[{"date_updated":"2023-09-11T12:45:44Z","volume":3,"oa_version":"Preprint","date_published":"2018-05-30T00:00:00Z","year":"2018","status":"public","_id":"291","intvolume":"         3","arxiv":1,"title":"Complexity of the laminar-turbulent boundary in pipe flow","publisher":"American Physical Society","doi":"10.1103/PhysRevFluids.3.054401","isi":1,"publication":"Physical Review Fluids","language":[{"iso":"eng"}],"oa":1,"type":"journal_article","day":"30","quality_controlled":"1","abstract":[{"lang":"eng","text":"Over the past decade, the edge of chaos has proven to be a fruitful starting point for investigations of shear flows when the laminar base flow is linearly stable. Numerous computational studies of shear flows demonstrated the existence of states that separate laminar and turbulent regions of the state space. In addition, some studies determined invariant solutions that reside on this edge. In this paper, we study the unstable manifold of one such solution with the aid of continuous symmetry reduction, which we formulate here for the simultaneous quotiening of axial and azimuthal symmetries. Upon our investigation of the unstable manifold, we discover a previously unknown traveling-wave solution on the laminar-turbulent boundary with a relatively complex structure. By means of low-dimensional projections, we visualize different dynamical paths that connect these solutions to the turbulence. Our numerical experiments demonstrate that the laminar-turbulent boundary exhibits qualitatively different regions whose properties are influenced by the nearby invariant solutions."}],"main_file_link":[{"url":"https://arxiv.org/abs/1802.01918","open_access":"1"}],"publist_id":"7590","scopus_import":"1","article_processing_charge":"No","article_number":"054401","citation":{"ieee":"N. B. Budanur and B. Hof, “Complexity of the laminar-turbulent boundary in pipe flow,” <i>Physical Review Fluids</i>, vol. 3, no. 5. American Physical Society, 2018.","apa":"Budanur, N. B., &#38; Hof, B. (2018). Complexity of the laminar-turbulent boundary in pipe flow. <i>Physical Review Fluids</i>. American Physical Society. <a href=\"https://doi.org/10.1103/PhysRevFluids.3.054401\">https://doi.org/10.1103/PhysRevFluids.3.054401</a>","chicago":"Budanur, Nazmi B, and Björn Hof. “Complexity of the Laminar-Turbulent Boundary in Pipe Flow.” <i>Physical Review Fluids</i>. American Physical Society, 2018. <a href=\"https://doi.org/10.1103/PhysRevFluids.3.054401\">https://doi.org/10.1103/PhysRevFluids.3.054401</a>.","ama":"Budanur NB, Hof B. Complexity of the laminar-turbulent boundary in pipe flow. <i>Physical Review Fluids</i>. 2018;3(5). doi:<a href=\"https://doi.org/10.1103/PhysRevFluids.3.054401\">10.1103/PhysRevFluids.3.054401</a>","short":"N.B. Budanur, B. Hof, Physical Review Fluids 3 (2018).","mla":"Budanur, Nazmi B., and Björn Hof. “Complexity of the Laminar-Turbulent Boundary in Pipe Flow.” <i>Physical Review Fluids</i>, vol. 3, no. 5, 054401, American Physical Society, 2018, doi:<a href=\"https://doi.org/10.1103/PhysRevFluids.3.054401\">10.1103/PhysRevFluids.3.054401</a>.","ista":"Budanur NB, Hof B. 2018. Complexity of the laminar-turbulent boundary in pipe flow. Physical Review Fluids. 3(5), 054401."},"month":"05","department":[{"_id":"BjHo"}],"author":[{"last_name":"Budanur","id":"3EA1010E-F248-11E8-B48F-1D18A9856A87","full_name":"Budanur, Nazmi B","first_name":"Nazmi B","orcid":"0000-0003-0423-5010"},{"first_name":"Björn","full_name":"Hof, Björn","id":"3A374330-F248-11E8-B48F-1D18A9856A87","last_name":"Hof","orcid":"0000-0003-2057-2754"}],"publication_status":"published","external_id":{"arxiv":["1802.01918"],"isi":["000433426200001"]},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","date_created":"2018-12-11T11:45:39Z","issue":"5"},{"article_number":"e1006057","article_processing_charge":"Yes","project":[{"grant_number":"720270","name":"Human Brain Project Specific Grant Agreement 1 (HBP SGA 1)","call_identifier":"H2020","_id":"25CBA828-B435-11E9-9278-68D0E5697425"},{"grant_number":"P 25651-N26","call_identifier":"FWF","name":"Sensitivity to higher-order statistics in natural scenes","_id":"254D1A94-B435-11E9-9278-68D0E5697425"}],"department":[{"_id":"GaTk"}],"citation":{"chicago":"Botella Soler, Vicente, Stephane Deny, Georg S Martius, Olivier Marre, and Gašper Tkačik. “Nonlinear Decoding of a Complex Movie from the Mammalian Retina.” <i>PLoS Computational Biology</i>. Public Library of Science, 2018. <a href=\"https://doi.org/10.1371/journal.pcbi.1006057\">https://doi.org/10.1371/journal.pcbi.1006057</a>.","apa":"Botella Soler, V., Deny, S., Martius, G. S., Marre, O., &#38; Tkačik, G. (2018). Nonlinear decoding of a complex movie from the mammalian retina. <i>PLoS Computational Biology</i>. Public Library of Science. <a href=\"https://doi.org/10.1371/journal.pcbi.1006057\">https://doi.org/10.1371/journal.pcbi.1006057</a>","ieee":"V. Botella Soler, S. Deny, G. S. Martius, O. Marre, and G. Tkačik, “Nonlinear decoding of a complex movie from the mammalian retina,” <i>PLoS Computational Biology</i>, vol. 14, no. 5. Public Library of Science, 2018.","mla":"Botella Soler, Vicente, et al. “Nonlinear Decoding of a Complex Movie from the Mammalian Retina.” <i>PLoS Computational Biology</i>, vol. 14, no. 5, e1006057, Public Library of Science, 2018, doi:<a href=\"https://doi.org/10.1371/journal.pcbi.1006057\">10.1371/journal.pcbi.1006057</a>.","ama":"Botella Soler V, Deny S, Martius GS, Marre O, Tkačik G. Nonlinear decoding of a complex movie from the mammalian retina. <i>PLoS Computational Biology</i>. 2018;14(5). doi:<a href=\"https://doi.org/10.1371/journal.pcbi.1006057\">10.1371/journal.pcbi.1006057</a>","ista":"Botella Soler V, Deny S, Martius GS, Marre O, Tkačik G. 2018. Nonlinear decoding of a complex movie from the mammalian retina. PLoS Computational Biology. 14(5), e1006057.","short":"V. Botella Soler, S. Deny, G.S. Martius, O. Marre, G. Tkačik, PLoS Computational Biology 14 (2018)."},"month":"05","abstract":[{"text":"Retina is a paradigmatic system for studying sensory encoding: the transformation of light into spiking activity of ganglion cells. The inverse problem, where stimulus is reconstructed from spikes, has received less attention, especially for complex stimuli that should be reconstructed “pixel-by-pixel”. We recorded around a hundred neurons from a dense patch in a rat retina and decoded movies of multiple small randomly-moving discs. We constructed nonlinear (kernelized and neural network) decoders that improved significantly over linear results. An important contribution to this was the ability of nonlinear decoders to reliably separate between neural responses driven by locally fluctuating light signals, and responses at locally constant light driven by spontaneous-like activity. This improvement crucially depended on the precise, non-Poisson temporal structure of individual spike trains, which originated in the spike-history dependence of neural responses. We propose a general principle by which downstream circuitry could discriminate between spontaneous and stimulus-driven activity based solely on higher-order statistical structure in the incoming spike trains.","lang":"eng"}],"file":[{"date_created":"2019-02-13T11:07:15Z","relation":"main_file","file_id":"5974","file_name":"2018_Plos_Botella_Soler.pdf","access_level":"open_access","content_type":"application/pdf","file_size":3460786,"creator":"dernst","date_updated":"2020-07-14T12:45:53Z","checksum":"3026f94d235219e15514505fdbadf34e"}],"scopus_import":"1","has_accepted_license":"1","external_id":{"isi":["000434012100002"]},"issue":"5","date_created":"2018-12-11T11:45:39Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","article_type":"original","publication_status":"published","author":[{"full_name":"Botella Soler, Vicent","id":"421234E8-F248-11E8-B48F-1D18A9856A87","last_name":"Botella Soler","first_name":"Vicent","orcid":"0000-0002-8790-1914"},{"full_name":"Deny, Stephane","last_name":"Deny","first_name":"Stephane"},{"first_name":"Georg S","full_name":"Martius, Georg S","last_name":"Martius"},{"first_name":"Olivier","last_name":"Marre","full_name":"Marre, Olivier"},{"orcid":"0000-0002-6699-1455","id":"3D494DCA-F248-11E8-B48F-1D18A9856A87","full_name":"Tkacik, Gasper","last_name":"Tkacik","first_name":"Gasper"}],"year":"2018","file_date_updated":"2020-07-14T12:45:53Z","date_published":"2018-05-10T00:00:00Z","_id":"292","intvolume":"        14","tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"ddc":["570"],"status":"public","volume":14,"oa_version":"Published Version","ec_funded":1,"date_updated":"2024-02-21T13:45:25Z","related_material":{"record":[{"relation":"research_data","id":"5584","status":"public"}],"link":[{"relation":"press_release","url":"https://ist.ac.at/en/news/video-of-moving-discs-reconstructed-from-rat-retinal-neuron-signals/","description":"News on IST Homepage"}]},"day":"10","type":"journal_article","oa":1,"language":[{"iso":"eng"}],"quality_controlled":"1","title":"Nonlinear decoding of a complex movie from the mammalian retina","publication":"PLoS Computational Biology","isi":1,"publisher":"Public Library of Science","doi":"10.1371/journal.pcbi.1006057"},{"citation":{"apa":"Hoffman, M., Hilbe, C., &#38; Nowak, M. (2018). The signal-burying game can explain why we obscure positive traits and good deeds. <i>Nature Human Behaviour</i>. Nature Publishing Group. <a href=\"https://doi.org/10.1038/s41562-018-0354-z\">https://doi.org/10.1038/s41562-018-0354-z</a>","ieee":"M. Hoffman, C. Hilbe, and M. Nowak, “The signal-burying game can explain why we obscure positive traits and good deeds,” <i>Nature Human Behaviour</i>, vol. 2. Nature Publishing Group, pp. 397–404, 2018.","chicago":"Hoffman, Moshe, Christian Hilbe, and Martin Nowak. “The Signal-Burying Game Can Explain Why We Obscure Positive Traits and Good Deeds.” <i>Nature Human Behaviour</i>. Nature Publishing Group, 2018. <a href=\"https://doi.org/10.1038/s41562-018-0354-z\">https://doi.org/10.1038/s41562-018-0354-z</a>.","ama":"Hoffman M, Hilbe C, Nowak M. The signal-burying game can explain why we obscure positive traits and good deeds. <i>Nature Human Behaviour</i>. 2018;2:397-404. doi:<a href=\"https://doi.org/10.1038/s41562-018-0354-z\">10.1038/s41562-018-0354-z</a>","ista":"Hoffman M, Hilbe C, Nowak M. 2018. The signal-burying game can explain why we obscure positive traits and good deeds. Nature Human Behaviour. 2, 397–404.","short":"M. Hoffman, C. Hilbe, M. Nowak, Nature Human Behaviour 2 (2018) 397–404.","mla":"Hoffman, Moshe, et al. “The Signal-Burying Game Can Explain Why We Obscure Positive Traits and Good Deeds.” <i>Nature Human Behaviour</i>, vol. 2, Nature Publishing Group, 2018, pp. 397–404, doi:<a href=\"https://doi.org/10.1038/s41562-018-0354-z\">10.1038/s41562-018-0354-z</a>."