[{"publication_identifier":{"eissn":["15537404"]},"scopus_import":"1","citation":{"short":"V. Pokusaeva, D.R. Usmanova, E.V. Putintseva, L. Espinar, K. Sarkisyan, A.S. Mishin, N.S. Bogatyreva, D. Ivankov, A. Akopyan, S. Avvakumov, I.S. Povolotskaya, G.J. Filion, L.B. Carey, F. Kondrashov, PLoS Genetics 15 (2019).","mla":"Pokusaeva, Victoria, et al. “An Experimental Assay of the Interactions of Amino Acids from Orthologous Sequences Shaping a Complex Fitness Landscape.” <i>PLoS Genetics</i>, vol. 15, no. 4, e1008079, Public Library of Science, 2019, doi:<a href=\"https://doi.org/10.1371/journal.pgen.1008079\">10.1371/journal.pgen.1008079</a>.","ista":"Pokusaeva V, Usmanova DR, Putintseva EV, Espinar L, Sarkisyan K, Mishin AS, Bogatyreva NS, Ivankov D, Akopyan A, Avvakumov S, Povolotskaya IS, Filion GJ, Carey LB, Kondrashov F. 2019. An experimental assay of the interactions of amino acids from orthologous sequences shaping a complex fitness landscape. PLoS Genetics. 15(4), e1008079.","ieee":"V. Pokusaeva <i>et al.</i>, “An experimental assay of the interactions of amino acids from orthologous sequences shaping a complex fitness landscape,” <i>PLoS Genetics</i>, vol. 15, no. 4. Public Library of Science, 2019.","ama":"Pokusaeva V, Usmanova DR, Putintseva EV, et al. An experimental assay of the interactions of amino acids from orthologous sequences shaping a complex fitness landscape. <i>PLoS Genetics</i>. 2019;15(4). doi:<a href=\"https://doi.org/10.1371/journal.pgen.1008079\">10.1371/journal.pgen.1008079</a>","apa":"Pokusaeva, V., Usmanova, D. R., Putintseva, E. V., Espinar, L., Sarkisyan, K., Mishin, A. S., … Kondrashov, F. (2019). An experimental assay of the interactions of amino acids from orthologous sequences shaping a complex fitness landscape. <i>PLoS Genetics</i>. Public Library of Science. <a href=\"https://doi.org/10.1371/journal.pgen.1008079\">https://doi.org/10.1371/journal.pgen.1008079</a>","chicago":"Pokusaeva, Victoria, Dinara R. Usmanova, Ekaterina V. Putintseva, Lorena Espinar, Karen Sarkisyan, Alexander S. Mishin, Natalya S. Bogatyreva, et al. “An Experimental Assay of the Interactions of Amino Acids from Orthologous Sequences Shaping a Complex Fitness Landscape.” <i>PLoS Genetics</i>. Public Library of Science, 2019. <a href=\"https://doi.org/10.1371/journal.pgen.1008079\">https://doi.org/10.1371/journal.pgen.1008079</a>."},"publication":"PLoS Genetics","oa_version":"Published Version","status":"public","external_id":{"isi":["000466866000029"]},"publisher":"Public Library of Science","day":"10","file":[{"content_type":"application/pdf","file_size":3726017,"date_updated":"2020-07-14T12:47:30Z","file_name":"2019_PLOSGenetics_Pokusaeva.pdf","relation":"main_file","date_created":"2019-05-14T08:26:08Z","creator":"dernst","checksum":"cf3889c8a8a16053dacf9c3776cbe217","access_level":"open_access","file_id":"6445"}],"related_material":{"record":[{"id":"9789","status":"public","relation":"research_data"},{"id":"9790","status":"public","relation":"research_data"},{"relation":"research_data","id":"9797","status":"public"}]},"tmp":{"image":"/images/cc_by.png","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"department":[{"_id":"FyKo"}],"oa":1,"issue":"4","publication_status":"published","ec_funded":1,"date_published":"2019-04-10T00:00:00Z","isi":1,"intvolume":"        15","doi":"10.1371/journal.pgen.1008079","_id":"6419","month":"04","title":"An experimental assay of the interactions of amino acids from orthologous sequences shaping a complex fitness landscape","ddc":["570"],"has_accepted_license":"1","volume":15,"author":[{"full_name":"Pokusaeva, Victoria","last_name":"Pokusaeva","first_name":"Victoria","orcid":"0000-0001-7660-444X","id":"3184041C-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Dinara R.","last_name":"Usmanova","full_name":"Usmanova, Dinara R."},{"last_name":"Putintseva","full_name":"Putintseva, Ekaterina V.","first_name":"Ekaterina V."},{"full_name":"Espinar, Lorena","last_name":"Espinar","first_name":"Lorena"},{"id":"39A7BF80-F248-11E8-B48F-1D18A9856A87","full_name":"Sarkisyan, Karen","last_name":"Sarkisyan","first_name":"Karen","orcid":"0000-0002-5375-6341"},{"first_name":"Alexander S.","last_name":"Mishin","full_name":"Mishin, Alexander S."},{"first_name":"Natalya S.","full_name":"Bogatyreva, Natalya S.","last_name":"Bogatyreva"},{"id":"49FF1036-F248-11E8-B48F-1D18A9856A87","first_name":"Dmitry","last_name":"Ivankov","full_name":"Ivankov, Dmitry"},{"last_name":"Akopyan","full_name":"Akopyan, Arseniy","first_name":"Arseniy","orcid":"0000-0002-2548-617X","id":"430D2C90-F248-11E8-B48F-1D18A9856A87"},{"id":"3827DAC8-F248-11E8-B48F-1D18A9856A87","first_name":"Sergey","full_name":"Avvakumov, Sergey","last_name":"Avvakumov"},{"first_name":"Inna S.","last_name":"Povolotskaya","full_name":"Povolotskaya, Inna S."},{"full_name":"Filion, Guillaume J.","last_name":"Filion","first_name":"Guillaume J."},{"full_name":"Carey, Lucas B.","last_name":"Carey","first_name":"Lucas B."},{"id":"44FDEF62-F248-11E8-B48F-1D18A9856A87","last_name":"Kondrashov","full_name":"Kondrashov, Fyodor","first_name":"Fyodor","orcid":"0000-0001-8243-4694"}],"file_date_updated":"2020-07-14T12:47:30Z","project":[{"_id":"2564DBCA-B435-11E9-9278-68D0E5697425","grant_number":"665385","name":"International IST Doctoral Program","call_identifier":"H2020"}],"abstract":[{"lang":"eng","text":"Characterizing the fitness landscape, a representation of fitness for a large set of genotypes, is key to understanding how genetic information is interpreted to create functional organisms. Here we determined the evolutionarily-relevant segment of the fitness landscape of His3, a gene coding for an enzyme in the histidine synthesis pathway, focusing on combinations of amino acid states found at orthologous sites of extant species. Just 15% of amino acids found in yeast His3 orthologues were always neutral while the impact on fitness of the remaining 85% depended on the genetic background. Furthermore, at 67% of sites, amino acid replacements were under sign epistasis, having both strongly positive and negative effect in different genetic backgrounds. 46% of sites were under reciprocal sign epistasis. The fitness impact of amino acid replacements was influenced by only a few genetic backgrounds but involved interaction of multiple sites, shaping a rugged fitness landscape in which many of the shortest paths between highly fit genotypes are inaccessible."}],"type":"journal_article","date_created":"2019-05-13T07:58:38Z","year":"2019","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","date_updated":"2023-08-25T10:30:37Z","article_number":"e1008079","language":[{"iso":"eng"}],"article_processing_charge":"No","quality_controlled":"1"},{"isi":1,"date_published":"2019-04-16T00:00:00Z","page":"57-66","doi":"10.1145/3302504.3311800","_id":"6428","title":"Interface-aware signal temporal logic","month":"04","ddc":["000"],"has_accepted_license":"1","author":[{"full_name":"Ferrere, Thomas","last_name":"Ferrere","first_name":"Thomas","orcid":"0000-0001-5199-3143","id":"40960E6E-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Dejan","last_name":"Nickovic","full_name":"Nickovic, Dejan","id":"41BCEE5C-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Alexandre","last_name":"Donzé","full_name":"Donzé, Alexandre"},{"full_name":"Ito, Hisahiro","last_name":"Ito","first_name":"Hisahiro"},{"first_name":"James","full_name":"Kapinski, James","last_name":"Kapinski"}],"project":[{"grant_number":"S 11407_N23","name":"Rigorous Systems Engineering","_id":"25832EC2-B435-11E9-9278-68D0E5697425","call_identifier":"FWF"},{"_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211","name":"The Wittgenstein Prize","call_identifier":"FWF"}],"file_date_updated":"2020-10-08T17:25:45Z","date_created":"2019-05-13T08:13:46Z","type":"conference","abstract":[{"text":"Safety and security are major concerns in the development of Cyber-Physical Systems (CPS). Signal temporal logic (STL) was proposedas a language to specify and monitor the correctness of CPS relativeto formalized requirements. Incorporating STL into a developmentprocess enables designers to automatically monitor and diagnosetraces, compute robustness estimates based on requirements, andperform requirement falsification, leading to productivity gains inverification and validation activities; however, in its current formSTL is agnostic to the input/output classification of signals, andthis negatively impacts the relevance of the analysis results.In this paper we propose to make the interface explicit in theSTL language by introducing input/output signal declarations. Wethen define new measures of input vacuity and output robustnessthat better reflect the nature of the system and the specification in-tent. The resulting framework, which we call interface-aware signaltemporal logic (IA-STL), aids verification and validation activities.We demonstrate the benefits of IA-STL on several CPS analysisactivities: (1) robustness-driven sensitivity analysis, (2) falsificationand (3) fault localization. We describe an implementation of our en-hancement to STL and associated notions of robustness and vacuityin a prototype extension of Breach, a MATLAB®/Simulink®toolboxfor CPS verification and validation. We explore these methodologi-cal improvements and evaluate our results on two examples fromthe automotive domain: a benchmark powertrain control systemand a hydrogen fuel cell system.","lang":"eng"}],"year":"2019","date_updated":"2023-08-25T10:19:23Z","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","language":[{"iso":"eng"}],"article_processing_charge":"No","quality_controlled":"1","citation":{"short":"T. Ferrere, D. Nickovic, A. Donzé, H. Ito, J. Kapinski, in:, Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control, ACM, 2019, pp. 57–66.","ieee":"T. Ferrere, D. Nickovic, A. Donzé, H. Ito, and J. Kapinski, “Interface-aware signal temporal logic,” in <i>Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control</i>, Montreal, Canada, 2019, pp. 57–66.","ista":"Ferrere T, Nickovic D, Donzé A, Ito H, Kapinski J. 2019. Interface-aware signal temporal logic. Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control. HSCC: Hybrid Systems Computation and Control, 57–66.","mla":"Ferrere, Thomas, et al. “Interface-Aware Signal Temporal Logic.” <i>Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control</i>, ACM, 2019, pp. 57–66, doi:<a href=\"https://doi.org/10.1145/3302504.3311800\">10.1145/3302504.3311800</a>.","chicago":"Ferrere, Thomas, Dejan Nickovic, Alexandre Donzé, Hisahiro Ito, and James Kapinski. “Interface-Aware Signal Temporal Logic.” In <i>Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control</i>, 57–66. ACM, 2019. <a href=\"https://doi.org/10.1145/3302504.3311800\">https://doi.org/10.1145/3302504.3311800</a>.","apa":"Ferrere, T., Nickovic, D., Donzé, A., Ito, H., &#38; Kapinski, J. (2019). Interface-aware signal temporal logic. In <i>Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control</i> (pp. 57–66). Montreal, Canada: ACM. <a href=\"https://doi.org/10.1145/3302504.3311800\">https://doi.org/10.1145/3302504.3311800</a>","ama":"Ferrere T, Nickovic D, Donzé A, Ito H, Kapinski J. Interface-aware signal temporal logic. In: <i>Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control</i>. ACM; 2019:57-66. doi:<a href=\"https://doi.org/10.1145/3302504.3311800\">10.1145/3302504.3311800</a>"},"scopus_import":"1","publication_identifier":{"isbn":["9781450362825"]},"publication":"Proceedings of the 2019 22nd ACM International Conference on Hybrid Systems: Computation and Control","oa_version":"Submitted Version","status":"public","external_id":{"isi":["000516713900007"]},"publisher":"ACM","conference":{"start_date":"2019-04-16","name":"HSCC: Hybrid Systems Computation and Control","location":"Montreal, Canada","end_date":"2019-04-18"},"day":"16","file":[{"file_size":1055421,"date_updated":"2020-10-08T17:25:45Z","content_type":"application/pdf","date_created":"2020-10-08T17:25:45Z","file_name":"2019_ACM_Ferrere.pdf","relation":"main_file","success":1,"checksum":"b8e967081e051d1c55ca5d18fb187890","creator":"dernst","file_id":"8633","access_level":"open_access"}],"oa":1,"department":[{"_id":"ToHe"}],"publication_status":"published"},{"publication_status":"published","alternative_title":["LNCS"],"department":[{"_id":"KrPi"}],"oa":1,"related_material":{"record":[{"status":"public","id":"10035","relation":"dissertation_contains"}]},"conference":{"end_date":"2019-04-17","name":"PKC: Public-Key Cryptograhy","location":"Beijing, China","start_date":"2019-04-14"},"day":"06","publisher":"Springer Nature","oa_version":"Preprint","status":"public","publication_identifier":{"isbn":["9783030172589"],"issn":["03029743"],"eissn":["16113349"]},"scopus_import":"1","citation":{"ieee":"G. Fuchsbauer, C. Kamath Hosdurg, K. Klein, and K. Z. Pietrzak, “Adaptively secure proxy re-encryption,” presented at the PKC: Public-Key Cryptograhy, Beijing, China, 2019, vol. 11443, pp. 317–346.","ista":"Fuchsbauer G, Kamath Hosdurg C, Klein K, Pietrzak KZ. 2019. Adaptively secure proxy re-encryption. PKC: Public-Key Cryptograhy, LNCS, vol. 11443, 317–346.","mla":"Fuchsbauer, Georg, et al. <i>Adaptively Secure Proxy Re-Encryption</i>. Vol. 11443, Springer Nature, 2019, pp. 317–46, doi:<a href=\"https://doi.org/10.1007/978-3-030-17259-6_11\">10.1007/978-3-030-17259-6_11</a>.","apa":"Fuchsbauer, G., Kamath Hosdurg, C., Klein, K., &#38; Pietrzak, K. Z. (2019). Adaptively secure proxy re-encryption (Vol. 11443, pp. 317–346). Presented at the PKC: Public-Key Cryptograhy, Beijing, China: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-17259-6_11\">https://doi.org/10.1007/978-3-030-17259-6_11</a>","chicago":"Fuchsbauer, Georg, Chethan Kamath Hosdurg, Karen Klein, and Krzysztof Z Pietrzak. “Adaptively Secure Proxy Re-Encryption,” 11443:317–46. Springer Nature, 2019. <a href=\"https://doi.org/10.1007/978-3-030-17259-6_11\">https://doi.org/10.1007/978-3-030-17259-6_11</a>.","ama":"Fuchsbauer G, Kamath Hosdurg C, Klein K, Pietrzak KZ. Adaptively secure proxy re-encryption. In: Vol 11443. Springer Nature; 2019:317-346. doi:<a href=\"https://doi.org/10.1007/978-3-030-17259-6_11\">10.1007/978-3-030-17259-6_11</a>","short":"G. Fuchsbauer, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, in:, Springer Nature, 2019, pp. 317–346."