@article{7316,
  abstract     = {The nonaqueous rechargeable lithium–O2 battery containing an alkyl carbonate electrolyte discharges by formation of C3H6(OCO2Li)2, Li2CO3, HCO2Li, CH3CO2Li, CO2, and H2O at the cathode, due to electrolyte decomposition. Charging involves oxidation of C3H6(OCO2Li)2, Li2CO3, HCO2Li, CH3CO2Li accompanied by CO2 and H2O evolution. Mechanisms are proposed for the reactions on discharge and charge. The different pathways for discharge and charge are consistent with the widely observed voltage gap in Li–O2 cells. Oxidation of C3H6(OCO2Li)2 involves terminal carbonate groups leaving behind the OC3H6O moiety that reacts to form a thick gel on the Li anode. Li2CO3, HCO2Li, CH3CO2Li, and C3H6(OCO2Li)2 accumulate in the cathode on cycling correlating with capacity fading and cell failure. The latter is compounded by continuous consumption of the electrolyte on each discharge.},
  author       = {Freunberger, Stefan Alexander and Chen, Yuhui and Peng, Zhangquan and Griffin, John M. and Hardwick, Laurence J. and Bardé, Fanny and Novák, Petr and Bruce, Peter G.},
  issn         = {0002-7863},
  journal      = {Journal of the American Chemical Society},
  number       = {20},
  pages        = {8040--8047},
  publisher    = {ACS},
  title        = {{Reactions in the rechargeable Lithium–O2 battery with alkyl carbonate electrolytes}},
  doi          = {10.1021/ja2021747},
  volume       = {133},
  year         = {2011},
}

@article{7317,
  abstract     = {Lithium-metal oxides with a high formal Li2O content, such as Li5FeO4 (5Li2O•Fe2O3) and a Li2MnO3•LiFeO2 composite ({Li2O•MnO2}•{Li2O•Fe2O3}) have been explored as electrocatalysts for primary and rechargeable Li-O2 cells. Activation occurs predominantly by Li2O removal, either electrochemically or chemically by acid-treatment. Superior electrochemical behavior is obtained if activation occurs by acid-treatment; Li2MnO3•LiFeO2 catalysts provide 2516 mAh/g (carbon) corresponding to 931 mAh/g (electrocatalyst + carbon) during the initial discharge. The reaction is reasonably reversible during the early cycles. The approach has implications for designing electrocatalysts that participate through electrochemical Li2O extraction/reformation reactions, offering exceptionally high capacities.},
  author       = {Trahey, L. and Johnson, C. S. and Vaughey, J. T. and Kang, S.-H. and Hardwick, L. J. and Freunberger, Stefan Alexander and Bruce, P. G. and Thackeray, M. M.},
  issn         = {1099-0062},
  journal      = {Electrochemical and Solid-State Letters},
  number       = {5},
  publisher    = {The Electrochemical Society},
  title        = {{Activated Lithium-Metal-Oxides as catalytic electrodes for Li–O2 cells}},
  doi          = {10.1149/1.3555366},
  volume       = {14},
  year         = {2011},
}

@inproceedings{757,
  abstract     = {Synchronous distributed algorithms are easier to design and prove correct than algorithms that tolerate asynchrony. Yet, in the real world, networks experience asynchrony and other timing anomalies. In this paper, we address the question of how to efficiently transform an algorithm that relies on synchronization into an algorithm that tolerates asynchronous executions. We introduce a transformation technique from synchronous algorithms to indulgent algorithms [1], which induces only a constant overhead in terms of time complexity in well-behaved executions. Our technique is based on a new abstraction we call an asynchrony detector, which the participating processes implement collectively. The resulting transformation works for a large class of colorless tasks, including consensus and set agreement. Interestingly, we also show that our technique is relevant for colored tasks, by applying it to the renaming problem, to obtain the first indulgent renaming algorithm.},
  author       = {Alistarh, Dan-Adrian and Gilbert, Seth and Guerraoui, Rachid and Travers, Corentin},
  pages        = {41 -- 52},
  publisher    = {Springer},
  title        = {{Generating fast indulgent algorithms}},
  doi          = {10.1007/978-3-642-17679-1_4},
  volume       = {6522 LNCS},
  year         = {2011},
}

