[{"publication":"bioRxiv","type":"preprint","_id":"8128","date_created":"2020-07-16T12:26:55Z","oa":1,"page":"43","year":"2016","main_file_link":[{"url":"https://doi.org/10.1101/066589 ","open_access":"1"}],"status":"public","day":"29","publication_status":"published","month":"07","abstract":[{"text":"The stimulus selectivity of synaptic currents in cortical neurons often shows a co-tuning of excitation and inhibition, but the mechanisms that underlie the emergence and plasticity of this co-tuning are not fully understood. Using a computational model, we show that an interaction of excitatory and inhibitory synaptic plasticity reproduces both the developmental and – when combined with a disinhibitory gate – the adult plasticity of excitatory and inhibitory receptive fields in auditory cortex. The co-tuning arises from inhibitory plasticity that balances excitation and inhibition, while excitatory stimulus selectivity can result from two different mechanisms. Inhibitory inputs with a broad stimulus tuning introduce a sliding threshold as in Bienenstock-Cooper-Munro rules, introducing an excitatory stimulus selectivity at the cost of a broader inhibitory receptive field. Alternatively, input asymmetries can be amplified by synaptic competition. The latter leaves any receptive field plasticity transient, a prediction we verify in recordings in auditory cortex.","lang":"eng"}],"title":"Receptive field formation by interacting excitatory and inhibitory synaptic plasticity","article_processing_charge":"No","date_published":"2016-07-29T00:00:00Z","publisher":"Cold Spring Harbor Laboratory","language":[{"iso":"eng"}],"oa_version":"Preprint","citation":{"short":"C. Clopath, T.P. Vogels, R.C. Froemke, H. Sprekeler, BioRxiv (2016).","mla":"Clopath, Claudia, et al. “Receptive Field Formation by Interacting Excitatory and Inhibitory Synaptic Plasticity.” <i>BioRxiv</i>, Cold Spring Harbor Laboratory, 2016.","ieee":"C. Clopath, T. P. Vogels, R. C. Froemke, and H. Sprekeler, “Receptive field formation by interacting excitatory and inhibitory synaptic plasticity,” <i>bioRxiv</i>. Cold Spring Harbor Laboratory, 2016.","ista":"Clopath C, Vogels TP, Froemke RC, Sprekeler H. 2016. Receptive field formation by interacting excitatory and inhibitory synaptic plasticity. bioRxiv, .","ama":"Clopath C, Vogels TP, Froemke RC, Sprekeler H. Receptive field formation by interacting excitatory and inhibitory synaptic plasticity. <i>bioRxiv</i>. 2016.","chicago":"Clopath, Claudia, Tim P Vogels, Robert C. Froemke, and Henning Sprekeler. “Receptive Field Formation by Interacting Excitatory and Inhibitory Synaptic Plasticity.” <i>BioRxiv</i>. Cold Spring Harbor Laboratory, 2016.","apa":"Clopath, C., Vogels, T. P., Froemke, R. C., &#38; Sprekeler, H. (2016). Receptive field formation by interacting excitatory and inhibitory synaptic plasticity. <i>bioRxiv</i>. Cold Spring Harbor Laboratory."},"extern":"1","date_updated":"2021-01-12T08:17:02Z","user_id":"D865714E-FA4E-11E9-B85B-F5C5E5697425","author":[{"full_name":"Clopath, Claudia","last_name":"Clopath","first_name":"Claudia"},{"orcid":"0000-0003-3295-6181","last_name":"Vogels","first_name":"Tim P","full_name":"Vogels, Tim P","id":"CB6FF8D2-008F-11EA-8E08-2637E6697425"},{"full_name":"Froemke, Robert C.","last_name":"Froemke","first_name":"Robert C."},{"last_name":"Sprekeler","first_name":"Henning","full_name":"Sprekeler, Henning"}]},{"type":"journal_article","_id":"8241","article_type":"original","date_created":"2020-08-10T11:54:03Z","publication_identifier":{"issn":["2162-402X"]},"status":"public","main_file_link":[{"open_access":"1","url":"https://doi.org/10.1080/2162402X.2016.1171446"}],"issue":"7","article_number":"e1171446","month":"06","article_processing_charge":"No","volume":5,"language":[{"iso":"eng"}],"oa_version":"Published Version","quality_controlled":"1","author":[{"full_name":"Singer, Josef","first_name":"Josef","last_name":"Singer"},{"last_name":"Manzano-Szalai","first_name":"Krisztina","full_name":"Manzano-Szalai, Krisztina"},{"id":"36432834-F248-11E8-B48F-1D18A9856A87","full_name":"Fazekas, Judit","first_name":"Judit","last_name":"Fazekas","orcid":"0000-0002-8777-3502"},{"full_name":"Thell, Kathrin","first_name":"Kathrin","last_name":"Thell"},{"first_name":"Anna","last_name":"Bentley-Lukschal","full_name":"Bentley-Lukschal, Anna"},{"last_name":"Stremnitzer","first_name":"Caroline","full_name":"Stremnitzer, Caroline"},{"first_name":"Franziska","last_name":"Roth-Walter","full_name":"Roth-Walter, Franziska"},{"last_name":"Weghofer","first_name":"Margit","full_name":"Weghofer, Margit"},{"full_name":"Ritter, Mirko","first_name":"Mirko","last_name":"Ritter"},{"first_name":"Kerstin","last_name":"Pino Tossi","full_name":"Pino Tossi, Kerstin"},{"last_name":"Hörer","first_name":"Markus","full_name":"Hörer, Markus"},{"full_name":"Michaelis, Uwe","last_name":"Michaelis","first_name":"Uwe"},{"first_name":"Erika","last_name":"Jensen-Jarolim","full_name":"Jensen-Jarolim, Erika"}],"publication":"OncoImmunology","intvolume":"         5","oa":1,"year":"2016","doi":"10.1080/2162402x.2016.1171446","day":"30","abstract":[{"text":"Background: Anticancer vaccines could represent a valuable complementary strategy to established therapies, especially in settings of early stage and minimal residual disease. HER-2 is an important target for immunotherapy and addressed by the monoclonal antibody trastuzumab. We have previously generated HER-2 mimotope peptides from phage display libraries. The synthesized peptides were coupled to carriers and applied for epitope-specific induction of trastuzumab-like IgG. For simplification and to avoid methodological limitations of synthesis and coupling chemistry, we herewith present a novel and optimized approach by using adeno-associated viruses (AAV) as effective and high-density mimotope-display system, which can be directly used for vaccination. Methods: An AAV capsid display library was constructed by genetically incorporating random peptides in a plasmid encoding the wild-type AAV2 capsid protein. AAV clones, expressing peptides specifically reactive to trastuzumab, were employed to immunize BALB/c mice. Antibody titers against human HER-2 were determined, and the isotype composition and functional properties of these were tested. Finally, prophylactically immunized mice were challenged with human HER-2 transfected mouse D2F2/E2 cells. Results: HER-2 mimotope AAV-vaccines induced antibodies specific to human HER-2. Two clones were selected for immunization of mice, which were subsequently grafted D2F2/E2 cells. Both mimotope AAV clones delayed the growth of tumors significantly, as compared to controls. Conclusion: In this study, a novel mimotope AAV-based platform was created allowing the isolation of mimotopes, which can be directly used as anticancer vaccines. The example of trastuzumab AAV-mimotopes demonstrates that this vaccine strategy could help to establish active immunotherapy for breast-cancer patients.","lang":"eng"}],"publication_status":"published","title":"Proof of concept study with an HER-2 mimotope anticancer vaccine deduced from a novel AAV-mimotope library platform","publisher":"Taylor & Francis","date_published":"2016-06-30T00:00:00Z","citation":{"ieee":"J. Singer <i>et al.</i>, “Proof of concept study with an HER-2 mimotope anticancer vaccine deduced from a novel AAV-mimotope library platform,” <i>OncoImmunology</i>, vol. 5, no. 7. Taylor &#38; Francis, 2016.","ista":"Singer J, Manzano-Szalai K, Singer J, Thell K, Bentley-Lukschal A, Stremnitzer C, Roth-Walter F, Weghofer M, Ritter M, Pino Tossi K, Hörer M, Michaelis U, Jensen-Jarolim E. 2016. Proof of concept study with an HER-2 mimotope anticancer vaccine deduced from a novel AAV-mimotope library platform. OncoImmunology. 5(7), e1171446.","chicago":"Singer, Josef, Krisztina Manzano-Szalai, Judit Singer, Kathrin Thell, Anna Bentley-Lukschal, Caroline Stremnitzer, Franziska Roth-Walter, et al. “Proof of Concept Study with an HER-2 Mimotope Anticancer Vaccine Deduced from a Novel AAV-Mimotope Library Platform.” <i>OncoImmunology</i>. Taylor &#38; Francis, 2016. <a href=\"https://doi.org/10.1080/2162402x.2016.1171446\">https://doi.org/10.1080/2162402x.2016.1171446</a>.","ama":"Singer J, Manzano-Szalai K, Singer J, et al. Proof of concept study with an HER-2 mimotope anticancer vaccine deduced from a novel AAV-mimotope library platform. <i>OncoImmunology</i>. 2016;5(7). doi:<a href=\"https://doi.org/10.1080/2162402x.2016.1171446\">10.1080/2162402x.2016.1171446</a>","apa":"Singer, J., Manzano-Szalai, K., Singer, J., Thell, K., Bentley-Lukschal, A., Stremnitzer, C., … Jensen-Jarolim, E. (2016). Proof of concept study with an HER-2 mimotope anticancer vaccine deduced from a novel AAV-mimotope library platform. <i>OncoImmunology</i>. Taylor &#38; Francis. <a href=\"https://doi.org/10.1080/2162402x.2016.1171446\">https://doi.org/10.1080/2162402x.2016.1171446</a>","short":"J. Singer, K. Manzano-Szalai, J. Singer, K. Thell, A. Bentley-Lukschal, C. Stremnitzer, F. Roth-Walter, M. Weghofer, M. Ritter, K. Pino Tossi, M. Hörer, U. Michaelis, E. Jensen-Jarolim, OncoImmunology 5 (2016).","mla":"Singer, Josef, et al. “Proof of Concept Study with an HER-2 Mimotope Anticancer Vaccine Deduced from a Novel AAV-Mimotope Library Platform.” <i>OncoImmunology</i>, vol. 5, no. 7, e1171446, Taylor &#38; Francis, 2016, doi:<a href=\"https://doi.org/10.1080/2162402x.2016.1171446\">10.1080/2162402x.2016.1171446</a>."},"date_updated":"2021-01-12T08:17:41Z","extern":"1","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87"},{"language":[{"iso":"eng"}],"date_published":"2016-09-01T00:00:00Z","publisher":"USENIX Association","article_processing_charge":"No","title":"Enhancing bitcoin security and performance with strong consistency via collective signing","abstract":[{"text":"While showing great promise, Bitcoin requires users to wait tens of minutes for transactions to commit, and even then, offering only probabilistic guarantees. This paper introduces ByzCoin, a novel Byzantine consensus protocol that leverages scalable collective signing to commit Bitcoin transactions irreversibly within seconds. ByzCoin achieves Byzantine consensus while preserving Bitcoin’s open membership by dynamically forming hash power-proportionate consensus groups that represent recently-successful block miners. ByzCoin employs communication trees to optimize transaction commitment and verification under normal operation while guaranteeing safety and liveness under Byzantine faults, up to a near-optimal tolerance of f faulty group members among 3f + 2 total. ByzCoin mitigates double spending and selfish mining attacks by producing collectively signed transaction blocks within one minute of transaction submission. Tree-structured communication further reduces this latency to less than 30 seconds. Due to these optimizations, ByzCoin achieves a throughput higher than Paypal currently handles, with a confirmation latency of 15-20 seconds.","lang":"eng"}],"publication_status":"published","month":"09","author":[{"full_name":"Kokoris Kogias, Eleftherios","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","last_name":"Kokoris