},"main_file_link":[{"url":"https://eprint.iacr.org/2018/426","open_access":"1"}],"quality_controlled":"1","language":[{"iso":"eng"}],"article_processing_charge":"No","year":"2019","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","date_updated":"2023-09-08T11:33:20Z","project":[{"name":"Teaching Old Crypto New Tricks","grant_number":"682815","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","call_identifier":"H2020"}],"abstract":[{"text":"A proxy re-encryption (PRE) scheme is a public-key encryption scheme that allows the holder of a key pk to derive a re-encryption key for any other key 𝑝𝑘′. This re-encryption key lets anyone transform ciphertexts under pk into ciphertexts under 𝑝𝑘′ without having to know the underlying message, while transformations from 𝑝𝑘′ to pk should not be possible (unidirectional). Security is defined in a multi-user setting against an adversary that gets the users’ public keys and can ask for re-encryption keys and can corrupt users by requesting their secret keys. Any ciphertext that the adversary cannot trivially decrypt given the obtained secret and re-encryption keys should be secure.\r\n\r\nAll existing security proofs for PRE only show selective security, where the adversary must first declare the users it wants to corrupt. This can be lifted to more meaningful adaptive security by guessing the set of corrupted users among the n users, which loses a factor exponential in  Open image in new window , rendering the result meaningless already for moderate Open image in new window .\r\n\r\nJafargholi et al. (CRYPTO’17) proposed a framework that in some cases allows to give adaptive security proofs for schemes which were previously only known to be selectively secure, while avoiding the exponential loss that results from guessing the adaptive choices made by an adversary. We apply their framework to PREs that satisfy some natural additional properties. Concretely, we give a more fine-grained reduction for several unidirectional PREs, proving adaptive security at a much smaller loss. The loss depends on the graph of users whose edges represent the re-encryption keys queried by the adversary. For trees and chains the loss is quasi-polynomial in the size and for general graphs it is exponential in their depth and indegree (instead of their size as for previous reductions). Fortunately, trees and low-depth graphs cover many, if not most, interesting applications.\r\n\r\nOur results apply e.g. to the bilinear-map based PRE schemes by Ateniese et al. (NDSS’05 and CT-RSA’09), Gentry’s FHE-based scheme (STOC’09) and the LWE-based scheme by Chandran et al. (PKC’14).","lang":"eng"}],"date_created":"2019-05-13T08:13:46Z","type":"conference","volume":11443,"author":[{"id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","first_name":"Georg","last_name":"Fuchsbauer","full_name":"Fuchsbauer, Georg"},{"id":"4BD3F30E-F248-11E8-B48F-1D18A9856A87","last_name":"Kamath Hosdurg","full_name":"Kamath Hosdurg, Chethan","first_name":"Chethan"},{"first_name":"Karen","last_name":"Klein","full_name":"Klein, Karen","id":"3E83A2F8-F248-11E8-B48F-1D18A9856A87"},{"id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","full_name":"Pietrzak, Krzysztof Z","last_name":"Pietrzak","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z"}],"intvolume":"     11443","doi":"10.1007/978-3-030-17259-6_11","_id":"6430","title":"Adaptively secure proxy re-encryption","month":"04","date_published":"2019-04-06T00:00:00Z","ec_funded":1,"page":"317-346"},{"status":"public","oa_version":"Published Version","citation":{"short":"B.E. Casillas Perez, Collective Defenses of Garden Ants against a Fungal Pathogen, Institute of Science and Technology Austria, 2019.","chicago":"Casillas Perez, Barbara E. “Collective Defenses of Garden Ants against a Fungal Pathogen.” Institute of Science and Technology Austria, 2019. <a href=\"https://doi.org/10.15479/AT:ISTA:6435\">https://doi.org/10.15479/AT:ISTA:6435</a>.","apa":"Casillas Perez, B. E. (2019). <i>Collective defenses of garden ants against a fungal pathogen</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:6435\">https://doi.org/10.15479/AT:ISTA:6435</a>","ama":"Casillas Perez BE. Collective defenses of garden ants against a fungal pathogen. 2019. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:6435\">10.15479/AT:ISTA:6435</a>","ista":"Casillas Perez BE. 2019. Collective defenses of garden ants against a fungal pathogen. Institute of Science and Technology Austria.","ieee":"B. E. Casillas Perez, “Collective defenses of garden ants against a fungal pathogen,” Institute of Science and Technology Austria, 2019.","mla":"Casillas Perez, Barbara E. <i>Collective Defenses of Garden Ants against a Fungal Pathogen</i>. Institute of Science and Technology Austria, 2019, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:6435\">10.15479/AT:ISTA:6435</a>."},"publication_identifier":{"issn":["2663-337X"]},"publisher":"Institute of Science and Technology Austria","day":"07","related_material":{"record":[{"relation":"part_of_dissertation","status":"public","id":"1999"}]},"file":[{"embargo":"2020-05-08","content_type":"application/pdf","date_updated":"2021-02-11T11:17:15Z","file_size":3895187,"relation":"main_file","file_name":"tesisDoctoradoBC.pdf","date_created":"2019-05-13T09:16:20Z","creator":"casillas","checksum":"6daf2d2086111aa8fd3fbc919a3e2833","access_level":"open_access","file_id":"6438"},{"embargo_to":"open_access","access_level":"closed","file_id":"6439","creator":"casillas","checksum":"3d221aaff7559a7060230a1ff610594f","relation":"source_file","file_name":"tesisDoctoradoBC.zip","date_created":"2019-05-13T09:16:20Z","content_type":"application/zip","file_size":7365118,"date_updated":"2020-07-14T12:47:30Z"}],"publication_status":"published","oa":1,"supervisor":[{"last_name":"Cremer","full_name":"Cremer, Sylvia M","first_name":"Sylvia M","orcid":"0000-0002-2193-3868","id":"2F64EC8C-F248-11E8-B48F-1D18A9856A87"}],"department":[{"_id":"SyCr"}],"alternative_title":["ISTA Thesis"],"_id":"6435","month":"05","acknowledged_ssus":[{"_id":"Bio"},{"_id":"ScienComp"},{"_id":"M-Shop"},{"_id":"LifeSc"}],"title":"Collective defenses of garden ants against a fungal pathogen","doi":"10.15479/AT:ISTA:6435","page":"183","degree_awarded":"PhD","date_published":"2019-05-07T00:00:00Z","ec_funded":1,"author":[{"first_name":"Barbara E","full_name":"Casillas Perez, Barbara E","last_name":"Casillas Perez","id":"351ED2AA-F248-11E8-B48F-1D18A9856A87"}],"has_accepted_license":"1","ddc":["570","006","578","592"],"date_updated":"2023-09-07T12:57:04Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","year":"2019","date_created":"2019-05-13T08:58:35Z","type":"dissertation","abstract":[{"text":"Social insect colonies tend to have numerous members which function together like a single organism in such harmony that the term ``super-organism'' is often used. In this analogy the reproductive caste is analogous to the primordial germ\r\ncells of a metazoan, while the sterile worker caste corresponds to somatic cells. The worker castes, like tissues, are\r\nin charge of all functions of a living being, besides reproduction. The establishment of new super-organismal units\r\n(i.e. new colonies) is accomplished by the co-dependent castes. The term oftentimes goes beyond a metaphor. We invoke it when we speak about the metabolic rate, thermoregulation, nutrient regulation and gas exchange of a social insect colony. Furthermore, we assert that the super-organism has an immune system, and benefits from ``social immunity''.\r\n\r\nSocial immunity was first summoned by evolutionary biologists to resolve the apparent discrepancy between the expected high frequency of disease outbreak amongst numerous, closely related tightly-interacting hosts, living in stable and microbially-rich environments, against the exceptionally scarce epidemic accounts in natural populations. Social\r\nimmunity comprises a multi-layer assembly of behaviours which have evolved to effectively keep the pathogenic enemies of a colony at bay. The field of social immunity has drawn interest, as it becomes increasingly urgent to stop\r\nthe collapse of pollinator species and curb the growth of invasive pests. In the past decade, several mechanisms of\r\nsocial immune responses have been dissected, but many more questions remain open.\r\n\r\nI present my work in two experimental chapters. In the first, I use invasive garden ants (*Lasius neglectus*) to study how pathogen load and its distribution among nestmates affect the grooming response of the group. Any given group of ants will carry out the same total grooming work, but will direct their grooming effort towards individuals\r\ncarrying a relatively higher spore load. Contrary to expectation, the highest risk of transmission does not stem from grooming highly contaminated ants, but instead, we suggest that the grooming response likely minimizes spore loss to the environment, reducing contamination from inadvertent pickup from the substrate.\r\n\r\nThe second is a comparative developmental approach. I follow black garden ant queens (*Lasius niger*) and their colonies from mating flight, through hibernation for a year. Colonies which grow fast from the start, have a lower chance of survival through hibernation, and those which survive grow at a lower pace later. This is true for colonies of naive\r\nand challenged queens. Early pathogen exposure of the queens changes colony dynamics in an unexpected way: colonies from exposed queens are more likely to grow slowly and recover in numbers only after they survive hibernation.\r\n\r\nIn addition to the two experimental chapters, this thesis includes a co-authored published review on organisational\r\nimmunity, where we enlist the experimental evidence and theoretical framework on which this hypothesis is built,\r\nidentify the caveats and underline how the field is ripe to overcome them. In a final chapter, I describe my part in\r\ntwo collaborative efforts, one to develop an image-based tracker, and the second to develop a classifier for ant\r\nbehaviour.","lang":"eng"}],"project":[{"_id":"2649B4DE-B435-11E9-9278-68D0E5697425","name":"Epidemics in ant societies on a chip","grant_number":"771402","call_identifier":"H2020"}],"file_date_updated":"2021-02-11T11:17:15Z","keyword":["Social Immunity","Sanitary care","Social Insects","Organisational Immunity","Colony development","Multi-target tracking"],"article_processing_charge":"No","language":[{"iso":"eng"}]},{"intvolume":"        38","doi":"10.1145/3306346.3323002","_id":"6442","acknowledged_ssus":[{"_id":"ScienComp"}],"month":"07","title":"Fundamental solutions for water wave animation","isi":1,"ec_funded":1,"date_published":"2019-07-01T00:00:00Z","author":[{"first_name":"Camille","full_name":"Schreck, Camille","last_name":"Schreck","id":"2B14B676-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Christian","full_name":"Hafner, Christian","last_name":"Hafner","id":"400429CC-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Wojtan","full_name":"Wojtan, Christopher J","orcid":"0000-0001-6646-5546","first_name":"Christopher J","id":"3C61F1D2-F248-11E8-B48F-1D18A9856A87"}],"volume":38,"ddc":["000","005"],"has_accepted_license":"1","year":"2019","date_updated":"2023-08-25T10:18:46Z","article_number":"130","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","project":[{"name":"Efficient Simulation of Natural Phenomena at Extremely Large Scales","grant_number":"638176","_id":"2533E772-B435-11E9-9278-68D0E5697425","call_identifier":"H2020"},{"call_identifier":"H2020","_id":"24F9549A-B435-11E9-9278-68D0E5697425","name":"MATERIALIZABLE: Intelligent fabrication-oriented Computational Design and Modeling","grant_number":"715767"},{"_id":"2564DBCA-B435-11E9-9278-68D0E5697425","name":"International IST Doctoral Program","grant_number":"665385","call_identifier":"H2020"}],"file_date_updated":"2020-07-14T12:47:30Z","type":"journal_article","date_created":"2019-05-14T07:04:06Z","abstract":[{"text":"This paper investigates the use of fundamental solutions for animating detailed linear water surface waves. We first propose an analytical solution for efficiently animating circular ripples in closed form. We then show how to adapt the method of fundamental solutions (MFS) to create ambient waves interacting with complex obstacles. Subsequently, we present a novel wavelet-based discretization which outperforms the state of the art MFS approach for simulating time-varying water surface waves with moving obstacles. Our results feature high-resolution spatial details, interactions with complex boundaries, and large open ocean domains. Our method compares favorably with previous work as well as known analytical solutions. We also present comparisons between our method and real world examples.","lang":"eng"}],"quality_controlled":"1","language":[{"iso":"eng"}],"article_processing_charge":"No","oa_version":"Submitted Version","status":"public","citation":{"short":"C. Schreck, C. Hafner, C. Wojtan, ACM Transactions on Graphics 38 (2019).","ieee":"C. Schreck, C. Hafner, and C. Wojtan, “Fundamental solutions for water wave animation,” <i>ACM Transactions on Graphics</i>, vol. 38, no. 4. ACM, 2019.","ista":"Schreck C, Hafner C, Wojtan C. 2019. Fundamental solutions for water wave animation. ACM Transactions on Graphics. 