@inproceedings{3207,
  abstract     = {Cosegmentation is typically defined as the task of jointly segmenting something similar in a given set of images. Existing methods are too generic and so far have not demonstrated competitive results for any specific task. In this paper we overcome this limitation by adding two new aspects to cosegmentation: (1) the &quot;something&quot; has to be an object, and (2) the &quot;similarity&quot; measure is learned. In this way, we are able to achieve excellent results on the recently introduced iCoseg dataset, which contains small sets of images of either the same object instance or similar objects of the same class. The challenge of this dataset lies in the extreme changes in viewpoint, lighting, and object deformations within each set. We are able to considerably outperform several competitors. To achieve this performance, we borrow recent ideas from object recognition: the use of powerful features extracted from a pool of candidate object-like segmentations. We believe that our work will be beneficial to several application areas, such as image retrieval.},
  author       = {Vicente, Sara and Rother, Carsten and Vladimir Kolmogorov},
  pages        = {2217 -- 2224},
  publisher    = {IEEE},
  title        = {{Object cosegmentation}},
  doi          = {10.1109/CVPR.2011.5995530},
  year         = {2011},
}

@inproceedings{3236,
  abstract     = {If a cryptographic primitive remains secure even if ℓ bits about the secret key are leaked to the adversary, one would expect that at least one of n independent instantiations of the scheme remains secure given n·ℓ bits of leakage. This intuition has been proven true for schemes satisfying some special information-theoretic properties by Alwen et al. [Eurocrypt'10]. On the negative side, Lewko and Waters [FOCS'10] construct a CPA secure public-key encryption scheme for which this intuition fails. The counterexample of Lewko and Waters leaves open the interesting possibility that for any scheme there exists a constant c&gt;0, such that n fold repetition remains secure against c·n·ℓ bits of leakage. Furthermore, their counterexample requires the n copies of the encryption scheme to share a common reference parameter, leaving open the possibility that the intuition is true for all schemes without common setup. In this work we give a stronger counterexample ruling out these possibilities. We construct a signature scheme such that: 1. a single instantiation remains secure given ℓ = log(k) bits of leakage where k is a security parameter. 2. any polynomial number of independent instantiations can be broken (in the strongest sense of key-recovery) given ℓ′ = poly(k) bits of leakage. Note that ℓ does not depend on the number of instances. The computational assumption underlying our counterexample is that non-interactive computationally sound proofs exist. Moreover, under a stronger (non-standard) assumption about such proofs, our counterexample does not require a common reference parameter. The underlying idea of our counterexample is rather generic and can be applied to other primitives like encryption schemes. © 2011 International Association for Cryptologic Research.},
  author       = {Jain, Abhishek and Krzysztof Pietrzak},
  pages        = {58 -- 69},
  publisher    = {Springer},
  title        = {{Parallel repetition for leakage resilience amplification revisited}},
  doi          = {10.1007/978-3-642-19571-6_5},
  volume       = {6597 },
  year         = {2011},
}

@inproceedings{3238,
  abstract     = {We construct efficient authentication protocols and message-authentication codes (MACs) whose security can be reduced to the learning parity with noise (LPN) problem. Despite a large body of work - starting with the HB protocol of Hopper and Blum in 2001 - until now it was not even known how to construct an efficient authentication protocol from LPN which is secure against man-in-the-middle (MIM) attacks. A MAC implies such a (two-round) protocol. © 2011 International Association for Cryptologic Research},
  author       = {Kiltz, Eike and Pietrzak, Krzysztof Z and Cash, David and Jain, Abhishek and Venturi, Daniele},
  location     = {Tallinn, Estonia},
  pages        = {7 -- 26},
  publisher    = {Springer},
  title        = {{Efficient authentication from hard learning problems}},
  doi          = {10.1007/978-3-642-20465-4_3},
  volume       = {6632},
  year         = {2011},
}