@inproceedings{759,
  abstract     = {We study the complexity of renaming, a fundamental problem in distributed computing in which a set of processes need to pick distinct names from a given namespace. We prove an individual lower bound of Ω(k) process steps for deterministic renaming into any namespace of size sub-exponential in k, where k is the number of participants. This bound is tight: it draws an exponential separation between deterministic and randomized solutions, and implies new tight bounds for deterministic fetch-and-increment registers, queues and stacks. The proof of the bound is interesting in its own right, for it relies on the first reduction from renaming to another fundamental problem in distributed computing: mutual exclusion. We complement our individual bound with a global lower bound of Ω(k log (k/c)) on the total step complexity of renaming into a namespace of size ck, for any c ≥ 1. This applies to randomized algorithms against a strong adversary, and helps derive new global lower bounds for randomized approximate counter and fetch-and-increment implementations, all tight within logarithmic factors.},
  author       = {Alistarh, Dan-Adrian and Aspnes, James and Gilbert, Seth and Guerraoui, Rachid},
  pages        = {718 -- 727},
  publisher    = {IEEE},
  title        = {{The complexity of renaming}},
  doi          = {10.1109/FOCS.2011.66},
  year         = {2011},
}

@inproceedings{760,
  abstract     = {A randomized implementation is given of a test-and-set register with O(log log n) individual step complexity and O(n) total step complexity against an oblivious adversary. The implementation is linearizable and multi-shot, and shows an exponential complexity improvement over previous solutions designed to work against a strong adversary.},
  author       = {Alistarh, Dan-Adrian and Aspnes, James},
  pages        = {97 -- 109},
  publisher    = {Springer},
  title        = {{Sub-logarithmic test-and-set against a weak adversary}},
  doi          = {10.1007/978-3-642-24100-0_7},
  volume       = {6950 LNCS},
  year         = {2011},
}

@inproceedings{761,
  abstract     = {We give two new randomized algorithms for strong renaming, both of which work against an adaptive adversary in asynchronous shared memory. The first uses repeated sampling over a sequence of arrays of decreasing size to assign unique names to each of n processes with step complexity O(log3 n). The second transforms any sorting network into a strong adaptive renaming protocol, with an expected cost equal to the depth of the sorting network. Using an AKS sorting network, this gives a strong adaptive renaming algorithm with step complexity O(log k), where k is the contention in the current execution. We show this to be optimal based on a classic lower bound of Jayanti. We also show that any such strong renaming protocol can be used to build a monotone-consistent counter with logarithmic step complexity (at the cost of adding a max register) or a linearizable fetch-and-increment register (at the cost of increasing the step complexity by a logarithmic factor).},
  author       = {Alistarh, Dan-Adrian and Aspnes, James and Censor Hillel, Keren and Gilbert, Seth and Zadimoghaddam, Morteza},
  pages        = {239 -- 248},
  publisher    = {ACM},
  title        = {{Optimal-time adaptive strong renaming, with applications to counting}},
  doi          = {10.1145/1993806.1993850},
  year         = {2011},
}