38(4), 130.","mla":"Schreck, Camille, et al. “Fundamental Solutions for Water Wave Animation.” <i>ACM Transactions on Graphics</i>, vol. 38, no. 4, 130, ACM, 2019, doi:<a href=\"https://doi.org/10.1145/3306346.3323002\">10.1145/3306346.3323002</a>.","chicago":"Schreck, Camille, Christian Hafner, and Chris Wojtan. “Fundamental Solutions for Water Wave Animation.” <i>ACM Transactions on Graphics</i>. ACM, 2019. <a href=\"https://doi.org/10.1145/3306346.3323002\">https://doi.org/10.1145/3306346.3323002</a>.","apa":"Schreck, C., Hafner, C., &#38; Wojtan, C. (2019). Fundamental solutions for water wave animation. <i>ACM Transactions on Graphics</i>. ACM. <a href=\"https://doi.org/10.1145/3306346.3323002\">https://doi.org/10.1145/3306346.3323002</a>","ama":"Schreck C, Hafner C, Wojtan C. Fundamental solutions for water wave animation. <i>ACM Transactions on Graphics</i>. 2019;38(4). doi:<a href=\"https://doi.org/10.1145/3306346.3323002\">10.1145/3306346.3323002</a>"},"scopus_import":"1","publication":"ACM Transactions on Graphics","day":"01","publisher":"ACM","external_id":{"isi":["000475740600104"]},"file":[{"file_name":"2019_ACM_Schreck.pdf","relation":"main_file","date_created":"2019-05-14T07:03:55Z","content_type":"application/pdf","file_size":44328918,"date_updated":"2020-07-14T12:47:30Z","access_level":"open_access","file_id":"6443","creator":"dernst","checksum":"1b737dfe3e051aba8f3f4ab1dceda673"}],"related_material":{"link":[{"description":"News on IST Homepage","relation":"press_release","url":"https://ist.ac.at/en/news/new-method-makes-realistic-water-wave-animations-more-efficient/"}]},"issue":"4","publication_status":"published","oa":1,"department":[{"_id":"ChWo"}]},{"file":[{"content_type":"application/pdf","date_updated":"2020-07-14T12:47:30Z","file_size":8365970,"file_name":"2019_iScience_Amberg.pdf","relation":"main_file","date_created":"2019-05-14T11:51:51Z","creator":"dernst","checksum":"a9ad2296726c9474ad5860c9c2f53622","access_level":"open_access","file_id":"6452"}],"publication_status":"published","department":[{"_id":"SiHi"}],"oa":1,"tmp":{"short":"CC BY-NC-ND (4.0)","image":"/images/cc_by_nc_nd.png","name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode"},"status":"public","oa_version":"Published Version","publication":"iScience","publication_identifier":{"issn":["2589-0042"]},"citation":{"apa":"Amberg, N., Sotiropoulou, P. A., Heller, G., Lichtenberger, B. M., Holcmann, M., Camurdanoglu, B., … Sibilia, M. (2019). EGFR controls hair shaft differentiation in a p53-independent manner. <i>IScience</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.isci.2019.04.018\">https://doi.org/10.1016/j.isci.2019.04.018</a>","chicago":"Amberg, Nicole, Panagiota A. Sotiropoulou, Gerwin Heller, Beate M. Lichtenberger, Martin Holcmann, Bahar Camurdanoglu, Temenuschka Baykuscheva-Gentscheva, Cedric Blanpain, and Maria Sibilia. “EGFR Controls Hair Shaft Differentiation in a P53-Independent Manner.” <i>IScience</i>. Elsevier, 2019. <a href=\"https://doi.org/10.1016/j.isci.2019.04.018\">https://doi.org/10.1016/j.isci.2019.04.018</a>.","ama":"Amberg N, Sotiropoulou PA, Heller G, et al. EGFR controls hair shaft differentiation in a p53-independent manner. <i>iScience</i>. 2019;15:243-256. doi:<a href=\"https://doi.org/10.1016/j.isci.2019.04.018\">10.1016/j.isci.2019.04.018</a>","ieee":"N. Amberg <i>et al.</i>, “EGFR controls hair shaft differentiation in a p53-independent manner,” <i>iScience</i>, vol. 15. Elsevier, pp. 243–256, 2019.","ista":"Amberg N, Sotiropoulou PA, Heller G, Lichtenberger BM, Holcmann M, Camurdanoglu B, Baykuscheva-Gentscheva T, Blanpain C, Sibilia M. 2019. EGFR controls hair shaft differentiation in a p53-independent manner. iScience. 15, 243–256.","mla":"Amberg, Nicole, et al. “EGFR Controls Hair Shaft Differentiation in a P53-Independent Manner.” <i>IScience</i>, vol. 15, Elsevier, 2019, pp. 243–56, doi:<a href=\"https://doi.org/10.1016/j.isci.2019.04.018\">10.1016/j.isci.2019.04.018</a>.","short":"N. Amberg, P.A. Sotiropoulou, G. Heller, B.M. Lichtenberger, M. Holcmann, B. Camurdanoglu, T. Baykuscheva-Gentscheva, C. Blanpain, M. Sibilia, IScience 15 (2019) 243–256."},"publisher":"Elsevier","day":"31","external_id":{"isi":["000470104600022"]},"license":"https://creativecommons.org/licenses/by-nc-nd/4.0/","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","date_updated":"2023-09-08T11:38:04Z","year":"2019","abstract":[{"lang":"eng","text":"Epidermal growth factor receptor (EGFR) signaling controls skin development and homeostasis inmice and humans, and its deficiency causes severe skin inflammation, which might affect epidermalstem cell behavior. Here, we describe the inflammation-independent effects of EGFR deficiency dur-ing skin morphogenesis and in adult hair follicle stem cells. Expression and alternative splicing analysisof RNA sequencing data from interfollicular epidermis and outer root sheath indicate that EGFR con-trols genes involved in epidermal differentiation and also in centrosome function, DNA damage, cellcycle, and apoptosis. Genetic experiments employingp53deletion in EGFR-deficient epidermis revealthat EGFR signaling exhibitsp53-dependent functions in proliferative epidermal compartments, aswell asp53-independent functions in differentiated hair shaft keratinocytes. Loss of EGFR leads toabsence of LEF1 protein specifically in the innermost epithelial hair layers, resulting in disorganizationof medulla cells. Thus, our results uncover important spatial and temporal features of cell-autonomousEGFR functions in the epidermis."}],"date_created":"2019-05-14T11:47:40Z","type":"journal_article","file_date_updated":"2020-07-14T12:47:30Z","quality_controlled":"1","article_processing_charge":"No","language":[{"iso":"eng"}],"_id":"6451","month":"05","title":"EGFR controls hair shaft differentiation in a p53-independent manner","intvolume":"        15","doi":"10.1016/j.isci.2019.04.018","page":"243-256","date_published":"2019-05-31T00:00:00Z","isi":1,"volume":15,"author":[{"id":"4CD6AAC6-F248-11E8-B48F-1D18A9856A87","first_name":"Nicole","orcid":"0000-0002-3183-8207","last_name":"Amberg","full_name":"Amberg, Nicole"},{"last_name":"Sotiropoulou","full_name":"Sotiropoulou, Panagiota A.","first_name":"Panagiota A."},{"full_name":"Heller, Gerwin","last_name":"Heller","first_name":"Gerwin"},{"last_name":"Lichtenberger","full_name":"Lichtenberger, Beate M.","first_name":"Beate M."},{"first_name":"Martin","full_name":"Holcmann, Martin","last_name":"Holcmann"},{"first_name":"Bahar","last_name":"Camurdanoglu","full_name":"Camurdanoglu, Bahar"},{"full_name":"Baykuscheva-Gentscheva, Temenuschka","last_name":"Baykuscheva-Gentscheva","first_name":"Temenuschka"},{"full_name":"Blanpain, Cedric","last_name":"Blanpain","first_name":"Cedric"},{"full_name":"Sibilia, Maria","last_name":"Sibilia","first_name":"Maria"}],"has_accepted_license":"1","ddc":["570"]},{"date_created":"2019-05-14T13:06:30Z","type":"journal_article","abstract":[{"lang":"eng","text":"Adult neural stem cells and multiciliated ependymalcells are glial cells essential for neurological func-tions. Together, they make up the adult neurogenicniche. Using both high-throughput clonal analysisand single-cell resolution of progenitor division pat-terns and fate, we show that these two componentsof the neurogenic niche are lineally related: adult neu-ral stem cells are sister cells to ependymal cells,whereas most ependymal cells arise from the termi-nal symmetric divisions of the lineage. Unexpectedly,we found that the antagonist regulators of DNA repli-cation, GemC1 and Geminin, can tune the proportionof neural stem cells and ependymal cells. Our find-ings reveal the controlled dynamic of the neurogenicniche ontogeny and identify the Geminin familymembers as key regulators of the initial pool of adultneural stem cells."}],"project":[{"name":"Principles of Neural Stem Cell Lineage Progression in Cerebral Cortex Development","grant_number":"725780","_id":"260018B0-B435-11E9-9278-68D0E5697425","call_identifier":"H2020"}],"file_date_updated":"2020-07-14T12:47:30Z","date_updated":"2023-09-05T13:02:21Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","year":"2019","article_processing_charge":"No","language":[{"iso":"eng"}],"quality_controlled":"1","page":"159-172.e7","isi":1,"ec_funded":1,"date_published":"2019-04-03T00:00:00Z","_id":"6454","title":"Adult neural stem cells and multiciliated ependymal cells share a common lineage regulated by the Geminin family members","month":"04","doi":"10.1016/j.neuron.2019.01.051","intvolume":"       102","has_accepted_license":"1","ddc":["570"],"author":[{"first_name":"G","full_name":"Ortiz-Álvarez, G","last_name":"Ortiz-Álvarez"},{"last_name":"Daclin","full_name":"Daclin, M","first_name":"M"},{"last_name":"Shihavuddin","full_name":"Shihavuddin, A","first_name":"A"},{"first_name":"P","last_name":"Lansade","full_name":"Lansade, P"},{"first_name":"A","full_name":"Fortoul, A","last_name":"Fortoul"},{"first_name":"M","full_name":"Faucourt, M","last_name":"Faucourt"},{"full_name":"Clavreul, S","last_name":"Clavreul","first_name":"S"},{"full_name":"Lalioti, ME","last_name":"Lalioti","first_name":"ME"},{"last_name":"Taraviras","full_name":"Taraviras, S","first_name":"S"},{"last_name":"Hippenmeyer","full_name":"Hippenmeyer, Simon","orcid":"0000-0003-2279-1061","first_name":"Simon","id":"37B36620-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Livet","full_name":"Livet, J","first_name":"J"},{"first_name":"A","full_name":"Meunier, A","last_name":"Meunier"},{"first_name":"A","full_name":"Genovesio, A","last_name":"Genovesio"},{"full_name":"Spassky, N","last_name":"Spassky","first_name":"N"}],"volume":102,"pmid":1,"file":[{"file_id":"6457","access_level":"open_access","checksum":"1fb6e195c583eb0c5cabf26f69ff6675","creator":"dernst","date_created":"2019-05-15T09:28:41Z","relation":"main_file","file_name":"2019_Neuron_Ortiz.pdf","file_size":7288572,"date_updated":"2020-07-14T12:47:30Z","content_type":"application/pdf"}],"oa":1,"department":[{"_id":"SiHi"}],"tmp":{"short":"CC BY-NC-ND (4.0)","image":"/images/cc_by_nc_nd.png","name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode"},"publication_status":"published","issue":"1","publication":"Neuron","scopus_import":"1","citation":{"ama":"Ortiz-Álvarez G, Daclin M, Shihavuddin A, et al. Adult neural stem cells and multiciliated ependymal cells share a common lineage regulated by the Geminin family members. <i>Neuron</i>. 2019;102(1):159-172.e7. doi:<a href=\"https://doi.org/10.1016/j.neuron.2019.01.051\">10.1016/j.neuron.2019.01.051</a>","chicago":"Ortiz-Álvarez, G, M Daclin, A Shihavuddin, P Lansade, A Fortoul, M Faucourt, S Clavreul, et al. “Adult Neural Stem Cells and Multiciliated Ependymal Cells Share a Common Lineage Regulated by the Geminin Family Members.” <i>Neuron</i>. Elsevier, 2019. <a href=\"https://doi.org/10.1016/j.neuron.2019.01.051\">https://doi.org/10.1016/j.neuron.2019.01.051</a>.","apa":"Ortiz-Álvarez, G., Daclin, M., Shihavuddin, A., Lansade, P., Fortoul, A., Faucourt, M., … Spassky, N. (2019). Adult neural stem cells and multiciliated ependymal cells share a common lineage regulated by the Geminin family members. <i>Neuron</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.neuron.2019.01.051\">https://doi.org/10.1016/j.neuron.2019.01.051</a>","mla":"Ortiz-Álvarez, G., et al. “Adult Neural Stem Cells and Multiciliated Ependymal Cells Share a Common Lineage Regulated by the Geminin Family Members.” <i>Neuron</i>, vol. 102, no. 1, Elsevier, 2019, p. 159–172.e7, doi:<a href=\"https://doi.org/10.1016/j.neuron.2019.01.051\">10.1016/j.neuron.2019.01.051</a>.","ieee":"G. Ortiz-Álvarez <i>et al.</i>, “Adult neural stem cells and multiciliated ependymal cells share a common lineage regulated by the Geminin family members,” <i>Neuron</i>, vol. 102, no. 1. Elsevier, p. 159–172.e7, 2019.","ista":"Ortiz-Álvarez G, Daclin M, Shihavuddin A, Lansade P, Fortoul A, Faucourt M, Clavreul S, Lalioti M, Taraviras S, Hippenmeyer S, Livet J, Meunier A, Genovesio A, Spassky N. 2019. Adult neural stem cells and multiciliated ependymal cells share a common lineage regulated by the Geminin family members. Neuron. 102(1), 159–172.e7.","short":"G. Ortiz-Álvarez, M. Daclin, A. Shihavuddin, P. Lansade, A. Fortoul, M. Faucourt, S. Clavreul, M. Lalioti, S. Taraviras, S. Hippenmeyer, J. Livet, A. Meunier, A. Genovesio, N. Spassky, Neuron 102 (2019) 159–172.e7."