@inproceedings{3239,
  abstract     = {Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that the tampered device will reveal secret information. Inspired by the work of Ishai et al. [Eurocrypt'06], we propose a compiler that transforms any circuit into a new circuit with the same functionality, but which is resilient against a well-defined and powerful tampering adversary. More concretely, our transformed circuits remain secure even if the adversary can adaptively tamper with every wire in the circuit as long as the tampering fails with some probability δ&gt;0. This additional requirement is motivated by practical tampering attacks, where it is often difficult to guarantee the success of a specific attack. Formally, we show that a q-query tampering attack against the transformed circuit can be &quot;simulated&quot; with only black-box access to the original circuit and log(q) bits of additional auxiliary information. Thus, if the implemented cryptographic scheme is secure against log(q) bits of leakage, then our implementation is tamper-proof in the above sense. Surprisingly, allowing for this small amount of information leakage allows for much more efficient compilers, which moreover do not require randomness during evaluation. Similar to earlier works our compiler requires small, stateless and computation-independent tamper-proof gadgets. Thus, our result can be interpreted as reducing the problem of shielding arbitrary complex computation to protecting simple components. © 2011 Springer-Verlag.},
  author       = {Faust, Sebastian and Krzysztof Pietrzak and Venturi, Daniele},
  number       = {Part 1},
  pages        = {391 -- 402},
  publisher    = {Springer},
  title        = {{Tamper proof circuits How to trade leakage for tamper resilience}},
  doi          = {10.1007/978-3-642-22006-7_33},
  volume       = {6755 },
  year         = {2011},
}

@inproceedings{3240,
  abstract     = {The famous Leftover Hash Lemma (LHL) states that (almost) universal hash functions are good randomness extractors. Despite its numerous applications, LHL-based extractors suffer from the following two limitations: - Large Entropy Loss: to extract v bits from distribution X of min-entropy m which are ε-close to uniform, one must set v ≤ m - 2log(1/ε), meaning that the entropy loss L = def m - v ≥ 2 log(1/ε). For many applications, such entropy loss is too large. - Large Seed Length: the seed length n of (almost) universal hash function required by the LHL must be at least n ≥ min (u - v, v + 2log(1/ε)) - O(1), where u is the length of the source, and must grow with the number of extracted bits. Quite surprisingly, we show that both limitations of the LHL - large entropy loss and large seed - can be overcome (or, at least, mitigated) in various important scenarios. First, we show that entropy loss could be reduced to L = log(1/ε) for the setting of deriving secret keys for a wide range of cryptographic applications. Specifically, the security of these schemes with an LHL-derived key gracefully degrades from ε to at most ε + √ε2-L. (Notice that, unlike standard LHL, this bound is meaningful even when one extracts more bits than the min-entropy we have!) Based on these results we build a general computational extractor that enjoys low entropy loss and can be used to instantiate a generic key derivation function for any cryptographic application. Second, we study the soundness of the natural expand-then-extract approach, where one uses a pseudorandom generator (PRG) to expand a short &quot;input seed&quot; S into a longer &quot;output seed&quot; S′, and then use the resulting S′ as the seed required by the LHL (or, more generally, by any randomness extractor). We show that, in general, the expand-then-extract approach is not sound if the Decisional Diffie-Hellman assumption is true. Despite that, we show that it is sound either: (1) when extracting a &quot;small&quot; (logarithmic in the security of the PRG) number of bits; or (2) in minicrypt. Implication (2) suggests that the expand-then-extract approach is likely secure when used with &quot;practical&quot; PRGs, despite lacking a reductionist proof of security! © 2011 International Association for Cryptologic Research.},
  author       = {Barak,  Boaz and Dodis, Yevgeniy and Krawczyk, Hugo and Pereira, Olivier and Krzysztof Pietrzak and Standaert, François-Xavier and Yu, Yu},
  pages        = {1 -- 20},
  publisher    = {Springer},
  title        = {{Leftover hash lemma revisited}},
  doi          = { 10.1007/978-3-642-22792-9_1},
  volume       = {6841},
  year         = {2011},
}