Kogias","first_name":"Eleftherios"},{"last_name":"Jovanovic","first_name":"Philipp","full_name":"Jovanovic, Philipp"},{"full_name":"Gailly, Nicolas","first_name":"Nicolas","last_name":"Gailly"},{"first_name":"Ismail","last_name":"Khoffi","full_name":"Khoffi, Ismail"},{"full_name":"Gasser, Linus","first_name":"Linus","last_name":"Gasser"},{"full_name":"Ford, Bryan","last_name":"Ford","first_name":"Bryan"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","external_id":{"arxiv":["1602.06997"]},"date_updated":"2021-01-12T08:18:00Z","quality_controlled":"1","extern":"1","oa_version":"Published Version","citation":{"short":"E. Kokoris Kogias, P. Jovanovic, N. Gailly, I. Khoffi, L. Gasser, B. Ford, in:, Proceedings of the 25th USENIX Conference on Security Symposium, USENIX Association, 2016, pp. 279–296.","mla":"Kokoris Kogias, Eleftherios, et al. “Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing.” <i>Proceedings of the 25th USENIX Conference on Security Symposium</i>, USENIX Association, 2016, pp. 279–296.","chicago":"Kokoris Kogias, Eleftherios, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. “Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing.” In <i>Proceedings of the 25th USENIX Conference on Security Symposium</i>, 279–296. USENIX Association, 2016.","ama":"Kokoris Kogias E, Jovanovic P, Gailly N, Khoffi I, Gasser L, Ford B. Enhancing bitcoin security and performance with strong consistency via collective signing. In: <i>Proceedings of the 25th USENIX Conference on Security Symposium</i>. USENIX Association; 2016:279–296.","ista":"Kokoris Kogias E, Jovanovic P, Gailly N, Khoffi I, Gasser L, Ford B. 2016. Enhancing bitcoin security and performance with strong consistency via collective signing. Proceedings of the 25th USENIX Conference on Security Symposium. SEC: Security Symposium, 279–296.","apa":"Kokoris Kogias, E., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., &#38; Ford, B. (2016). Enhancing bitcoin security and performance with strong consistency via collective signing. In <i>Proceedings of the 25th USENIX Conference on Security Symposium</i> (pp. 279–296). Austin, TX, United States: USENIX Association.","ieee":"E. Kokoris Kogias, P. Jovanovic, N. Gailly, I. Khoffi, L. Gasser, and B. Ford, “Enhancing bitcoin security and performance with strong consistency via collective signing,” in <i>Proceedings of the 25th USENIX Conference on Security Symposium</i>, Austin, TX, United States, 2016, pp. 279–296."},"arxiv":1,"conference":{"end_date":"2016-08-12","start_date":"2016-08-10","location":"Austin, TX, United States","name":"SEC: Security Symposium"},"publication":"Proceedings of the 25th USENIX Conference on Security Symposium","main_file_link":[{"url":"https://arxiv.org/abs/1602.06997","open_access":"1"}],"status":"public","year":"2016","day":"01","publication_identifier":{"isbn":["9781931971324"]},"page":"279–296","oa":1,"date_created":"2020-08-26T12:08:35Z","_id":"8302","type":"conference"},{"oa":1,"doi":"10.1002/hipo.22550","year":"2016","page":"668 - 682","day":"01","acknowledgement":"The authors thank Jose Guzman for critically reading prior versions of the manuscript. They also thank T. Asenov for\r\nengineering mechanical devices, A. Schlögl for efﬁcient pro-gramming, F. Marr for technical assistance, and E. Kramberger for manuscript editing.","scopus_import":"1","publication":"Hippocampus","publist_id":"5550","intvolume":"        26","citation":{"short":"J. Kowalski, J. Gan, P.M. Jonas, A. Pernia-Andrade, Hippocampus 26 (2016) 668–682.","mla":"Kowalski, Janina, et al. “Intrinsic Membrane Properties Determine Hippocampal Differential Firing Pattern in Vivo in Anesthetized Rats.” <i>Hippocampus</i>, vol. 26, no. 5, Wiley, 2016, pp. 668–82, doi:<a href=\"https://doi.org/10.1002/hipo.22550\">10.1002/hipo.22550</a>.","ieee":"J. Kowalski, J. Gan, P. M. Jonas, and A. Pernia-Andrade, “Intrinsic membrane properties determine hippocampal differential firing pattern in vivo in anesthetized rats,” <i>Hippocampus</i>, vol. 26, no. 5. Wiley, pp. 668–682, 2016.","apa":"Kowalski, J., Gan, J., Jonas, P. M., &#38; Pernia-Andrade, A. (2016). Intrinsic membrane properties determine hippocampal differential firing pattern in vivo in anesthetized rats. <i>Hippocampus</i>. Wiley. <a href=\"https://doi.org/10.1002/hipo.22550\">https://doi.org/10.1002/hipo.22550</a>","ama":"Kowalski J, Gan J, Jonas PM, Pernia-Andrade A. Intrinsic membrane properties determine hippocampal differential firing pattern in vivo in anesthetized rats. <i>Hippocampus</i>. 2016;26(5):668-682. doi:<a href=\"https://doi.org/10.1002/hipo.22550\">10.1002/hipo.22550</a>","chicago":"Kowalski, Janina, Jian Gan, Peter M Jonas, and Alejandro Pernia-Andrade. “Intrinsic Membrane Properties Determine Hippocampal Differential Firing Pattern in Vivo in Anesthetized Rats.” <i>Hippocampus</i>. Wiley, 2016. <a href=\"https://doi.org/10.1002/hipo.22550\">https://doi.org/10.1002/hipo.22550</a>.","ista":"Kowalski J, Gan J, Jonas PM, Pernia-Andrade A. 2016. Intrinsic membrane properties determine hippocampal differential firing pattern in vivo in anesthetized rats. Hippocampus. 26(5), 668–682."},"department":[{"_id":"PeJo"}],"date_updated":"2023-10-17T10:02:02Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","image":"/images/cc_by_nc_nd.png","name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","short":"CC BY-NC-ND (4.0)"},"ddc":["570"],"publication_status":"published","abstract":[{"text":"The hippocampus plays a key role in learning and memory. Previous studies suggested that the main types of principal neurons, dentate gyrus granule cells (GCs), CA3 pyramidal neurons, and CA1 pyramidal neurons, differ in their activity pattern, with sparse firing in GCs and more frequent firing in CA3 and CA1 pyramidal neurons. It has been assumed but never shown that such different activity may be caused by differential synaptic excitation. To test this hypothesis, we performed high-resolution whole-cell patch-clamp recordings in anesthetized rats in vivo. In contrast to previous in vitro data, both CA3 and CA1 pyramidal neurons fired action potentials spontaneously, with a frequency of ∼3–6 Hz, whereas GCs were silent. Furthermore, both CA3 and CA1 cells primarily fired in bursts. To determine the underlying mechanisms, we quantitatively assessed the frequency of spontaneous excitatory synaptic input, the passive membrane properties, and the active membrane characteristics. Surprisingly, GCs showed comparable synaptic excitation to CA3 and CA1 cells and the highest ratio of excitation versus hyperpolarizing inhibition. Thus, differential synaptic excitation is not responsible for differences in firing. Moreover, the three types of hippocampal neurons markedly differed in their passive properties. While GCs showed the most negative membrane potential, CA3 pyramidal neurons had the highest input resistance and the slowest membrane time constant. The three types of neurons also differed in the active membrane characteristics. GCs showed the highest action potential threshold, but displayed the largest gain of the input-output curves. In conclusion, our results reveal that differential firing of the three main types of hippocampal principal neurons in vivo is not primarily caused by differences in the characteristics of the synaptic input, but by the distinct properties of synaptic integration and input-output transformation.","lang":"eng"}],"title":"Intrinsic membrane properties determine hippocampal differential firing pattern in vivo in anesthetized rats","file_date_updated":"2020-07-14T12:45:07Z","date_published":"2016-05-01T00:00:00Z","publisher":"Wiley","_id":"1616","type":"journal_article","date_created":"2018-12-11T11:53:03Z","status":"public","publication_identifier":{"eissn":["1098-1063"],"issn":["1050-9631"]},"pubrep_id":"469","oa_version":"Published Version","quality_controlled":"1","author":[{"last_name":"Kowalski","first_name":"Janina","id":"3F3CA136-F248-11E8-B48F-1D18A9856A87","full_name":"Kowalski, Janina"},{"last_name":"Gan","first_name":"Jian","full_name":"Gan, Jian","id":"3614E438-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Jonas","first_name":"Peter M","orcid":"0000-0001-5001-4804","id":"353C1B58-F248-11E8-B48F-1D18A9856A87","full_name":"Jonas, Peter M"},{"full_name":"Pernia-Andrade, Alejandro","id":"36963E98-F248-11E8-B48F-1D18A9856A87","first_name":"Alejandro","last_name":"Pernia-Andrade"}],"file":[{"file_size":905348,"access_level":"open_access","creator":"system","file_id":"5033","checksum":"284b72b12fbe15474833ed3d4549f86b","relation":"main_file","file_name":"IST-2016-469-v1+1_Kowalski_et_al-Hippocampus.pdf","date_updated":"2020-07-14T12:45:07Z","date_created":"2018-12-12T10:13:47Z","content_type":"application/pdf"}],"issue":"5","month":"05","has_accepted_license":"1","volume":26,"article_processing_charge":"No","language":[{"iso":"eng"}]},{"abstract":[{"text":"We study the discrepancy of jittered sampling sets: such a set P⊂ [0,1]d is generated for fixed m∈ℕ by partitioning [0,1]d into md axis aligned cubes of equal measure and placing a random point inside each of the N=md cubes. We prove that, for N sufficiently large, 1/10 d/N1/2+1/2d ≤EDN∗(P)≤ √d(log N) 1/2/N1/2+1/2d, where the upper bound with an unspecified constant Cd was proven earlier by Beck. Our proof makes crucial use of the sharp Dvoretzky-Kiefer-Wolfowitz inequality and a suitably taylored Bernstein inequality; we have reasons to believe that the upper bound has the sharp scaling in N. Additional heuristics suggest that jittered sampling should be able to improve known bounds on the inverse of the star-discrepancy in the regime N≳dd. We also prove a partition principle showing that every partition of [0,1]d combined with a jittered sampling construction gives rise to a set whose expected squared L2-discrepancy is smaller than that of purely random points.","lang":"eng"}],"month":"04","publication_status":"published","language":[{"iso":"eng"}],"date_published":"2016-04-01T00:00:00Z","publisher":"Academic Press","title":"On the discrepancy of jittered sampling","volume":33,"date_updated":"2021-01-12T06:52:02Z","department":[{"_id":"HeEd"}],"quality_controlled":"1","citation":{"short":"F. Pausinger, S. Steinerberger, Journal of Complexity 33 (2016) 199–216.","mla":"Pausinger, Florian, and Stefan Steinerberger. “On the Discrepancy of Jittered Sampling.” <i>Journal of Complexity</i>, vol. 33, Academic Press, 2016, pp. 199–216, doi:<a href=\"https://doi.org/10.1016/j.jco.2015.11.003\">10.1016/j.jco.2015.11.003</a>.","ista":"Pausinger F, Steinerberger S. 2016. On the discrepancy of jittered sampling. Journal of Complexity. 33, 199–216.","ama":"Pausinger F, Steinerberger S. On the discrepancy of jittered sampling. <i>Journal of Complexity</i>. 2016;33:199-216. doi:<a href=\"https://doi.org/10.1016/j.jco.2015.11.003\">10.1016/j.jco.2015.11.003</a>","chicago":"Pausinger, Florian, and Stefan Steinerberger. “On the Discrepancy of Jittered Sampling.” <i>Journal of Complexity</i>. Academic Press, 2016. <a href=\"https://doi.org/10.1016/j.jco.2015.11.003\">https://doi.org/10.1016/j.jco.2015.11.003</a>.","apa":"Pausinger, F., &#38; Steinerberger, S. (2016). On the discrepancy of jittered sampling. <i>Journal of Complexity</i>. Academic Press. <a href=\"https://doi.org/10.1016/j.jco.2015.11.003\">https://doi.org/10.1016/j.jco.2015.11.003</a>","ieee":"F. Pausinger and S. Steinerberger, “On the discrepancy of jittered sampling,” <i>Journal of Complexity</i>, vol. 33. Academic Press, pp. 199–216, 2016."