},"month":"05","department":[{"_id":"KrCh"}],"project":[{"_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734","name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7"}],"article_processing_charge":"No","has_accepted_license":"1","acknowledgement":"This work was supported by a grant from the John Templeton Foundation and by the Office of Naval Research Grant N00014-16-1-2914 (M.A.N.). C.H. acknowledges generous support from the ISTFELLOW programme and by the Schrödinger scholarship of the Austrian Science Fund (FWF) J3475.","file":[{"file_id":"7051","relation":"main_file","date_created":"2019-11-19T08:17:23Z","file_name":"2018_NatureHumanBeh_Hoffman.pdf","content_type":"application/pdf","access_level":"open_access","date_updated":"2020-07-14T12:45:54Z","file_size":194734,"creator":"dernst","checksum":"32efaf06a597495c184df91b3fbb19c0"}],"scopus_import":"1","publist_id":"7588","abstract":[{"text":"People sometimes make their admirable deeds and accomplishments hard to spot, such as by giving anonymously or avoiding bragging. Such ‘buried’ signals are hard to reconcile with standard models of signalling or indirect reciprocity, which motivate costly pro-social behaviour by reputational gains. To explain these phenomena, we design a simple game theory model, which we call the signal-burying game. This game has the feature that senders can bury their signal by deliberately reducing the probability of the signal being observed. If the signal is observed, however, it is identified as having been buried. We show under which conditions buried signals can be maintained, using static equilibrium concepts and calculations of the evolutionary dynamics. We apply our analysis to shed light on a number of otherwise puzzling social phenomena, including modesty, anonymous donations, subtlety in art and fashion, and overeagerness.","lang":"eng"}],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","date_created":"2018-12-11T11:45:39Z","page":"397 - 404","external_id":{"isi":["000435551300009"]},"publication_status":"published","author":[{"first_name":"Moshe","last_name":"Hoffman","full_name":"Hoffman, Moshe"},{"id":"2FDF8F3C-F248-11E8-B48F-1D18A9856A87","full_name":"Hilbe, Christian","last_name":"Hilbe","first_name":"Christian","orcid":"0000-0001-5116-955X"},{"full_name":"Nowak, Martin","last_name":"Nowak","first_name":"Martin"}],"article_type":"original","_id":"293","intvolume":"         2","status":"public","ddc":["000"],"file_date_updated":"2020-07-14T12:45:54Z","year":"2018","date_published":"2018-05-28T00:00:00Z","related_material":{"link":[{"relation":"press_release","url":"https://ist.ac.at/en/news/the-logic-of-modesty-why-it-pays-to-be-humble/","description":"News on IST Homepage"}]},"volume":2,"oa_version":"Submitted Version","date_updated":"2023-09-19T10:12:03Z","ec_funded":1,"quality_controlled":"1","type":"journal_article","oa":1,"day":"28","language":[{"iso":"eng"}],"publication":"Nature Human Behaviour","publisher":"Nature Publishing Group","doi":"10.1038/s41562-018-0354-z","isi":1,"title":"The signal-burying game can explain why we obscure positive traits and good deeds"},{"quality_controlled":"1","language":[{"iso":"eng"}],"type":"journal_article","oa":1,"day":"18","publisher":"American Physical Society","doi":"10.1103/PhysRevA.97.043842","isi":1,"publication":"Physical Review A - Atomic, Molecular, and Optical Physics","title":"Two-photon processes based on quantum commutators","arxiv":1,"status":"public","intvolume":"        97","_id":"294","date_published":"2018-04-18T00:00:00Z","year":"2018","date_updated":"2023-09-19T10:17:56Z","ec_funded":1,"oa_version":"Submitted Version","volume":97,"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","issue":"4","date_created":"2018-12-11T11:45:40Z","external_id":{"isi":["000430296800008"],"arxiv":["1801.06892"]},"author":[{"full_name":"Fratini, Filippo","last_name":"Fratini","first_name":"Filippo"},{"id":"3C325E5E-F248-11E8-B48F-1D18A9856A87","full_name":"Safari, Laleh","last_name":"Safari","first_name":"Laleh"},{"full_name":"Amaro, Pedro","last_name":"Amaro","first_name":"Pedro"},{"first_name":"José","full_name":"Santos, José","last_name":"Santos"}],"publication_status":"published","month":"04","citation":{"mla":"Fratini, Filippo, et al. “Two-Photon Processes Based on Quantum Commutators.” <i>Physical Review A - Atomic, Molecular, and Optical Physics</i>, vol. 97, no. 4, American Physical Society, 2018, doi:<a href=\"https://doi.org/10.1103/PhysRevA.97.043842\">10.1103/PhysRevA.97.043842</a>.","ama":"Fratini F, Safari L, Amaro P, Santos J. Two-photon processes based on quantum commutators. <i>Physical Review A - Atomic, Molecular, and Optical Physics</i>. 2018;97(4). doi:<a href=\"https://doi.org/10.1103/PhysRevA.97.043842\">10.1103/PhysRevA.97.043842</a>","ista":"Fratini F, Safari L, Amaro P, Santos J. 2018. Two-photon processes based on quantum commutators. Physical Review A - Atomic, Molecular, and Optical Physics. 97(4).","short":"F. Fratini, L. Safari, P. Amaro, J. Santos, Physical Review A - Atomic, Molecular, and Optical Physics 97 (2018).","ieee":"F. Fratini, L. Safari, P. Amaro, and J. Santos, “Two-photon processes based on quantum commutators,” <i>Physical Review A - Atomic, Molecular, and Optical Physics</i>, vol. 97, no. 4. American Physical Society, 2018.","apa":"Fratini, F., Safari, L., Amaro, P., &#38; Santos, J. (2018). Two-photon processes based on quantum commutators. <i>Physical Review A - Atomic, Molecular, and Optical Physics</i>. American Physical Society. <a href=\"https://doi.org/10.1103/PhysRevA.97.043842\">https://doi.org/10.1103/PhysRevA.97.043842</a>","chicago":"Fratini, Filippo, Laleh Safari, Pedro Amaro, and José Santos. “Two-Photon Processes Based on Quantum Commutators.” <i>Physical Review A - Atomic, Molecular, and Optical Physics</i>. American Physical Society, 2018. <a href=\"https://doi.org/10.1103/PhysRevA.97.043842\">https://doi.org/10.1103/PhysRevA.97.043842</a>."},"department":[{"_id":"MiLe"}],"project":[{"_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734","call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme"}],"article_processing_charge":"No","scopus_import":"1","abstract":[{"text":"We developed a method to calculate two-photon processes in quantum mechanics that replaces the infinite summation over the intermediate states by a perturbation expansion. This latter consists of a series of commutators that involve position, momentum, and Hamiltonian quantum operators. We analyzed several single- and many-particle cases for which a closed-form solution to the perturbation expansion exists, as well as more complicated cases for which a solution is found by convergence. Throughout the article, Rayleigh and Raman scattering are taken as examples of two-photon processes. The present method provides a clear distinction between the Thomson scattering, regarded as classical scattering, and quantum contributions. Such a distinction lets us derive general results concerning light scattering. Finally, possible extensions to the developed formalism are discussed.","lang":"eng"}],"main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1801.06892"}],"publist_id":"7587"},{"arxiv":1,"title":"Fermionic behavior of ideal anyons","isi":1,"publisher":"Springer","doi":"10.1007/s11005-018-1091-y","publication":"Letters in Mathematical Physics","language":[{"iso":"eng"}],"day":"11","type":"journal_article","oa":1,"quality_controlled":"1","ec_funded":1,"date_updated":"2023-09-11T14:01:57Z","oa_version":"Published Version","volume":108,"date_published":"2018-05-11T00:00:00Z","year":"2018","file_date_updated":"2020-07-14T12:45:55Z","tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"ddc":["510"],"status":"public","intvolume":"       108","_id":"295","author":[{"first_name":"Douglas","last_name":"Lundholm","full_name":"Lundholm, Douglas"},{"first_name":"Robert","id":"4AFD0470-F248-11E8-B48F-1D18A9856A87","full_name":"Seiringer, Robert","last_name":"Seiringer","orcid":"0000-0002-6781-0521"}],"publication_status":"published","external_id":{"arxiv":["1712.06218"],"isi":["000446491500008"]},"page":"2523-2541","issue":"11","date_created":"2018-12-11T11:45:40Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","abstract":[{"lang":"eng","text":"We prove upper and lower bounds on the ground-state energy of the ideal two-dimensional anyon gas. Our bounds are extensive in the particle number, as for fermions, and linear in the statistics parameter (Formula presented.). The lower bounds extend to Lieb–Thirring inequalities for all anyons except bosons."}],"publist_id":"7586","scopus_import":"1","acknowledgement":"Financial support from the Swedish Research Council, grant no. 2013-4734 (D. L.), the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No 694227, R. S.), and by the Austrian Science Fund (FWF), project Nr. P 27533-N27 (R. S.), is gratefully acknowledged.","file":[{"content_type":"application/pdf","access_level":"open_access","date_updated":"2020-07-14T12:45:55Z","creator":"dernst","file_size":551996,"checksum":"8beb9632fa41bbd19452f55f31286a31","file_id":"5698","relation":"main_file","date_created":"2018-12-17T12:14:17Z","file_name":"2018_LettMathPhys_Lundholm.pdf"}],"has_accepted_license":"1","article_processing_charge":"No","project":[{"grant_number":"694227","name":"Analysis of quantum many-body systems","call_identifier":"H2020","_id":"25C6DC12-B435-11E9-9278-68D0E5697425"},{"call_identifier":"FWF","name":"Structure of the Excitation Spectrum for Many-Body Quantum Systems","grant_number":"P27533_N27","_id":"25C878CE-B435-11E9-9278-68D0E5697425"}],"department":[{"_id":"RoSe"}],"month":"05","citation":{"ista":"Lundholm D, Seiringer R. 2018. Fermionic behavior of ideal anyons. Letters in Mathematical Physics. 108(11), 2523–2541.","ama":"Lundholm D, Seiringer R. Fermionic behavior of ideal anyons. <i>Letters in Mathematical Physics</i>. 2018;108(11):2523-2541. doi:<a href=\"https://doi.org/10.1007/s11005-018-1091-y\">10.1007/s11005-018-1091-y</a>","short":"D. Lundholm, R. Seiringer, Letters in Mathematical Physics 108 (2018) 2523–2541.","mla":"Lundholm, Douglas, and Robert Seiringer. “Fermionic Behavior of Ideal Anyons.” <i>Letters in Mathematical Physics</i>, vol. 108, no. 11, Springer, 2018, pp. 2523–41, doi:<a href=\"https://doi.org/10.1007/s11005-018-1091-y\">10.1007/s11005-018-1091-y</a>.","chicago":"Lundholm, Douglas, and Robert Seiringer. “Fermionic Behavior of Ideal Anyons.” <i>Letters in Mathematical Physics</i>. Springer, 2018. <a href=\"https://doi.org/10.1007/s11005-018-1091-y\">https://doi.org/10.1007/s11005-018-1091-y</a>.","ieee":"D. Lundholm and R. Seiringer, “Fermionic behavior of ideal anyons,” <i>Letters in Mathematical Physics</i>, vol. 108, no. 11. Springer, pp. 2523–2541, 2018.","apa":"Lundholm, D., &#38; Seiringer, R. (2018). Fermionic behavior of ideal anyons. <i>Letters in Mathematical Physics</i>. Springer. <a href=\"https://doi.org/10.1007/s11005-018-1091-y\">https://doi.org/10.1007/s11005-018-1091-y</a>"}},{"main_file_link":[{"url":"http://eprints.whiterose.ac.uk/130860/","open_access":"1"}],"abstract":[{"lang":"eng","text":"The thermodynamic description of many-particle systems rests on the assumption of ergodicity, the ability of a system to explore all allowed configurations in the phase space. Recent studies on many-body localization have revealed the existence of systems that strongly violate ergodicity in the presence of quenched disorder. Here, we demonstrate that ergodicity can be weakly broken by a different mechanism, arising from the presence of special eigenstates in the many-body spectrum that are reminiscent of quantum scars in chaotic non-interacting systems. In the single-particle case, quantum scars correspond to wavefunctions that concentrate in the vicinity of unstable periodic classical trajectories. We show that many-body scars appear in the Fibonacci chain, a model with a constrained local Hilbert space that has recently been experimentally realized in a Rydberg-atom quantum simulator. The quantum scarred eigenstates are embedded throughout the otherwise thermalizing many-body spectrum but lead to direct experimental signatures, as we show for periodic recurrences that reproduce those observed in the experiment. Our results suggest that scarred many-body bands give rise to a new universality class of quantum dynamics, opening up opportunities for the creation of novel states with long-lived coherence in systems that are now experimentally realizable."}],"publist_id":"7585","scopus_import":"1","acknowledgement":"C.J.T., A.M. and Z.P. acknowledge support from EPSRC grants EP/P009409/1 and EP/M50807X/1, and Royal Society Research Grant RG160635. D.A. acknowledges support from the Swiss National Science Foundation.","article_processing_charge":"No","department":[{"_id":"MaSe"}],"citation":{"ama":"Turner C, Michailidis A, Abanin D, Serbyn M, Papić Z. Weak ergodicity breaking from quantum many-body scars. <i>Nature Physics</i>. 2018;14:745-749. doi:<a href=\"https://doi.org/10.1038/s41567-018-0137-5\">10.1038/s41567-018-0137-5</a>","ista":"Turner C, Michailidis A, Abanin D, Serbyn M, Papić Z. 2018. Weak ergodicity breaking from quantum many-body scars. Nature Physics. 14, 745–749.","mla":"Turner, Christopher, et al. “Weak Ergodicity Breaking from Quantum Many-Body Scars.” <i>Nature Physics</i>, vol. 14, Nature Publishing Group, 2018, pp. 745–49, doi:<a href=\"https://doi.org/10.1038/s41567-018-0137-5\">10.1038/s41567-018-0137-5</a>.","short":"C. Turner, A. Michailidis, D. Abanin, M. Serbyn, Z. Papić, Nature Physics 14 (2018) 745–749.","ieee":"C. Turner, A. Michailidis, D. Abanin, M. Serbyn, and Z. Papić, “Weak ergodicity breaking from quantum many-body scars,” <i>Nature Physics</i>, vol. 14. Nature Publishing Group, pp. 745–749, 2018.","apa":"Turner, C., Michailidis, A., Abanin, D., Serbyn, M., &#38; Papić, Z. (2018). Weak ergodicity breaking from quantum many-body scars. <i>Nature Physics</i>. Nature Publishing Group. <a href=\"https://doi.org/10.1038/s41567-018-0137-5\">https://doi.org/10.1038/s41567-018-0137-5</a>","chicago":"Turner, Christopher, Alexios Michailidis, Dmitry Abanin, Maksym Serbyn, and Zlatko Papić. “Weak Ergodicity Breaking from Quantum Many-Body Scars.” <i>Nature Physics</i>. Nature Publishing Group, 2018. <a href=\"https://doi.org/10.1038/s41567-018-0137-5\">https://doi.org/10.1038/s41567-018-0137-5</a>."