[{"day":"01","project":[{"_id":"25B07788-B435-11E9-9278-68D0E5697425","name":"Limits to selection in biology and in evolutionary computation","grant_number":"250152","call_identifier":"FP7"}],"publisher":"Academic Press","publication":"Theoretical Population Biology","department":[{"_id":"NiBa"}],"citation":{"short":"N.H. Barton, A. Etheridge, A. Véber, Theoretical Population Biology 118 (2017) 50–73.","mla":"Barton, Nicholas H., et al. “The Infinitesimal Model: Definition Derivation and Implications.” <i>Theoretical Population Biology</i>, vol. 118, Academic Press, 2017, pp. 50–73, doi:<a href=\"https://doi.org/10.1016/j.tpb.2017.06.001\">10.1016/j.tpb.2017.06.001</a>.","apa":"Barton, N. H., Etheridge, A., &#38; Véber, A. (2017). The infinitesimal model: Definition derivation and implications. <i>Theoretical Population Biology</i>. Academic Press. <a href=\"https://doi.org/10.1016/j.tpb.2017.06.001\">https://doi.org/10.1016/j.tpb.2017.06.001</a>","chicago":"Barton, Nicholas H, Alison Etheridge, and Amandine Véber. “The Infinitesimal Model: Definition Derivation and Implications.” <i>Theoretical Population Biology</i>. Academic Press, 2017. <a href=\"https://doi.org/10.1016/j.tpb.2017.06.001\">https://doi.org/10.1016/j.tpb.2017.06.001</a>.","ieee":"N. H. Barton, A. Etheridge, and A. Véber, “The infinitesimal model: Definition derivation and implications,” <i>Theoretical Population Biology</i>, vol. 118. Academic Press, pp. 50–73, 2017.","ama":"Barton NH, Etheridge A, Véber A. The infinitesimal model: Definition derivation and implications. <i>Theoretical Population Biology</i>. 2017;118:50-73. doi:<a href=\"https://doi.org/10.1016/j.tpb.2017.06.001\">10.1016/j.tpb.2017.06.001</a>","ista":"Barton NH, Etheridge A, Véber A. 2017. The infinitesimal model: Definition derivation and implications. Theoretical Population Biology. 118, 50–73."},"title":"The infinitesimal model: Definition derivation and implications","doi":"10.1016/j.tpb.2017.06.001","abstract":[{"lang":"eng","text":"Our focus here is on the infinitesimal model. In this model, one or several quantitative traits are described as the sum of a genetic and a non-genetic component, the first being distributed within families as a normal random variable centred at the average of the parental genetic components, and with a variance independent of the parental traits. Thus, the variance that segregates within families is not perturbed by selection, and can be predicted from the variance components. This does not necessarily imply that the trait distribution across the whole population should be Gaussian, and indeed selection or population structure may have a substantial effect on the overall trait distribution. One of our main aims is to identify some general conditions on the allelic effects for the infinitesimal model to be accurate. We first review the long history of the infinitesimal model in quantitative genetics. Then we formulate the model at the phenotypic level in terms of individual trait values and relationships between individuals, but including different evolutionary processes: genetic drift, recombination, selection, mutation, population structure, …. We give a range of examples of its application to evolutionary questions related to stabilising selection, assortative mating, effective population size and response to selection, habitat preference and speciation. We provide a mathematical justification of the model as the limit as the number M of underlying loci tends to infinity of a model with Mendelian inheritance, mutation and environmental noise, when the genetic component of the trait is purely additive. We also show how the model generalises to include epistatic effects. We prove in particular that, within each family, the genetic components of the individual trait values in the current generation are indeed normally distributed with a variance independent of ancestral traits, up to an error of order 1∕M. Simulations suggest that in some cases the convergence may be as fast as 1∕M."}],"page":"50 - 73","file":[{"file_name":"IST-2017-908-v1+1_1-s2.0-S0040580917300886-main_1_.pdf","date_created":"2018-12-12T10:12:45Z","relation":"main_file","checksum":"7dd02bfcfe8f244f4a6c19091aedf2c8","content_type":"application/pdf","access_level":"open_access","creator":"system","file_id":"4964","file_size":1133924,"date_updated":"2020-07-14T12:47:25Z"}],"ddc":["576"],"pubrep_id":"908","oa":1,"ec_funded":1,"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_updated":"2021-01-12T08:06:50Z","scopus_import":1,"year":"2017","has_accepted_license":"1","date_published":"2017-12-01T00:00:00Z","publication_identifier":{"issn":["00405809"]},"volume":118,"publist_id":"7169","type":"journal_article","tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"date_created":"2018-12-11T11:47:34Z","author":[{"id":"4880FE40-F248-11E8-B48F-1D18A9856A87","last_name":"Barton","orcid":"0000-0002-8548-5240","full_name":"Barton, Nicholas H","first_name":"Nicholas H"},{"last_name":"Etheridge","first_name":"Alison","full_name":"Etheridge, Alison"},{"first_name":"Amandine","full_name":"Véber, Amandine","last_name":"Véber"}],"quality_controlled":"1","license":"https://creativecommons.org/licenses/by/4.0/","intvolume":"       118","publication_status":"published","month":"12","language":[{"iso":"eng"}],"status":"public","file_date_updated":"2020-07-14T12:47:25Z","oa_version":"Published Version","_id":"626"},{"article_processing_charge":"No","author":[{"last_name":"Jiang","full_name":"Jiang, Changyu","first_name":"Changyu"},{"last_name":"Zhai","id":"34009CFA-F248-11E8-B48F-1D18A9856A87","first_name":"Ming-Zhu","full_name":"Zhai, Ming-Zhu"},{"first_name":"Dong","full_name":"Yan, Dong","last_name":"Yan"},{"last_name":"Li","full_name":"Li, Da","first_name":"Da"},{"full_name":"Li, Chen","first_name":"Chen","last_name":"Li"},{"first_name":"Yonghong","full_name":"Zhang, Yonghong","last_name":"Zhang"},{"last_name":"Xiao","first_name":"Lizu","full_name":"Xiao, Lizu"},{"full_name":"Xiong, Donglin","first_name":"Donglin","last_name":"Xiong"},{"first_name":"Qiwen","full_name":"Deng, Qiwen","last_name":"Deng"},{"full_name":"Sun, Wuping","first_name":"Wuping","last_name":"Sun"}],"quality_controlled":"1","language":[{"iso":"eng"}],"intvolume":"         8","month":"08","publication_status":"published","oa_version":"Published Version","_id":"627","status":"public","file_date_updated":"2020-07-14T12:47:26Z","oa":1,"scopus_import":"1","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_updated":"2023-10-17T08:56:37Z","year":"2017","has_accepted_license":"1","date_published":"2017-08-24T00:00:00Z","publist_id":"7167","volume":8,"publication_identifier":{"issn":["1949-2553"]},"date_created":"2018-12-11T11:47:34Z","tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"type":"journal_article","abstract":[{"text":"Beige adipocytes are a new type of recruitable brownish adipocytes, with highly mitochondrial membrane uncoupling protein 1 expression and thermogenesis. Beige adipocytes were found among white adipocytes, especially in subcutaneous white adipose tissue (sWAT). Therefore, beige adipocytes may be involved in the regulation of energy metabolism and fat deposition. Transient receptor potential melastatin 8 (TRPM8), a Ca2+-permeable non-selective cation channel, plays vital roles in the regulation of various cellular functions. It has been reported that TRPM8 activation enhanced the thermogenic function of brown adiposytes. However, the involvement of TRPM8 in the thermogenic function of WAT remains unexplored. Our data revealed that TRPM8 was expressed in mouse white adipocytes at mRNA, protein and functional levels. The mRNA expression of Trpm8 was significantly increased in the differentiated white adipocytes than pre-adipocytes. Moreover, activation of TRPM8 by menthol enhanced the expression of thermogenic genes in cultured white aidpocytes. And menthol-induced increases of the thermogenic genes in white adipocytes was inhibited by either KT5720 (a protein kinase A inhibitor) or BAPTA-AM. In addition, high fat diet (HFD)-induced obesity in mice was significantly recovered by co-treatment with menthol. Dietary menthol enhanced WAT &quot;browning&quot; and improved glucose metabolism in HFD-induced obesity mice as well. Therefore, we concluded that TRPM8 might be involved in WAT &quot;browning&quot; by increasing the expression levels of genes related to thermogenesis and energy metabolism. And dietary menthol could be a novel approach for combating human obesity and related metabolic diseases.","lang":"eng"}],"page":"75114 - 75126","file":[{"creator":"system","access_level":"open_access","content_type":"application/pdf","relation":"main_file","checksum":"2219e5348bbfe1aac2725aa620c33280","date_updated":"2020-07-14T12:47:26Z","file_id":"5201","file_size":6101606,"file_name":"IST-2017-907-v1+1_20540-294640-4-PB.pdf","date_created":"2018-12-12T10:16:15Z"}],"issue":"43","pubrep_id":"907","ddc":["571"],"day":"24","department":[{"_id":"RySh"}],"publication":"Oncotarget","publisher":"Impact Journals","citation":{"chicago":"Jiang, Changyu, Ming-Zhu Zhai, Dong Yan, Da Li, Chen Li, Yonghong Zhang, Lizu Xiao, Donglin Xiong, Qiwen Deng, and Wuping Sun. “Dietary Menthol-Induced TRPM8 Activation Enhances WAT ‘Browning’ and Ameliorates Diet-Induced Obesity.” <i>Oncotarget</i>. Impact Journals, 2017. <a href=\"https://doi.org/10.18632/oncotarget.20540\">https://doi.org/10.18632/oncotarget.20540</a>.","mla":"Jiang, Changyu, et al. “Dietary Menthol-Induced TRPM8 Activation Enhances WAT ‘Browning’ and Ameliorates Diet-Induced Obesity.” <i>Oncotarget</i>, vol. 8, no. 43, Impact Journals, 2017, pp. 75114–26, doi:<a href=\"https://doi.org/10.18632/oncotarget.20540\">10.18632/oncotarget.20540</a>.","short":"C. Jiang, M.-Z. Zhai, D. Yan, D. Li, C. Li, Y. Zhang, L. Xiao, D. Xiong, Q. Deng, W. Sun, Oncotarget 8 (2017) 75114–75126.","apa":"Jiang, C., Zhai, M.-Z., Yan, D., Li, D., Li, C., Zhang, Y., … Sun, W. (2017). Dietary menthol-induced TRPM8 activation enhances WAT “browning” and ameliorates diet-induced obesity. <i>Oncotarget</i>. Impact Journals. <a href=\"https://doi.org/10.18632/oncotarget.20540\">https://doi.org/10.18632/oncotarget.20540</a>","ista":"Jiang C, Zhai M-Z, Yan D, Li D, Li C, Zhang Y, Xiao L, Xiong D, Deng Q, Sun W. 2017. Dietary menthol-induced TRPM8 activation enhances WAT “browning” and ameliorates diet-induced obesity. Oncotarget. 8(43), 75114–75126.","ama":"Jiang C, Zhai M-Z, Yan D, et al. Dietary menthol-induced TRPM8 activation enhances WAT “browning” and ameliorates diet-induced obesity. <i>Oncotarget</i>. 2017;8(43):75114-75126. doi:<a href=\"https://doi.org/10.18632/oncotarget.20540\">10.18632/oncotarget.20540</a>","ieee":"C. Jiang <i>et al.</i>, “Dietary menthol-induced TRPM8 activation enhances WAT ‘browning’ and ameliorates diet-induced obesity,” <i>Oncotarget</i>, vol. 8, no. 43. Impact Journals, pp. 75114–75126, 2017."