@article{7701,
  abstract     = {During assembly of the Drosophila olfactory circuit, projection neuron (PN) dendrites prepattern the developing antennal lobe before the arrival of axons from their presynaptic partners, the adult olfactory receptor neurons (ORNs). We previously found that levels of transmembrane Semaphorin-1a, which acts as a receptor, instruct PN dendrite targeting along the dorsolateral-ventromedial axis. Here we show that two secreted semaphorins, Sema-2a and Sema-2b, provide spatial cues for PN dendrite targeting. Sema-2a and Sema-2b proteins are distributed in gradients opposing the Sema-1a protein gradient, and Sema-1a binds to Sema-2a-expressing cells. In Sema-2a and Sema-2b double mutants, PN dendrites that normally target dorsolaterally in the antennal lobe mistarget ventromedially, phenocopying cell-autonomous Sema-1a removal from these PNs. Cell ablation, cell-specific knockdown, and rescue experiments indicate that secreted semaphorins from degenerating larval ORN axons direct dendrite targeting. Thus, a degenerating brain structure instructs the wiring of a developing circuit through the repulsive action of secreted semaphorins.},
  author       = {Sweeney, Lora Beatrice Jaeger and Chou, Ya-Hui and Wu, Zhuhao and Joo, William and Komiyama, Takaki and Potter, Christopher J. and Kolodkin, Alex L. and Garcia, K. Christopher and Luo, Liqun},
  issn         = {0896-6273},
  journal      = {Neuron},
  number       = {5},
  pages        = {734--747},
  publisher    = {Elsevier},
  title        = {{Secreted semaphorins from degenerating larval ORN axons direct adult projection neuron dendrite targeting}},
  doi          = {10.1016/j.neuron.2011.09.026},
  volume       = {72},
  year         = {2011},
}

@article{7702,
  abstract     = {Longitudinal axon fascicles within the Drosophila embryonic CNS provide connections between body segments and are required for coordinated neural signaling along the anterior-posterior axis. We show here that establishment of select CNS longitudinal tracts and formation of precise mechanosensory afferent innervation to the same CNS region are coordinately regulated by the secreted semaphorins Sema-2a and Sema-2b. Both Sema-2a and Sema-2b utilize the same neuronal receptor, plexin B (PlexB), but serve distinct guidance functions. Localized Sema-2b attraction promotes the initial assembly of a subset of CNS longitudinal projections and subsequent targeting of chordotonal sensory afferent axons to these same longitudinal connectives, whereas broader Sema-2a repulsion serves to prevent aberrant innervation. In the absence of Sema-2b or PlexB, chordotonal afferent connectivity within the CNS is severely disrupted, resulting in specific larval behavioral deficits. These results reveal that distinct semaphorin-mediated guidance functions converge at PlexB and are critical for functional neural circuit assembly.},
  author       = {Wu, Zhuhao and Sweeney, Lora Beatrice Jaeger and Ayoob, Joseph C. and Chak, Kayam and Andreone, Benjamin J. and Ohyama, Tomoko and Kerr, Rex and Luo, Liqun and Zlatic, Marta and Kolodkin, Alex L.},
  issn         = {0896-6273},
  journal      = {Neuron},
  number       = {2},
  pages        = {281--298},
  publisher    = {Elsevier},
  title        = {{A combinatorial semaphorin code instructs the initial steps of sensory circuit assembly in the Drosophila CNS}},
  doi          = {10.1016/j.neuron.2011.02.050},
  volume       = {70},
  year         = {2011},
}

@article{7750,
  author       = {Robinson, Matthew Richard},
  issn         = {1465-7279},
  journal      = {Behavioral Ecology},
  number       = {6},
  pages        = {1143--1144},
  publisher    = {Oxford University Press},
  title        = {{Understanding intrasexual competition and sexual selection requires an evolutionary ecology framework}},
  doi          = {10.1093/beheco/arr110},
  volume       = {22},
  year         = {2011},
}