},"publication_identifier":{"eissn":["1097-4199"],"issn":["0896-6273"]},"status":"public","oa_version":"Published Version","external_id":{"pmid":["30824354"],"isi":["000463337900018"]},"day":"03","publisher":"Elsevier"},{"_id":"6455","month":"05","title":"Temporal patterning of apical progenitors and their daughter neurons in the developing neocortex","doi":"10.1126/science.aav2522","intvolume":"       364","isi":1,"ec_funded":1,"date_published":"2019-05-10T00:00:00Z","author":[{"first_name":"L","last_name":"Telley","full_name":"Telley, L"},{"full_name":"Agirman, G","last_name":"Agirman","first_name":"G"},{"last_name":"Prados","full_name":"Prados, J","first_name":"J"},{"first_name":"Nicole","orcid":"0000-0002-3183-8207","full_name":"Amberg, Nicole","last_name":"Amberg","id":"4CD6AAC6-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Fièvre, S","last_name":"Fièvre","first_name":"S"},{"full_name":"Oberst, P","last_name":"Oberst","first_name":"P"},{"first_name":"G","full_name":"Bartolini, G","last_name":"Bartolini"},{"last_name":"Vitali","full_name":"Vitali, I","first_name":"I"},{"first_name":"C","last_name":"Cadilhac","full_name":"Cadilhac, C"},{"id":"37B36620-F248-11E8-B48F-1D18A9856A87","full_name":"Hippenmeyer, Simon","last_name":"Hippenmeyer","orcid":"0000-0003-2279-1061","first_name":"Simon"},{"first_name":"L","last_name":"Nguyen","full_name":"Nguyen, L"},{"full_name":"Dayer, A","last_name":"Dayer","first_name":"A"},{"last_name":"Jabaudon","full_name":"Jabaudon, D","first_name":"D"}],"volume":364,"article_type":"original","date_updated":"2023-09-05T11:51:09Z","article_number":"eaav2522","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","year":"2019","date_created":"2019-05-14T13:07:47Z","type":"journal_article","abstract":[{"text":"During corticogenesis, distinct subtypes of neurons are sequentially born from ventricular zone progenitors. How these cells are molecularly temporally patterned is poorly understood. We used single-cell RNA sequencing at high temporal resolution to trace the lineage of the molecular identities of successive generations of apical progenitors (APs) and their daughter neurons in mouse embryos. We identified a core set of evolutionarily conserved, temporally patterned genes that drive APs from internally driven to more exteroceptive states. We found that the Polycomb repressor complex 2 (PRC2) epigenetically regulates AP temporal progression. Embryonic age–dependent AP molecular states are transmitted to their progeny as successive ground states, onto which essentially conserved early postmitotic differentiation programs are applied, and are complemented by later-occurring environment-dependent signals. Thus, epigenetically regulated temporal molecular birthmarks present in progenitors act in their postmitotic progeny to seed adult neuronal diversity.","lang":"eng"}],"project":[{"call_identifier":"H2020","grant_number":"725780","name":"Principles of Neural Stem Cell Lineage Progression in Cerebral Cortex Development","_id":"260018B0-B435-11E9-9278-68D0E5697425"},{"name":"Role of Eed in neural stem cell lineage progression","grant_number":"T0101031","_id":"268F8446-B435-11E9-9278-68D0E5697425","call_identifier":"FWF"}],"quality_controlled":"1","main_file_link":[{"url":"https://orbi.uliege.be/bitstream/2268/239604/1/Telley_Agirman_Science2019.pdf","open_access":"1"}],"article_processing_charge":"No","language":[{"iso":"eng"}],"status":"public","oa_version":"Published Version","publication":"Science","citation":{"chicago":"Telley, L, G Agirman, J Prados, Nicole Amberg, S Fièvre, P Oberst, G Bartolini, et al. “Temporal Patterning of Apical Progenitors and Their Daughter Neurons in the Developing Neocortex.” <i>Science</i>. AAAS, 2019. <a href=\"https://doi.org/10.1126/science.aav2522\">https://doi.org/10.1126/science.aav2522</a>.","apa":"Telley, L., Agirman, G., Prados, J., Amberg, N., Fièvre, S., Oberst, P., … Jabaudon, D. (2019). Temporal patterning of apical progenitors and their daughter neurons in the developing neocortex. <i>Science</i>. AAAS. <a href=\"https://doi.org/10.1126/science.aav2522\">https://doi.org/10.1126/science.aav2522</a>","ama":"Telley L, Agirman G, Prados J, et al. Temporal patterning of apical progenitors and their daughter neurons in the developing neocortex. <i>Science</i>. 2019;364(6440). doi:<a href=\"https://doi.org/10.1126/science.aav2522\">10.1126/science.aav2522</a>","ista":"Telley L, Agirman G, Prados J, Amberg N, Fièvre S, Oberst P, Bartolini G, Vitali I, Cadilhac C, Hippenmeyer S, Nguyen L, Dayer A, Jabaudon D. 2019. Temporal patterning of apical progenitors and their daughter neurons in the developing neocortex. Science. 364(6440), eaav2522.","ieee":"L. Telley <i>et al.</i>, “Temporal patterning of apical progenitors and their daughter neurons in the developing neocortex,” <i>Science</i>, vol. 364, no. 6440. AAAS, 2019.","mla":"Telley, L., et al. “Temporal Patterning of Apical Progenitors and Their Daughter Neurons in the Developing Neocortex.” <i>Science</i>, vol. 364, no. 6440, eaav2522, AAAS, 2019, doi:<a href=\"https://doi.org/10.1126/science.aav2522\">10.1126/science.aav2522</a>.","short":"L. Telley, G. Agirman, J. Prados, N. Amberg, S. Fièvre, P. Oberst, G. Bartolini, I. Vitali, C. Cadilhac, S. Hippenmeyer, L. Nguyen, A. Dayer, D. Jabaudon, Science 364 (2019)."},"scopus_import":"1","publication_identifier":{"issn":["0036-8075"],"eissn":["1095-9203"]},"day":"10","publisher":"AAAS","external_id":{"pmid":["31073041"],"isi":["000467631800034"]},"related_material":{"link":[{"url":"https://ist.ac.at/en/news/how-to-generate-a-brain-of-correct-size-and-composition/","relation":"press_release","description":"News on IST Homepage"}]},"pmid":1,"publication_status":"published","issue":"6440","oa":1,"department":[{"_id":"SiHi"}]},{"file_date_updated":"2020-07-14T12:47:31Z","project":[{"call_identifier":"FWF","name":"Formal Methods meets Algorithmic Game Theory","grant_number":"M02369","_id":"264B3912-B435-11E9-9278-68D0E5697425"},{"_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211","name":"The Wittgenstein Prize","call_identifier":"FWF"},{"_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23","name":"Rigorous Systems Engineering","call_identifier":"FWF"}],"abstract":[{"text":"A controller is a device that interacts with a plant. At each time point,it reads the plant’s state and issues commands with the goal that the plant oper-ates optimally. Constructing optimal controllers is a fundamental and challengingproblem. Machine learning techniques have recently been successfully applied totrain controllers, yet they have limitations. Learned controllers are monolithic andhard to reason about. In particular, it is difficult to add features without retraining,to guarantee any level of performance, and to achieve acceptable performancewhen encountering untrained scenarios. These limitations can be addressed bydeploying quantitative run-timeshieldsthat serve as a proxy for the controller.At each time point, the shield reads the command issued by the controller andmay choose to alter it before passing it on to the plant. We show how optimalshields that interfere as little as possible while guaranteeing a desired level ofcontroller performance, can be generated systematically and automatically usingreactive  synthesis.  First,  we  abstract  the  plant  by  building  a  stochastic  model.Second, we consider the learned controller to be a black box. Third, we mea-surecontroller performanceandshield interferenceby two quantitative run-timemeasures that are formally defined using weighted automata. Then, the problemof constructing a shield that guarantees maximal performance with minimal inter-ference is the problem of finding an optimal strategy in a stochastic2-player game“controller versus shield” played on the abstract state space of the plant with aquantitative objective obtained from combining the performance and interferencemeasures. We illustrate the effectiveness of our approach by automatically con-structing lightweight shields for learned traffic-light controllers in various roadnetworks. The shields we generate avoid liveness bugs, improve controller per-formance in untrained and changing traffic situations, and add features to learnedcontrollers, such as giving priority to emergency vehicles.","lang":"eng"}],"date_created":"2019-05-16T11:22:30Z","type":"conference","year":"2019","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","date_updated":"2023-08-25T10:33:27Z","language":[{"iso":"eng"}],"article_processing_charge":"No","quality_controlled":"1","date_published":"2019-07-12T00:00:00Z","isi":1,"page":"630-649","doi":"10.1007/978-3-030-25540-4_36","intvolume":"     11561","title":"Run-time optimization for learned controllers through quantitative games","_id":"6462","month":"07","ddc":["000"],"has_accepted_license":"1","volume":11561,"author":[{"first_name":"Guy","orcid":"0000-0001-5588-8287","full_name":"Avni, Guy","last_name":"Avni","id":"463C8BC2-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Roderick","last_name":"Bloem","full_name":"Bloem, Roderick"},{"orcid":"0000-0002-4561-241X","first_name":"Krishnendu","last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724","first_name":"Thomas A","last_name":"Henzinger","full_name":"Henzinger, Thomas A"},{"first_name":"Bettina","last_name":"Konighofer","full_name":"Konighofer, Bettina"},{"last_name":"Pranger","full_name":"Pranger, Stefan","first_name":"Stefan"}],"file":[{"relation":"main_file","file_name":"2019_CAV_Avni.pdf","date_created":"2019-08-14T09:35:24Z","content_type":"application/pdf","date_updated":"2020-07-14T12:47:31Z","file_size":659766,"access_level":"open_access","file_id":"6816","creator":"dernst","checksum":"c231579f2485c6fd4df17c9443a4d80b"}],"alternative_title":["LNCS"],"tmp":{"image":"/images/cc_by.png","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"department":[{"_id":"ToHe"},{"_id":"KrCh"}],"oa":1,"publication_status":"published","publication_identifier":{"isbn":["9783030255398"],"issn":["0302-9743"]},"scopus_import":"1","citation":{"ista":"Avni G, Bloem R, Chatterjee K, Henzinger TA, Konighofer B, Pranger S. 2019. Run-time optimization for learned controllers through quantitative games. 31st International Conference on Computer-Aided Verification. CAV: Computer Aided Verification, LNCS, vol. 11561, 630–649.","ieee":"G. Avni, R. Bloem, K. Chatterjee, T. A. Henzinger, B. Konighofer, and S. Pranger, “Run-time optimization for learned controllers through quantitative games,” in <i>31st International Conference on Computer-Aided Verification</i>, New York, NY, United States, 2019, vol. 11561, pp. 630–649.","mla":"Avni, Guy, et al. “Run-Time Optimization for Learned Controllers through Quantitative Games.” <i>31st International Conference on Computer-Aided Verification</i>, vol. 11561, Springer, 2019, pp. 630–49, doi:<a href=\"https://doi.org/10.1007/978-3-030-25540-4_36\">10.1007/978-3-030-25540-4_36</a>.","chicago":"Avni, Guy, Roderick Bloem, Krishnendu Chatterjee, Thomas A Henzinger, Bettina Konighofer, and Stefan Pranger. “Run-Time Optimization for Learned Controllers through Quantitative Games.” In <i>31st International Conference on Computer-Aided Verification</i>, 11561:630–49. Springer, 2019. <a href=\"https://doi.org/10.1007/978-3-030-25540-4_36\">https://doi.org/10.1007/978-3-030-25540-4_36</a>.","apa":"Avni, G., Bloem, R., Chatterjee, K., Henzinger, T. A., Konighofer, B., &#38; Pranger, S. (2019). Run-time optimization for learned controllers through quantitative games. In <i>31st International Conference on Computer-Aided Verification</i> (Vol. 11561, pp. 630–649). New York, NY, United States: Springer. <a href=\"https://doi.org/10.1007/978-3-030-25540-4_36\">https://doi.org/10.1007/978-3-030-25540-4_36</a>","ama":"Avni G, Bloem R, Chatterjee K, Henzinger TA, Konighofer B, Pranger S. Run-time optimization for learned controllers through quantitative games. In: <i>31st International Conference on Computer-Aided Verification</i>. Vol 11561. Springer; 2019:630-649. doi:<a href=\"https://doi.org/10.1007/978-3-030-25540-4_36\">10.1007/978-3-030-25540-4_36</a>","short":"G. Avni, R. Bloem, K. Chatterjee, T.A. Henzinger, B. Konighofer, S. Pranger, in:, 31st International Conference on Computer-Aided Verification, Springer, 2019, pp. 630–649."},"publication":"31st International Conference on Computer-Aided Verification","oa_version":"Published Version","status":"public","external_id":{"isi":["000491468000036"]},"day":"12","conference":{"start_date":"2019-07-13","location":"New York, NY, United States","name":"CAV: Computer Aided Verification","end_date":"2019-07-18"},"publisher":"Springer"},{"related_material":{"link":[{"relation":"erratum","url":"https://doi.org/10.1038/s41467-023-36111-0"}]},"file":[{"relation":"main_file","file_name":"2019_NatureComm_Chassin.pdf","date_created":"2019-05-20T07:33:54Z","content_type":"application/pdf","date_updated":"2020-07-14T12:47:31Z","file_size":1191827,"access_level":"open_access","file_id":"6471","creator":"dernst","checksum":"e214d3e4f8c81e35981583c4569b51b8"}],"publication_status":"published","issue":"1","department":[{"_id":"CaGu"}],"oa":1,"tmp":{"image":"/images/cc_by.png","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"status":"public","oa_version":"Published Version","publication":"Nature Communications","publication_identifier":{"eissn":["20411723"]},"citation":{"short":"H. Chassin, M. Müller, M. Tigges, L. Scheller, M. Lang, M. Fussenegger, Nature Communications 10 (2019).","ama":"Chassin H, Müller M, Tigges M, Scheller L, Lang M, Fussenegger M. A modular degron library for synthetic circuits in mammalian cells. <i>Nature Communications</i>. 