@inproceedings{2715,
  abstract     = {We consider Markov decision processes (MDPs) with specifications given as Büchi (liveness) objectives. We consider the problem of computing the set of almost-sure winning vertices from where the objective can be ensured with probability 1. We study for the first time the average case complexity of the classical algorithm for computing the set of almost-sure winning vertices for MDPs with Büchi objectives. Our contributions are as follows: First, we show that for MDPs with constant out-degree the expected number of iterations is at most logarithmic and the average case running time is linear (as compared to the worst case linear number of iterations and quadratic time complexity). Second, for the average case analysis over all MDPs we show that the expected number of iterations is constant and the average case running time is linear (again as compared to the worst case linear number of iterations and quadratic time complexity). Finally we also show that given that all MDPs are equally likely, the probability that the classical algorithm requires more than constant number of iterations is exponentially small.},
  author       = {Chatterjee, Krishnendu and Joglekar, Manas and Shah, Nisarg},
  location     = {Hyderabad, India},
  pages        = {461 -- 473},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum für Informatik},
  title        = {{Average case analysis of the classical algorithm for Markov decision processes with Büchi objectives}},
  doi          = {10.4230/LIPIcs.FSTTCS.2012.461},
  volume       = {18},
  year         = {2012},
}

@article{2848,
  abstract     = {We study evolutionary game theory in a setting where individuals learn from each other. We extend the traditional approach by assuming that a population contains individuals with different learning abilities. In particular, we explore the situation where individuals have different search spaces, when attempting to learn the strategies of others. The search space of an individual specifies the set of strategies learnable by that individual. The search space is genetically given and does not change under social evolutionary dynamics. We introduce a general framework and study a specific example in the context of direct reciprocity. For this example, we obtain the counter intuitive result that cooperation can only evolve for intermediate benefit-to-cost ratios, while small and large benefit-to-cost ratios favor defection. Our paper is a step toward making a connection between computational learning theory and evolutionary game dynamics.},
  author       = {Chatterjee, Krishnendu and Zufferey, Damien and Nowak, Martin},
  journal      = {Journal of Theoretical Biology},
  pages        = {161 -- 173},
  publisher    = {Elsevier},
  title        = {{Evolutionary game dynamics in populations with different learners}},
  doi          = {10.1016/j.jtbi.2012.02.021},
  volume       = {301},
  year         = {2012},
}

@article{2849,
  author       = {Edelsbrunner, Herbert and Strelkova, Nataliya},
  journal      = {Russian Mathematical Surveys},
  number       = {6},
  pages        = {1167 -- 1168},
  publisher    = {IOP Publishing Ltd.},
  title        = {{On the configuration space of Steiner minimal trees}},
  doi          = {10.1070/RM2012v067n06ABEH004820},
  volume       = {67},
  year         = {2012},
}

@article{2875,
  abstract     = {Phytohormones are important plant growth regulators that control many developmental processes, such as cell division, cell differentiation, organogenesis and morphogenesis. They regulate a multitude of apparently unrelated physiological processes, often with overlapping roles, and they mutually modulate their effects. These features imply important synergistic and antagonistic interactions between the various plant hormones. Auxin and cytokinin are central hormones involved in the regulation of plant growth and development, including processes determining root architecture, such as root pole establishment during early embryogenesis, root meristem maintenance and lateral root organogenesis. Thus, to control root development both pathways put special demands on the mechanisms that balance their activities and mediate their interactions. Here, we summarize recent knowledge on the role of auxin and cytokinin in the regulation of root architecture with special focus on lateral root organogenesis, discuss the latest findings on the molecular mechanisms of their interactions, and present forward genetic screen as a tool to identify novel molecular components of the auxin and cytokinin crosstalk.},
  author       = {Bielach, Agnieszka and Duclercq, Jérôme and Peter Marhavy and Eva Benková},
  journal      = {Philosophical Transactions of the Royal Society of London. Series B, Biological Sciences},
  number       = {1595},
  pages        = {1469 -- 1478},
  publisher    = {Royal Society, The},
  title        = {{Genetic approach towards the identification of auxin - cytokinin crosstalk components involved in root development}},
  doi          = {10.1098/rstb.2011.0233},
  volume       = {367},
  year         = {2012},
}