},"month":"05","article_type":"original","author":[{"last_name":"Turner","full_name":"Turner, Christopher","first_name":"Christopher"},{"first_name":"Alexios","last_name":"Michailidis","id":"36EBAD38-F248-11E8-B48F-1D18A9856A87","full_name":"Michailidis, Alexios","orcid":"0000-0002-8443-1064"},{"full_name":"Abanin, Dmitry","last_name":"Abanin","first_name":"Dmitry"},{"orcid":"0000-0002-2399-5827","last_name":"Serbyn","id":"47809E7E-F248-11E8-B48F-1D18A9856A87","full_name":"Serbyn, Maksym","first_name":"Maksym"},{"first_name":"Zlatko","last_name":"Papić","full_name":"Papić, Zlatko"}],"publication_status":"published","external_id":{"isi":["000438253600028"]},"page":"745 - 749","date_created":"2018-12-11T11:45:40Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","date_updated":"2023-09-19T10:37:55Z","oa_version":"Submitted Version","volume":14,"date_published":"2018-05-14T00:00:00Z","year":"2018","status":"public","_id":"296","intvolume":"        14","title":"Weak ergodicity breaking from quantum many-body scars","isi":1,"doi":"10.1038/s41567-018-0137-5","publisher":"Nature Publishing Group","publication":"Nature Physics","language":[{"iso":"eng"}],"day":"14","type":"journal_article","oa":1,"quality_controlled":"1"},{"article_processing_charge":"No","project":[{"grant_number":"ICT15-003","name":"Efficient Algorithms for Computer Aided Verification","_id":"25892FC0-B435-11E9-9278-68D0E5697425"},{"_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23","call_identifier":"FWF","name":"Rigorous Systems Engineering"},{"_id":"2581B60A-B435-11E9-9278-68D0E5697425","name":"Quantitative Graph Games: Theory and Applications","call_identifier":"FP7","grant_number":"279307"},{"grant_number":"665385","name":"International IST Doctoral Program","call_identifier":"H2020","_id":"2564DBCA-B435-11E9-9278-68D0E5697425"}],"department":[{"_id":"KrCh"},{"_id":"ToHe"}],"citation":{"apa":"Brázdil, T., Chatterjee, K., Kretinsky, J., &#38; Toman, V. (2018). Strategy representation by decision trees in reactive synthesis (Vol. 10805, pp. 385–407). Presented at the TACAS 2018: Tools and Algorithms for the Construction and Analysis of Systems, Thessaloniki, Greece: Springer. <a href=\"https://doi.org/10.1007/978-3-319-89960-2_21\">https://doi.org/10.1007/978-3-319-89960-2_21</a>","ieee":"T. Brázdil, K. Chatterjee, J. Kretinsky, and V. Toman, “Strategy representation by decision trees in reactive synthesis,” presented at the TACAS 2018: Tools and Algorithms for the Construction and Analysis of Systems, Thessaloniki, Greece, 2018, vol. 10805, pp. 385–407.","chicago":"Brázdil, Tomáš, Krishnendu Chatterjee, Jan Kretinsky, and Viktor Toman. “Strategy Representation by Decision Trees in Reactive Synthesis,” 10805:385–407. Springer, 2018. <a href=\"https://doi.org/10.1007/978-3-319-89960-2_21\">https://doi.org/10.1007/978-3-319-89960-2_21</a>.","ama":"Brázdil T, Chatterjee K, Kretinsky J, Toman V. Strategy representation by decision trees in reactive synthesis. In: Vol 10805. Springer; 2018:385-407. doi:<a href=\"https://doi.org/10.1007/978-3-319-89960-2_21\">10.1007/978-3-319-89960-2_21</a>","ista":"Brázdil T, Chatterjee K, Kretinsky J, Toman V. 2018. Strategy representation by decision trees in reactive synthesis. TACAS 2018: Tools and Algorithms for the Construction and Analysis of Systems, LNCS, vol. 10805, 385–407.","short":"T. Brázdil, K. Chatterjee, J. Kretinsky, V. Toman, in:, Springer, 2018, pp. 385–407.","mla":"Brázdil, Tomáš, et al. <i>Strategy Representation by Decision Trees in Reactive Synthesis</i>. Vol. 10805, Springer, 2018, pp. 385–407, doi:<a href=\"https://doi.org/10.1007/978-3-319-89960-2_21\">10.1007/978-3-319-89960-2_21</a>."},"alternative_title":["LNCS"],"month":"04","publist_id":"7584","abstract":[{"text":"Graph games played by two players over finite-state graphs are central in many problems in computer science. In particular, graph games with ω -regular winning conditions, specified as parity objectives, which can express properties such as safety, liveness, fairness, are the basic framework for verification and synthesis of reactive systems. The decisions for a player at various states of the graph game are represented as strategies. While the algorithmic problem for solving graph games with parity objectives has been widely studied, the most prominent data-structure for strategy representation in graph games has been binary decision diagrams (BDDs). However, due to the bit-level representation, BDDs do not retain the inherent flavor of the decisions of strategies, and are notoriously hard to minimize to obtain succinct representation. In this work we propose decision trees for strategy representation in graph games. Decision trees retain the flavor of decisions of strategies and allow entropy-based minimization to obtain succinct trees. However, decision trees work in settings (e.g., probabilistic models) where errors are allowed, and overfitting of data is typically avoided. In contrast, for strategies in graph games no error is allowed, and the decision tree must represent the entire strategy. We develop new techniques to extend decision trees to overcome the above obstacles, while retaining the entropy-based techniques to obtain succinct trees. We have implemented our techniques to extend the existing decision tree solvers. We present experimental results for problems in reactive synthesis to show that decision trees provide a much more efficient data-structure for strategy representation as compared to BDDs.","lang":"eng"}],"scopus_import":"1","file":[{"file_id":"5723","date_created":"2018-12-17T16:29:08Z","relation":"main_file","file_name":"2018_LNCS_Brazdil.pdf","date_updated":"2020-07-14T12:45:57Z","creator":"dernst","file_size":1829940,"checksum":"b13874ffb114932ad9cc2586b7469db4","access_level":"open_access","content_type":"application/pdf"}],"has_accepted_license":"1","page":"385 - 407","conference":{"end_date":"2018-04-20","name":"TACAS 2018: Tools and Algorithms for the Construction and Analysis of Systems","location":"Thessaloniki, Greece","start_date":"2018-04-14"},"external_id":{"isi":["000546326300021"]},"date_created":"2018-12-11T11:45:41Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","publication_status":"published","author":[{"first_name":"Tomáš","last_name":"Brázdil","full_name":"Brázdil, Tomáš"},{"full_name":"Chatterjee, Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","last_name":"Chatterjee","first_name":"Krishnendu","orcid":"0000-0002-4561-241X"},{"first_name":"Jan","last_name":"Kretinsky","full_name":"Kretinsky, Jan","id":"44CEF464-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8122-2881"},{"full_name":"Toman, Viktor","id":"3AF3DA7C-F248-11E8-B48F-1D18A9856A87","last_name":"Toman","first_name":"Viktor","orcid":"0000-0001-9036-063X"}],"year":"2018","file_date_updated":"2020-07-14T12:45:57Z","date_published":"2018-04-12T00:00:00Z","intvolume":"     10805","_id":"297","ddc":["000"],"tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"status":"public","volume":10805,"oa_version":"Published Version","date_updated":"2025-06-02T08:53:40Z","ec_funded":1,"day":"12","oa":1,"type":"conference","language":[{"iso":"eng"}],"quality_controlled":"1","title":"Strategy representation by decision trees in reactive synthesis","isi":1,"publisher":"Springer","doi":"10.1007/978-3-319-89960-2_21"},{"isi":1,"publisher":"Springer","doi":"10.1007/978-3-319-78375-8_4","arxiv":1,"title":"Sustained space complexity","quality_controlled":"1","language":[{"iso":"eng"}],"day":"31","oa":1,"type":"conference","ec_funded":1,"date_updated":"2023-09-19T09:59:30Z","volume":10821,"oa_version":"Preprint","status":"public","intvolume":"     10821","_id":"298","date_published":"2018-03-31T00:00:00Z","year":"2018","author":[{"first_name":"Joel F","id":"2A8DFA8C-F248-11E8-B48F-1D18A9856A87","full_name":"Alwen, Joel F","last_name":"Alwen"},{"full_name":"Blocki, Jeremiah","last_name":"Blocki","first_name":"Jeremiah"},{"orcid":"0000-0002-9139-1654","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","full_name":"Pietrzak, Krzysztof Z","first_name":"Krzysztof Z"}],"publication_status":"published","date_created":"2018-12-11T11:45:41Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","external_id":{"isi":["000517098700004"],"arxiv":["1705.05313"]},"conference":{"name":"Eurocrypt 2018: Advances in Cryptology","end_date":"2018-05-03","location":"Tel Aviv, Israel","start_date":"2018-04-29"},"page":"99 - 130","scopus_import":"1","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1705.05313"}],"abstract":[{"text":"Memory-hard functions (MHF) are functions whose evaluation cost is dominated by memory cost. MHFs are egalitarian, in the sense that evaluating them on dedicated hardware (like FPGAs or ASICs) is not much cheaper than on off-the-shelf hardware (like x86 CPUs). MHFs have interesting cryptographic applications, most notably to password hashing and securing blockchains.\r\n\r\nAlwen and Serbinenko [STOC’15] define the cumulative memory complexity (cmc) of a function as the sum (over all time-steps) of the amount of memory required to compute the function. They advocate that a good MHF must have high cmc. Unlike previous notions, cmc takes into account that dedicated hardware might exploit amortization and parallelism. Still, cmc has been critizised as insufficient, as it fails to capture possible time-memory trade-offs; as memory cost doesn’t scale linearly, functions with the same cmc could still have very different actual hardware cost.\r\n\r\nIn this work we address this problem, and introduce the notion of sustained-memory complexity, which requires that any algorithm evaluating the function must use a large amount of memory for many steps. We construct functions (in the parallel random oracle model) whose sustained-memory complexity is almost optimal: our function can be evaluated using n steps and   O(n/log(n))  memory, in each step making one query to the (fixed-input length) random oracle, while any algorithm that can make arbitrary many parallel queries to the random oracle, still needs   Ω(n/log(n))  memory for   Ω(n)  steps.\r\n\r\nAs has been done for various notions (including cmc) before, we reduce the task of constructing an MHFs with high sustained-memory complexity to proving pebbling lower bounds on DAGs. Our main technical contribution is the construction is a family of DAGs on n nodes with constant indegree with high “sustained-space complexity”, meaning that any parallel black-pebbling strategy requires   Ω(n/log(n))  pebbles for at least   Ω(n)  steps.