},"oa_version":"Submitted Version","author":[{"orcid":"0000-0002-8379-3768","last_name":"Pausinger","first_name":"Florian","full_name":"Pausinger, Florian","id":"2A77D7A2-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Stefan","last_name":"Steinerberger","full_name":"Steinerberger, Stefan"}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","scopus_import":1,"intvolume":"        33","publist_id":"5549","publication":"Journal of Complexity","date_created":"2018-12-11T11:53:03Z","oa":1,"_id":"1617","type":"journal_article","acknowledgement":"We are grateful to the referee whose suggestions greatly improved the quality and clarity of the exposition.","day":"01","year":"2016","main_file_link":[{"url":"http://arxiv.org/abs/1510.00251","open_access":"1"}],"status":"public","page":"199 - 216","doi":"10.1016/j.jco.2015.11.003"},{"author":[{"full_name":"Frank, Rupert","last_name":"Frank","first_name":"Rupert"},{"full_name":"Hainzl, Christian","first_name":"Christian","last_name":"Hainzl"},{"last_name":"Seiringer","first_name":"Robert","orcid":"0000-0002-6781-0521","id":"4AFD0470-F248-11E8-B48F-1D18A9856A87","full_name":"Seiringer, Robert"},{"first_name":"Jan","last_name":"Solovej","full_name":"Solovej, Jan"}],"quality_controlled":"1","oa_version":"Submitted Version","language":[{"iso":"eng"}],"volume":342,"month":"02","issue":"1","status":"public","main_file_link":[{"url":"http://arxiv.org/abs/1410.2352","open_access":"1"}],"date_created":"2018-12-11T11:53:04Z","type":"journal_article","_id":"1620","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","date_updated":"2021-01-12T06:52:03Z","department":[{"_id":"RoSe"}],"citation":{"mla":"Frank, Rupert, et al. “The External Field Dependence of the BCS Critical Temperature.” <i>Communications in Mathematical Physics</i>, vol. 342, no. 1, Springer, 2016, pp. 189–216, doi:<a href=\"https://doi.org/10.1007/s00220-015-2526-2\">10.1007/s00220-015-2526-2</a>.","short":"R. Frank, C. Hainzl, R. Seiringer, J. Solovej, Communications in Mathematical Physics 342 (2016) 189–216.","ista":"Frank R, Hainzl C, Seiringer R, Solovej J. 2016. The external field dependence of the BCS critical temperature. Communications in Mathematical Physics. 342(1), 189–216.","ama":"Frank R, Hainzl C, Seiringer R, Solovej J. The external field dependence of the BCS critical temperature. <i>Communications in Mathematical Physics</i>. 2016;342(1):189-216. doi:<a href=\"https://doi.org/10.1007/s00220-015-2526-2\">10.1007/s00220-015-2526-2</a>","chicago":"Frank, Rupert, Christian Hainzl, Robert Seiringer, and Jan Solovej. “The External Field Dependence of the BCS Critical Temperature.” <i>Communications in Mathematical Physics</i>. Springer, 2016. <a href=\"https://doi.org/10.1007/s00220-015-2526-2\">https://doi.org/10.1007/s00220-015-2526-2</a>.","apa":"Frank, R., Hainzl, C., Seiringer, R., &#38; Solovej, J. (2016). The external field dependence of the BCS critical temperature. <i>Communications in Mathematical Physics</i>. Springer. <a href=\"https://doi.org/10.1007/s00220-015-2526-2\">https://doi.org/10.1007/s00220-015-2526-2</a>","ieee":"R. Frank, C. Hainzl, R. Seiringer, and J. Solovej, “The external field dependence of the BCS critical temperature,” <i>Communications in Mathematical Physics</i>, vol. 342, no. 1. Springer, pp. 189–216, 2016."},"publisher":"Springer","date_published":"2016-02-01T00:00:00Z","title":"The external field dependence of the BCS critical temperature","abstract":[{"lang":"eng","text":"We consider the Bardeen–Cooper–Schrieffer free energy functional for particles interacting via a two-body potential on a microscopic scale and in the presence of weak external fields varying on a macroscopic scale. We study the influence of the external fields on the critical temperature. We show that in the limit where the ratio between the microscopic and macroscopic scale tends to zero, the next to leading order of the critical temperature is determined by the lowest eigenvalue of the linearization of the Ginzburg–Landau equation."}],"publication_status":"published","acknowledgement":"The authors are grateful to I. M. Sigal for useful discussions. Financial support from the US National Science Foundation through Grants PHY-1347399 and DMS-1363432 (R.L.F.), from the Danish council for independent research and from ERC Advanced Grant 321029 (J.P.S.) is acknowledged.","day":"01","doi":"10.1007/s00220-015-2526-2","page":"189 - 216","year":"2016","oa":1,"intvolume":"       342","publist_id":"5546","publication":"Communications in Mathematical Physics","scopus_import":1},{"quality_controlled":"1","project":[{"call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme","_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734"}],"oa_version":"Submitted Version","author":[{"first_name":"Douglas","last_name":"Lundholm","full_name":"Lundholm, Douglas"},{"full_name":"Nam, Phan","id":"404092F4-F248-11E8-B48F-1D18A9856A87","first_name":"Phan","last_name":"Nam"},{"full_name":"Portmann, Fabian","last_name":"Portmann","first_name":"Fabian"}],"month":"03","issue":"3","language":[{"iso":"eng"}],"volume":219,"date_created":"2018-12-11T11:53:05Z","_id":"1622","type":"journal_article","status":"public","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1501.04570"}],"ec_funded":1,"date_updated":"2021-01-12T06:52:04Z","department":[{"_id":"RoSe"}],"citation":{"short":"D. Lundholm, P. Nam, F. Portmann, Archive for Rational Mechanics and Analysis 219 (2016) 1343–1382.","mla":"Lundholm, Douglas, et al. “Fractional Hardy–Lieb–Thirring and Related Inequalities for Interacting Systems.” <i>Archive for Rational Mechanics and Analysis</i>, vol. 219, no. 3, Springer, 2016, pp. 1343–82, doi:<a href=\"https://doi.org/10.1007/s00205-015-0923-5\">10.1007/s00205-015-0923-5</a>.","ieee":"D. Lundholm, P. Nam, and F. Portmann, “Fractional Hardy–Lieb–Thirring and related Inequalities for interacting systems,” <i>Archive for Rational Mechanics and Analysis</i>, vol. 219, no. 3. Springer, pp. 1343–1382, 2016.","apa":"Lundholm, D., Nam, P., &#38; Portmann, F. (2016). Fractional Hardy–Lieb–Thirring and related Inequalities for interacting systems. <i>Archive for Rational Mechanics and Analysis</i>. Springer. <a href=\"https://doi.org/10.1007/s00205-015-0923-5\">https://doi.org/10.1007/s00205-015-0923-5</a>","ista":"Lundholm D, Nam P, Portmann F. 2016. Fractional Hardy–Lieb–Thirring and related Inequalities for interacting systems. Archive for Rational Mechanics and Analysis. 219(3), 1343–1382.","chicago":"Lundholm, Douglas, Phan Nam, and Fabian Portmann. “Fractional Hardy–Lieb–Thirring and Related Inequalities for Interacting Systems.” <i>Archive for Rational Mechanics and Analysis</i>. Springer, 2016. <a href=\"https://doi.org/10.1007/s00205-015-0923-5\">https://doi.org/10.1007/s00205-015-0923-5</a>.","ama":"Lundholm D, Nam P, Portmann F. Fractional Hardy–Lieb–Thirring and related Inequalities for interacting systems. <i>Archive for Rational Mechanics and Analysis</i>. 2016;219(3):1343-1382. doi:<a href=\"https://doi.org/10.1007/s00205-015-0923-5\">10.1007/s00205-015-0923-5</a>"},"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","abstract":[{"text":"We prove analogues of the Lieb–Thirring and Hardy–Lieb–Thirring inequalities for many-body quantum systems with fractional kinetic operators and homogeneous interaction potentials, where no anti-symmetry on the wave functions is assumed. These many-body inequalities imply interesting one-body interpolation inequalities, and we show that the corresponding one- and many-body inequalities are actually equivalent in certain cases.","lang":"eng"}],"publication_status":"published","publisher":"Springer","date_published":"2016-03-01T00:00:00Z","title":"Fractional Hardy–Lieb–Thirring and related Inequalities for interacting systems","oa":1,"acknowledgement":"We thank Jan  Philip  Solovej, Robert Seiringer and Vladimir Maz’ya for helpful discussions, as well as Rupert Frank\r\nand the anonymous referee for useful comments. Part of this work has been carried out during a visit at the Institut Mittag-Leffler (Stockholm). D.L. acknowledges financial support by the grant KAW 2010.0063 from the Knut and Alice Wallenberg Foundation and the Swedish Research Council grant no. 2013-4734. P.T.N. is supported by the People Programme (Marie Curie Actions) of the European Union’s Seventh Framework Programme (FP7/2007-2013) under REA grant agreement no. 291734. F.P. acknowledges support from the ERC project no. 321029 “The\r\nmathematics of the structure of matter”.","year":"2016","doi":"10.1007/s00205-015-0923-5","page":"1343 - 1382","day":"01","scopus_import":1,"intvolume":"       219","publist_id":"5542","publication":"Archive for Rational Mechanics and Analysis"},{"author":[{"full_name":"Kelleher, Jerome","first_name":"Jerome","last_name":"Kelleher"},{"last_name":"Etheridge","first_name":"Alison","full_name":"Etheridge, Alison"},{"full_name":"Véber, Amandine","first_name":"Amandine","last_name":"Véber"},{"id":"4880FE40-F248-11E8-B48F-1D18A9856A87","full_name":"Barton, Nicholas H","last_name":"Barton","first_name":"Nicholas H","orcid":"0000-0002-8548-5240"}],"oa_version":"Published Version","quality_controlled":"1","project":[{"grant_number":"250152","_id":"25B07788-B435-11E9-9278-68D0E5697425","name":"Limits to selection in biology and in evolutionary computation","call_identifier":"FP7"}],"volume":108,"language":[{"iso":"eng"}],"file":[{"access_level":"open_access","file_size":1684043,"checksum":"6a65ba187994d4ad86c1c509e0ff482a","file_id":"4865","creator":"system","relation":"main_file","file_name":"IST-2016-465-v1+1_1-s2.0-S0040580915001094-main.pdf","date_created":"2018-12-12T10:11:12Z","date_updated":"2020-07-14T12:45:07Z","content_type":"application/pdf"}],"month":"04","has_accepted_license":"1","status":"public","_id":"1631","type":"journal_article","date_created":"2018-12-11T11:53:08Z","ec_funded":1,"pubrep_id":"465","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"citation":{"apa":"Kelleher, J., Etheridge, A., Véber, A., &#38; Barton, N. H. (2016). Spread of pedigree versus genetic ancestry in spatially distributed populations. <i>Theoretical Population Biology</i>. Academic Press. <a href=\"https://doi.org/10.1016/j.tpb.2015.10.008\">https://doi.org/10.1016/j.tpb.2015.10.008</a>","ista":"Kelleher J, Etheridge A, Véber A, Barton NH. 2016. Spread of pedigree versus genetic ancestry in spatially distributed populations. Theoretical Population Biology. 108, 1–12.","chicago":"Kelleher, Jerome, Alison Etheridge, Amandine Véber, and Nicholas H Barton. “Spread of Pedigree versus Genetic Ancestry in Spatially Distributed Populations.” <i>Theoretical Population Biology</i>. Academic Press, 2016. <a href=\"https://doi.org/10.1016/j.tpb.2015.10.008\">https://doi.org/10.1016/j.tpb.2015.10.008</a>.","ama":"Kelleher J, Etheridge A, Véber A, Barton NH. Spread of pedigree versus genetic ancestry in spatially distributed populations. <i>Theoretical Population Biology</i>. 