[{"type":"journal_article","language":[{"iso":"eng"}],"date_created":"2020-08-10T11:53:26Z","page":"866-887","publication":"Allergy","volume":72,"quality_controlled":"1","article_type":"original","article_processing_charge":"No","author":[{"full_name":"Jensen-Jarolim, E.","orcid":"0000-0003-4019-5765","first_name":"E.","last_name":"Jensen-Jarolim"},{"full_name":"Bax, H. J.","last_name":"Bax","first_name":"H. J."},{"full_name":"Bianchini, R.","first_name":"R.","last_name":"Bianchini"},{"full_name":"Capron, M.","first_name":"M.","last_name":"Capron"},{"full_name":"Corrigan, C.","last_name":"Corrigan","first_name":"C."},{"first_name":"M.","last_name":"Castells","full_name":"Castells, M."},{"first_name":"D.","last_name":"Dombrowicz","full_name":"Dombrowicz, D."},{"last_name":"Daniels-Wells","first_name":"T. R.","full_name":"Daniels-Wells, T. R."},{"full_name":"Fazekas, Judit","first_name":"Judit","orcid":"0000-0002-8777-3502","last_name":"Fazekas","id":"36432834-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Fiebiger, E.","last_name":"Fiebiger","first_name":"E."},{"last_name":"Gatault","first_name":"S.","full_name":"Gatault, S."},{"first_name":"H. J.","last_name":"Gould","full_name":"Gould, H. J."},{"last_name":"Janda","first_name":"J.","full_name":"Janda, J."},{"full_name":"Josephs, D. H.","first_name":"D. H.","last_name":"Josephs"},{"last_name":"Karagiannis","first_name":"P.","full_name":"Karagiannis, P."},{"first_name":"F.","last_name":"Levi-Schaffer","full_name":"Levi-Schaffer, F."},{"first_name":"A.","last_name":"Meshcheryakova","full_name":"Meshcheryakova, A."},{"full_name":"Mechtcheriakova, D.","first_name":"D.","last_name":"Mechtcheriakova"},{"full_name":"Mekori, Y.","first_name":"Y.","last_name":"Mekori"},{"full_name":"Mungenast, F.","last_name":"Mungenast","first_name":"F."},{"first_name":"E. A.","last_name":"Nigro","full_name":"Nigro, E. A."},{"first_name":"M. L.","last_name":"Penichet","full_name":"Penichet, M. L."},{"full_name":"Redegeld, F.","last_name":"Redegeld","first_name":"F."},{"full_name":"Saul, L.","first_name":"L.","last_name":"Saul"},{"full_name":"Singer, J.","last_name":"Singer","first_name":"J."},{"last_name":"Spicer","first_name":"J. F.","full_name":"Spicer, J. F."},{"full_name":"Siccardi, A. G.","last_name":"Siccardi","first_name":"A. G."},{"first_name":"E.","last_name":"Spillner","full_name":"Spillner, E."},{"full_name":"Turner, M. C.","last_name":"Turner","first_name":"M. C."},{"last_name":"Untersmayr","first_name":"E.","full_name":"Untersmayr, E."},{"last_name":"Vangelista","first_name":"L.","full_name":"Vangelista, L."},{"full_name":"Karagiannis, S. N.","first_name":"S. N.","last_name":"Karagiannis"}],"day":"01","extern":"1","publisher":"Wiley","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"AllergoOncology - the impact of allergy in oncology: EAACI position paper","oa_version":"Published Version","date_published":"2017-06-01T00:00:00Z","publication_status":"published","doi":"10.1111/all.13119","citation":{"short":"E. Jensen-Jarolim, H.J. Bax, R. Bianchini, M. Capron, C. Corrigan, M. Castells, D. Dombrowicz, T.R. Daniels-Wells, J. Singer, E. Fiebiger, S. Gatault, H.J. Gould, J. Janda, D.H. Josephs, P. Karagiannis, F. Levi-Schaffer, A. Meshcheryakova, D. Mechtcheriakova, Y. Mekori, F. Mungenast, E.A. Nigro, M.L. Penichet, F. Redegeld, L. Saul, J. Singer, J.F. Spicer, A.G. Siccardi, E. Spillner, M.C. Turner, E. Untersmayr, L. Vangelista, S.N. Karagiannis, Allergy 72 (2017) 866–887.","ieee":"E. Jensen-Jarolim <i>et al.</i>, “AllergoOncology - the impact of allergy in oncology: EAACI position paper,” <i>Allergy</i>, vol. 72, no. 6. Wiley, pp. 866–887, 2017.","ama":"Jensen-Jarolim E, Bax HJ, Bianchini R, et al. AllergoOncology - the impact of allergy in oncology: EAACI position paper. <i>Allergy</i>. 2017;72(6):866-887. doi:<a href=\"https://doi.org/10.1111/all.13119\">10.1111/all.13119</a>","chicago":"Jensen-Jarolim, E., H. J. Bax, R. Bianchini, M. Capron, C. Corrigan, M. Castells, D. Dombrowicz, et al. “AllergoOncology - the Impact of Allergy in Oncology: EAACI Position Paper.” <i>Allergy</i>. Wiley, 2017. <a href=\"https://doi.org/10.1111/all.13119\">https://doi.org/10.1111/all.13119</a>.","mla":"Jensen-Jarolim, E., et al. “AllergoOncology - the Impact of Allergy in Oncology: EAACI Position Paper.” <i>Allergy</i>, vol. 72, no. 6, Wiley, 2017, pp. 866–87, doi:<a href=\"https://doi.org/10.1111/all.13119\">10.1111/all.13119</a>.","apa":"Jensen-Jarolim, E., Bax, H. J., Bianchini, R., Capron, M., Corrigan, C., Castells, M., … Karagiannis, S. N. (2017). AllergoOncology - the impact of allergy in oncology: EAACI position paper. <i>Allergy</i>. Wiley. <a href=\"https://doi.org/10.1111/all.13119\">https://doi.org/10.1111/all.13119</a>","ista":"Jensen-Jarolim E, Bax HJ, Bianchini R, Capron M, Corrigan C, Castells M, Dombrowicz D, Daniels-Wells TR, Singer J, Fiebiger E, Gatault S, Gould HJ, Janda J, Josephs DH, Karagiannis P, Levi-Schaffer F, Meshcheryakova A, Mechtcheriakova D, Mekori Y, Mungenast F, Nigro EA, Penichet ML, Redegeld F, Saul L, Singer J, Spicer JF, Siccardi AG, Spillner E, Turner MC, Untersmayr E, Vangelista L, Karagiannis SN. 2017. AllergoOncology - the impact of allergy in oncology: EAACI position paper. Allergy. 72(6), 866–887."},"intvolume":"        72","main_file_link":[{"url":"https://doi.org/10.1111/all.13119","open_access":"1"}],"_id":"8236","date_updated":"2021-01-12T08:17:39Z","issue":"6","abstract":[{"text":"Th2 immunity and allergic immune surveillance play critical roles in host responses to pathogens, parasites and allergens. Numerous studies have reported significant links between Th2 responses and cancer, including insights into the functions of IgE antibodies and associated effector cells in both antitumour immune surveillance and therapy. The interdisciplinary field of AllergoOncology was given Task Force status by the European Academy of Allergy and Clinical Immunology in 2014. Affiliated expert groups focus on the interface between allergic responses and cancer, applied to immune surveillance, immunomodulation and the functions of IgE‐mediated immune responses against cancer, to derive novel insights into more effective treatments. Coincident with rapid expansion in clinical application of cancer immunotherapies, here we review the current state‐of‐the‐art and future translational opportunities, as well as challenges in this relatively new field. Recent developments include improved understanding of Th2 antibodies, intratumoral innate allergy effector cells and mediators, IgE‐mediated tumour antigen cross‐presentation by dendritic cells, as well as immunotherapeutic strategies such as vaccines and recombinant antibodies, and finally, the management of allergy in daily clinical oncology. Shedding light on the crosstalk between allergic response and cancer is paving the way for new avenues of treatment.","lang":"eng"}],"year":"2017","month":"06","status":"public","publication_identifier":{"issn":["0105-4538"]},"oa":1},{"language":[{"iso":"eng"}],"date_published":"2017-09-11T00:00:00Z","type":"journal_article","oa_version":"Published Version","date_created":"2020-08-10T11:53:32Z","publication":"Frontiers in Immunology","publication_status":"published","doi":"10.3389/fimmu.2017.01112","citation":{"apa":"Ilieva, K. M., Singer, J., Achkova, D. Y., Dodev, T. S., Mele, S., Crescioli, S., … Karagiannis, S. N. (2017). Functionally active Fc mutant antibodies recognizing cancer antigens generated rapidly at high yields. <i>Frontiers in Immunology</i>. Frontiers. <a href=\"https://doi.org/10.3389/fimmu.2017.01112\">https://doi.org/10.3389/fimmu.2017.01112</a>","mla":"Ilieva, Kristina M., et al. “Functionally Active Fc Mutant Antibodies Recognizing Cancer Antigens Generated Rapidly at High Yields.” <i>Frontiers in Immunology</i>, vol. 8, 1112, Frontiers, 2017, doi:<a href=\"https://doi.org/10.3389/fimmu.2017.01112\">10.3389/fimmu.2017.01112</a>.","ista":"Ilieva KM, Singer J, Achkova DY, Dodev TS, Mele S, Crescioli S, Bax HJ, Cheung A, Karagiannis P, Correa I, Figini M, Marlow R, Josephs DH, Beavil AJ, Maher J, Spicer JF, Jensen-Jarolim E, Tutt AN, Karagiannis SN. 2017. Functionally active Fc mutant antibodies recognizing cancer antigens generated rapidly at high yields. Frontiers in Immunology. 8, 1112.","chicago":"Ilieva, Kristina M., Judit Singer, Daniela Y. Achkova, Tihomir S. Dodev, Silvia Mele, Silvia Crescioli, Heather J. Bax, et al. “Functionally Active Fc Mutant Antibodies Recognizing Cancer Antigens Generated Rapidly at High Yields.” <i>Frontiers in Immunology</i>. Frontiers, 2017. <a href=\"https://doi.org/10.3389/fimmu.2017.01112\">https://doi.org/10.3389/fimmu.2017.01112</a>.","short":"K.M. Ilieva, J. Singer, D.Y. Achkova, T.S. Dodev, S. Mele, S. Crescioli, H.J. Bax, A. Cheung, P. Karagiannis, I. Correa, M. Figini, R. Marlow, D.H. Josephs, A.J. Beavil, J. Maher, J.F. Spicer, E. Jensen-Jarolim, A.N. Tutt, S.N. Karagiannis, Frontiers in Immunology 8 (2017).","ieee":"K. M. Ilieva <i>et al.</i>, “Functionally active Fc mutant antibodies recognizing cancer antigens generated rapidly at high yields,” <i>Frontiers in Immunology</i>, vol. 8. Frontiers, 2017.","ama":"Ilieva KM, Singer J, Achkova DY, et al. Functionally active Fc mutant antibodies recognizing cancer antigens generated rapidly at high yields. <i>Frontiers in Immunology</i>. 2017;8. doi:<a href=\"https://doi.org/10.3389/fimmu.2017.01112\">10.3389/fimmu.2017.01112</a>"},"volume":8,"intvolume":"         8","quality_controlled":"1","main_file_link":[{"url":"https://doi.org/10.3389/fimmu.2017.01112","open_access":"1"}],"article_processing_charge":"No","article_type":"original","_id":"8237","article_number":"1112","author":[{"full_name":"Ilieva, Kristina M.","last_name":"Ilieva","first_name":"Kristina M."},{"last_name":"Fazekas-Singer","id":"36432834-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8777-3502","first_name":"Judit","full_name":"Fazekas-Singer, Judit"},{"full_name":"Achkova, Daniela Y.","last_name":"Achkova","first_name":"Daniela Y."},{"full_name":"Dodev, Tihomir S.","first_name":"Tihomir S.","last_name":"Dodev"},{"first_name":"Silvia","last_name":"Mele","full_name":"Mele, Silvia"},{"last_name":"Crescioli","first_name":"Silvia","full_name":"Crescioli, Silvia"},{"full_name":"Bax, Heather J.","first_name":"Heather J.","last_name":"Bax"},{"full_name":"Cheung, Anthony","last_name":"Cheung","first_name":"Anthony"},{"last_name":"Karagiannis","first_name":"Panagiotis","full_name":"Karagiannis, Panagiotis"},{"full_name":"Correa, Isabel","last_name":"Correa","first_name":"Isabel"},{"full_name":"Figini, Mariangela","first_name":"Mariangela","last_name":"Figini"},{"last_name":"Marlow","first_name":"Rebecca","full_name":"Marlow, Rebecca"},{"first_name":"Debra H.","last_name":"Josephs","full_name":"Josephs, Debra H."},{"first_name":"Andrew J.","last_name":"Beavil","full_name":"Beavil, Andrew J."},{"last_name":"Maher","first_name":"John","full_name":"Maher, John"},{"last_name":"Spicer","first_name":"James F.","full_name":"Spicer, James F."},{"last_name":"Jensen-Jarolim","first_name":"Erika","full_name":"Jensen-Jarolim, Erika"},{"full_name":"Tutt, Andrew N.","first_name":"Andrew N.","last_name":"Tutt"},{"last_name":"Karagiannis","first_name":"Sophia N.","full_name":"Karagiannis, Sophia N."}],"day":"11","year":"2017","extern":"1","date_updated":"2021-01-12T08:17:39Z","abstract":[{"lang":"eng","text":"Monoclonal antibodies find broad application as therapy for various types of cancer by employing multiple mechanisms of action against tumors. Manipulating the Fc-mediated functions of antibodies that engage immune effector cells, such as NK cells, represents a strategy to influence effector cell activation and to enhance antibody potency and potentially efficacy. We developed a novel approach to generate and ascertain the functional attributes of Fc mutant monoclonal antibodies. This entailed coupling single expression vector (pVitro1) antibody cloning, using polymerase incomplete primer extension (PIPE) polymerase chain reaction, together with simultaneous Fc region point mutagenesis and high yield transient expression in human mammalian cells. Employing this, we engineered wild type, low (N297Q, NQ), and high (S239D/I332E, DE) FcR-binding Fc mutant monoclonal antibody panels recognizing two cancer antigens, HER2/neu and chondroitin sulfate proteoglycan 4. Antibodies were generated with universal mutagenic primers applicable to any IgG1 pVitro1 constructs, with high mutagenesis and transfection efficiency, in small culture volumes, at high yields and within 12 days from design to purified material. Antibody variants conserved their Fab-mediated recognition of target antigens and their direct anti-proliferative effects against cancer cells. Fc mutations had a significant impact on antibody interactions with Fc receptors (FcRs) on human NK cells, and consequently on the potency of NK cell activation, quantified by immune complex-mediated calcium mobilization and by antibody-dependent cellular cytotoxicity (ADCC) of tumor cells. This strategy for manipulation and testing of Fc region engagement with cognate FcRs can facilitate the design of antibodies with defined effector functions and potentially enhanced efficacy against tumor cells."