relation":"main_file","file_size":8365970,"access_level":"open_access","creator":"dernst","checksum":"a9ad2296726c9474ad5860c9c2f53622","file_id":"6452"}],"publication_identifier":{"issn":["2589-0042"]},"status":"public","date_created":"2019-05-14T11:47:40Z","_id":"6451","type":"journal_article","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","image":"/images/cc_by_nc_nd.png","name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","short":"CC BY-NC-ND (4.0)"},"external_id":{"isi":["000470104600022"]},"date_updated":"2023-09-08T11:38:04Z","department":[{"_id":"SiHi"}],"citation":{"short":"N. Amberg, P.A. Sotiropoulou, G. Heller, B.M. Lichtenberger, M. Holcmann, B. Camurdanoglu, T. Baykuscheva-Gentscheva, C. Blanpain, M. Sibilia, IScience 15 (2019) 243–256.","mla":"Amberg, Nicole, et al. “EGFR Controls Hair Shaft Differentiation in a P53-Independent Manner.” <i>IScience</i>, vol. 15, Elsevier, 2019, pp. 243–56, doi:<a href=\"https://doi.org/10.1016/j.isci.2019.04.018\">10.1016/j.isci.2019.04.018</a>.","ieee":"N. Amberg <i>et al.</i>, “EGFR controls hair shaft differentiation in a p53-independent manner,” <i>iScience</i>, vol. 15. Elsevier, pp. 243–256, 2019.","ista":"Amberg N, Sotiropoulou PA, Heller G, Lichtenberger BM, Holcmann M, Camurdanoglu B, Baykuscheva-Gentscheva T, Blanpain C, Sibilia M. 2019. EGFR controls hair shaft differentiation in a p53-independent manner. iScience. 15, 243–256.","chicago":"Amberg, Nicole, Panagiota A. Sotiropoulou, Gerwin Heller, Beate M. Lichtenberger, Martin Holcmann, Bahar Camurdanoglu, Temenuschka Baykuscheva-Gentscheva, Cedric Blanpain, and Maria Sibilia. “EGFR Controls Hair Shaft Differentiation in a P53-Independent Manner.” <i>IScience</i>. Elsevier, 2019. <a href=\"https://doi.org/10.1016/j.isci.2019.04.018\">https://doi.org/10.1016/j.isci.2019.04.018</a>.","ama":"Amberg N, Sotiropoulou PA, Heller G, et al. EGFR controls hair shaft differentiation in a p53-independent manner. <i>iScience</i>. 2019;15:243-256. doi:<a href=\"https://doi.org/10.1016/j.isci.2019.04.018\">10.1016/j.isci.2019.04.018</a>","apa":"Amberg, N., Sotiropoulou, P. A., Heller, G., Lichtenberger, B. M., Holcmann, M., Camurdanoglu, B., … Sibilia, M. (2019). EGFR controls hair shaft differentiation in a p53-independent manner. <i>IScience</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.isci.2019.04.018\">https://doi.org/10.1016/j.isci.2019.04.018</a>"},"publisher":"Elsevier","date_published":"2019-05-31T00:00:00Z","file_date_updated":"2020-07-14T12:47:30Z","title":"EGFR controls hair shaft differentiation in a p53-independent manner","abstract":[{"text":"Epidermal growth factor receptor (EGFR) signaling controls skin development and homeostasis inmice and humans, and its deficiency causes severe skin inflammation, which might affect epidermalstem cell behavior. Here, we describe the inflammation-independent effects of EGFR deficiency dur-ing skin morphogenesis and in adult hair follicle stem cells. Expression and alternative splicing analysisof RNA sequencing data from interfollicular epidermis and outer root sheath indicate that EGFR con-trols genes involved in epidermal differentiation and also in centrosome function, DNA damage, cellcycle, and apoptosis. Genetic experiments employingp53deletion in EGFR-deficient epidermis revealthat EGFR signaling exhibitsp53-dependent functions in proliferative epidermal compartments, aswell asp53-independent functions in differentiated hair shaft keratinocytes. Loss of EGFR leads toabsence of LEF1 protein specifically in the innermost epithelial hair layers, resulting in disorganizationof medulla cells. Thus, our results uncover important spatial and temporal features of cell-autonomousEGFR functions in the epidermis.","lang":"eng"}],"publication_status":"published","isi":1,"ddc":["570"],"day":"31","year":"2019","doi":"10.1016/j.isci.2019.04.018","page":"243-256","oa":1,"intvolume":"        