2016;108:1-12. doi:<a href=\"https://doi.org/10.1016/j.tpb.2015.10.008\">10.1016/j.tpb.2015.10.008</a>","ieee":"J. Kelleher, A. Etheridge, A. Véber, and N. H. Barton, “Spread of pedigree versus genetic ancestry in spatially distributed populations,” <i>Theoretical Population Biology</i>, vol. 108. Academic Press, pp. 1–12, 2016.","mla":"Kelleher, Jerome, et al. “Spread of Pedigree versus Genetic Ancestry in Spatially Distributed Populations.” <i>Theoretical Population Biology</i>, vol. 108, Academic Press, 2016, pp. 1–12, doi:<a href=\"https://doi.org/10.1016/j.tpb.2015.10.008\">10.1016/j.tpb.2015.10.008</a>.","short":"J. Kelleher, A. Etheridge, A. Véber, N.H. Barton, Theoretical Population Biology 108 (2016) 1–12."},"date_updated":"2021-01-12T06:52:07Z","department":[{"_id":"NiBa"}],"title":"Spread of pedigree versus genetic ancestry in spatially distributed populations","date_published":"2016-04-01T00:00:00Z","publisher":"Academic Press","file_date_updated":"2020-07-14T12:45:07Z","ddc":["576"],"abstract":[{"lang":"eng","text":"Ancestral processes are fundamental to modern population genetics and spatial structure has been the subject of intense interest for many years. Despite this interest, almost nothing is known about the distribution of the locations of pedigree or genetic ancestors. Using both spatially continuous and stepping-stone models, we show that the distribution of pedigree ancestors approaches a travelling wave, for which we develop two alternative approximations. The speed and width of the wave are sensitive to the local details of the model. After a short time, genetic ancestors spread far more slowly than pedigree ancestors, ultimately diffusing out with radius ## rather than spreading at constant speed. In contrast to the wave of pedigree ancestors, the spread of genetic ancestry is insensitive to the local details of the models."}],"publication_status":"published","year":"2016","day":"01","page":"1 - 12","doi":"10.1016/j.tpb.2015.10.008","oa":1,"publication":"Theoretical Population Biology","intvolume":"       108","publist_id":"5524","scopus_import":1},{"title":"A forward genetic screen for new regulators of auxin mediated degradation of auxin transport proteins in Arabidopsis thaliana","date_published":"2016-06-01T00:00:00Z","publisher":"Springer","file_date_updated":"2020-07-14T12:45:08Z","ddc":["581"],"abstract":[{"text":"The plant hormone auxin (indole-3-acetic acid) is a major regulator of plant growth and development including embryo and root patterning, lateral organ formation and growth responses to environmental stimuli. Auxin is directionally transported from cell to cell by the action of specific auxin influx [AUXIN-RESISTANT1 (AUX1)] and efflux [PIN-FORMED (PIN)] transport regulators, whose polar, subcellular localizations are aligned with the direction of the auxin flow. Auxin itself regulates its own transport by modulation of the expression and subcellular localization of the auxin transporters. Increased auxin levels promote the transcription of PIN2 and AUX1 genes as well as stabilize PIN proteins at the plasma membrane, whereas prolonged auxin exposure increases the turnover of PIN proteins and their degradation in the vacuole. In this study, we applied a forward genetic approach, to identify molecular components playing a role in the auxin-mediated degradation. We generated EMS-mutagenized Arabidopsis PIN2::PIN2:GFP, AUX1::AUX1:YFP eir1aux1 populations and designed a screen for mutants with persistently strong fluorescent signals of the tagged PIN2 and AUX1 after prolonged treatment with the synthetic auxin 2,4-dichlorophenoxyacetic acid (2,4-D). This approach yielded novel auxin degradation mutants defective in trafficking and degradation of PIN2 and AUX1 proteins and established a role for auxin-mediated degradation in plant development.","lang":"eng"}],"publication_status":"published","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","citation":{"ieee":"R. Zemová, M. Zwiewka, A. Bielach, H. Robert, and J. Friml, “A forward genetic screen for new regulators of auxin mediated degradation of auxin transport proteins in Arabidopsis thaliana,” <i>Journal of Plant Growth Regulation</i>, vol. 35, no. 2. Springer, pp. 465–476, 2016.","apa":"Zemová, R., Zwiewka, M., Bielach, A., Robert, H., &#38; Friml, J. (2016). A forward genetic screen for new regulators of auxin mediated degradation of auxin transport proteins in Arabidopsis thaliana. <i>Journal of Plant Growth Regulation</i>. Springer. <a href=\"https://doi.org/10.1007/s00344-015-9553-2\">https://doi.org/10.1007/s00344-015-9553-2</a>","ama":"Zemová R, Zwiewka M, Bielach A, Robert H, Friml J. A forward genetic screen for new regulators of auxin mediated degradation of auxin transport proteins in Arabidopsis thaliana. <i>Journal of Plant Growth Regulation</i>. 2016;35(2):465-476. doi:<a href=\"https://doi.org/10.1007/s00344-015-9553-2\">10.1007/s00344-015-9553-2</a>","chicago":"Zemová, Radka, Marta Zwiewka, Agnieszka Bielach, Hélène Robert, and Jiří Friml. “A Forward Genetic Screen for New Regulators of Auxin Mediated Degradation of Auxin Transport Proteins in Arabidopsis Thaliana.” <i>Journal of Plant Growth Regulation</i>. Springer, 2016. <a href=\"https://doi.org/10.1007/s00344-015-9553-2\">https://doi.org/10.1007/s00344-015-9553-2</a>.","ista":"Zemová R, Zwiewka M, Bielach A, Robert H, Friml J. 2016. A forward genetic screen for new regulators of auxin mediated degradation of auxin transport proteins in Arabidopsis thaliana. Journal of Plant Growth Regulation. 35(2), 465–476.","mla":"Zemová, Radka, et al. “A Forward Genetic Screen for New Regulators of Auxin Mediated Degradation of Auxin Transport Proteins in Arabidopsis Thaliana.” <i>Journal of Plant Growth Regulation</i>, vol. 35, no. 2, Springer, 2016, pp. 465–76, doi:<a href=\"https://doi.org/10.1007/s00344-015-9553-2\">10.1007/s00344-015-9553-2</a>.","short":"R. Zemová, M. Zwiewka, A. Bielach, H. Robert, J. Friml, Journal of Plant Growth Regulation 35 (2016) 465–476."},"date_updated":"2021-01-12T06:52:11Z","department":[{"_id":"JiFr"}],"publication":"Journal of Plant Growth Regulation","intvolume":"        35","publist_id":"5512","scopus_import":1,"day":"01","year":"2016","page":"465 - 476","doi":"10.1007/s00344-015-9553-2","acknowledgement":"European Social Fund (CZ.1.07/2.3.00/20.0043) and the Czech Science Foundation GAČR (GA13-40637S) to JF. ","oa":1,"volume":35,"language":[{"iso":"eng"}],"issue":"2","file":[{"date_updated":"2020-07-14T12:45:08Z","date_created":"2018-12-12T10:08:34Z","content_type":"application/pdf","file_name":"IST-2018-1001-v1+1_Zemova_JPlantGrowthRegul_2016_proofs.pdf","relation":"main_file","file_size":5637591,"access_level":"open_access","creator":"system","file_id":"4695","checksum":"0dc6a300cde6536ceedd2bcdd2060efb"}],"has_accepted_license":"1","month":"06","author":[{"last_name":"Zemová","first_name":"Radka","full_name":"Zemová, Radka"},{"full_name":"Zwiewka, Marta","first_name":"Marta","last_name":"Zwiewka"},{"first_name":"Agnieszka","last_name":"Bielach","full_name":"Bielach, Agnieszka"},{"first_name":"Hélène","last_name":"Robert","full_name":"Robert, Hélène"},{"orcid":"0000-0002-8302-7596","first_name":"Jirí","last_name":"Friml","full_name":"Friml, Jirí","id":"4159519E-F248-11E8-B48F-1D18A9856A87"}],"oa_version":"Preprint","quality_controlled":"1","pubrep_id":"1001","status":"public","_id":"1641","type":"journal_article","date_created":"2018-12-11T11:53:12Z"},{"intvolume":"      9452","publist_id":"5497","scopus_import":1,"doi":"10.1007/978-3-662-48797-6_6","year":"2016","day":"08","page":"121 - 145","oa":1,"date_published":"2016-01-08T00:00:00Z","file_date_updated":"2020-07-14T12:45:08Z","publisher":"Springer","title":"New realizations of somewhere statistically binding hashing and positional accumulators","abstract":[{"text":"A somewhere statistically binding (SSB) hash, introduced by Hubáček and Wichs (ITCS ’15), can be used to hash a long string x to a short digest y = H hk (x) using a public hashing-key hk. Furthermore, there is a way to set up the hash key hk to make it statistically binding on some arbitrary hidden position i, meaning that: (1) the digest y completely determines the i’th bit (or symbol) of x so that all pre-images of y have the same value in the i’th position, (2) it is computationally infeasible to distinguish the position i on which hk is statistically binding from any other position i’. Lastly, the hash should have a local opening property analogous to Merkle-Tree hashing, meaning that given x and y = H hk (x) it should be possible to create a short proof π that certifies the value of the i’th bit (or symbol) of x without having to provide the entire input x. A similar primitive called a positional accumulator, introduced by Koppula, Lewko and Waters (STOC ’15) further supports dynamic updates of the hashed value. These tools, which are interesting in their own right, also serve as one of the main technical components in several recent works building advanced applications from indistinguishability obfuscation (iO).\r\n\r\nThe prior constructions of SSB hashing and positional accumulators required fully homomorphic encryption (FHE) and iO respectively. In this work, we give new constructions of these tools based on well studied number-theoretic assumptions such as DDH, Phi-Hiding and DCR, as well as a general construction from lossy/injective functions.","lang":"eng"}],"publication_status":"published","ddc":["000"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","alternative_title":["LNCS"],"date_updated":"2021-01-12T06:52:16Z","department":[{"_id":"KrPi"}],"citation":{"short":"T. Okamoto, K.Z. Pietrzak, B. Waters, D. Wichs, in:, Springer, 2016, pp. 121–145.","mla":"Okamoto, Tatsuaki, et al. <i>New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators</i>. Vol. 9452, Springer, 2016, pp. 121–45, doi:<a href=\"https://doi.org/10.1007/978-3-662-48797-6_6\">10.1007/978-3-662-48797-6_6</a>.","ama":"Okamoto T, Pietrzak KZ, Waters B, Wichs D. New realizations of somewhere statistically binding hashing and positional accumulators. In: Vol 9452. Springer; 2016:121-145. doi:<a href=\"https://doi.org/10.1007/978-3-662-48797-6_6\">10.1007/978-3-662-48797-6_6</a>","chicago":"Okamoto, Tatsuaki, Krzysztof Z Pietrzak, Brent Waters, and Daniel Wichs. “New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators,” 9452:121–45. Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-662-48797-6_6\">https://doi.org/10.1007/978-3-662-48797-6_6</a>.","ista":"Okamoto T, Pietrzak KZ, Waters B, Wichs D. 2016. New realizations of somewhere statistically binding hashing and positional accumulators. ASIACRYPT: Theory and Application of Cryptology and Information Security, LNCS, vol. 9452, 121–145.","apa":"Okamoto, T., Pietrzak, K. Z., Waters, B., &#38; Wichs, D. (2016). New realizations of somewhere statistically binding hashing and positional accumulators (Vol. 9452, pp. 121–145). Presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Auckland, New Zealand: Springer. <a href=\"https://doi.org/10.1007/978-3-662-48797-6_6\">https://doi.org/10.1007/978-3-662-48797-6_6</a>","ieee":"T. Okamoto, K. Z. Pietrzak, B. Waters, and D. Wichs, “New realizations of somewhere statistically binding hashing and positional accumulators,” presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Auckland, New Zealand, 2016, vol. 9452, pp. 121–145."