}],"month":"09","title":"Functionally active Fc mutant antibodies recognizing cancer antigens generated rapidly at high yields","publication_identifier":{"issn":["1664-3224"]},"oa":1,"status":"public","publisher":"Frontiers","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87"},{"article_processing_charge":"No","article_type":"original","main_file_link":[{"open_access":"1","url":"https://doi.org/10.1038/srep45067"}],"volume":7,"intvolume":"         7","quality_controlled":"1","citation":{"ama":"Roth-Walter F, Bergmayr C, Meitz S, et al. Janus-faced Acrolein prevents allergy but accelerates tumor growth by promoting immunoregulatory Foxp3+ cells: Mouse model for passive respiratory exposure. <i>Scientific Reports</i>. 2017;7. doi:<a href=\"https://doi.org/10.1038/srep45067\">10.1038/srep45067</a>","ieee":"F. Roth-Walter <i>et al.</i>, “Janus-faced Acrolein prevents allergy but accelerates tumor growth by promoting immunoregulatory Foxp3+ cells: Mouse model for passive respiratory exposure,” <i>Scientific Reports</i>, vol. 7. Springer Nature, 2017.","short":"F. Roth-Walter, C. Bergmayr, S. Meitz, S. Buchleitner, C. Stremnitzer, J. Singer, A. Moskovskich, M.A. Müller, G.A. Roth, K. Manzano-Szalai, Z. Dvorak, A. Neunkirchner, E. Jensen-Jarolim, Scientific Reports 7 (2017).","chicago":"Roth-Walter, Franziska, Cornelia Bergmayr, Sarah Meitz, Stefan Buchleitner, Caroline Stremnitzer, Judit Singer, Anna Moskovskich, et al. “Janus-Faced Acrolein Prevents Allergy but Accelerates Tumor Growth by Promoting Immunoregulatory Foxp3+ Cells: Mouse Model for Passive Respiratory Exposure.” <i>Scientific Reports</i>. Springer Nature, 2017. <a href=\"https://doi.org/10.1038/srep45067\">https://doi.org/10.1038/srep45067</a>.","ista":"Roth-Walter F, Bergmayr C, Meitz S, Buchleitner S, Stremnitzer C, Singer J, Moskovskich A, Müller MA, Roth GA, Manzano-Szalai K, Dvorak Z, Neunkirchner A, Jensen-Jarolim E. 2017. Janus-faced Acrolein prevents allergy but accelerates tumor growth by promoting immunoregulatory Foxp3+ cells: Mouse model for passive respiratory exposure. Scientific Reports. 7, 45067.","apa":"Roth-Walter, F., Bergmayr, C., Meitz, S., Buchleitner, S., Stremnitzer, C., Singer, J., … Jensen-Jarolim, E. (2017). Janus-faced Acrolein prevents allergy but accelerates tumor growth by promoting immunoregulatory Foxp3+ cells: Mouse model for passive respiratory exposure. <i>Scientific Reports</i>. Springer Nature. <a href=\"https://doi.org/10.1038/srep45067\">https://doi.org/10.1038/srep45067</a>","mla":"Roth-Walter, Franziska, et al. “Janus-Faced Acrolein Prevents Allergy but Accelerates Tumor Growth by Promoting Immunoregulatory Foxp3+ Cells: Mouse Model for Passive Respiratory Exposure.” <i>Scientific Reports</i>, vol. 7, 45067, Springer Nature, 2017, doi:<a href=\"https://doi.org/10.1038/srep45067\">10.1038/srep45067</a>."},"doi":"10.1038/srep45067","publication_status":"published","publication":"Scientific Reports","date_created":"2020-08-10T11:53:46Z","type":"journal_article","oa_version":"Published Version","date_published":"2017-03-23T00:00:00Z","language":[{"iso":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","status":"public","publisher":"Springer Nature","oa":1,"publication_identifier":{"issn":["2045-2322"]},"title":"Janus-faced Acrolein prevents allergy but accelerates tumor growth by promoting immunoregulatory Foxp3+ cells: Mouse model for passive respiratory exposure","month":"03","abstract":[{"lang":"eng","text":"Acrolein, a highly reactive unsaturated aldehyde, is generated in large amounts during smoking and is best known for its genotoxic capacity. Here, we aimed to assess whether acrolein at concentrations relevant for smokers may also exert immunomodulatory effects that could be relevant in allergy or cancer. In a BALB/c allergy model repeated nasal exposure to acrolein abrogated allergen-specific antibody and cytokine formation, and led to a relative accumulation of regulatory T cells in the lungs. Only the acrolein-treated mice were protected from bronchial hyperreactivity as well as from anaphylactic reactions upon challenge with the specific allergen. Moreover, grafted D2F2 tumor cells grew faster and intratumoral Foxp3+ cell accumulation was observed in these mice compared to sham-treated controls. Results from reporter cell lines suggested that acrolein acts via the aryl-hydrocarbon receptor which could be inhibited by resveratrol and 3′-methoxy-4′-nitroflavone Acrolein- stimulation of human PBMCs increased Foxp3+ expression by T cells which could be antagonized by resveratrol. Our mouse and human data thus revealed that acrolein exerts systemic immunosuppression by promoting Foxp3+ regulatory cells. This provides a novel explanation why smokers have a lower allergy, but higher cancer risk."}],"date_updated":"2021-01-12T08:17:40Z","year":"2017","extern":"1","day":"23","author":[{"full_name":"Roth-Walter, Franziska","first_name":"Franziska","last_name":"Roth-Walter"},{"first_name":"Cornelia","last_name":"Bergmayr","full_name":"Bergmayr, Cornelia"},{"full_name":"Meitz, Sarah","last_name":"Meitz","first_name":"Sarah"},{"full_name":"Buchleitner, Stefan","first_name":"Stefan","last_name":"Buchleitner"},{"full_name":"Stremnitzer, Caroline","first_name":"Caroline","last_name":"Stremnitzer"},{"last_name":"Fazekas","id":"36432834-F248-11E8-B48F-1D18A9856A87","first_name":"Judit","orcid":"0000-0002-8777-3502","full_name":"Fazekas, Judit"},{"full_name":"Moskovskich, Anna","last_name":"Moskovskich","first_name":"Anna"},{"first_name":"Mario A.","last_name":"Müller","full_name":"Müller, Mario A."},{"full_name":"Roth, Georg A.","first_name":"Georg A.","last_name":"Roth"},{"first_name":"Krisztina","last_name":"Manzano-Szalai","full_name":"Manzano-Szalai, Krisztina"},{"last_name":"Dvorak","first_name":"Zdenek","full_name":"Dvorak, Zdenek"},{"full_name":"Neunkirchner, Alina","first_name":"Alina","last_name":"Neunkirchner"},{"first_name":"Erika","last_name":"Jensen-Jarolim","full_name":"Jensen-Jarolim, Erika"}],"article_number":"45067","_id":"8239"},{"publisher":"Cambridge University Press","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","title":"Heteroclinic path to spatially localized chaos in pipe flow","author":[{"full_name":"Budanur, Nazmi B","orcid":"0000-0003-0423-5010","first_name":"Nazmi B","id":"3EA1010E-F248-11E8-B48F-1D18A9856A87","last_name":"Budanur"},{"full_name":"Hof, Björn","last_name":"Hof","id":"3A374330-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-2057-2754","first_name":"Björn"}],"isi":1,"day":"18","external_id":{"isi":["000408326300001"]},"volume":827,"quality_controlled":"1","publist_id":"6824","article_processing_charge":"No","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"BjHo"}],"date_created":"2018-12-11T11:48:42Z","publication":"Journal of Fluid Mechanics","month":"08","status":"public","publication_identifier":{"issn":["00221120"]},"oa":1,"article_number":"R1","_id":"824","date_updated":"2023-09-26T16:17:43Z","abstract":[{"text":"In shear flows at transitional Reynolds numbers, localized patches of turbulence, known as puffs, coexist with the laminar flow. Recently, Avila et al. (Phys. Rev. Lett., vol. 110, 2013, 224502) discovered two spatially localized relative periodic solutions for pipe flow, which appeared in a saddle-node bifurcation at low Reynolds number. Combining slicing methods for continuous symmetry reduction with Poincaré sections for the first time in a shear flow setting, we compute and visualize the unstable manifold of the lower-branch solution and show that it extends towards the neighbourhood of the upper-branch solution. Surprisingly, this connection even persists far above the bifurcation point and appears to mediate the first stage of the puff generation: amplification of streamwise localized fluctuations. When the state-space trajectories on the unstable manifold reach the vicinity of the upper branch, corresponding fluctuations expand in space and eventually take the usual shape of a puff.","lang":"eng"}],"year":"2017","citation":{"short":"N.B. Budanur, B. Hof, Journal of Fluid Mechanics 827 (2017).","ama":"Budanur NB, Hof B. Heteroclinic path to spatially localized chaos in pipe flow. <i>Journal of Fluid Mechanics</i>. 2017;827. doi:<a href=\"https://doi.org/10.1017/jfm.2017.516\">10.1017/jfm.2017.516</a>","ieee":"N. B. Budanur and B. Hof, “Heteroclinic path to spatially localized chaos in pipe flow,” <i>Journal of Fluid Mechanics</i>, vol. 827. Cambridge University Press, 2017.","chicago":"Budanur, Nazmi B, and Björn Hof. “Heteroclinic Path to Spatially Localized Chaos in Pipe Flow.” <i>Journal of Fluid Mechanics</i>. Cambridge University Press, 2017. <a href=\"https://doi.org/10.1017/jfm.2017.516\">https://doi.org/10.1017/jfm.2017.516</a>.","apa":"Budanur, N. B., &#38; Hof, B. (2017). Heteroclinic path to spatially localized chaos in pipe flow. <i>Journal of Fluid Mechanics</i>. Cambridge University Press. <a href=\"https://doi.org/10.1017/jfm.2017.516\">https://doi.org/10.1017/jfm.2017.516</a>","mla":"Budanur, Nazmi B., and Björn Hof. “Heteroclinic Path to Spatially Localized Chaos in Pipe Flow.” <i>Journal of Fluid Mechanics</i>, vol. 827, R1, Cambridge University Press, 2017, doi:<a href=\"https://doi.org/10.1017/jfm.2017.516\">10.1017/jfm.2017.516</a>.","ista":"Budanur NB, Hof B. 2017. Heteroclinic path to spatially localized chaos in pipe flow. Journal of Fluid Mechanics. 827, R1."},"intvolume":"       827","scopus_import":"1","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1703.10484"}],"oa_version":"Submitted Version","date_published":"2017-08-18T00:00:00Z","publication_status":"published","doi":"10.1017/jfm.2017.516"},{"publisher":"Impact Journals","status":"public","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"Long term storage in liquid nitrogen leads to only minor phenotypic and gene expression changes in the mammary carcinoma model cell line BT474","oa":1,"publication_identifier":{"issn":["1949-2553"]},"month":"03","date_updated":"2021-01-12T08:17:41Z","abstract":[{"text":"Background/Aim: Cancer cell lines are indispensible surrogate models in cancer research, as they can be used off-the-shelf, expanded to the desired extent, easily modified and exchanged between research groups for affirmation, reproduction or follow-up experiments.\r\nAs malignant cells are prone to genomic instability, phenotypical changes may occur after certain passages in culture. Thus, cell lines have to be regularly authenticated to ensure data quality. In between experiments these cell lines are often stored in liquid nitrogen for extended time periods.\r\nAlthough freezing of cells is a necessary evil, little research is performed on how long-term storage affects cancer cell lines. Therefore, this study investigated the effects of a 28-year long liquid nitrogen storage period on BT474 cells with regard to phenotypical changes, differences in cell-surface receptor expression as well as cytokine and gene expressional variations.\r\nMethods: Two batches of BT474 cells, one frozen in 1986, the other directly purchased from ATCC were investigated by light microscopy, cell growth analysis, flow cytometry and cytokine as well as whole-transcriptome expression profiling.\r\nResults: The cell lines were morphologically indifferent and showed similar growth rates and similar cell-surface receptor expression. Transcriptome analysis revealed significant differences in only 26 of 40,716 investigated RefSeq transcripts with 4 of them being up-regulated and 22 down-regulated.\r\nConclusion: This study demonstrates that even after very long periods of storage in liquid nitrogen, cancer cell lines display only minimal changes in their gene expression profiles. However, also such minor changes should be carefully assessed before continuation of experiments, especially if phenotypic alterations can be additionally observed.","lang":"eng"}],"day":"28","year":"2017","extern":"1","author":[{"full_name":"Fazekas, Judit","id":"36432834-F248-11E8-B48F-1D18A9856A87","last_name":"Fazekas","first_name":"Judit","orcid":"0000-0002-8777-3502"},{"first_name":"Thomas W.","last_name":"Grunt","full_name":"Grunt, Thomas W."