2019;10(1). doi:<a href=\"https://doi.org/10.1038/s41467-019-09974-5\">10.1038/s41467-019-09974-5</a>","apa":"Chassin, H., Müller, M., Tigges, M., Scheller, L., Lang, M., &#38; Fussenegger, M. (2019). A modular degron library for synthetic circuits in mammalian cells. <i>Nature Communications</i>. Springer Nature. <a href=\"https://doi.org/10.1038/s41467-019-09974-5\">https://doi.org/10.1038/s41467-019-09974-5</a>","chicago":"Chassin, Hélène, Marius Müller, Marcel Tigges, Leo Scheller, Moritz Lang, and Martin Fussenegger. “A Modular Degron Library for Synthetic Circuits in Mammalian Cells.” <i>Nature Communications</i>. Springer Nature, 2019. <a href=\"https://doi.org/10.1038/s41467-019-09974-5\">https://doi.org/10.1038/s41467-019-09974-5</a>.","mla":"Chassin, Hélène, et al. “A Modular Degron Library for Synthetic Circuits in Mammalian Cells.” <i>Nature Communications</i>, vol. 10, no. 1, 2013, Springer Nature, 2019, doi:<a href=\"https://doi.org/10.1038/s41467-019-09974-5\">10.1038/s41467-019-09974-5</a>.","ista":"Chassin H, Müller M, Tigges M, Scheller L, Lang M, Fussenegger M. 2019. A modular degron library for synthetic circuits in mammalian cells. Nature Communications. 10(1), 2013.","ieee":"H. Chassin, M. Müller, M. Tigges, L. Scheller, M. Lang, and M. Fussenegger, “A modular degron library for synthetic circuits in mammalian cells,” <i>Nature Communications</i>, vol. 10, no. 1. Springer Nature, 2019."},"scopus_import":"1","publisher":"Springer Nature","day":"01","external_id":{"isi":["000466338600006"]},"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","article_number":"2013","date_updated":"2023-08-25T10:33:51Z","year":"2019","abstract":[{"lang":"eng","text":"Tight control over protein degradation is a fundamental requirement for cells to respond rapidly to various stimuli and adapt to a fluctuating environment. Here we develop a versatile, easy-to-handle library of destabilizing tags (degrons) for the precise regulation of protein expression profiles in mammalian cells by modulating target protein half-lives in a predictable manner. Using the well-established tetracycline gene-regulation system as a model, we show that the dynamics of protein expression can be tuned by fusing appropriate degron tags to gene regulators. Next, we apply this degron library to tune a synthetic pulse-generating circuit in mammalian cells. With this toolbox we establish a set of pulse generators with tailored pulse lengths and magnitudes of protein expression. This methodology will prove useful in the functional roles of essential proteins, fine-tuning of gene-expression systems, and enabling a higher complexity in the design of synthetic biological systems in mammalian cells."}],"date_created":"2019-05-19T21:59:14Z","type":"journal_article","file_date_updated":"2020-07-14T12:47:31Z","quality_controlled":"1","article_processing_charge":"No","language":[{"iso":"eng"}],"title":"A modular degron library for synthetic circuits in mammalian cells","_id":"6465","month":"05","doi":"10.1038/s41467-019-09974-5","intvolume":"        10","date_published":"2019-05-01T00:00:00Z","isi":1,"volume":10,"author":[{"full_name":"Chassin, Hélène","last_name":"Chassin","first_name":"Hélène"},{"full_name":"Müller, Marius","last_name":"Müller","first_name":"Marius"},{"full_name":"Tigges, Marcel","last_name":"Tigges","first_name":"Marcel"},{"last_name":"Scheller","full_name":"Scheller, Leo","first_name":"Leo"},{"full_name":"Lang, Moritz","last_name":"Lang","first_name":"Moritz","id":"29E0800A-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Fussenegger","full_name":"Fussenegger, Martin","first_name":"Martin"}],"has_accepted_license":"1","ddc":["570"]},{"quality_controlled":"1","article_processing_charge":"No","language":[{"iso":"eng"}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","date_updated":"2023-08-25T10:37:30Z","year":"2019","abstract":[{"text":"One of the most striking and consistent results in speciation genomics is the heterogeneous divergence observed across the genomes of closely related species. This pattern was initially attributed to different levels of gene exchange—with divergence preserved at loci generating a barrier to gene flow but homogenized at unlinked neutral loci. Although there is evidence to support this model, it is now recognized that interpreting patterns of divergence across genomes is not so straightforward. One \r\nproblem is that heterogenous divergence between populations can also be generated by other processes (e.g. recurrent selective sweeps or background selection) without any involvement of differential gene flow. Thus, integrated studies that identify which loci are likely subject to divergent selection are required to shed light on the interplay between selection and gene flow during the early phases of speciation. In this issue of Molecular Ecology, Rifkin et al. (2019) confront this challenge using a pair of sister morning glory species. They wisely design their sampling to take the geographic context of individuals into account, including geographically isolated (allopatric) and co‐occurring (sympatric) populations. This enabled them to show that individuals are phenotypically less differentiated in sympatry. They also found that the loci that resist introgression are enriched for those most differentiated in allopatry and loci that exhibit signals of divergent selection. One great strength of the \r\nstudy is the combination of methods from population genetics and molecular evolution, including the development of a model to simultaneously infer admixture proportions and selfing rates.","lang":"eng"}],"date_created":"2019-05-19T21:59:15Z","type":"journal_article","file_date_updated":"2020-07-14T12:47:31Z","volume":28,"author":[{"id":"419049E2-F248-11E8-B48F-1D18A9856A87","full_name":"Field, David","last_name":"Field","orcid":"0000-0002-4014-8478","first_name":"David"},{"last_name":"Fraisse","full_name":"Fraisse, Christelle","first_name":"Christelle","orcid":"0000-0001-8441-5075","id":"32DF5794-F248-11E8-B48F-1D18A9856A87"}],"has_accepted_license":"1","ddc":["580","576"],"month":"04","_id":"6466","title":"Breaking down barriers in morning glories","doi":"10.1111/mec.15048","intvolume":"        28","page":"1579-1581","date_published":"2019-04-01T00:00:00Z","isi":1,"publication_status":"published","issue":"7","department":[{"_id":"NiBa"}],"oa":1,"tmp":{"image":"/images/cc_by.png","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"file":[{"creator":"dernst","checksum":"521e3aff3e9263ddf2ffbfe0b6157715","access_level":"open_access","file_id":"6472","content_type":"application/pdf","file_size":367711,"date_updated":"2020-07-14T12:47:31Z","relation":"main_file","file_name":"2019_MolecularEcology_Field.pdf","date_created":"2019-05-20T11:49:06Z"}],"publisher":"Wiley","day":"01","external_id":{"isi":["000474808300001"]},"status":"public","oa_version":"Published Version","publication":"Molecular ecology","publication_identifier":{"eissn":["1365294X"]},"scopus_import":"1","citation":{"short":"D. Field, C. Fraisse, Molecular Ecology 28 (2019) 1579–1581.","ama":"Field D, Fraisse C. Breaking down barriers in morning glories. <i>Molecular ecology</i>. 2019;28(7):1579-1581. doi:<a href=\"https://doi.org/10.1111/mec.15048\">10.1111/mec.15048</a>","chicago":"Field, David, and Christelle Fraisse. “Breaking down Barriers in Morning Glories.” <i>Molecular Ecology</i>. Wiley, 2019. <a href=\"https://doi.org/10.1111/mec.15048\">https://doi.org/10.1111/mec.15048</a>.","apa":"Field, D., &#38; Fraisse, C. (2019). Breaking down barriers in morning glories. <i>Molecular Ecology</i>. Wiley. <a href=\"https://doi.org/10.1111/mec.15048\">https://doi.org/10.1111/mec.15048</a>","mla":"Field, David, and Christelle Fraisse. “Breaking down Barriers in Morning Glories.” <i>Molecular Ecology</i>, vol. 28, no. 7, Wiley, 2019, pp. 1579–81, doi:<a href=\"https://doi.org/10.1111/mec.15048\">10.1111/mec.15048</a>.","ista":"Field D, Fraisse C. 2019. Breaking down barriers in morning glories. Molecular ecology. 28(7), 1579–1581.","ieee":"D. Field and C. Fraisse, “Breaking down barriers in morning glories,” <i>Molecular ecology</i>, vol. 28, no. 7. Wiley, pp. 1579–1581, 2019."}},{"author":[{"id":"32DF5794-F248-11E8-B48F-1D18A9856A87","last_name":"Fraisse","full_name":"Fraisse, Christelle","first_name":"Christelle","orcid":"0000-0001-8441-5075"},{"first_name":"John J.","last_name":"Welch","full_name":"Welch, John J."}],"volume":15,"article_type":"original","month":"04","_id":"6467","title":"The distribution of epistasis on simple fitness landscapes","doi":"10.1098/rsbl.2018.0881","intvolume":"        15","isi":1,"ec_funded":1,"date_published":"2019-04-03T00:00:00Z","main_file_link":[{"open_access":"1","url":"https://doi.org/10.1098/rsbl.2018.0881"}],"quality_controlled":"1","article_processing_charge":"No","language":[{"iso":"eng"}],"article_number":"0881","date_updated":"2023-08-25T10:34:41Z","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","year":"2019","date_created":"2019-05-19T21:59:15Z","type":"journal_article","abstract":[{"text":"Fitness interactions between mutations can influence a population’s evolution in many different ways. While epistatic effects are difficult to measure precisely, important information is captured by the mean and variance of log fitnesses for individuals carrying different numbers of mutations. We derive predictions for these quantities from a class of simple fitness landscapes, based on models of optimizing selection on quantitative traits. We also explore extensions to the models, including modular pleiotropy, variable effect sizes, mutational bias and maladaptation of the wild type. We illustrate our approach by reanalysing a large dataset of mutant effects in a yeast snoRNA (small nucleolar RNA). Though characterized by some large epistatic effects, these data give a good overall fit to the non-epistatic null model, suggesting that epistasis might have limited influence on the evolutionary dynamics in this system. We also show how the amount of epistasis depends on both the underlying fitness landscape and the distribution of mutations, and so is expected to vary in consistent ways between new mutations, standing variation and fixed mutations.","lang":"eng"}],"project":[{"call_identifier":"FP7","_id":"25681D80-B435-11E9-9278-68D0E5697425","name":"International IST Postdoc Fellowship Programme","grant_number":"291734"}],"day":"03","publisher":"Royal Society of London","external_id":{"pmid":["31014191"],"isi":["000465405300010"]},"status":"public","oa_version":"Published Version","publication":"Biology Letters","scopus_import":"1","citation":{"ama":"Fraisse C, Welch JJ. The distribution of epistasis on simple fitness landscapes. <i>Biology Letters</i>. 2019;15(4). doi:<a href=\"https://doi.org/10.1098/rsbl.2018.0881\">10.1098/rsbl.2018.0881</a>","apa":"Fraisse, C., &#38; Welch, J. J. (2019). The distribution of epistasis on simple fitness landscapes. <i>Biology Letters</i>. Royal Society of London. <a href=\"https://doi.org/10.1098/rsbl.2018.0881\">https://doi.org/10.1098/rsbl.2018.0881</a>","chicago":"Fraisse, Christelle, and John J. Welch. “The Distribution of Epistasis on Simple Fitness Landscapes.” <i>Biology Letters</i>. Royal Society of London, 2019. <a href=\"https://doi.org/10.1098/rsbl.2018.0881\">https://doi.org/10.1098/rsbl.2018.0881</a>.","mla":"Fraisse, Christelle, and John J. Welch. “The Distribution of Epistasis on Simple Fitness Landscapes.” <i>Biology Letters</i>, vol. 15, no. 4, 0881, Royal Society of London, 2019, doi:<a href=\"https://doi.org/10.1098/rsbl.2018.0881\">10.1098/rsbl.2018.0881</a>.","ieee":"C. Fraisse and J. J. Welch, “The distribution of epistasis on simple fitness landscapes,” <i>Biology Letters</i>, vol. 15, no. 4. Royal Society of London, 2019.","ista":"Fraisse C, Welch JJ. 2019. The distribution of epistasis on simple fitness landscapes. Biology Letters. 15(4), 0881.","short":"C. Fraisse, J.J. Welch, Biology Letters 15 (2019)."},"publication_identifier":{"issn":["17449561"],"eissn":["1744957X"]},"publication_status":"published","issue":"4","oa":1,"department":[{"_id":"BeVi"},{"_id":"NiBa"}],"related_material":{"link":[{"relation":"supplementary_material","url":"https://dx.doi.org/10.6084/m9.figshare.c.4461008"}],"record":[{"relation":"research_data","id":"9798","status":"public"},{"relation":"research_data","id":"9799","status":"public"}]},"pmid":1},{"status":"public","oa_version":"Published Version","publication":"Journal of Physiology","citation":{"chicago":"Éltes, Tímea, Miklos Szoboszlay, Margit Katalin Szigeti, and Zoltan Nusser. “Improved Spike Inference Accuracy by Estimating the Peak Amplitude of Unitary [Ca2+] Transients in Weakly GCaMP6f-Expressing Hippocampal Pyramidal Cells.” <i>Journal of Physiology</i>. Wiley, 2019. <a href=\"https://doi.org/10.1113/JP277681\">https://doi.org/10.1113/JP277681</a>.","apa":"Éltes, T., Szoboszlay, M., Szigeti, M. K., &#38; Nusser, Z. (2019). Improved spike inference accuracy by estimating the peak amplitude of unitary [Ca2+] transients in weakly GCaMP6f-expressing hippocampal pyramidal cells. <i>Journal of Physiology</i>. Wiley. <a href=\"https://doi.org/10.1113/JP277681\">https://doi.org/10.1113/JP277681</a>","ama":"Éltes T, Szoboszlay M, Szigeti MK, Nusser Z. Improved spike inference accuracy by estimating the peak amplitude of unitary [Ca2+] transients in weakly GCaMP6f-expressing hippocampal pyramidal cells. <i>Journal of Physiology</i>. 