@article{469,
  abstract     = {Spontaneous release of glutamate is important for maintaining synaptic strength and controlling spike timing in the brain. Mechanisms regulating spontaneous exocytosis remain poorly understood. Extracellular calcium concentration ([Ca2+]o) regulates Ca2+ entry through voltage-activated calcium channels (VACCs) and consequently is a pivotal determinant of action potential-evoked vesicle fusion. Extracellular Ca 2+ also enhances spontaneous release, but via unknown mechanisms. Here we report that external Ca2+ triggers spontaneous glutamate release more weakly than evoked release in mouse neocortical neurons. Blockade of VACCs has no effect on the spontaneous release rate or its dependence on [Ca2+]o. Intracellular [Ca2+] slowly increases in a minority of neurons following increases in [Ca2+]o. Furthermore, the enhancement of spontaneous release by extracellular calcium is insensitive to chelation of intracellular calcium by BAPTA. Activation of the calcium-sensing receptor (CaSR), a G-protein-coupled receptor present in nerve terminals, by several specific agonists increased spontaneous glutamate release. The frequency of spontaneous synaptic transmission was decreased in CaSR mutant neurons. The concentration-effect relationship for extracellular calcium regulation of spontaneous release was well described by a combination of CaSR-dependent and CaSR-independent mechanisms. Overall these results indicate that extracellular Ca2+ does not trigger spontaneous glutamate release by simply increasing calcium influx but stimulates CaSR and thereby promotes resting spontaneous glutamate release. },
  author       = {Vyleta, Nicholas and Smith, Stephen},
  journal      = {European Journal of Neuroscience},
  number       = {12},
  pages        = {4593 -- 4606},
  publisher    = {Wiley-Blackwell},
  title        = {{Spontaneous glutamate release is independent of calcium influx and tonically activated by the calcium-sensing receptor}},
  doi          = {10.1523/JNEUROSCI.6398-10.2011},
  volume       = {31},
  year         = {2011},
}

@article{490,
  abstract     = {BioSig is an open source software library for biomedical signal processing. The aim of the BioSig project is to foster research in biomedical signal processing by providing free and open source software tools for many different application areas. Some of the areas where BioSig can be employed are neuroinformatics, brain-computer interfaces, neurophysiology, psychology, cardiovascular systems, and sleep research. Moreover, the analysis of biosignals such as the electroencephalogram (EEG), electrocorticogram (ECoG), electrocardiogram (ECG), electrooculogram (EOG), electromyogram (EMG), or respiration signals is a very relevant element of the BioSig project. Specifically, BioSig provides solutions for data acquisition, artifact processing, quality control, feature extraction, classification, modeling, and data visualization, to name a few. In this paper, we highlight several methods to help students and researchers to work more efficiently with biomedical signals. },
  author       = {Schlögl, Alois and Vidaurre, Carmen and Sander, Tilmann},
  journal      = {Computational Intelligence and Neuroscience},
  publisher    = {Hindawi Publishing Corporation},
  title        = {{BioSig: The free and open source software library for biomedical signal processing}},
  doi          = {10.1155/2011/935364},
  volume       = {2011},
  year         = {2011},
}

@article{491,
  abstract     = {In their search for antigens, lymphocytes continuously shuttle among blood vessels, lymph vessels, and lymphatic tissues. Chemokines mediate entry of lymphocytes into lymphatic tissues, and sphingosine 1-phosphate (S1P) promotes localization of lymphocytes to the vasculature. Both signals are sensed through G protein-coupled receptors (GPCRs). Most GPCRs undergo ligand-dependent homologous receptor desensitization, a process that decreases their signaling output after previous exposure to high ligand concentration. Such desensitization can explain why lymphocytes do not take an intermediate position between two signals but rather oscillate between them. The desensitization of S1P receptor 1 (S1PR1) is mediated by GPCR kinase 2 (GRK2). Deletion of GRK2 in lymphocytes compromises desensitization by high vascular S1P concentrations, thereby reducing responsiveness to the chemokine signal and trapping the cells in the vascular compartment. The desensitization kinetics of S1PR1 allows lymphocytes to dynamically shuttle between vasculature and lymphatic tissue, although the positional information in both compartments is static.},
  author       = {Eichner, Alexander and Sixt, Michael K},
  journal      = {Science Signaling},
  number       = {198},
  publisher    = {American Association for the Advancement of Science},
  title        = {{Setting the clock for recirculating lymphocytes}},
  doi          = {10.1126/scisignal.2002617},
  volume       = {4},
  year         = {2011},
}