\r\n\r\nAlong the way we construct a family of maximally “depth-robust” DAGs with maximum indegree   O(logn) , improving upon the construction of Mahmoody et al. [ITCS’13] which had maximum indegree   O(log2n⋅","lang":"eng"}],"publist_id":"7583","department":[{"_id":"KrPi"}],"month":"03","alternative_title":["LNCS"],"citation":{"apa":"Alwen, J. F., Blocki, J., &#38; Pietrzak, K. Z. (2018). Sustained space complexity (Vol. 10821, pp. 99–130). Presented at the Eurocrypt 2018: Advances in Cryptology, Tel Aviv, Israel: Springer. <a href=\"https://doi.org/10.1007/978-3-319-78375-8_4\">https://doi.org/10.1007/978-3-319-78375-8_4</a>","ieee":"J. F. Alwen, J. Blocki, and K. Z. Pietrzak, “Sustained space complexity,” presented at the Eurocrypt 2018: Advances in Cryptology, Tel Aviv, Israel, 2018, vol. 10821, pp. 99–130.","chicago":"Alwen, Joel F, Jeremiah Blocki, and Krzysztof Z Pietrzak. “Sustained Space Complexity,” 10821:99–130. Springer, 2018. <a href=\"https://doi.org/10.1007/978-3-319-78375-8_4\">https://doi.org/10.1007/978-3-319-78375-8_4</a>.","short":"J.F. Alwen, J. Blocki, K.Z. Pietrzak, in:, Springer, 2018, pp. 99–130.","ista":"Alwen JF, Blocki J, Pietrzak KZ. 2018. Sustained space complexity. Eurocrypt 2018: Advances in Cryptology, LNCS, vol. 10821, 99–130.","mla":"Alwen, Joel F., et al. <i>Sustained Space Complexity</i>. Vol. 10821, Springer, 2018, pp. 99–130, doi:<a href=\"https://doi.org/10.1007/978-3-319-78375-8_4\">10.1007/978-3-319-78375-8_4</a>.","ama":"Alwen JF, Blocki J, Pietrzak KZ. Sustained space complexity. In: Vol 10821. Springer; 2018:99-130. doi:<a href=\"https://doi.org/10.1007/978-3-319-78375-8_4\">10.1007/978-3-319-78375-8_4</a>"},"article_processing_charge":"No","project":[{"_id":"258AA5B2-B435-11E9-9278-68D0E5697425","grant_number":"682815","name":"Teaching Old Crypto New Tricks","call_identifier":"H2020"}]},{"article_processing_charge":"No","citation":{"chicago":"Nickovic, Dejan, Olivier Lebeltel, Oded Maler, Thomas Ferrere, and Dogan Ulus. “AMT 2.0: Qualitative and Quantitative Trace Analysis with Extended Signal Temporal Logic.” edited by Dirk Beyer and Marieke Huisman, 10806:303–19. Springer, 2018. <a href=\"https://doi.org/10.1007/978-3-319-89963-3_18\">https://doi.org/10.1007/978-3-319-89963-3_18</a>.","apa":"Nickovic, D., Lebeltel, O., Maler, O., Ferrere, T., &#38; Ulus, D. (2018). AMT 2.0: Qualitative and quantitative trace analysis with extended signal temporal logic. In D. Beyer &#38; M. Huisman (Eds.) (Vol. 10806, pp. 303–319). Presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, Thessaloniki, Greece: Springer. <a href=\"https://doi.org/10.1007/978-3-319-89963-3_18\">https://doi.org/10.1007/978-3-319-89963-3_18</a>","ieee":"D. Nickovic, O. Lebeltel, O. Maler, T. Ferrere, and D. Ulus, “AMT 2.0: Qualitative and quantitative trace analysis with extended signal temporal logic,” presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, Thessaloniki, Greece, 2018, vol. 10806, pp. 303–319.","ista":"Nickovic D, Lebeltel O, Maler O, Ferrere T, Ulus D. 2018. AMT 2.0: Qualitative and quantitative trace analysis with extended signal temporal logic. TACAS: Tools and Algorithms for the Construction and Analysis of Systems, LNCS, vol. 10806, 303–319.","mla":"Nickovic, Dejan, et al. <i>AMT 2.0: Qualitative and Quantitative Trace Analysis with Extended Signal Temporal Logic</i>. Edited by Dirk Beyer and Marieke Huisman, vol. 10806, Springer, 2018, pp. 303–19, doi:<a href=\"https://doi.org/10.1007/978-3-319-89963-3_18\">10.1007/978-3-319-89963-3_18</a>.","short":"D. Nickovic, O. Lebeltel, O. Maler, T. Ferrere, D. Ulus, in:, D. Beyer, M. Huisman (Eds.), Springer, 2018, pp. 303–319.","ama":"Nickovic D, Lebeltel O, Maler O, Ferrere T, Ulus D. AMT 2.0: Qualitative and quantitative trace analysis with extended signal temporal logic. In: Beyer D, Huisman M, eds. Vol 10806. Springer; 2018:303-319. doi:<a href=\"https://doi.org/10.1007/978-3-319-89963-3_18\">10.1007/978-3-319-89963-3_18</a>"},"alternative_title":["LNCS"],"month":"04","department":[{"_id":"ToHe"}],"abstract":[{"lang":"eng","text":"We introduce in this paper   AMT 2.0 , a tool for qualitative and quantitative analysis of hybrid continuous and Boolean signals that combine numerical values and discrete events. The evaluation of the signals is based on rich temporal specifications expressed in extended Signal Temporal Logic (xSTL), which integrates Timed Regular Expressions (TRE) within Signal Temporal Logic (STL). The tool features qualitative monitoring (property satisfaction checking), trace diagnostics for explaining and justifying property violations and specification-driven measurement of quantitative features of the signal."}],"editor":[{"first_name":"Dirk","full_name":"Beyer, Dirk","last_name":"Beyer"},{"first_name":"Marieke","last_name":"Huisman","full_name":"Huisman, Marieke"}],"publist_id":"7582","has_accepted_license":"1","scopus_import":"1","file":[{"content_type":"application/pdf","access_level":"open_access","checksum":"e11db3b9c8e27a1c7d1c738cc5e4d25a","date_updated":"2020-07-14T12:45:58Z","creator":"dernst","file_size":3267209,"file_name":"2018_LNCS_Nickovic.pdf","file_id":"5928","date_created":"2019-02-06T07:33:05Z","relation":"main_file"}],"conference":{"name":"TACAS: Tools and Algorithms for the Construction and Analysis of Systems","end_date":"2018-04-20","location":"Thessaloniki, Greece","start_date":"2018-04-14"},"external_id":{"isi":["00445822600018"]},"page":"303 - 319","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","date_created":"2018-12-11T11:45:41Z","author":[{"first_name":"Dejan","last_name":"Nickovic","id":"41BCEE5C-F248-11E8-B48F-1D18A9856A87","full_name":"Nickovic, Dejan"},{"last_name":"Lebeltel","full_name":"Lebeltel, Olivier","first_name":"Olivier"},{"last_name":"Maler","full_name":"Maler, Oded","first_name":"Oded"},{"orcid":"0000-0001-5199-3143","last_name":"Ferrere","id":"40960E6E-F248-11E8-B48F-1D18A9856A87","full_name":"Ferrere, Thomas","first_name":"Thomas"},{"last_name":"Ulus","full_name":"Ulus, Dogan","first_name":"Dogan"}],"publication_status":"published","date_published":"2018-04-14T00:00:00Z","file_date_updated":"2020-07-14T12:45:58Z","year":"2018","status":"public","ddc":["000"],"tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"intvolume":"     10806","_id":"299","date_updated":"2023-09-08T11:52:02Z","oa_version":"Published Version","volume":10806,"related_material":{"record":[{"id":"10861","relation":"later_version","status":"public"}]},"language":[{"iso":"eng"}],"oa":1,"type":"conference","day":"14","quality_controlled":"1","title":"AMT 2.0: Qualitative and quantitative trace analysis with extended signal temporal logic","publisher":"Springer","doi":"10.1007/978-3-319-89963-3_18","isi":1},{"title":"Haploinsufficiency of the intellectual disability gene SETD5 disturbs developmental gene expression and cognition","isi":1,"doi":"10.1038/s41593-018-0266-2","publisher":"Nature Publishing Group","publication":"Nature Neuroscience","language":[{"iso":"eng"}],"day":"19","type":"journal_article","oa":1,"quality_controlled":"1","date_updated":"2024-03-25T23:30:25Z","acknowledged_ssus":[{"_id":"M-Shop"},{"_id":"PreCl"}],"oa_version":"Submitted Version","volume":21,"related_material":{"record":[{"relation":"popular_science","id":"6074","status":"public"},{"relation":"dissertation_contains","id":"12364","status":"public"}],"link":[{"url":"https://ist.ac.at/en/news/mutation-that-causes-autism-and-intellectual-disability-makes-brain-less-flexible/","description":"News on IST Homepage","relation":"press_release"}]},"date_published":"2018-11-19T00:00:00Z","year":"2018","file_date_updated":"2020-07-14T12:45:58Z","ddc":["570"],"status":"public","intvolume":"        21","_id":"3","article_type":"original","author":[{"orcid":"0000-0002-7370-5293","first_name":"Elena","last_name":"Deliu","id":"37A40D7E-F248-11E8-B48F-1D18A9856A87","full_name":"Deliu, Elena"},{"first_name":"Niccoló","full_name":"Arecco, Niccoló","last_name":"Arecco"},{"last_name":"Morandell","id":"4739D480-F248-11E8-B48F-1D18A9856A87","full_name":"Morandell, Jasmin","first_name":"Jasmin"},{"orcid":"0000-0002-9033-9096","first_name":"Christoph","last_name":"Dotter","id":"4C66542E-F248-11E8-B48F-1D18A9856A87","full_name":"Dotter, Christoph"},{"first_name":"Ximena","full_name":"Contreras, Ximena","id":"475990FE-F248-11E8-B48F-1D18A9856A87","last_name":"Contreras"},{"first_name":"Charles","full_name":"Girardot, Charles","last_name":"Girardot"},{"first_name":"Eva","last_name":"Käsper","full_name":"Käsper, Eva"},{"last_name":"Kozlova","full_name":"Kozlova, Alena","id":"C50A9596-02D0-11E9-976E-E38CFE5CBC1D","first_name":"Alena"},{"id":"3065DFC4-F248-11E8-B48F-1D18A9856A87","full_name":"Kishi, Kasumi","last_name":"Kishi","first_name":"Kasumi"},{"first_name":"Ilaria","full_name":"Chiaradia, Ilaria","id":"B6467F20-02D0-11E9-BDA5-E960C241894A","last_name":"Chiaradia","orcid":"0000-0002-9529-4464"},{"last_name":"Noh","full_name":"Noh, Kyung","first_name":"Kyung"},{"full_name":"Novarino, Gaia","id":"3E57A680-F248-11E8-B48F-1D18A9856A87","last_name":"Novarino","first_name":"Gaia","orcid":"0000-0002-7673-7178"}],"publication_status":"published","external_id":{"isi":["000451324700010"]},"page":"1717 - 1727","date_created":"2018-12-11T11:44:05Z","issue":"12","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","pubrep_id":"1071","abstract":[{"lang":"eng","text":"SETD5 gene mutations have been identified as a frequent cause of idiopathic intellectual disability. Here we show that Setd5-haploinsufficient mice present developmental defects such as abnormal brain-to-body weight ratios and neural crest defect-associated phenotypes. Furthermore, Setd5-mutant mice show impairments in cognitive tasks, enhanced long-term potentiation, delayed ontogenetic profile of ultrasonic vocalization, and behavioral inflexibility. Behavioral issues are accompanied by abnormal expression of postsynaptic density proteins previously associated with cognition. Our data additionally indicate that Setd5 regulates RNA polymerase II dynamics and gene transcription via its interaction with the Hdac3 and Paf1 complexes, findings potentially explaining the gene expression defects observed in Setd5-haploinsufficient mice. Our results emphasize the decisive role of Setd5 in a biological pathway found to be disrupted in humans with intellectual disability and autism spectrum disorder."}],"publist_id":"8054","acknowledgement":"This work was supported by the Simons Foundation Autism Research Initiative (grant 401299) to G.N. and the DFG (SPP1738 grant NO 1249) to K.-M.N.","scopus_import":"1","file":[{"date_updated":"2020-07-14T12:45:58Z","file_size":8167169,"creator":"dernst","checksum":"60abd0f05b7cdc08a6b0ec460884084f","content_type":"application/pdf","access_level":"open_access","file_id":"6255","relation":"main_file","date_created":"2019-04-09T07:41:57Z","file_name":"2017_NatureNeuroscience_Deliu.pdf"}],"has_accepted_license":"1","article_processing_charge":"No","project":[{"grant_number":"401299","name":"Probing development and reversibility of autism spectrum disorders","_id":"254BA948-B435-11E9-9278-68D0E5697425"}],"department":[{"_id":"GaNo"},{"_id":"EdHa"}],"citation":{"chicago":"Deliu, Elena, Niccoló Arecco, Jasmin Morandell, Christoph Dotter, Ximena Contreras, Charles Girardot, Eva Käsper, et al. “Haploinsufficiency of the Intellectual Disability Gene SETD5 Disturbs Developmental Gene Expression and Cognition.” <i>Nature Neuroscience</i>. Nature Publishing Group, 2018. <a href=\"https://doi.org/10.1038/s41593-018-0266-2\">https://doi.org/10.1038/s41593-018-0266-2</a>.","apa":"Deliu, E., Arecco, N., Morandell, J., Dotter, C., Contreras, X., Girardot, C., … Novarino, G. (2018). Haploinsufficiency of the intellectual disability gene SETD5 disturbs developmental gene expression and cognition. <i>Nature Neuroscience</i>. Nature Publishing Group. <a href=\"https://doi.org/10.1038/s41593-018-0266-2\">https://doi.org/10.1038/s41593-018-0266-2</a>","ieee":"E. Deliu <i>et al.</i>, “Haploinsufficiency of the intellectual disability gene SETD5 disturbs developmental gene expression and cognition,” <i>Nature Neuroscience</i>, vol. 21, no. 12. Nature Publishing Group, pp. 1717–1727, 2018.","ista":"Deliu E, Arecco N, Morandell J, Dotter C, Contreras X, Girardot C, Käsper E, Kozlova A, Kishi K, Chiaradia I, Noh K, Novarino G. 2018. Haploinsufficiency of the intellectual disability gene SETD5 disturbs developmental gene expression and cognition. Nature Neuroscience. 21(12), 1717–1727.","ama":"Deliu E, Arecco N, Morandell J, et al. Haploinsufficiency of the intellectual disability gene SETD5 disturbs developmental gene expression and cognition. <i>Nature Neuroscience</i>. 2018;21(12):1717-1727. doi:<a href=\"https://doi.org/10.1038/s41593-018-0266-2\">10.1038/s41593-018-0266-2</a>","short":"E. Deliu, N. Arecco, J. Morandell, C. Dotter, X. Contreras, C. Girardot, E. Käsper, A. Kozlova, K. Kishi, I. Chiaradia, K. Noh, G. Novarino, Nature Neuroscience 21 (2018) 1717–1727.","mla":"Deliu, Elena, et al. “Haploinsufficiency of the Intellectual Disability Gene SETD5 Disturbs Developmental Gene Expression and Cognition.” <i>Nature Neuroscience</i>, vol. 21, no. 12, Nature Publishing Group, 2018, pp. 1717–27, doi:<a href=\"https://doi.org/10.1038/s41593-018-0266-2\">10.1038/s41593-018-0266-2</a>."