2019;597(11):2925–2947. doi:<a href=\"https://doi.org/10.1113/JP277681\">10.1113/JP277681</a>","ieee":"T. Éltes, M. Szoboszlay, M. K. Szigeti, and Z. Nusser, “Improved spike inference accuracy by estimating the peak amplitude of unitary [Ca2+] transients in weakly GCaMP6f-expressing hippocampal pyramidal cells,” <i>Journal of Physiology</i>, vol. 597, no. 11. Wiley, pp. 2925–2947, 2019.","ista":"Éltes T, Szoboszlay M, Szigeti MK, Nusser Z. 2019. Improved spike inference accuracy by estimating the peak amplitude of unitary [Ca2+] transients in weakly GCaMP6f-expressing hippocampal pyramidal cells. Journal of Physiology. 597(11), 2925–2947.","mla":"Éltes, Tímea, et al. “Improved Spike Inference Accuracy by Estimating the Peak Amplitude of Unitary [Ca2+] Transients in Weakly GCaMP6f-Expressing Hippocampal Pyramidal Cells.” <i>Journal of Physiology</i>, vol. 597, no. 11, Wiley, 2019, pp. 2925–2947, doi:<a href=\"https://doi.org/10.1113/JP277681\">10.1113/JP277681</a>.","short":"T. Éltes, M. Szoboszlay, M.K. Szigeti, Z. Nusser, Journal of Physiology 597 (2019) 2925–2947."},"scopus_import":"1","publication_identifier":{"issn":["00223751"],"eissn":["14697793"]},"day":"01","publisher":"Wiley","external_id":{"isi":["000470780400013"],"pmid":["31006863"]},"pmid":1,"publication_status":"published","issue":"11","oa":1,"department":[{"_id":"GaNo"}],"month":"06","_id":"6470","title":"Improved spike inference accuracy by estimating the peak amplitude of unitary [Ca2+] transients in weakly GCaMP6f-expressing hippocampal pyramidal cells","intvolume":"       597","doi":"10.1113/JP277681","page":"2925–2947","isi":1,"date_published":"2019-06-01T00:00:00Z","author":[{"last_name":"Éltes","full_name":"Éltes, Tímea","first_name":"Tímea"},{"first_name":"Miklos","last_name":"Szoboszlay","full_name":"Szoboszlay, Miklos"},{"id":"44F4BDC0-F248-11E8-B48F-1D18A9856A87","first_name":"Margit Katalin","orcid":"0000-0001-9500-8758","full_name":"Szigeti, Margit Katalin","last_name":"Szigeti"},{"last_name":"Nusser","full_name":"Nusser, Zoltan","first_name":"Zoltan"}],"volume":597,"article_type":"original","date_updated":"2023-08-25T10:34:15Z","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","year":"2019","date_created":"2019-05-19T21:59:17Z","type":"journal_article","abstract":[{"lang":"eng","text":"Investigating neuronal activity using genetically encoded Ca2+ indicators in behaving animals is hampered by inaccuracies in spike inference from fluorescent tracers. Here we combine two‐photon [Ca2+] imaging with cell‐attached recordings, followed by post hoc determination of the expression level of GCaMP6f, to explore how it affects the amplitude, kinetics and temporal summation of somatic [Ca2+] transients in mouse hippocampal pyramidal cells (PCs). The amplitude of unitary [Ca2+] transients (evoked by a single action potential) negatively correlates with GCaMP6f expression, but displays large variability even among PCs with similarly low expression levels. The summation of fluorescence signals is frequency‐dependent, supralinear and also shows remarkable cell‐to‐cell variability. We performed experimental data‐based simulations and found that spike inference error rates using MLspike depend strongly on unitary peak amplitudes and GCaMP6f expression levels. We provide simple methods for estimating the unitary [Ca2+] transients in individual weakly GCaMP6f‐expressing PCs, with which we achieve spike inference error rates of ∼5%. "}],"main_file_link":[{"url":"https://doi.org/10.1113/JP277681","open_access":"1"}],"quality_controlled":"1","article_processing_charge":"No","language":[{"iso":"eng"}]},{"has_accepted_license":"1","ddc":["004"],"author":[{"id":"3DEE19A4-F248-11E8-B48F-1D18A9856A87","first_name":"Sarah A","last_name":"Cepeda Humerez","full_name":"Cepeda Humerez, Sarah A"}],"page":"135","degree_awarded":"PhD","date_published":"2019-05-23T00:00:00Z","month":"05","_id":"6473","title":"Estimating information flow in single cells","doi":"10.15479/AT:ISTA:6473","article_processing_charge":"No","language":[{"iso":"eng"}],"keyword":["Information estimation","Time-series","data analysis"],"type":"dissertation","date_created":"2019-05-21T00:11:23Z","abstract":[{"lang":"eng","text":"Single cells are constantly interacting with their environment and each other, more importantly, the accurate perception of environmental cues is crucial for growth, survival, and reproduction. This communication between cells and their environment can be formalized in mathematical terms and be quantified as the information flow between them, as prescribed by information theory. \r\nThe recent availability of real–time dynamical patterns of signaling molecules in single cells has allowed us to identify encoding about the identity of the environment in the time–series. However, efficient estimation of the information transmitted by these signals has been a data–analysis challenge due to the high dimensionality of the trajectories and the limited number of samples. In the first part of this thesis, we develop and evaluate decoding–based estimation methods to lower bound the mutual information and derive model–based precise information estimates for biological reaction networks governed by the chemical master equation. This is followed by applying the decoding-based methods to study the intracellular representation of extracellular changes in budding yeast, by observing the transient dynamics of nuclear translocation of 10 transcription factors in response to 3 stress conditions. Additionally, we apply these estimators to previously published data on ERK and Ca2+ signaling and yeast stress response. We argue that this single cell decoding-based measure of information provides an unbiased, quantitative and interpretable measure for the fidelity of biological signaling processes. \r\nFinally, in the last section, we deal with gene regulation which is primarily controlled by transcription factors (TFs) that bind to the DNA to activate gene expression. The possibility that non-cognate TFs activate transcription diminishes the accuracy of regulation with potentially disastrous effects for the cell. This ’crosstalk’ acts as a previously unexplored source of noise in biochemical networks and puts a strong constraint on their performance. To mitigate erroneous initiation we propose an out of equilibrium scheme that implements kinetic proofreading. We show that such architectures are favored  over their equilibrium counterparts for complex organisms despite introducing noise in gene expression. "}],"file_date_updated":"2020-07-14T12:47:31Z","date_updated":"2025-05-28T11:57:00Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","year":"2019","publisher":"Institute of Science and Technology Austria","day":"23","citation":{"short":"S.A. Cepeda Humerez, Estimating Information Flow in Single Cells, Institute of Science and Technology Austria, 2019.","ieee":"S. A. Cepeda Humerez, “Estimating information flow in single cells,” Institute of Science and Technology Austria, 2019.","ista":"Cepeda Humerez SA. 2019. Estimating information flow in single cells. Institute of Science and Technology Austria.","mla":"Cepeda Humerez, Sarah A. <i>Estimating Information Flow in Single Cells</i>. Institute of Science and Technology Austria, 2019, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:6473\">10.15479/AT:ISTA:6473</a>.","chicago":"Cepeda Humerez, Sarah A. “Estimating Information Flow in Single Cells.” Institute of Science and Technology Austria, 2019. <a href=\"https://doi.org/10.15479/AT:ISTA:6473\">https://doi.org/10.15479/AT:ISTA:6473</a>.","apa":"Cepeda Humerez, S. A. (2019). <i>Estimating information flow in single cells</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:6473\">https://doi.org/10.15479/AT:ISTA:6473</a>","ama":"Cepeda Humerez SA. Estimating information flow in single cells. 2019. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:6473\">10.15479/AT:ISTA:6473</a>"},"publication_identifier":{"issn":["2663-337X"]},"status":"public","oa_version":"Published Version","supervisor":[{"id":"3D494DCA-F248-11E8-B48F-1D18A9856A87","last_name":"Tkačik","full_name":"Tkačik, Gašper","first_name":"Gašper","orcid":"0000-0002-6699-1455"}],"oa":1,"department":[{"_id":"GaTk"}],"tmp":{"image":"/images/cc_by.png","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"alternative_title":["ISTA Thesis"],"publication_status":"published","related_material":{"record":[{"status":"public","id":"6900","relation":"dissertation_contains"},{"id":"281","status":"public","relation":"dissertation_contains"},{"status":"public","id":"2016","relation":"dissertation_contains"},{"relation":"dissertation_contains","id":"1576","status":"public"}]},"file":[{"relation":"source_file","file_name":"Thesis_Cepeda.zip","date_created":"2019-05-23T11:18:16Z","content_type":"application/zip","file_size":23937464,"date_updated":"2020-07-14T12:47:31Z","access_level":"closed","file_id":"6480","creator":"scepeda","checksum":"75f9184c1346e10a5de5f9cc7338309a"},{"date_updated":"2020-07-14T12:47:31Z","file_size":16646985,"content_type":"application/pdf","date_created":"2019-05-23T11:18:13Z","relation":"main_file","file_name":"CepedaThesis.pdf","checksum":"afdc0633ddbd71d5b13550d7fb4f4454","creator":"scepeda","file_id":"6481","access_level":"open_access"}]},{"article_number":"021001","date_updated":"2023-08-25T10:37:56Z","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","year":"2019","date_created":"2019-05-23T07:38:43Z","type":"journal_article","abstract":[{"text":"Thermalizing quantum systems are conventionallydescribed by statistical mechanics at equilib-rium. However, not all systems fall into this category, with many-body localization providinga generic mechanism for thermalization to fail in strongly disordered systems. Many-bodylocalized (MBL) systems remain perfect insulators at nonzero temperature, which do notthermalize and therefore cannot be describedusing statistical mechanics. This Colloquiumreviews recent theoretical and experimental advances in studies of MBL systems, focusing onthe new perspective provided by entanglement and nonequilibrium experimental probes suchas quantum quenches. Theoretically, MBL systems exhibit a new kind of robust integrability: anextensive set of quasilocal integrals of motion emerges, which provides an intuitive explanationof the breakdown of thermalization. A description based on quasilocal integrals of motion isused to predict dynamical properties of MBL systems, such as the spreading of quantumentanglement, the behavior of local observables, and the response to external dissipativeprocesses. Furthermore, MBL systems can exhibit eigenstate transitions and quantum ordersforbidden in thermodynamic equilibrium. An outline isgiven of the current theoretical under-standing of the quantum-to-classical transitionbetween many-body localized and ergodic phasesand anomalous transport in the vicinity of that transition. Experimentally, synthetic quantumsystems, which are well isolated from an external thermal reservoir, provide natural platforms forrealizing the MBL phase. Recent experiments with ultracold atoms, trapped ions, superconductingqubits, and quantum materials, in which different signatures of many-body localization have beenobserved, are reviewed. This Colloquium concludes by listing outstanding challenges andpromising future research directions.","lang":"eng"}],"file_date_updated":"2020-07-14T12:47:31Z","quality_controlled":"1","article_processing_charge":"No","language":[{"iso":"eng"}],"month":"05","_id":"6477","title":"Colloquium: Many-body localization, thermalization, and entanglement","doi":"10.1103/revmodphys.91.021001","intvolume":"        91","isi":1,"date_published":"2019-05-22T00:00:00Z","author":[{"full_name":"Abanin, Dmitry A.","last_name":"Abanin","first_name":"Dmitry A."},{"full_name":"Altman, Ehud","last_name":"Altman","first_name":"Ehud"},{"first_name":"Immanuel","last_name":"Bloch","full_name":"Bloch, Immanuel"},{"orcid":"0000-0002-2399-5827","first_name":"Maksym","last_name":"Serbyn","full_name":"Serbyn, Maksym","id":"47809E7E-F248-11E8-B48F-1D18A9856A87"}],"volume":91,"article_type":"original","has_accepted_license":"1","ddc":["530"],"file":[{"date_created":"2019-05-23T07:39:05Z","file_name":"RevModPhys.91.021001.pdf","relation":"main_file","file_size":1695677,"date_updated":"2020-07-14T12:47:31Z","content_type":"application/pdf","file_id":"6478","access_level":"open_access","checksum":"4aec0e6662b09f6e0f828cd30ff2c3a6","creator":"mserbyn"}],"publication_status":"published","issue":"2","oa":1,"department":[{"_id":"MaSe"}],"status":"public","oa_version":"Published Version","publication":"Reviews of Modern Physics","scopus_import":"1","citation":{"mla":"Abanin, Dmitry A., et al. “Colloquium: Many-Body Localization, Thermalization, and Entanglement.” <i>Reviews of Modern Physics</i>, vol. 91, no. 2, 021001, American Physical Society, 2019, doi:<a href=\"https://doi.org/10.1103/revmodphys.91.021001\">10.1103/revmodphys.91.021001</a>.","ista":"Abanin DA, Altman E, Bloch I, Serbyn M. 2019. Colloquium: Many-body localization, thermalization, and entanglement. Reviews of Modern Physics. 