@inproceedings{2891,
  abstract     = {Quantitative automata are nondeterministic finite automata with edge weights. They value a
run by some function from the sequence of visited weights to the reals, and value a word by its
minimal/maximal run. They generalize boolean automata, and have gained much attention in
recent years. Unfortunately, important automaton classes, such as sum, discounted-sum, and
limit-average automata, cannot be determinized. Yet, the quantitative setting provides the potential
of approximate determinization. We define approximate determinization with respect to
a distance function, and investigate this potential.
We show that sum automata cannot be determinized approximately with respect to any
distance function. However, restricting to nonnegative weights allows for approximate determinization
with respect to some distance functions.
Discounted-sum automata allow for approximate determinization, as the influence of a word’s
suffix is decaying. However, the naive approach, of unfolding the automaton computations up
to a sufficient level, is shown to be doubly exponential in the discount factor. We provide an
alternative construction that is singly exponential in the discount factor, in the precision, and
in the number of states. We prove matching lower bounds, showing exponential dependency on
each of these three parameters.
Average and limit-average automata are shown to prohibit approximate determinization with
respect to any distance function, and this is the case even for two weights, 0 and 1.},
  author       = {Boker, Udi and Henzinger, Thomas A},
  booktitle    = {Leibniz International Proceedings in Informatics},
  location     = {Hyderabad, India},
  pages        = {362 -- 373},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum für Informatik},
  title        = {{Approximate determinization of quantitative automata}},
  doi          = {10.4230/LIPIcs.FSTTCS.2012.362},
  volume       = {18},
  year         = {2012},
}

@article{2902,
  abstract     = {We present an algorithm for simplifying linear cartographic objects and results obtained with a computer program implementing this algorithm. },
  author       = {Edelsbrunner, Herbert and Musin, Oleg and Ukhalov, Alexey and Yakimova, Olga and Alexeev, Vladislav and Bogaevskaya, Victoriya and Gorohov, Andrey and Preobrazhenskaya, Margarita},
  journal      = {Modeling and Analysis of Information Systems},
  number       = {6},
  pages        = {152 -- 160},
  publisher    = {Russian Academy of Sciences},
  title        = {{Fractal and computational geometry for generalizing cartographic objects}},
  volume       = {19},
  year         = {2012},
}

@inproceedings{2903,
  abstract     = {In order to enjoy a digital version of the Jordan Curve Theorem, it is common to use the closed topology for the foreground and the open topology for the background of a 2-dimensional binary image. In this paper, we introduce a single topology that enjoys this theorem for all thresholds decomposing a real-valued image into foreground and background. This topology is easy to construct and it generalizes to n-dimensional images.},
  author       = {Edelsbrunner, Herbert and Symonova, Olga},
  location     = {New Brunswick, NJ, USA },
  pages        = {41 -- 48},
  publisher    = {IEEE},
  title        = {{The adaptive topology of a digital image}},
  doi          = {10.1109/ISVD.2012.11},
  year         = {2012},
}

@article{2904,
  abstract     = {Generalized van der Corput sequences are onedimensional, infinite sequences in the unit interval. They are generated from permutations in integer base b and are the building blocks of the multi-dimensional Halton sequences. Motivated by recent progress of Atanassov on the uniform distribution behavior of Halton sequences, we study, among others, permutations of the form P(i) = ai (mod b) for coprime integers a and b. We show that multipliers a that either divide b - 1 or b + 1 generate van der Corput sequences with weak distribution properties. We give explicit lower bounds for the asymptotic distribution behavior of these sequences and relate them to sequences generated from the identity permutation in smaller bases, which are, due to Faure, the weakest distributed generalized van der Corput sequences.},
  author       = {Pausinger, Florian},
  issn         = {2118-8572},
  journal      = {Journal de Theorie des Nombres des Bordeaux},
  number       = {3},
  pages        = {729 -- 749},
  publisher    = {Université de Bordeaux},
  title        = {{Weak multipliers for generalized van der Corput sequences}},
  doi          = {10.5802/jtnb.819},
  volume       = {24},
  year         = {2012},
}

@inproceedings{2916,
  abstract     = {The classical (boolean) notion of refinement for behavioral interfaces of system components is the alternating refinement preorder. In this paper, we define a quantitative measure for interfaces, called interface simulation distance. It makes the alternating refinement preorder quantitative by, intu- itively, tolerating errors (while counting them) in the alternating simulation game. We show that the interface simulation distance satisfies the triangle inequality, that the distance between two interfaces does not increase under parallel composition with a third interface, and that the distance between two interfaces can be bounded from above and below by distances between abstractions of the two interfaces. We illustrate the framework, and the properties of the distances under composition of interfaces, with two case studies.},
  author       = {Cerny, Pavol and Chmelik, Martin and Henzinger, Thomas A and Radhakrishna, Arjun},
  booktitle    = {Electronic Proceedings in Theoretical Computer Science},
  location     = {Napoli, Italy},
  pages        = {29 -- 42},
  publisher    = {EPTCS},
  title        = {{Interface Simulation Distances}},
  doi          = {10.4204/EPTCS.96.3},
  volume       = {96},
  year         = {2012},
}