15","publication":"iScience"},{"scopus_import":"1","intvolume":"       102","publication":"Neuron","oa":1,"year":"2019","page":"159-172.e7","doi":"10.1016/j.neuron.2019.01.051","day":"03","abstract":[{"lang":"eng","text":"Adult neural stem cells and multiciliated ependymalcells are glial cells essential for neurological func-tions. Together, they make up the adult neurogenicniche. Using both high-throughput clonal analysisand single-cell resolution of progenitor division pat-terns and fate, we show that these two componentsof the neurogenic niche are lineally related: adult neu-ral stem cells are sister cells to ependymal cells,whereas most ependymal cells arise from the termi-nal symmetric divisions of the lineage. Unexpectedly,we found that the antagonist regulators of DNA repli-cation, GemC1 and Geminin, can tune the proportionof neural stem cells and ependymal cells. Our find-ings reveal the controlled dynamic of the neurogenicniche ontogeny and identify the Geminin familymembers as key regulators of the initial pool of adultneural stem cells."}],"publication_status":"published","isi":1,"ddc":["570"],"publisher":"Elsevier","date_published":"2019-04-03T00:00:00Z","file_date_updated":"2020-07-14T12:47:30Z","pmid":1,"title":"Adult neural stem cells and multiciliated ependymal cells share a common lineage regulated by the Geminin family members","date_updated":"2023-09-05T13:02:21Z","department":[{"_id":"SiHi"}],"citation":{"ista":"Ortiz-Álvarez G, Daclin M, Shihavuddin A, Lansade P, Fortoul A, Faucourt M, Clavreul S, Lalioti M, Taraviras S, Hippenmeyer S, Livet J, Meunier A, Genovesio A, Spassky N. 2019. Adult neural stem cells and multiciliated ependymal cells share a common lineage regulated by the Geminin family members. Neuron. 102(1), 159–172.e7.","ama":"Ortiz-Álvarez G, Daclin M, Shihavuddin A, et al. Adult neural stem cells and multiciliated ependymal cells share a common lineage regulated by the Geminin family members. <i>Neuron</i>. 2019;102(1):159-172.e7. doi:<a href=\"https://doi.org/10.1016/j.neuron.2019.01.051\">10.1016/j.neuron.2019.01.051</a>","chicago":"Ortiz-Álvarez, G, M Daclin, A Shihavuddin, P Lansade, A Fortoul, M Faucourt, S Clavreul, et al. “Adult Neural Stem Cells and Multiciliated Ependymal Cells Share a Common Lineage Regulated by the Geminin Family Members.” <i>Neuron</i>. Elsevier, 2019. <a href=\"https://doi.org/10.1016/j.neuron.2019.01.051\">https://doi.org/10.1016/j.neuron.2019.01.051</a>.","apa":"Ortiz-Álvarez, G., Daclin, M., Shihavuddin, A., Lansade, P., Fortoul, A., Faucourt, M., … Spassky, N. (2019). Adult neural stem cells and multiciliated ependymal cells share a common lineage regulated by the Geminin family members. <i>Neuron</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.neuron.2019.01.051\">https://doi.org/10.1016/j.neuron.2019.01.051</a>","ieee":"G. Ortiz-Álvarez <i>et al.</i>, “Adult neural stem cells and multiciliated ependymal cells share a common lineage regulated by the Geminin family members,” <i>Neuron</i>, vol. 102, no. 1. Elsevier, p. 159–172.e7, 2019.","mla":"Ortiz-Álvarez, G., et al. “Adult Neural Stem Cells and Multiciliated Ependymal Cells Share a Common Lineage Regulated by the Geminin Family Members.” <i>Neuron</i>, vol. 102, no. 1, Elsevier, 2019, p. 159–172.e7, doi:<a href=\"https://doi.org/10.1016/j.neuron.2019.01.051\">10.1016/j.neuron.2019.01.051</a>.","short":"G. Ortiz-Álvarez, M. Daclin, A. Shihavuddin, P. Lansade, A. Fortoul, M. Faucourt, S. Clavreul, M. Lalioti, S. Taraviras, S. Hippenmeyer, J. Livet, A. Meunier, A. Genovesio, N. Spassky, Neuron 102 (2019) 159–172.e7."