@article{8973,
  abstract     = {We consider the symmetric simple exclusion process in Zd with quenched bounded dynamic random conductances and prove its hydrodynamic limit in path space. The main tool is the connection, due to the self-duality of the process, between the invariance principle for single particles starting from all points and the macroscopic behavior of the density field. While the hydrodynamic limit at fixed macroscopic times is obtained via a generalization to the time-inhomogeneous context of the strategy introduced in [41], in order to prove tightness for the sequence of empirical density fields we develop a new criterion based on the notion of uniform conditional stochastic continuity, following [50]. In conclusion, we show that uniform elliptic dynamic conductances provide an example of environments in which the so-called arbitrary starting point invariance principle may be derived from the invariance principle of a single particle starting from the origin. Therefore, our hydrodynamics result applies to the examples of quenched environments considered in, e.g., [1], [3], [6] in combination with the hypothesis of uniform ellipticity.},
  author       = {Redig, Frank and Saada, Ellen and Sau, Federico},
  issn         = {1083-6489},
  journal      = {Electronic Journal of Probability},
  publisher    = { Institute of Mathematical Statistics},
  title        = {{Symmetric simple exclusion process in dynamic environment: Hydrodynamics}},
  doi          = {10.1214/20-EJP536},
  volume       = {25},
  year         = {2020},
}

@article{8978,
  abstract     = {Mosaic analysis with double markers (MADM) technology enables concomitant fluorescent cell labeling and induction of uniparental chromosome disomy (UPD) with single-cell resolution. In UPD, imprinted genes are either overexpressed 2-fold or are not expressed. Here, the MADM platform is utilized to probe imprinting phenotypes at the transcriptional level. This protocol highlights major steps for the generation and isolation of projection neurons and astrocytes with MADM-induced UPD from mouse cerebral cortex for downstream single-cell and low-input sample RNA-sequencing experiments.

For complete details on the use and execution of this protocol, please refer to Laukoter et al. (2020b).},
  author       = {Laukoter, Susanne and Amberg, Nicole and Pauler, Florian and Hippenmeyer, Simon},
  issn         = {2666-1667},
  journal      = {STAR Protocols},
  number       = {3},
  publisher    = {Elsevier},
  title        = {{Generation and isolation of single cells from mouse brain with mosaic analysis with double markers-induced uniparental chromosome disomy}},
  doi          = {10.1016/j.xpro.2020.100215},
  volume       = {1},
  year         = {2020},
}

@phdthesis{8983,
  abstract     = {Metabolic adaptation is a critical feature of migrating cells. It tunes the metabolic programs of migrating cells to allow them to efficiently exert their crucial roles in development, inflammatory responses and tumor metastasis. Cell migration through physically challenging contexts requires energy. However, how the metabolic reprogramming that underlies in vivo cell invasion is controlled is still unanswered. In my PhD project, I identify a novel conserved metabolic shift in Drosophila melanogaster immune cells that by modulating their bioenergetic potential controls developmentally programmed tissue invasion. We show that this regulation requires a novel conserved nuclear protein, named Atossa. Atossa enhances the transcription of a set of proteins, including an RNA helicase Porthos and two metabolic enzymes, each of which increases the tissue invasion of leading Drosophila macrophages and can rescue the atossa mutant phenotype. Porthos selectively regulates the translational efficiency of a subset of mRNAs containing a 5’-UTR cis-regulatory TOP-like sequence. These 5’TOPL mRNA targets encode mitochondrial-related proteins, including subunits of mitochondrial oxidative phosphorylation (OXPHOS) components III and V and other metabolic-related proteins. Porthos powers up mitochondrial OXPHOS to engender a sufficient ATP supply, which is required for tissue invasion of leading macrophages. Atossa’s two vertebrate orthologs rescue the invasion defect. In my PhD project, I elucidate that Atossa displays a conserved developmental metabolic control to modulate metabolic capacities and the cellular energy state, through altered transcription and translation, to aid the tissue infiltration of leading cells into energy demanding barriers.},
  author       = {Emtenani, Shamsi},
  issn         = {2663-337X},
  pages        = {141},
  publisher    = {Institute of Science and Technology Austria},
  title        = {{Metabolic regulation of Drosophila macrophage tissue invasion}},
  doi          = {10.15479/AT:ISTA:8983},
  year         = {2020},
}