},{"first_name":"Erika","last_name":"Jensen-Jarolim","full_name":"Jensen-Jarolim, Erika"},{"first_name":"Josef","last_name":"Singer","full_name":"Singer, Josef"}],"_id":"8240","main_file_link":[{"open_access":"1","url":"https://doi.org/10.18632/oncotarget.16623"}],"article_processing_charge":"No","article_type":"original","citation":{"short":"J. Singer, T.W. Grunt, E. Jensen-Jarolim, J. Singer, Oncotarget 8 (2017) 35076–35087.","ama":"Singer J, Grunt TW, Jensen-Jarolim E, Singer J. Long term storage in liquid nitrogen leads to only minor phenotypic and gene expression changes in the mammary carcinoma model cell line BT474. <i>Oncotarget</i>. 2017;8:35076-35087. doi:<a href=\"https://doi.org/10.18632/oncotarget.16623\">10.18632/oncotarget.16623</a>","ieee":"J. Singer, T. W. Grunt, E. Jensen-Jarolim, and J. Singer, “Long term storage in liquid nitrogen leads to only minor phenotypic and gene expression changes in the mammary carcinoma model cell line BT474,” <i>Oncotarget</i>, vol. 8. Impact Journals, pp. 35076–35087, 2017.","chicago":"Singer, Judit, Thomas W. Grunt, Erika Jensen-Jarolim, and Josef Singer. “Long Term Storage in Liquid Nitrogen Leads to Only Minor Phenotypic and Gene Expression Changes in the Mammary Carcinoma Model Cell Line BT474.” <i>Oncotarget</i>. Impact Journals, 2017. <a href=\"https://doi.org/10.18632/oncotarget.16623\">https://doi.org/10.18632/oncotarget.16623</a>.","ista":"Singer J, Grunt TW, Jensen-Jarolim E, Singer J. 2017. Long term storage in liquid nitrogen leads to only minor phenotypic and gene expression changes in the mammary carcinoma model cell line BT474. Oncotarget. 8, 35076–35087.","apa":"Singer, J., Grunt, T. W., Jensen-Jarolim, E., &#38; Singer, J. (2017). Long term storage in liquid nitrogen leads to only minor phenotypic and gene expression changes in the mammary carcinoma model cell line BT474. <i>Oncotarget</i>. Impact Journals. <a href=\"https://doi.org/10.18632/oncotarget.16623\">https://doi.org/10.18632/oncotarget.16623</a>","mla":"Singer, Judit, et al. “Long Term Storage in Liquid Nitrogen Leads to Only Minor Phenotypic and Gene Expression Changes in the Mammary Carcinoma Model Cell Line BT474.” <i>Oncotarget</i>, vol. 8, Impact Journals, 2017, pp. 35076–87, doi:<a href=\"https://doi.org/10.18632/oncotarget.16623\">10.18632/oncotarget.16623</a>."},"quality_controlled":"1","intvolume":"         8","volume":8,"publication_status":"published","doi":"10.18632/oncotarget.16623","page":"35076-35087","date_created":"2020-08-10T11:53:53Z","publication":"Oncotarget","type":"journal_article","oa_version":"Published Version","language":[{"iso":"eng"}],"date_published":"2017-03-28T00:00:00Z"},{"volume":70,"publist_id":"6823","department":[{"_id":"E-Lib"}],"language":[{"iso":"eng"}],"type":"journal_article","publication":"Mitteilungen der Vereinigung Österreichischer Bibliothekarinnen & Bibliothekare","date_created":"2018-12-11T11:48:42Z","page":"200 - 207","has_accepted_license":"1","title":"Metadata for research data in practice","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"VÖB","file":[{"date_updated":"2020-07-14T12:48:11Z","file_name":"2017_VOEB_Petritsch.pdf","date_created":"2019-01-18T13:32:17Z","creator":"dernst","file_id":"5850","checksum":"7c4544d07efa2c2add8612b489abb4e2","access_level":"open_access","content_type":"application/pdf","relation":"main_file","file_size":7843975}],"author":[{"last_name":"Petritsch","id":"406048EC-F248-11E8-B48F-1D18A9856A87","first_name":"Barbara","orcid":"0000-0003-2724-4614","full_name":"Petritsch, Barbara"}],"tmp":{"short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"day":"01","intvolume":"        70","citation":{"ieee":"B. Petritsch, “Metadata for research data in practice,” <i>Mitteilungen der Vereinigung Österreichischer Bibliothekarinnen &#38; Bibliothekare</i>, vol. 70, no. 2. VÖB, pp. 200–207, 2017.","ama":"Petritsch B. Metadata for research data in practice. <i>Mitteilungen der Vereinigung Österreichischer Bibliothekarinnen &#38; Bibliothekare</i>. 2017;70(2):200-207. doi:<a href=\"https://doi.org/10.31263/voebm.v70i2.1678\">10.31263/voebm.v70i2.1678</a>","short":"B. Petritsch, Mitteilungen Der Vereinigung Österreichischer Bibliothekarinnen &#38; Bibliothekare 70 (2017) 200–207.","chicago":"Petritsch, Barbara. “Metadata for Research Data in Practice.” <i>Mitteilungen Der Vereinigung Österreichischer Bibliothekarinnen &#38; Bibliothekare</i>. VÖB, 2017. <a href=\"https://doi.org/10.31263/voebm.v70i2.1678\">https://doi.org/10.31263/voebm.v70i2.1678</a>.","mla":"Petritsch, Barbara. “Metadata for Research Data in Practice.” <i>Mitteilungen Der Vereinigung Österreichischer Bibliothekarinnen &#38; Bibliothekare</i>, vol. 70, no. 2, VÖB, 2017, pp. 200–07, doi:<a href=\"https://doi.org/10.31263/voebm.v70i2.1678\">10.31263/voebm.v70i2.1678</a>.","apa":"Petritsch, B. (2017). Metadata for research data in practice. <i>Mitteilungen Der Vereinigung Österreichischer Bibliothekarinnen &#38; Bibliothekare</i>. VÖB. <a href=\"https://doi.org/10.31263/voebm.v70i2.1678\">https://doi.org/10.31263/voebm.v70i2.1678</a>","ista":"Petritsch B. 2017. Metadata for research data in practice. Mitteilungen der Vereinigung Österreichischer Bibliothekarinnen &#38; Bibliothekare. 70(2), 200–207."},"ddc":["020"],"scopus_import":1,"file_date_updated":"2020-07-14T12:48:11Z","date_published":"2017-08-01T00:00:00Z","oa_version":"Published Version","doi":"10.31263/voebm.v70i2.1678","publication_status":"published","month":"08","oa":1,"publication_identifier":{"issn":["10222588"]},"status":"public","_id":"825","year":"2017","abstract":[{"text":"What data is needed about data? Describing the process to answer this question for the institutional data repository IST DataRep.","lang":"eng"}],"issue":"2","date_updated":"2021-01-12T08:17:44Z"},{"date_created":"2020-08-26T11:48:11Z","publication":"2017 IEEE European Symposium on Security and Privacy Workshops","conference":{"end_date":"2017-04-28","location":"Paris, France","start_date":"2017-04-26","name":"EuroS&PW: European Symposium on Security and Privacy Workshops"},"publication_status":"published","doi":"10.1109/eurospw.2017.46","language":[{"iso":"eng"}],"date_published":"2017-06-30T00:00:00Z","oa_version":"None","type":"conference","article_processing_charge":"No","citation":{"apa":"Borge, M., Kokoris Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., &#38; Ford, B. (2017). Proof-of-personhood: Redemocratizing permissionless cryptocurrencies. In <i>2017 IEEE European Symposium on Security and Privacy Workshops</i>. Paris, France: IEEE. <a href=\"https://doi.org/10.1109/eurospw.2017.46\">https://doi.org/10.1109/eurospw.2017.46</a>","ista":"Borge M, Kokoris Kogias E, Jovanovic P, Gasser L, Gailly N, Ford B. 2017. Proof-of-personhood: Redemocratizing permissionless cryptocurrencies. 2017 IEEE European Symposium on Security and Privacy Workshops. EuroS&#38;PW: European Symposium on Security and Privacy Workshops, 7966966.","mla":"Borge, Maria, et al. “Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies.” <i>2017 IEEE European Symposium on Security and Privacy Workshops</i>, 7966966, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/eurospw.2017.46\">10.1109/eurospw.2017.46</a>.","chicago":"Borge, Maria, Eleftherios Kokoris Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, and Bryan Ford. “Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies.” In <i>2017 IEEE European Symposium on Security and Privacy Workshops</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/eurospw.2017.46\">https://doi.org/10.1109/eurospw.2017.46</a>.","ieee":"M. Borge, E. Kokoris Kogias, P. Jovanovic, L. Gasser, N. Gailly, and B. Ford, “Proof-of-personhood: Redemocratizing permissionless cryptocurrencies,” in <i>2017 IEEE European Symposium on Security and Privacy Workshops</i>, Paris, France, 2017.","ama":"Borge M, Kokoris Kogias E, Jovanovic P, Gasser L, Gailly N, Ford B. Proof-of-personhood: Redemocratizing permissionless cryptocurrencies. In: <i>2017 IEEE European Symposium on Security and Privacy Workshops</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/eurospw.2017.46\">10.1109/eurospw.2017.46</a>","short":"M. Borge, E. Kokoris Kogias, P. Jovanovic, L. Gasser, N. Gailly, B. Ford, in:, 2017 IEEE European Symposium on Security and Privacy Workshops, IEEE, 2017."},"quality_controlled":"1","day":"30","year":"2017","extern":"1","date_updated":"2021-01-12T08:17:57Z","abstract":[{"lang":"eng","text":"Permissionless blockchain-based cryptocurrencies commonly use proof-of-work (PoW) or proof-of-stake (PoS) to ensure their security, e.g. to prevent double spending attacks. However, both approaches have disadvantages: PoW leads to massive amounts of wasted electricity and re-centralization, whereas major stakeholders in PoS might be able to create a monopoly. In this work, we propose proof-of-personhood (PoP), a mechanism that binds physical entities to virtual identities in a way that enables accountability while preserving anonymity. Afterwards we introduce PoPCoin, a new cryptocurrency, whose consensus mechanism leverages PoP to eliminate the dis-advantages of PoW and PoS while ensuring security. PoPCoin leads to a continuously fair and democratic wealth creation process which paves the way for an experimental basic income infrastructure."}],"_id":"8299","article_number":"7966966","author":[{"first_name":"Maria","last_name":"Borge","full_name":"Borge, Maria"},{"full_name":"Kokoris Kogias, Eleftherios","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","last_name":"Kokoris Kogias","first_name":"Eleftherios"},{"first_name":"Philipp","last_name":"Jovanovic","full_name":"Jovanovic, Philipp"},{"first_name":"Linus","last_name":"Gasser","full_name":"Gasser, Linus"},{"last_name":"Gailly","first_name":"Nicolas","full_name":"Gailly, Nicolas"},{"full_name":"Ford, Bryan","first_name":"Bryan","last_name":"Ford"}],"title":"Proof-of-personhood: Redemocratizing permissionless cryptocurrencies","publication_identifier":{"eisbn":["9781538622445"]},"publisher":"IEEE","status":"public","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","month":"06"},{"main_file_link":[{"open_access":"1","url":"https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-nikitin.pdf"}],"article_processing_charge":"No","citation":{"ieee":"K. Nikitin <i>et al.</i>, “CHAINIAC: Proactive software-update transparency via collectively signed skipchains and verified builds,” in <i>Proceedings of the 26th USENIX Conference on Security Symposium</i>, Vancouver, Canada, 2017, pp. 1271–1287.","ama":"Nikitin K, Kokoris Kogias E, Jovanovic P, et al. CHAINIAC: Proactive software-update transparency via collectively signed skipchains and verified builds. In: <i>Proceedings of the 26th USENIX Conference on Security Symposium</i>. USENIX Association; 2017:1271–1287.","short":"K. Nikitin, E. Kokoris Kogias, P. Jovanovic, L. Gasser, N. Gailly, I. Khoffi, J. Cappos, B. Ford, in:, Proceedings of the 26th USENIX Conference on Security Symposium, USENIX Association, 2017, pp. 1271–1287.","chicago":"Nikitin, Kirill, Eleftherios Kokoris Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Justin Cappos, and Bryan Ford. “CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds.” In <i>Proceedings of the 26th USENIX Conference on Security Symposium</i>, 1271–1287. USENIX Association, 2017.","ista":"Nikitin K, Kokoris Kogias E, Jovanovic P, Gasser L, Gailly N, Khoffi I, Cappos J, Ford B. 2017. CHAINIAC: Proactive software-update transparency via collectively signed skipchains and verified builds. Proceedings of the 26th USENIX Conference on Security Symposium. SEC: Security Symposium, 1271–1287.","apa":"Nikitin, K., Kokoris Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Khoffi, I., … Ford, B. (2017). CHAINIAC: Proactive software-update transparency via collectively signed skipchains and verified builds. In <i>Proceedings of the 26th USENIX Conference on Security Symposium</i> (pp. 1271–1287). Vancouver, Canada: USENIX Association.","mla":"Nikitin, Kirill, et al. “CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds.” <i>Proceedings of the 26th USENIX Conference on Security Symposium</i>, USENIX Association, 2017, pp. 1271–1287."