},"tmp":{"legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","image":"/images/cc_by_nc_nd.png","name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","short":"CC BY-NC-ND (4.0)"},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","external_id":{"pmid":["30824354"],"isi":["000463337900018"]},"ec_funded":1,"date_created":"2019-05-14T13:06:30Z","type":"journal_article","_id":"6454","publication_identifier":{"eissn":["1097-4199"],"issn":["0896-6273"]},"status":"public","has_accepted_license":"1","month":"04","issue":"1","file":[{"content_type":"application/pdf","date_updated":"2020-07-14T12:47:30Z","date_created":"2019-05-15T09:28:41Z","file_name":"2019_Neuron_Ortiz.pdf","relation":"main_file","creator":"dernst","checksum":"1fb6e195c583eb0c5cabf26f69ff6675","file_id":"6457","file_size":7288572,"access_level":"open_access"}],"language":[{"iso":"eng"}],"article_processing_charge":"No","volume":102,"quality_controlled":"1","project":[{"call_identifier":"H2020","grant_number":"725780","_id":"260018B0-B435-11E9-9278-68D0E5697425","name":"Principles of Neural Stem Cell Lineage Progression in Cerebral Cortex Development"}],"oa_version":"Published Version","author":[{"full_name":"Ortiz-Álvarez, G","first_name":"G","last_name":"Ortiz-Álvarez"},{"full_name":"Daclin, M","last_name":"Daclin","first_name":"M"},{"full_name":"Shihavuddin, A","last_name":"Shihavuddin","first_name":"A"},{"full_name":"Lansade, P","last_name":"Lansade","first_name":"P"},{"full_name":"Fortoul, A","first_name":"A","last_name":"Fortoul"},{"last_name":"Faucourt","first_name":"M","full_name":"Faucourt, M"},{"first_name":"S","last_name":"Clavreul","full_name":"Clavreul, S"},{"full_name":"Lalioti, ME","last_name":"Lalioti","first_name":"ME"},{"full_name":"Taraviras, S","last_name":"Taraviras","first_name":"S"},{"first_name":"Simon","last_name":"Hippenmeyer","orcid":"0000-0003-2279-1061","id":"37B36620-F248-11E8-B48F-1D18A9856A87","full_name":"Hippenmeyer, Simon"},{"last_name":"Livet","first_name":"J","full_name":"Livet, J"},{"last_name":"Meunier","first_name":"A","full_name":"Meunier, A"},{"last_name":"Genovesio","first_name":"A","full_name":"Genovesio, A"},{"last_name":"Spassky","first_name":"N","full_name":"Spassky, N"}]},{"ec_funded":1,"article_type":"original","type":"journal_article","_id":"6455","date_created":"2019-05-14T13:07:47Z","publication_identifier":{"eissn":["1095-9203"],"issn":["0036-8075"]},"status":"public","main_file_link":[{"open_access":"1","url":"https://orbi.uliege.be/bitstream/2268/239604/1/Telley_Agirman_Science2019.pdf"}],"article_number":"eaav2522","issue":"6440","month":"05","volume":364,"article_processing_charge":"No","language":[{"iso":"eng"}],"oa_version":"Published Version","project":[{"call_identifier":"H2020","name":"Principles of Neural Stem Cell Lineage Progression in Cerebral Cortex Development","grant_number":"725780","_id":"260018B0-B435-11E9-9278-68D0E5697425"},{"grant_number":"T0101031","_id":"268F8446-B435-11E9-9278-68D0E5697425","name":"Role of Eed in neural stem cell lineage progression","call_identifier":"FWF"}],"quality_controlled":"1","author":[{"first_name":"L","last_name":"Telley","full_name":"Telley, L"},{"full_name":"Agirman, G","first_name":"G","last_name":"Agirman"},{"full_name":"Prados, J","last_name":"Prados","first_name":"J"},{"id":"4CD6AAC6-F248-11E8-B48F-1D18A9856A87","full_name":"Amberg, Nicole","last_name":"Amberg","first_name":"Nicole","orcid":"0000-0002-3183-8207"},{"full_name":"Fièvre, S","first_name":"S","last_name":"Fièvre"},{"full_name":"Oberst, P","last_name":"Oberst","first_name":"P"},{"first_name":"G","last_name":"Bartolini","full_name":"Bartolini, G"},{"first_name":"I","last_name":"Vitali","full_name":"Vitali, I"},{"full_name":"Cadilhac, C","last_name":"Cadilhac","first_name":"C"},{"orcid":"0000-0003-2279-1061","first_name":"Simon","last_name":"Hippenmeyer","full_name":"Hippenmeyer, Simon","id":"37B36620-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Nguyen, L","last_name":"Nguyen","first_name":"L"},{"first_name":"A","last_name":"Dayer","full_name":"Dayer, A"},{"full_name":"Jabaudon, D","last_name":"Jabaudon","first_name":"D"}],"scopus_import":"1","related_material":{"link":[{"relation":"press_release","url":"https://ist.ac.at/en/news/how-to-generate-a-brain-of-correct-size-and-composition/","description":"News