},"title":"Dietary menthol-induced TRPM8 activation enhances WAT “browning” and ameliorates diet-induced obesity","doi":"10.18632/oncotarget.20540"},{"page":"118 - 139","abstract":[{"text":"We consider the problem of developing automated techniques for solving recurrence relations to aid the expected-runtime analysis of programs. The motivation is that several classical textbook algorithms have quite efficient expected-runtime complexity, whereas the corresponding worst-case bounds are either inefficient (e.g., Quick-Sort), or completely ineffective (e.g., Coupon-Collector). Since the main focus of expected-runtime analysis is to obtain efficient bounds, we consider bounds that are either logarithmic, linear or almost-linear (O(log n), O(n), O(n · log n), respectively, where n represents the input size). Our main contribution is an efficient (simple linear-time algorithm) sound approach for deriving such expected-runtime bounds for the analysis of recurrence relations induced by randomized algorithms. The experimental results show that our approach can efficiently derive asymptotically optimal expected-runtime bounds for recurrences of classical randomized algorithms, including Randomized-Search, Quick-Sort, Quick-Select, Coupon-Collector, where the worst-case bounds are either inefficient (such as linear as compared to logarithmic expected-runtime complexity, or quadratic as compared to linear or almost-linear expected-runtime complexity), or ineffective.","lang":"eng"}],"doi":"10.1007/978-3-319-63387-9_6","editor":[{"full_name":"Majumdar, Rupak","first_name":"Rupak","last_name":"Majumdar"},{"last_name":"Kunčak","full_name":"Kunčak, Viktor","first_name":"Viktor"}],"citation":{"apa":"Chatterjee, K., Fu, H., &#38; Murhekar, A. (2017). Automated recurrence analysis for almost linear expected runtime bounds. In R. Majumdar &#38; V. Kunčak (Eds.) (Vol. 10426, pp. 118–139). Presented at the CAV: Computer Aided Verification, Heidelberg, Germany: Springer. <a href=\"https://doi.org/10.1007/978-3-319-63387-9_6\">https://doi.org/10.1007/978-3-319-63387-9_6</a>","mla":"Chatterjee, Krishnendu, et al. <i>Automated Recurrence Analysis for Almost Linear Expected Runtime Bounds</i>. Edited by Rupak Majumdar and Viktor Kunčak, vol. 10426, Springer, 2017, pp. 118–39, doi:<a href=\"https://doi.org/10.1007/978-3-319-63387-9_6\">10.1007/978-3-319-63387-9_6</a>.","short":"K. Chatterjee, H. Fu, A. Murhekar, in:, R. Majumdar, V. Kunčak (Eds.), Springer, 2017, pp. 118–139.","chicago":"Chatterjee, Krishnendu, Hongfei Fu, and Aniket Murhekar. “Automated Recurrence Analysis for Almost Linear Expected Runtime Bounds.” edited by Rupak Majumdar and Viktor Kunčak, 10426:118–39. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-63387-9_6\">https://doi.org/10.1007/978-3-319-63387-9_6</a>.","ieee":"K. Chatterjee, H. Fu, and A. Murhekar, “Automated recurrence analysis for almost linear expected runtime bounds,” presented at the CAV: Computer Aided Verification, Heidelberg, Germany, 2017, vol. 10426, pp. 118–139.","ama":"Chatterjee K, Fu H, Murhekar A. Automated recurrence analysis for almost linear expected runtime bounds. In: Majumdar R, Kunčak V, eds. Vol 10426. Springer; 2017:118-139. doi:<a href=\"https://doi.org/10.1007/978-3-319-63387-9_6\">10.1007/978-3-319-63387-9_6</a>","ista":"Chatterjee K, Fu H, Murhekar A. 2017. Automated recurrence analysis for almost linear expected runtime bounds. CAV: Computer Aided Verification, LNCS, vol. 10426, 118–139."},"title":"Automated recurrence analysis for almost linear expected runtime bounds","project":[{"name":"Efficient Algorithms for Computer Aided Verification","_id":"25892FC0-B435-11E9-9278-68D0E5697425","grant_number":"ICT15-003"},{"_id":"25863FF4-B435-11E9-9278-68D0E5697425","name":"Game Theory","grant_number":"S11407","call_identifier":"FWF"},{"call_identifier":"FP7","grant_number":"279307","name":"Quantitative Graph Games: Theory and Applications","_id":"2581B60A-B435-11E9-9278-68D0E5697425"}],"day":"01","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1705.00314"}],"department":[{"_id":"KrCh"}],"publisher":"Springer","language":[{"iso":"eng"}],"intvolume":"     10426","month":"01","publication_status":"published","oa_version":"Submitted Version","_id":"628","status":"public","conference":{"name":"CAV: Computer Aided Verification","location":"Heidelberg, Germany","end_date":"2017-07-28","start_date":"2017-07-24"},"author":[{"first_name":"Krishnendu","orcid":"0000-0002-4561-241X","full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Fu","first_name":"Hongfei","full_name":"Fu, Hongfei"},{"last_name":"Murhekar","first_name":"Aniket","full_name":"Murhekar, Aniket"}],"quality_controlled":"1","alternative_title":["LNCS"],"volume":10426,"publist_id":"7166","publication_identifier":{"isbn":["978-331963386-2"]},"date_created":"2018-12-11T11:47:35Z","type":"conference","date_published":"2017-01-01T00:00:00Z","scopus_import":1,"date_updated":"2021-01-12T08:06:55Z","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","year":"2017","oa":1,"ec_funded":1},{"citation":{"chicago":"Nikitenko, Anton. “Discrete Morse Theory for Random Complexes .” Institute of Science and Technology Austria, 2017. <a href=\"https://doi.org/10.15479/AT:ISTA:th_873\">https://doi.org/10.15479/AT:ISTA:th_873</a>.","apa":"Nikitenko, A. (2017). <i>Discrete Morse theory for random complexes </i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:th_873\">https://doi.org/10.15479/AT:ISTA:th_873</a>","short":"A. Nikitenko, Discrete Morse Theory for Random Complexes , Institute of Science and Technology Austria, 2017.","mla":"Nikitenko, Anton. <i>Discrete Morse Theory for Random Complexes </i>. Institute of Science and Technology Austria, 2017, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:th_873\">10.15479/AT:ISTA:th_873</a>.","ista":"Nikitenko A. 2017. Discrete Morse theory for random complexes . Institute of Science and Technology Austria.","ama":"Nikitenko A. Discrete Morse theory for random complexes . 2017. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:th_873\">10.15479/AT:ISTA:th_873</a>","ieee":"A. Nikitenko, “Discrete Morse theory for random complexes ,” Institute of Science and Technology Austria, 2017."},"title":"Discrete Morse theory for random complexes ","related_material":{"record":[{"relation":"part_of_dissertation","status":"public","id":"718"},{"relation":"part_of_dissertation","id":"5678","status":"public"},{"id":"87","status":"public","relation":"part_of_dissertation"}]},"day":"27","publisher":"Institute of Science and Technology Austria","department":[{"_id":"HeEd"}],"doi":"10.15479/AT:ISTA:th_873","page":"86","file":[{"date_updated":"2020-07-14T12:47:26Z","file_size":2324870,"file_id":"6289","content_type":"application/pdf","access_level":"open_access","creator":"dernst","checksum":"ece7e598a2f060b263c2febf7f3fe7f9","relation":"main_file","date_created":"2019-04-09T14:54:51Z","file_name":"2017_Thesis_Nikitenko.pdf"},{"date_created":"2019-04-09T14:54:51Z","file_name":"2017_Thesis_Nikitenko_source.zip","date_updated":"2020-07-14T12:47:26Z","file_size":2863219,"file_id":"6290","creator":"dernst","access_level":"closed","content_type":"application/zip","checksum":"99b7ad76e317efd447af60f91e29b49b","relation":"source_file"}],"abstract":[{"lang":"eng","text":"The main objects considered in the present work are simplicial and CW-complexes with vertices forming a random point cloud. In particular, we consider a Poisson point process in R^n and study Delaunay and Voronoi complexes of the first and higher orders and weighted Delaunay complexes obtained as sections of Delaunay complexes, as well as the Čech complex. Further, we examine theDelaunay complex of a Poisson point process on the sphere S^n, as well as of a uniform point cloud, which is equivalent to the convex hull, providing a connection to the theory of random polytopes. Each of the complexes in question can be endowed with a radius function, which maps its cells to the radii of appropriately chosen circumspheres, called the radius of the cell. Applying and developing discrete Morse theory for these functions, joining it together with probabilistic and sometimes analytic machinery, and developing several integral geometric tools, we aim at getting the distributions of circumradii of typical cells. For all considered complexes, we are able to generalize and obtain up to constants the distribution of radii of typical intervals of all types. In low dimensions the constants can be computed explicitly, thus providing the explicit expressions for the expected numbers of cells. In particular, it allows to find the expected density of simplices of every dimension for a Poisson point process in R^4, whereas the result for R^3 was known already in 1970's."}],"ddc":["514","516","519"],"pubrep_id":"873","degree_awarded":"PhD","date_updated":"2023-09-15T12:10:34Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","year":"2017","oa":1,"supervisor":[{"full_name":"Edelsbrunner, Herbert","orcid":"0000-0002-9823-6833","first_name":"Herbert","id":"3FB178DA-F248-11E8-B48F-1D18A9856A87","last_name":"Edelsbrunner"}],"publication_identifier":{"issn":["2663-337X"]},"type":"dissertation","tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"date_created":"2019-04-09T15:04:32Z","has_accepted_license":"1","date_published":"2017-10-27T00:00:00Z","author":[{"id":"3E4FF1BA-F248-11E8-B48F-1D18A9856A87","last_name":"Nikitenko","orcid":"0000-0002-0659-3201","full_name":"Nikitenko, Anton","first_name":"Anton"}],"alternative_title":["ISTA Thesis"],"article_processing_charge":"No","publication_status":"published","month":"10","language":[{"iso":"eng"}],"status":"public","file_date_updated":"2020-07-14T12:47:26Z","_id":"6287","oa_version":"Published Version"},{"pmid":1,"page":"419 - 444","abstract":[{"text":"Even simple cells like bacteria have precisely regulated cellular anatomies, which allow them to grow, divide and to respond to internal or external cues with high fidelity. How spatial and temporal intracellular organization in prokaryotic cells is achieved and maintained on the basis of locally interacting proteins still remains largely a mystery. Bulk biochemical assays with purified components and in vivo experiments help us to approach key cellular processes from two opposite ends, in terms of minimal and maximal complexity. However, to understand how cellular phenomena emerge, that are more than the sum of their parts, we have to assemble cellular subsystems step by step from the bottom up. Here, we review recent in vitro reconstitution experiments with proteins of the bacterial cell division machinery and illustrate how they help to shed light on fundamental cellular mechanisms that constitute spatiotemporal order and regulate cell division.","lang":"eng"}],"title":"Reconstitution of protein dynamics involved in bacterial cell division","citation":{"ista":"Loose M, Zieske K, Schwille P. 2017.Reconstitution of protein dynamics involved in bacterial cell division. In: Prokaryotic Cytoskeletons. vol. 84, 419–444.","ieee":"M. Loose, K. Zieske, and P. Schwille, “Reconstitution of protein dynamics involved in bacterial cell division,” in <i>Prokaryotic Cytoskeletons</i>, vol. 84, Springer, 2017, pp. 419–444.","ama":"Loose M, Zieske K, Schwille P. Reconstitution of protein dynamics involved in bacterial cell division. In: <i>Prokaryotic Cytoskeletons</i>. Vol 84. Sub-Cellular Biochemistry. Springer; 2017:419-444. doi:<a href=\"https://doi.org/10.1007/978-3-319-53047-5_15\">10.1007/978-3-319-53047-5_15</a>","chicago":"Loose, Martin, Katja Zieske, and Petra Schwille. “Reconstitution of Protein Dynamics Involved in Bacterial Cell Division.” In <i>Prokaryotic Cytoskeletons</i>, 84:419–44. Sub-Cellular Biochemistry. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-53047-5_15\">https://doi.org/10.1007/978-3-319-53047-5_15</a>.","apa":"Loose, M., Zieske, K., &#38; Schwille, P. (2017). Reconstitution of protein dynamics involved in bacterial cell division. In <i>Prokaryotic Cytoskeletons</i> (Vol. 84, pp. 419–444). Springer. <a href=\"https://doi.org/10.1007/978-3-319-53047-5_15\">https://doi.org/10.1007/978-3-319-53047-5_15</a>","short":"M. Loose, K. Zieske, P. Schwille, in:, Prokaryotic Cytoskeletons, Springer, 2017, pp. 419–444.","mla":"Loose, Martin, et al. “Reconstitution of Protein Dynamics Involved in Bacterial Cell Division.” <i>Prokaryotic Cytoskeletons</i>, vol. 84, Springer, 2017, pp. 419–44, doi:<a href=\"https://doi.org/10.1007/978-3-319-53047-5_15\">10.1007/978-3-319-53047-5_15</a>."