},"quality_controlled":"1","conference":{"start_date":"2017-08-16","name":"SEC: Security Symposium","end_date":"2017-08-18","location":"Vancouver, Canada"},"publication_status":"published","page":"1271–1287","date_created":"2020-08-26T12:04:44Z","publication":"Proceedings of the 26th USENIX Conference on Security Symposium","oa_version":"Published Version","type":"conference","language":[{"iso":"eng"}],"date_published":"2017-09-01T00:00:00Z","publisher":"USENIX Association","status":"public","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"CHAINIAC: Proactive software-update transparency via collectively signed skipchains and verified builds","oa":1,"publication_identifier":{"isbn":["9781931971409"]},"month":"09","date_updated":"2021-01-12T08:18:00Z","abstract":[{"text":"Software-update mechanisms are critical to the security of modern systems, but their typically centralized design presents a lucrative and frequently attacked target. In this work, we propose CHAINIAC, a decentralized software-update framework that eliminates single points of failure, enforces transparency, and provides efficient verifiability of integrity and authenticity for software-release processes. Independent witness servers collectively verify conformance of software updates to release policies, build verifiers validate the source-to-binary correspondence, and a tamper-proof release log stores collectively signed updates, thus ensuring that no release is accepted by clients before being widely disclosed and validated. The release log embodies a skipchain, a novel data structure, enabling arbitrarily out-of-date clients to efficiently validate updates and signing keys. Evaluation of our CHAINIAC prototype on reproducible Debian packages shows that the automated update process takes the average of 5 minutes per release for individual packages, and only 20 seconds for the aggregate timeline. We further evaluate the framework using real-world data from the PyPI package repository and show that it offers clients security comparable to verifying every single update themselves while consuming only one-fifth of the bandwidth and having a minimal computational overhead.","lang":"eng"}],"day":"01","extern":"1","year":"2017","author":[{"last_name":"Nikitin","first_name":"Kirill","full_name":"Nikitin, Kirill"},{"full_name":"Kokoris Kogias, Eleftherios","first_name":"Eleftherios","last_name":"Kokoris Kogias","id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30"},{"last_name":"Jovanovic","first_name":"Philipp","full_name":"Jovanovic, Philipp"},{"full_name":"Gasser, Linus","first_name":"Linus","last_name":"Gasser"},{"last_name":"Gailly","first_name":"Nicolas","full_name":"Gailly, Nicolas"},{"full_name":"Khoffi, Ismail","last_name":"Khoffi","first_name":"Ismail"},{"first_name":"Justin","last_name":"Cappos","full_name":"Cappos, Justin"},{"full_name":"Ford, Bryan","first_name":"Bryan","last_name":"Ford"}],"_id":"8301"},{"page":"444-460","date_created":"2020-08-26T12:26:08Z","publication":"2017 IEEE Symposium on Security and Privacy","conference":{"end_date":"2017-05-26","location":"San Jose, CA, United States","start_date":"2017-05-22","name":"SP: Symposium on Security and Privacy"},"publication_status":"published","doi":"10.1109/SP.2017.45","language":[{"iso":"eng"}],"date_published":"2017-06-01T00:00:00Z","type":"conference","oa_version":"Preprint","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2016/1067"}],"article_processing_charge":"No","quality_controlled":"1","citation":{"chicago":"Syta, E., P. Jovanovic, Eleftherios Kokoris Kogias, N. Gailly, L. Gasser, I. Khoffi, M. J. Fischer, and B. Ford. “Scalable Bias-Resistant Distributed Randomness.” In <i>2017 IEEE Symposium on Security and Privacy</i>, 444–60. IEEE, 2017. <a href=\"https://doi.org/10.1109/SP.2017.45\">https://doi.org/10.1109/SP.2017.45</a>.","mla":"Syta, E., et al. “Scalable Bias-Resistant Distributed Randomness.” <i>2017 IEEE Symposium on Security and Privacy</i>, IEEE, 2017, pp. 444–60, doi:<a href=\"https://doi.org/10.1109/SP.2017.45\">10.1109/SP.2017.45</a>.","apa":"Syta, E., Jovanovic, P., Kokoris Kogias, E., Gailly, N., Gasser, L., Khoffi, I., … Ford, B. (2017). Scalable bias-resistant distributed randomness. In <i>2017 IEEE Symposium on Security and Privacy</i> (pp. 444–460). San Jose, CA, United States: IEEE. <a href=\"https://doi.org/10.1109/SP.2017.45\">https://doi.org/10.1109/SP.2017.45</a>","ista":"Syta E, Jovanovic P, Kokoris Kogias E, Gailly N, Gasser L, Khoffi I, Fischer MJ, Ford B. 2017. Scalable bias-resistant distributed randomness. 2017 IEEE Symposium on Security and Privacy. SP: Symposium on Security and Privacy, 444–460.","short":"E. Syta, P. Jovanovic, E. Kokoris Kogias, N. Gailly, L. Gasser, I. Khoffi, M.J. Fischer, B. Ford, in:, 2017 IEEE Symposium on Security and Privacy, IEEE, 2017, pp. 444–460.","ama":"Syta E, Jovanovic P, Kokoris Kogias E, et al. Scalable bias-resistant distributed randomness. In: <i>2017 IEEE Symposium on Security and Privacy</i>. IEEE; 2017:444-460. doi:<a href=\"https://doi.org/10.1109/SP.2017.45\">10.1109/SP.2017.45</a>","ieee":"E. Syta <i>et al.</i>, “Scalable bias-resistant distributed randomness,” in <i>2017 IEEE Symposium on Security and Privacy</i>, San Jose, CA, United States, 2017, pp. 444–460."},"day":"01","year":"2017","extern":"1","date_updated":"2021-01-12T08:18:02Z","abstract":[{"text":"Bias-resistant public randomness is a critical component in many (distributed) protocols. Generating public randomness is hard, however, because active adversaries may behave dishonestly to bias public random choices toward their advantage. Existing solutions do not scale to hundreds or thousands of participants, as is needed in many decentralized systems. We propose two large-scale distributed protocols, RandHound and RandHerd, which provide publicly-verifiable, unpredictable, and unbiasable randomness against Byzantine adversaries. RandHound relies on an untrusted client to divide a set of randomness servers into groups for scalability, and it depends on the pigeonhole principle to ensure output integrity, even for non-random, adversarial group choices. RandHerd implements an efficient, decentralized randomness beacon. RandHerd is structurally similar to a BFT protocol, but uses RandHound in a one-time setup to arrange participants into verifiably unbiased random secret-sharing groups, which then repeatedly produce random output at predefined intervals. Our prototype demonstrates that RandHound and RandHerd achieve good performance across hundreds of participants while retaining a low failure probability by properly selecting protocol parameters, such as a group size and secret-sharing threshold. For example, when sharding 512 nodes into groups of 32, our experiments show that RandHound can produce fresh random output after 240 seconds. RandHerd, after a setup phase of 260 seconds, is able to generate fresh random output in intervals of approximately 6 seconds. For this configuration, both protocols operate at a failure probability of at most 0.08% against a Byzantine adversary.","lang":"eng"}],"_id":"8306","author":[{"last_name":"Syta","first_name":"E.","full_name":"Syta, E."},{"full_name":"Jovanovic, P.","first_name":"P.","last_name":"Jovanovic"},{"id":"f5983044-d7ef-11ea-ac6d-fd1430a26d30","last_name":"Kokoris Kogias","first_name":"Eleftherios","full_name":"Kokoris Kogias, Eleftherios"},{"first_name":"N.","last_name":"Gailly","full_name":"Gailly, N."},{"full_name":"Gasser, L.","first_name":"L.","last_name":"Gasser"},{"full_name":"Khoffi, I.","last_name":"Khoffi","first_name":"I."},{"full_name":"Fischer, M. J.","last_name":"Fischer","first_name":"M. J."},{"full_name":"Ford, B.","first_name":"B.","last_name":"Ford"}],"title":"Scalable bias-resistant distributed randomness","oa":1,"publication_identifier":{"isbn":["9781509055340"],"issn":["2375-1207"]},"status":"public","publisher":"IEEE","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","month":"06"},{"conference":{"start_date":"2017-08-22","name":"CAIP: Computer Analysis of Images and Patterns","end_date":"2017-08-24","location":"Ystad, Sweden"},"publication_status":"published","doi":"10.1007/978-3-319-64689-3_32","oa_version":"Submitted Version","date_published":"2017-07-28T00:00:00Z","scopus_import":"1","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1705.02045"}],"intvolume":"     10424","citation":{"ista":"Heiss T, Wagner H. 2017. Streaming algorithm for Euler characteristic curves of multidimensional images. CAIP: Computer Analysis of Images and Patterns, LNCS, vol. 10424, 397–409.","mla":"Heiss, Teresa, and Hubert Wagner. <i>Streaming Algorithm for Euler Characteristic Curves of Multidimensional Images</i>. Edited by Michael Felsberg et al., vol. 10424, Springer, 2017, pp. 397–409, doi:<a href=\"https://doi.org/10.1007/978-3-319-64689-3_32\">10.1007/978-3-319-64689-3_32</a>.","apa":"Heiss, T., &#38; Wagner, H. (2017). Streaming algorithm for Euler characteristic curves of multidimensional images. In M. Felsberg, A. Heyden, &#38; N. Krüger (Eds.) (Vol. 10424, pp. 397–409). Presented at the CAIP: Computer Analysis of Images and Patterns, Ystad, Sweden: Springer. <a href=\"https://doi.org/10.1007/978-3-319-64689-3_32\">https://doi.org/10.1007/978-3-319-64689-3_32</a>","chicago":"Heiss, Teresa, and Hubert Wagner. “Streaming Algorithm for Euler Characteristic Curves of Multidimensional Images.” edited by Michael Felsberg, Anders Heyden, and Norbert Krüger, 10424:397–409. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-64689-3_32\">https://doi.org/10.1007/978-3-319-64689-3_32</a>.","ama":"Heiss T, Wagner H. Streaming algorithm for Euler characteristic curves of multidimensional images. In: Felsberg M, Heyden A, Krüger N, eds. Vol 10424. Springer; 2017:397-409. doi:<a href=\"https://doi.org/10.1007/978-3-319-64689-3_32\">10.1007/978-3-319-64689-3_32</a>","ieee":"T. Heiss and H. Wagner, “Streaming algorithm for Euler characteristic curves of multidimensional images,” presented at the CAIP: Computer Analysis of Images and Patterns, Ystad, Sweden, 2017, vol. 10424, pp. 397–409.","short":"T. Heiss, H. Wagner, in:, M. Felsberg, A. Heyden, N. Krüger (Eds.), Springer, 2017, pp. 397–409."},"date_updated":"2023-09-26T16:10:03Z","abstract":[{"lang":"eng","text":"We present an efficient algorithm to compute Euler characteristic curves of gray scale images of arbitrary dimension. In various applications the Euler characteristic curve is used as a descriptor of an image. Our algorithm is the first streaming algorithm for Euler characteristic curves. The usage of streaming removes the necessity to store the entire image in RAM. Experiments show that our implementation handles terabyte scale images on commodity hardware. Due to lock-free parallelism, it scales well with the number of processor cores. Additionally, we put the concept of the Euler characteristic curve in the wider context of computational topology. In particular, we explain the connection with persistence diagrams."}],"year":"2017","_id":"833","status":"public","publication_identifier":{"issn":["03029743"]},"oa":1,"month":"07","date_created":"2018-12-11T11:48:45Z","page":"397 - 409","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"HeEd"}],"publist_id":"6815","article_processing_charge":"No","external_id":{"isi":["000432085900032"]},"volume":10424,"quality_controlled":"1","editor":[{"full_name":"Felsberg, Michael","first_name":"Michael","last_name":"Felsberg"},{"first_name":"Anders","last_name":"Heyden","full_name":"Heyden, Anders"},{"full_name":"Krüger, Norbert","last_name":"Krüger","first_name":"Norbert"}],"day":"28","author":[{"full_name":"Heiss, Teresa","last_name":"Heiss","id":"4879BB4E-F248-11E8-B48F-1D18A9856A87","first_name":"Teresa","orcid":"0000-0002-1780-2689"},{"first_name":"Hubert","id":"379CA8B8-F248-11E8-B48F-1D18A9856A87","last_name":"Wagner","full_name":"Wagner, Hubert"}],"isi":1,"publisher":"Springer","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","title":"Streaming algorithm for Euler characteristic curves of multidimensional images","alternative_title":["LNCS"]},{"title":"Thouless energy and multifractality across the many-body localization transition","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","publisher":"American Physical Society","day":"06","acknowledgement":"We   acknowledge   useful   discussions with V. Kravtsov, T. Grover, and R. Vasseur.  M.S. was supported by Gordon and Betty Moore Foundation’s EPiQS Initiative through Grant GBMF4307.  