},"ec_funded":1,"conference":{"start_date":"2015-11-29","end_date":"2015-12-03","name":"ASIACRYPT: Theory and Application of Cryptology and Information Security","location":"Auckland, New Zealand"},"pubrep_id":"677","status":"public","date_created":"2018-12-11T11:53:16Z","_id":"1653","type":"conference","language":[{"iso":"eng"}],"volume":9452,"has_accepted_license":"1","month":"01","file":[{"content_type":"application/pdf","date_updated":"2020-07-14T12:45:08Z","date_created":"2018-12-12T10:12:05Z","file_name":"IST-2016-677-v1+1_869.pdf","relation":"main_file","creator":"system","checksum":"a57711cb660c5b17b42bb47275a00180","file_id":"4923","file_size":580088,"access_level":"open_access"}],"author":[{"full_name":"Okamoto, Tatsuaki","first_name":"Tatsuaki","last_name":"Okamoto"},{"full_name":"Pietrzak, Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z","last_name":"Pietrzak"},{"full_name":"Waters, Brent","first_name":"Brent","last_name":"Waters"},{"last_name":"Wichs","first_name":"Daniel","full_name":"Wichs, Daniel"}],"project":[{"name":"Provable Security for Physical Cryptography","_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668","call_identifier":"FP7"}],"quality_controlled":"1","oa_version":"Submitted Version"},{"file_date_updated":"2020-07-14T12:45:10Z","publisher":"Academic Press","date_published":"2016-01-10T00:00:00Z","title":"Approximation and convergence of the intrinsic volume","publication_status":"published","abstract":[{"text":"We introduce a modification of the classic notion of intrinsic volume using persistence moments of height functions. Evaluating the modified first intrinsic volume on digital approximations of a compact body with smoothly embedded boundary in Rn, we prove convergence to the first intrinsic volume of the body as the resolution of the approximation improves. We have weaker results for the other modified intrinsic volumes, proving they converge to the corresponding intrinsic volumes of the n-dimensional unit ball.","lang":"eng"}],"ddc":["004"],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","image":"/images/cc_by_nc_nd.png","name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","short":"CC BY-NC-ND (4.0)"},"department":[{"_id":"HeEd"}],"date_updated":"2023-09-07T11:41:25Z","citation":{"ieee":"H. Edelsbrunner and F. Pausinger, “Approximation and convergence of the intrinsic volume,” <i>Advances in Mathematics</i>, vol. 287. Academic Press, pp. 674–703, 2016.","apa":"Edelsbrunner, H., &#38; Pausinger, F. (2016). Approximation and convergence of the intrinsic volume. <i>Advances in Mathematics</i>. Academic Press. <a href=\"https://doi.org/10.1016/j.aim.2015.10.004\">https://doi.org/10.1016/j.aim.2015.10.004</a>","chicago":"Edelsbrunner, Herbert, and Florian Pausinger. “Approximation and Convergence of the Intrinsic Volume.” <i>Advances in Mathematics</i>. Academic Press, 2016. <a href=\"https://doi.org/10.1016/j.aim.2015.10.004\">https://doi.org/10.1016/j.aim.2015.10.004</a>.","ista":"Edelsbrunner H, Pausinger F. 2016. Approximation and convergence of the intrinsic volume. Advances in Mathematics. 287, 674–703.","ama":"Edelsbrunner H, Pausinger F. Approximation and convergence of the intrinsic volume. <i>Advances in Mathematics</i>. 2016;287:674-703. doi:<a href=\"https://doi.org/10.1016/j.aim.2015.10.004\">10.1016/j.aim.2015.10.004</a>","short":"H. Edelsbrunner, F. Pausinger, Advances in Mathematics 287 (2016) 674–703.","mla":"Edelsbrunner, Herbert, and Florian Pausinger. “Approximation and Convergence of the Intrinsic Volume.” <i>Advances in Mathematics</i>, vol. 287, Academic Press, 2016, pp. 674–703, doi:<a href=\"https://doi.org/10.1016/j.aim.2015.10.004\">10.1016/j.aim.2015.10.004</a>."},"publist_id":"5488","intvolume":"       287","publication":"Advances in Mathematics","scopus_import":1,"related_material":{"record":[{"status":"public","id":"1399","relation":"dissertation_contains"}]},"acknowledgement":"This research is partially supported by the Toposys project FP7-ICT-318493-STREP, and by ESF under the ACAT Research Network Programme.\r\nBoth authors thank Anne Marie Svane for her comments on an early version of this paper. The second author wishes to thank Eva B. Vedel Jensen and Markus Kiderlen from Aarhus University for enlightening discussions and their kind hospitality during a visit of their department in 2014.","year":"2016","day":"10","page":"674 - 703","doi":"10.1016/j.aim.2015.10.004","oa":1,"language":[{"iso":"eng"}],"volume":287,"has_accepted_license":"1","month":"01","file":[{"creator":"system","checksum":"f8869ec110c35c852ef6a37425374af7","file_id":"4928","file_size":248985,"access_level":"open_access","relation":"main_file","file_name":"IST-2017-774-v1+1_2016-J-03-FirstIntVolume.pdf","content_type":"application/pdf","date_updated":"2020-07-14T12:45:10Z","date_created":"2018-12-12T10:12:10Z"}],"author":[{"last_name":"Edelsbrunner","first_name":"Herbert","orcid":"0000-0002-9823-6833","id":"3FB178DA-F248-11E8-B48F-1D18A9856A87","full_name":"Edelsbrunner, Herbert"},{"id":"2A77D7A2-F248-11E8-B48F-1D18A9856A87","full_name":"Pausinger, Florian","last_name":"Pausinger","first_name":"Florian","orcid":"0000-0002-8379-3768"}],"project":[{"call_identifier":"FP7","name":"Topological Complex Systems","grant_number":"318493","_id":"255D761E-B435-11E9-9278-68D0E5697425"}],"quality_controlled":"1","oa_version":"Published Version","ec_funded":1,"pubrep_id":"774","status":"public","date_created":"2018-12-11T11:53:20Z","type":"journal_article","_id":"1662"},{"project":[{"call_identifier":"FP7","grant_number":"267989","_id":"25EE3708-B435-11E9-9278-68D0E5697425","name":"Quantitative Reactive Modeling"},{"call_identifier":"FWF","name":"The Wittgenstein Prize","grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425"},{"name":"Rigorous Systems Engineering","_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23","call_identifier":"FWF"}],"quality_controlled":"1","oa_version":"Published Version","author":[{"full_name":"Bogomolov, Sergiy","id":"369D9A44-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-0686-0365","first_name":"Sergiy","last_name":"Bogomolov"},{"first_name":"Alexandre","last_name":"Donzé","full_name":"Donzé, Alexandre"},{"last_name":"Frehse","first_name":"Goran","full_name":"Frehse, Goran"},{"full_name":"Grosu, Radu","first_name":"Radu","last_name":"Grosu"},{"last_name":"Johnson","first_name":"Taylor","full_name":"Johnson, Taylor"},{"full_name":"Ladan, Hamed","last_name":"Ladan","first_name":"Hamed"},{"full_name":"Podelski, Andreas","first_name":"Andreas","last_name":"Podelski"},{"last_name":"Wehrle","first_name":"Martin","full_name":"Wehrle, Martin"}],"month":"08","has_accepted_license":"1","issue":"4","file":[{"file_name":"IST-2016-457-v1+1_s10009-015-0393-y.pdf","date_updated":"2020-07-14T12:45:13Z","date_created":"2018-12-12T10:15:26Z","content_type":"application/pdf","file_size":2296522,"access_level":"open_access","creator":"system","checksum":"31561d7705599a9bd4ea816accc0752e","file_id":"5146","relation":"main_file"}],"language":[{"iso":"eng"}],"article_processing_charge":"Yes (via OA deal)","volume":18,"date_created":"2018-12-11T11:53:34Z","_id":"1705","type":"journal_article","status":"public","pubrep_id":"457","ec_funded":1,"date_updated":"2021-01-12T06:52:38Z","department":[{"_id":"ToHe"}],"citation":{"apa":"Bogomolov, S., Donzé, A., Frehse, G., Grosu, R., Johnson, T., Ladan, H., … Wehrle, M. (2016). Guided search for hybrid systems based on coarse-grained space abstractions. <i>International Journal on Software Tools for Technology Transfer</i>. Springer. <a href=\"https://doi.org/10.1007/s10009-015-0393-y\">https://doi.org/10.1007/s10009-015-0393-y</a>","ista":"Bogomolov S, Donzé A, Frehse G, Grosu R, Johnson T, Ladan H, Podelski A, Wehrle M. 2016. Guided search for hybrid systems based on coarse-grained space abstractions. International Journal on Software Tools for Technology Transfer. 18(4), 449–467.","chicago":"Bogomolov, Sergiy, Alexandre Donzé, Goran Frehse, Radu Grosu, Taylor Johnson, Hamed Ladan, Andreas Podelski, and Martin Wehrle. “Guided Search for Hybrid Systems Based on Coarse-Grained Space Abstractions.” <i>International Journal on Software Tools for Technology Transfer</i>. Springer, 2016. <a href=\"https://doi.org/10.1007/s10009-015-0393-y\">https://doi.org/10.1007/s10009-015-0393-y</a>.","ama":"Bogomolov S, Donzé A, Frehse G, et al. Guided search for hybrid systems based on coarse-grained space abstractions. <i>International Journal on Software Tools for Technology Transfer</i>. 2016;18(4):449-467. doi:<a href=\"https://doi.org/10.1007/s10009-015-0393-y\">10.1007/s10009-015-0393-y</a>","ieee":"S. Bogomolov <i>et al.</i>, “Guided search for hybrid systems based on coarse-grained space abstractions,” <i>International Journal on Software Tools for Technology Transfer</i>, vol. 18, no. 4. Springer, pp. 449–467, 2016.","mla":"Bogomolov, Sergiy, et al. “Guided Search for Hybrid Systems Based on Coarse-Grained Space Abstractions.” <i>International Journal on Software Tools for Technology Transfer</i>, vol. 18, no. 4, Springer, 2016, pp. 449–67, doi:<a href=\"https://doi.org/10.1007/s10009-015-0393-y\">10.1007/s10009-015-0393-y</a>.","short":"S. Bogomolov, A. Donzé, G. Frehse, R. Grosu, T. Johnson, H. Ladan, A. Podelski, M. Wehrle, International Journal on Software Tools for Technology Transfer 18 (2016) 449–467."},"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"abstract":[{"text":"Hybrid systems represent an important and powerful formalism for modeling real-world applications such as embedded systems. A verification tool like SpaceEx is based on the exploration of a symbolic search space (the region space). As a verification tool, it is typically optimized towards proving the absence of errors. In some settings, e.g., when the verification tool is employed in a feedback-directed design cycle, one would like to have the option to call a version that is optimized towards finding an error trajectory in the region space. A recent approach in this direction is based on guided search. Guided search relies on a cost function that indicates which states are promising to be explored, and preferably explores more promising states first. In this paper, we propose an abstraction-based cost function based on coarse-grained space abstractions for guiding the reachability analysis. For this purpose, a suitable abstraction technique that exploits the flexible granularity of modern reachability analysis algorithms is introduced. The new cost function is an effective extension of pattern database approaches that have been successfully applied in other areas. The approach has been implemented in the SpaceEx model checker. The evaluation shows its practical potential.","lang":"eng"}],"publication_status":"published","ddc":["000"],"file_date_updated":"2020-07-14T12:45:13Z","publisher":"Springer","date_published":"2016-08-01T00:00:00Z","title":"Guided search for hybrid systems based on coarse-grained space abstractions","oa":1,"doi":"10.1007/s10009-015-0393-y","page":"449 - 467","year":"2016","day":"01","scopus_import":1,"intvolume":"        18","publist_id":"5431","publication":"International Journal on Software Tools for Technology Transfer"},{"title":"Square-free values of reducible polynomials","date_published":"2016-06-01T00:00:00Z","publication_status":"published","abstract":[{"lang":"eng","text":"We calculate admissible values of r such that a square-free polynomial with integer coefficients, no fixed prime divisor and irreducible factors of degree at most 3 takes infinitely many values that are a product of at most r distinct primes."