},"month":"11"},{"publist_id":"7581","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2018/077"}],"abstract":[{"lang":"eng","text":"We introduce a formal quantitative notion of “bit security” for a general type of cryptographic games (capturing both decision and search problems), aimed at capturing the intuition that a cryptographic primitive with k-bit security is as hard to break as an ideal cryptographic function requiring a brute force attack on a k-bit key space. Our new definition matches the notion of bit security commonly used by cryptographers and cryptanalysts when studying search (e.g., key recovery) problems, where the use of the traditional definition is well established. However, it produces a quantitatively different metric in the case of decision (indistinguishability) problems, where the use of (a straightforward generalization of) the traditional definition is more problematic and leads to a number of paradoxical situations or mismatches between theoretical/provable security and practical/common sense intuition. Key to our new definition is to consider adversaries that may explicitly declare failure of the attack. We support and justify the new definition by proving a number of technical results, including tight reductions between several standard cryptographic problems, a new hybrid theorem that preserves bit security, and an application to the security analysis of indistinguishability primitives making use of (approximate) floating point numbers. This is the first result showing that (standard precision) 53-bit floating point numbers can be used to achieve 100-bit security in the context of cryptographic primitives with general indistinguishability-based security definitions. Previous results of this type applied only to search problems, or special types of decision problems."}],"acknowledgement":"Research supported in part by the Defense Advanced Research Projects Agency (DARPA) and the U.S. Army Research Office under the SafeWare program. Opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views, position or policy of the Government. The second author was also supported by the European Research Council, ERC consolidator grant (682815 - TOCNeT).","scopus_import":"1","article_processing_charge":"No","project":[{"name":"Teaching Old Crypto New Tricks","call_identifier":"H2020","grant_number":"682815","_id":"258AA5B2-B435-11E9-9278-68D0E5697425"}],"department":[{"_id":"KrPi"}],"citation":{"ista":"Micciancio D, Walter M. 2018. On the bit security of cryptographic primitives. Eurocrypt: Advances in Cryptology, LNCS, vol. 10820, 3–28.","ama":"Micciancio D, Walter M. On the bit security of cryptographic primitives. In: Vol 10820. Springer; 2018:3-28. doi:<a href=\"https://doi.org/10.1007/978-3-319-78381-9_1\">10.1007/978-3-319-78381-9_1</a>","short":"D. Micciancio, M. Walter, in:, Springer, 2018, pp. 3–28.","mla":"Micciancio, Daniele, and Michael Walter. <i>On the Bit Security of Cryptographic Primitives</i>. Vol. 10820, Springer, 2018, pp. 3–28, doi:<a href=\"https://doi.org/10.1007/978-3-319-78381-9_1\">10.1007/978-3-319-78381-9_1</a>.","apa":"Micciancio, D., &#38; Walter, M. (2018). On the bit security of cryptographic primitives (Vol. 10820, pp. 3–28). Presented at the Eurocrypt: Advances in Cryptology, Tel Aviv, Israel: Springer. <a href=\"https://doi.org/10.1007/978-3-319-78381-9_1\">https://doi.org/10.1007/978-3-319-78381-9_1</a>","ieee":"D. Micciancio and M. Walter, “On the bit security of cryptographic primitives,” presented at the Eurocrypt: Advances in Cryptology, Tel Aviv, Israel, 2018, vol. 10820, pp. 3–28.","chicago":"Micciancio, Daniele, and Michael Walter. “On the Bit Security of Cryptographic Primitives,” 10820:3–28. Springer, 2018. <a href=\"https://doi.org/10.1007/978-3-319-78381-9_1\">https://doi.org/10.1007/978-3-319-78381-9_1</a>."},"month":"03","alternative_title":["LNCS"],"publication_status":"published","author":[{"first_name":"Daniele","last_name":"Micciancio","full_name":"Micciancio, Daniele"},{"orcid":"0000-0003-3186-2482","last_name":"Walter","full_name":"Walter, Michael","id":"488F98B0-F248-11E8-B48F-1D18A9856A87","first_name":"Michael"}],"page":"3 - 28","external_id":{"isi":["000517097500001"]},"conference":{"end_date":"2018-05-03","name":"Eurocrypt: Advances in Cryptology","location":"Tel Aviv, Israel","start_date":"2018-04-29"},"date_created":"2018-12-11T11:45:42Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","volume":10820,"oa_version":"Submitted Version","ec_funded":1,"date_updated":"2023-09-13T09:12:04Z","year":"2018","date_published":"2018-03-31T00:00:00Z","_id":"300","intvolume":"     10820","status":"public","title":"On the bit security of cryptographic primitives","isi":1,"doi":"10.1007/978-3-319-78381-9_1","publisher":"Springer","day":"31","type":"conference","oa":1,"language":[{"iso":"eng"}],"quality_controlled":"1"},{"date_published":"2018-05-29T00:00:00Z","year":"2018","status":"public","_id":"302","intvolume":"     10821","date_updated":"2023-09-18T09:29:33Z","ec_funded":1,"oa_version":"Submitted Version","volume":10821,"language":[{"iso":"eng"}],"type":"conference","oa":1,"day":"29","quality_controlled":"1","title":"Simple proofs of sequential work","doi":"10.1007/978-3-319-78375-8_15","publisher":"Springer","isi":1,"project":[{"_id":"258AA5B2-B435-11E9-9278-68D0E5697425","grant_number":"682815","name":"Teaching Old Crypto New Tricks","call_identifier":"H2020"}],"article_processing_charge":"No","citation":{"chicago":"Cohen, Bram, and Krzysztof Z Pietrzak. “Simple Proofs of Sequential Work,” 10821:451–67. Springer, 2018. <a href=\"https://doi.org/10.1007/978-3-319-78375-8_15\">https://doi.org/10.1007/978-3-319-78375-8_15</a>.","apa":"Cohen, B., &#38; Pietrzak, K. Z. (2018). Simple proofs of sequential work (Vol. 10821, pp. 451–467). Presented at the Eurocrypt: Advances in Cryptology, Tel Aviv, Israel: Springer. <a href=\"https://doi.org/10.1007/978-3-319-78375-8_15\">https://doi.org/10.1007/978-3-319-78375-8_15</a>","ieee":"B. Cohen and K. Z. Pietrzak, “Simple proofs of sequential work,” presented at the Eurocrypt: Advances in Cryptology, Tel Aviv, Israel, 2018, vol. 10821, pp. 451–467.","short":"B. Cohen, K.Z. Pietrzak, in:, Springer, 2018, pp. 451–467.","mla":"Cohen, Bram, and Krzysztof Z. Pietrzak. <i>Simple Proofs of Sequential Work</i>. Vol. 10821, Springer, 2018, pp. 451–67, doi:<a href=\"https://doi.org/10.1007/978-3-319-78375-8_15\">10.1007/978-3-319-78375-8_15</a>.","ista":"Cohen B, Pietrzak KZ. 2018. Simple proofs of sequential work. Eurocrypt: Advances in Cryptology, LNCS, vol. 10821, 451–467.","ama":"Cohen B, Pietrzak KZ. Simple proofs of sequential work. In: Vol 10821. Springer; 2018:451-467. doi:<a href=\"https://doi.org/10.1007/978-3-319-78375-8_15\">10.1007/978-3-319-78375-8_15</a>"},"alternative_title":["LNCS"],"month":"05","department":[{"_id":"KrPi"}],"abstract":[{"text":"At ITCS 2013, Mahmoody, Moran and Vadhan [MMV13] introduce and construct publicly verifiable proofs of sequential work, which is a protocol for proving that one spent sequential computational work related to some statement. The original motivation for such proofs included non-interactive time-stamping and universally verifiable CPU benchmarks. A more recent application, and our main motivation, are blockchain designs, where proofs of sequential work can be used – in combination with proofs of space – as a more ecological and economical substitute for proofs of work which are currently used to secure Bitcoin and other cryptocurrencies. The construction proposed by [MMV13] is based on a hash function and can be proven secure in the random oracle model, or assuming inherently sequential hash-functions, which is a new standard model assumption introduced in their work. In a proof of sequential work, a prover gets a “statement” χ, a time parameter N and access to a hash-function H, which for the security proof is modelled as a random oracle. Correctness requires that an honest prover can make a verifier accept making only N queries to H, while soundness requires that any prover who makes the verifier accept must have made (almost) N sequential queries to H. Thus a solution constitutes a proof that N time passed since χ was received. Solutions must be publicly verifiable in time at most polylogarithmic in N. The construction of [MMV13] is based on “depth-robust” graphs, and as a consequence has rather poor concrete parameters. But the major drawback is that the prover needs not just N time, but also N space to compute a proof. In this work we propose a proof of sequential work which is much simpler, more efficient and achieves much better concrete bounds. Most importantly, the space required can be as small as log (N) (but we get better soundness using slightly more memory than that). An open problem stated by [MMV13] that our construction does not solve either is achieving a “unique” proof, where even a cheating prover can only generate a single accepting proof. This property would be extremely useful for applications to blockchains.","lang":"eng"}],"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2018/183.pdf"}],"publist_id":"7579","scopus_import":"1","conference":{"end_date":"2018-05-03","name":"Eurocrypt: Advances in Cryptology","start_date":"2018-04-29","location":"Tel Aviv, Israel"},"external_id":{"isi":["000517098700015"]},"page":"451 - 467","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","date_created":"2018-12-11T11:45:42Z","author":[{"full_name":"Cohen, Bram","last_name":"Cohen","first_name":"Bram"},{"first_name":"Krzysztof Z","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","full_name":"Pietrzak, Krzysztof Z","orcid":"0000-0002-9139-1654"}],"publication_status":"published"},{"article_processing_charge":"No","department":[{"_id":"TaHa"}],"citation":{"chicago":"Kalinin, Nikita, and Mikhail Shkolnikov. “Introduction to Tropical Series and Wave Dynamic on Them.” <i>Discrete and Continuous Dynamical Systems- Series A</i>. AIMS, 2018. <a href=\"https://doi.org/10.3934/dcds.2018120\">https://doi.org/10.3934/dcds.2018120</a>.","apa":"Kalinin, N., &#38; Shkolnikov, M. (2018). Introduction to tropical series and wave dynamic on them. <i>Discrete and Continuous Dynamical Systems- Series A</i>. AIMS. <a href=\"https://doi.org/10.3934/dcds.2018120\">https://doi.org/10.3934/dcds.2018120</a>","ieee":"N. Kalinin and M. Shkolnikov, “Introduction to tropical series and wave dynamic on them,” <i>Discrete and Continuous Dynamical Systems- Series A</i>, vol. 38, no. 6. AIMS, pp. 2827–2849, 2018.","short":"N. Kalinin, M. Shkolnikov, Discrete and Continuous Dynamical Systems- Series A 38 (2018) 2827–2849.","mla":"Kalinin, Nikita, and Mikhail Shkolnikov. “Introduction to Tropical Series and Wave Dynamic on Them.” <i>Discrete and Continuous Dynamical Systems- Series A</i>, vol. 38, no. 6, AIMS, 2018, pp. 2827–49, doi:<a href=\"https://doi.org/10.3934/dcds.2018120\">10.3934/dcds.2018120</a>.","ama":"Kalinin N, Shkolnikov M. Introduction to tropical series and wave dynamic on them. <i>Discrete and Continuous Dynamical Systems- Series A</i>. 2018;38(6):2827-2849. doi:<a href=\"https://doi.org/10.3934/dcds.2018120\">10.3934/dcds.2018120</a>","ista":"Kalinin N, Shkolnikov M. 2018. Introduction to tropical series and wave dynamic on them. Discrete and Continuous Dynamical Systems- Series A. 38(6), 2827–2849."},"month":"06","publist_id":"7576","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1706.03062"}],"abstract":[{"text":"The theory of tropical series, that we develop here, firstly appeared in the study of the growth of pluriharmonic functions. Motivated by waves in sandpile models we introduce a dynamic on the set of tropical series, and it is experimentally observed that this dynamic obeys a power law. So, this paper serves as a compilation of results we need for other articles and also introduces several objects interesting by themselves.","lang":"eng"}],"acknowledgement":"The first author, Nikita Kalinin, is funded by SNCF PostDoc.Mobility grant 168647. Support from the Basic Research Program of the National Research University Higher School of Economics is gratefully acknowledged. The second author, Mikhail Shkolnikov, is supported in part by the grant 159240 of the Swiss National Science Foundation as well as by the National Center of Competence in Research SwissMAP of the Swiss National Science Foundation.","scopus_import":"1","page":"2827 - 2849","external_id":{"arxiv":["1706.03062"],"isi":["000438818400007"]},"date_created":"2018-12-11T11:45:43Z","issue":"6","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","publication_status":"published","author":[{"first_name":"Nikita","full_name":"Kalinin, Nikita","last_name":"Kalinin"},{"orcid":"0000-0002-4310-178X","id":"35084A62-F248-11E8-B48F-1D18A9856A87","full_name":"Shkolnikov, Mikhail","last_name":"Shkolnikov","first_name":"Mikhail"}],"year":"2018","date_published":"2018-06-01T00:00:00Z","_id":"303","intvolume":"        38","status":"public","volume":38,"oa_version":"Submitted Version","date_updated":"2023-09-12T07:45:37Z","day":"01","type":"journal_article","oa":1,"language":[{"iso":"eng"}],"quality_controlled":"1","arxiv":1,"title":"Introduction to tropical series and wave dynamic on them","publication":"Discrete and Continuous Dynamical Systems- Series A","isi":1,"doi":"10.3934/dcds.2018120","publisher":"AIMS"},{"external_id":{"isi":["000448185000120"]},"issue":"4","date_created":"2018-12-11T11:45:43Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","publication_status":"published","author":[{"orcid":"0000-0002-1546-3265","first_name":"Thomas","last_name":"Auzinger","id":"4718F954-F248-11E8-B48F-1D18A9856A87","full_name":"Auzinger, Thomas"},{"last_name":"Heidrich","full_name":"Heidrich, Wolfgang","first_name":"Wolfgang"},{"orcid":"0000-0001-6511-9385","last_name":"Bickel","id":"49876194-F248-11E8-B48F-1D18A9856A87","full_name":"Bickel, Bernd","first_name":"Bernd"}],"article_number":"159","article_processing_charge":"No","project":[{"_id":"24F9549A-B435-11E9-9278-68D0E5697425","name":"MATERIALIZABLE: Intelligent fabrication-oriented Computational Design and Modeling","call_identifier":"H2020","grant_number":"715767"}],"department":[{"_id":"BeBi"}],"alternative_title":["ACM Transactions on Graphics"],"citation":{"ieee":"T. Auzinger, W. Heidrich, and B. Bickel, “Computational design of nanostructural color for additive manufacturing,” <i>ACM Transactions on Graphics</i>, vol. 37, no. 4. ACM, 2018.","apa":"Auzinger, T., Heidrich, W., &#38; Bickel, B. (2018). Computational design of nanostructural color for additive manufacturing. <i>ACM Transactions on Graphics</i>. ACM. <a href=\"https://doi.org/10.1145/3197517.3201376\">https://doi.org/10.1145/3197517.3201376</a>","chicago":"Auzinger, Thomas, Wolfgang Heidrich, and Bernd Bickel. “Computational Design of Nanostructural Color for Additive Manufacturing.” <i>ACM Transactions on Graphics</i>. ACM, 2018. <a href=\"https://doi.org/10.1145/3197517.3201376\">https://doi.org/10.1145/3197517.3201376</a>.","ama":"Auzinger T, Heidrich W, Bickel B. Computational design of nanostructural color for additive manufacturing. <i>ACM Transactions on Graphics</i>. 