@article{518,
  abstract     = {Cancer stem cells or cancer initiating cells are believed to contribute to cancer recurrence after therapy. MicroRNAs (miRNAs) are short RNA molecules with fundamental roles in gene regulation. The role of miRNAs in cancer stem cells is only poorly understood. Here, we report miRNA expression profiles of glioblastoma stem cell-containing CD133 + cell populations. We find that miR-9, miR-9 * (referred to as miR-9/9 *), miR-17 and miR-106b are highly abundant in CD133 + cells. Furthermore, inhibition of miR-9/9 * or miR-17 leads to reduced neurosphere formation and stimulates cell differentiation. Calmodulin-binding transcription activator 1 (CAMTA1) is a putative transcription factor, which induces the expression of the anti-proliferative cardiac hormone natriuretic peptide A (NPPA). We identify CAMTA1 as an miR-9/9 * and miR-17 target. CAMTA1 expression leads to reduced neurosphere formation and tumour growth in nude mice, suggesting that CAMTA1 can function as tumour suppressor. Consistently, CAMTA1 and NPPA expression correlate with patient survival. Our findings could provide a basis for novel strategies of glioblastoma therapy.},
  author       = {Schraivogel, Daniel and Weinmann, Lasse and Beier, Dagmar and Tabatabai, Ghazaleh and Eichner, Alexander and Zhu, Jia and Anton, Martina and Sixt, Michael K and Weller, Michael and Beier, Christoph and Meister, Gunter},
  journal      = {EMBO Journal},
  number       = {20},
  pages        = {4309 -- 4322},
  publisher    = {Wiley-Blackwell},
  title        = {{CAMTA1 is a novel tumour suppressor regulated by miR-9/9 * in glioblastoma stem cells}},
  doi          = {10.1038/emboj.2011.301},
  volume       = {30},
  year         = {2011},
}

@article{531,
  abstract     = {Software transactional memories (STM) are described in the literature with assumptions of sequentially consistent program execution and atomicity of high level operations like read, write, and abort. However, in a realistic setting, processors use relaxed memory models to optimize hardware performance. Moreover, the atomicity of operations depends on the underlying hardware. This paper presents the first approach to verify STMs under relaxed memory models with atomicity of 32 bit loads and stores, and read-modify-write operations. We describe RML, a simple language for expressing concurrent programs. We develop a semantics of RML parametrized by a relaxed memory model. We then present our tool, FOIL, which takes as input the RML description of an STM algorithm restricted to two threads and two variables, and the description of a memory model, and automatically determines the locations of fences, which if inserted, ensure the correctness of the restricted STM algorithm under the given memory model. We use FOIL to verify DSTM, TL2, and McRT STM under the memory models of sequential consistency, total store order, partial store order, and relaxed memory order for two threads and two variables. Finally, we extend the verification results for DSTM and TL2 to an arbitrary number of threads and variables by manually proving that the structural properties of STMs are satisfied at the hardware level of atomicity under the considered relaxed memory models.},
  author       = {Guerraoui, Rachid and Henzinger, Thomas A and Singh, Vasu},
  journal      = {Formal Methods in System Design},
  number       = {3},
  pages        = {297 -- 331},
  publisher    = {Springer},
  title        = {{Verification of STM on relaxed memory models}},
  doi          = {10.1007/s10703-011-0131-3},
  volume       = {39},
  year         = {2011},
}

@misc{5379,
  abstract     = {Computing the winning set for Büchi objectives in alternating games on graphs is a central problem in computer aided verification with a large number of applications. The long standing best known upper bound for solving the problem is ̃O(n·m), where n is the number of vertices and m is the number of edges in the graph. We are the first to break the ̃O(n·m) boundary by presenting a new technique that reduces the running time to O(n2). This bound also leads to O(n2) time algorithms for computing the set of almost-sure winning vertices for Büchi objectives (1) in alternating games with probabilistic transitions (improving an earlier bound of O(n·m)), (2) in concurrent graph games with constant actions (improving an earlier bound of O(n3)), and (3) in Markov decision processes (improving for m > n4/3 an earlier bound of O(min(m1.5, m·n2/3)). We also show that the same technique can be used to compute the maximal end-component decomposition of a graph in time O(n2), which is an improvement over earlier bounds for m > n4/3. Finally, we show how to maintain the winning set for Büchi objectives in alternating games under a sequence of edge insertions or a sequence of edge deletions in O(n) amortized time per operation. This is the first dynamic algorithm for this problem.},
  author       = {Chatterjee, Krishnendu and Henzinger, Monika H},
  issn         = {2664-1690},
  pages        = {20},
  publisher    = {IST Austria},
  title        = {{An O(n2) time algorithm for alternating Büchi games}},
  doi          = {10.15479/AT:IST-2011-0009},
  year         = {2011},
}