@article{8986,
  abstract     = {Flowering plants display the highest diversity among plant species and have notably shaped terrestrial landscapes. Nonetheless, the evolutionary origin of their unprecedented morphological complexity remains largely an enigma. Here, we show that the coevolution of cis-regulatory and coding regions of PIN-FORMED (PIN) auxin transporters confined their expression to certain cell types and directed their subcellular localization to particular cell sides, which together enabled dynamic auxin gradients across tissues critical to the complex architecture of flowering plants. Extensive intraspecies and interspecies genetic complementation experiments with PINs from green alga up to flowering plant lineages showed that PIN genes underwent three subsequent, critical evolutionary innovations and thus acquired a triple function to regulate the development of three essential components of the flowering plant Arabidopsis: shoot/root, inflorescence, and floral organ. Our work highlights the critical role of functional innovations within the PIN gene family as essential prerequisites for the origin of flowering plants.},
  author       = {Zhang, Yuzhou and Rodriguez Solovey, Lesia and Li, Lanxin and Zhang, Xixi and Friml, Jiří},
  issn         = {2375-2548},
  journal      = {Science Advances},
  number       = {50},
  publisher    = {AAAS},
  title        = {{Functional innovations of PIN auxin transporters mark crucial evolutionary transitions during rise of flowering plants}},
  doi          = {10.1126/sciadv.abc8895},
  volume       = {6},
  year         = {2020},
}

@inproceedings{8987,
  abstract     = {Currently several projects aim at designing and implementing protocols for privacy preserving automated contact tracing to help fight the current pandemic. Those proposal are quite similar, and in their most basic form basically propose an app for mobile phones which broadcasts frequently changing pseudorandom identifiers via (low energy) Bluetooth, and at the same time, the app stores IDs broadcast by phones in its proximity. Only if a user is tested positive, they upload either the beacons they did broadcast (which is the case in decentralized proposals as DP-3T, east and west coast PACT or Covid watch) or received (as in Popp-PT or ROBERT) during the last two weeks or so.

Vaudenay [eprint 2020/399] observes that this basic scheme (he considers the DP-3T proposal) succumbs to relay and even replay attacks, and proposes more complex interactive schemes which prevent those attacks without giving up too many privacy aspects. Unfortunately interaction is problematic for this application for efficiency and security reasons. The countermeasures that have been suggested so far are either not practical or give up on key privacy aspects. We propose a simple non-interactive variant of the basic protocol that
(security) Provably prevents replay and (if location data is available) relay attacks.
(privacy) The data of all parties (even jointly) reveals no information on the location or time where encounters happened.
(efficiency) The broadcasted message can fit into 128 bits and uses only basic crypto (commitments and secret key authentication).

Towards this end we introduce the concept of “delayed authentication”, which basically is a message authentication code where verification can be done in two steps, where the first doesn’t require the key, and the second doesn’t require the message.},
  author       = {Pietrzak, Krzysztof Z},
  booktitle    = {Progress in Cryptology},
  isbn         = {9783030652760},
  issn         = {16113349},
  location     = {Bangalore, India},
  pages        = {3--15},
  publisher    = {Springer Nature},
  title        = {{Delayed authentication: Preventing replay and relay attacks in private contact tracing}},
  doi          = {10.1007/978-3-030-65277-7_1},
  volume       = {12578},
  year         = {2020},
}

@article{9000,
  abstract     = {In prokaryotes, thermodynamic models of gene regulation provide a highly quantitative mapping from promoter sequences to gene-expression levels that is compatible with in vivo and in vitro biophysical measurements. Such concordance has not been achieved for models of enhancer function in eukaryotes. In equilibrium models, it is difficult to reconcile the reported short transcription factor (TF) residence times on the DNA with the high specificity of regulation. In nonequilibrium models, progress is difficult due to an explosion in the number of parameters. Here, we navigate this complexity by looking for minimal nonequilibrium enhancer models that yield desired regulatory phenotypes: low TF residence time, high specificity, and tunable cooperativity. We find that a single extra parameter, interpretable as the “linking rate,” by which bound TFs interact with Mediator components, enables our models to escape equilibrium bounds and access optimal regulatory phenotypes, while remaining consistent with the reported phenomenology and simple enough to be inferred from upcoming experiments. We further find that high specificity in nonequilibrium models is in a trade-off with gene-expression noise, predicting bursty dynamics—an experimentally observed hallmark of eukaryotic transcription. By drastically reducing the vast parameter space of nonequilibrium enhancer models to a much smaller subspace that optimally realizes biological function, we deliver a rich class of models that could be tractably inferred from data in the near future.},
  author       = {Grah, Rok and Zoller, Benjamin and Tkačik, Gašper},
  issn         = {10916490},
  journal      = {PNAS},
  number       = {50},
  pages        = {31614--31622},
  publisher    = {National Academy of Sciences},
  title        = {{Nonequilibrium models of optimal enhancer function}},
  doi          = {10.1073/pnas.2006731117},
  volume       = {117},
  year         = {2020},
}