@inproceedings{3264,
  abstract     = {Verification of programs with procedures, multi-threaded programs, and higher-order functional programs can be effectively au- tomated using abstraction and refinement schemes that rely on spurious counterexamples for abstraction discovery. The analysis of counterexam- ples can be automated by a series of interpolation queries, or, alterna- tively, as a constraint solving query expressed by a set of recursion free Horn clauses. (A set of interpolation queries can be formulated as a single constraint over Horn clauses with linear dependency structure between the unknown relations.) In this paper we present an algorithm for solving recursion free Horn clauses over a combined theory of linear real/rational arithmetic and uninterpreted functions. Our algorithm performs resolu- tion to deal with the clausal structure and relies on partial solutions to deal with (non-local) instances of functionality axioms.},
  author       = {Gupta, Ashutosh and Popeea, Corneliu and Rybalchenko, Andrey},
  editor       = {Yang, Hongseok},
  location     = {Kenting, Taiwan},
  pages        = {188 -- 203},
  publisher    = {Springer},
  title        = {{Solving recursion-free Horn clauses over LI+UIF}},
  doi          = {10.1007/978-3-642-25318-8_16},
  volume       = {7078},
  year         = {2011},
}

@inproceedings{3266,
  abstract     = {We present a joint image segmentation and labeling model (JSL) which, given a bag of figure-ground segment hypotheses extracted at multiple image locations and scales, constructs a joint probability distribution over both the compatible image interpretations (tilings or image segmentations) composed from those segments, and over their labeling into categories. The process of drawing samples from the joint distribution can be interpreted as first sampling tilings, modeled as maximal cliques, from a graph connecting spatially non-overlapping segments in the bag [1], followed by sampling labels for those segments, conditioned on the choice of a particular tiling. We learn the segmentation and labeling parameters jointly, based on Maximum Likelihood with a novel Incremental Saddle Point estimation procedure. The partition function over tilings and labelings is increasingly more accurately approximated by including incorrect configurations that a not-yet-competent model rates probable during learning. We show that the proposed methodologymatches the current state of the art in the Stanford dataset [2], as well as in VOC2010, where 41.7% accuracy on the test set is achieved.},
  author       = {Ion, Adrian and Carreira, Joao and Sminchisescu, Cristian},
  booktitle    = {NIPS Proceedings},
  location     = {Granada, Spain},
  pages        = {1827 -- 1835},
  publisher    = {Neural Information Processing Systems Foundation},
  title        = {{Probabilistic joint image segmentation and labeling}},
  volume       = {24},
  year         = {2011},
}

@article{3267,
  abstract     = {We address the problem of localizing homology classes, namely, finding the cycle representing a given class with the most concise geometric measure. We study the problem with different measures: volume, diameter and radius. For volume, that is, the 1-norm of a cycle, two main results are presented. First, we prove that the problem is NP-hard to approximate within any constant factor. Second, we prove that for homology of dimension two or higher, the problem is NP-hard to approximate even when the Betti number is O(1). The latter result leads to the inapproximability of the problem of computing the nonbounding cycle with the smallest volume and computing cycles representing a homology basis with the minimal total volume. As for the other two measures defined by pairwise geodesic distance, diameter and radius, we show that the localization problem is NP-hard for diameter but is polynomial for radius. Our work is restricted to homology over the ℤ2 field.},
  author       = {Chen, Chao and Freedman, Daniel},
  journal      = {Discrete & Computational Geometry},
  number       = {3},
  pages        = {425 -- 448},
  publisher    = {Springer},
  title        = {{Hardness results for homology localization}},
  doi          = {10.1007/s00454-010-9322-8},
  volume       = {45},
  year         = {2011},
}

@inbook{3268,
  abstract     = {Algebraic topology is generally considered one of the purest subfield of mathematics. However, over the last decade two interesting new lines of research have emerged, one focusing on algorithms for algebraic topology, and the other on applications of algebraic topology in engineering and science. Amongst the new areas in which the techniques have been applied are computer vision and image processing. In this paper, we survey the results of these endeavours. Because algebraic topology is an area of mathematics with which most computer vision practitioners have no experience, we review the machinery behind the theories of homology and persistent homology; our review emphasizes intuitive explanations. In terms of applications to computer vision, we focus on four illustrative problems: shape signatures, natural image statistics, image denoising, and segmentation. Our hope is that this review will stimulate interest on the part of computer vision researchers to both use and extend the tools of this new field. },
  author       = {Freedman, Daniel and Chen, Chao},
  booktitle    = {Computer Vision},
  pages        = {239 -- 268},
  publisher    = {Nova Science Publishers},
  title        = {{Algebraic topology for computer vision}},
  year         = {2011},
}