on IST Homepage"}]},"publication":"Science","intvolume":"       364","oa":1,"year":"2019","day":"10","doi":"10.1126/science.aav2522","isi":1,"publication_status":"published","abstract":[{"text":"During corticogenesis, distinct subtypes of neurons are sequentially born from ventricular zone progenitors. How these cells are molecularly temporally patterned is poorly understood. We used single-cell RNA sequencing at high temporal resolution to trace the lineage of the molecular identities of successive generations of apical progenitors (APs) and their daughter neurons in mouse embryos. We identified a core set of evolutionarily conserved, temporally patterned genes that drive APs from internally driven to more exteroceptive states. We found that the Polycomb repressor complex 2 (PRC2) epigenetically regulates AP temporal progression. Embryonic age–dependent AP molecular states are transmitted to their progeny as successive ground states, onto which essentially conserved early postmitotic differentiation programs are applied, and are complemented by later-occurring environment-dependent signals. Thus, epigenetically regulated temporal molecular birthmarks present in progenitors act in their postmitotic progeny to seed adult neuronal diversity.","lang":"eng"}],"title":"Temporal patterning of apical progenitors and their daughter neurons in the developing neocortex","pmid":1,"date_published":"2019-05-10T00:00:00Z","publisher":"AAAS","citation":{"short":"L. Telley, G. Agirman, J. Prados, N. Amberg, S. Fièvre, P. Oberst, G. Bartolini, I. Vitali, C. Cadilhac, S. Hippenmeyer, L. Nguyen, A. Dayer, D. Jabaudon, Science 364 (2019).","mla":"Telley, L., et al. “Temporal Patterning of Apical Progenitors and Their Daughter Neurons in the Developing Neocortex.” <i>Science</i>, vol. 364, no. 6440, eaav2522, AAAS, 2019, doi:<a href=\"https://doi.org/10.1126/science.aav2522\">10.1126/science.aav2522</a>.","ieee":"L. Telley <i>et al.</i>, “Temporal patterning of apical progenitors and their daughter neurons in the developing neocortex,” <i>Science</i>, vol. 364, no. 6440. AAAS, 2019.","chicago":"Telley, L, G Agirman, J Prados, Nicole Amberg, S Fièvre, P Oberst, G Bartolini, et al. “Temporal Patterning of Apical Progenitors and Their Daughter Neurons in the Developing Neocortex.” <i>Science</i>. AAAS, 2019. <a href=\"https://doi.org/10.1126/science.aav2522\">https://doi.org/10.1126/science.aav2522</a>.","ama":"Telley L, Agirman G, Prados J, et al. Temporal patterning of apical progenitors and their daughter neurons in the developing neocortex. <i>Science</i>. 2019;364(6440). doi:<a href=\"https://doi.org/10.1126/science.aav2522\">10.1126/science.aav2522</a>","ista":"Telley L, Agirman G, Prados J, Amberg N, Fièvre S, Oberst P, Bartolini G, Vitali I, Cadilhac C, Hippenmeyer S, Nguyen L, Dayer A, Jabaudon D. 2019. Temporal patterning of apical progenitors and their daughter neurons in the developing neocortex. Science. 364(6440), eaav2522.","apa":"Telley, L., Agirman, G., Prados, J., Amberg, N., Fièvre, S., Oberst, P., … Jabaudon, D. (2019). Temporal patterning of apical progenitors and their daughter neurons in the developing neocortex. <i>Science</i>. AAAS. <a href=\"https://doi.org/10.1126/science.aav2522\">https://doi.org/10.1126/science.aav2522</a>"},"department":[{"_id":"SiHi"}],"date_updated":"2023-09-05T11:51:09Z","external_id":{"pmid":["31073041"],"isi":["000467631800034"]},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1"},{"oa":1,"page":"630-649","year":"2019","doi":"10.1007/978-3-030-25540-4_36","day":"12","scopus_import":"1","publication":"31st International Conference on Computer-Aided Verification","intvolume":"     