2018;37(4). doi:<a href=\"https://doi.org/10.1145/3197517.3201376\">10.1145/3197517.3201376</a>","ista":"Auzinger T, Heidrich W, Bickel B. 2018. Computational design of nanostructural color for additive manufacturing. ACM Transactions on Graphics. 37(4), 159.","mla":"Auzinger, Thomas, et al. “Computational Design of Nanostructural Color for Additive Manufacturing.” <i>ACM Transactions on Graphics</i>, vol. 37, no. 4, 159, ACM, 2018, doi:<a href=\"https://doi.org/10.1145/3197517.3201376\">10.1145/3197517.3201376</a>.","short":"T. Auzinger, W. Heidrich, B. Bickel, ACM Transactions on Graphics 37 (2018)."},"month":"08","pubrep_id":"1028","abstract":[{"lang":"eng","text":"Additive manufacturing has recently seen drastic improvements in resolution, making it now possible to fabricate features at scales of hundreds or even dozens of nanometers, which previously required very expensive lithographic methods.\r\nAs a result, additive manufacturing now seems poised for optical applications, including those relevant to computer graphics, such as material design, as well as display and imaging applications.\r\n \r\nIn this work, we explore the use of additive manufacturing for generating structural colors, where the structures are designed using a fabrication-aware optimization process.\r\nThis requires a combination of full-wave simulation, a feasible parameterization of the design space, and a tailored optimization procedure.\r\nMany of these components should be re-usable for the design of other optical structures at this scale.\r\n \r\nWe show initial results of material samples fabricated based on our designs.\r\nWhile these suffer from the prototype character of state-of-the-art fabrication hardware, we believe they clearly demonstrate the potential of additive nanofabrication for structural colors and other graphics applications."}],"scopus_import":"1","acknowledgement":"This work was in part supported by King Abdullah University of Science and Technology Baseline Funding.","file":[{"checksum":"dcdcc955a4c1c6d2599aeebb97d2e7b9","creator":"system","file_size":10751684,"date_updated":"2020-07-14T12:45:59Z","content_type":"application/pdf","access_level":"open_access","file_name":"IST-2018-1024-v1+1_NanoStructColor-Auzinger-paper.pdf","relation":"main_file","date_created":"2018-12-12T10:18:14Z","file_id":"5334"},{"relation":"main_file","date_created":"2018-12-12T10:18:15Z","file_id":"5335","file_name":"IST-2018-1024-v1+2_NanoStructColor-Auzinger-supplemental.pdf","access_level":"open_access","content_type":"application/pdf","creator":"system","file_size":20755095,"date_updated":"2020-07-14T12:45:59Z","checksum":"cae52b3a8d5e97be84771cd61ea2f75e"},{"file_name":"IST-2018-1024-v1+3_NanoStructColor-Auzinger-image.jpg","date_created":"2018-12-12T10:18:16Z","relation":"main_file","file_id":"5336","access_level":"open_access","content_type":"image/jpeg","checksum":"76dd90648f75779d3f64e324b6daaffe","file_size":2186944,"creator":"system","date_updated":"2020-07-14T12:45:59Z"},{"file_name":"IST-2018-1024-v1+4_NanoStructColor-Auzinger-blueprint.7z","date_created":"2018-12-12T10:18:17Z","relation":"main_file","file_id":"5337","checksum":"c3a5b775a0ecdb20ccefb8d9646ec140","creator":"system","file_size":2734352,"date_updated":"2020-07-14T12:45:59Z","access_level":"open_access","content_type":"application/x-7z-compressed"},{"file_name":"IST-2018-1024-v2+1_NanoStructColor-Auzinger-paper.pdf","relation":"main_file","date_created":"2018-12-12T10:18:18Z","file_id":"5338","checksum":"dcdcc955a4c1c6d2599aeebb97d2e7b9","file_size":10751684,"creator":"system","date_updated":"2020-07-14T12:45:59Z","access_level":"open_access","content_type":"application/pdf"},{"access_level":"open_access","content_type":"image/jpeg","checksum":"76dd90648f75779d3f64e324b6daaffe","date_updated":"2020-07-14T12:45:59Z","creator":"system","file_size":2186944,"file_name":"IST-2018-1024-v2+3_NanoStructColor-Auzinger-image.jpg","file_id":"5339","relation":"main_file","date_created":"2018-12-12T10:18:19Z"},{"file_id":"5340","relation":"main_file","date_created":"2018-12-12T10:18:20Z","file_name":"IST-2018-1024-v2+4_NanoStructColor-Auzinger-blueprint.7z","date_updated":"2020-07-14T12:45:59Z","creator":"system","file_size":2734352,"checksum":"c3a5b775a0ecdb20ccefb8d9646ec140","content_type":"application/x-7z-compressed","access_level":"open_access"},{"content_type":"application/pdf","access_level":"open_access","checksum":"667e91b686db41e44d855a4fb2137402","file_size":20755762,"creator":"system","date_updated":"2020-07-14T12:45:59Z","file_name":"IST-2018-1024-v2+5_NanoStructColor-Auzinger-supplemental.pdf","relation":"main_file","date_created":"2018-12-12T10:18:21Z","file_id":"5341"},{"file_name":"IST-2018-1024-v3+1_NanoStructColor-Auzinger-paper.pdf","file_id":"5342","date_created":"2018-12-12T10:18:22Z","relation":"main_file","content_type":"application/pdf","access_level":"open_access","checksum":"dcdcc955a4c1c6d2599aeebb97d2e7b9","date_updated":"2020-07-14T12:45:59Z","creator":"system","file_size":10751684},{"access_level":"open_access","content_type":"image/jpeg","date_updated":"2020-07-14T12:45:59Z","file_size":2186944,"creator":"system","checksum":"76dd90648f75779d3f64e324b6daaffe","file_id":"5343","date_created":"2018-12-12T10:18:22Z","relation":"main_file","file_name":"IST-2018-1024-v3+3_NanoStructColor-Auzinger-image.jpg"},{"access_level":"open_access","content_type":"application/x-7z-compressed","file_size":2734352,"creator":"system","date_updated":"2020-07-14T12:45:59Z","checksum":"c3a5b775a0ecdb20ccefb8d9646ec140","relation":"main_file","date_created":"2018-12-12T10:18:23Z","file_id":"5344","file_name":"IST-2018-1024-v3+4_NanoStructColor-Auzinger-blueprint.7z"},{"relation":"main_file","date_created":"2018-12-12T10:18:24Z","file_id":"5345","file_name":"IST-2018-1024-v3+5_NanoStructColor-Auzinger-supplemental.pdf","file_size":20755762,"creator":"system","date_updated":"2020-07-14T12:45:59Z","checksum":"667e91b686db41e44d855a4fb2137402","access_level":"open_access","content_type":"application/pdf"},{"relation":"main_file","date_created":"2018-12-12T10:18:25Z","file_id":"5346","file_name":"IST-2018-1024-v3+6_NanoStructColor-Auzinger-presentation.pptx","content_type":"application/vnd.openxmlformats-officedocument.presentationml.presentation","access_level":"open_access","creator":"system","file_size":69698068,"date_updated":"2020-07-14T12:45:59Z","checksum":"72dce35388fb1aa7953df4d9ae3d02f1"}],"has_accepted_license":"1","day":"01","oa":1,"type":"journal_article","language":[{"iso":"eng"}],"quality_controlled":"1","title":"Computational design of nanostructural color for additive manufacturing","publication":"ACM Transactions on Graphics","isi":1,"doi":"10.1145/3197517.3201376","publisher":"ACM","year":"2018","file_date_updated":"2020-07-14T12:45:59Z","date_published":"2018-08-01T00:00:00Z","_id":"304","intvolume":"        37","ddc":["000","535","680"],"status":"public","volume":37,"oa_version":"Submitted Version","date_updated":"2023-09-11T12:46:13Z","ec_funded":1,"related_material":{"link":[{"description":"News on IST Homepage","url":"https://ist.ac.at/en/news/color-effects-from-transparent-3d-printed-nanostructures/","relation":"press_release"}]}},{"oa_version":"None","volume":1771,"ec_funded":1,"date_updated":"2021-01-12T07:40:42Z","year":"2018","date_published":"2018-01-01T00:00:00Z","_id":"305","intvolume":"      1771","status":"public","title":"Fabrication and operation of microfluidic hanging drop networks","publication":"Methods in Molecular Biology","publisher":"Springer","doi":"10.1007/978-1-4939-7792-5_15","day":"01","type":"journal_article","language":[{"iso":"eng"}],"quality_controlled":"1","publist_id":"7574","abstract":[{"text":"The hanging-drop network (HDN) is a technology platform based on a completely open microfluidic network at the bottom of an inverted, surface-patterned substrate. The platform is predominantly used for the formation, culturing, and interaction of self-assembled spherical microtissues (spheroids) under precisely controlled flow conditions. Here, we describe design, fabrication, and operation of microfluidic hanging-drop networks.","lang":"eng"}],"scopus_import":1,"acknowledgement":"This work was financially supported by FP7 of the EU through the project “Body on a chip,” ICT-FET-296257, and the ERC Advanced Grant “NeuroCMOS” (contract 267351), as well as by an individual Ambizione Grant 142440 from the Swiss National Science Foundation for Olivier Frey. The research leading to these results also received funding from the People Programme (Marie Curie Actions) of the European Union’s Seventh Framework Programme (FP7/2007-2013) under REA grant agreement no. [291734]. We would like to thank Alexander Stettler, ETH Zurich for his expertise and support in the cleanroom, and we acknowledge the Single Cell Unit of D-BSSE, ETH Zurich for assistance in microscopy issues. M.L. is grateful to the members of the Guet and Tkačik groups, IST Austria, for valuable comments and support.","project":[{"_id":"25681D80-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme","grant_number":"291734"}],"department":[{"_id":"CaGu"},{"_id":"GaTk"}],"alternative_title":["MIMB"],"month":"01","citation":{"chicago":"Misun, Patrick, Axel Birchler, Moritz Lang, Andreas Hierlemann, and Olivier Frey. “Fabrication and Operation of Microfluidic Hanging Drop Networks.” <i>Methods in Molecular Biology</i>. Springer, 2018. <a href=\"https://doi.org/10.1007/978-1-4939-7792-5_15\">https://doi.org/10.1007/978-1-4939-7792-5_15</a>.","ieee":"P. Misun, A. Birchler, M. Lang, A. Hierlemann, and O. Frey, “Fabrication and operation of microfluidic hanging drop networks,” <i>Methods in Molecular Biology</i>, vol. 1771. Springer, pp. 183–202, 2018.","apa":"Misun, P., Birchler, A., Lang, M., Hierlemann, A., &#38; Frey, O. (2018). Fabrication and operation of microfluidic hanging drop networks. <i>Methods in Molecular Biology</i>. Springer. <a href=\"https://doi.org/10.1007/978-1-4939-7792-5_15\">https://doi.org/10.1007/978-1-4939-7792-5_15</a>","ama":"Misun P, Birchler A, Lang M, Hierlemann A, Frey O. Fabrication and operation of microfluidic hanging drop networks. <i>Methods in Molecular Biology</i>. 2018;1771:183-202. doi:<a href=\"https://doi.org/10.1007/978-1-4939-7792-5_15\">10.1007/978-1-4939-7792-5_15</a>","ista":"Misun P, Birchler A, Lang M, Hierlemann A, Frey O. 2018. Fabrication and operation of microfluidic hanging drop networks. Methods in Molecular Biology. 1771, 183–202.","mla":"Misun, Patrick, et al. “Fabrication and Operation of Microfluidic Hanging Drop Networks.” <i>Methods in Molecular Biology</i>, vol. 1771, Springer, 2018, pp. 183–202, doi:<a href=\"https://doi.org/10.1007/978-1-4939-7792-5_15\">10.1007/978-1-4939-7792-5_15</a>.","short":"P. Misun, A. Birchler, M. Lang, A. Hierlemann, O. Frey, Methods in Molecular Biology 1771 (2018) 183–202."