@article{177,
  abstract     = {We develop a geometric version of the circle method and use it to compute the compactly supported cohomology of the space of rational curves through a point on a smooth affine hypersurface of sufficiently low degree.},
  author       = {Browning, Timothy D and Sawin, Will},
  journal      = {Annals of Mathematics},
  number       = {3},
  pages        = {893--948},
  publisher    = {Princeton University},
  title        = {{A geometric version of the circle method}},
  doi          = {10.4007/annals.2020.191.3.4},
  volume       = {191},
  year         = {2020},
}

@article{179,
  abstract     = {An asymptotic formula is established for the number of rational points of bounded anticanonical height which lie on a certain Zariski dense subset of the biprojective hypersurface x1y21+⋯+x4y24=0 in ℙ3×ℙ3. This confirms the modified Manin conjecture for this variety, in which the removal of a thin set of rational points is allowed.},
  author       = {Browning, Timothy D and Heath Brown, Roger},
  issn         = {0012-7094},
  journal      = {Duke Mathematical Journal},
  number       = {16},
  pages        = {3099--3165},
  publisher    = {Duke University Press},
  title        = {{Density of rational points on a quadric bundle in ℙ3×ℙ3}},
  doi          = {10.1215/00127094-2020-0031},
  volume       = {169},
  year         = {2020},
}

@article{6649,
  abstract     = {While Hartree–Fock theory is well established as a fundamental approximation for interacting fermions, it has been unclear how to describe corrections to it due to many-body correlations. In this paper we start from the Hartree–Fock state given by plane waves and introduce collective particle–hole pair excitations. These pairs can be approximately described by a bosonic quadratic Hamiltonian. We use Bogoliubov theory to construct a trial state yielding a rigorous Gell-Mann–Brueckner–type upper bound to the ground state energy. Our result justifies the random-phase approximation in the mean-field scaling regime, for repulsive, regular interaction potentials.
},
  author       = {Benedikter, Niels P and Nam, Phan Thành and Porta, Marcello and Schlein, Benjamin and Seiringer, Robert},
  issn         = {1432-0916},
  journal      = {Communications in Mathematical Physics},
  pages        = {2097–2150},
  publisher    = {Springer Nature},
  title        = {{Optimal upper bound for the correlation energy of a Fermi gas in the mean-field regime}},
  doi          = {10.1007/s00220-019-03505-5},
  volume       = {374},
  year         = {2020},
}

@article{6748,
  abstract     = {Fitting a function by using linear combinations of a large number N of `simple' components is one of the most fruitful ideas in statistical learning. This idea lies at the core of a variety of methods, from two-layer neural networks to kernel regression, to boosting. In general, the resulting risk minimization problem is non-convex and is solved by gradient descent or its variants. Unfortunately, little is known about global convergence properties of these approaches.
Here we consider the problem of learning a concave function f on a compact convex domain Ω⊆ℝd, using linear combinations of `bump-like' components (neurons). The parameters to be fitted are the centers of N bumps, and the resulting empirical risk minimization problem is highly non-convex. We prove that, in the limit in which the number of neurons diverges, the evolution of gradient descent converges to a Wasserstein gradient flow in the space of probability distributions over Ω. Further, when the bump width δ tends to 0, this gradient flow has a limit which is a viscous porous medium equation. Remarkably, the cost function optimized by this gradient flow exhibits a special property known as displacement convexity, which implies exponential convergence rates for N→∞, δ→0. Surprisingly, this asymptotic theory appears to capture well the behavior for moderate values of δ,N. Explaining this phenomenon, and understanding the dependence on δ,N in a quantitative manner remains an outstanding challenge.},
  author       = {Javanmard, Adel and Mondelli, Marco and Montanari, Andrea},
  issn         = {1941-7330},
  journal      = {Annals of Statistics},
  number       = {6},
  pages        = {3619--3642},
  publisher    = {Institute of Mathematical Statistics},
  title        = {{Analysis of a two-layer neural network via displacement convexity}},
  doi          = {10.1214/20-AOS1945},
  volume       = {48},
  year         = {2020},
}