11561","citation":{"short":"G. Avni, R. Bloem, K. Chatterjee, T.A. Henzinger, B. Konighofer, S. Pranger, in:, 31st International Conference on Computer-Aided Verification, Springer, 2019, pp. 630–649.","mla":"Avni, Guy, et al. “Run-Time Optimization for Learned Controllers through Quantitative Games.” <i>31st International Conference on Computer-Aided Verification</i>, vol. 11561, Springer, 2019, pp. 630–49, doi:<a href=\"https://doi.org/10.1007/978-3-030-25540-4_36\">10.1007/978-3-030-25540-4_36</a>.","ieee":"G. Avni, R. Bloem, K. Chatterjee, T. A. Henzinger, B. Konighofer, and S. Pranger, “Run-time optimization for learned controllers through quantitative games,” in <i>31st International Conference on Computer-Aided Verification</i>, New York, NY, United States, 2019, vol. 11561, pp. 630–649.","apa":"Avni, G., Bloem, R., Chatterjee, K., Henzinger, T. A., Konighofer, B., &#38; Pranger, S. (2019). Run-time optimization for learned controllers through quantitative games. In <i>31st International Conference on Computer-Aided Verification</i> (Vol. 11561, pp. 630–649). New York, NY, United States: Springer. <a href=\"https://doi.org/10.1007/978-3-030-25540-4_36\">https://doi.org/10.1007/978-3-030-25540-4_36</a>","ista":"Avni G, Bloem R, Chatterjee K, Henzinger TA, Konighofer B, Pranger S. 2019. Run-time optimization for learned controllers through quantitative games. 31st International Conference on Computer-Aided Verification. CAV: Computer Aided Verification, LNCS, vol. 11561, 630–649.","chicago":"Avni, Guy, Roderick Bloem, Krishnendu Chatterjee, Thomas A Henzinger, Bettina Konighofer, and Stefan Pranger. “Run-Time Optimization for Learned Controllers through Quantitative Games.” In <i>31st International Conference on Computer-Aided Verification</i>, 11561:630–49. Springer, 2019. <a href=\"https://doi.org/10.1007/978-3-030-25540-4_36\">https://doi.org/10.1007/978-3-030-25540-4_36</a>.","ama":"Avni G, Bloem R, Chatterjee K, Henzinger TA, Konighofer B, Pranger S. Run-time optimization for learned controllers through quantitative games. In: <i>31st International Conference on Computer-Aided Verification</i>. Vol 11561. Springer; 2019:630-649. doi:<a href=\"https://doi.org/10.1007/978-3-030-25540-4_36\">10.1007/978-3-030-25540-4_36</a>"},"department":[{"_id":"ToHe"},{"_id":"KrCh"}],"date_updated":"2023-08-25T10:33:27Z","alternative_title":["LNCS"],"external_id":{"isi":["000491468000036"]},"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"ddc":["000"],"isi":1,"publication_status":"published","abstract":[{"text":"A controller is a device that interacts with a plant. At each time point,it reads the plant’s state and issues commands with the goal that the plant oper-ates optimally. Constructing optimal controllers is a fundamental and challengingproblem. Machine learning techniques have recently been successfully applied totrain controllers, yet they have limitations. Learned controllers are monolithic andhard to reason about. In particular, it is difficult to add features without retraining,to guarantee any level of performance, and to achieve acceptable performancewhen encountering untrained scenarios. These limitations can be addressed bydeploying quantitative run-timeshieldsthat serve as a proxy for the controller.At each time point, the shield reads the command issued by the controller andmay choose to alter it before passing it on to the plant. We show how optimalshields that interfere as little as possible while guaranteeing a desired level ofcontroller performance, can be generated systematically and automatically usingreactive  synthesis.  