@article{4263,
  abstract     = {We introduce a general recursion for the probability of identity in state of two individuals sampled from a population subject to mutation, migration, and random drift in a two-dimensional continuum. The recursion allows for the interactions induced by density-dependent regulation of the population, which are inevitable in a continuous population. We give explicit series expansions for large neighbourhood size and for low mutation rates respectively and investigate the accuracy of the classical Malécot formula for these general models. When neighbourhood size is small, this formula does not give the identity even over large scales. However, for large neighbourhood size, it is an accurate approximation which summarises the local population structure in terms of three quantities: the effective dispersal rate, σe; the effective population density, ρe; and a local scale, κ, at which local interactions become significant. The results are illustrated by simulations.},
  author       = {Barton, Nicholas H and Depaulis, Frantz and Etheridge, Alison},
  issn         = {0040-5809},
  journal      = {Theoretical Population Biology},
  number       = {1},
  pages        = {31 -- 48},
  publisher    = {Academic Press},
  title        = {{Neutral evolution in spatially continuous populations}},
  doi          = {10.1006/tpbi.2001.1557},
  volume       = {61},
  year         = {2002},
}

@article{4347,
  abstract     = {Phylogenetic trees can be rooted by a number of criteria. Here, we introduce a Bayesian method for inferring the root of a phylogenetic tree by using one of several criteria: the outgroup, molecular clock, and nonreversible model of DNA substitution. We perform simulation analyses to examine the relative ability of these three criteria to correctly identify the root of the tree. The outgroup and molecular clock criteria were best able to identify the root of the tree, whereas the nonreversible model was able to identify the root only when the substitution process was highly nonreversible. We also examined the performance of the criteria for a tree of four species for which the topology and root position are well supported. Results of the analyses of these data are consistent with the simulation results.},
  author       = {Huelsenbeck, John and Bollback, Jonathan P and Levine, Amy},
  issn         = {0039-7989},
  journal      = {Systematic Biology},
  number       = {1},
  pages        = {32 -- 43},
  publisher    = {Oxford University Press},
  title        = {{Inferring the root of a phylogenetic tree}},
  doi          = {10.1080/106351502753475862},
  volume       = {51},
  year         = {2002},
}

@article{4349,
  abstract     = {Bayesian inference is becoming a common statistical approach to phylogenetic estimation because, among other reasons, it allows for rapid analysis of large data sets with complex evolutionary models. Conveniently, Bayesian phylogenetic methods use currently available stochastic models of sequence evolution. However, as with other model-based approaches, the results of Bayesian inference are conditional on the assumed model of evolution: inadequate models (models that poorly fit the data) may result in erroneous inferences. In this article, I present a Bayesian phylogenetic method that evaluates the adequacy of evolutionary models using posterior predictive distributions. By evaluating a model's posterior predictive performance, an adequate model can be selected for a Bayesian phylogenetic study. Although I present a single test statistic that assesses the overall (global) performance of a phylogenetic model, a variety of test statistics can be tailored to evaluate specific features (local performance) of evolutionary models to identify sources failure. The method presented here, unlike the likelihood-ratio test and parametric bootstrap, accounts for uncertainty in the phylogeny and model parameters.},
  author       = {Bollback, Jonathan P},
  issn         = {0737-4038},
  journal      = {Molecular Biology and Evolution},
  number       = {7},
  pages        = {1171 -- 80},
  publisher    = {Oxford University Press},
  title        = {{Bayesian model adequacy and choice in phylogenetics}},
  doi          = {10.1093/oxfordjournals.molbev.a004175},
  volume       = {19},
  year         = {2002},
}