},"publication_status":"published","author":[{"first_name":"Patrick","full_name":"Misun, Patrick","last_name":"Misun"},{"first_name":"Axel","full_name":"Birchler, Axel","last_name":"Birchler"},{"first_name":"Moritz","id":"29E0800A-F248-11E8-B48F-1D18A9856A87","full_name":"Lang, Moritz","last_name":"Lang"},{"full_name":"Hierlemann, Andreas","last_name":"Hierlemann","first_name":"Andreas"},{"first_name":"Olivier","full_name":"Frey, Olivier","last_name":"Frey"}],"page":"183 - 202","date_created":"2018-12-11T11:45:43Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87"},{"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_created":"2018-12-11T11:45:44Z","issue":"4","publication_status":"published","author":[{"full_name":"De Martino, Andrea","last_name":"De Martino","first_name":"Andrea"},{"first_name":"Daniele","last_name":"De Martino","full_name":"De Martino, Daniele","id":"3FF5848A-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-5214-4706"}],"citation":{"chicago":"De Martino, Andrea, and Daniele De Martino. “An Introduction to the Maximum Entropy Approach and Its Application to Inference Problems in Biology.” <i>Heliyon</i>. Elsevier, 2018. <a href=\"https://doi.org/10.1016/j.heliyon.2018.e00596\">https://doi.org/10.1016/j.heliyon.2018.e00596</a>.","apa":"De Martino, A., &#38; De Martino, D. (2018). An introduction to the maximum entropy approach and its application to inference problems in biology. <i>Heliyon</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.heliyon.2018.e00596\">https://doi.org/10.1016/j.heliyon.2018.e00596</a>","ieee":"A. De Martino and D. De Martino, “An introduction to the maximum entropy approach and its application to inference problems in biology,” <i>Heliyon</i>, vol. 4, no. 4. Elsevier, 2018.","ista":"De Martino A, De Martino D. 2018. An introduction to the maximum entropy approach and its application to inference problems in biology. Heliyon. 4(4), e00596.","short":"A. De Martino, D. De Martino, Heliyon 4 (2018).","ama":"De Martino A, De Martino D. An introduction to the maximum entropy approach and its application to inference problems in biology. <i>Heliyon</i>. 2018;4(4). doi:<a href=\"https://doi.org/10.1016/j.heliyon.2018.e00596\">10.1016/j.heliyon.2018.e00596</a>","mla":"De Martino, Andrea, and Daniele De Martino. “An Introduction to the Maximum Entropy Approach and Its Application to Inference Problems in Biology.” <i>Heliyon</i>, vol. 4, no. 4, e00596, Elsevier, 2018, doi:<a href=\"https://doi.org/10.1016/j.heliyon.2018.e00596\">10.1016/j.heliyon.2018.e00596</a>."},"month":"04","department":[{"_id":"GaTk"}],"article_number":"e00596","project":[{"_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734","name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7"}],"has_accepted_license":"1","file":[{"file_id":"5929","date_created":"2019-02-06T07:36:24Z","relation":"main_file","file_name":"2018_Heliyon_DeMartino.pdf","access_level":"open_access","content_type":"application/pdf","date_updated":"2020-07-14T12:45:59Z","file_size":994490,"creator":"dernst","checksum":"67010cf5e3b3e0637c659371714a715a"}],"scopus_import":1,"abstract":[{"text":"A cornerstone of statistical inference, the maximum entropy framework is being increasingly applied to construct descriptive and predictive models of biological systems, especially complex biological networks, from large experimental data sets. Both its broad applicability and the success it obtained in different contexts hinge upon its conceptual simplicity and mathematical soundness. Here we try to concisely review the basic elements of the maximum entropy principle, starting from the notion of ‘entropy’, and describe its usefulness for the analysis of biological systems. As examples, we focus specifically on the problem of reconstructing gene interaction networks from expression data and on recent work attempting to expand our system-level understanding of bacterial metabolism. Finally, we highlight some extensions and potential limitations of the maximum entropy approach, and point to more recent developments that are likely to play a key role in the upcoming challenges of extracting structures and information from increasingly rich, high-throughput biological data.","lang":"eng"}],"quality_controlled":"1","type":"journal_article","oa":1,"day":"01","language":[{"iso":"eng"}],"publication":"Heliyon","publisher":"Elsevier","doi":"10.1016/j.heliyon.2018.e00596","title":"An introduction to the maximum entropy approach and its application to inference problems in biology","_id":"306","intvolume":"         4","status":"public","tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)"},"ddc":["530"],"file_date_updated":"2020-07-14T12:45:59Z","year":"2018","date_published":"2018-04-01T00:00:00Z","oa_version":"Published Version","volume":4,"ec_funded":1,"date_updated":"2021-01-12T07:40:46Z"},{"abstract":[{"lang":"eng","text":"Spontaneous emission spectra of two initially excited closely spaced identical atoms are very sensitive to the strength and the direction of the applied magnetic field. We consider the relevant schemes that ensure the determination of the mutual spatial orientation of the atoms and the distance between them by entirely optical means. A corresponding theoretical description is given accounting for the dipole-dipole interaction between the two atoms in the presence of a magnetic field and for polarizations of the quantum field interacting with magnetic sublevels of the two-atom system. "}],"main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1712.10127"}],"publist_id":"7572","scopus_import":"1","acknowledgement":"The work was partially supported by Russian Foundation for Basic Research (Grant No. 15-02-05657a) and by the Basic research program of Higher School of Economics (HSE).","article_processing_charge":"No","article_number":" 043812 ","citation":{"chicago":"Redchenko, Elena, Alexander Makarov, and Vladimir Yudson. “Nanoscopy of Pairs of Atoms by Fluorescence in a Magnetic Field.” <i> Physical Review A - Atomic, Molecular, and Optical Physics</i>. American Physical Society, 2018. <a href=\"https://doi.org/10.1103/PhysRevA.97.043812\">https://doi.org/10.1103/PhysRevA.97.043812</a>.","apa":"Redchenko, E., Makarov, A., &#38; Yudson, V. (2018). Nanoscopy of pairs of atoms by fluorescence in a magnetic field. <i> Physical Review A - Atomic, Molecular, and Optical Physics</i>. American Physical Society. <a href=\"https://doi.org/10.1103/PhysRevA.97.043812\">https://doi.org/10.1103/PhysRevA.97.043812</a>","ieee":"E. Redchenko, A. Makarov, and V. Yudson, “Nanoscopy of pairs of atoms by fluorescence in a magnetic field,” <i> Physical Review A - Atomic, Molecular, and Optical Physics</i>, vol. 97, no. 4. American Physical Society, 2018.","ama":"Redchenko E, Makarov A, Yudson V. Nanoscopy of pairs of atoms by fluorescence in a magnetic field. <i> Physical Review A - Atomic, Molecular, and Optical Physics</i>. 2018;97(4). doi:<a href=\"https://doi.org/10.1103/PhysRevA.97.043812\">10.1103/PhysRevA.97.043812</a>","ista":"Redchenko E, Makarov A, Yudson V. 2018. Nanoscopy of pairs of atoms by fluorescence in a magnetic field.  Physical Review A - Atomic, Molecular, and Optical Physics. 97(4), 043812.","short":"E. Redchenko, A. Makarov, V. Yudson,  Physical Review A - Atomic, Molecular, and Optical Physics 97 (2018).","mla":"Redchenko, Elena, et al. “Nanoscopy of Pairs of Atoms by Fluorescence in a Magnetic Field.” <i> Physical Review A - Atomic, Molecular, and Optical Physics</i>, vol. 97, no. 4, 043812, American Physical Society, 2018, doi:<a href=\"https://doi.org/10.1103/PhysRevA.97.043812\">10.1103/PhysRevA.97.043812</a>."},"month":"04","department":[{"_id":"JoFi"}],"article_type":"original","author":[{"first_name":"Elena","last_name":"Redchenko","full_name":"Redchenko, Elena","id":"2C21D6E8-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Makarov","full_name":"Makarov, Alexander","first_name":"Alexander"},{"full_name":"Yudson, Vladimir","last_name":"Yudson","first_name":"Vladimir"}],"publication_status":"published","external_id":{"isi":["000429454000015"],"arxiv":["1712.10127"]},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","date_created":"2018-12-11T11:45:44Z","issue":"4","date_updated":"2023-09-13T09:00:41Z","volume":97,"oa_version":"Submitted Version","date_published":"2018-04-09T00:00:00Z","year":"2018","status":"public","_id":"307","intvolume":"        97","title":"Nanoscopy of pairs of atoms by fluorescence in a magnetic field","arxiv":1,"publisher":"American Physical Society","doi":"10.1103/PhysRevA.97.043812","isi":1,"publication":" Physical Review A - Atomic, Molecular, and Optical Physics","language":[{"iso":"eng"}],"oa":1,"type":"journal_article","day":"09","quality_controlled":"1"},{"page":"331 - 346","external_id":{"pmid":["29738712"],"isi":["000432461400009"]},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","issue":"3","date_created":"2018-12-11T11:45:44Z","article_type":"original","publication_status":"published","author":[{"orcid":"0000-0001-7190-0776","first_name":"Aparna","last_name":"Ratheesh","full_name":"Ratheesh, Aparna","id":"2F064CFE-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Biebl","id":"3CCBB46E-F248-11E8-B48F-1D18A9856A87","full_name":"Biebl, Julia","first_name":"Julia"},{"full_name":"Smutny, Michael","last_name":"Smutny","first_name":"Michael"},{"first_name":"Jana","last_name":"Veselá","id":"433253EE-F248-11E8-B48F-1D18A9856A87","full_name":"Veselá, Jana"},{"id":"41DB591E-F248-11E8-B48F-1D18A9856A87","full_name":"Papusheva, Ekaterina","last_name":"Papusheva","first_name":"Ekaterina"},{"first_name":"Gabriel","id":"2B819732-F248-11E8-B48F-1D18A9856A87","full_name":"Krens, Gabriel","last_name":"Krens","orcid":"0000-0003-4761-5996"},{"first_name":"Walter","last_name":"Kaufmann","full_name":"Kaufmann, Walter","id":"3F99E422-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-9735-5315"},{"full_name":"György, Attila","id":"3BCEDBE0-F248-11E8-B48F-1D18A9856A87","last_name":"György","first_name":"Attila","orcid":"0000-0002-1819-198X"},{"orcid":"0000-0002-6009-6804","first_name":"Alessandra M","last_name":"Casano","id":"3DBA3F4E-F248-11E8-B48F-1D18A9856A87","full_name":"Casano, Alessandra M"},{"orcid":"0000-0001-8323-8353","first_name":"Daria E","full_name":"Siekhaus, Daria E","id":"3D224B9E-F248-11E8-B48F-1D18A9856A87","last_name":"Siekhaus"}],"project":[{"grant_number":"P29638","call_identifier":"FWF","name":"Drosophila TNFa´s Funktion in Immunzellen","_id":"253B6E48-B435-11E9-9278-68D0E5697425"},{"_id":"2536F660-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","name":"Investigating the role of transporters in invasive migration through junctions","grant_number":"334077"}],"article_processing_charge":"No","month":"05","citation":{"chicago":"Ratheesh, Aparna, Julia Bicher, Michael Smutny, Jana Veselá, Ekaterina Papusheva, Gabriel Krens, Walter Kaufmann, Attila György, Alessandra M Casano, and Daria E Siekhaus. “Drosophila TNF Modulates Tissue Tension in the Embryo to Facilitate Macrophage Invasive Migration.” <i>Developmental Cell</i>. Elsevier, 2018. <a href=\"https://doi.org/10.1016/j.devcel.2018.04.002\">https://doi.org/10.1016/j.devcel.2018.04.002</a>.","ieee":"A. Ratheesh <i>et al.</i>, “Drosophila TNF modulates tissue tension in the embryo to facilitate macrophage invasive migration,” <i>Developmental Cell</i>, vol. 45, no. 3. Elsevier, pp. 331–346, 2018.","apa":"Ratheesh, A., Bicher, J., Smutny, M., Veselá, J., Papusheva, E., Krens, G., … Siekhaus, D. E. (2018). Drosophila TNF modulates tissue tension in the embryo to facilitate macrophage invasive migration. <i>Developmental Cell</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.devcel.2018.04.002\">https://doi.org/10.1016/j.devcel.2018.04.002</a>","mla":"Ratheesh, Aparna, et al. “Drosophila TNF Modulates Tissue Tension in the Embryo to Facilitate Macrophage Invasive Migration.” <i>Developmental Cell</i>, vol. 45, no. 3, Elsevier, 2018, pp. 331–46, doi:<a href=\"https://doi.org/10.1016/j.devcel.2018.04.002\">10.1016/j.devcel.2018.04.002</a>.","short":"A. Ratheesh, J. Bicher, M. Smutny, J. Veselá, E. Papusheva, G. Krens, W. Kaufmann, A. György, A.M. Casano, D.E. Siekhaus, Developmental Cell 45 (2018) 331–346.","ama":"Ratheesh A, Bicher J, Smutny M, et al. Drosophila TNF modulates tissue tension in the embryo to facilitate macrophage invasive migration. <i>Developmental Cell</i>. 