First,  we  abstract  the  plant  by  building  a  stochastic  model.Second, we consider the learned controller to be a black box. Third, we mea-surecontroller performanceandshield interferenceby two quantitative run-timemeasures that are formally defined using weighted automata. Then, the problemof constructing a shield that guarantees maximal performance with minimal inter-ference is the problem of finding an optimal strategy in a stochastic2-player game“controller versus shield” played on the abstract state space of the plant with aquantitative objective obtained from combining the performance and interferencemeasures. We illustrate the effectiveness of our approach by automatically con-structing lightweight shields for learned traffic-light controllers in various roadnetworks. The shields we generate avoid liveness bugs, improve controller per-formance in untrained and changing traffic situations, and add features to learnedcontrollers, such as giving priority to emergency vehicles.","lang":"eng"}],"title":"Run-time optimization for learned controllers through quantitative games","date_published":"2019-07-12T00:00:00Z","publisher":"Springer","file_date_updated":"2020-07-14T12:47:31Z","_id":"6462","type":"conference","date_created":"2019-05-16T11:22:30Z","status":"public","publication_identifier":{"isbn":["9783030255398"],"issn":["0302-9743"]},"conference":{"end_date":"2019-07-18","start_date":"2019-07-13","location":"New York, NY, United States","name":"CAV: Computer Aided Verification"},"oa_version":"Published Version","quality_controlled":"1","project":[{"call_identifier":"FWF","grant_number":"M02369","_id":"264B3912-B435-11E9-9278-68D0E5697425","name":"Formal Methods meets Algorithmic Game Theory"},{"call_identifier":"FWF","name":"The Wittgenstein Prize","grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425"},{"call_identifier":"FWF","grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","name":"Rigorous Systems Engineering"}],"author":[{"orcid":"0000-0001-5588-8287","first_name":"Guy","last_name":"Avni","full_name":"Avni, Guy","id":"463C8BC2-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Bloem, Roderick","first_name":"Roderick","last_name":"Bloem"},{"first_name":"Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu"},{"full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724","first_name":"Thomas A","last_name":"Henzinger"},{"last_name":"Konighofer","first_name":"Bettina","full_name":"Konighofer, Bettina"},{"full_name":"Pranger, Stefan","first_name":"Stefan","last_name":"Pranger"}],"file":[{"checksum":"c231579f2485c6fd4df17c9443a4d80b","file_id":"6816","creator":"dernst","access_level":"open_access","file_size":659766,"relation":"main_file","file_name":"2019_CAV_Avni.pdf","content_type":"application/pdf","date_created":"2019-08-14T09:35:24Z","date_updated":"2020-07-14T12:47:31Z"}],"month":"07","has_accepted_license":"1","volume":11561,"article_processing_charge":"No","language":[{"iso":"eng"}]},{"author":[{"first_name":"Hélène","last_name":"Chassin","full_name":"Chassin, Hélène"},{"full_name":"Müller, Marius","first_name":"Marius","last_name":"Müller"},{"full_name":"Tigges, Marcel","last_name":"Tigges","first_name":"Marcel"},{"full_name":"Scheller, Leo","first_name":"Leo","last_name":"Scheller"},{"full_name":"Lang, Moritz","id":"29E0800A-F248-11E8-B48F-1D18A9856A87","first_name":"Moritz","last_name":"Lang"},{"full_name":"Fussenegger, Martin","last_name":"Fussenegger","first_name":"Martin"}],"oa_version":"Published Version","quality_controlled":"1","article_processing_charge":"No","volume":10,"language":[{"iso":"eng"}],"issue":"1","file":[{"access_level":"open_access","file_size":1191827,"file_id":"6471","checksum":"e214d3e4f8c81e35981583c4569b51b8","creator":"dernst","relation":"main_file","file_name":"2019_NatureComm_Chassin.pdf","date_created":"2019-05-20T07:33:54Z","date_updated":"2020-07-14T12:47:31Z","content_type":"application/pdf"}],"article_number":"2013","has_accepted_license":"1","month":"05","status":"public","publication_identifier":{"eissn":["20411723"]},"_id":"6465","type":"journal_article","date_created":"2019-05-19T21:59:14Z","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"external_id":{"isi":["000466338600006"]},"citation":{"ieee":"H. Chassin, M. Müller, M. Tigges, L. Scheller, M. Lang, and M. Fussenegger, “A modular degron library for synthetic circuits in mammalian cells,” <i>Nature Communications</i>, vol. 10, no. 1. Springer Nature, 2019.","ama":"Chassin H, Müller M, Tigges M, Scheller L, Lang M, Fussenegger M. A modular degron library for synthetic circuits in mammalian cells. <i>Nature Communications</i>. 