@article{3269,
  abstract     = {The unintentional scattering of light between neighboring surfaces in complex projection environments increases the brightness and decreases the contrast, disrupting the appearance of the desired imagery. To achieve satisfactory projection results, the inverse problem of global illumination must be solved to cancel this secondary scattering. In this paper, we propose a global illumination cancellation method that minimizes the perceptual difference between the desired imagery and the actual total illumination in the resulting physical environment. Using Gauss-Newton and active set methods, we design a fast solver for the bound constrained nonlinear least squares problem raised by the perceptual error metrics. Our solver is further accelerated with a CUDA implementation and multi-resolution method to achieve 1–2 fps for problems with approximately 3000 variables. We demonstrate the global illumination cancellation algorithm with our multi-projector system. Results show that our method preserves the color fidelity of the desired imagery significantly better than previous methods.},
  author       = {Sheng, Yu and Cutler, Barbara and Chen, Chao and Nasman, Joshua},
  journal      = {Computer Graphics Forum},
  number       = {4},
  pages        = {1261 -- 1268},
  publisher    = {Wiley-Blackwell},
  title        = {{Perceptual global illumination cancellation in complex projection environments}},
  doi          = {10.1111/j.1467-8659.2011.01985.x},
  volume       = {30},
  year         = {2011},
}

@inproceedings{3270,
  abstract     = {The persistence diagram of a filtered simplicial com- plex is usually computed by reducing the boundary matrix of the complex. We introduce a simple op- timization technique: by processing the simplices of the complex in decreasing dimension, we can “kill” columns (i.e., set them to zero) without reducing them. This technique completely avoids reduction on roughly half of the columns. We demonstrate that this idea significantly improves the running time of the reduction algorithm in practice. We also give an output-sensitive complexity analysis for the new al- gorithm which yields to sub-cubic asymptotic bounds under certain assumptions.},
  author       = {Chen, Chao and Kerber, Michael},
  location     = {Morschach, Switzerland},
  pages        = {197 -- 200},
  publisher    = {TU Dortmund},
  title        = {{Persistent homology computation with a twist}},
  year         = {2011},
}

@inbook{3271,
  abstract     = {In this paper we present an efficient framework for computation of persis- tent homology of cubical data in arbitrary dimensions. An existing algorithm using simplicial complexes is adapted to the setting of cubical complexes. The proposed approach enables efficient application of persistent homology in domains where the data is naturally given in a cubical form. By avoiding triangulation of the data, we significantly reduce the size of the complex. We also present a data-structure de- signed to compactly store and quickly manipulate cubical complexes. By means of numerical experiments, we show high speed and memory efficiency of our ap- proach. We compare our framework to other available implementations, showing its superiority. Finally, we report performance on selected 3D and 4D data-sets.},
  author       = {Wagner, Hubert and Chen, Chao and Vuçini, Erald},
  booktitle    = {Topological Methods in Data Analysis and Visualization II},
  editor       = {Peikert, Ronald and Hauser, Helwig and Carr, Hamish and Fuchs, Raphael},
  pages        = {91 -- 106},
  publisher    = {Springer},
  title        = {{Efficient computation of persistent homology for cubical data}},
  doi          = {10.1007/978-3-642-23175-9_7},
  year         = {2011},
}

@phdthesis{3273,
  author       = {Maître, Jean-Léon},
  issn         = {2663-337X},
  publisher    = {Institute of Science and Technology Austria},
  title        = {{Mechanics of adhesion and de‐adhesion in zebrafish germ layer progenitors}},
  year         = {2011},
}