@article{4407,
  abstract     = {This paper presents a complete axiomatization of two decidable propositional real-time linear temporal logics: Event Clock Logic (EventClockTL) and Metric Interval Temporal Logic with past (MetricIntervalTL). The completeness proof consists of an effective proof building procedure for EventClockTL. From this result we obtain a complete axiomatization of MetricIntervalTL by providing axioms translating MetricIntervalTL formulae into EventClockTL formulae, the two logics being equally expressive. Our proof is structured to yield axiomatizations also for interesting fragments of these logics, such as the linear temporal logic of the real numbers (TLR).},
  author       = {Raskin, Jean and Schobbens, Pierre and Henzinger, Thomas A},
  issn         = {0304-3975},
  journal      = {Theoretical Computer Science},
  number       = {1-2},
  pages        = {151 -- 182},
  publisher    = {Elsevier},
  title        = {{Axioms for real-time logics}},
  doi          = {10.1016/S0304-3975(00)00308-X},
  volume       = {274},
  year         = {2002},
}

@inproceedings{4413,
  abstract     = {An essential problem in component-based design is how to compose components designed in isolation. Several approaches have been proposed for specifying component interfaces that capture behavioral aspects such as interaction protocols, and for verifying interface compatibility. Likewise, several approaches have been developed for synthesizing converters between incompatible protocols. In this paper, we introduce the notion of adaptability as the property that two interfaces have when they can be made compatible by communicating through a converter that meets specified requirements. We show that verifying adaptability and synthesizing an appropriate converter are two faces of the same coin: adaptability can be formalized and solved using a game-theoretic framework, and then the converter can be synthesized as a strategy that always wins the game. Finally we show that this framework can be related to the rectification problem in trace theory.},
  author       = {Passerone, Roberto and De Alfaro, Luca and Henzinger, Thomas A and Sangiovanni Vincentelli, Alberto},
  booktitle    = {Proceedings of the 11th IEEE/ACM international conference on Computer-aided design},
  isbn         = {9780780376076},
  location     = {San Jose, CA, USA},
  pages        = {132 -- 139},
  publisher    = {IEEE},
  title        = {{Convertibility verification and converter synthesis: Two faces of the same coin}},
  doi          = {10.1145/774572.774592},
  year         = {2002},
}

@phdthesis{4414,
  abstract     = {This dissertation investigates game-theoretic approaches to the algorithmic analysis of concurrent, reactive systems. A concurrent system comprises a number of components working concurrently; a reactive system maintains an ongoing interaction with its environment. Traditional approaches to the formal analysis of concurrent reactive systems usually view the system as an unstructured state-transition graphs; instead, we view them as collections of interacting components, where each one is an open system which accepts inputs from the other components. The interactions among the components are naturally modeled as games.

Adopting this game-theoretic view, we study three related problems pertaining to the verification and synthesis of systems. Firstly, we propose two novel game-theoretic techniques for the model-checking of concurrent reactive systems, and improve the performance of model-checking. The first technique discovers an error as soon as it cannot be prevented, which can be long before it actually occurs. This technique is based on the key observation that &quot;unpreventability&quot; is a local property to a module: an error is unpreventable in a module state if no environment can prevent it. The second technique attempts to decompose a model-checking proof into smaller proof obligations by constructing abstract modules automatically, using reachability and &quot;unpreventability&quot; information about the concrete modules. Three increasingly powerful proof decomposition rules are proposed and we show that in practice, the resulting abstract modules are often significantly smaller than the concrete modules and can drastically reduce the space and time requirements for verification. Both techniques fall into the category of compositional reasoning.

Secondly, we investigate the composition and control of synchronous systems. An essential property of synchronous systems for compositional reasoning is non-blocking. In the composition of synchronous systems, however, due to circular causal dependency of input and output signals, non-blocking is not always guaranteed. Blocking compositions of systems can be ruled out semantically, by insisting on the existence of certain fixed points, or syntactically, by equipping systems with types, which make the dependencies between input and output signals transparent. We characterize various typing mechanisms in game-theoretic terms, and study their effects on the controller synthesis problem. We show that our typing systems are general enough to capture interesting real-life synchronous systems such as all delay-insensitive digital circuits. We then study their corresponding single-step control problems --a restricted form of controller synthesis problem whose solutions can be iterated in appropriate manners to solve all LTL controller synthesis problems. We also consider versions of the controller synthesis problem in which the type of the controller is given. We show that the solution of these fixed-type control problems requires the evaluation of partially ordered (Henkin) quantifiers on boolean formulas, and is therefore harder (nondeterministic exponential time) than more traditional control questions.