2019;10(1). doi:<a href=\"https://doi.org/10.1038/s41467-019-09974-5\">10.1038/s41467-019-09974-5</a>","ista":"Chassin H, Müller M, Tigges M, Scheller L, Lang M, Fussenegger M. 2019. A modular degron library for synthetic circuits in mammalian cells. Nature Communications. 10(1), 2013.","chicago":"Chassin, Hélène, Marius Müller, Marcel Tigges, Leo Scheller, Moritz Lang, and Martin Fussenegger. “A Modular Degron Library for Synthetic Circuits in Mammalian Cells.” <i>Nature Communications</i>. Springer Nature, 2019. <a href=\"https://doi.org/10.1038/s41467-019-09974-5\">https://doi.org/10.1038/s41467-019-09974-5</a>.","apa":"Chassin, H., Müller, M., Tigges, M., Scheller, L., Lang, M., &#38; Fussenegger, M. (2019). A modular degron library for synthetic circuits in mammalian cells. <i>Nature Communications</i>. Springer Nature. <a href=\"https://doi.org/10.1038/s41467-019-09974-5\">https://doi.org/10.1038/s41467-019-09974-5</a>","mla":"Chassin, Hélène, et al. “A Modular Degron Library for Synthetic Circuits in Mammalian Cells.” <i>Nature Communications</i>, vol. 10, no. 1, 2013, Springer Nature, 2019, doi:<a href=\"https://doi.org/10.1038/s41467-019-09974-5\">10.1038/s41467-019-09974-5</a>.","short":"H. Chassin, M. Müller, M. Tigges, L. Scheller, M. Lang, M. Fussenegger, Nature Communications 10 (2019)."},"date_updated":"2023-08-25T10:33:51Z","department":[{"_id":"CaGu"}],"title":"A modular degron library for synthetic circuits in mammalian cells","file_date_updated":"2020-07-14T12:47:31Z","publisher":"Springer Nature","date_published":"2019-05-01T00:00:00Z","ddc":["570"],"isi":1,"abstract":[{"text":"Tight control over protein degradation is a fundamental requirement for cells to respond rapidly to various stimuli and adapt to a fluctuating environment. Here we develop a versatile, easy-to-handle library of destabilizing tags (degrons) for the precise regulation of protein expression profiles in mammalian cells by modulating target protein half-lives in a predictable manner. Using the well-established tetracycline gene-regulation system as a model, we show that the dynamics of protein expression can be tuned by fusing appropriate degron tags to gene regulators. Next, we apply this degron library to tune a synthetic pulse-generating circuit in mammalian cells. With this toolbox we establish a set of pulse generators with tailored pulse lengths and magnitudes of protein expression. This methodology will prove useful in the functional roles of essential proteins, fine-tuning of gene-expression systems, and enabling a higher complexity in the design of synthetic biological systems in mammalian cells.","lang":"eng"}],"publication_status":"published","day":"01","doi":"10.1038/s41467-019-09974-5","year":"2019","oa":1,"publication":"Nature Communications","intvolume":"        10","related_material":{"link":[{"relation":"erratum","url":"https://doi.org/10.1038/s41467-023-36111-0"}]},"scopus_import":"1"},{"type":"journal_article","_id":"6466","date_created":"2019-05-19T21:59:15Z","publication_identifier":{"eissn":["1365294X"]},"status":"public","oa_version":"Published