@misc{5380,
  abstract     = {We consider 2-player games played on a finite state space for an infinite number of rounds.  The games are concurrent: in each round, the two players (player 1 and player 2) choose their moves independently and simultaneously; the current state and the two moves determine the successor state. We study concurrent games with ω-regular winning conditions specified as parity objectives.  We consider the qualitative analysis problems: the computation of the almost-sure and limit-sure winning set of states, where player 1 can ensure to win with probability 1 and with probability arbitrarily close to 1, respectively. In general the almost-sure and limit-sure winning strategies require both infinite-memory as well as infinite-precision (to describe probabilities). We study the bounded-rationality problem for qualitative analysis of concurrent parity games, where the strategy set for player 1 is restricted to bounded-resource strategies.  In terms of precision, strategies can be deterministic, uniform, finite-precision or infinite-precision;  and in terms of memory, strategies can be memoryless, finite-memory or infinite-memory. We present a precise and complete characterization of the qualitative winning sets for all combinations of classes of strategies. In particular, we show that uniform memoryless strategies are as powerful as finite-precision infinite-memory strategies, and infinite-precision memoryless strategies are as powerful as infinite-precision finite-memory strategies.  We show that the winning sets can be computed in O(n2d+3) time, where n is the size of the game structure and 2d is the number of priorities (or colors), and our algorithms are symbolic. The membership problem of whether a state belongs to a winning set can be decided in NP ∩ coNP. While this complexity is the same as for the simpler class of turn-based parity games, where in each state only one of the two players has a choice of moves, our algorithms,that are obtained by characterization of the winning sets as μ-calculus formulas, are considerably more involved than those for turn-based games.},
  author       = {Chatterjee, Krishnendu},
  issn         = {2664-1690},
  pages        = {53},
  publisher    = {IST Austria},
  title        = {{Bounded rationality in concurrent parity games}},
  doi          = {10.15479/AT:IST-2011-0008},
  year         = {2011},
}

@misc{5381,
  abstract     = {In two-player finite-state stochastic games of partial obser- vation on graphs, in every state of the graph, the players simultaneously choose an action, and their joint actions determine a probability distri- bution over the successor states. The game is played for infinitely many rounds and thus the players construct an infinite path in the graph. We consider reachability objectives where the first player tries to ensure a target state to be visited almost-surely (i.e., with probability 1) or pos- itively (i.e., with positive probability), no matter the strategy of the second player.

We classify such games according to the information and to the power of randomization available to the players. On the basis of information, the game can be one-sided with either (a) player 1, or (b) player 2 having partial observation (and the other player has perfect observation), or two- sided with (c) both players having partial observation. On the basis of randomization, (a) the players may not be allowed to use randomization (pure strategies), or (b) they may choose a probability distribution over actions but the actual random choice is external and not visible to the player (actions invisible), or (c) they may use full randomization.

Our main results for pure strategies are as follows: (1) For one-sided games with player 2 perfect observation we show that (in contrast to full randomized strategies) belief-based (subset-construction based) strate- gies are not sufficient, and present an exponential upper bound on mem- ory both for almost-sure and positive winning strategies; we show that the problem of deciding the existence of almost-sure and positive winning strategies for player 1 is EXPTIME-complete and present symbolic algo- rithms that avoid the explicit exponential construction. (2) For one-sided games with player 1 perfect observation we show that non-elementary memory is both necessary and sufficient for both almost-sure and posi- tive winning strategies. (3) We show that for the general (two-sided) case finite-memory strategies are sufficient for both positive and almost-sure winning, and at least non-elementary memory is required. We establish the equivalence of the almost-sure winning problems for pure strategies and for randomized strategies with actions invisible. Our equivalence re- sult exhibit serious flaws in previous results in the literature: we show a non-elementary memory lower bound for almost-sure winning whereas an exponential upper bound was previously claimed.},
  author       = {Chatterjee, Krishnendu and Doyen, Laurent},
  issn         = {2664-1690},
  pages        = {43},
  publisher    = {IST Austria},
  title        = {{Partial-observation stochastic games: How to win when belief fails}},
  doi          = {10.15479/AT:IST-2011-0007},
  year         = {2011},
}