},"publication":"Prokaryotic Cytoskeletons","publisher":"Springer","department":[{"_id":"MaLo"}],"day":"13","doi":"10.1007/978-3-319-53047-5_15","quality_controlled":"1","author":[{"orcid":"0000-0001-7309-9724","full_name":"Loose, Martin","first_name":"Martin","id":"462D4284-F248-11E8-B48F-1D18A9856A87","last_name":"Loose"},{"last_name":"Zieske","full_name":"Zieske, Katja","first_name":"Katja"},{"first_name":"Petra","full_name":"Schwille, Petra","last_name":"Schwille"}],"series_title":"Sub-Cellular Biochemistry","status":"public","oa_version":"None","_id":"629","intvolume":"        84","month":"05","external_id":{"pmid":["28500535"]},"publication_status":"published","language":[{"iso":"eng"}],"year":"2017","date_updated":"2021-01-12T08:06:57Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","scopus_import":1,"type":"book_chapter","date_created":"2018-12-11T11:47:35Z","publication_identifier":{"eisbn":["978-3-319-53047-5"]},"volume":84,"publist_id":"7165","date_published":"2017-05-13T00:00:00Z"},{"year":"2017","title":"Bacterial herd and social immunity to phages","citation":{"ista":"Payne P. 2017. Bacterial herd and social immunity to phages. Institute of Science and Technology Austria.","ama":"Payne P. Bacterial herd and social immunity to phages. 2017.","ieee":"P. Payne, “Bacterial herd and social immunity to phages,” Institute of Science and Technology Austria, 2017.","chicago":"Payne, Pavel. “Bacterial Herd and Social Immunity to Phages.” Institute of Science and Technology Austria, 2017.","apa":"Payne, P. (2017). <i>Bacterial herd and social immunity to phages</i>. Institute of Science and Technology Austria.","short":"P. Payne, Bacterial Herd and Social Immunity to Phages, Institute of Science and Technology Austria, 2017.","mla":"Payne, Pavel. <i>Bacterial Herd and Social Immunity to Phages</i>. Institute of Science and Technology Austria, 2017."},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","date_updated":"2023-09-07T12:00:00Z","publisher":"Institute of Science and Technology Austria","supervisor":[{"full_name":"Bollback, Jonathan P","orcid":"0000-0002-4624-4612","first_name":"Jonathan P","id":"2C6FA9CC-F248-11E8-B48F-1D18A9856A87","last_name":"Bollback"},{"first_name":"Nicholas H","full_name":"Barton, Nicholas H","orcid":"0000-0002-8548-5240","last_name":"Barton","id":"4880FE40-F248-11E8-B48F-1D18A9856A87"}],"department":[{"_id":"NiBa"},{"_id":"JoBo"}],"oa":1,"day":"01","type":"dissertation","date_created":"2019-04-09T15:16:45Z","publication_identifier":{"issn":["2663-337X"]},"date_published":"2017-02-01T00:00:00Z","has_accepted_license":"1","file":[{"creator":"dernst","access_level":"closed","content_type":"application/pdf","relation":"main_file","checksum":"a0fc5c26a89c0ea759947ffba87d0d8f","date_updated":"2020-07-14T12:47:27Z","file_id":"6292","file_size":3025175,"file_name":"thesis_pavel_payne_final_w_signature_page.pdf","date_created":"2019-04-09T15:15:32Z"},{"date_updated":"2021-02-22T13:45:59Z","file_size":3111536,"file_id":"9187","content_type":"application/pdf","creator":"dernst","access_level":"open_access","checksum":"af531e921a7f64a9e0af4cd8783b2226","relation":"main_file","success":1,"date_created":"2021-02-22T13:45:59Z","file_name":"2017_Payne_Thesis.pdf"}],"author":[{"first_name":"Pavel","orcid":"0000-0002-2711-9453","full_name":"Payne, Pavel","last_name":"Payne","id":"35F78294-F248-11E8-B48F-1D18A9856A87"}],"page":"83","alternative_title":["ISTA Thesis"],"article_processing_charge":"No","abstract":[{"text":"Bacteria and their pathogens – phages – are the most abundant living entities on Earth. Throughout their coevolution, bacteria have evolved multiple immune systems to overcome the ubiquitous threat from the phages. Although the molecu- lar details of these immune systems’ functions are relatively well understood, their epidemiological consequences for the phage-bacterial communities have been largely neglected. In this thesis we employed both experimental and theoretical methods to explore whether herd and social immunity may arise in bacterial popu- lations. Using our experimental system consisting of Escherichia coli strains with a CRISPR based immunity to the T7 phage we show that herd immunity arises in phage-bacterial communities and that it is accentuated when the populations are spatially structured. By fitting a mathematical model, we inferred expressions for the herd immunity threshold and the velocity of spread of a phage epidemic in partially resistant bacterial populations, which both depend on the bacterial growth rate, phage burst size and phage latent period. We also investigated the poten- tial for social immunity in Streptococcus thermophilus and its phage 2972 using a bioinformatic analysis of potentially coding short open reading frames with a signalling signature, encoded within the CRISPR associated genes. Subsequently, we tested one identified potentially signalling peptide and found that its addition to a phage-challenged culture increases probability of survival of bacteria two fold, although the results were only marginally significant. Together, these results demonstrate that the ubiquitous arms races between bacteria and phages have further consequences at the level of the population.","lang":"eng"}],"file_date_updated":"2021-02-22T13:45:59Z","ddc":["570"],"status":"public","_id":"6291","oa_version":"Published Version","publication_status":"published","month":"02","language":[{"iso":"eng"}],"degree_awarded":"PhD"},{"pubrep_id":"906","ddc":["005"],"page":"356 - 362","file":[{"date_updated":"2020-07-14T12:47:27Z","file_id":"4913","file_size":443635,"creator":"system","access_level":"open_access","content_type":"application/pdf","relation":"main_file","checksum":"1254dcc5b04a996d97fad9a726b42727","date_created":"2018-12-12T10:11:56Z","file_name":"IST-2017-906-v1+1_SHTI236-0356.pdf"}],"abstract":[{"text":"Background: Standards have become available to share semantically encoded vital parameters from medical devices, as required for example by personal healthcare records. Standardised sharing of biosignal data largely remains open. Objectives: The goal of this work is to explore available biosignal file format and data exchange standards and profiles, and to conceptualise end-To-end solutions. Methods: The authors reviewed and discussed available biosignal file format standards with other members of international standards development organisations (SDOs). Results: A raw concept for standards based acquisition, storage, archiving and sharing of biosignals was developed. The GDF format may serve for storing biosignals. Signals can then be shared using FHIR resources and may be stored on FHIR servers or in DICOM archives, with DICOM waveforms as one possible format. Conclusion: Currently a group of international SDOs (e.g. HL7, IHE, DICOM, IEEE) is engaged in intensive discussions. This discussion extends existing work that already was adopted by large implementer communities. The concept presented here only reports the current status of the discussion in Austria. The discussion will continue internationally, with results to be expected over the coming years.","lang":"eng"}],"doi":"10.3233/978-1-61499-759-7-356","citation":{"ista":"Sauermann S, David V, Schlögl A, Egelkraut R, Frohner M, Pohn B, Urbauer P, Mense A. 2017. Biosignals standards and FHIR: The way to go. eHealth: Health Informatics Meets eHealth, Studies in Health Technology and Informatics, vol. 236, 356–362.","ama":"Sauermann S, David V, Schlögl A, et al. Biosignals standards and FHIR: The way to go. In: Vol 236. IOS Press; 2017:356-362. doi:<a href=\"https://doi.org/10.3233/978-1-61499-759-7-356\">10.3233/978-1-61499-759-7-356</a>","ieee":"S. Sauermann <i>et al.</i>, “Biosignals standards and FHIR: The way to go,” presented at the eHealth: Health Informatics Meets eHealth, Vienna, Austria, 2017, vol. 236, pp. 356–362.","chicago":"Sauermann, Stefan, Veronika David, Alois Schlögl, Reinhard Egelkraut, Matthias Frohner, Birgit Pohn, Philipp Urbauer, and Alexander Mense. “Biosignals Standards and FHIR: The Way to Go,” 236:356–62. IOS Press, 2017. <a href=\"https://doi.org/10.3233/978-1-61499-759-7-356\">https://doi.org/10.3233/978-1-61499-759-7-356</a>.","apa":"Sauermann, S., David, V., Schlögl, A., Egelkraut, R., Frohner, M., Pohn, B., … Mense, A. (2017). Biosignals standards and FHIR: The way to go (Vol. 236, pp. 356–362). Presented at the eHealth: Health Informatics Meets eHealth, Vienna, Austria: IOS Press. <a href=\"https://doi.org/10.3233/978-1-61499-759-7-356\">https://doi.org/10.3233/978-1-61499-759-7-356</a>","short":"S. Sauermann, V. David, A. Schlögl, R. Egelkraut, M. Frohner, B. Pohn, P. Urbauer, A. Mense, in:, IOS Press, 2017, pp. 356–362.","mla":"Sauermann, Stefan, et al. <i>Biosignals Standards and FHIR: The Way to Go</i>. Vol. 236, IOS Press, 2017, pp. 356–62, doi:<a href=\"https://doi.org/10.3233/978-1-61499-759-7-356\">10.3233/978-1-61499-759-7-356</a>."},"title":"Biosignals standards and FHIR: The way to go","day":"01","department":[{"_id":"ScienComp"},{"_id":"PeJo"}],"publisher":"IOS Press","language":[{"iso":"eng"}],"intvolume":"       236","publication_status":"published","month":"01","_id":"630","oa_version":"Published Version","file_date_updated":"2020-07-14T12:47:27Z","status":"public","conference":{"name":"eHealth: Health Informatics Meets eHealth","end_date":"2017-05-24","start_date":"2017-05-23","location":"Vienna, Austria"},"license":"https://creativecommons.org/licenses/by-nc/4.0/","author":[{"last_name":"Sauermann","full_name":"Sauermann, Stefan","first_name":"Stefan"},{"last_name":"David","full_name":"David, Veronika","first_name":"Veronika"},{"first_name":"Alois","full_name":"Schlögl, Alois","orcid":"0000-0002-5621-8100","last_name":"Schlögl","id":"45BF87EE-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Egelkraut","full_name":"Egelkraut, Reinhard","first_name":"Reinhard"},{"last_name":"Frohner","full_name":"Frohner, Matthias","first_name":"Matthias"},{"last_name":"Pohn","full_name":"Pohn, Birgit","first_name":"Birgit"},{"full_name":"Urbauer, Philipp","first_name":"Philipp","last_name":"Urbauer"},{"full_name":"Mense, Alexander","first_name":"Alexander","last_name":"Mense"}],"quality_controlled":"1","alternative_title":["Studies in Health Technology and Informatics"],"publist_id":"7164","volume":236,"publication_identifier":{"isbn":["978-161499758-0"]},"tmp":{"name":"Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)","short":"CC BY-NC (4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nc/4.0/legalcode","image":"/images/cc_by_nc.png"},"date_created":"2018-12-11T11:47:36Z","type":"conference","has_accepted_license":"1","date_published":"2017-01-01T00:00:00Z","scopus_import":1,"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_updated":"2021-01-12T08:06:59Z","year":"2017","oa":1},{"acknowledgement":"This research was supported in part by the Austrian Science Fund (FWF) under grants S11402-N23 (RiSE/SHiNE) and Z211-N23 (Wittgenstein Award), by the European Commission under grant 643921 (UnCoVerCPS), and by the ARC project DP140104219 (Robust AI Planning for Hybrid Systems).","alternative_title":["LNCS"],"author":[{"last_name":"Bogomolov","id":"369D9A44-F248-11E8-B48F-1D18A9856A87","first_name":"Sergiy","full_name":"Bogomolov, Sergiy","orcid":"0000-0002-0686-0365"},{"last_name":"Frehse","full_name":"Frehse, Goran","first_name":"Goran"},{"id":"3444EA5E-F248-11E8-B48F-1D18A9856A87","last_name":"Giacobbe","full_name":"Giacobbe, Mirco","orcid":"0000-0001-8180-0904","first_name":"Mirco"},{"last_name":"Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724"}],"quality_controlled":"1","conference":{"name":"TACAS: Tools and Algorithms for the Construction and Analysis of Systems","start_date":"2017-04-22","end_date":"2017-04-29","location":"Uppsala, Sweden"},"language":[{"iso":"eng"}],"publication_status":"published","month":"03","intvolume":"     10205","oa_version":"Submitted Version","_id":"631","file_date_updated":"2020-07-14T12:47:27Z","status":"public","oa":1,"scopus_import":1,"date_updated":"2023-09-07T12:53:00Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","year":"2017","has_accepted_license":"1","date_published":"2017-03-31T00:00:00Z","volume":10205,"publist_id":"7162","publication_identifier":{"isbn":["978-366254576-8"]},"date_created":"2018-12-11T11:47:36Z","type":"conference","abstract":[{"lang":"eng","text":"Template polyhedra generalize intervals and octagons to polyhedra whose facets are orthogonal to a given set of arbitrary directions. They have been employed in the abstract interpretation of programs and, with particular success, in the reachability analysis of hybrid automata. While previously, the choice of directions has been left to the user or a heuristic, we present a method for the automatic discovery of directions that generalize and eliminate spurious counterexamples. We show that for the class of convex hybrid automata, i.e., hybrid automata with (possibly nonlinear) convex constraints on derivatives, such directions always exist and can be found using convex optimization. We embed our method inside a CEGAR loop, thus enabling the time-unbounded reachability analysis of an important and richer class of hybrid automata than was previously possible. We evaluate our method on several benchmarks, demonstrating also its superior efficiency for the special case of linear hybrid automata."