91(2), 021001.","ieee":"D. A. Abanin, E. Altman, I. Bloch, and M. Serbyn, “Colloquium: Many-body localization, thermalization, and entanglement,” <i>Reviews of Modern Physics</i>, vol. 91, no. 2. American Physical Society, 2019.","ama":"Abanin DA, Altman E, Bloch I, Serbyn M. Colloquium: Many-body localization, thermalization, and entanglement. <i>Reviews of Modern Physics</i>. 2019;91(2). doi:<a href=\"https://doi.org/10.1103/revmodphys.91.021001\">10.1103/revmodphys.91.021001</a>","apa":"Abanin, D. A., Altman, E., Bloch, I., &#38; Serbyn, M. (2019). Colloquium: Many-body localization, thermalization, and entanglement. <i>Reviews of Modern Physics</i>. American Physical Society. <a href=\"https://doi.org/10.1103/revmodphys.91.021001\">https://doi.org/10.1103/revmodphys.91.021001</a>","chicago":"Abanin, Dmitry A., Ehud Altman, Immanuel Bloch, and Maksym Serbyn. “Colloquium: Many-Body Localization, Thermalization, and Entanglement.” <i>Reviews of Modern Physics</i>. American Physical Society, 2019. <a href=\"https://doi.org/10.1103/revmodphys.91.021001\">https://doi.org/10.1103/revmodphys.91.021001</a>.","short":"D.A. Abanin, E. Altman, I. Bloch, M. Serbyn, Reviews of Modern Physics 91 (2019)."},"publication_identifier":{"issn":["1539-0756"],"eissn":["0034-6861"]},"publisher":"American Physical Society","day":"22","arxiv":1,"external_id":{"isi":["000469046900001"],"arxiv":["1804.11065"]}},{"ec_funded":1,"date_published":"2019-02-14T00:00:00Z","page":"244-259","doi":"10.1007/978-3-030-12939-2_18","intvolume":"     11269","_id":"6482","title":"KS(conf): A light-weight test if a ConvNet operates outside of Its specifications","month":"02","volume":11269,"author":[{"full_name":"Sun, Rémy","last_name":"Sun","first_name":"Rémy"},{"first_name":"Christoph","orcid":"0000-0001-8622-7887","full_name":"Lampert, Christoph","last_name":"Lampert","id":"40C20FD2-F248-11E8-B48F-1D18A9856A87"}],"project":[{"_id":"2532554C-B435-11E9-9278-68D0E5697425","name":"Lifelong Learning of Visual Scene Understanding","grant_number":"308036","call_identifier":"FP7"}],"abstract":[{"lang":"eng","text":"Computer vision systems for automatic image categorization have become accurate and reliable enough that they can run continuously for days or even years as components of real-world commercial applications. A major open problem in this context, however, is quality control. Good classification performance can only be expected if systems run under the specific conditions, in particular data distributions, that they were trained for. Surprisingly, none of the currently used deep network architectures have a built-in functionality that could detect if a network operates on data from a distribution it was not trained for, such that potentially a warning to the human users could be triggered. In this work, we describe KS(conf), a procedure for detecting such outside of specifications (out-of-specs) operation, based on statistical testing of the network outputs. We show by extensive experiments using the ImageNet, AwA2 and DAVIS datasets on a variety of ConvNets architectures that KS(conf) reliably detects out-of-specs situations. It furthermore has a number of properties that make it a promising candidate for practical deployment: it is easy to implement, adds almost no overhead to the system, works with all networks, including pretrained ones, and requires no a priori knowledge of how the data distribution could change. "}],"date_created":"2019-05-24T09:48:36Z","type":"conference","year":"2019","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","date_updated":"2024-02-22T14:57:29Z","language":[{"iso":"eng"}],"article_processing_charge":"No","quality_controlled":"1","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1804.04171"}],"publication_identifier":{"isbn":["9783030129385","9783030129392"],"eissn":["1611-3349"],"issn":["0302-9743"]},"citation":{"short":"R. Sun, C. Lampert, in:, Springer Nature, 2019, pp. 244–259.","ieee":"R. Sun and C. Lampert, “KS(conf): A light-weight test if a ConvNet operates outside of Its specifications,” presented at the GCPR: Conference on Pattern Recognition, Stuttgart, Germany, 2019, vol. 11269, pp. 244–259.","ista":"Sun R, Lampert C. 2019. KS(conf): A light-weight test if a ConvNet operates outside of Its specifications. GCPR: Conference on Pattern Recognition, LNCS, vol. 11269, 244–259.","mla":"Sun, Rémy, and Christoph Lampert. <i>KS(Conf): A Light-Weight Test If a ConvNet Operates Outside of Its Specifications</i>. Vol. 11269, Springer Nature, 2019, pp. 244–59, doi:<a href=\"https://doi.org/10.1007/978-3-030-12939-2_18\">10.1007/978-3-030-12939-2_18</a>.","chicago":"Sun, Rémy, and Christoph Lampert. “KS(Conf): A Light-Weight Test If a ConvNet Operates Outside of Its Specifications,” 11269:244–59. Springer Nature, 2019. <a href=\"https://doi.org/10.1007/978-3-030-12939-2_18\">https://doi.org/10.1007/978-3-030-12939-2_18</a>.","apa":"Sun, R., &#38; Lampert, C. (2019). KS(conf): A light-weight test if a ConvNet operates outside of Its specifications (Vol. 11269, pp. 244–259). Presented at the GCPR: Conference on Pattern Recognition, Stuttgart, Germany: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-12939-2_18\">https://doi.org/10.1007/978-3-030-12939-2_18</a>","ama":"Sun R, Lampert C. KS(conf): A light-weight test if a ConvNet operates outside of Its specifications. In: Vol 11269. Springer Nature; 2019:244-259. doi:<a href=\"https://doi.org/10.1007/978-3-030-12939-2_18\">10.1007/978-3-030-12939-2_18</a>"},"scopus_import":"1","oa_version":"Preprint","status":"public","external_id":{"arxiv":["1804.04171"]},"arxiv":1,"day":"14","conference":{"start_date":"2018-10-09","name":"GCPR: Conference on Pattern Recognition","location":"Stuttgart, Germany","end_date":"2018-10-12"},"publisher":"Springer Nature","related_material":{"record":[{"relation":"later_version","id":"6944","status":"public"}]},"alternative_title":["LNCS"],"department":[{"_id":"ChLa"}],"oa":1,"publication_status":"published"},{"external_id":{"isi":["000587604600044"]},"day":"01","conference":{"start_date":"2019-02-16","name":"PPoPP: Principles and Practice of Parallel Programming","location":"Washington, NY, United States","end_date":"2019-02-20"},"publisher":"ACM Press","author":[{"id":"2F4DB10C-F248-11E8-B48F-1D18A9856A87","first_name":"Nikita","last_name":"Koval","full_name":"Koval, Nikita"},{"id":"4A899BFC-F248-11E8-B48F-1D18A9856A87","last_name":"Alistarh","full_name":"Alistarh, Dan-Adrian","orcid":"0000-0003-3650-940X","first_name":"Dan-Adrian"},{"last_name":"Elizarov","full_name":"Elizarov, Roman","first_name":"Roman"}],"date_published":"2019-02-01T00:00:00Z","publication_identifier":{"isbn":["9781450362252"]},"isi":1,"citation":{"chicago":"Koval, Nikita, Dan-Adrian Alistarh, and Roman Elizarov. <i>Lock-Free Channels for Programming via Communicating Sequential Processes</i>. <i>Proceedings of the 24th Symposium on Principles and Practice of Parallel Programming</i>. ACM Press, 2019. <a href=\"https://doi.org/10.1145/3293883.3297000\">https://doi.org/10.1145/3293883.3297000</a>.","apa":"Koval, N., Alistarh, D.-A., &#38; Elizarov, R. (2019). <i>Lock-free channels for programming via communicating sequential processes</i>. <i>Proceedings of the 24th Symposium on Principles and Practice of Parallel Programming</i> (pp. 417–418). Washington, NY, United States: ACM Press. <a href=\"https://doi.org/10.1145/3293883.3297000\">https://doi.org/10.1145/3293883.3297000</a>","ama":"Koval N, Alistarh D-A, Elizarov R. <i>Lock-Free Channels for Programming via Communicating Sequential Processes</i>. ACM Press; 2019:417-418. doi:<a href=\"https://doi.org/10.1145/3293883.3297000\">10.1145/3293883.3297000</a>","ista":"Koval N, Alistarh D-A, Elizarov R. 2019. Lock-free channels for programming via communicating sequential processes, ACM Press,p.","ieee":"N. Koval, D.-A. Alistarh, and R. Elizarov, <i>Lock-free channels for programming via communicating sequential processes</i>. ACM Press, 2019, pp. 417–418.","mla":"Koval, Nikita, et al. “Lock-Free Channels for Programming via Communicating Sequential Processes.” <i>Proceedings of the 24th Symposium on Principles and Practice of Parallel Programming</i>, ACM Press, 2019, pp. 417–18, doi:<a href=\"https://doi.org/10.1145/3293883.3297000\">10.1145/3293883.3297000</a>.","short":"N. Koval, D.-A. Alistarh, R. Elizarov, Lock-Free Channels for Programming via Communicating Sequential Processes, ACM Press, 2019."},"page":"417-418","publication":"Proceedings of the 24th Symposium on Principles and Practice of Parallel Programming","doi":"10.1145/3293883.3297000","oa_version":"None","_id":"6485","status":"public","month":"02","title":"Lock-free channels for programming via communicating sequential processes","language":[{"iso":"eng"}],"department":[{"_id":"DaAl"}],"article_processing_charge":"No","publication_status":"published","quality_controlled":"1","abstract":[{"lang":"eng","text":"Traditional concurrent programming involves manipulating shared mutable state. Alternatives to this programming style are communicating sequential processes (CSP) [1] and actor [2] models, which share data via explicit communication. Rendezvous channelis the common abstraction for communication between several processes, where senders and receivers perform a rendezvous handshake as a part of their protocol (senders wait for receivers and vice versa). Additionally to this, channels support the select expression. In this work, we present the first efficient lock-free channel algorithm, and compare it against Go [3] and Kotlin [4] baseline implementations."}],"type":"conference_poster","date_created":"2019-05-24T10:09:12Z","year":"2019","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","date_updated":"2023-08-25T10:41:20Z"},{"quality_controlled":"1","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1809.07625"}],"article_processing_charge":"No","language":[{"iso":"eng"}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","date_updated":"2024-03-25T23:30:20Z","article_number":"111105","year":"2019","abstract":[{"text":"Based on a novel control scheme, where a steady modification of the streamwise velocity profile leads to complete relaminarization of initially fully turbulent pipe flow, we investigate the applicability and usefulness of custom-shaped honeycombs for such control. The custom-shaped honeycombs are used as stationary flow management devices which generate specific modifications of the streamwise velocity profile. Stereoscopic particle image velocimetry and pressure drop measurements are used to investigate and capture the development of the relaminarizing flow downstream these devices. We compare the performance of straight (constant length across the radius of the pipe) honeycombs with custom-shaped ones (variable length across the radius) and try to determine the optimal shape for maximal relaminarization at minimal pressure loss. The optimally modified streamwise velocity profile is found to be M-shaped, and the maximum attainable Reynolds number for total relaminarization is found to be of the order of 10,000. Consequently, the respective reduction in skin friction downstream of the device is almost by a factor of 5. The break-even point, where the additional pressure drop caused by the device is balanced by the savings due to relaminarization and a net gain is obtained, corresponds to a downstream stretch of distances as low as approximately 100 pipe diameters of laminar flow.","lang":"eng"}],"date_created":"2019-05-26T21:59:13Z","type":"journal_article","project":[{"call_identifier":"FP7","_id":"25152F3A-B435-11E9-9278-68D0E5697425","grant_number":"306589","name":"Decoding the complexity of turbulence at its origin"}],"volume":141,"author":[{"full_name":"Kühnen, Jakob","last_name":"Kühnen","orcid":"0000-0003-4312-0179","first_name":"Jakob","id":"3A47AE32-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Davide","orcid":"0000-0001-5227-4271","full_name":"Scarselli, Davide","last_name":"Scarselli","id":"40315C30-F248-11E8-B48F-1D18A9856A87"},{"id":"3A374330-F248-11E8-B48F-1D18A9856A87","first_name":"Björn","orcid":"0000-0003-2057-2754","last_name":"Hof","full_name":"Hof, Björn"}],"article_type":"original","_id":"6486","acknowledged_ssus":[{"_id":"M-Shop"}],"month":"11","title":"Relaminarization of pipe flow by means of 3D-printed shaped honeycombs","doi":"10.1115/1.4043494","intvolume":"       141","ec_funded":1,"date_published":"2019-11-01T00:00:00Z","isi":1,"publication_status":"published","issue":"11","department":[{"_id":"BjHo"}],"oa":1,"related_material":{"record":[{"status":"public","id":"7258","relation":"dissertation_contains"}]},"publisher":"ASME","day":"01","external_id":{"arxiv":["1809.07625"],"isi":["000487748600005"]},"arxiv":1,"status":"public","oa_version":"Preprint","publication":"Journal of Fluids Engineering","publication_identifier":{"issn":["00982202"],"eissn":["1528901X"]},"citation":{"apa":"Kühnen, J., Scarselli, D., &#38; Hof, B. (2019). Relaminarization of pipe flow by means of 3D-printed shaped honeycombs. <i>Journal of Fluids Engineering</i>. ASME. <a href=\"https://doi.org/10.1115/1.4043494\">https://doi.org/10.1115/1.4043494</a>","chicago":"Kühnen, Jakob, Davide Scarselli, and Björn Hof. “Relaminarization of Pipe Flow by Means of 3D-Printed Shaped Honeycombs.” <i>Journal of Fluids Engineering</i>. ASME, 2019. <a href=\"https://doi.org/10.1115/1.4043494\">https://doi.org/10.1115/1.4043494</a>.","ama":"Kühnen J, Scarselli D, Hof B. Relaminarization of pipe flow by means of 3D-printed shaped honeycombs. <i>Journal of Fluids Engineering</i>. 