}],"external_id":{"arxiv":["1511.00601"]},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","citation":{"short":"T.D. Browning, A. Booker, Discrete Analysis 8 (2016) 1–18.","mla":"Browning, Timothy D., and Andrew Booker. “Square-Free Values of Reducible Polynomials.” <i>Discrete Analysis</i>, vol. 8, 2016, pp. 1–18, doi:<a href=\"https://doi.org/10.19086/da.732\">10.19086/da.732</a>.","ieee":"T. D. Browning and A. Booker, “Square-free values of reducible polynomials,” <i>Discrete Analysis</i>, vol. 8. pp. 1–18, 2016.","apa":"Browning, T. D., &#38; Booker, A. (2016). Square-free values of reducible polynomials. <i>Discrete Analysis</i>. <a href=\"https://doi.org/10.19086/da.732\">https://doi.org/10.19086/da.732</a>","ista":"Browning TD, Booker A. 2016. Square-free values of reducible polynomials. Discrete Analysis. 8, 1–18.","chicago":"Browning, Timothy D, and Andrew Booker. “Square-Free Values of Reducible Polynomials.” <i>Discrete Analysis</i>, 2016. <a href=\"https://doi.org/10.19086/da.732\">https://doi.org/10.19086/da.732</a>.","ama":"Browning TD, Booker A. Square-free values of reducible polynomials. <i>Discrete Analysis</i>. 2016;8:1-18. doi:<a href=\"https://doi.org/10.19086/da.732\">10.19086/da.732</a>"},"extern":"1","date_updated":"2021-01-12T06:52:49Z","publication":"Discrete Analysis","publist_id":"7748","arxiv":1,"intvolume":"         8","year":"2016","day":"01","page":"1 - 18","doi":"10.19086/da.732","oa":1,"volume":8,"article_processing_charge":"No","language":[{"iso":"eng"}],"month":"06","author":[{"full_name":"Browning, Timothy D","id":"35827D50-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8314-0177","last_name":"Browning","first_name":"Timothy D"},{"full_name":"Booker, Andrew","first_name":"Andrew","last_name":"Booker"}],"oa_version":"Preprint","quality_controlled":"1","main_file_link":[{"url":"https://arxiv.org/abs/1511.00601","open_access":"1"}],"status":"public","article_type":"original","type":"journal_article","_id":"173","date_created":"2018-12-11T11:45:00Z"},{"oa_version":"Preprint","project":[{"name":"Discrete Optimization in Computer Vision: Theory and Practice","grant_number":"616160","_id":"25FBA906-B435-11E9-9278-68D0E5697425","call_identifier":"FP7"}],"quality_controlled":"1","author":[{"full_name":"Kolmogorov, Vladimir","id":"3D50B0BA-F248-11E8-B48F-1D18A9856A87","last_name":"Kolmogorov","first_name":"Vladimir"},{"last_name":"Takhanov","first_name":"Rustem","id":"2CCAC26C-F248-11E8-B48F-1D18A9856A87","full_name":"Takhanov, Rustem"}],"issue":"1","month":"09","volume":76,"language":[{"iso":"eng"}],"_id":"1794","type":"journal_article","date_created":"2018-12-11T11:54:02Z","main_file_link":[{"url":"http://arxiv.org/abs/1210.0508","open_access":"1"}],"status":"public","ec_funded":1,"citation":{"mla":"Kolmogorov, Vladimir, and Rustem Takhanov. “Inference Algorithms for Pattern-Based CRFs on Sequence Data.” <i>Algorithmica</i>, vol. 76, no. 1, Springer, 2016, pp. 17–46, doi:<a href=\"https://doi.org/10.1007/s00453-015-0017-7\">10.1007/s00453-015-0017-7</a>.","short":"V. Kolmogorov, R. Takhanov, Algorithmica 76 (2016) 17–46.","ieee":"V. Kolmogorov and R. Takhanov, “Inference algorithms for pattern-based CRFs on sequence data,” <i>Algorithmica</i>, vol. 76, no. 1. Springer, pp. 17–46, 2016.","chicago":"Kolmogorov, Vladimir, and Rustem Takhanov. “Inference Algorithms for Pattern-Based CRFs on Sequence Data.” <i>Algorithmica</i>. Springer, 2016. <a href=\"https://doi.org/10.1007/s00453-015-0017-7\">https://doi.org/10.1007/s00453-015-0017-7</a>.","ama":"Kolmogorov V, Takhanov R. Inference algorithms for pattern-based CRFs on sequence data. <i>Algorithmica</i>. 2016;76(1):17-46. doi:<a href=\"https://doi.org/10.1007/s00453-015-0017-7\">10.1007/s00453-015-0017-7</a>","ista":"Kolmogorov V, Takhanov R. 2016. Inference algorithms for pattern-based CRFs on sequence data. Algorithmica. 76(1), 17–46.","apa":"Kolmogorov, V., &#38; Takhanov, R. (2016). Inference algorithms for pattern-based CRFs on sequence data. <i>Algorithmica</i>. Springer. <a href=\"https://doi.org/10.1007/s00453-015-0017-7\">https://doi.org/10.1007/s00453-015-0017-7</a>"},"department":[{"_id":"VlKo"}],"date_updated":"2023-10-17T09:51:31Z","external_id":{"arxiv":["1210.0508"]},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publication_status":"published","abstract":[{"text":"We consider Conditional random fields (CRFs) with pattern-based potentials defined on a chain. In this model the energy of a string (labeling) (Formula presented.) is the sum of terms over intervals [i, j] where each term is non-zero only if the substring (Formula presented.) equals a prespecified pattern w. Such CRFs can be naturally applied to many sequence tagging problems. We present efficient algorithms for the three standard inference tasks in a CRF, namely computing (i) the partition function, (ii) marginals, and (iii) computing the MAP. Their complexities are respectively (Formula presented.), (Formula presented.) and (Formula presented.) where L is the combined length of input patterns, (Formula presented.) is the maximum length of a pattern, and D is the input alphabet. This improves on the previous algorithms of Ye et al. (NIPS, 2009) whose complexities are respectively (Formula presented.), (Formula presented.) and (Formula presented.), where (Formula presented.) is the number of input patterns. In addition, we give an efficient algorithm for sampling, and revisit the case of MAP with non-positive weights.","lang":"eng"}],"title":"Inference algorithms for pattern-based CRFs on sequence data","date_published":"2016-09-01T00:00:00Z","publisher":"Springer","oa":1,"page":"17 - 46","day":"01","doi":"10.1007/s00453-015-0017-7","year":"2016","acknowledgement":"This work has been partially supported by the European Research Council under the European Unions Seventh Framework Programme (FP7/2007-2013)/ERC grant agreement no. 616160.","scopus_import":1,"related_material":{"record":[{"status":"public","relation":"earlier_version","id":"2272"}]},"publication":"Algorithmica","publist_id":"5316","arxiv":1,"intvolume":"        76"},{"scopus_import":1,"publist_id":"5270","intvolume":"       143","publication":"Journal of Multivariate Analysis","oa":1,"date_created":"2018-12-11T11:54:15Z","type":"journal_article","_id":"1833","status":"public","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1501.00600"}],"day":"01","year":"2016","page":"440 - 452","doi":"10.1016/j.jmva.2015.10.005","month":"01","publication_status":"published","abstract":[{"text":"Relational models for contingency tables are generalizations of log-linear models, allowing effects associated with arbitrary subsets of cells in the table, and not necessarily containing the overall effect, that is, a common parameter in every cell. Similarly to log-linear models, relational models can be extended to non-negative distributions, but the extension requires more complex methods. An extended relational model is defined as an algebraic variety, and it turns out to be the closure of the original model with respect to the Bregman divergence. In the extended relational model, the MLE of the cell parameters always exists and is unique, but some of its properties may be different from those of the MLE under log-linear models. The MLE can be computed using a generalized iterative scaling procedure based on Bregman projections. ","lang":"eng"}],"date_published":"2016-01-01T00:00:00Z","language":[{"iso":"eng"}],"publisher":"Elsevier","title":"On the closure of relational models","volume":143,"department":[{"_id":"CaUh"}],"quality_controlled":"1","date_updated":"2021-01-12T06:53:30Z","citation":{"apa":"Klimova, A., &#38; Rudas, T. (2016). On the closure of relational models. <i>Journal of Multivariate Analysis</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.jmva.2015.10.005\">https://doi.org/10.1016/j.jmva.2015.10.005</a>","ama":"Klimova A, Rudas T. On the closure of relational models. <i>Journal of Multivariate Analysis</i>. 2016;143:440-452. doi:<a href=\"https://doi.org/10.1016/j.jmva.2015.10.005\">10.1016/j.jmva.2015.10.005</a>","chicago":"Klimova, Anna, and Tamás Rudas. “On the Closure of Relational Models.” <i>Journal of Multivariate Analysis</i>. Elsevier, 2016. <a href=\"https://doi.org/10.1016/j.jmva.2015.10.005\">https://doi.org/10.1016/j.jmva.2015.10.005</a>.","ista":"Klimova A, Rudas T. 2016. On the closure of relational models. Journal of Multivariate Analysis. 143, 440–452.","ieee":"A. Klimova and T. Rudas, “On the closure of relational models,” <i>Journal of Multivariate Analysis</i>, vol. 143. Elsevier, pp. 440–452, 2016.","mla":"Klimova, Anna, and Tamás Rudas. “On the Closure of Relational Models.” <i>Journal of Multivariate Analysis</i>, vol. 143, Elsevier, 2016, pp. 440–52, doi:<a href=\"https://doi.org/10.1016/j.jmva.2015.10.005\">10.1016/j.jmva.2015.10.005</a>.","short":"A. Klimova, T. Rudas, Journal of Multivariate Analysis 143 (2016) 440–452."},"oa_version":"Preprint","author":[{"first_name":"Anna","last_name":"Klimova","id":"31934120-F248-11E8-B48F-1D18A9856A87","full_name":"Klimova, Anna"},{"full_name":"Rudas, Tamás","last_name":"Rudas","first_name":"Tamás"}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87"},{"publication_status":"published","abstract":[{"text":"We consider random matrices of the form H=W+λV, λ∈ℝ+, where W is a real symmetric or complex Hermitian Wigner matrix of size N and V is a real bounded diagonal random matrix of size N with i.i.d.\\ entries that are independent of W. We assume subexponential decay for the matrix entries of W and we choose λ∼1, so that the eigenvalues of W and λV are typically of the same order. Further, we assume that the density of the entries of V is supported on a single interval and is convex near the edges of its support. In this paper we prove that there is λ+∈ℝ+ such that the largest eigenvalues of H are in the limit of large N determined by the order statistics of V for λ&gt;λ+. In particular, the largest eigenvalue of H has a Weibull distribution in the limit N→∞ if λ&gt;λ+. Moreover, for N sufficiently large, we show that the eigenvectors associated to the largest eigenvalues are partially localized for λ&gt;λ+, while they are completely delocalized for λ&lt;λ+. Similar results hold for the lowest eigenvalues. ","lang":"eng"}],"publisher":"Springer","date_published":"2016-02-01T00:00:00Z","title":"Extremal eigenvalues and eigenvectors of deformed Wigner matrices","department":[{"_id":"LaEr"}],"date_updated":"2021-01-12T06:53:49Z","citation":{"short":"J. Lee, K. Schnelli, Probability Theory and Related Fields 164 (2016) 165–241.","mla":"Lee, Jioon, and Kevin Schnelli. “Extremal Eigenvalues and Eigenvectors of Deformed Wigner Matrices.” <i>Probability Theory and Related Fields</i>, vol. 164, no. 1–2, Springer, 2016, pp. 165–241, doi:<a href=\"https://doi.org/10.1007/s00440-014-0610-8\">10.1007/s00440-014-0610-8</a>.","apa":"Lee, J., &#38; Schnelli, K. (2016). Extremal eigenvalues and eigenvectors of deformed Wigner matrices. <i>Probability Theory and Related Fields</i>. Springer. <a href=\"https://doi.org/10.1007/s00440-014-0610-8\">https://doi.org/10.1007/s00440-014-0610-8</a>","chicago":"Lee, Jioon, and Kevin Schnelli. “Extremal Eigenvalues and Eigenvectors of Deformed Wigner Matrices.” <i>Probability Theory and Related Fields</i>. Springer, 2016. <a href=\"https://doi.org/10.1007/s00440-014-0610-8\">https://doi.org/10.1007/s00440-014-0610-8</a>.","ista":"Lee J, Schnelli K. 2016. Extremal eigenvalues and eigenvectors of deformed Wigner matrices. Probability Theory and Related Fields. 