@unpublished{2928,
  abstract     = {     This paper addresses the problem of approximate MAP-MRF inference in general graphical models. Following [36], we consider a family of linear programming relaxations of the problem where each relaxation is specified by a set of nested pairs of factors for which the marginalization constraint needs to be enforced. We develop a generalization of the TRW-S algorithm [9] for this problem, where we use a decomposition into junction chains, monotonic w.r.t. some ordering on the nodes. This generalizes the monotonic chains in [9] in a natural way. We also show how to deal with nested factors in an efficient way. Experiments show an improvement over min-sum diffusion, MPLP and subgradient ascent algorithms on a number of computer vision and natural language processing problems. },
  author       = {Kolmogorov, Vladimir and Schoenemann, Thomas},
  booktitle    = {arXiv},
  pages        = {16},
  publisher    = {ArXiv},
  title        = {{Generalized sequential tree-reweighted message passing}},
  year         = {2012},
}

@techreport{2929,
  author       = {Vladimir Kolmogorov},
  publisher    = {Unknown},
  title        = {{The power of linear programming for valued CSPs: a constructive characterization}},
  year         = {2012},
}

@inproceedings{2930,
  abstract     = {In this paper we investigate k-submodular functions. This natural family of discrete functions includes submodular and bisubmodular functions as the special cases k = 1 and k = 2 respectively.

In particular we generalize the known Min-Max-Theorem for submodular and bisubmodular functions. This theorem asserts that the minimum of the (bi)submodular function can be found by solving a maximization problem over a (bi)submodular polyhedron. We define a k-submodular polyhedron, prove a Min-Max-Theorem for k-submodular functions, and give a greedy algorithm to construct the vertices of the polyhedron.
},
  author       = {Huber, Anna and Kolmogorov, Vladimir},
  location     = {Athens, Greece},
  pages        = {451 -- 462},
  publisher    = {Springer},
  title        = {{Towards minimizing k-submodular functions}},
  doi          = {10.1007/978-3-642-32147-4_40},
  volume       = {7422},
  year         = {2012},
}

@inproceedings{2936,
  abstract     = {The notion of delays arises naturally in many computational models, such as, in the design of circuits, control systems, and dataflow languages. In this work, we introduce automata with delay blocks (ADBs), extending finite state automata with variable time delay blocks, for deferring individual transition output symbols, in a discrete-time setting. We show that the ADB languages strictly subsume the regular languages, and are incomparable in expressive power to the context-free languages. We show that ADBs are closed under union, concatenation and Kleene star, and under intersection with regular languages, but not closed under complementation and intersection with other ADB languages. We show that the emptiness and the membership problems are decidable in polynomial time for ADBs, whereas the universality problem is undecidable. Finally we consider the linear-time model checking problem, i.e., whether the language of an ADB is contained in a regular language, and show that the model checking problem is PSPACE-complete. Copyright 2012 ACM.},
  author       = {Chatterjee, Krishnendu and Henzinger, Thomas A and Prabhu, Vinayak},
  booktitle    = {roceedings of the tenth ACM international conference on Embedded software},
  location     = {Tampere, Finland},
  pages        = {43 -- 52},
  publisher    = {ACM},
  title        = {{Finite automata with time delay blocks}},
  doi          = {10.1145/2380356.2380370},
  year         = {2012},
}

@inproceedings{2937,
  abstract     = {Developers building cryptography into security-sensitive applications face a daunting task. Not only must they understand the security guarantees delivered by the constructions they choose, they must also implement and combine them correctly and efficiently. Cryptographic compilers free developers from this task by turning high-level specifications of security goals into efficient implementations. Yet, trusting such tools is hard as they rely on complex mathematical machinery and claim security properties that are subtle and difficult to verify. In this paper we present ZKCrypt, an optimizing cryptographic compiler achieving an unprecedented level of assurance without sacrificing practicality for a comprehensive class of cryptographic protocols, known as Zero-Knowledge Proofs of Knowledge. The pipeline of ZKCrypt integrates purpose-built verified compilers and verifying compilers producing formal proofs in the CertiCrypt framework. By combining the guarantees delivered by each stage, ZKCrypt provides assurance that the output implementation securely realizes the abstract proof goal given as input. We report on the main characteristics of ZKCrypt, highlight new definitions and concepts at its foundations, and illustrate its applicability through a representative example of an anonymous credential system.},
  author       = {Almeida, José and Barbosa, Manuel and Bangerter, Endre and Barthe, Gilles and Krenn, Stephan and Béguelin, Santiago},
  booktitle    = {Proceedings of the 2012 ACM conference on Computer and communications security},
  location     = {Raleigh, NC, USA},
  pages        = {488 -- 500},
  publisher    = {ACM},
  title        = {{Full proof cryptography: Verifiable compilation of efficient zero-knowledge protocols}},
  doi          = {10.1145/2382196.2382249},
  year         = {2012},
}