@phdthesis{3275,
  abstract     = {Chemokines organize immune cell trafficking by inducing either directed (tactic) or random (kinetic) migration and by activating integrins in order to support surface adhesion (haptic). Beyond that the same chemokines can establish clearly defined functional areas in secondary lymphoid organs. Until now it is unclear how chemokines can fulfill such diverse functions. One decisive prerequisite to explain these capacities is to know how chemokines are presented in tissue. In theory chemokines could occur either soluble or immobilized, and could be distributed either homogenously or as a concentration gradient. To dissect if and how the presenting mode of chemokines influences immune cells, I tested the response of dendritic cells (DCs) to differentially displayed chemokines. DCs are antigen presenting cells that reside in the periphery and migrate into draining lymph nodes (LNs) once exposed to inflammatory stimuli to activate naïve T cells. DCs are guided to and within the LN by the chemokine receptor CCR7, which has two ligands, the chemokines CCL19 and CCL21. Both CCR7 ligands are expressed by fibroblastic reticular cells in the LN, but differ in their ability to bind to heparan sulfate residues. CCL21 has a highly charged C-terminal extension, which mediates binding to anionic surfaces, whereas CCL19 is lacking such residues and likely distributes as a soluble molecule. This study shows that surface-bound CCL21 causes random, haptokinetic DC motility, which is confined to the chemokine coated area by insideout activation of β2 integrins that mediate cell binding to the surface. CCL19 on the other hand forms concentration gradients which trigger directional, chemotactic movement, but no surface adhesion. In addition DCs can actively manipulate this system by recruiting and activating serine proteases on their surfaces, which create - by proteolytically removing the adhesive C-terminus - a solubilized variant of CCL21 that functionally resembles CCL19. By generating a CCL21 concentration gradient DCs establish a positive feedback loop to recruit further DCs from the periphery to the CCL21 coated region. In addition DCs can sense chemotactic gradients as well as immobilized haptokinetic fields at the same time and integrate these signals. The result is chemotactically biased haptokinesis - directional migration confined to a chemokine coated track or area - which could explain the dynamic but spatially tightly controlled swarming leukocyte locomotion patterns that have been observed in lymphatic organs by intravital microscopists. The finding that DCs can approach soluble cues in a non-adhesive manner while they attach to surfaces coated with immobilized cues raises the question how these cells transmit intracellular forces to the environment, especially in the non-adherent migration mode. In order to migrate, cells have to generate and transmit force to the extracellular substrate. Force transmission is the prerequisite to procure an expansion of the leading edge and a forward motion of the whole cell body. In the current conceptions actin polymerization at the leading edge is coupled to extracellular ligands via the integrin family of transmembrane receptors, which allows the transmission of intracellular force. Against the paradigm of force transmission during migration, leukocytes, like DCs, are able to migrate in threedimensional environments without using integrin transmembrane receptors (Lämmermann et al., 2008). This reflects the biological function of leukocytes, as they can invade almost all tissues, whereby their migration has to be independent from the extracellular environment. How the cells can achieve this is unclear. For this study I examined DC migration in a defined threedimensional environment and highlighted actin-dynamics with the probe Lifeact-GFP. The result was that chemotactic DCs can switch between integrin-dependent and integrin- independent locomotion and can thereby adapt to the adhesive properties of their environment. If the cells are able to couple their actin cytoskeleton to the substrate, actin polymerization is entirely converted into protrusion. Without coupling the actin cortex undergoes slippage and retrograde actin flow can be observed. But retrograde actin flow can be completely compensated by higher actin polymerization rate keeping the migration velocity and the shape of the cells unaltered. Mesenchymal cells like fibroblast cannot balance the loss of adhesive interaction, cannot protrude into open space and, therefore, strictly depend on integrinmediated force coupling. This leukocyte specific phenomenon of “adaptive force transmission” endows these cells with the unique ability to transit and invade almost every type of tissue. },
  author       = {Schumann, Kathrin},
  issn         = {2663-337X},
  pages        = {141},
  publisher    = {Institute of Science and Technology Austria},
  title        = {{The role of chemotactic gradients in dendritic cell migration}},
  year         = {2011},
}

@article{3276,
  abstract     = {We present an algorithm to identify individual neural spikes observed on high-density multi-electrode arrays (MEAs). Our method can distinguish large numbers of distinct neural units, even when spikes overlap, and accounts for intrinsic variability of spikes from each unit. As MEAs grow larger, it is important to find spike-identification methods that are scalable, that is, the computational cost of spike fitting should scale well with the number of units observed. Our algorithm accomplishes this goal, and is fast, because it exploits the spatial locality of each unit and the basic biophysics of extracellular signal propagation. Human interaction plays a key role in our method; but effort is minimized and streamlined via a graphical interface. We illustrate our method on data from guinea pig retinal ganglion cells and document its performance on simulated data consisting of spikes added to experimentally measured background noise. We present several tests demonstrating that the algorithm is highly accurate: it exhibits low error rates on fits to synthetic data, low refractory violation rates, good receptive field coverage, and consistency across users.},
  author       = {Prentice, Jason S and Homann, Jan and Simmons, Kristina D and Gasper Tkacik and Balasubramanian, Vijay and Nelson, Philip C},
  journal      = {PLoS One},
  number       = {7},
  publisher    = {Public Library of Science},
  title        = {{Fast, scalable, Bayesian spike identification for multi-electrode arrays}},
  doi          = {10.1371/journal.pone.0019884},
  volume       = {6},
  year         = {2011},
}