M.S. and D.A.  acknowledge  hospitality  of  KITP,  where  parts  of this work were completed (supported in part by the National Science Foundation under Grant No. NSF PHY11-25915)","isi":1,"author":[{"first_name":"Maksym","orcid":"0000-0002-2399-5827","id":"47809E7E-F248-11E8-B48F-1D18A9856A87","last_name":"Serbyn","full_name":"Serbyn, Maksym"},{"full_name":"Zlatko, Papic","first_name":"Papic","last_name":"Zlatko"},{"first_name":"Dmitry","last_name":"Abanin","full_name":"Abanin, Dmitry"}],"article_processing_charge":"No","publist_id":"6814","volume":96,"quality_controlled":"1","external_id":{"isi":["000409429300004"]},"publication":"Physical Review B - Condensed Matter and Materials Physics","date_created":"2018-12-11T11:48:45Z","department":[{"_id":"MaSe"}],"language":[{"iso":"eng"}],"type":"journal_article","oa":1,"publication_identifier":{"issn":["24699950"]},"status":"public","month":"09","year":"2017","abstract":[{"lang":"eng","text":"Thermal and many-body localized phases are separated by a dynamical phase transition of a new kind. We analyze the distribution of off-diagonal matrix elements of local operators across this transition in two different models of disordered spin chains. We show that the behavior of matrix elements can be used to characterize the breakdown of thermalization and to extract the many-body Thouless energy. We find that upon increasing the disorder strength the system enters a critical region around the many-body localization transition. The properties of the system in this region are: (i) the Thouless energy becomes smaller than the level spacing, (ii) the matrix elements show critical dependence on the energy difference, and (iii) the matrix elements, viewed as amplitudes of a fictitious wave function, exhibit strong multifractality. This critical region decreases with the system size, which we interpret as evidence for a diverging correlation length at the many-body localization transition. Our findings show that the correlation length becomes larger than the accessible system sizes in a broad range of disorder strength values and shed light on the critical behavior near the many-body localization transition."}],"issue":"10","date_updated":"2023-09-26T15:51:54Z","_id":"834","article_number":"104201","scopus_import":"1","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1610.02389"}],"intvolume":"        96","citation":{"apa":"Serbyn, M., Zlatko, P., &#38; Abanin, D. (2017). Thouless energy and multifractality across the many-body localization transition. <i>Physical Review B - Condensed Matter and Materials Physics</i>. American Physical Society. <a href=\"https://doi.org/10.1103/PhysRevB.96.104201\">https://doi.org/10.1103/PhysRevB.96.104201</a>","ista":"Serbyn M, Zlatko P, Abanin D. 2017. Thouless energy and multifractality across the many-body localization transition. Physical Review B - Condensed Matter and Materials Physics. 96(10), 104201.","mla":"Serbyn, Maksym, et al. “Thouless Energy and Multifractality across the Many-Body Localization Transition.” <i>Physical Review B - Condensed Matter and Materials Physics</i>, vol. 96, no. 10, 104201, American Physical Society, 2017, doi:<a href=\"https://doi.org/10.1103/PhysRevB.96.104201\">10.1103/PhysRevB.96.104201</a>.","chicago":"Serbyn, Maksym, Papic Zlatko, and Dmitry Abanin. “Thouless Energy and Multifractality across the Many-Body Localization Transition.” <i>Physical Review B - Condensed Matter and Materials Physics</i>. American Physical Society, 2017. <a href=\"https://doi.org/10.1103/PhysRevB.96.104201\">https://doi.org/10.1103/PhysRevB.96.104201</a>.","ama":"Serbyn M, Zlatko P, Abanin D. Thouless energy and multifractality across the many-body localization transition. <i>Physical Review B - Condensed Matter and Materials Physics</i>. 2017;96(10). doi:<a href=\"https://doi.org/10.1103/PhysRevB.96.104201\">10.1103/PhysRevB.96.104201</a>","ieee":"M. Serbyn, P. Zlatko, and D. Abanin, “Thouless energy and multifractality across the many-body localization transition,” <i>Physical Review B - Condensed Matter and Materials Physics</i>, vol. 96, no. 10. American Physical Society, 2017.","short":"M. Serbyn, P. Zlatko, D. Abanin, Physical Review B - Condensed Matter and Materials Physics 96 (2017)."},"doi":"10.1103/PhysRevB.96.104201","publication_status":"published","date_published":"2017-09-06T00:00:00Z","oa_version":"Submitted Version"},{"type":"journal_article","language":[{"iso":"eng"}],"has_accepted_license":"1","publication":"Nature Communications","date_created":"2018-12-11T11:48:45Z","volume":8,"quality_controlled":"1","external_id":{"isi":["000406360100001"]},"pubrep_id":"859","article_processing_charge":"No","publist_id":"6813","author":[{"first_name":"Kalpana","last_name":"Makhijani","full_name":"Makhijani, Kalpana"},{"full_name":"Alexander, Brandy","first_name":"Brandy","last_name":"Alexander"},{"last_name":"Rao","first_name":"Deepti","full_name":"Rao, Deepti"},{"full_name":"Petraki, Sophia","last_name":"Petraki","first_name":"Sophia"},{"full_name":"Herboso, Leire","last_name":"Herboso","first_name":"Leire"},{"first_name":"Katelyn","last_name":"Kukar","full_name":"Kukar, Katelyn"},{"full_name":"Batool, Itrat","first_name":"Itrat","last_name":"Batool"},{"last_name":"Wachner","id":"2A95E7B0-F248-11E8-B48F-1D18A9856A87","first_name":"Stephanie","full_name":"Wachner, Stephanie"},{"full_name":"Gold, Katrina","last_name":"Gold","first_name":"Katrina"},{"last_name":"Wong","first_name":"Corinna","full_name":"Wong, Corinna"},{"full_name":"O'Connor, Michael","first_name":"Michael","last_name":"O'Connor"},{"first_name":"Katja","last_name":"Brückner","full_name":"Brückner, Katja"}],"isi":1,"file":[{"relation":"main_file","content_type":"application/pdf","file_size":3027104,"file_name":"IST-2017-859-v1+1_ncomms15990.pdf","date_updated":"2020-07-14T12:48:12Z","date_created":"2018-12-12T10:15:32Z","checksum":"99a3d63308d4250eda0a35341171f80e","file_id":"5153","creator":"system","access_level":"open_access"}],"extern":"1","day":"27","tmp":{"short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","publisher":"Nature Publishing Group","title":"Regulation of Drosophila hematopoietic sites by Activin-β from active sensory neurons","oa_version":"Published Version","date_published":"2017-07-27T00:00:00Z","doi":"10.1038/ncomms15990","publication_status":"published","citation":{"chicago":"Makhijani, Kalpana, Brandy Alexander, Deepti Rao, Sophia Petraki, Leire Herboso, Katelyn Kukar, Itrat Batool, et al. “Regulation of Drosophila Hematopoietic Sites by Activin-β from Active Sensory Neurons.” <i>Nature Communications</i>. Nature Publishing Group, 2017. <a href=\"https://doi.org/10.1038/ncomms15990\">https://doi.org/10.1038/ncomms15990</a>.","mla":"Makhijani, Kalpana, et al. “Regulation of Drosophila Hematopoietic Sites by Activin-β from Active Sensory Neurons.” <i>Nature Communications</i>, vol. 8, 15990, Nature Publishing Group, 2017, doi:<a href=\"https://doi.org/10.1038/ncomms15990\">10.1038/ncomms15990</a>.","ista":"Makhijani K, Alexander B, Rao D, Petraki S, Herboso L, Kukar K, Batool I, Wachner S, Gold K, Wong C, O’Connor M, Brückner K. 2017. Regulation of Drosophila hematopoietic sites by Activin-β from active sensory neurons. Nature Communications. 8, 15990.","apa":"Makhijani, K., Alexander, B., Rao, D., Petraki, S., Herboso, L., Kukar, K., … Brückner, K. (2017). Regulation of Drosophila hematopoietic sites by Activin-β from active sensory neurons. <i>Nature Communications</i>. Nature Publishing Group. <a href=\"https://doi.org/10.1038/ncomms15990\">https://doi.org/10.1038/ncomms15990</a>","short":"K. Makhijani, B. Alexander, D. Rao, S. Petraki, L. Herboso, K. Kukar, I. Batool, S. Wachner, K. Gold, C. Wong, M. O’Connor, K. Brückner, Nature Communications 8 (2017).","ieee":"K. Makhijani <i>et al.</i>, “Regulation of Drosophila hematopoietic sites by Activin-β from active sensory neurons,” <i>Nature Communications</i>, vol. 8. Nature Publishing Group, 2017.","ama":"Makhijani K, Alexander B, Rao D, et al. Regulation of Drosophila hematopoietic sites by Activin-β from active sensory neurons. <i>Nature Communications</i>. 2017;8. doi:<a href=\"https://doi.org/10.1038/ncomms15990\">10.1038/ncomms15990</a>"},"intvolume":"         8","file_date_updated":"2020-07-14T12:48:12Z","ddc":["570","576","616"],"article_number":"15990","_id":"835","abstract":[{"text":"An outstanding question in animal development, tissue homeostasis and disease is how cell populations adapt to sensory inputs. During Drosophila larval development, hematopoietic sites are in direct contact with sensory neuron clusters of the peripheral nervous system (PNS), and blood cells (hemocytes) require the PNS for their survival and recruitment to these microenvironments, known as Hematopoietic Pockets. Here we report that Activin-β, a TGF-β family ligand, is expressed by sensory neurons of the PNS and regulates the proliferation and adhesion of hemocytes. These hemocyte responses depend on PNS activity, as shown by agonist treatment and transient silencing of sensory neurons. Activin-β has a key role in this regulation, which is apparent from reporter expression and mutant analyses. This mechanism of local sensory neurons controlling blood cell adaptation invites evolutionary parallels with vertebrate hematopoietic progenitors and the independent myeloid system of tissue macrophages, whose regulation by local microenvironments remain undefined.","lang":"eng"}],"date_updated":"2023-09-26T15:51:28Z","year":"2017","month":"07","status":"public","publication_identifier":{"issn":["20411723"]},"oa":1},{"publication":"Special Sessions in Applications of Computer Algebra","page":"119 - 136","date_created":"2018-12-11T11:48:46Z","department":[{"_id":"HeEd"}],"language":[{"iso":"eng"}],"type":"conference","article_processing_charge":"No","publist_id":"6812","quality_controlled":"1","volume":198,"external_id":{"isi":["000434088200008"]},"day":"27","isi":1,"author":[{"last_name":"Ethier","first_name":"Marc","full_name":"Ethier, Marc"},{"full_name":"Jablonski, Grzegorz","id":"4483EF78-F248-11E8-B48F-1D18A9856A87","last_name":"Jablonski","orcid":"0000-0002-3536-9866","first_name":"Grzegorz"},{"full_name":"Mrozek, Marian","first_name":"Marian","last_name":"Mrozek"}],"project":[{"call_identifier":"FP7","name":"Topological Complex Systems","_id":"255D761E-B435-11E9-9278-68D0E5697425","grant_number":"318493"}],"title":"Finding eigenvalues of self-maps with the Kronecker canonical form","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","publisher":"Springer","alternative_title":["PROMS"],"doi":"10.1007/978-3-319-56932-1_8","conference":{"name":"ACA: Applications of Computer Algebra","start_date":"2015-07-20","location":"Kalamata, Greece","end_date":"2015-07-23"},"publication_status":"published","date_published":"2017-07-27T00:00:00Z","oa_version":"None","scopus_import":"1","citation":{"apa":"Ethier, M., Jablonski, G., &#38; Mrozek, M. (2017). Finding eigenvalues of self-maps with the Kronecker canonical form. In <i>Special Sessions in Applications of Computer Algebra</i> (Vol. 198, pp. 119–136). Kalamata, Greece: Springer. <a href=\"https://doi.org/10.1007/978-3-319-56932-1_8\">https://doi.org/10.1007/978-3-319-56932-1_8</a>","ista":"Ethier M, Jablonski G, Mrozek M. 2017. Finding eigenvalues of self-maps with the Kronecker canonical form. Special Sessions in Applications of Computer Algebra. ACA: Applications of Computer Algebra, PROMS, vol. 198, 119–136.","mla":"Ethier, Marc, et al. “Finding Eigenvalues of Self-Maps with the Kronecker Canonical Form.” <i>Special Sessions in Applications of Computer Algebra</i>, vol. 198, Springer, 2017, pp. 119–36, doi:<a href=\"https://doi.org/10.1007/978-3-319-56932-1_8\">10.1007/978-3-319-56932-1_8</a>.","chicago":"Ethier, Marc, Grzegorz Jablonski, and Marian Mrozek. “Finding Eigenvalues of Self-Maps with the Kronecker Canonical Form.” In <i>Special Sessions in Applications of Computer Algebra</i>, 198:119–36. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-56932-1_8\">https://doi.org/10.1007/978-3-319-56932-1_8</a>.","ieee":"M. Ethier, G. Jablonski, and M. Mrozek, “Finding eigenvalues of self-maps with the Kronecker canonical form,” in <i>Special Sessions in Applications of Computer Algebra</i>, Kalamata, Greece, 2017, vol. 198, pp. 119–136.","ama":"Ethier M, Jablonski G, Mrozek M. Finding eigenvalues of self-maps with the Kronecker canonical form. In: <i>Special Sessions in Applications of Computer Algebra</i>. Vol 198. Springer; 2017:119-136. doi:<a href=\"https://doi.org/10.1007/978-3-319-56932-1_8\">10.1007/978-3-319-56932-1_8</a>","short":"M. Ethier, G. Jablonski, M. Mrozek, in:, Special Sessions in Applications of Computer Algebra, Springer, 2017, pp. 119–136."},"intvolume":"       198","year":"2017","abstract":[{"lang":"eng","text":"Recent research has examined how to study the topological features of a continuous self-map by means of the persistence of the eigenspaces, for given eigenvalues, of the endomorphism induced in homology over a field. This raised the question of how to select dynamically significant eigenvalues. The present paper aims to answer this question, giving an algorithm that computes the persistence of eigenspaces for every eigenvalue simultaneously, also expressing said eigenspaces as direct sums of “finite” and “singular” subspaces."