@article{6761,
  abstract     = {In resource allocation games, selfish players share resources that are needed in order to fulfill their objectives. The cost of using a resource depends on the load on it. In the traditional setting, the players make their choices concurrently and in one-shot. That is, a strategy for a player is a subset of the resources. We introduce and study dynamic resource allocation games. In this setting, the game proceeds in phases. In each phase each player chooses one resource. A scheduler dictates the order in which the players proceed in a phase, possibly scheduling several players to proceed concurrently. The game ends when each player has collected a set of resources that fulfills his objective. The cost for each player then depends on this set as well as on the load on the resources in it – we consider both congestion and cost-sharing games. We argue that the dynamic setting is the suitable setting for many applications in practice. We study the stability of dynamic resource allocation games, where the appropriate notion of stability is that of subgame perfect equilibrium, study the inefficiency incurred due to selfish behavior, and also study problems that are particular to the dynamic setting, like constraints on the order in which resources can be chosen or the problem of finding a scheduler that achieves stability.},
  author       = {Avni, Guy and Henzinger, Thomas A and Kupferman, Orna},
  issn         = {03043975},
  journal      = {Theoretical Computer Science},
  pages        = {42--55},
  publisher    = {Elsevier},
  title        = {{Dynamic resource allocation games}},
  doi          = {10.1016/j.tcs.2019.06.031},
  volume       = {807},
  year         = {2020},
}

@article{6796,
  abstract     = {Nearby grid cells have been observed to express a remarkable degree of long-rangeorder, which is often idealized as extending potentially to infinity. Yet their strict peri-odic firing and ensemble coherence are theoretically possible only in flat environments, much unlike the burrows which rodents usually live in. Are the symmetrical, coherent grid maps inferred in the lab relevant to chart their way in their natural habitat? We consider spheres as simple models of curved environments and waiting for the appropriate experiments to be performed, we use our adaptation model to predict what grid maps would emerge in a network with the same type of recurrent connections, which on the plane produce coherence among the units. We find that on the sphere such connections distort the maps that single grid units would express on their own, and aggregate them into clusters. When remapping to a different spherical environment, units in each cluster maintain only partial coherence, similar to what is observed in disordered materials, such as spin glasses.},
  author       = {Stella, Federico and Urdapilleta, Eugenio and Luo, Yifan and Treves, Alessandro},
  issn         = {10981063},
  journal      = {Hippocampus},
  number       = {4},
  pages        = {302--313},
  publisher    = {Wiley},
  title        = {{Partial coherence and frustration in self-organizing spherical grids}},
  doi          = {10.1002/hipo.23144},
  volume       = {30},
  year         = {2020},
}

@article{6808,
  abstract     = {Super-resolution fluorescence microscopy has become an important catalyst for discovery in the life sciences. In STimulated Emission Depletion (STED) microscopy, a pattern of light drives fluorophores from a signal-emitting on-state to a non-signalling off-state. Only emitters residing in a sub-diffraction volume around an intensity minimum are allowed to fluoresce, rendering them distinguishable from the nearby, but dark fluorophores. STED routinely achieves resolution in the few tens of nanometers range in biological samples and is suitable for live imaging. Here, we review the working principle of STED and provide general guidelines for successful STED imaging. The strive for ever higher resolution comes at the cost of increased light burden. We discuss techniques to reduce light exposure and mitigate its detrimental effects on the specimen. These include specialized illumination strategies as well as protecting fluorophores from photobleaching mediated by high-intensity STED light. This opens up the prospect of volumetric imaging in living cells and tissues with diffraction-unlimited resolution in all three spatial dimensions.},
  author       = {Jahr, Wiebke and Velicky, Philipp and Danzl, Johann G},
  issn         = {1046-2023},
  journal      = {Methods},
  number       = {3},
  pages        = {27--41},
  publisher    = {Elsevier},
  title        = {{Strategies to maximize performance in STimulated Emission Depletion (STED) nanoscopy of biological specimens}},
  doi          = {10.1016/j.ymeth.2019.07.019},
  volume       = {174},
  year         = {2020},
}