2019;141(11). doi:<a href=\"https://doi.org/10.1115/1.4043494\">10.1115/1.4043494</a>","ista":"Kühnen J, Scarselli D, Hof B. 2019. Relaminarization of pipe flow by means of 3D-printed shaped honeycombs. Journal of Fluids Engineering. 141(11), 111105.","ieee":"J. Kühnen, D. Scarselli, and B. Hof, “Relaminarization of pipe flow by means of 3D-printed shaped honeycombs,” <i>Journal of Fluids Engineering</i>, vol. 141, no. 11. ASME, 2019.","mla":"Kühnen, Jakob, et al. “Relaminarization of Pipe Flow by Means of 3D-Printed Shaped Honeycombs.” <i>Journal of Fluids Engineering</i>, vol. 141, no. 11, 111105, ASME, 2019, doi:<a href=\"https://doi.org/10.1115/1.4043494\">10.1115/1.4043494</a>.","short":"J. Kühnen, D. Scarselli, B. Hof, Journal of Fluids Engineering 141 (2019)."},"scopus_import":"1"},{"volume":"Part F147772","author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","first_name":"Krishnendu","last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu"},{"first_name":"Amir Kafshdar","orcid":"0000-0003-1702-6584","full_name":"Goharshady, Amir Kafshdar","last_name":"Goharshady","id":"391365CE-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Ehsan Kafshdar","full_name":"Goharshady, Ehsan Kafshdar","last_name":"Goharshady"}],"has_accepted_license":"1","ddc":["000"],"_id":"6490","month":"04","title":"The treewidth of smart contracts","doi":"10.1145/3297280.3297322","page":"400-408","date_published":"2019-04-01T00:00:00Z","isi":1,"quality_controlled":"1","article_processing_charge":"No","language":[{"iso":"eng"}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","date_updated":"2024-03-25T23:30:18Z","year":"2019","abstract":[{"text":"Smart contracts are programs that are stored and executed on the Blockchain and can receive, manage and transfer money (cryptocurrency units). Two important problems regarding smart contracts are formal analysis and compiler optimization. Formal analysis is extremely important, because smart contracts hold funds worth billions of dollars and their code is immutable after deployment. Hence, an undetected bug can cause significant financial losses. Compiler optimization is also crucial, because every action of a smart contract has to be executed by every node in the Blockchain network. Therefore, optimizations in compiling smart contracts can lead to significant savings in computation, time and energy.\r\n\r\nTwo classical approaches in program analysis and compiler optimization are intraprocedural and interprocedural analysis. In intraprocedural analysis, each function is analyzed separately, while interprocedural analysis considers the entire program. In both cases, the analyses are usually reduced to graph problems over the control flow graph (CFG) of the program. These graph problems are often computationally expensive. Hence, there has been ample research on exploiting structural properties of CFGs for efficient algorithms. One such well-studied property is the treewidth, which is a measure of tree-likeness of graphs. It is known that intraprocedural CFGs of structured programs have treewidth at most 6, whereas the interprocedural treewidth cannot be bounded. This result has been used as a basis for many efficient intraprocedural analyses.\r\n\r\nIn this paper, we explore the idea of exploiting the treewidth of smart contracts for formal analysis and compiler optimization. First, similar to classical programs, we show that the intraprocedural treewidth of structured Solidity and Vyper smart contracts is at most 9. Second, for global analysis, we prove that the interprocedural treewidth of structured smart contracts is bounded by 10 and, in sharp contrast with classical programs, treewidth-based algorithms can be easily applied for interprocedural analysis. Finally, we supplement our theoretical results with experiments using a tool we implemented for computing treewidth of smart contracts and show that the treewidth is much lower in practice. We use 36,764 real-world Ethereum smart contracts as benchmarks and find that they have an average treewidth of at most 3.35 for the intraprocedural case and 3.65 for the interprocedural case.\r\n","lang":"eng"}],"type":"conference","date_created":"2019-05-26T21:59:15Z","file_date_updated":"2020-07-14T12:47:32Z","publisher":"ACM","day":"01","conference":{"location":"Limassol, Cyprus","name":"SAC: Symposium on Applied Computing","end_date":"2019-04-12","start_date":"2019-04-08"},"external_id":{"isi":["000474685800052"]},"pubrep_id":"1070","status":"public","oa_version":"Submitted Version","publication":"Proceedings of the 34th ACM Symposium on Applied Computing","publication_identifier":{"isbn":["9781450359337"]},"scopus_import":"1","citation":{"apa":"Chatterjee, K., Goharshady, A. K., &#38; Goharshady, E. K. (n.d.). The treewidth of smart contracts. In <i>Proceedings of the 34th ACM Symposium on Applied Computing</i> (Vol. Part F147772, pp. 400–408). Limassol, Cyprus: ACM. <a href=\"https://doi.org/10.1145/3297280.3297322\">https://doi.org/10.1145/3297280.3297322</a>","chicago":"Chatterjee, Krishnendu, Amir Kafshdar Goharshady, and Ehsan Kafshdar Goharshady. “The Treewidth of Smart Contracts.” In <i>Proceedings of the 34th ACM Symposium on Applied Computing</i>, Part F147772:400–408. ACM, n.d. <a href=\"https://doi.org/10.1145/3297280.3297322\">https://doi.org/10.1145/3297280.3297322</a>.","ama":"Chatterjee K, Goharshady AK, Goharshady EK. The treewidth of smart contracts. In: <i>Proceedings of the 34th ACM Symposium on Applied Computing</i>. Vol Part F147772. ACM; :400-408. doi:<a href=\"https://doi.org/10.1145/3297280.3297322\">10.1145/3297280.3297322</a>","ista":"Chatterjee K, Goharshady AK, Goharshady EK. The treewidth of smart contracts. Proceedings of the 34th ACM Symposium on Applied Computing. SAC: Symposium on Applied Computing vol. Part F147772, 400–408.","ieee":"K. Chatterjee, A. K. Goharshady, and E. K. Goharshady, “The treewidth of smart contracts,” in <i>Proceedings of the 34th ACM Symposium on Applied Computing</i>, Limassol, Cyprus, vol. Part F147772, pp. 400–408.","mla":"Chatterjee, Krishnendu, et al. “The Treewidth of Smart Contracts.” <i>Proceedings of the 34th ACM Symposium on Applied Computing</i>, vol. Part F147772, ACM, pp. 400–08, doi:<a href=\"https://doi.org/10.1145/3297280.3297322\">10.1145/3297280.3297322</a>.","short":"K. Chatterjee, A.K. Goharshady, E.K. Goharshady, in:, Proceedings of the 34th ACM Symposium on Applied Computing, ACM, n.d., pp. 400–408."},"publication_status":"submitted","department":[{"_id":"KrCh"}],"oa":1,"related_material":{"record":[{"relation":"dissertation_contains","id":"8934","status":"public"}]},"file":[{"checksum":"dddc20f6d9881f23b8755eb720ec9d6f","creator":"dernst","file_id":"7827","access_level":"open_access","date_updated":"2020-07-14T12:47:32Z","file_size":6937138,"content_type":"application/pdf","date_created":"2020-05-14T09:50:11Z","file_name":"2019_ACM_Chatterjee.pdf","relation":"main_file"}]},{"has_accepted_license":"1","ddc":["000"],"author":[{"id":"4B3207F6-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0003−2936−5719","first_name":"Miriam","last_name":"Garcia Soto","full_name":"Garcia Soto, Miriam"},{"last_name":"Henzinger","full_name":"Henzinger, Thomas A","first_name":"Thomas A","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"id":"3A2F4DCE-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-3658-1065","first_name":"Christian","last_name":"Schilling","full_name":"Schilling, Christian"},{"first_name":"Luka","full_name":"Zeleznik, Luka","last_name":"Zeleznik","id":"3ADCA2E4-F248-11E8-B48F-1D18A9856A87"}],"volume":11561,"page":"297-314","isi":1,"ec_funded":1,"date_published":"2019-07-12T00:00:00Z","_id":"6493","title":"Membership-based synthesis of linear hybrid automata","month":"07","intvolume":"     11561","doi":"10.1007/978-3-030-25540-4_16","article_processing_charge":"No","language":[{"iso":"eng"}],"quality_controlled":"1","keyword":["Synthesis","Linear hybrid automaton","Membership"],"date_created":"2019-05-27T07:09:53Z","type":"conference","abstract":[{"text":"We present two algorithmic approaches for synthesizing linear hybrid automata from experimental data. Unlike previous approaches, our algorithms work without a template and generate an automaton with nondeterministic guards and invariants, and with an arbitrary number and topology of modes. They thus construct a succinct model from the data and provide formal guarantees. In particular, (1) the generated automaton can reproduce the data up to a specified tolerance and (2) the automaton is tight, given the first guarantee. Our first approach encodes the synthesis problem as a logical formula in the theory of linear arithmetic, which can then be solved by an SMT solver. This approach minimizes the number of modes in the resulting model but is only feasible for limited data sets. To address scalability, we propose a second approach that does not enforce to find a minimal model. The algorithm constructs an initial automaton and then iteratively extends the automaton based on processing new data. Therefore the algorithm is well-suited for online and synthesis-in-the-loop applications. The core of the algorithm is a membership query that checks whether, within the specified tolerance, a given data set can result from the execution of a given automaton. We solve this membership problem for linear hybrid automata by repeated reachability computations. We demonstrate the effectiveness of the algorithm on synthetic data sets and on cardiac-cell measurements.","lang":"eng"}],"project":[{"_id":"260C2330-B435-11E9-9278-68D0E5697425","name":"ISTplus - Postdoctoral Fellowships","grant_number":"754411","call_identifier":"H2020"},{"_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23","name":"Rigorous Systems Engineering","call_identifier":"FWF"},{"call_identifier":"FWF","_id":"25F42A32-B435-11E9-9278-68D0E5697425","name":"The Wittgenstein Prize","grant_number":"Z211"}],"file_date_updated":"2020-07-14T12:47:32Z","date_updated":"2023-08-25T10:40:41Z","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","year":"2019","external_id":{"isi":["000491468000016"]},"publisher":"Springer","conference":{"start_date":"2019-07-15","end_date":"2019-07-18","location":"New York City, NY, USA","name":"CAV: Computer-Aided Verification"},"day":"12","publication":"31st International Conference on Computer-Aided Verification","citation":{"mla":"Garcia Soto, Miriam, et al. “Membership-Based Synthesis of Linear Hybrid Automata.” <i>31st International Conference on Computer-Aided Verification</i>, vol. 11561, Springer, 2019, pp. 297–314, doi:<a href=\"https://doi.org/10.1007/978-3-030-25540-4_16\">10.1007/978-3-030-25540-4_16</a>.","ista":"Garcia Soto M, Henzinger TA, Schilling C, Zeleznik L. 2019. Membership-based synthesis of linear hybrid automata. 31st International Conference on Computer-Aided Verification. CAV: Computer-Aided Verification, LNCS, vol. 11561, 297–314.","ieee":"M. Garcia Soto, T. A. Henzinger, C. Schilling, and L. Zeleznik, “Membership-based synthesis of linear hybrid automata,” in <i>31st International Conference on Computer-Aided Verification</i>, New York City, NY, USA, 2019, vol. 11561, pp. 297–314.","ama":"Garcia Soto M, Henzinger TA, Schilling C, Zeleznik L. Membership-based synthesis of linear hybrid automata. In: <i>31st International Conference on Computer-Aided Verification</i>. Vol 11561. Springer; 2019:297-314. doi:<a href=\"https://doi.org/10.1007/978-3-030-25540-4_16\">10.1007/978-3-030-25540-4_16</a>","chicago":"Garcia Soto, Miriam, Thomas A Henzinger, Christian Schilling, and Luka Zeleznik. “Membership-Based Synthesis of Linear Hybrid Automata.” In <i>31st International Conference on Computer-Aided Verification</i>, 11561:297–314. Springer, 2019. <a href=\"https://doi.org/10.1007/978-3-030-25540-4_16\">https://doi.org/10.1007/978-3-030-25540-4_16</a>.","apa":"Garcia Soto, M., Henzinger, T. A., Schilling, C., &#38; Zeleznik, L. (2019). Membership-based synthesis of linear hybrid automata. In <i>31st International Conference on Computer-Aided Verification</i> (Vol. 11561, pp. 297–314). New York City, NY, USA: Springer. <a href=\"https://doi.org/10.1007/978-3-030-25540-4_16\">https://doi.org/10.1007/978-3-030-25540-4_16</a>","short":"M. Garcia Soto, T.A. Henzinger, C. Schilling, L. Zeleznik, in:, 31st International Conference on Computer-Aided Verification, Springer, 2019, pp. 297–314."},"scopus_import":"1","publication_identifier":{"issn":["0302-9743"],"isbn":["9783030255398"]},"status":"public","oa_version":"Published Version","oa":1,"department":[{"_id":"ToHe"}],"tmp":{"image":"/images/cc_by.png","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"alternative_title":["LNCS"],"publication_status":"published","file":[{"creator":"dernst","checksum":"1f1d61b83a151031745ef70a501da3d6","access_level":"open_access","file_id":"6817","content_type":"application/pdf","date_updated":"2020-07-14T12:47:32Z","file_size":674795,"file_name":"2019_CAV_GarciaSoto.pdf","relation":"main_file","date_created":"2019-08-14T11:05:30Z"}]}]