}],"page":"589 - 606","file":[{"date_created":"2018-12-12T10:11:41Z","file_name":"IST-2017-741-v1+1_main.pdf","date_updated":"2020-07-14T12:47:27Z","file_size":569863,"file_id":"4897","access_level":"open_access","content_type":"application/pdf","creator":"system","checksum":"f395d0d20102b89aeaad8b4ef4f18f4f","relation":"main_file"},{"file_name":"IST-2018-741-v2+2_main.pdf","date_created":"2018-12-12T10:11:42Z","checksum":"f416ee1ae4497b23ecdf28b1f18bb8df","relation":"main_file","creator":"system","access_level":"open_access","content_type":"application/pdf","file_size":563276,"file_id":"4898","date_updated":"2020-07-14T12:47:27Z"}],"pubrep_id":"966","ddc":["000"],"project":[{"grant_number":"S11402-N23","_id":"25F5A88A-B435-11E9-9278-68D0E5697425","name":"Moderne Concurrency Paradigms","call_identifier":"FWF"},{"name":"The Wittgenstein Prize","_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211","call_identifier":"FWF"}],"day":"31","department":[{"_id":"ToHe"}],"publisher":"Springer","citation":{"chicago":"Bogomolov, Sergiy, Goran Frehse, Mirco Giacobbe, and Thomas A Henzinger. “Counterexample Guided Refinement of Template Polyhedra,” 10205:589–606. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-662-54577-5_34\">https://doi.org/10.1007/978-3-662-54577-5_34</a>.","short":"S. Bogomolov, G. Frehse, M. Giacobbe, T.A. Henzinger, in:, Springer, 2017, pp. 589–606.","mla":"Bogomolov, Sergiy, et al. <i>Counterexample Guided Refinement of Template Polyhedra</i>. Vol. 10205, Springer, 2017, pp. 589–606, doi:<a href=\"https://doi.org/10.1007/978-3-662-54577-5_34\">10.1007/978-3-662-54577-5_34</a>.","apa":"Bogomolov, S., Frehse, G., Giacobbe, M., &#38; Henzinger, T. A. (2017). Counterexample guided refinement of template polyhedra (Vol. 10205, pp. 589–606). Presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, Uppsala, Sweden: Springer. <a href=\"https://doi.org/10.1007/978-3-662-54577-5_34\">https://doi.org/10.1007/978-3-662-54577-5_34</a>","ista":"Bogomolov S, Frehse G, Giacobbe M, Henzinger TA. 2017. Counterexample guided refinement of template polyhedra. TACAS: Tools and Algorithms for the Construction and Analysis of Systems, LNCS, vol. 10205, 589–606.","ieee":"S. Bogomolov, G. Frehse, M. Giacobbe, and T. A. Henzinger, “Counterexample guided refinement of template polyhedra,” presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, Uppsala, Sweden, 2017, vol. 10205, pp. 589–606.","ama":"Bogomolov S, Frehse G, Giacobbe M, Henzinger TA. Counterexample guided refinement of template polyhedra. In: Vol 10205. Springer; 2017:589-606. doi:<a href=\"https://doi.org/10.1007/978-3-662-54577-5_34\">10.1007/978-3-662-54577-5_34</a>"},"related_material":{"record":[{"relation":"dissertation_contains","status":"public","id":"6894"}]},"title":"Counterexample guided refinement of template polyhedra","doi":"10.1007/978-3-662-54577-5_34"},{"doi":"10.1090/proc/13468","publication":"Proceedings of the American Mathematical Society","publisher":"American Mathematical Society","main_file_link":[{"url":"https://arxiv.org/abs/1509.09045","open_access":"1"}],"department":[{"_id":"RoSe"}],"project":[{"name":"International IST Postdoc Fellowship Programme","_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734","call_identifier":"FP7"}],"day":"01","title":"A note on 2D focusing many boson systems","citation":{"ista":"Lewin M, Nam P, Rougerie N. 2017. A note on 2D focusing many boson systems. Proceedings of the American Mathematical Society. 145(6), 2441–2454.","ieee":"M. Lewin, P. Nam, and N. Rougerie, “A note on 2D focusing many boson systems,” <i>Proceedings of the American Mathematical Society</i>, vol. 145, no. 6. American Mathematical Society, pp. 2441–2454, 2017.","ama":"Lewin M, Nam P, Rougerie N. A note on 2D focusing many boson systems. <i>Proceedings of the American Mathematical Society</i>. 2017;145(6):2441-2454. doi:<a href=\"https://doi.org/10.1090/proc/13468\">10.1090/proc/13468</a>","chicago":"Lewin, Mathieu, Phan Nam, and Nicolas Rougerie. “A Note on 2D Focusing Many Boson Systems.” <i>Proceedings of the American Mathematical Society</i>. American Mathematical Society, 2017. <a href=\"https://doi.org/10.1090/proc/13468\">https://doi.org/10.1090/proc/13468</a>.","apa":"Lewin, M., Nam, P., &#38; Rougerie, N. (2017). A note on 2D focusing many boson systems. <i>Proceedings of the American Mathematical Society</i>. American Mathematical Society. <a href=\"https://doi.org/10.1090/proc/13468\">https://doi.org/10.1090/proc/13468</a>","short":"M. Lewin, P. Nam, N. Rougerie, Proceedings of the American Mathematical Society 145 (2017) 2441–2454.","mla":"Lewin, Mathieu, et al. “A Note on 2D Focusing Many Boson Systems.” <i>Proceedings of the American Mathematical Society</i>, vol. 145, no. 6, American Mathematical Society, 2017, pp. 2441–54, doi:<a href=\"https://doi.org/10.1090/proc/13468\">10.1090/proc/13468</a>."},"issue":"6","abstract":[{"lang":"eng","text":"We consider a 2D quantum system of N bosons in a trapping potential |x|s, interacting via a pair potential of the form N2β−1 w(Nβ x). We show that for all 0 &lt; β &lt; (s + 1)/(s + 2), the leading order behavior of ground states of the many-body system is described in the large N limit by the corresponding cubic nonlinear Schrödinger energy functional. Our result covers the focusing case (w &lt; 0) where even the stability of the many-body system is not obvious. This answers an open question mentioned by X. Chen and J. Holmer for harmonic traps (s = 2). Together with the BBGKY hierarchy approach used by these authors, our result implies the convergence of the many-body quantum dynamics to the focusing NLS equation with harmonic trap for all 0 &lt; β &lt; 3/4. "}],"page":"2441 - 2454","date_published":"2017-01-01T00:00:00Z","type":"journal_article","date_created":"2018-12-11T11:47:36Z","publist_id":"7160","volume":145,"ec_funded":1,"oa":1,"year":"2017","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","date_updated":"2021-01-12T08:07:03Z","scopus_import":1,"status":"public","_id":"632","oa_version":"Submitted Version","intvolume":"       145","publication_status":"published","month":"01","language":[{"iso":"eng"}],"quality_controlled":"1","author":[{"last_name":"Lewin","full_name":"Lewin, Mathieu","first_name":"Mathieu"},{"full_name":"Nam, Phan","first_name":"Phan","id":"404092F4-F248-11E8-B48F-1D18A9856A87","last_name":"Nam"},{"first_name":"Nicolas","full_name":"Rougerie, Nicolas","last_name":"Rougerie"}]},{"doi":"10.1007/978-3-319-63501-9_6","editor":[{"last_name":"Abate","first_name":"Alessandro","full_name":"Abate, Alessandro"},{"last_name":"Bodo","first_name":"Sylvie","full_name":"Bodo, Sylvie"}],"citation":{"chicago":"Bak, Stanley, Sergiy Bogomolov, Thomas A Henzinger, and Aviral Kumar. “Challenges and Tool Implementation of Hybrid Rapidly Exploring Random Trees.” edited by Alessandro Abate and Sylvie Bodo, 10381:83–89. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-63501-9_6\">https://doi.org/10.1007/978-3-319-63501-9_6</a>.","apa":"Bak, S., Bogomolov, S., Henzinger, T. A., &#38; Kumar, A. (2017). Challenges and tool implementation of hybrid rapidly exploring random trees. In A. Abate &#38; S. Bodo (Eds.) (Vol. 10381, pp. 83–89). Presented at the NSV: Numerical Software Verification, Heidelberg, Germany: Springer. <a href=\"https://doi.org/10.1007/978-3-319-63501-9_6\">https://doi.org/10.1007/978-3-319-63501-9_6</a>","mla":"Bak, Stanley, et al. <i>Challenges and Tool Implementation of Hybrid Rapidly Exploring Random Trees</i>. Edited by Alessandro Abate and Sylvie Bodo, vol. 10381, Springer, 2017, pp. 83–89, doi:<a href=\"https://doi.org/10.1007/978-3-319-63501-9_6\">10.1007/978-3-319-63501-9_6</a>.","short":"S. Bak, S. Bogomolov, T.A. Henzinger, A. Kumar, in:, A. Abate, S. Bodo (Eds.), Springer, 2017, pp. 83–89.","ista":"Bak S, Bogomolov S, Henzinger TA, Kumar A. 2017. Challenges and tool implementation of hybrid rapidly exploring random trees. NSV: Numerical Software Verification, LNCS, vol. 10381, 83–89.","ama":"Bak S, Bogomolov S, Henzinger TA, Kumar A. Challenges and tool implementation of hybrid rapidly exploring random trees. In: Abate A, Bodo S, eds. Vol 10381. Springer; 2017:83-89. doi:<a href=\"https://doi.org/10.1007/978-3-319-63501-9_6\">10.1007/978-3-319-63501-9_6</a>","ieee":"S. Bak, S. Bogomolov, T. A. Henzinger, and A. Kumar, “Challenges and tool implementation of hybrid rapidly exploring random trees,” presented at the NSV: Numerical Software Verification, Heidelberg, Germany, 2017, vol. 10381, pp. 83–89."