164(1–2), 165–241.","ama":"Lee J, Schnelli K. Extremal eigenvalues and eigenvectors of deformed Wigner matrices. <i>Probability Theory and Related Fields</i>. 2016;164(1-2):165-241. doi:<a href=\"https://doi.org/10.1007/s00440-014-0610-8\">10.1007/s00440-014-0610-8</a>","ieee":"J. Lee and K. Schnelli, “Extremal eigenvalues and eigenvectors of deformed Wigner matrices,” <i>Probability Theory and Related Fields</i>, vol. 164, no. 1–2. Springer, pp. 165–241, 2016."},"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","scopus_import":1,"publist_id":"5215","intvolume":"       164","publication":"Probability Theory and Related Fields","oa":1,"acknowledgement":"Most of the presented work was obtained while Kevin Schnelli was staying at the IAS with the support of\r\nThe Fund For Math.","page":"165 - 241","doi":"10.1007/s00440-014-0610-8","year":"2016","day":"01","month":"02","issue":"1-2","language":[{"iso":"eng"}],"volume":164,"quality_controlled":"1","project":[{"call_identifier":"FP7","grant_number":"338804","_id":"258DCDE6-B435-11E9-9278-68D0E5697425","name":"Random matrices, universality and disordered quantum systems"}],"oa_version":"Preprint","author":[{"first_name":"Jioon","last_name":"Lee","full_name":"Lee, Jioon"},{"last_name":"Schnelli","first_name":"Kevin","orcid":"0000-0003-0954-3231","id":"434AD0AE-F248-11E8-B48F-1D18A9856A87","full_name":"Schnelli, Kevin"}],"ec_funded":1,"date_created":"2018-12-11T11:54:31Z","type":"journal_article","_id":"1881","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1310.7057"}],"status":"public"},{"date_created":"2019-07-31T06:03:49Z","_id":"6732","type":"journal_article","article_type":"original","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1501.02444"}],"publication_identifier":{"eissn":["1557-9654"],"issn":["0018-9448"]},"status":"public","quality_controlled":"1","oa_version":"Preprint","author":[{"full_name":"Mondelli, Marco","id":"27EB676C-8706-11E9-9510-7717E6697425","orcid":"0000-0002-3242-7020","first_name":"Marco","last_name":"Mondelli"},{"full_name":"Hassani, S. Hamed","last_name":"Hassani","first_name":"S. Hamed"},{"last_name":"Urbanke","first_name":"Rudiger L.","full_name":"Urbanke, Rudiger L."}],"month":"12","issue":"12","language":[{"iso":"eng"}],"volume":62,"oa":1,"page":"6698-6712","doi":"10.1109/tit.2016.2616117","year":"2016","day":"01","intvolume":"        62","arxiv":1,"publication":"IEEE Transactions on Information Theory","date_updated":"2021-01-12T08:08:44Z","extern":"1","citation":{"mla":"Mondelli, Marco, et al. “Unified Scaling of Polar Codes: Error Exponent, Scaling Exponent, Moderate Deviations, and Error Floors.” <i>IEEE Transactions on Information Theory</i>, vol. 62, no. 12, IEEE, 2016, pp. 6698–712, doi:<a href=\"https://doi.org/10.1109/tit.2016.2616117\">10.1109/tit.2016.2616117</a>.","short":"M. Mondelli, S.H. Hassani, R.L. Urbanke, IEEE Transactions on Information Theory 62 (2016) 6698–6712.","apa":"Mondelli, M., Hassani, S. H., &#38; Urbanke, R. L. (2016). Unified scaling of polar codes: Error exponent, scaling exponent, moderate deviations, and error floors. <i>IEEE Transactions on Information Theory</i>. IEEE. <a href=\"https://doi.org/10.1109/tit.2016.2616117\">https://doi.org/10.1109/tit.2016.2616117</a>","ama":"Mondelli M, Hassani SH, Urbanke RL. Unified scaling of polar codes: Error exponent, scaling exponent, moderate deviations, and error floors. <i>IEEE Transactions on Information Theory</i>. 2016;62(12):6698-6712. doi:<a href=\"https://doi.org/10.1109/tit.2016.2616117\">10.1109/tit.2016.2616117</a>","ista":"Mondelli M, Hassani SH, Urbanke RL. 2016. Unified scaling of polar codes: Error exponent, scaling exponent, moderate deviations, and error floors. IEEE Transactions on Information Theory. 62(12), 6698–6712.","chicago":"Mondelli, Marco, S. Hamed Hassani, and Rudiger L. Urbanke. “Unified Scaling of Polar Codes: Error Exponent, Scaling Exponent, Moderate Deviations, and Error Floors.” <i>IEEE Transactions on Information Theory</i>. IEEE, 2016. <a href=\"https://doi.org/10.1109/tit.2016.2616117\">https://doi.org/10.1109/tit.2016.2616117</a>.","ieee":"M. Mondelli, S. H. Hassani, and R. L. Urbanke, “Unified scaling of polar codes: Error exponent, scaling exponent, moderate deviations, and error floors,” <i>IEEE Transactions on Information Theory</i>, vol. 62, no. 12. IEEE, pp. 6698–6712, 2016."},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","external_id":{"arxiv":["1501.02444"]},"abstract":[{"text":"Consider the transmission of a polar code of block length N and rate R over a binary memoryless symmetric channel W and let P e be the block error probability under successive cancellation decoding. In this paper, we develop new bounds that characterize the relationship of the parameters R, N, P e , and the quality of the channel W quantified by its capacity I(W) and its Bhattacharyya parameter Z(W). In previous work, two main regimes were studied. In the error exponent regime, the channel W and the rate R <; I(W) are fixed, and it was proved that the error probability Pe scales roughly as 2 -√N . In the scaling exponent approach, the channel W and the error probability Pe are fixed and it was proved that the gap to capacity I(W) - R scales as N -1/μ . Here, μ is called scaling exponent and this scaling exponent depends on the channel W. A heuristic computation for the binary erasure channel (BEC) gives μ = 3.627 and it was shown that, for any channel W, 3.579 ≤ μ ≤ 5.702. Our contributions are as follows. First, we provide the tighter upper bound μ <;≤ 4.714 valid for any W. With the same technique, we obtain the upper bound μ ≤ 3.639 for the case of the BEC; this upper bound approaches very closely the heuristically derived value for the scaling exponent of the erasure channel. Second, we develop a trade-off between the gap to capacity I(W)- R and the error probability Pe as the functions of the block length N. In other words, we neither fix the gap to capacity (error exponent regime) nor the error probability (scaling exponent regime), but we do consider a moderate deviations regime in which we study how fast both quantities, as the functions of the block length N, simultaneously go to 0. Third, we prove that polar codes are not affected by error floors. To do so, we fix a polar code of block length N and rate R. Then, we vary the channel W and study the impact of this variation on the error probability. We show that the error probability Pe scales as the Bhattacharyya parameter Z(W) raised to a power that scales roughly like VN. This agrees with the scaling in the error exponent regime.","lang":"eng"}],"publication_status":"published","date_published":"2016-12-01T00:00:00Z","publisher":"IEEE","title":"Unified scaling of polar codes: Error exponent, scaling exponent, moderate deviations, and error floors"},{"arxiv":1,"conference":{"end_date":"2016-07-15","start_date":"2016-07-10","name":"ISIT: International Symposium on Information Theory","location":"Barcelona, Spain"},"publication":"2016 IEEE International Symposium on Information Theory ","date_created":"2019-07-31T06:36:16Z","oa":1,"type":"conference","_id":"6733","status":"public","year":"2016","day":"11","page":"1755-1759","doi":"10.1109/isit.2016.7541600","main_file_link":[{"url":"https://arxiv.org/abs/1601.06048","open_access":"1"}],"month":"08","publication_status":"published","abstract":[{"text":"The question whether RM codes are capacity-achieving is a long-standing open problem in coding theory that was recently answered in the affirmative for transmission over erasure channels [1], [2]. Remarkably, the proof does not rely on specific properties of RM codes, apart from their symmetry. Indeed, the main technical result consists in showing that any sequence of linear codes, with doubly-transitive permutation groups, achieves capacity on the memoryless erasure channel under bit-MAP decoding. Thus, a natural question is what happens under block-MAP decoding. In [1], [2], by exploiting further symmetries of the code, the bit-MAP threshold was shown to be sharp enough so that the block erasure probability also converges to 0. However, this technique relies heavily on the fact that the transmission is over an erasure channel. We present an alternative approach to strengthen results regarding the bit-MAP threshold to block-MAP thresholds. This approach is based on a careful analysis of the weight distribution of RM codes. In particular, the flavor of the main result is the following: assume that the bit-MAP error probability decays as N -δ , for some δ > 0. Then, the block-MAP error probability also converges to 0. This technique applies to transmission over any binary memoryless symmetric channel. Thus, it can be thought of as a first step in extending the proof that RM codes are capacity-achieving to the general case.","lang":"eng"}],"language":[{"iso":"eng"}],"publisher":"IEEE","date_published":"2016-08-11T00:00:00Z","title":"Comparing the bit-MAP and block-MAP decoding thresholds of Reed-Muller codes on BMS channels","extern":"1","quality_controlled":"1","date_updated":"2021-01-12T08:08:44Z","oa_version":"Preprint","citation":{"mla":"Kudekar, Shrinivas, et al. “Comparing the Bit-MAP and Block-MAP Decoding Thresholds of Reed-Muller Codes on BMS Channels.” <i>2016 IEEE International Symposium on Information Theory </i>, IEEE, 2016, pp. 1755–59, doi:<a href=\"https://doi.org/10.1109/isit.2016.7541600\">10.1109/isit.2016.7541600</a>.","short":"S. Kudekar, S. Kumar, M. Mondelli, H.D. Pfister, R. Urbankez, in:, 2016 IEEE International Symposium on Information Theory , IEEE, 2016, pp. 1755–1759.","apa":"Kudekar, S., Kumar, S., Mondelli, M., Pfister, H. D., &#38; Urbankez, R. (2016). Comparing the bit-MAP and block-MAP decoding thresholds of Reed-Muller codes on BMS channels. In <i>2016 IEEE International Symposium on Information Theory </i> (pp. 1755–1759). Barcelona, Spain: IEEE. <a href=\"https://doi.org/10.1109/isit.2016.7541600\">https://doi.org/10.1109/isit.2016.7541600</a>","ista":"Kudekar S, Kumar S, Mondelli M, Pfister HD, Urbankez R. 2016. Comparing the bit-MAP and block-MAP decoding thresholds of Reed-Muller codes on BMS channels. 