Thirdly, we study the synthesis of a class of open systems, namely, uninitialized state machines. The sequential synthesis problem, which is closely related to Church's solvability problem, asks, given a specification in the form of a binary relation between input and output streams, for the construction of a finite-state stream transducer that converts inputs to appropriate outputs. For efficiency reasons, practical sequential hardware is often designed to operate without prior initialization. Such hardware designs can be modeled by uninitialized state machines, which are required to satisfy their specification if started from any state. We solve the sequential synthesis problem for uninitialized systems, that is, we construct uninitialized finite-state stream transducers. We consider specifications given by LTL formulas, deterministic, nondeterministic, universal, and alternating Buechi automata. We solve this uninitialized synthesis problem by reducing it to the well-understood initialized synthesis problem. While our solution is straightforward, it leads, for some specification formalisms, to upper bounds that are exponentially worse than the complexity of the corresponding initialized problems. However, we prove lower bounds to show that our simple solutions are optimal for all considered specification formalisms. The lower bound proofs require nontrivial generic reductions.},
  author       = {Mang, Freddy},
  pages        = {1 -- 116},
  publisher    = {University of California, Berkeley},
  title        = {{Games in open systems verification and synthesis}},
  year         = {2002},
}

@inproceedings{4421,
  abstract     = {We demonstrate the feasibility and benefits of Giotto-based control software development by reimplementing the autopilot system of an autonomously flying model helicopter. Giotto offers a clean separation between the platform-independent concerns of software functionality and I/O timing, and the platform-dependent concerns of software scheduling and execution. Functionality code such as code computing control laws can be generated automatically from Simulink models or, as in the case of this project, inherited from a legacy system. I/O timing code is generated automatically from Giotto models that specify real-time requirements such as task frequencies and actuator update rates. We extend Simulink to support the design of Giotto models, and from these models, the automatic generation of Giotto code that supervises the interaction of the functionality code with the physical environment. The Giotto compiler performs a schedulability analysis on the Giotto code, and generates timing code for the helicopter platform. The Giotto methodology guarantees the stringent hard real-time requirements of the autopilot system, and at the same time supports the automation of the software development process in a way that produces a transparent software architecture with predictable behavior and reusable components.},
  author       = {Kirsch, Christoph and Sanvido, Marco and Henzinger, Thomas A and Pree, Wolfgang},
  booktitle    = {Proceedings of the 2nd International Conference on Embedded Software},
  isbn         = {9783540443070},
  location     = {Grenoble, France},
  pages        = {46 -- 60},
  publisher    = {ACM},
  title        = {{A Giotto-based helicopter control system}},
  doi          = {10.1007/3-540-45828-X_5},
  volume       = {2491},
  year         = {2002},
}

@inproceedings{4422,
  abstract     = {Behavioral properties of open systems can be formalized as objectives in two-player games. Turn-based games model asynchronous interaction between the players (the system and its environment) by interleaving their moves. Concurrent games model synchronous interaction: the players always move simultaneously. Infinitary winning criteria are considered: Büchi, co-Büchi, and more general parity conditions. A generalization of determinacy for parity games to concurrent parity games demands probabilistic (mixed) strategies: either player 1 has a mixed strategy to win with probability 1 (almost-sure winning), or player 2 has a mixed strategy to win with positive probability.
This work provides efficient reductions of concurrent probabilistic Büchi and co-Büchi games to turn-based games with Büchi condition and parity winning condition with three priorities, respectively. From a theoretical point of view, the latter reduction shows that one can trade the probabilistic nature of almost-sure winning for a more general parity (fairness) condition. The reductions improve understanding of concurrent games and provide an alternative simple proof of determinacy of concurrent Büchi and co-Büchi games. From a practical point of view, the reductions turn solvers of turn-based games into solvers of concurrent probabilistic games. Thus improvements in the well-studied algorithms for the former carry over immediately to the latter. In particular, a recent improvement in the complexity of solving turn-based parity games yields an improvement in time complexity of solving concurrent probabilistic co-Büchi games from cubic to quadratic.},
  author       = {Jurdziński, Marcin and Kupferman, Orna and Henzinger, Thomas A},
  booktitle    = {Proceedings of the 16th International Workshop on Computer Science Logic},
  isbn         = {9783540442400},
  location     = {Edinburgh, Scotland},
  pages        = {292 -- 305},
  publisher    = {Springer},
  title        = {{Trading probability for fairness}},
  doi          = {10.1007/3-540-45793-3_20},
  volume       = {2471},
  year         = {2002},
}