},"title":"Challenges and tool implementation of hybrid rapidly exploring random trees","project":[{"_id":"25F5A88A-B435-11E9-9278-68D0E5697425","name":"Moderne Concurrency Paradigms","grant_number":"S11402-N23","call_identifier":"FWF"},{"call_identifier":"FWF","name":"The Wittgenstein Prize","_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211"}],"day":"01","department":[{"_id":"ToHe"}],"publisher":"Springer","page":"83 - 89","abstract":[{"text":"A Rapidly-exploring Random Tree (RRT) is an algorithm which can search a non-convex region of space by incrementally building a space-filling tree. The tree is constructed from random points drawn from system’s state space and is biased to grow towards large unexplored areas in the system. RRT can provide better coverage of a system’s possible behaviors compared with random simulations, but is more lightweight than full reachability analysis. In this paper, we explore some of the design decisions encountered while implementing a hybrid extension of the RRT algorithm, which have not been elaborated on before. In particular, we focus on handling non-determinism, which arises due to discrete transitions. We introduce the notion of important points to account for this phenomena. We showcase our ideas using heater and navigation benchmarks.","lang":"eng"}],"volume":10381,"publist_id":"7159","publication_identifier":{"isbn":["978-331963500-2"]},"date_created":"2018-12-11T11:47:37Z","type":"conference","date_published":"2017-01-01T00:00:00Z","scopus_import":1,"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_updated":"2021-01-12T08:07:06Z","year":"2017","language":[{"iso":"eng"}],"intvolume":"     10381","month":"01","publication_status":"published","_id":"633","oa_version":"None","status":"public","conference":{"start_date":"2017-07-22","end_date":"2017-07-23","location":"Heidelberg, Germany","name":"NSV: Numerical Software Verification"},"author":[{"full_name":"Bak, Stanley","first_name":"Stanley","last_name":"Bak"},{"full_name":"Bogomolov, Sergiy","orcid":"0000-0002-0686-0365","first_name":"Sergiy","id":"369D9A44-F248-11E8-B48F-1D18A9856A87","last_name":"Bogomolov"},{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724","first_name":"Thomas A"},{"last_name":"Kumar","first_name":"Aviral","full_name":"Kumar, Aviral"}],"quality_controlled":"1","alternative_title":["LNCS"]},{"series_title":"Advances in Anatomy Embryology and Cell Biology","alternative_title":["ADVSANAT"],"author":[{"first_name":"Jan","full_name":"Schroeder, Jan","last_name":"Schroeder"},{"last_name":"Deliu","id":"37A40D7E-F248-11E8-B48F-1D18A9856A87","first_name":"Elena","full_name":"Deliu, Elena","orcid":"0000-0002-7370-5293"},{"full_name":"Novarino, Gaia","orcid":"0000-0002-7673-7178","first_name":"Gaia","id":"3E57A680-F248-11E8-B48F-1D18A9856A87","last_name":"Novarino"},{"last_name":"Schmeisser","full_name":"Schmeisser, Michael","first_name":"Michael"}],"quality_controlled":"1","publication_status":"published","month":"05","intvolume":"       224","language":[{"iso":"eng"}],"status":"public","_id":"634","oa_version":"None","date_updated":"2021-01-12T08:07:08Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","scopus_import":1,"year":"2017","date_published":"2017-05-28T00:00:00Z","publication_identifier":{"eisbn":["978-3-319-52498-6"]},"volume":224,"publist_id":"7156","type":"book_chapter","date_created":"2018-12-11T11:47:37Z","abstract":[{"text":"As autism spectrum disorder (ASD) is largely regarded as a neurodevelopmental condition, long-time consensus was that its hallmark features are irreversible. However, several studies from recent years using defined mouse models of ASD have provided clear evidence that in mice neurobiological and behavioural alterations can be ameliorated or even reversed by genetic restoration or pharmacological treatment either before or after symptom onset. Here, we review findings on genetic and pharmacological reversibility of phenotypes in mouse models of ASD. Our review should give a comprehensive overview on both aspects and encourage future studies to better understand the underlying molecular mechanisms that might be translatable from animals to humans.","lang":"eng"}],"page":"189 - 211","project":[{"call_identifier":"FWF","name":"Transmembrane Transporters in Health and Disease","_id":"25473368-B435-11E9-9278-68D0E5697425","grant_number":"F03523"}],"day":"28","publisher":"Springer","publication":"Translational Anatomy and Cell Biology of Autism Spectrum Disorder","department":[{"_id":"GaNo"}],"citation":{"ieee":"J. Schroeder, E. Deliu, G. Novarino, and M. Schmeisser, “Genetic and pharmacological reversibility of phenotypes in mouse models of autism spectrum disorder,” in <i>Translational Anatomy and Cell Biology of Autism Spectrum Disorder</i>, vol. 224, M. Schmeisser and T. Boekers, Eds. Springer, 2017, pp. 189–211.","ama":"Schroeder J, Deliu E, Novarino G, Schmeisser M. Genetic and pharmacological reversibility of phenotypes in mouse models of autism spectrum disorder. In: Schmeisser M, Boekers T, eds. <i>Translational Anatomy and Cell Biology of Autism Spectrum Disorder</i>. Vol 224. Advances in Anatomy Embryology and Cell Biology. Springer; 2017:189-211. doi:<a href=\"https://doi.org/10.1007/978-3-319-52498-6_10\">10.1007/978-3-319-52498-6_10</a>","ista":"Schroeder J, Deliu E, Novarino G, Schmeisser M. 2017.Genetic and pharmacological reversibility of phenotypes in mouse models of autism spectrum disorder. In: Translational Anatomy and Cell Biology of Autism Spectrum Disorder. ADVSANAT, vol. 224, 189–211.","apa":"Schroeder, J., Deliu, E., Novarino, G., &#38; Schmeisser, M. (2017). Genetic and pharmacological reversibility of phenotypes in mouse models of autism spectrum disorder. In M. Schmeisser &#38; T. Boekers (Eds.), <i>Translational Anatomy and Cell Biology of Autism Spectrum Disorder</i> (Vol. 224, pp. 189–211). Springer. <a href=\"https://doi.org/10.1007/978-3-319-52498-6_10\">https://doi.org/10.1007/978-3-319-52498-6_10</a>","mla":"Schroeder, Jan, et al. “Genetic and Pharmacological Reversibility of Phenotypes in Mouse Models of Autism Spectrum Disorder.” <i>Translational Anatomy and Cell Biology of Autism Spectrum Disorder</i>, edited by Michael Schmeisser and Tobias Boekers, vol. 224, Springer, 2017, pp. 189–211, doi:<a href=\"https://doi.org/10.1007/978-3-319-52498-6_10\">10.1007/978-3-319-52498-6_10</a>.","short":"J. Schroeder, E. Deliu, G. Novarino, M. Schmeisser, in:, M. Schmeisser, T. Boekers (Eds.), Translational Anatomy and Cell Biology of Autism Spectrum Disorder, Springer, 2017, pp. 189–211.","chicago":"Schroeder, Jan, Elena Deliu, Gaia Novarino, and Michael Schmeisser. “Genetic and Pharmacological Reversibility of Phenotypes in Mouse Models of Autism Spectrum Disorder.” In <i>Translational Anatomy and Cell Biology of Autism Spectrum Disorder</i>, edited by Michael Schmeisser and Tobias Boekers, 224:189–211. Advances in Anatomy Embryology and Cell Biology. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-52498-6_10\">https://doi.org/10.1007/978-3-319-52498-6_10</a>."},"title":"Genetic and pharmacological reversibility of phenotypes in mouse models of autism spectrum disorder","doi":"10.1007/978-3-319-52498-6_10","editor":[{"full_name":"Schmeisser, Michael","first_name":"Michael","last_name":"Schmeisser"},{"full_name":"Boekers, Tobias","first_name":"Tobias","last_name":"Boekers"}]},{"abstract":[{"text":"Memory-hard functions (MHFs) are hash algorithms whose evaluation cost is dominated by memory cost. As memory, unlike computation, costs about the same across different platforms, MHFs cannot be evaluated at significantly lower cost on dedicated hardware like ASICs. MHFs have found widespread applications including password hashing, key derivation, and proofs-of-work. This paper focuses on scrypt, a simple candidate MHF designed by Percival, and described in RFC 7914. It has been used within a number of cryptocurrencies (e.g., Litecoin and Dogecoin) and has been an inspiration for Argon2d, one of the winners of the recent password-hashing competition. Despite its popularity, no rigorous lower bounds on its memory complexity are known. We prove that scrypt is optimally memory-hard, i.e., its cumulative memory complexity (cmc) in the parallel random oracle model is Ω(n2w), where w and n are the output length and number of invocations of the underlying hash function, respectively. High cmc is a strong security target for MHFs introduced by Alwen and Serbinenko (STOC’15) which implies high memory cost even for adversaries who can amortize the cost over many evaluations and evaluate the underlying hash functions many times in parallel. Our proof is the first showing optimal memory-hardness for any MHF. Our result improves both quantitatively and qualitatively upon the recent work by Alwen et al. (EUROCRYPT’16) who proved a weaker lower bound of Ω(n2w/ log2 n) for a restricted class of adversaries.","lang":"eng"}],"page":"33 - 62","editor":[{"last_name":"Coron","first_name":"Jean-Sébastien","full_name":"Coron, Jean-Sébastien"},{"last_name":"Buus Nielsen","first_name":"Jesper","full_name":"Buus Nielsen, Jesper"}],"doi":"10.1007/978-3-319-56617-7_2","department":[{"_id":"KrPi"}],"main_file_link":[{"url":"https://eprint.iacr.org/2016/989","open_access":"1"}],"publisher":"Springer","project":[{"_id":"258AA5B2-B435-11E9-9278-68D0E5697425","name":"Teaching Old Crypto New Tricks","grant_number":"682815","call_identifier":"H2020"}],"day":"01","title":"Scrypt is maximally memory hard","citation":{"ista":"Alwen JF, Chen B, Pietrzak KZ, Reyzin L, Tessaro S. 2017. Scrypt is maximally memory hard. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 10212, 33–62.","ama":"Alwen JF, Chen B, Pietrzak KZ, Reyzin L, Tessaro S. Scrypt is maximally memory hard. In: Coron J-S, Buus Nielsen J, eds. Vol 10212. Springer; 2017:33-62. doi:<a href=\"https://doi.org/10.1007/978-3-319-56617-7_2\">10.1007/978-3-319-56617-7_2</a>","ieee":"J. F. Alwen, B. Chen, K. Z. Pietrzak, L. Reyzin, and S. Tessaro, “Scrypt is maximally memory hard,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Paris, France, 2017, vol. 10212, pp. 33–62.","chicago":"Alwen, Joel F, Binchi Chen, Krzysztof Z Pietrzak, Leonid Reyzin, and Stefano Tessaro. “Scrypt Is Maximally Memory Hard.” edited by Jean-Sébastien Coron and Jesper Buus Nielsen, 10212:33–62. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-56617-7_2\">https://doi.org/10.1007/978-3-319-56617-7_2</a>.","apa":"Alwen, J. F., Chen, B., Pietrzak, K. Z., Reyzin, L., &#38; Tessaro, S. (2017). Scrypt is maximally memory hard. In J.-S. Coron &#38; J. Buus Nielsen (Eds.) (Vol. 10212, pp. 33–62). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Paris, France: Springer. <a href=\"https://doi.org/10.1007/978-3-319-56617-7_2\">https://doi.org/10.1007/978-3-319-56617-7_2</a>","mla":"Alwen, Joel F., et al. <i>Scrypt Is Maximally Memory Hard</i>. Edited by Jean-Sébastien Coron and Jesper Buus Nielsen, vol. 10212, Springer, 2017, pp. 33–62, doi:<a href=\"https://doi.org/10.1007/978-3-319-56617-7_2\">10.1007/978-3-319-56617-7_2</a>.","short":"J.F. Alwen, B. Chen, K.Z. Pietrzak, L. Reyzin, S. Tessaro, in:, J.-S. Coron, J. Buus Nielsen (Eds.), Springer, 2017, pp. 33–62."},"conference":{"name":"EUROCRYPT: Theory and Applications of Cryptographic Techniques","location":"Paris, France","end_date":"2017-05-04","start_date":"2017-04-30"},"_id":"635","oa_version":"Submitted Version","status":"public","language":[{"iso":"eng"}],"month":"01","intvolume":"     10212","publication_status":"published","alternative_title":["LNCS"],"quality_controlled":"1","author":[{"first_name":"Joel F","full_name":"Alwen, Joel F","last_name":"Alwen","id":"2A8DFA8C-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Chen, Binchi","first_name":"Binchi","last_name":"Chen"},{"id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","last_name":"Pietrzak","full_name":"Pietrzak, Krzysztof Z","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z"},{"full_name":"Reyzin, Leonid","first_name":"Leonid","last_name":"Reyzin"},{"first_name":"Stefano","full_name":"Tessaro, Stefano","last_name":"Tessaro"}],"date_published":"2017-01-01T00:00:00Z","date_created":"2018-12-11T11:47:37Z","type":"conference","publist_id":"7154","volume":10212,"publication_identifier":{"isbn":["978-331956616-0"]},"ec_funded":1,"oa":1,"year":"2017","scopus_import":1,"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","date_updated":"2021-01-12T08:07:10Z"},{"title":"On the quantitative semantics of regular expressions over real-valued signals","citation":{"short":"A. Bakhirkin, T. Ferrere, O. Maler, D. Ulus, in:, A. Abate, G. Geeraerts (Eds.), Springer, 2017, pp. 189–206.","mla":"Bakhirkin, Alexey, et al. <i>On the Quantitative Semantics of Regular Expressions over Real-Valued Signals</i>. Edited by Alessandro Abate and Gilles Geeraerts, vol. 10419, Springer, 2017, pp. 189–206, doi:<a href=\"https://doi.org/10.1007/978-3-319-65765-3_11\">10.1007/978-3-319-65765-3_11</a>.","apa":"Bakhirkin, A., Ferrere, T., Maler, O., &#38; Ulus, D. (2017). On the quantitative semantics of regular expressions over real-valued signals. In A. Abate &#38; G. Geeraerts (Eds.) (Vol. 10419, pp. 189–206). Presented at the FORMATS: Formal Modelling and Analysis of Timed Systems, Berlin, Germany: Springer. <a href=\"https://doi.org/10.1007/978-3-319-65765-3_11\">https://doi.org/10.1007/978-3-319-65765-3_11</a>","chicago":"Bakhirkin, Alexey, Thomas Ferrere, Oded Maler, and Dogan Ulus. “On the Quantitative Semantics of Regular Expressions over Real-Valued Signals.” edited by Alessandro Abate and Gilles Geeraerts, 10419:189–206. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-65765-3_11\">https://doi.org/10.1007/978-3-319-65765-3_11</a>.","ieee":"A. Bakhirkin, T. Ferrere, O. Maler, and D. Ulus, “On the quantitative semantics of regular expressions over real-valued signals,” presented at the FORMATS: Formal Modelling and Analysis of Timed Systems, Berlin, Germany, 2017, vol. 10419, pp. 189–206.","ama":"Bakhirkin A, Ferrere T, Maler O, Ulus D. On the quantitative semantics of regular expressions over real-valued signals. In: Abate A, Geeraerts G, eds. Vol 10419. Springer; 2017:189-206. doi:<a href=\"https://doi.org/10.1007/978-3-319-65765-3_11\">10.1007/978-3-319-65765-3_11</a>","ista":"Bakhirkin A, Ferrere T, Maler O, Ulus D. 2017. On the quantitative semantics of regular expressions over real-valued signals. FORMATS: Formal Modelling and Analysis of Timed Systems, LNCS, vol. 10419, 189–206."},"publisher":"Springer","department":[{"_id":"ToHe"}],"main_file_link":[{"open_access":"1","url":"https://hal.archives-ouvertes.fr/hal-01552132"}],"project":[{"call_identifier":"FWF","grant_number":"S11402-N23","name":"Moderne Concurrency Paradigms","_id":"25F5A88A-B435-11E9-9278-68D0E5697425"},{"grant_number":"Z211","name":"The Wittgenstein Prize","_id":"25F42A32-B435-11E9-9278-68D0E5697425","call_identifier":"FWF"}],"day":"03","editor":[{"last_name":"Abate","first_name":"Alessandro","full_name":"Abate, Alessandro"},{"first_name":"Gilles","full_name":"Geeraerts, Gilles","last_name":"Geeraerts"}],"doi":"10.1007/978-3-319-65765-3_11","page":"189 - 206","abstract":[{"text":"Signal regular expressions can specify sequential properties of real-valued signals based on threshold conditions, regular operations, and duration constraints. In this paper we endow them with a quantitative semantics which indicates how robustly a signal matches or does not match a given expression. First, we show that this semantics is a safe approximation of a distance between the signal and the language defined by the expression. Then, we consider the robust matching problem, that is, computing the quantitative semantics of every segment of a given signal relative to an expression. We present an algorithm that solves this problem for piecewise-constant and piecewise-linear signals and show that for such signals the robustness map is a piecewise-linear function. The availability of an indicator describing how robustly a signal segment matches some regular pattern provides a general framework for quantitative monitoring of cyber-physical systems.","lang":"eng"}],"year":"2017","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","date_updated":"2021-01-12T08:07:14Z","scopus_import":1,"oa":1,"type":"conference","date_created":"2018-12-11T11:47:38Z","publication_identifier":{"isbn":["978-331965764-6"]},"publist_id":"7152","volume":10419,"date_published":"2017-08-03T00:00:00Z","quality_controlled":"1","author":[{"full_name":"Bakhirkin, Alexey","first_name":"Alexey","last_name":"Bakhirkin"},{"id":"40960E6E-F248-11E8-B48F-1D18A9856A87","last_name":"Ferrere","orcid":"0000-0001-5199-3143","full_name":"Ferrere, Thomas","first_name":"Thomas"},{"last_name":"Maler","full_name":"Maler, Oded","first_name":"Oded"},{"full_name":"Ulus, Dogan","first_name":"Dogan","last_name":"Ulus"}],"alternative_title":["LNCS"],"status":"public","_id":"636","oa_version":"Submitted Version","intvolume":"     10419","month":"08","publication_status":"published","language":[{"iso":"eng"}],"conference":{"end_date":"2017-09-07","start_date":"2017-09-05","location":"Berlin, Germany","name":"FORMATS: Formal Modelling and Analysis of Timed Systems"}},{"year":"2017","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","date_updated":"2023-09-07T13:32:11Z","scopus_import":1,"ec_funded":1,"oa":1,"type":"conference","date_created":"2018-12-11T11:47:38Z","publication_identifier":{"isbn":["978-331963687-0"]},"volume":10401,"publist_id":"7151","date_published":"2017-01-01T00:00:00Z","quality_controlled":"1","author":[{"last_name":"Jafargholi","full_name":"Jafargholi, Zahra","first_name":"Zahra"},{"first_name":"Chethan","full_name":"Kamath Hosdurg, Chethan","last_name":"Kamath Hosdurg","id":"4BD3F30E-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Klein","id":"3E83A2F8-F248-11E8-B48F-1D18A9856A87","first_name":"Karen","full_name":"Klein, Karen"},{"last_name":"Komargodski","first_name":"Ilan","full_name":"Komargodski, Ilan"},{"last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","first_name":"Krzysztof Z","full_name":"Pietrzak, Krzysztof Z","orcid":"0000-0002-9139-1654"},{"first_name":"Daniel","full_name":"Wichs, Daniel","last_name":"Wichs"}],"alternative_title":["LNCS"],"status":"public","_id":"637","oa_version":"Submitted Version","month":"01","intvolume":"     10401","publication_status":"published","language":[{"iso":"eng"}],"conference":{"location":"Santa Barbara, CA, United States","start_date":"2017-07-20","end_date":"2017-07-24","name":"CRYPTO: Cryptology"},"related_material":{"record":[{"relation":"dissertation_contains","id":"10035","status":"public"}]},"title":"Be adaptive avoid overcommitting","citation":{"ista":"Jafargholi Z, Kamath Hosdurg C, Klein K, Komargodski I, Pietrzak KZ, Wichs D. 2017. Be adaptive avoid overcommitting. CRYPTO: Cryptology, LNCS, vol. 10401, 133–163.","ama":"Jafargholi Z, Kamath Hosdurg C, Klein K, Komargodski I, Pietrzak KZ, Wichs D. Be adaptive avoid overcommitting. In: Katz J, Shacham H, eds. Vol 10401. Springer; 2017:133-163. doi:<a href=\"https://doi.org/10.1007/978-3-319-63688-7_5\">10.1007/978-3-319-63688-7_5</a>","ieee":"Z. Jafargholi, C. Kamath Hosdurg, K. Klein, I. Komargodski, K. Z. Pietrzak, and D. Wichs, “Be adaptive avoid overcommitting,” presented at the CRYPTO: Cryptology, Santa Barbara, CA, United States, 2017, vol. 10401, pp. 133–163.","chicago":"Jafargholi, Zahra, Chethan Kamath Hosdurg, Karen Klein, Ilan Komargodski, Krzysztof Z Pietrzak, and Daniel Wichs. “Be Adaptive Avoid Overcommitting.” edited by Jonathan Katz and Hovav Shacham, 10401:133–63. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-63688-7_5\">https://doi.org/10.1007/978-3-319-63688-7_5</a>.","apa":"Jafargholi, Z., Kamath Hosdurg, C., Klein, K., Komargodski, I., Pietrzak, K. Z., &#38; Wichs, D. (2017). Be adaptive avoid overcommitting. In J. Katz &#38; H. Shacham (Eds.) (Vol. 10401, pp. 133–163). Presented at the CRYPTO: Cryptology, Santa Barbara, CA, United States: Springer. <a href=\"https://doi.org/10.1007/978-3-319-63688-7_5\">https://doi.org/10.1007/978-3-319-63688-7_5</a>","mla":"Jafargholi, Zahra, et al. <i>Be Adaptive Avoid Overcommitting</i>. Edited by Jonathan Katz and Hovav Shacham, vol. 10401, Springer, 2017, pp. 133–63, doi:<a href=\"https://doi.org/10.1007/978-3-319-63688-7_5\">10.1007/978-3-319-63688-7_5</a>.","short":"Z. Jafargholi, C. Kamath Hosdurg, K. Klein, I. Komargodski, K.Z. Pietrzak, D. Wichs, in:, J. Katz, H. Shacham (Eds.), Springer, 2017, pp. 133–163."},"publisher":"Springer","department":[{"_id":"KrPi"}],"main_file_link":[{"url":"https://eprint.iacr.org/2017/515","open_access":"1"}],"day":"01","project":[{"call_identifier":"H2020","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","name":"Teaching Old Crypto New Tricks","grant_number":"682815"}],"editor":[{"first_name":"Jonathan","full_name":"Katz, Jonathan","last_name":"Katz"},{"last_name":"Shacham","full_name":"Shacham, Hovav","first_name":"Hovav"}],"doi":"10.1007/978-3-319-63688-7_5","page":"133 - 163","abstract":[{"lang":"eng","text":"For many cryptographic primitives, it is relatively easy to achieve selective security (where the adversary commits a-priori to some of the choices to be made later in the attack) but appears difficult to achieve the more natural notion of adaptive security (where the adversary can make all choices on the go as the attack progresses). A series of several recent works shows how to cleverly achieve adaptive security in several such scenarios including generalized selective decryption (Panjwani, TCC ’07 and Fuchsbauer et al., CRYPTO ’15), constrained PRFs (Fuchsbauer et al., ASIACRYPT ’14), and Yao garbled circuits (Jafargholi and Wichs, TCC ’16b). Although the above works expressed vague intuition that they share a common technique, the connection was never made precise. In this work we present a new framework that connects all of these works and allows us to present them in a unified and simplified fashion. Moreover, we use the framework to derive a new result for adaptively secure secret sharing over access structures defined via monotone circuits. We envision that further applications will follow in the future. Underlying our framework is the following simple idea. It is well known that selective security, where the adversary commits to n-bits of information about his future choices, automatically implies adaptive security at the cost of amplifying the adversary’s advantage by a factor of up to 2n. However, in some cases the proof of selective security proceeds via a sequence of hybrids, where each pair of adjacent hybrids locally only requires some smaller partial information consisting of m ≪ n bits. The partial information needed might be completely different between different pairs of hybrids, and if we look across all the hybrids we might rely on the entire n-bit commitment. Nevertheless, the above is sufficient to prove adaptive security, at the cost of amplifying the adversary’s advantage by a factor of only 2m ≪ 2n. In all of our examples using the above framework, the different hybrids are captured by some sort of a graph pebbling game and the amount of information that the adversary needs to commit to in each pair of hybrids is bounded by the maximum number of pebbles in play at any point in time. Therefore, coming up with better strategies for proving adaptive security translates to various pebbling strategies for different types of graphs."}]},{"quality_controlled":"1","abstract":[{"text":"This book constitutes the refereed proceedings of the 9th InternationalWorkshop on Numerical Software Verification, NSV 2016, held in Toronto, ON, Canada in July 2011 - colocated with CAV 2016, the 28th International Conference on Computer Aided Verification.\r\nThe NSV workshop is dedicated to the development of logical and mathematical techniques for the reasoning about programmability and reliability.","lang":"eng"}],"series_title":"LNCS","article_processing_charge":"No","language":[{"iso":"eng"}],"publication_status":"published","intvolume":"     10152","month":"01","_id":"638","oa_version":"None","status":"public","conference":{"name":"NSV: Numerical Software Verification","location":"Toronto, ON, Canada","end_date":"2016-07-18","start_date":"2016-07-17"},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_updated":"2022-05-24T07:09:52Z","citation":{"ama":"Bogomolov S, Martel M, Prabhakar P, eds. <i>Numerical Software Verification</i>. Vol 10152. Springer; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-319-54292-8\">10.1007/978-3-319-54292-8</a>","ieee":"S. Bogomolov, M. Martel, and P. Prabhakar, Eds., <i>Numerical Software Verification</i>, vol. 10152. Springer, 2017.","ista":"Bogomolov S, Martel M, Prabhakar P eds. 2017. Numerical Software Verification, Springer,p.","apa":"Bogomolov, S., Martel, M., &#38; Prabhakar, P. (Eds.). (2017). <i>Numerical Software Verification</i> (Vol. 10152). Presented at the NSV: Numerical Software Verification, Toronto, ON, Canada: Springer. <a href=\"https://doi.org/10.1007/978-3-319-54292-8\">https://doi.org/10.1007/978-3-319-54292-8</a>","mla":"Bogomolov, Sergiy, et al., editors. <i>Numerical Software Verification</i>. Vol. 10152, Springer, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-319-54292-8\">10.1007/978-3-319-54292-8</a>.","short":"S. Bogomolov, M. Martel, P. Prabhakar, eds., Numerical Software Verification, Springer, 2017.","chicago":"Bogomolov, Sergiy, Matthieu Martel, and Pavithra Prabhakar, eds. <i>Numerical Software Verification</i>. Vol. 10152. LNCS. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-54292-8\">https://doi.org/10.1007/978-3-319-54292-8</a>."},"title":"Numerical Software Verification","year":"2017","day":"01","department":[{"_id":"ToHe"}],"publisher":"Springer","publist_id":"7150","volume":10152,"publication_identifier":{"eisbn":["978-3-319-54292-8"],"issn":["0302-9743"]},"date_created":"2018-12-11T11:47:38Z","type":"conference_editor","doi":"10.1007/978-3-319-54292-8","editor":[{"id":"369D9A44-F248-11E8-B48F-1D18A9856A87","last_name":"Bogomolov","full_name":"Bogomolov, Sergiy","orcid":"0000-0002-0686-0365","first_name":"Sergiy"},{"full_name":"Martel, Matthieu","first_name":"Matthieu","last_name":"Martel"},{"full_name":"Prabhakar, Pavithra","first_name":"Pavithra","last_name":"Prabhakar"}],"date_published":"2017-01-01T00:00:00Z"},{"alternative_title":["LNCS"],"article_processing_charge":"No","quality_controlled":"1","author":[{"orcid":"0000-0002-4561-241X","full_name":"Chatterjee, Krishnendu","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","last_name":"Chatterjee"},{"full_name":"Fu, Hongfei","first_name":"Hongfei","last_name":"Fu"},{"full_name":"Goharshady, Amir","orcid":"0000-0003-1702-6584","first_name":"Amir","id":"391365CE-F248-11E8-B48F-1D18A9856A87","last_name":"Goharshady"}],"conference":{"end_date":"2017-07-28","start_date":"2017-07-24","location":"Heidelberg, Germany","name":"CAV: Computer Aided Verification"},"oa_version":"Submitted Version","_id":"639","status":"public","language":[{"iso":"eng"}],"external_id":{"arxiv":["1705.00317"]},"publication_status":"published","intvolume":"     10427","month":"01","ec_funded":1,"oa":1,"year":"2017","scopus_import":1,"arxiv":1,"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_updated":"2025-06-02T08:53:47Z","date_published":"2017-01-01T00:00:00Z","date_created":"2018-12-11T11:47:39Z","type":"conference","publist_id":"7149","volume":10427,"publication_identifier":{"isbn":["978-331963389-3"]},"abstract":[{"lang":"eng","text":"We study the problem of developing efficient approaches for proving worst-case bounds of non-deterministic recursive programs. Ranking functions are sound and complete for proving termination and worst-case bounds of non-recursive programs. First, we apply ranking functions to recursion, resulting in measure functions, and show that they provide a sound and complete approach to prove worst-case bounds of non-deterministic recursive programs. Our second contribution is the synthesis of measure functions in non-polynomial forms. We show that non-polynomial measure functions with logarithm and exponentiation can be synthesized through abstraction of logarithmic or exponentiation terms, Farkas’ Lemma, and Handelman’s Theorem using linear programming. While previous methods obtain worst-case polynomial bounds, our approach can synthesize bounds of the form O(n log n) as well as O(nr) where r is not an integer. We present experimental results to demonstrate that our approach can efficiently obtain worst-case bounds of classical recursive algorithms such as Merge-Sort, Closest-Pair, Karatsuba’s algorithm and Strassen’s algorithm."}],"page":"41 - 63","department":[{"_id":"KrCh"}],"main_file_link":[{"url":"https://arxiv.org/abs/1705.00317","open_access":"1"}],"publisher":"Springer","project":[{"grant_number":"S11407","_id":"25863FF4-B435-11E9-9278-68D0E5697425","name":"Game Theory","call_identifier":"FWF"},{"grant_number":"279307","_id":"2581B60A-B435-11E9-9278-68D0E5697425","name":"Quantitative Graph Games: Theory and Applications","call_identifier":"FP7"}],"day":"01","related_material":{"record":[{"status":"public","id":"8934","relation":"dissertation_contains"},{"relation":"later_version","status":"public","id":"7014"}]},"title":"Non-polynomial worst case analysis of recursive programs","citation":{"short":"K. Chatterjee, H. Fu, A.K. Goharshady, in:, R. Majumdar, V. Kunčak (Eds.), Springer, 2017, pp. 41–63.","mla":"Chatterjee, Krishnendu, et al. <i>Non-Polynomial Worst Case Analysis of Recursive Programs</i>. Edited by Rupak Majumdar and Viktor Kunčak, vol. 10427, Springer, 2017, pp. 41–63, doi:<a href=\"https://doi.org/10.1007/978-3-319-63390-9_3\">10.1007/978-3-319-63390-9_3</a>.","apa":"Chatterjee, K., Fu, H., &#38; Goharshady, A. K. (2017). Non-polynomial worst case analysis of recursive programs. In R. Majumdar &#38; V. Kunčak (Eds.) (Vol. 10427, pp. 41–63). Presented at the CAV: Computer Aided Verification, Heidelberg, Germany: Springer. <a href=\"https://doi.org/10.1007/978-3-319-63390-9_3\">https://doi.org/10.1007/978-3-319-63390-9_3</a>","chicago":"Chatterjee, Krishnendu, Hongfei Fu, and Amir Kafshdar Goharshady. “Non-Polynomial Worst Case Analysis of Recursive Programs.” edited by Rupak Majumdar and Viktor Kunčak, 10427:41–63. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-63390-9_3\">https://doi.org/10.1007/978-3-319-63390-9_3</a>.","ieee":"K. Chatterjee, H. Fu, and A. K. Goharshady, “Non-polynomial worst case analysis of recursive programs,” presented at the CAV: Computer Aided Verification, Heidelberg, Germany, 2017, vol. 10427, pp. 41–63.","ama":"Chatterjee K, Fu H, Goharshady AK. Non-polynomial worst case analysis of recursive programs. In: Majumdar R, Kunčak V, eds. Vol 10427. Springer; 2017:41-63. doi:<a href=\"https://doi.org/10.1007/978-3-319-63390-9_3\">10.1007/978-3-319-63390-9_3</a>","ista":"Chatterjee K, Fu H, Goharshady AK. 2017. Non-polynomial worst case analysis of recursive programs. CAV: Computer Aided Verification, LNCS, vol. 10427, 41–63."},"editor":[{"full_name":"Majumdar, Rupak","first_name":"Rupak","last_name":"Majumdar"},{"last_name":"Kunčak","full_name":"Kunčak, Viktor","first_name":"Viktor"}],"doi":"10.1007/978-3-319-63390-9_3"},{"quality_controlled":"1","author":[{"first_name":"Joel F","full_name":"Alwen, Joel F","last_name":"Alwen","id":"2A8DFA8C-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Blocki, Jeremiah","first_name":"Jeremiah","last_name":"Blocki"},{"first_name":"Krzysztof Z","full_name":"Pietrzak, Krzysztof Z","orcid":"0000-0002-9139-1654","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87"}],"alternative_title":["LNCS"],"status":"public","_id":"640","oa_version":"Submitted Version","publication_status":"published","month":"04","intvolume":"     10212","language":[{"iso":"eng"}],"conference":{"name":"EUROCRYPT: Theory and Applications of Cryptographic Techniques","location":"Paris, France","end_date":"2017-05-04","start_date":"2017-04-30"},"year":"2017","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","date_updated":"2021-01-12T08:07:22Z","scopus_import":1,"ec_funded":1,"oa":1,"type":"conference","date_created":"2018-12-11T11:47:39Z","publication_identifier":{"isbn":["978-331956616-0"]},"volume":10212,"publist_id":"7148","date_published":"2017-04-01T00:00:00Z","page":"3 - 32","abstract":[{"text":"Data-independent Memory Hard Functions (iMHFS) are finding a growing number of applications in security; especially in the domain of password hashing. An important property of a concrete iMHF is specified by fixing a directed acyclic graph (DAG) Gn on n nodes. The quality of that iMHF is then captured by the following two pebbling complexities of Gn: – The parallel cumulative pebbling complexity Π∥cc(Gn) must be as high as possible (to ensure that the amortized cost of computing the function on dedicated hardware is dominated by the cost of memory). – The sequential space-time pebbling complexity Πst(Gn) should be as close as possible to Π∥cc(Gn) (to ensure that using many cores in parallel and amortizing over many instances does not give much of an advantage). In this paper we construct a family of DAGs with best possible parameters in an asymptotic sense, i.e., where Π∥cc(Gn) = Ω(n2/ log(n)) (which matches a known upper bound) and Πst(Gn) is within a constant factor of Π∥cc(Gn). Our analysis relies on a new connection between the pebbling complexity of a DAG and its depth-robustness (DR) – a well studied combinatorial property. We show that high DR is sufficient for high Π∥cc. Alwen and Blocki (CRYPTO’16) showed that high DR is necessary and so, together, these results fully characterize DAGs with high Π∥cc in terms of DR. Complementing these results, we provide new upper and lower bounds on the Π∥cc of several important candidate iMHFs from the literature. We give the first lower bounds on the memory hardness of the Catena and Balloon Hashing functions in a parallel model of computation and we give the first lower bounds of any kind for (a version) of Argon2i. Finally we describe a new class of pebbling attacks improving on those of Alwen and Blocki (CRYPTO’16). By instantiating these attacks we upperbound the Π∥cc of the Password Hashing Competition winner Argon2i and one of the Balloon Hashing functions by O (n1.71). We also show an upper bound of O(n1.625) for the Catena functions and the two remaining Balloon Hashing functions.","lang":"eng"}],"title":"Depth-robust graphs and their cumulative memory complexity","citation":{"ama":"Alwen JF, Blocki J, Pietrzak KZ. Depth-robust graphs and their cumulative memory complexity. In: Coron J-S, Buus Nielsen J, eds. Vol 10212. Springer; 2017:3-32. doi:<a href=\"https://doi.org/10.1007/978-3-319-56617-7_1\">10.1007/978-3-319-56617-7_1</a>","ieee":"J. F. Alwen, J. Blocki, and K. Z. Pietrzak, “Depth-robust graphs and their cumulative memory complexity,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Paris, France, 2017, vol. 10212, pp. 3–32.","ista":"Alwen JF, Blocki J, Pietrzak KZ. 2017. Depth-robust graphs and their cumulative memory complexity. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 10212, 3–32.","short":"J.F. Alwen, J. Blocki, K.Z. Pietrzak, in:, J.-S. Coron, J. Buus Nielsen (Eds.), Springer, 2017, pp. 3–32.","mla":"Alwen, Joel F., et al. <i>Depth-Robust Graphs and Their Cumulative Memory Complexity</i>. Edited by Jean-Sébastien Coron and Jesper Buus Nielsen, vol. 10212, Springer, 2017, pp. 3–32, doi:<a href=\"https://doi.org/10.1007/978-3-319-56617-7_1\">10.1007/978-3-319-56617-7_1</a>.","apa":"Alwen, J. F., Blocki, J., &#38; Pietrzak, K. Z. (2017). Depth-robust graphs and their cumulative memory complexity. In J.-S. Coron &#38; J. Buus Nielsen (Eds.) (Vol. 10212, pp. 3–32). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Paris, France: Springer. <a href=\"https://doi.org/10.1007/978-3-319-56617-7_1\">https://doi.org/10.1007/978-3-319-56617-7_1</a>","chicago":"Alwen, Joel F, Jeremiah Blocki, and Krzysztof Z Pietrzak. “Depth-Robust Graphs and Their Cumulative Memory Complexity.” edited by Jean-Sébastien Coron and Jesper Buus Nielsen, 10212:3–32. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-56617-7_1\">https://doi.org/10.1007/978-3-319-56617-7_1</a>."