}],"date_updated":"2023-09-26T15:50:52Z","_id":"836","publication_identifier":{"isbn":["978-331956930-7"]},"status":"public","ec_funded":1,"month":"07"},{"year":"2017","date_updated":"2023-09-07T12:06:38Z","abstract":[{"text":"The hippocampus is a key brain region for memory and notably for spatial memory, and is needed for both spatial working and reference memories. Hippocampal place cells selectively discharge in specific locations of the environment to form mnemonic represen tations of space. Several behavioral protocols have been designed to test spatial memory which requires the experimental subject to utilize working memory and reference memory. However, less is known about how these memory traces are presented in the hippo campus, especially considering tasks that require both spatial working and long -term reference memory demand. The aim of my thesis was to elucidate how spatial working memory, reference memory, and the combination of both are represented in the hippocampus. In this thesis, using a radial eight -arm maze, I examined how the combined demand on these memories influenced place cell assemblies while reference memories were partially updated by changing some of the reward- arms. This was contrasted with task varian ts requiring working or reference memories only. Reference memory update led to gradual place field shifts towards the rewards on the switched arms. Cells developed enhanced firing in passes between newly -rewarded arms as compared to those containing an unchanged reward. The working memory task did not show such gradual changes. Place assemblies on occasions replayed trajectories of the maze; at decision points the next arm choice was preferentially replayed in tasks needing reference memory while in the pure working memory task the previously visited arm was replayed. Hence trajectory replay only reflected the decision of the animal in tasks needing reference memory update. At the reward locations, in all three tasks outbound trajectories of the current arm were preferentially replayed, showing the animals’ next path to the center. At reward locations trajectories were replayed preferentially in reverse temporal order. Moreover, in the center reverse replay was seen in the working memory task but in the other tasks forward replay was seen. Hence, the direction of reactivation was determined by the goal locations so that part of the trajectory which was closer to the goal was reactivated later in an HSE while places further away from the goal were reactivated earlier. Altogether my work demonstrated that reference memory update triggers several levels of reorganization of the hippocampal cognitive map which are not seen in simpler working memory demand s. Moreover, hippocampus is likely to be involved in spatial decisions through reactivating planned trajectories when reference memory recall is required for such a decision. ","lang":"eng"}],"_id":"837","oa":1,"publication_identifier":{"issn":["2663-337X"]},"status":"public","month":"08","publication_status":"published","doi":"10.15479/AT:ISTA:th_858","date_published":"2017-08-23T00:00:00Z","oa_version":"Published Version","ddc":["571"],"file_date_updated":"2020-07-14T12:48:12Z","citation":{"ama":"Xu H. Reactivation of the hippocampal cognitive map in goal-directed spatial tasks. 2017. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:th_858\">10.15479/AT:ISTA:th_858</a>","ieee":"H. Xu, “Reactivation of the hippocampal cognitive map in goal-directed spatial tasks,” Institute of Science and Technology Austria, 2017.","short":"H. Xu, Reactivation of the Hippocampal Cognitive Map in Goal-Directed Spatial Tasks, Institute of Science and Technology Austria, 2017.","chicago":"Xu, Haibing. “Reactivation of the Hippocampal Cognitive Map in Goal-Directed Spatial Tasks.” Institute of Science and Technology Austria, 2017. <a href=\"https://doi.org/10.15479/AT:ISTA:th_858\">https://doi.org/10.15479/AT:ISTA:th_858</a>.","apa":"Xu, H. (2017). <i>Reactivation of the hippocampal cognitive map in goal-directed spatial tasks</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:th_858\">https://doi.org/10.15479/AT:ISTA:th_858</a>","ista":"Xu H. 2017. Reactivation of the hippocampal cognitive map in goal-directed spatial tasks. Institute of Science and Technology Austria.","mla":"Xu, Haibing. <i>Reactivation of the Hippocampal Cognitive Map in Goal-Directed Spatial Tasks</i>. Institute of Science and Technology Austria, 2017, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:th_858\">10.15479/AT:ISTA:th_858</a>."},"day":"23","tmp":{"short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"acknowledgement":"I am very grateful for the opportunity I have had as a graduate student to explore and incredibly interesting branch of neuroscience, and for the people who made it possible. Firstly, I would like to offer my thanks to my supervisor Professor Jozsef Csicsvari for his great support, guidance and patience offered over the years. The door to his office was always open whenever I had questions. I have learned a lot from him about carefully designing experiments, asking interesting questions and how to integrate results into a broader picture. I also express my gratitude to the remarkable post- doc , Dr. Joseph O’Neill. He is a gre at scientific role model who is always willing to teach , and advice and talk through problems with his full attention. Many thanks to my wonderful “office mates” over the years and their support and encouragement, Alice Avernhe, Philipp Schönenberger, Desiree Dickerson, Karel Blahna, Charlotte Boccara, Igor Gridchyn, Peter Baracskay, Krisztián Kovács, Dámaris Rangel, Karola Käfer and Federico Stella. They were the ones in the lab for the many useful discussions about science and for making the laboratory such a nice and friendly place to work in. A special thank goes to Michael LoBianco and Jago Wallenschus for wonderful technical support. I would also like to thank Professor Peter Jonas and Professor David M Bannerman for being my qualifying exam and thesi s committee members despite their busy schedule. I am also very thankful to IST Austria for their support all throughout my PhD. ","file":[{"file_size":3589490,"relation":"source_file","content_type":"application/vnd.openxmlformats-officedocument.wordprocessingml.document","access_level":"closed","file_id":"6213","creator":"dernst","checksum":"f11925fbbce31e495124b6bc4f10573c","date_created":"2019-04-05T08:59:51Z","file_name":"2017_Xu_Haibing_Thesis_Source.docx","date_updated":"2020-07-14T12:48:12Z"},{"relation":"main_file","content_type":"application/pdf","file_size":11668613,"file_id":"6214","creator":"dernst","checksum":"ffb10749a537d615fab1ef0937ccb157","access_level":"open_access","date_updated":"2020-07-14T12:48:12Z","file_name":"2017_Xu_Thesis_IST.pdf","date_created":"2019-04-05T08:59:51Z"}],"author":[{"full_name":"Xu, Haibing","first_name":"Haibing","last_name":"Xu","id":"310349D0-F248-11E8-B48F-1D18A9856A87"}],"title":"Reactivation of the hippocampal cognitive map in goal-directed spatial tasks","publisher":"Institute of Science and Technology Austria","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","supervisor":[{"full_name":"Csicsvari, Jozsef L","id":"3FA14672-F248-11E8-B48F-1D18A9856A87","last_name":"Csicsvari","orcid":"0000-0002-5193-4036","first_name":"Jozsef L"}],"alternative_title":["ISTA Thesis"],"degree_awarded":"PhD","page":"93","date_created":"2018-12-11T11:48:46Z","has_accepted_license":"1","language":[{"iso":"eng"}],"department":[{"_id":"JoCs"}],"type":"dissertation","publist_id":"6811","article_processing_charge":"No","pubrep_id":"858","related_material":{"record":[{"id":"5828","status":"public","relation":"part_of_dissertation"}]}},{"date_updated":"2023-09-07T12:02:28Z","abstract":[{"lang":"eng","text":"In this thesis we discuss the exact security of message authentications codes HMAC , NMAC , and PMAC . NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a variable input-length function. A practical single-key variant of NMAC called HMAC is a very popular and widely deployed message authentication code (MAC). PMAC is a block-cipher based mode of operation, which also happens to be the most famous fully parallel MAC. NMAC was introduced by Bellare, Canetti and Krawczyk Crypto’96, who proved it to be a secure pseudorandom function (PRF), and thus also a MAC, under two assumptions. Unfortunately, for many instantiations of HMAC one of them has been found to be wrong. To restore the provable guarantees for NMAC , Bellare [Crypto’06] showed its security without this assumption. PMAC was introduced by Black and Rogaway at Eurocrypt 2002. If instantiated with a pseudorandom permutation over n -bit strings, PMAC constitutes a provably secure variable input-length PRF. For adversaries making q queries, each of length at most ` (in n -bit blocks), and of total length σ ≤ q` , the original paper proves an upper bound on the distinguishing advantage of O ( σ 2 / 2 n ), while the currently best bound is O ( qσ/ 2 n ). In this work we show that this bound is tight by giving an attack with advantage Ω( q 2 `/ 2 n ). In the PMAC construction one initially XORs a mask to every message block, where the mask for the i th block is computed as τ i := γ i · L , where L is a (secret) random value, and γ i is the i -th codeword of the Gray code. Our attack applies more generally to any sequence of γ i ’s which contains a large coset of a subgroup of GF (2 n ). As for NMAC , our first contribution is a simpler and uniform proof: If f is an ε -secure PRF (against q queries) and a δ - non-adaptively secure PRF (against q queries), then NMAC f is an ( ε + `qδ )-secure PRF against q queries of length at most ` blocks each. We also show that this ε + `qδ bound is basically tight by constructing an f for which an attack with advantage `qδ exists. Moreover, we analyze the PRF-security of a modification of NMAC called NI by An and Bellare that avoids the constant rekeying on multi-block messages in NMAC and allows for an information-theoretic analysis. We carry out such an analysis, obtaining a tight `q 2 / 2 c bound for this step, improving over the trivial bound of ` 2 q 2 / 2 c . Finally, we investigate, if the security of PMAC can be further improved by using τ i ’s that are k -wise independent, for k &gt; 1 (the original has k = 1). We observe that the security of PMAC will not increase in general if k = 2, and then prove that the security increases to O ( q 2 / 2 n ), if the k = 4. Due to simple extension attacks, this is the best bound one can hope for, using any distribution on the masks. Whether k = 3 is already sufficient to get this level of security is left as an open problem. Keywords: Message authentication codes, Pseudorandom functions, HMAC, PMAC. "}],"year":"2017","_id":"838","status":"public","oa":1,"publication_identifier":{"issn":["2663-337X"]},"month":"06","publication_status":"published","doi":"10.15479/AT:ISTA:th_828","oa_version":"Published Version","date_published":"2017-06-26T00:00:00Z","file_date_updated":"2020-07-14T12:48:12Z","ddc":["000"],"citation":{"ama":"Rybar M. (The exact security of) Message authentication codes. 2017. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:th_828\">10.15479/AT:ISTA:th_828</a>","ieee":"M. Rybar, “(The exact security of) Message authentication codes,” Institute of Science and Technology Austria, 2017.","short":"M. Rybar, (The Exact Security of) Message Authentication Codes, Institute of Science and Technology Austria, 2017.","chicago":"Rybar, Michal. “(The Exact Security of) Message Authentication Codes.” Institute of Science and Technology Austria, 2017. <a href=\"https://doi.org/10.15479/AT:ISTA:th_828\">https://doi.org/10.15479/AT:ISTA:th_828</a>.","apa":"Rybar, M. (2017). <i>(The exact security of) Message authentication codes</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:th_828\">https://doi.org/10.15479/AT:ISTA:th_828</a>","mla":"Rybar, Michal. <i>(The Exact Security of) Message Authentication Codes</i>. Institute of Science and Technology Austria, 2017, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:th_828\">10.15479/AT:ISTA:th_828</a>.","ista":"Rybar M. 2017. (The exact security of) Message authentication codes. Institute of Science and Technology Austria."