@inproceedings{4423,
  abstract     = {Automation control systems typically incorporate legacy code and components that were originally designed to operate independently. Furthermore, they operate under stringent safety and timing constraints. Current design strategies deal with these requirements and characteristics with ad hoc approaches. In particular, when designing control laws, implementation constraints are often ignored or cursorily estimated. Indeed, costly redesigns are needed after a prototype of the control system is built due to missed timing constraints and subtle transient errors. In this paper, we use the concepts of platform-based design, and the Giotto programming language, to develop a methodology for the design of automation control systems that builds in modularity and correct-by-construction procedures. We illustrate our strategy by describing the (successful) application of the methodology to the design of a time-based control system for a rotorcraft Uninhabited Aerial Vehicle (UAV).},
  author       = {Horowitz, Benjamin and Liebman, Judith and Ma, Cedric and Koo, T John and Henzinger, Thomas A and Sangiovanni Vincentelli, Alberto and Sastry, Shankar},
  booktitle    = {Proceedings of the 15th Triennial World Congress of the International Federation of Automatic Control},
  issn         = {1474-6670},
  location     = {Barcelona, Spain},
  number       = {1},
  publisher    = {Elsevier},
  title        = {{Embedded software design and system integration for rotorcraft UAV using platforms}},
  doi          = {10.3182/20020721-6-ES-1901.01628},
  volume       = {15},
  year         = {2002},
}

@inproceedings{4444,
  abstract     = {The Embedded Machine is a virtual machine that mediates in real time the interaction between software processes and physical processes. It separates the compilation of embedded programs into two phases. The first, platform-independent compiler phase generates E code (code executed by the Embedded Machine), which supervises the timing ---not the scheduling--- of application tasks relative to external events, such as clock ticks and sensor interrupts. E~code is portable and exhibits, given an input behavior, predictable (i.e., deterministic) timing and output behavior. The second, platform-dependent compiler phase checks the time safety of the E code, that is, whether platform performance (determined by the hardware) and platform utilization (determined by the scheduler of the operating system) enable its timely execution. We have used the Embedded Machine to compile and execute high-performance control applications written in Giotto, such as the flight control system of an autonomous model helicopter.},
  author       = {Henzinger, Thomas A and Kirsch, Christoph},
  booktitle    = {Proceedings of the ACM SIGPLAN 2002 conference on Programming language design and implementation},
  isbn         = {9781581134636},
  location     = {Berlin, Germany},
  pages        = {315 -- 326},
  publisher    = {ACM},
  title        = {{The embedded machine: predictable, portable real-time code}},
  doi          = {10.1145/512529.512567},
  year         = {2002},
}

@inproceedings{4470,
  abstract     = {Giotto is a platform-independent language for specifying software for high-performance control applications. In this paper we present a new approach to the compilation of Giotto. Following this approach, the Giotto compiler generates code for a virtual machine, called the E machine, which can be ported to different platforms. The Giotto compiler also checks if the generated E code is time safe for a given platform, that is, if the platform offers sufficient performance to ensure that the E code is executed in a timely fashion that conforms with the Giotto semantics. Time-safety checking requires a schedulability analysis. We show that while for arbitrary E code, the analysis is exponential, for E code generated from typical Giotto programs, the analysis is polynomial. This supports our claim that Giotto identifies a useful fragment of embedded programs.},
  author       = {Henzinger, Thomas A and Kirsch, Christoph and Majumdar, Ritankar and Matic, Slobodan},
  booktitle    = {Proceedings of the 2nd International Conference on Embedded Software},
  isbn         = {9783540443070},
  location     = {Grenoble, France},
  pages        = {76 -- 92},
  publisher    = {ACM},
  title        = {{Time-safety checking for embedded programs}},
  doi          = {10.1007/3-540-45828-X_7},
  volume       = {2491},
  year         = {2002},
}