},"publisher":"Springer","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2016/875"}],"department":[{"_id":"KrPi"}],"project":[{"call_identifier":"H2020","grant_number":"682815","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","name":"Teaching Old Crypto New Tricks"}],"day":"01","editor":[{"last_name":"Coron","first_name":"Jean-Sébastien","full_name":"Coron, Jean-Sébastien"},{"last_name":"Buus Nielsen","first_name":"Jesper","full_name":"Buus Nielsen, Jesper"}],"doi":"10.1007/978-3-319-56617-7_1"},{"title":"Graphical model parameter learning by inverse linear programming","year":"2017","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","citation":{"ista":"Trajkovska V, Swoboda P, Åström F, Petra S. 2017. Graphical model parameter learning by inverse linear programming. SSVM: Scale Space and Variational Methods in Computer Vision, LNCS, vol. 10302, 323–334.","ieee":"V. Trajkovska, P. Swoboda, F. Åström, and S. Petra, “Graphical model parameter learning by inverse linear programming,” presented at the SSVM: Scale Space and Variational Methods in Computer Vision, Kolding, Denmark, 2017, vol. 10302, pp. 323–334.","ama":"Trajkovska V, Swoboda P, Åström F, Petra S. Graphical model parameter learning by inverse linear programming. In: Lauze F, Dong Y, Bjorholm Dahl A, eds. Vol 10302. Springer; 2017:323-334. doi:<a href=\"https://doi.org/10.1007/978-3-319-58771-4_26\">10.1007/978-3-319-58771-4_26</a>","chicago":"Trajkovska, Vera, Paul Swoboda, Freddie Åström, and Stefanie Petra. “Graphical Model Parameter Learning by Inverse Linear Programming.” edited by François Lauze, Yiqiu Dong, and Anders Bjorholm Dahl, 10302:323–34. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-58771-4_26\">https://doi.org/10.1007/978-3-319-58771-4_26</a>.","short":"V. Trajkovska, P. Swoboda, F. Åström, S. Petra, in:, F. Lauze, Y. Dong, A. Bjorholm Dahl (Eds.), Springer, 2017, pp. 323–334.","mla":"Trajkovska, Vera, et al. <i>Graphical Model Parameter Learning by Inverse Linear Programming</i>. Edited by François Lauze et al., vol. 10302, Springer, 2017, pp. 323–34, doi:<a href=\"https://doi.org/10.1007/978-3-319-58771-4_26\">10.1007/978-3-319-58771-4_26</a>.","apa":"Trajkovska, V., Swoboda, P., Åström, F., &#38; Petra, S. (2017). Graphical model parameter learning by inverse linear programming. In F. Lauze, Y. Dong, &#38; A. Bjorholm Dahl (Eds.) (Vol. 10302, pp. 323–334). Presented at the SSVM: Scale Space and Variational Methods in Computer Vision, Kolding, Denmark: Springer. <a href=\"https://doi.org/10.1007/978-3-319-58771-4_26\">https://doi.org/10.1007/978-3-319-58771-4_26</a>"},"date_updated":"2021-01-12T08:07:23Z","scopus_import":1,"publisher":"Springer","department":[{"_id":"VlKo"}],"day":"01","type":"conference","date_created":"2018-12-11T11:47:39Z","publication_identifier":{"isbn":["978-331958770-7"]},"publist_id":"7147","volume":10302,"date_published":"2017-01-01T00:00:00Z","editor":[{"full_name":"Lauze, François","first_name":"François","last_name":"Lauze"},{"last_name":"Dong","first_name":"Yiqiu","full_name":"Dong, Yiqiu"},{"last_name":"Bjorholm Dahl","first_name":"Anders","full_name":"Bjorholm Dahl, Anders"}],"doi":"10.1007/978-3-319-58771-4_26","quality_controlled":"1","author":[{"first_name":"Vera","full_name":"Trajkovska, Vera","last_name":"Trajkovska"},{"last_name":"Swoboda","id":"446560C6-F248-11E8-B48F-1D18A9856A87","first_name":"Paul","full_name":"Swoboda, Paul"},{"full_name":"Åström, Freddie","first_name":"Freddie","last_name":"Åström"},{"last_name":"Petra","first_name":"Stefanie","full_name":"Petra, Stefanie"}],"page":"323 - 334","alternative_title":["LNCS"],"abstract":[{"text":"We introduce two novel methods for learning parameters of graphical models for image labelling. The following two tasks underline both methods: (i) perturb model parameters based on given features and ground truth labelings, so as to exactly reproduce these labelings as optima of the local polytope relaxation of the labelling problem; (ii) train a predictor for the perturbed model parameters so that improved model parameters can be applied to the labelling of novel data. Our first method implements task (i) by inverse linear programming and task (ii) using a regressor e.g. a Gaussian process. Our second approach simultaneously solves tasks (i) and (ii) in a joint manner, while being restricted to linearly parameterised predictors. Experiments demonstrate the merits of both approaches.","lang":"eng"}],"status":"public","oa_version":"None","_id":"641","publication_status":"published","intvolume":"     10302","month":"01","language":[{"iso":"eng"}],"conference":{"location":"Kolding, Denmark","end_date":"2017-06-08","start_date":"2017-06-04","name":"SSVM: Scale Space and Variational Methods in Computer Vision"}},{"page":"2373 - 2397","abstract":[{"lang":"eng","text":"Cauchy problems with SPDEs on the whole space are localized to Cauchy problems on a ball of radius R. This localization reduces various kinds of spatial approximation schemes to finite dimensional problems. The error is shown to be exponentially small. As an application, a numerical scheme is presented which combines the localization and the space and time discretization, and thus is fully implementable."}],"issue":"307","title":"Localization errors in solving stochastic partial differential equations in the whole space","citation":{"apa":"Gerencser, M., &#38; Gyöngy, I. (2017). Localization errors in solving stochastic partial differential equations in the whole space. <i>Mathematics of Computation</i>. American Mathematical Society. <a href=\"https://doi.org/10.1090/mcom/3201\">https://doi.org/10.1090/mcom/3201</a>","short":"M. Gerencser, I. Gyöngy, Mathematics of Computation 86 (2017) 2373–2397.","mla":"Gerencser, Mate, and István Gyöngy. “Localization Errors in Solving Stochastic Partial Differential Equations in the Whole Space.” <i>Mathematics of Computation</i>, vol. 86, no. 307, American Mathematical Society, 2017, pp. 2373–97, doi:<a href=\"https://doi.org/10.1090/mcom/3201\">10.1090/mcom/3201</a>.","chicago":"Gerencser, Mate, and István Gyöngy. “Localization Errors in Solving Stochastic Partial Differential Equations in the Whole Space.” <i>Mathematics of Computation</i>. American Mathematical Society, 2017. <a href=\"https://doi.org/10.1090/mcom/3201\">https://doi.org/10.1090/mcom/3201</a>.","ieee":"M. Gerencser and I. Gyöngy, “Localization errors in solving stochastic partial differential equations in the whole space,” <i>Mathematics of Computation</i>, vol. 86, no. 307. American Mathematical Society, pp. 2373–2397, 2017.","ama":"Gerencser M, Gyöngy I. Localization errors in solving stochastic partial differential equations in the whole space. <i>Mathematics of Computation</i>. 2017;86(307):2373-2397. doi:<a href=\"https://doi.org/10.1090/mcom/3201\">10.1090/mcom/3201</a>","ista":"Gerencser M, Gyöngy I. 2017. Localization errors in solving stochastic partial differential equations in the whole space. Mathematics of Computation. 86(307), 2373–2397."},"publisher":"American Mathematical Society","publication":"Mathematics of Computation","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1508.05535"}],"department":[{"_id":"JaMa"}],"day":"01","doi":"10.1090/mcom/3201","quality_controlled":"1","author":[{"full_name":"Gerencser, Mate","first_name":"Mate","id":"44ECEDF2-F248-11E8-B48F-1D18A9856A87","last_name":"Gerencser"},{"full_name":"Gyöngy, István","first_name":"István","last_name":"Gyöngy"}],"status":"public","oa_version":"Submitted Version","_id":"642","publication_status":"published","month":"01","intvolume":"        86","language":[{"iso":"eng"}],"year":"2017","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","date_updated":"2021-01-12T08:07:26Z","scopus_import":1,"oa":1,"type":"journal_article","date_created":"2018-12-11T11:47:40Z","publication_identifier":{"issn":["00255718"]},"publist_id":"7144","volume":86,"date_published":"2017-01-01T00:00:00Z"},{"page":"28","author":[{"orcid":"0000−0002−2985−7724","full_name":"Henzinger, Thomas A","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger"},{"first_name":"Bernhard","full_name":"Kragl, Bernhard","orcid":"0000-0001-7745-9117","last_name":"Kragl","id":"320FC952-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Qadeer","full_name":"Qadeer, Shaz","first_name":"Shaz"}],"file":[{"date_created":"2019-05-13T08:14:44Z","file_name":"main(1).pdf","date_updated":"2020-07-14T12:47:30Z","file_id":"6431","file_size":971347,"content_type":"application/pdf","access_level":"open_access","creator":"dernst","relation":"main_file","checksum":"b48d42725182d7ca10107a118815f4cf"}],"abstract":[{"lang":"eng","text":"Synchronous programs are easy to specify because the side effects of an operation are finished by the time the invocation of the operation returns to the caller. Asynchronous programs, on the other hand, are difficult to specify because there are side effects due to pending computation scheduled as a result of the invocation of an operation. They are also difficult to verify because of the large number of possible interleavings of concurrent asynchronous computation threads. We show that specifications and correctness proofs for asynchronous programs can be structured by introducing the fiction, for proof purposes, that intermediate, non-quiescent states of asynchronous operations can be ignored. Then, the task of specification becomes relatively simple and the task of verification can be naturally decomposed into smaller sub-tasks. The sub-tasks iteratively summarize, guided by the structure of an asynchronous program, the atomic effect of non-atomic operations and the synchronous effect of asynchronous operations. This structuring of specifications and proofs corresponds to the introduction of multiple layers of stepwise refinement for asynchronous programs. We present the first proof rule, called synchronization, to reduce asynchronous invocations on a lower layer to synchronous invocations on a higher layer. We implemented our proof method in CIVL and evaluated it on a collection of benchmark programs."}],"alternative_title":["IST Austria Technical Report"],"language":[{"iso":"eng"}],"publication_status":"published","month":"08","_id":"6426","oa_version":"Published Version","file_date_updated":"2020-07-14T12:47:30Z","status":"public","ddc":["000"],"date_updated":"2023-02-21T16:59:21Z","citation":{"short":"T.A. Henzinger, B. Kragl, S. Qadeer, Synchronizing the Asynchronous, IST Austria, 2017.","mla":"Henzinger, Thomas A., et al. <i>Synchronizing the Asynchronous</i>. IST Austria, 2017, doi:<a href=\"https://doi.org/10.15479/AT:IST-2018-853-v2-2\">10.15479/AT:IST-2018-853-v2-2</a>.","apa":"Henzinger, T. A., Kragl, B., &#38; Qadeer, S. (2017). <i>Synchronizing the asynchronous</i>. IST Austria. <a href=\"https://doi.org/10.15479/AT:IST-2018-853-v2-2\">https://doi.org/10.15479/AT:IST-2018-853-v2-2</a>","chicago":"Henzinger, Thomas A, Bernhard Kragl, and Shaz Qadeer. <i>Synchronizing the Asynchronous</i>. IST Austria, 2017. <a href=\"https://doi.org/10.15479/AT:IST-2018-853-v2-2\">https://doi.org/10.15479/AT:IST-2018-853-v2-2</a>.","ama":"Henzinger TA, Kragl B, Qadeer S. <i>Synchronizing the Asynchronous</i>. IST Austria; 2017. doi:<a href=\"https://doi.org/10.15479/AT:IST-2018-853-v2-2\">10.15479/AT:IST-2018-853-v2-2</a>","ieee":"T. A. Henzinger, B. Kragl, and S. Qadeer, <i>Synchronizing the asynchronous</i>. IST Austria, 2017.","ista":"Henzinger TA, Kragl B, Qadeer S. 2017. Synchronizing the asynchronous, IST Austria, 28p."},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"Synchronizing the asynchronous","year":"2017","related_material":{"record":[{"relation":"later_version","status":"public","id":"133"}]},"day":"04","oa":1,"department":[{"_id":"ToHe"}],"publisher":"IST Austria","publication_identifier":{"issn":["2664-1690"]},"date_created":"2019-05-13T08:15:55Z","type":"technical_report","doi":"10.15479/AT:IST-2018-853-v2-2","has_accepted_license":"1","date_published":"2017-08-04T00:00:00Z"}]