@misc{5382,
  abstract     = {We consider two-player stochastic games played on a finite state space for an infinite num- ber of rounds. The games are concurrent: in each round, the two players (player 1 and player 2) choose their moves independently and simultaneously; the current state and the two moves determine a probability distribution over the successor states. We also consider the important special case of turn-based stochastic games where players make moves in turns, rather than concurrently. We study concurrent games with ω-regular winning conditions specified as parity objectives. The value for player 1 for a parity objective is the maximal probability with which the player can guarantee the satisfaction of the objective against all strategies of the opponent. We study the problem of continuity and robustness of the value function in concurrent and turn-based stochastic parity games with respect to imprecision in the transition probabilities. We present quantitative bounds on the difference of the value function (in terms of the imprecision of the transition probabilities) and show the value continuity for structurally equivalent concurrent games (two games are structurally equivalent if the support of the transition func- tion is same and the probabilities differ). We also show robustness of optimal strategies for structurally equivalent turn-based stochastic parity games. Finally we show that the value continuity property breaks without the structurally equivalent assumption (even for Markov chains) and show that our quantitative bound is asymptotically optimal. Hence our results are tight (the assumption is both necessary and sufficient) and optimal (our quantitative bound is asymptotically optimal).},
  author       = {Chatterjee, Krishnendu},
  issn         = {2664-1690},
  pages        = {18},
  publisher    = {IST Austria},
  title        = {{Robustness of structurally equivalent concurrent parity games}},
  doi          = {10.15479/AT:IST-2011-0006},
  year         = {2011},
}

@misc{5383,
  abstract     = {We present a new decidable logic called TREX for expressing constraints about imperative tree data structures. In particular, TREX supports a transitive closure operator that can express reachability constraints, which often appear in data structure invariants. We show that our logic is closed under weakest precondition computation, which enables its use for automated software verification. We further show that satisfiability of formulas in TREX is decidable in NP. The low complexity makes it an attractive alternative to more expensive logics such as monadic second-order logic (MSOL) over trees, which have been traditionally used for reasoning about tree data structures.},
  author       = {Wies, Thomas and Muñiz, Marco and Kuncak, Viktor},
  issn         = {2664-1690},
  pages        = {25},
  publisher    = {IST Austria},
  title        = {{On an efficient decision procedure for imperative tree data structures}},
  doi          = {10.15479/AT:IST-2011-0005},
  year         = {2011},
}

@misc{5384,
  abstract     = {We consider probabilistic automata on infinite words with acceptance defined by parity conditions. We consider three qualitative decision problems: (i) the positive decision problem asks whether there is a word that is accepted with positive probability; (ii) the almost decision problem asks whether there is a word that is accepted with probability 1; and (iii) the limit decision problem asks whether for every ε > 0 there is a word that is accepted with probability at least 1 − ε. We unify and generalize several decidability results for probabilistic automata over infinite words, and identify a robust (closed under union and intersection) subclass of probabilistic automata for which all the qualitative decision problems are decidable for parity conditions. We also show that if the input words are restricted to lasso shape words, then the positive and almost problems are decidable for all probabilistic automata with parity conditions.},
  author       = {Chatterjee, Krishnendu and Tracol, Mathieu},
  issn         = {2664-1690},
  pages        = {30},
  publisher    = {IST Austria},
  title        = {{Decidable problems for probabilistic automata on infinite words}},
  doi          = {10.15479/AT:IST-2011-0004},
  year         = {2011},
}