Version","quality_controlled":"1","author":[{"full_name":"Field, David","id":"419049E2-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4014-8478","first_name":"David","last_name":"Field"},{"id":"32DF5794-F248-11E8-B48F-1D18A9856A87","full_name":"Fraisse, Christelle","last_name":"Fraisse","first_name":"Christelle","orcid":"0000-0001-8441-5075"}],"issue":"7","file":[{"file_id":"6472","checksum":"521e3aff3e9263ddf2ffbfe0b6157715","creator":"dernst","access_level":"open_access","file_size":367711,"relation":"main_file","file_name":"2019_MolecularEcology_Field.pdf","content_type":"application/pdf","date_created":"2019-05-20T11:49:06Z","date_updated":"2020-07-14T12:47:31Z"}],"month":"04","has_accepted_license":"1","article_processing_charge":"No","volume":28,"language":[{"iso":"eng"}],"oa":1,"page":"1579-1581","doi":"10.1111/mec.15048","year":"2019","day":"01","scopus_import":"1","publication":"Molecular ecology","intvolume":"        28","citation":{"short":"D. Field, C. Fraisse, Molecular Ecology 28 (2019) 1579–1581.","mla":"Field, David, and Christelle Fraisse. “Breaking down Barriers in Morning Glories.” <i>Molecular Ecology</i>, vol. 28, no. 7, Wiley, 2019, pp. 1579–81, doi:<a href=\"https://doi.org/10.1111/mec.15048\">10.1111/mec.15048</a>.","apa":"Field, D., &#38; Fraisse, C. (2019). Breaking down barriers in morning glories. <i>Molecular Ecology</i>. Wiley. <a href=\"https://doi.org/10.1111/mec.15048\">https://doi.org/10.1111/mec.15048</a>","ama":"Field D, Fraisse C. Breaking down barriers in morning glories. <i>Molecular ecology</i>. 2019;28(7):1579-1581. doi:<a href=\"https://doi.org/10.1111/mec.15048\">10.1111/mec.15048</a>","chicago":"Field, David, and Christelle Fraisse. “Breaking down Barriers in Morning Glories.” <i>Molecular Ecology</i>. Wiley, 2019. <a href=\"https://doi.org/10.1111/mec.15048\">https://doi.org/10.1111/mec.15048</a>.","ista":"Field D, Fraisse C. 2019. Breaking down barriers in morning glories. Molecular ecology. 28(7), 1579–1581.","ieee":"D. Field and C. Fraisse, “Breaking down barriers in morning glories,” <i>Molecular ecology</i>, vol. 28, no. 7. Wiley, pp. 1579–1581, 2019."},"date_updated":"2023-08-25T10:37:30Z","department":[{"_id":"NiBa"}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"external_id":{"isi":["000474808300001"]},"isi":1,"ddc":["580","576"],"abstract":[{"text":"One of the most striking and consistent results in speciation genomics is the heterogeneous divergence observed across the genomes of closely related species. This pattern was initially attributed to different levels of gene exchange—with divergence preserved at loci generating a barrier to gene flow but homogenized at unlinked neutral loci. Although there is evidence to support this model, it is now recognized that interpreting patterns of divergence across genomes is not so straightforward. One \r\nproblem is that heterogenous divergence between populations can also be generated by other processes (e.g. recurrent selective sweeps or background selection) without any involvement of differential gene flow. Thus, integrated studies that identify which loci are likely subject to divergent selection are required to shed light on the interplay between selection and gene flow during the early phases of speciation. In this issue of Molecular Ecology, Rifkin et al. (2019) confront this challenge using a pair of sister morning glory species. They wisely design their sampling to take the geographic context of individuals into account, including geographically isolated (allopatric) and co‐occurring (sympatric) populations. This enabled them to show that individuals are phenotypically less differentiated in sympatry. They also found that the loci that resist introgression are enriched for those most differentiated in allopatry and loci that exhibit signals of divergent selection. One great strength of the \r\nstudy is the combination of methods from population genetics and molecular evolution, including the development of a model to simultaneously infer admixture proportions and selfing rates.","lang":"eng"}],"publication_status":"published","title":"Breaking down barriers in morning glories","publisher":"Wiley","date_published":"2019-04-01T00:00:00Z","file_date_updated":"2020-07-14T12:47:31Z"}]