2016 IEEE International Symposium on Information Theory . ISIT: International Symposium on Information Theory, 1755–1759.","ama":"Kudekar S, Kumar S, Mondelli M, Pfister HD, Urbankez R. Comparing the bit-MAP and block-MAP decoding thresholds of Reed-Muller codes on BMS channels. In: <i>2016 IEEE International Symposium on Information Theory </i>. IEEE; 2016:1755-1759. doi:<a href=\"https://doi.org/10.1109/isit.2016.7541600\">10.1109/isit.2016.7541600</a>","chicago":"Kudekar, Shrinivas, Santhosh Kumar, Marco Mondelli, Henry D. Pfister, and Rudiger Urbankez. “Comparing the Bit-MAP and Block-MAP Decoding Thresholds of Reed-Muller Codes on BMS Channels.” In <i>2016 IEEE International Symposium on Information Theory </i>, 1755–59. IEEE, 2016. <a href=\"https://doi.org/10.1109/isit.2016.7541600\">https://doi.org/10.1109/isit.2016.7541600</a>.","ieee":"S. Kudekar, S. Kumar, M. Mondelli, H. D. Pfister, and R. Urbankez, “Comparing the bit-MAP and block-MAP decoding thresholds of Reed-Muller codes on BMS channels,” in <i>2016 IEEE International Symposium on Information Theory </i>, Barcelona, Spain, 2016, pp. 1755–1759."},"author":[{"first_name":"Shrinivas","last_name":"Kudekar","full_name":"Kudekar, Shrinivas"},{"full_name":"Kumar, Santhosh","last_name":"Kumar","first_name":"Santhosh"},{"id":"27EB676C-8706-11E9-9510-7717E6697425","full_name":"Mondelli, Marco","last_name":"Mondelli","first_name":"Marco","orcid":"0000-0002-3242-7020"},{"first_name":"Henry D.","last_name":"Pfister","full_name":"Pfister, Henry D."},{"last_name":"Urbankez","first_name":"Rudiger","full_name":"Urbankez, Rudiger"}],"external_id":{"arxiv":["1601.06048"]},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87"},{"status":"public","publication_identifier":{"issn":["2041-1723"]},"date_created":"2019-11-19T13:20:53Z","type":"journal_article","_id":"7068","article_type":"original","author":[{"full_name":"Moll, Philip J. W.","first_name":"Philip J. W.","last_name":"Moll"},{"full_name":"Potter, Andrew C.","first_name":"Andrew C.","last_name":"Potter"},{"full_name":"Nair, Nityan L.","first_name":"Nityan L.","last_name":"Nair"},{"full_name":"Ramshaw, B. J.","first_name":"B. J.","last_name":"Ramshaw"},{"first_name":"Kimberly A","last_name":"Modic","orcid":"0000-0001-9760-3147","id":"13C26AC0-EB69-11E9-87C6-5F3BE6697425","full_name":"Modic, Kimberly A"},{"first_name":"Scott","last_name":"Riggs","full_name":"Riggs, Scott"},{"full_name":"Zeng, Bin","last_name":"Zeng","first_name":"Bin"},{"first_name":"Nirmal J.","last_name":"Ghimire","full_name":"Ghimire, Nirmal J."},{"last_name":"Bauer","first_name":"Eric D.","full_name":"Bauer, Eric D."},{"first_name":"Robert","last_name":"Kealhofer","full_name":"Kealhofer, Robert"},{"last_name":"Ronning","first_name":"Filip","full_name":"Ronning, Filip"},{"full_name":"Analytis, James G.","first_name":"James G.","last_name":"Analytis"}],"quality_controlled":"1","oa_version":"Published Version","language":[{"iso":"eng"}],"article_processing_charge":"No","volume":7,"has_accepted_license":"1","month":"08","article_number":"12492","file":[{"relation":"main_file","file_id":"7114","checksum":"e3272ed18d22187406b30be48a56e7b2","creator":"dernst","access_level":"open_access","file_size":663911,"content_type":"application/pdf","date_created":"2019-11-26T12:52:19Z","date_updated":"2020-07-14T12:47:48Z","file_name":"2016_NatureComm_Moll.pdf"}],"doi":"10.1038/ncomms12492","day":"22","year":"2016","oa":1,"intvolume":"         7","publication":"Nature Communications","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"date_updated":"2021-01-12T08:11:40Z","extern":"1","citation":{"apa":"Moll, P. J. W., Potter, A. C., Nair, N. L., Ramshaw, B. J., Modic, K. A., Riggs, S., … Analytis, J. G. (2016). Magnetic torque anomaly in the quantum limit of Weyl semimetals. <i>Nature Communications</i>. Springer Nature. <a href=\"https://doi.org/10.1038/ncomms12492\">https://doi.org/10.1038/ncomms12492</a>","ista":"Moll PJW, Potter AC, Nair NL, Ramshaw BJ, Modic KA, Riggs S, Zeng B, Ghimire NJ, Bauer ED, Kealhofer R, Ronning F, Analytis JG. 2016. Magnetic torque anomaly in the quantum limit of Weyl semimetals. Nature Communications. 7, 12492.","chicago":"Moll, Philip J. W., Andrew C. Potter, Nityan L. Nair, B. J. Ramshaw, Kimberly A Modic, Scott Riggs, Bin Zeng, et al. “Magnetic Torque Anomaly in the Quantum Limit of Weyl Semimetals.” <i>Nature Communications</i>. Springer Nature, 2016. <a href=\"https://doi.org/10.1038/ncomms12492\">https://doi.org/10.1038/ncomms12492</a>.","ama":"Moll PJW, Potter AC, Nair NL, et al. Magnetic torque anomaly in the quantum limit of Weyl semimetals. <i>Nature Communications</i>. 2016;7. doi:<a href=\"https://doi.org/10.1038/ncomms12492\">10.1038/ncomms12492</a>","ieee":"P. J. W. Moll <i>et al.</i>, “Magnetic torque anomaly in the quantum limit of Weyl semimetals,” <i>Nature Communications</i>, vol. 7. Springer Nature, 2016.","mla":"Moll, Philip J. W., et al. “Magnetic Torque Anomaly in the Quantum Limit of Weyl Semimetals.” <i>Nature Communications</i>, vol. 7, 12492, Springer Nature, 2016, doi:<a href=\"https://doi.org/10.1038/ncomms12492\">10.1038/ncomms12492</a>.","short":"P.J.W. Moll, A.C. Potter, N.L. Nair, B.J. Ramshaw, K.A. Modic, S. Riggs, B. Zeng, N.J. Ghimire, E.D. Bauer, R. Kealhofer, F. Ronning, J.G. Analytis, Nature Communications 7 (2016)."},"publisher":"Springer Nature","date_published":"2016-08-22T00:00:00Z","file_date_updated":"2020-07-14T12:47:48Z","title":"Magnetic torque anomaly in the quantum limit of Weyl semimetals","abstract":[{"text":"Electrons in materials with linear dispersion behave as massless Weyl- or Dirac-quasiparticles, and continue to intrigue due to their close resemblance to elusive ultra-relativistic particles as well as their potential for future electronics. Yet the experimental signatures of Weyl-fermions are often subtle and indirect, in particular if they coexist with conventional, massive quasiparticles. Here we show a pronounced anomaly in the magnetic torque of the Weyl semimetal NbAs upon entering the quantum limit state in high magnetic fields. The torque changes sign in the quantum limit, signalling a reversal of the magnetic anisotropy that can be directly attributed to the topological nature of the Weyl electrons. Our results establish that anomalous quantum limit torque measurements provide a direct experimental method to identify and distinguish Weyl and Dirac systems.","lang":"eng"}],"publication_status":"published","ddc":["530"]},{"article_type":"original","type":"journal_article","_id":"7279","date_created":"2020-01-15T07:27:54Z","publication_identifier":{"issn":["1476-1122","1476-4660"]},"status":"public","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1711.11518"}],"oa_version":"Preprint","quality_controlled":"1","author":[{"first_name":"Eléonore","last_name":"Mourad","full_name":"Mourad, Eléonore"},{"last_name":"Coustan","first_name":"Laura","full_name":"Coustan, Laura"},{"first_name":"Pierre","last_name":"Lannelongue","full_name":"Lannelongue, Pierre"},{"first_name":"Dodzi","last_name":"Zigah","full_name":"Zigah, Dodzi"},{"full_name":"Mehdi, Ahmad","last_name":"Mehdi","first_name":"Ahmad"},{"first_name":"André","last_name":"Vioux","full_name":"Vioux, André"},{"id":"A8CA28E6-CE23-11E9-AD2D-EC27E6697425","full_name":"Freunberger, Stefan Alexander","last_name":"Freunberger","first_name":"Stefan Alexander","orcid":"0000-0003-2902-5319"},{"last_name":"Favier","first_name":"Frédéric","full_name":"Favier, Frédéric"},{"full_name":"Fontaine, Olivier","last_name":"Fontaine","first_name":"Olivier"}],"issue":"4","month":"11","volume":16,"article_processing_charge":"No","language":[{"iso":"eng"}],"oa":1,"doi":"10.1038/nmat4808","year":"2016","page":"446-453","day":"28","publication":"Nature Materials","arxiv":1,"intvolume":"        16","citation":{"mla":"Mourad, Eléonore, et al. “Biredox Ionic Liquids with Solid-like Redox Density in the Liquid State for High-Energy Supercapacitors.” <i>Nature Materials</i>, vol. 16, no. 4, Springer Nature, 2016, pp. 446–53, doi:<a href=\"https://doi.org/10.1038/nmat4808\">10.1038/nmat4808</a>.","short":"E. Mourad, L. Coustan, P. Lannelongue, D. Zigah, A. Mehdi, A. Vioux, S.A. Freunberger, F. Favier, O. Fontaine, Nature Materials 16 (2016) 446–453.","apa":"Mourad, E., Coustan, L., Lannelongue, P., Zigah, D., Mehdi, A., Vioux, A., … Fontaine, O. (2016). Biredox ionic liquids with solid-like redox density in the liquid state for high-energy supercapacitors. <i>Nature Materials</i>. Springer Nature. <a href=\"https://doi.org/10.1038/nmat4808\">https://doi.org/10.1038/nmat4808</a>","chicago":"Mourad, Eléonore, Laura Coustan, Pierre Lannelongue, Dodzi Zigah, Ahmad Mehdi, André Vioux, Stefan Alexander Freunberger, Frédéric Favier, and Olivier Fontaine. “Biredox Ionic Liquids with Solid-like Redox Density in the Liquid State for High-Energy Supercapacitors.” <i>Nature Materials</i>. Springer Nature, 2016. <a href=\"https://doi.org/10.1038/nmat4808\">https://doi.org/10.1038/nmat4808</a>.","ama":"Mourad E, Coustan L, Lannelongue P, et al. Biredox ionic liquids with solid-like redox density in the liquid state for high-energy supercapacitors. <i>Nature Materials</i>. 2016;16(4):446-453. doi:<a href=\"https://doi.org/10.1038/nmat4808\">10.1038/nmat4808</a>","ista":"Mourad E, Coustan L, Lannelongue P, Zigah D, Mehdi A, Vioux A, Freunberger SA, Favier F, Fontaine O. 2016. Biredox ionic liquids with solid-like redox density in the liquid state for high-energy supercapacitors. Nature Materials. 16(4), 446–453.","ieee":"E. Mourad <i>et al.</i>, “Biredox ionic liquids with solid-like redox density in the liquid state for high-energy supercapacitors,” <i>Nature Materials</i>, vol. 16, no. 4. Springer Nature, pp. 446–453, 2016."},"extern":"1","date_updated":"2021-01-12T08:12:43Z","external_id":{"arxiv":["1711.11518"]},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publication_status":"published","abstract":[{"text":"Kinetics of electrochemical reactions are several orders of magnitude slower in solids than in liquids as a result of the much lower ion diffusivity. Yet, the solid state maximizes the density of redox species, which is at least two orders of magnitude lower in liquids because of solubility limitations. With regard to electrochemical energy storage devices, this leads to high-energy batteries with limited power and high-power supercapacitors with a well-known energy deficiency. For such devices the ideal system should endow the liquid state with a density of redox species close to the solid state. Here we report an approach based on biredox ionic liquids to achieve bulk-like redox density at liquid-like fast kinetics. The cation and anion of these biredox ionic liquids bear moieties that undergo very fast reversible redox reactions. As a first demonstration of their potential for high-capacity/high-rate charge storage, we used them in redox supercapacitors. These ionic liquids are able to decouple charge storage from an ion-accessible electrode surface, by storing significant charge in the pores of the electrodes, to minimize self-discharge and leakage current as a result of retaining the redox species in the pores, and to raise working voltage due to their wide electrochemical window.","lang":"eng"}],"title":"Biredox ionic liquids with solid-like redox density in the liquid state for high-energy supercapacitors","publisher":"Springer Nature","date_published":"2016-11-28T00:00:00Z"}]