@article{2941,
  author       = {Dolbilin, Nikolai and Edelsbrunner, Herbert and Musin, Oleg},
  journal      = {Russian Mathematical Surveys},
  number       = {4},
  pages        = {781 -- 783},
  publisher    = {IOP Publishing},
  title        = {{On the optimality of functionals over triangulations of Delaunay sets}},
  doi          = {10.1070/RM2012v067n04ABEH004807},
  volume       = {67},
  year         = {2012},
}

@article{2943,
  abstract     = {We examine whether the Escherichia coli chromosome is folded into a self-adherent nucleoprotein complex, or alternately is a confined but otherwise unconstrained self-avoiding polymer. We address this through in vivo visualization, using an inducible GFP fusion to the nucleoid-associated protein Fis to non-specifically decorate the entire chromosome. For a range of different growth conditions, the chromosome is a compact structure that does not fill the volume of the cell, and which moves from the new pole to the cell centre. During rapid growth, chromosome segregation occurs well before cell division, with daughter chromosomes coupled by a thin inter-daughter filament before complete segregation, whereas during slow growth chromosomes stay adjacent until cell division occurs. Image correlation analysis indicates that sub-nucleoid structure is stable on a 1min timescale, comparable to the timescale for redistribution time measured for GFP-Fis after photobleaching. Optical deconvolution and writhe calculation analysis indicate that the nucleoid has a large-scale coiled organization rather than being an amorphous mass. Our observations are consistent with the chromosome having a self-adherent filament organization.},
  author       = {Hadizadeh Yazdi, Nastaran and Guet, Calin C and Johnson, Reid and Marko, John},
  journal      = {Molecular Microbiology},
  number       = {6},
  pages        = {1318 -- 1333},
  publisher    = {Wiley-Blackwell},
  title        = {{Variation of the folding and dynamics of the Escherichia coli chromosome with growth conditions}},
  doi          = {10.1111/mmi.12071},
  volume       = {86},
  year         = {2012},
}

@article{2946,
  abstract     = {MicroRNAs (miRNAs) are small noncoding RNAs that function in literally all cellular processes. miRNAs interact with Argonaute (Ago) proteins and guide them to specific target sites located in the 3′-untranslated region (3′-UTR) of target mRNAs leading to translational repression and deadenylation-induced mRNA degradation. Most miRNAs are processed from hairpin-structured precursors by the consecutive action of the RNase III enzymes Drosha and Dicer. However, processing of miR-451 is Dicer independent and cleavage is mediated by the endonuclease Ago2. Here we have characterized miR-451 sequence and structure requirements for processing as well as sorting of miRNAs into different Ago proteins. Pre-miR-451 appears to be optimized for Ago2 cleavage and changes result in reduced processing. In addition, we show that the mature miR-451 only associates with Ago2 suggesting that mature miRNAs are not exchanged between different members of the Ago protein family. Based on cloning and deep sequencing of endogenous miRNAs associated with Ago1-3, we do not find evidence for miRNA sorting in human cells. However, Ago identity appears to influence the length of some miRNAs, while others remain unaffected.},
  author       = {Dueck, Anne and Ziegler, Christian and Eichner, Alexander and Berezikov, Eugène and Meister, Gunter},
  journal      = {Nucleic Acids Research},
  number       = {19},
  pages        = {9850 -- 9862},
  publisher    = {Oxford University Press},
  title        = {{MicroRNAs associated with the different human Argonaute proteins}},
  doi          = {10.1093/nar/gks705},
  volume       = {40},
  year         = {2012},
}