},"day":"26","author":[{"full_name":"Rybar, Michal","last_name":"Rybar","id":"2B3E3DE8-F248-11E8-B48F-1D18A9856A87","first_name":"Michal"}],"file":[{"date_created":"2018-12-12T10:10:13Z","date_updated":"2020-07-14T12:48:12Z","file_name":"IST-2017-828-v1+3_2017_Rybar_thesis.pdf","access_level":"open_access","file_id":"4799","checksum":"ff8639ec4bded6186f44c7bd3ee26804","creator":"system","file_size":847400,"content_type":"application/pdf","relation":"main_file"},{"date_created":"2019-04-05T08:24:11Z","file_name":"2017_Thesis_Rybar_source.zip","date_updated":"2020-07-14T12:48:12Z","access_level":"closed","checksum":"3462101745ce8ad199c2d0f75dae4a7e","file_id":"6202","creator":"dernst","file_size":26054879,"relation":"source_file","content_type":"application/zip"}],"publisher":"Institute of Science and Technology Austria","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","title":"(The exact security of) Message authentication codes","degree_awarded":"PhD","alternative_title":["ISTA Thesis"],"has_accepted_license":"1","page":"86","date_created":"2018-12-11T11:48:46Z","type":"dissertation","language":[{"iso":"eng"}],"department":[{"_id":"KrPi"}],"publist_id":"6810","pubrep_id":"828","article_processing_charge":"No","related_material":{"record":[{"id":"2082","status":"public","relation":"part_of_dissertation"},{"relation":"part_of_dissertation","status":"public","id":"6196"}]}},{"publication_status":"published","doi":"10.15479/AT:ISTA:th_855","date_published":"2017-08-14T00:00:00Z","oa_version":"Published Version","ddc":["004","005","006","531","621"],"file_date_updated":"2020-07-14T12:48:13Z","citation":{"chicago":"Hahn, David. “Brittle Fracture Simulation with Boundary Elements for Computer Graphics.” Institute of Science and Technology Austria, 2017. <a href=\"https://doi.org/10.15479/AT:ISTA:th_855\">https://doi.org/10.15479/AT:ISTA:th_855</a>.","ista":"Hahn D. 2017. Brittle fracture simulation with boundary elements for computer graphics. Institute of Science and Technology Austria.","apa":"Hahn, D. (2017). <i>Brittle fracture simulation with boundary elements for computer graphics</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:th_855\">https://doi.org/10.15479/AT:ISTA:th_855</a>","mla":"Hahn, David. <i>Brittle Fracture Simulation with Boundary Elements for Computer Graphics</i>. Institute of Science and Technology Austria, 2017, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:th_855\">10.15479/AT:ISTA:th_855</a>.","short":"D. Hahn, Brittle Fracture Simulation with Boundary Elements for Computer Graphics, Institute of Science and Technology Austria, 2017.","ama":"Hahn D. Brittle fracture simulation with boundary elements for computer graphics. 2017. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:th_855\">10.15479/AT:ISTA:th_855</a>","ieee":"D. Hahn, “Brittle fracture simulation with boundary elements for computer graphics,” Institute of Science and Technology Austria, 2017."},"year":"2017","date_updated":"2024-02-21T13:48:02Z","abstract":[{"lang":"eng","text":"This thesis describes a brittle fracture simulation method for visual effects applications. Building upon a symmetric Galerkin boundary element method, we first compute stress intensity factors following the theory of linear elastic fracture mechanics. We then use these stress intensities to simulate the motion of a propagating crack front at a significantly higher resolution than the overall deformation of the breaking object. Allowing for spatial variations of the material's toughness during crack propagation produces visually realistic, highly-detailed fracture surfaces. Furthermore, we introduce approximations for stress intensities and crack opening displacements, resulting in both practical speed-up and theoretically superior runtime complexity compared to previous methods. While we choose a quasi-static approach to fracture mechanics, ignoring dynamic deformations, we also couple our fracture simulation framework to a standard rigid-body dynamics solver, enabling visual effects artists to simulate both large scale motion, as well as fracturing due to collision forces in a combined system. As fractures inside of an object grow, their geometry must be represented both in the coarse boundary element mesh, as well as at the desired fine output resolution. Using a boundary element method, we avoid complicated volumetric meshing operations. Instead we describe a simple set of surface meshing operations that allow us to progressively add cracks to the mesh of an object and still re-use all previously computed entries of the linear boundary element system matrix. On the high resolution level, we opt for an implicit surface representation. We then describe how to capture fracture surfaces during crack propagation, as well as separate the individual fragments resulting from the fracture process, based on this implicit representation. We show results obtained with our method, either solving the full boundary element system in every time step, or alternatively using our fast approximations. These results demonstrate that both of these methods perform well in basic test cases and produce realistic fracture surfaces. Furthermore we show that our fast approximations substantially out-perform the standard approach in more demanding scenarios. Finally, these two methods naturally combine, using the full solution while the problem size is manageably small and switching to the fast approximations later on. The resulting hybrid method gives the user a direct way to choose between speed and accuracy of the simulation. "}],"_id":"839","oa":1,"publication_identifier":{"issn":["2663-337X"]},"status":"public","ec_funded":1,"month":"08","date_created":"2018-12-11T11:48:47Z","page":"124","has_accepted_license":"1","language":[{"iso":"eng"}],"department":[{"_id":"ChWo"}],"type":"dissertation","publist_id":"6809","article_processing_charge":"No","pubrep_id":"855","related_material":{"record":[{"id":"1362","relation":"part_of_dissertation","status":"public"},{"id":"1633","relation":"part_of_dissertation","status":"public"},{"relation":"popular_science","status":"public","id":"5568"}]},"day":"14","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by-sa/4.0/legalcode","name":"Creative Commons Attribution-ShareAlike 4.0 International Public License (CC BY-SA 4.0)","image":"/images/cc_by_sa.png","short":"CC BY-SA (4.0)"},"acknowledgement":"ERC H2020 programme (grant agreement no. 638176)\r\nFirst of all, let me thank my committee members, especially my supervisor, Chris\r\nWojtan, for supporting me throughout my PhD. Obviously, none of this work would\r\nhave been possible without you.\r\nFurthermore, Thank You to all the people who have contributed to this work in various\r\nways, in particular Martin Schanz and his group for providing and supporting the\r\nHyENA boundary element library, as well as Eder Miguel and Morten Bojsen-Hansen\r\nfor (repeatedly) proof reading and providing valuable suggestions during the writing\r\nof this thesis.\r\nI would also like to thank Bernd Bickel, and all the members – past and present – of his\r\nand Chris’ research groups at IST Austria for always providing honest and insightful\r\nfeedback throughout many joint group meetings, as well as Christopher Batty, Eitan\r\nGrinspun, and Fang Da for many insights into boundary element methods during our\r\ncollaboration.\r\nAs only virtual objects have been harmed in the process of creating this work, I would\r\nlike to acknowledge the Stanford scanning repository for providing the “Bunny” and\r\n“Armadillo” models, the AIM@SHAPE repository for “Pierre’s hand, watertight”, and\r\nS. Gainsbourg for the “Column” via Archive3D.net. Sorry for breaking these models\r\nin many different ways.\r\n","file":[{"content_type":"application/pdf","relation":"main_file","file_size":14596191,"checksum":"6c1ae8c90bfaba5e089417fefbc4a272","file_id":"5100","creator":"system","access_level":"open_access","file_name":"IST-2017-855-v1+1_thesis_online_pdfA.pdf","date_updated":"2020-07-14T12:48:13Z","date_created":"2018-12-12T10:14:46Z"},{"file_size":15060566,"relation":"source_file","content_type":"application/zip","date_created":"2019-04-05T08:40:30Z","file_name":"2017_thesis_Hahn_source.zip","date_updated":"2020-07-14T12:48:13Z","access_level":"closed","checksum":"421672f68d563b029869c5cf1713f919","creator":"dernst","file_id":"6207"}],"project":[{"name":"Efficient Simulation of Natural Phenomena at Extremely Large Scales","call_identifier":"H2020","grant_number":"638176","_id":"2533E772-B435-11E9-9278-68D0E5697425"}],"author":[{"full_name":"Hahn, David","first_name":"David","last_name":"Hahn","id":"357A6A66-F248-11E8-B48F-1D18A9856A87"}],"title":"Brittle fracture simulation with boundary elements for computer graphics","publisher":"Institute of Science and Technology Austria","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","supervisor":[{"full_name":"Wojtan, Christopher J","orcid":"0000-0001-6646-5546","first_name":"Christopher J","id":"3C61F1D2-F248-11E8-B48F-1D18A9856A87","last_name":"Wojtan"}],"license":"https://creativecommons.org/licenses/by-sa/4.0/","alternative_title":["ISTA Thesis"],"degree_awarded":"PhD"},{"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Taylor & Francis","status":"public","publication_identifier":{"eisbn":["9781498711425"]},"title":"Computational topology for structural molecular biology","month":"11","series_title":"Handbook of Discrete and Computational Geometry","abstract":[{"text":"The advent of high-throughput technologies and the concurrent advances in information sciences have led to a data revolution in biology. This revolution is most significant in molecular biology, with an increase in the number and scale of the “omics” projects over the last decade. Genomics projects, for example, have produced impressive advances in our knowledge of the information concealed into genomes, from the many genes that encode for the proteins that are responsible for most if not all cellular functions, to the noncoding regions that are now known to provide regulatory functions. Proteomics initiatives help to decipher the role of post-translation modifications on the protein structures and provide maps of protein-protein interactions, while functional genomics is the field that attempts to make use of the data produced by these projects to understand protein functions. The biggest challenge today is to assimilate the wealth of information provided by these initiatives into a conceptual framework that will help us decipher life. For example, the current views of the relationship between protein structure and function remain fragmented. We know of their sequences, more and more about their structures, we have information on their biological activities, but we have difficulties connecting this dotted line into an informed whole. We lack the experimental and computational tools for directly studying protein structure, function, and dynamics at the molecular and supra-molecular levels. In this chapter, we review some of the current developments in building the computational tools that are needed, focusing on the role that geometry and topology play in these efforts. One of our goals is to raise the general awareness about the importance of geometric methods in elucidating the mysterious foundations of our very existence. Another goal is the broadening of what we consider a geometric algorithm. There is plenty of valuable no-man’s-land between combinatorial and numerical algorithms, and it seems opportune to explore this land with a computational-geometric frame of mind.","lang":"eng"}],"date_updated":"2023-10-16T11:15:22Z","year":"2017","day":"09","author":[{"first_name":"Herbert","orcid":"0000-0002-9823-6833","last_name":"Edelsbrunner","id":"3FB178DA-F248-11E8-B48F-1D18A9856A87","full_name":"Edelsbrunner, Herbert"},{"first_name":"Patrice","last_name":"Koehl","full_name":"Koehl, Patrice"}],"_id":"84","article_processing_charge":"No","publist_id":"7970","scopus_import":"1","editor":[{"last_name":"Toth","first_name":"Csaba","full_name":"Toth, Csaba"},{"full_name":"O'Rourke, Joseph","last_name":"O'Rourke","first_name":"Joseph"},{"full_name":"Goodman, Jacob","last_name":"Goodman","first_name":"Jacob"}],"quality_controlled":"1","citation":{"mla":"Edelsbrunner, Herbert, and Patrice Koehl. “Computational Topology for Structural Molecular Biology.” <i>Handbook of Discrete and Computational Geometry, Third Edition</i>, edited by Csaba Toth et al., Taylor &#38; Francis, 2017, pp. 1709–35, doi:<a href=\"https://doi.org/10.1201/9781315119601\">10.1201/9781315119601</a>.","ista":"Edelsbrunner H, Koehl P. 2017.Computational topology for structural molecular biology. In: Handbook of Discrete and Computational Geometry, Third Edition. , 1709–1735.","apa":"Edelsbrunner, H., &#38; Koehl, P. (2017). Computational topology for structural molecular biology. In C. Toth, J. O’Rourke, &#38; J. Goodman (Eds.), <i>Handbook of Discrete and Computational Geometry, Third Edition</i> (pp. 1709–1735). Taylor &#38; Francis. <a href=\"https://doi.org/10.1201/9781315119601\">https://doi.org/10.1201/9781315119601</a>","chicago":"Edelsbrunner, Herbert, and Patrice Koehl. “Computational Topology for Structural Molecular Biology.” In <i>Handbook of Discrete and Computational Geometry, Third Edition</i>, edited by Csaba Toth, Joseph O’Rourke, and Jacob Goodman, 1709–35. Handbook of Discrete and Computational Geometry. Taylor &#38; Francis, 2017. <a href=\"https://doi.org/10.1201/9781315119601\">https://doi.org/10.1201/9781315119601</a>.","short":"H. Edelsbrunner, P. Koehl, in:, C. Toth, J. O’Rourke, J. Goodman (Eds.), Handbook of Discrete and Computational Geometry, Third Edition, Taylor &#38; Francis, 2017, pp. 1709–1735.","ama":"Edelsbrunner H, Koehl P. Computational topology for structural molecular biology. In: Toth C, O’Rourke J, Goodman J, eds. <i>Handbook of Discrete and Computational Geometry, Third Edition</i>. Handbook of Discrete and Computational Geometry. Taylor &#38; Francis; 2017:1709-1735. doi:<a href=\"https://doi.org/10.1201/9781315119601\">10.1201/9781315119601</a>","ieee":"H. Edelsbrunner and P. Koehl, “Computational topology for structural molecular biology,” in <i>Handbook of Discrete and Computational Geometry, Third Edition</i>, C. Toth, J. O’Rourke, and J. Goodman, Eds. Taylor &#38; Francis, 2017, pp. 1709–1735."