@inproceedings{4471,
  abstract     = {The sequential synthesis problem, which is closely related to Church’s solvability problem, asks, given a specification in the form of a binary relation between input and output streams, for the construction of a finite-state stream transducer that converts inputs to appropriate outputs. For efficiency reasons, practical sequential hardware is often designed to operate without prior initialization. Such hardware designs can be modeled by uninitialized state machines, which are required to satisfy their specification if started from any state. In this paper we solve the sequential synthesis problem for uninitialized systems, that is, we construct uninitialized finite-state stream transducers. We consider specifications given by LTL formulas, deterministic, nondeterministic, universal, and alternating Büchi automata. We solve this uninitialized synthesis problem by reducing it to the well-understood initialized synthesis problem. While our solution is straightforward, it leads, for some specification formalisms, to upper bounds that are exponentially worse than the complexity of the corresponding initialized problems. However, we prove lower bounds to show that our simple solutions are optimal for all considered specification formalisms. We also study the problem of deciding whether a given specification is uninitialized, that is, if its uninitialized and initialized synthesis problems coincide. We show that this problem has, for each specification formalism, the same complexity as the equivalence problem.},
  author       = {Henzinger, Thomas A and Krishnan, Sriram and Kupferman, Orna and Mang, Freddy},
  booktitle    = {Proceedings of the 29th International Colloquium on Automata, Languages and Programming},
  isbn         = {9783540438649},
  location     = {Malaga, Spain},
  pages        = {644 -- 656},
  publisher    = {Springer},
  title        = {{Synthesis of uninitialized systems}},
  doi          = {10.1007/3-540-45465-9_55},
  volume       = {2380},
  year         = {2002},
}

@inproceedings{4472,
  abstract     = {We present a methodology and tool for verifying and certifying systems code. The verification is based on the lazy-abstraction paradigm for intertwining the following three logical steps: construct a predicate abstraction from the code, model check the abstraction, and automatically refine the abstraction based on counterexample analysis. The certification is based on the proof-carrying code paradigm. Lazy abstraction enables the automatic construction of small proof certificates. The methodology is implemented in Blast, the Berkeley Lazy Abstraction Software verification Tool. We describe our experience applying Blast to Linux and Windows device drivers. Given the C code for a driver and for a temporal-safety monitor, Blast automatically generates an easily checkable correctness certificate if the driver satisfies the specification, and an error trace otherwise.},
  author       = {Henzinger, Thomas A and Necula, George and Jhala, Ranjit and Sutre, Grégoire and Majumdar, Ritankar and Weimer, Westley},
  booktitle    = {Proceedings of the 14th International Conference on Computer Aided Verification},
  isbn         = {9783540439974},
  location     = {Copenhagen, Denmark},
  pages        = {526 -- 538},
  publisher    = {Springer},
  title        = {{Temporal safety proofs for systems code}},
  doi          = {10.1007/3-540-45657-0_45},
  volume       = {2404},
  year         = {2002},
}

@article{4473,
  abstract     = {The simulation preorder on state transition systems is widely accepted as a useful notion of refinement, both in its own right and as an efficiently checkable sufficient condition for trace containment. For composite systems, due to the exponential explosion of the state space, there is a need for decomposing a simulation check of the form P ≤s Q, denoting &quot;P is simulated by Q,&quot; into simpler simulation checks on the components of P and Q. We present an assume-guarantee rule that enables such a decomposition. To the best of our knowledge, this is the first assume-guarantee rule that applies to a refinement relation different from trace containment. Our rule is circular, and its soundness proof requires induction on trace trees. The proof is constructive: given simulation relations that witness the simulation preorder between corresponding components of P and Q, we provide a procedure for constructing a witness relation for P ≤s Q. We also extend our assume-guarantee rule to account for fairness constraints on transition systems.},
  author       = {Henzinger, Thomas A and Qadeer, Shaz and Rajamani, Sriram and Tasiran, Serdar},
  issn         = {0164-0925},
  journal      = {ACM Transactions on Programming Languages and Systems (TOPLAS)},
  number       = {1},
  pages        = {51 -- 64},
  publisher    = {ACM},
  title        = {{An assume-guarantee rule for checking simulation}},
  doi          = {10.1145/509705.509707},
  volume       = {24},
  year         = {2002},
}