@inproceedings{2947,
  abstract     = {We introduce games with probabilistic uncertainty, a model for controller synthesis in which the controller observes the state through imprecise sensors that provide correct information about the current state with a fixed probability. That is, in each step, the sensors return an observed state, and given the observed state, there is a probability distribution (due to the estimation error) over the actual current state. The controller must base its decision on the observed state (rather than the actual current state, which it does not know). On the other hand, we assume that the environment can perfectly observe the current state. We show that controller synthesis for qualitative ω-regular objectives in our model can be reduced in polynomial time to standard partial-observation stochastic games, and vice-versa. As a consequence we establish the precise decidability frontier for the new class of games, and establish optimal complexity results for all the decidable problems.},
  author       = {Chatterjee, Krishnendu and Chmelik, Martin and Majumdar, Ritankar},
  location     = {Thiruvananthapuram, India},
  pages        = {385 -- 399},
  publisher    = {Springer},
  title        = {{Equivalence of games with probabilistic uncertainty and partial observation games}},
  doi          = {10.1007/978-3-642-33386-6_30},
  volume       = {7561},
  year         = {2012},
}

@article{2954,
  abstract     = {Spontaneous postsynaptic currents (PSCs) provide key information about the mechanisms of synaptic transmission and the activity modes of neuronal networks. However, detecting spontaneous PSCs in vitro and in vivo has been challenging, because of the small amplitude, the variable kinetics, and the undefined time of generation of these events. Here, we describe a, to our knowledge, new method for detecting spontaneous synaptic events by deconvolution, using a template that approximates the average time course of spontaneous PSCs. A recorded PSC trace is deconvolved from the template, resulting in a series of delta-like functions. The maxima of these delta-like events are reliably detected, revealing the precise onset times of the spontaneous PSCs. Among all detection methods, the deconvolution-based method has a unique temporal resolution, allowing the detection of individual events in high-frequency bursts. Furthermore, the deconvolution-based method has a high amplitude resolution, because deconvolution can substantially increase the signal/noise ratio. When tested against previously published methods using experimental data, the deconvolution-based method was superior for spontaneous PSCs recorded in vivo. Using the high-resolution deconvolution-based detection algorithm, we show that the frequency of spontaneous excitatory postsynaptic currents in dentate gyrus granule cells is 4.5 times higher in vivo than in vitro.},
  author       = {Pernia-Andrade, Alejandro and Goswami, Sarit and Stickler, Yvonne and Fröbe, Ulrich and Schlögl, Alois and Jonas, Peter M},
  journal      = {Biophysical Journal},
  number       = {7},
  pages        = {1429 -- 1439},
  publisher    = {Biophysical},
  title        = {{A deconvolution based method with high sensitivity and temporal resolution for detection of spontaneous synaptic currents in vitro and in vivo}},
  doi          = {10.1016/j.bpj.2012.08.039},
  volume       = {103},
  year         = {2012},
}

@inproceedings{2955,
  abstract     = {We consider two-player stochastic games played on finite graphs with reachability objectives where the first player tries to ensure a target state to be visited almost-surely (i.e., with probability 1), or positively (i.e., with positive probability), no matter the strategy of the second player. We classify such games according to the information and the power of randomization available to the players. On the basis of information, the game can be one-sided with either (a) player 1, or (b) player 2 having partial observation (and the other player has perfect observation), or two-sided with (c) both players having partial observation. On the basis of randomization, the players (a) may not be allowed to use randomization (pure strategies), or (b) may choose a probability distribution over actions but the actual random choice is external and not visible to the player (actions invisible), or (c) may use full randomization. Our main results for pure strategies are as follows. (1) For one-sided games with player 1 having partial observation we show that (in contrast to full randomized strategies) belief-based (subset-construction based) strategies are not sufficient, and we present an exponential upper bound on memory both for almostsure and positive winning strategies; we show that the problem of deciding the existence of almost-sure and positive winning strategies for player 1 is EXPTIME-complete. (2) For one-sided games with player 2 having partial observation we show that non-elementary memory is both necessary and sufficient for both almost-sure and positive winning strategies. (3) We show that for the general (two-sided) case finite-memory strategies are sufficient for both positive and almost-sure winning, and at least non-elementary memory is required. We establish the equivalence of the almost-sure winning problems for pure strategies and for randomized strategies with actions invisible. Our equivalence result exhibits serious flaws in previous results of the literature: we show a non-elementary memory lower bound for almost-sure winning whereas an exponential upper bound was previously claimed.},
  author       = {Chatterjee, Krishnendu and Doyen, Laurent},
  booktitle    = {Proceedings of the 2012 27th Annual ACM/IEEE Symposium on Logic in Computer Science},
  location     = {Dubrovnik, Croatia},
  publisher    = {IEEE},
  title        = {{Partial-observation stochastic games: How to win when belief fails}},
  doi          = {10.1109/LICS.2012.28},
  year         = {2012},
}