},"doi":"10.1201/9781315119601","publication_status":"published","publication":"Handbook of Discrete and Computational Geometry, Third Edition","page":"1709 - 1735","date_created":"2018-12-11T11:44:32Z","type":"book_chapter","oa_version":"None","date_published":"2017-11-09T00:00:00Z","department":[{"_id":"HeEd"}],"language":[{"iso":"eng"}]},{"status":"public","publication_identifier":{"issn":["15306984"]},"oa":1,"month":"08","ec_funded":1,"date_updated":"2023-09-26T15:50:22Z","issue":"9","abstract":[{"text":"Heavy holes confined in quantum dots are predicted to be promising candidates for the realization of spin qubits with long coherence times. Here we focus on such heavy-hole states confined in germanium hut wires. By tuning the growth density of the latter we can realize a T-like structure between two neighboring wires. Such a structure allows the realization of a charge sensor, which is electrostatically and tunnel coupled to a quantum dot, with charge-transfer signals as high as 0.3 e. By integrating the T-like structure into a radiofrequency reflectometry setup, single-shot measurements allowing the extraction of hole tunneling times are performed. The extracted tunneling times of less than 10 μs are attributed to the small effective mass of Ge heavy-hole states and pave the way toward projective spin readout measurements.","lang":"eng"}],"year":"2017","acknowledged_ssus":[{"_id":"M-Shop"}],"_id":"840","file_date_updated":"2020-07-14T12:48:13Z","scopus_import":"1","ddc":["539"],"citation":{"ama":"Vukušić L, Kukucka J, Watzinger H, Katsaros G. Fast hole tunneling times in germanium hut wires probed by single-shot reflectometry. <i>Nano Letters</i>. 2017;17(9):5706-5710. doi:<a href=\"https://doi.org/10.1021/acs.nanolett.7b02627\">10.1021/acs.nanolett.7b02627</a>","ieee":"L. Vukušić, J. Kukucka, H. Watzinger, and G. Katsaros, “Fast hole tunneling times in germanium hut wires probed by single-shot reflectometry,” <i>Nano Letters</i>, vol. 17, no. 9. American Chemical Society, pp. 5706–5710, 2017.","short":"L. Vukušić, J. Kukucka, H. Watzinger, G. Katsaros, Nano Letters 17 (2017) 5706–5710.","chicago":"Vukušić, Lada, Josip Kukucka, Hannes Watzinger, and Georgios Katsaros. “Fast Hole Tunneling Times in Germanium Hut Wires Probed by Single-Shot Reflectometry.” <i>Nano Letters</i>. American Chemical Society, 2017. <a href=\"https://doi.org/10.1021/acs.nanolett.7b02627\">https://doi.org/10.1021/acs.nanolett.7b02627</a>.","ista":"Vukušić L, Kukucka J, Watzinger H, Katsaros G. 2017. Fast hole tunneling times in germanium hut wires probed by single-shot reflectometry. Nano Letters. 17(9), 5706–5710.","mla":"Vukušić, Lada, et al. “Fast Hole Tunneling Times in Germanium Hut Wires Probed by Single-Shot Reflectometry.” <i>Nano Letters</i>, vol. 17, no. 9, American Chemical Society, 2017, pp. 5706–10, doi:<a href=\"https://doi.org/10.1021/acs.nanolett.7b02627\">10.1021/acs.nanolett.7b02627</a>.","apa":"Vukušić, L., Kukucka, J., Watzinger, H., &#38; Katsaros, G. (2017). Fast hole tunneling times in germanium hut wires probed by single-shot reflectometry. <i>Nano Letters</i>. American Chemical Society. <a href=\"https://doi.org/10.1021/acs.nanolett.7b02627\">https://doi.org/10.1021/acs.nanolett.7b02627</a>"},"intvolume":"        17","publication_status":"published","doi":"10.1021/acs.nanolett.7b02627","oa_version":"Published Version","date_published":"2017-08-10T00:00:00Z","publisher":"American Chemical Society","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","title":"Fast hole tunneling times in germanium hut wires probed by single-shot reflectometry","tmp":{"short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"day":"10","project":[{"call_identifier":"FP7","name":"Towards Spin qubits and Majorana fermions in Germanium selfassembled hut-wires","grant_number":"335497","_id":"25517E86-B435-11E9-9278-68D0E5697425"}],"author":[{"id":"31E9F056-F248-11E8-B48F-1D18A9856A87","last_name":"Vukusic","orcid":"0000-0003-2424-8636","first_name":"Lada","full_name":"Vukusic, Lada"},{"full_name":"Kukucka, Josip","first_name":"Josip","last_name":"Kukucka","id":"3F5D8856-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Watzinger, Hannes","id":"35DF8E50-F248-11E8-B48F-1D18A9856A87","last_name":"Watzinger","first_name":"Hannes"},{"id":"38DB5788-F248-11E8-B48F-1D18A9856A87","last_name":"Katsaros","first_name":"Georgios","orcid":"0000-0001-8342-202X","full_name":"Katsaros, Georgios"}],"isi":1,"file":[{"file_size":2449546,"content_type":"application/pdf","relation":"main_file","date_created":"2018-12-12T10:12:33Z","date_updated":"2020-07-14T12:48:13Z","file_name":"IST-2017-865-v1+1_acs.nanolett.7b02627.pdf","access_level":"open_access","checksum":"761371a0129b2aa442424b9561450ece","creator":"system","file_id":"4951"}],"publist_id":"6808","pubrep_id":"865","article_processing_charge":"No","external_id":{"isi":["000411043500078"]},"volume":17,"quality_controlled":"1","related_material":{"record":[{"relation":"popular_science","id":"7977"},{"id":"69","relation":"dissertation_contains","status":"public"},{"id":"7996","status":"public","relation":"dissertation_contains"}]},"has_accepted_license":"1","page":"5706 - 5710","date_created":"2018-12-11T11:48:47Z","publication":"Nano Letters","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"GeKa"}]},{"main_file_link":[{"url":"https://arxiv.org/abs/1603.08838","open_access":"1"}],"intvolume":"       167","citation":{"short":"G. Huang, V. Kaloshin, A. Sorrentino, Duke Mathematical Journal 167 (2017) 175–209.","ieee":"G. Huang, V. Kaloshin, and A. Sorrentino, “On the marked length spectrum of generic strictly convex billiard tables,” <i>Duke Mathematical Journal</i>, vol. 167, no. 1. Duke University Press, pp. 175–209, 2017.","ama":"Huang G, Kaloshin V, Sorrentino A. On the marked length spectrum of generic strictly convex billiard tables. <i>Duke Mathematical Journal</i>. 2017;167(1):175-209. doi:<a href=\"https://doi.org/10.1215/00127094-2017-0038\">10.1215/00127094-2017-0038</a>","chicago":"Huang, Guan, Vadim Kaloshin, and Alfonso Sorrentino. “On the Marked Length Spectrum of Generic Strictly Convex Billiard Tables.” <i>Duke Mathematical Journal</i>. Duke University Press, 2017. <a href=\"https://doi.org/10.1215/00127094-2017-0038\">https://doi.org/10.1215/00127094-2017-0038</a>.","mla":"Huang, Guan, et al. “On the Marked Length Spectrum of Generic Strictly Convex Billiard Tables.” <i>Duke Mathematical Journal</i>, vol. 167, no. 1, Duke University Press, 2017, pp. 175–209, doi:<a href=\"https://doi.org/10.1215/00127094-2017-0038\">10.1215/00127094-2017-0038</a>.","ista":"Huang G, Kaloshin V, Sorrentino A. 2017. On the marked length spectrum of generic strictly convex billiard tables. Duke Mathematical Journal. 167(1), 175–209.","apa":"Huang, G., Kaloshin, V., &#38; Sorrentino, A. (2017). On the marked length spectrum of generic strictly convex billiard tables. <i>Duke Mathematical Journal</i>. Duke University Press. <a href=\"https://doi.org/10.1215/00127094-2017-0038\">https://doi.org/10.1215/00127094-2017-0038</a>"},"publication_status":"published","doi":"10.1215/00127094-2017-0038","oa_version":"Preprint","date_published":"2017-12-08T00:00:00Z","status":"public","oa":1,"publication_identifier":{"issn":["0012-7094"]},"month":"12","date_updated":"2021-01-12T08:19:11Z","abstract":[{"text":"In this paper we show that for a generic strictly convex domain, one can recover the eigendata corresponding to Aubry–Mather periodic orbits of the induced billiard map from the (maximal) marked length spectrum of the domain.","lang":"eng"}],"arxiv":1,"issue":"1","year":"2017","_id":"8423","article_type":"original","article_processing_charge":"No","external_id":{"arxiv":["1603.08838"]},"volume":167,"quality_controlled":"1","page":"175-209","date_created":"2020-09-17T10:42:42Z","publication":"Duke Mathematical Journal","type":"journal_article","language":[{"iso":"eng"}],"publisher":"Duke University Press","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"On the marked length spectrum of generic strictly convex billiard tables","day":"08","extern":"1","author":[{"first_name":"Guan","last_name":"Huang","full_name":"Huang, Guan"},{"first_name":"Vadim","orcid":"0000-0002-6051-2628","last_name":"Kaloshin","id":"FE553552-CDE8-11E9-B324-C0EBE5697425","full_name":"Kaloshin, Vadim"},{"full_name":"Sorrentino, Alfonso","last_name":"Sorrentino","first_name":"Alfonso"}]},{"article_processing_charge":"No","article_type":"original","quality_controlled":"1","volume":186,"external_id":{"arxiv":["1606.00230"]},"publication":"Annals of Mathematics","date_created":"2020-09-17T10:46:42Z","page":"277-314","language":[{"iso":"eng"}],"type":"journal_article","title":"Dynamical spectral rigidity among Z2-symmetric strictly convex domains close to a circle","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Annals of Mathematics","extern":"1","day":"01","author":[{"last_name":"De Simoi","first_name":"Jacopo","full_name":"De Simoi, Jacopo"},{"full_name":"Kaloshin, Vadim","first_name":"Vadim","orcid":"0000-0002-6051-2628","id":"FE553552-CDE8-11E9-B324-C0EBE5697425","last_name":"Kaloshin"},{"first_name":"Qiaoling","last_name":"Wei","full_name":"Wei, Qiaoling"}],"main_file_link":[{"url":"https://arxiv.org/abs/1606.00230","open_access":"1"}],"citation":{"mla":"De Simoi, Jacopo, et al. “Dynamical Spectral Rigidity among Z2-Symmetric Strictly Convex Domains Close to a Circle.” <i>Annals of Mathematics</i>, vol. 186, no. 1, Annals of Mathematics, 2017, pp. 277–314, doi:<a href=\"https://doi.org/10.4007/annals.2017.186.1.7\">10.4007/annals.2017.186.1.7</a>.","apa":"De Simoi, J., Kaloshin, V., &#38; Wei, Q. (2017). Dynamical spectral rigidity among Z2-symmetric strictly convex domains close to a circle. <i>Annals of Mathematics</i>. Annals of Mathematics. <a href=\"https://doi.org/10.4007/annals.2017.186.1.7\">https://doi.org/10.4007/annals.2017.186.1.7</a>","ista":"De Simoi J, Kaloshin V, Wei Q. 2017. Dynamical spectral rigidity among Z2-symmetric strictly convex domains close to a circle. Annals of Mathematics. 186(1), 277–314.","chicago":"De Simoi, Jacopo, Vadim Kaloshin, and Qiaoling Wei. “Dynamical Spectral Rigidity among Z2-Symmetric Strictly Convex Domains Close to a Circle.” <i>Annals of Mathematics</i>. Annals of Mathematics, 2017. <a href=\"https://doi.org/10.4007/annals.2017.186.1.7\">https://doi.org/10.4007/annals.2017.186.1.7</a>.","short":"J. De Simoi, V. Kaloshin, Q. Wei, Annals of Mathematics 186 (2017) 277–314.","ieee":"J. De Simoi, V. Kaloshin, and Q. Wei, “Dynamical spectral rigidity among Z2-symmetric strictly convex domains close to a circle,” <i>Annals of Mathematics</i>, vol. 186, no. 1. Annals of Mathematics, pp. 277–314, 2017.","ama":"De Simoi J, Kaloshin V, Wei Q. Dynamical spectral rigidity among Z2-symmetric strictly convex domains close to a circle. <i>Annals of Mathematics</i>. 2017;186(1):277-314. doi:<a href=\"https://doi.org/10.4007/annals.2017.186.1.7\">10.4007/annals.2017.186.1.7</a>"},"intvolume":"       186","doi":"10.4007/annals.2017.186.1.7","publication_status":"published","date_published":"2017-07-01T00:00:00Z","oa_version":"Preprint","oa":1,"publication_identifier":{"issn":["0003-486X"]},"status":"public","month":"07","year":"2017","abstract":[{"lang":"eng","text":"We show that any sufficiently (finitely) smooth ℤ₂-symmetric strictly convex domain sufficiently close to a circle is dynamically spectrally rigid; i.e., all deformations among domains in the same class that preserve the length of all periodic orbits of the associated billiard flow must necessarily be isometric deformations. This gives a partial answer to a question of P. Sarnak."}],"arxiv":1,"issue":"1","date_updated":"2021-01-12T08:19:12Z","_id":"8427"}]