@article{4474,
  abstract     = {The simulation preorder for labeled transition systems is defined locally, and operationally, as a game that relates states with their immediate successor states. Simulation enjoys many appealing properties. First, simulation has a denotational characterization: system S simulates system I iff every computation tree embedded in the unrolling of I can be embedded also in the unrolling of S. Second, simulation has a logical characterization: S simulates I iff every universal branching-time formula satisfied by S is satisfied also by I. It follows that simulation is a suitable notion of implementation, and it is the coarsest abstraction of a system that preserves universal branching-time properties. Third, based on its local definition, simulation between finite-state systems can be checked in polynomial time. Finally, simulation implies trace containment, which cannot be defined locally and requires polynomial space for verification. Hence simulation is widely used both in manual and in automatic verification. Liveness assumptions about transition systems are typically modeled using fairness constraints. Existing notions of simulation for fair transition systems, however, are not local, and as a result, many appealing properties of the simulation preorder are lost. We propose a new view of fair simulation by extending the local definition of simulation to account for fairness: system View the MathML sourcefairly simulates system View the MathML source iff in the simulation game, there is a strategy that matches with each fair computation of View the MathML source a fair computation of View the MathML source. Our definition enjoys a denotational characterization and has a logical characterization: View the MathML source fairly simulates View the MathML source iff every fair computation tree (whose infinite paths are fair) embedded in the unrolling of View the MathML source can be embedded also in the unrolling of View the MathML source or, equivalently, iff every Fair-∀AFMC formula satisfied by View the MathML source is satisfied also by View the MathML source (∀AFMC is the universal fragment of the alternation-free μ-calculus). The locality of the definition leads us to a polynomial-time algorithm for checking fair simulation for finite-state systems with weak and strong fairness constraints. Finally, fair simulation implies fair trace containment and is therefore useful as an efficiently computable local criterion for proving linear-time abstraction hierarchies of fair systems.},
  author       = {Henzinger, Thomas A and Kupferman, Orna and Rajamani, Sriram},
  issn         = {0890-5401},
  journal      = {Information and Computation},
  number       = {1},
  pages        = {64 -- 81},
  publisher    = {Elsevier},
  title        = {{Fair simulation}},
  doi          = {10.1006/inco.2001.3085},
  volume       = {173},
  year         = {2002},
}

@inproceedings{4476,
  abstract     = {One approach to model checking software is based on the abstract-check-refine paradigm: build an abstract model, then check the desired property, and if the check fails, refine the model and start over. We introduce the concept of lazy abstraction to integrate and optimize the three phases of the abstract-check-refine loop. Lazy abstraction continuously builds and refines a single abstract model on demand, driven by the model checker, so that different parts of the model may exhibit different degrees of precision, namely just enough to verify the desired property. We present an algorithm for model checking safety properties using lazy abstraction and describe an implementation of the algorithm applied to C programs. We also provide sufficient conditions for the termination of the method.},
  author       = {Henzinger, Thomas A and Jhala, Ranjit and Majumdar, Ritankar and Sutre, Grégoire},
  booktitle    = {Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages},
  isbn         = {9781581134506},
  location     = {Portland, OR, USA},
  pages        = {58 -- 70},
  publisher    = {ACM},
  title        = {{Lazy abstraction}},
  doi          = {10.1145/503272.503279},
  year         = {2002},
}