@article{3278,
  abstract     = {Despite much research on the socially parasitic large blue butterflies (genus Maculinea) in the past 40 years, their relationship to their closest relatives, Phengaris, is controversial and the relationships among the remaining genera in the Glaucopsyche section are largely unresolved. The evolutionary history of this butterfly section is particularly important to understand the evolution of life history diversity con- nected to food-plant and host-ant associations in the larval stage. In the present study, we use a combi- nation of four nuclear and two mitochondrial genes to reconstruct the phylogeny of the Glaucopsyche section, and in particular, to study the relationships among and within the Phengaris–Maculinea species.
We find a clear pattern between the clades recovered in the Glaucopsyche section phylogeny and their food-plant associations, with only the Phengaris–Maculinea clade utilising more than one plant family. Maculinea is, for the first time, recovered with strong support as a monophyletic group nested within Phengaris, with the closest relative being the rare genus Caerulea. The genus Glaucopsyche is polyphyletic, including the genera Sinia and Iolana. Interestingly, we find evidence for additional potential cryptic spe- cies within the highly endangered Maculinea, which has long been suspected from morphological, ecolog- ical and molecular studies.},
  author       = {Vila, Roger and Pierce, Naomi E and Nash, David R and Line Ugelvig},
  journal      = {Molecular Phylogenetics and Evolution},
  number       = {1},
  pages        = {237 -- 243},
  publisher    = {Elsevier},
  title        = {{A phylogenetic revision of the Glaucopsyche section (Lepidoptera: Lycaenidae), with special focus on the Phengaris-Maculinea clade}},
  doi          = {10.1016/j.ympev.2011.05.016},
  volume       = {61},
  year         = {2011},
}

@article{3285,
  abstract     = {Resolving the dynamical interplay of proteins and lipids in the live-cell plasma membrane represents a central goal in current cell biology. Superresolution concepts have introduced a means of capturing spatial heterogeneity at a nanoscopic length scale. Similar concepts for detecting dynamical transitions (superresolution chronoscopy) are still lacking. Here, we show that recently introduced spot-variation fluorescence correlation spectroscopy allows for sensing transient confinement times of membrane constituents at dramatically improved resolution. Using standard diffraction-limited optics, spot-variation fluorescence correlation spectroscopy captures signatures of single retardation events far below the transit time of the tracer through the focal spot. We provide an analytical description of special cases of transient binding of a tracer to pointlike traps, or association of a tracer with nanodomains. The influence of trap mobility and the underlying binding kinetics are quantified. Experimental approaches are suggested that allow for gaining quantitative mechanistic insights into the interaction processes of membrane constituents.},
  author       = {Ruprecht, Verena and Wieser, Stefan and Marguet, Didier and Schuetz, Gerhard},
  journal      = {Biophysical Journal},
  number       = {11},
  pages        = {2839 -- 2845},
  publisher    = {Biophysical Society},
  title        = {{Spot variation fluorescence correlation spectroscopy allows for superresolution chronoscopy of confinement times in membranes}},
  doi          = {10.1016/j.bpj.2011.04.035},
  volume       = {100},
  year         = {2011},
}