2018;45(3):331-346. doi:<a href=\"https://doi.org/10.1016/j.devcel.2018.04.002\">10.1016/j.devcel.2018.04.002</a>","ista":"Ratheesh A, Bicher J, Smutny M, Veselá J, Papusheva E, Krens G, Kaufmann W, György A, Casano AM, Siekhaus DE. 2018. Drosophila TNF modulates tissue tension in the embryo to facilitate macrophage invasive migration. Developmental Cell. 45(3), 331–346."},"department":[{"_id":"DaSi"},{"_id":"CaHe"},{"_id":"Bio"},{"_id":"EM-Fac"},{"_id":"MiSi"}],"abstract":[{"text":"Migrating cells penetrate tissue barriers during development, inflammatory responses, and tumor metastasis. We study if migration in vivo in such three-dimensionally confined environments requires changes in the mechanical properties of the surrounding cells using embryonic Drosophila melanogaster hemocytes, also called macrophages, as a model. We find that macrophage invasion into the germband through transient separation of the apposing ectoderm and mesoderm requires cell deformations and reductions in apical tension in the ectoderm. Interestingly, the genetic pathway governing these mechanical shifts acts downstream of the only known tumor necrosis factor superfamily member in Drosophila, Eiger, and its receptor, Grindelwald. Eiger-Grindelwald signaling reduces levels of active Myosin in the germband ectodermal cortex through the localization of a Crumbs complex component, Patj (Pals-1-associated tight junction protein). We therefore elucidate a distinct molecular pathway that controls tissue tension and demonstrate the importance of such regulation for invasive migration in vivo.","lang":"eng"}],"main_file_link":[{"open_access":"1","url":"https://doi.org/10.1016/j.devcel.2018.04.002"}],"scopus_import":"1","type":"journal_article","oa":1,"day":"07","language":[{"iso":"eng"}],"quality_controlled":"1","pmid":1,"title":"Drosophila TNF modulates tissue tension in the embryo to facilitate macrophage invasive migration","publication":"Developmental Cell","doi":"10.1016/j.devcel.2018.04.002","publisher":"Elsevier","isi":1,"year":"2018","date_published":"2018-05-07T00:00:00Z","intvolume":"        45","_id":"308","status":"public","oa_version":"Published Version","volume":45,"acknowledged_ssus":[{"_id":"SSU"}],"ec_funded":1,"date_updated":"2023-09-11T13:22:13Z","related_material":{"link":[{"description":"News on IST Homepage","url":"https://ist.ac.at/en/news/cells-change-tension-to-make-tissue-barriers-easier-to-get-through/","relation":"press_release"}]}},{"related_material":{"record":[{"id":"6982","relation":"later_version","status":"public"}]},"oa_version":"Preprint","date_updated":"2023-09-15T12:19:32Z","_id":"309","status":"public","year":"2018","date_published":"2018-01-01T00:00:00Z","isi":1,"doi":"10.1137/1.9781611975031.20","publisher":"ACM","arxiv":1,"title":"Recognizing weak embeddings of graphs","quality_controlled":"1","day":"01","oa":1,"type":"conference","language":[{"iso":"eng"}],"scopus_import":"1","acknowledgement":"∗Research supported in part by the NSF awards CCF-1422311 and CCF-1423615, and the Science Without Borders program. The second author gratefully acknowledges support from Austrian Science Fund (FWF): M2281-N35.","publist_id":"7556","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1709.09209"}],"abstract":[{"lang":"eng","text":"We present an efficient algorithm for a problem in the interface between clustering and graph embeddings. An embedding ' : G ! M of a graph G into a 2manifold M maps the vertices in V (G) to distinct points and the edges in E(G) to interior-disjoint Jordan arcs between the corresponding vertices. In applications in clustering, cartography, and visualization, nearby vertices and edges are often bundled to a common node or arc, due to data compression or low resolution. This raises the computational problem of deciding whether a given map ' : G ! M comes from an embedding. A map ' : G ! M is a weak embedding if it can be perturbed into an embedding ψ: G ! M with k' \"k < \" for every &quot; &gt; 0. A polynomial-time algorithm for recognizing weak embeddings was recently found by Fulek and Kyncl [14], which reduces to solving a system of linear equations over Z2. It runs in O(n2!) O(n4:75) time, where 2:373 is the matrix multiplication exponent and n is the number of vertices and edges of G. We improve the running time to O(n log n). Our algorithm is also conceptually simpler than [14]: We perform a sequence of local operations that gradually &quot;untangles&quot; the image '(G) into an embedding (G), or reports that ' is not a weak embedding. It generalizes a recent technique developed for the case that G is a cycle and the embedding is a simple polygon [1], and combines local constraints on the orientation of subgraphs directly, thereby eliminating the need for solving large systems of linear equations."}],"department":[{"_id":"UlWa"}],"citation":{"apa":"Akitaya, H., Fulek, R., &#38; Tóth, C. (2018). Recognizing weak embeddings of graphs (pp. 274–292). Presented at the SODA: Symposium on Discrete Algorithms, New Orleans, LA, USA: ACM. <a href=\"https://doi.org/10.1137/1.9781611975031.20\">https://doi.org/10.1137/1.9781611975031.20</a>","ieee":"H. Akitaya, R. Fulek, and C. Tóth, “Recognizing weak embeddings of graphs,” presented at the SODA: Symposium on Discrete Algorithms, New Orleans, LA, USA, 2018, pp. 274–292.","chicago":"Akitaya, Hugo, Radoslav Fulek, and Csaba Tóth. “Recognizing Weak Embeddings of Graphs,” 274–92. ACM, 2018. <a href=\"https://doi.org/10.1137/1.9781611975031.20\">https://doi.org/10.1137/1.9781611975031.20</a>.","ama":"Akitaya H, Fulek R, Tóth C. Recognizing weak embeddings of graphs. In: ACM; 2018:274-292. doi:<a href=\"https://doi.org/10.1137/1.9781611975031.20\">10.1137/1.9781611975031.20</a>","mla":"Akitaya, Hugo, et al. <i>Recognizing Weak Embeddings of Graphs</i>. ACM, 2018, pp. 274–92, doi:<a href=\"https://doi.org/10.1137/1.9781611975031.20\">10.1137/1.9781611975031.20</a>.","ista":"Akitaya H, Fulek R, Tóth C. 2018. Recognizing weak embeddings of graphs. SODA: Symposium on Discrete Algorithms, 274–292.","short":"H. Akitaya, R. Fulek, C. Tóth, in:, ACM, 2018, pp. 274–292."},"month":"01","article_processing_charge":"No","project":[{"_id":"261FA626-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Eliminating intersections in drawings of graphs","grant_number":"M02281"}],"publication_status":"published","author":[{"first_name":"Hugo","full_name":"Akitaya, Hugo","last_name":"Akitaya"},{"first_name":"Radoslav","full_name":"Fulek, Radoslav","id":"39F3FFE4-F248-11E8-B48F-1D18A9856A87","last_name":"Fulek","orcid":"0000-0001-8485-1774"},{"first_name":"Csaba","last_name":"Tóth","full_name":"Tóth, Csaba"}],"date_created":"2018-12-11T11:45:45Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","page":"274 - 292","conference":{"name":"SODA: Symposium on Discrete Algorithms","end_date":"2018-01-10","start_date":"2018-01-07","location":"New Orleans, LA, USA"},"external_id":{"arxiv":["1709.09209"],"isi":["000483921200021"]}},{"external_id":{"isi":["000447486100004"]},"date_created":"2018-12-11T11:44:15Z","issue":"4","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","publication_identifier":{"issn":["24700045"]},"article_type":"original","publication_status":"published","author":[{"first_name":"Ulisse","last_name":"Ferrari","full_name":"Ferrari, Ulisse"},{"first_name":"Stephane","last_name":"Deny","full_name":"Deny, Stephane"},{"first_name":"Matthew J","last_name":"Chalk","full_name":"Chalk, Matthew J"},{"first_name":"Gasper","id":"3D494DCA-F248-11E8-B48F-1D18A9856A87","full_name":"Tkacik, Gasper","last_name":"Tkacik","orcid":"0000-0002-6699-1455"},{"first_name":"Olivier","full_name":"Marre, Olivier","last_name":"Marre"},{"first_name":"Thierry","last_name":"Mora","full_name":"Mora, Thierry"}],"article_number":"042410","article_processing_charge":"No","project":[{"grant_number":"785907","call_identifier":"H2020","name":"Human Brain Project Specific Grant Agreement 2 (HBP SGA 2)","_id":"26436750-B435-11E9-9278-68D0E5697425"}],"department":[{"_id":"GaTk"}],"citation":{"mla":"Ferrari, Ulisse, et al. “Separating Intrinsic Interactions from Extrinsic Correlations in a Network of Sensory Neurons.” <i>Physical Review E</i>, vol. 98, no. 4, 042410, American Physical Society, 2018, doi:<a href=\"https://doi.org/10.1103/PhysRevE.98.042410\">10.1103/PhysRevE.98.042410</a>.","short":"U. Ferrari, S. Deny, M.J. Chalk, G. Tkačik, O. Marre, T. Mora, Physical Review E 98 (2018).","ama":"Ferrari U, Deny S, Chalk MJ, Tkačik G, Marre O, Mora T. Separating intrinsic interactions from extrinsic correlations in a network of sensory neurons. <i>Physical Review E</i>. 2018;98(4). doi:<a href=\"https://doi.org/10.1103/PhysRevE.98.042410\">10.1103/PhysRevE.98.042410</a>","ista":"Ferrari U, Deny S, Chalk MJ, Tkačik G, Marre O, Mora T. 2018. Separating intrinsic interactions from extrinsic correlations in a network of sensory neurons. Physical Review E. 98(4), 042410.","chicago":"Ferrari, Ulisse, Stephane Deny, Matthew J Chalk, Gašper Tkačik, Olivier Marre, and Thierry Mora. “Separating Intrinsic Interactions from Extrinsic Correlations in a Network of Sensory Neurons.” <i>Physical Review E</i>. American Physical Society, 2018. <a href=\"https://doi.org/10.1103/PhysRevE.98.042410\">https://doi.org/10.1103/PhysRevE.98.042410</a>.","apa":"Ferrari, U., Deny, S., Chalk, M. J., Tkačik, G., Marre, O., &#38; Mora, T. (2018). Separating intrinsic interactions from extrinsic correlations in a network of sensory neurons. <i>Physical Review E</i>. American Physical Society. <a href=\"https://doi.org/10.1103/PhysRevE.98.042410\">https://doi.org/10.1103/PhysRevE.98.042410</a>","ieee":"U. Ferrari, S. Deny, M. J. Chalk, G. Tkačik, O. Marre, and T. Mora, “Separating intrinsic interactions from extrinsic correlations in a network of sensory neurons,” <i>Physical Review E</i>, vol. 98, no. 4. American Physical Society, 2018."},"month":"10","publist_id":"8024","main_file_link":[{"url":"https://www.biorxiv.org/content/10.1101/243816v2.full","open_access":"1"}],"abstract":[{"lang":"eng","text":"Correlations in sensory neural networks have both extrinsic and intrinsic origins. Extrinsic or stimulus correlations arise from shared inputs to the network and, thus, depend strongly on the stimulus ensemble. Intrinsic or noise correlations reflect biophysical mechanisms of interactions between neurons, which are expected to be robust to changes in the stimulus ensemble. Despite the importance of this distinction for understanding how sensory networks encode information collectively, no method exists to reliably separate intrinsic interactions from extrinsic correlations in neural activity data, limiting our ability to build predictive models of the network response. In this paper we introduce a general strategy to infer population models of interacting neurons that collectively encode stimulus information. The key to disentangling intrinsic from extrinsic correlations is to infer the couplings between neurons separately from the encoding model and to combine the two using corrections calculated in a mean-field approximation. We demonstrate the effectiveness of this approach in retinal recordings. The same coupling network is inferred from responses to radically different stimulus ensembles, showing that these couplings indeed reflect stimulus-independent interactions between neurons. The inferred model predicts accurately the collective response of retinal ganglion cell populations as a function of the stimulus."}],"scopus_import":"1","acknowledgement":"This work was supported by ANR Trajectory, the French State program Investissements d’Avenir managed by the Agence Nationale de la Recherche (LIFESENSES; ANR-10-LABX-65), EC Grant No. H2020-785907 from the Human Brain Project, NIH Grant No. U01NS090501, and an AVIESAN-UNADEV grant to O.M. M.C. was supported by the Agence Nationale de la Recherche Jeune Chercheur/Jeune Chercheuse grant (ANR-17-CE37-0013).","day":"17","type":"journal_article","oa":1,"language":[{"iso":"eng"}],"quality_controlled":"1","title":"Separating intrinsic interactions from extrinsic correlations in a network of sensory neurons","publication":"Physical Review E","isi":1,"publisher":"American Physical Society","doi":"10.1103/PhysRevE.98.042410","year":"2018","date_published":"2018-10-17T00:00:00Z","intvolume":"        98","_id":"31","status":"public","oa_version":"Preprint","volume":98,"date_updated":"2023-09-18T09:18:44Z","ec_funded":1}]