@article{2604,
  abstract     = {Cutaneous antidromic vasodilatation and plasma extravasation, two phenomena that occur in neurogenic inflammation, are partially blocked by substance P (SP) receptor antagonists and are known to be mediated in part by mast cell-released substances, such as histamine, serotonin, and nitric oxide. In an attempt to provide a morphological substrate for the above phenomena, we applied light and electron microscopic immunocytochemistry to investigate the pattern of SP innervation of blood vessels and its relationship to mast cells in the skin of the rat lower lip. Furthermore, we examined the distribution of SP (neurokinin-1) receptors and their relationship to SP-immunoreactive (IR) fibers. Our results confirmed that SP-IR fibers are found in cutaneous nerves and that terminal branches are observed around blood vessels and penetrating the epidermis. SP-IR fibers also innervated hair follicles and sebaceous glands. At the ultrastructural level, SP-IR varicosities were observed adjacent to arterioles, capillaries, venules, and mast cells. The varicosities possessed both dense core vesicles and agranular synaptic vesicles. We quantified the distance between SP-IR varicosities and blood vessel endothelial cells. SP-IR terminals were located within 0.23-5.99 μm from the endothelial cell layer in 82.7% of arterioles, in 90.2% of capillaries, and in 86.9% of venules. Although there was a trend for SP-IR fibers to be located closer to the endothelium of venules, this difference was not significant. Neurokinin-1 receptor (NK-1r) immunoreactivity was most abundant in the upper dermis and was associated with the wall of blood vessels. NK-1r were located in equal amounts on the walls of arterioles, capillaries, and venules that were innervated by SP-IR fibers. The present results favor the concept of a participation of SP in cutaneous neurogenic vasodilatation and plasma extravasation both by an action on blood vessels after binding to the NK-1r and by causing the release of substances from mast cells after diffusion through the connective tissue.},
  author       = {Ruocco, Isabella and Cuello, Augusto and Shigemoto, Ryuichi and Ribeiro Da Silva, Alfredo},
  issn         = {0021-9967},
  journal      = {Journal of Comparative Neurology},
  number       = {4},
  pages        = {466 -- 480},
  publisher    = {Wiley-Blackwell},
  title        = {{Light and electron microscopic study of the distribution of substance P-immunoreactive fibers and neurokinin-1 receptors in the skin of the rat lower lip}},
  doi          = {10.1002/cne.1114},
  volume       = {432},
  year         = {2001},
}

@article{2605,
  abstract     = {The granular layer of the cerebellar cortex consists of densely packed neuronal cells, classified into granule cells and large interneurons. In this study, we provide a comparative survey of large granular layer interneurons in the adult rat cerebellum based on both morphological and neurochemical criteria. To this end, double immunofluorescence histochemistry was performed by combining antibodies against the cytoplasmic antigen Rat-303, calretinin, the metabotropic glutamate receptor mGluR2 and somatostatin. Based on Rat-303/calretinin double immunohistochemistry, three distinct populations of large granular layer interneurons could be discerned: cells immunopositive for Rat-303, calretinin or both. Rat-303 or calretinin single-labeled cells represented Golgi cells and unipolar brush cells, respectively. Rat-303/calretinin double-labeled cells located just underneath the Purkinje cell layer represented Lugaro cells. Morphometrical analysis distinguished two populations of Rat-303-positive Golgi cells according to their location: vermis versus hemisphere. Immunostaining for the metabotropic glutamate receptor mGluR2 combined with Rat-303 or calretinin revealed that the majority of Golgi cells (about 90%) appeared to be mGluR2 positive. Lugaro cells were mGluR2 negative. In addition, a limited population of large polymorphous interneurons in the depth of the granular layer with morphological features resembling Golgi cells also displayed Rat-303/calretinin immunoreactivity and were mGluR2 negative. Double immunohistochemistry for Rat-303 and somatostatin revealed three populations of labeled cells in the depth of the granular layer. Besides double-labeled Golgi cells, Rat-303 or somatostatin single-labeled cells were present. Based on mGluR2/somatostatin and calretinin/somatostatin double immunostainings, Rat-303 single-labeled cells were found to correspond to Rat-303/calretinin-positive, mGluR2-negative Golgi-like cells, while the identity of somatostatin single-labeled cells remained unclear. The data presented in this article elaborate previous reports on the morphological and neurochemical differentiation of large interneurons in the rat cerebellar granular layer. In addition, they indicate that the current classification of these cells into Golgi cells, Lugaro cells and unipolar brush cells does not describe the observed neurochemical heterogeneity.},
  author       = {Geurts, Frederik and Timmermans, Jean and Shigemoto, Ryuichi and De Schutter, Erik},
  issn         = {0306-4522},
  journal      = {Neuroscience},
  number       = {2},
  pages        = {499 -- 512},
  publisher    = {Elsevier},
  title        = {{Morphological and neurochemical differentiation of large granular layer interneurons in the adult rat cerebellum}},
  doi          = {10.1016/S0306-4522(01)00058-6},
  volume       = {104},
  year         = {2001},
}