@article{3286,
  abstract     = {Cationic antimicrobial peptides (CAMPs) selectively target bacterial membranes by electrostatic interactions with negatively charged lipids. It turned out that for inhibition of microbial growth a high CAMP membrane concentration is required, which can be realized by the incorporation of hydrophobic groups within the peptide. Increasing hydrophobicity, however, reduces the CAMP selectivity for bacterial over eukaryotic host membranes, thereby causing the risk of detrimental side-effects. In this study we addressed how cationic amphipathic peptides—in particular a CAMP with Lysine–Leucine–Lysine repeats (termed KLK)—affect the localization and dynamics of molecules in eukaryotic membranes. We found KLK to selectively inhibit the endocytosis of a subgroup of membrane proteins and lipids by electrostatically interacting with negatively charged sialic acid moieties. Ultrastructural characterization revealed the formation of membrane invaginations representing fission or fusion intermediates, in which the sialylated proteins and lipids were immobilized. Experiments on structurally different cationic amphipathic peptides (KLK, 6-MO-LF11-322 and NK14-2) indicated a cooperation of electrostatic and hydrophobic forces that selectively arrest sialylated membrane constituents.},
  author       = {Weghuber, Julian and Aichinger, Michael C. and Brameshuber, Mario and Stefan Wieser and Verena Ruprecht and Plochberger, Birgit and Madl, Josef and Horner, Andreas and Reipert, Siegfried and Lohner, Karl and Henics, Tamas and Schuetz, Gerhard J},
  journal      = {Biochimica et Biophysica Acta (BBA) - Biomembranes},
  number       = {10},
  pages        = {2581 -- 2590},
  publisher    = {Elsevier},
  title        = {{Cationic amphipathic peptides accumulate sialylated proteins and lipids in the plasma membrane of eukaryotic host cells}},
  doi          = {10.1016/j.bbamem.2011.06.007},
  volume       = {1808},
  year         = {2011},
}

@article{3287,
  abstract     = {Diffusing membrane constituents are constantly exposed to a variety of forces that influence their stochastic path. Single molecule experiments allow for resolving trajectories at extremely high spatial and temporal accuracy, thereby offering insights into en route interactions of the tracer. In this review we discuss approaches to derive information about the underlying processes, based on single molecule tracking experiments. In particular, we focus on a new versatile way to analyze single molecule diffusion in the absence of a full analytical treatment. The method is based on comprehensive comparison of an experimental data set against the hypothetical outcome of multiple experiments performed on the computer. Since Monte Carlo simulations can be easily and rapidly performed even on state-of-the-art PCs, our method provides a simple way for testing various - even complicated - diffusion models. We describe the new method in detail, and show the applicability on two specific examples: firstly, kinetic rate constants can be derived for the transient interaction of mobile membrane proteins; secondly, residence time and corral size can be extracted for confined diffusion.},
  author       = {Ruprecht, Verena and Axmann, Markus and Wieser, Stefan and Schuetz, Gerhard},
  journal      = {Current Protein & Peptide Science},
  number       = {8},
  pages        = {714 -- 724},
  publisher    = {Bentham Science Publishers},
  title        = {{What can we learn from single molecule trajectories?}},
  doi          = {10.2174/138920311798841753},
  volume       = {12},
  year         = {2011},
}

@article{3288,
  abstract     = {The zonula adherens (ZA) of epithelial cells is a site of cell-cell adhesion where cellular forces are exerted and resisted. Increasing evidence indicates that E-cadherin adhesion molecules at the ZA serve to sense force applied on the junctions and coordinate cytoskeletal responses to those forces. Efforts to understand the role that cadherins play in mechanotransduction have been limited by the lack of assays to measure the impact of forces on the ZA. In this study we used 4D imaging of GFP-tagged E-cadherin to analyse the movement of the ZA. Junctions in confluent epithelial monolayers displayed prominent movements oriented orthogonal (perpendicular) to the ZA itself. Two components were identified in these movements: a relatively slow unidirectional (translational) component that could be readily fitted by least-squares regression analysis, upon which were superimposed more rapid oscillatory movements. Myosin IIB was a dominant factor responsible for driving the unilateral translational movements. In contrast, frequency spectrum analysis revealed that depletion of Myosin IIA increased the power of the oscillatory movements. This implies that Myosin IIA may serve to dampen oscillatory movements of the ZA. This extends our recent analysis of Myosin II at the ZA to demonstrate that Myosin IIA and Myosin IIB make distinct contributions to junctional movement at the ZA.},
  author       = {Smutny, Michael and Wu, Selwin and Gomez, Guillermo and Mangold, Sabine and Yap, Alpha and Hamilton, Nicholas},
  journal      = {PLoS One},
  number       = {7},
  publisher    = {Public Library of Science},
  title        = {{Multicomponent analysis of junctional movements regulated by Myosin II isoforms at the epithelial zonula adherens}},
  doi          = {10.1371/journal.pone.0022458},
  volume       = {6},
  year         = {2011},
}