@article{2606,
  abstract     = {Glutamate receptors have been linked to the regulation of several developmental events in the CNS. By using cortical slices of early postnatal mice, we show that in layer I cells, glutamate produces intracellular calcium ([Ca2+]i) elevations mediated by ionotropic and metabotropic glutamate receptors (mGluRs). The contribution of mGluRs to these responses was demonstrated by application of tACPD, an agonist to groups I and II mGluRs, which evoked [Ca2+]i increases that could be reversibly blocked by MCPG, an antagonist to groups I and II mGluRs. In the absence of extracellular Ca2+, repetitive applications of tACPD or quisqualate, an agonist to group I mGluRs, elicited decreasing [Ca2+]i responses that were restored by refilling a thapsigargin-sensitive Ca2+ store. The use of specific group I mGluR agonists CHPG and DHPG indicated that the functional mGluR in layer I was of the mGluR1 subtype. Subtype specific antibodies confirmed the presence of mGlur1α, but not mGluR5, in Cajal-Retzius (Reelin-immunoreactive) neurons.},
  author       = {Martínez, Galán and López Bendito, Guillermina and Luján, Rafael and Shigemoto, Ryuichi and Fairén, Alfonso and Valdeolmillos, Miguel},
  issn         = {0953-816X},
  journal      = {European Journal of Neuroscience},
  number       = {6},
  pages        = {1147 -- 1154},
  publisher    = {Wiley-Blackwell},
  title        = {{Cajal-Retzius cells in early postnatal mouse cortex selectively express functional metabotropic glutamate receptors}},
  doi          = {10.1046/j.0953-816X.2001.01494.x},
  volume       = {13},
  year         = {2001},
}

@article{2607,
  abstract     = {Alternative splicing in the mGluR5 gene generates two different receptor isoforms, of which expression is developmentally regulated. However, little is known about the functional significance of mGluR5 splice variants. We have examined the functional coupling, subcellular targeting, and effect on neuronal differentiation of epitope-tagged mGluR5 isoforms by expression in neuroblastoma NG108-15 cells. We found that both mGluR5 splice variants give rise to comparable [Ca2+]i transients and have similar pharmacological profile. Tagged receptors were shown by immunofluorescence to be inserted in the plasma membrane. In undifferentiated cells the subcellular localization of the two mGluR5 isoforms was partially segregated, whereas in differentiated cells the labeling largely redistributed to the newly formed neurites. Interestingly, we demonstrate that mGluR5 splice variants dramatically influence the formation and maturation of neurites; mGluR5a hinders the acquisition of mature neuronal traits and mGluR5b fosters the elaboration and extension of neurites. These effects are partly inhibited by MPEP.},
  author       = {Mion, Silvia and Corti, Corrado and Neki, Akio and Shigemoto, Ryuichi and Corsi, Mauro and Fumagalli, Guido and Ferraguti, Francesco},
  issn         = {1044-7431},
  journal      = {Molecular and Cellular Neuroscience},
  number       = {6},
  pages        = {957 -- 972},
  publisher    = {Academic Press},
  title        = {{Bidirectional regulation of neurite elaboration by alternatively spliced metabotropic glutamate receptor 5 (mGluR5) isoforms}},
  doi          = {10.1006/mcne.2001.0993},
  volume       = {17},
  year         = {2001},
}