@article{6906,
  abstract     = {We consider systems of bosons trapped in a box, in the Gross–Pitaevskii regime. We show that low-energy states exhibit complete Bose–Einstein condensation with an optimal bound on the number of orthogonal excitations. This extends recent results obtained in Boccato et al. (Commun Math Phys 359(3):975–1026, 2018), removing the assumption of small interaction potential.},
  author       = {Boccato, Chiara and Brennecke, Christian and Cenatiempo, Serena and Schlein, Benjamin},
  issn         = {1432-0916},
  journal      = {Communications in Mathematical Physics},
  pages        = {1311--1395},
  publisher    = {Springer},
  title        = {{Optimal rate for Bose-Einstein condensation in the Gross-Pitaevskii regime}},
  doi          = {10.1007/s00220-019-03555-9},
  volume       = {376},
  year         = {2020},
}

@article{6918,
  abstract     = {We consider the classic problem of Network Reliability. A network is given together with a source vertex, one or more target vertices, and probabilities assigned to each of the edges. Each edge of the network is operable with its associated probability and the problem is to determine the probability of having at least one source-to-target path that is entirely composed of operable edges. This problem is known to be NP-hard.

We provide a novel scalable algorithm to solve the Network Reliability problem when the treewidth of the underlying network is small. We also show our algorithm’s applicability for real-world transit networks that have small treewidth, including the metro networks of major cities, such as London and Tokyo. Our algorithm leverages tree decompositions to shrink the original graph into much smaller graphs, for which reliability can be efficiently and exactly computed using a brute force method. To the best of our knowledge, this is the first exact algorithm for Network Reliability that can scale to handle real-world instances of the problem.},
  author       = {Goharshady, Amir Kafshdar and Mohammadi, Fatemeh},
  issn         = {09518320},
  journal      = {Reliability Engineering and System Safety},
  publisher    = {Elsevier},
  title        = {{An efficient algorithm for computing network reliability in small treewidth}},
  doi          = {10.1016/j.ress.2019.106665},
  volume       = {193},
  year         = {2020},
}

@article{6944,
  abstract     = {We study the problem of automatically detecting if a given multi-class classifier operates outside of its specifications (out-of-specs), i.e. on input data from a different distribution than what it was trained for. This is an important problem to solve on the road towards creating reliable computer vision systems for real-world applications, because the quality of a classifier’s predictions cannot be guaranteed if it operates out-of-specs. Previously proposed methods for out-of-specs detection make decisions on the level of single inputs. This, however, is insufficient to achieve low false positive rate and high false negative rates at the same time. In this work, we describe a new procedure named KS(conf), based on statistical reasoning. Its main component is a classical Kolmogorov–Smirnov test that is applied to the set of predicted confidence values for batches of samples. Working with batches instead of single samples allows increasing the true positive rate without negatively affecting the false positive rate, thereby overcoming a crucial limitation of single sample tests. We show by extensive experiments using a variety of convolutional network architectures and datasets that KS(conf) reliably detects out-of-specs situations even under conditions where other tests fail. It furthermore has a number of properties that make it an excellent candidate for practical deployment: it is easy to implement, adds almost no overhead to the system, works with any classifier that outputs confidence scores, and requires no a priori knowledge about how the data distribution could change.},
  author       = {Sun, Rémy and Lampert, Christoph},
  issn         = {1573-1405},
  journal      = {International Journal of Computer Vision},
  number       = {4},
  pages        = {970--995},
  publisher    = {Springer Nature},
  title        = {{KS(conf): A light-weight test if a multiclass classifier operates outside of its specifications}},
  doi          = {10.1007/s11263-019-01232-x},
  volume       = {128},
  year         = {2020},
}

@article{6952,
  abstract     = {We present a unified framework tackling two problems: class-specific 3D reconstruction from a single image, and generation of new 3D shape samples. These tasks have received considerable attention recently; however, most existing approaches rely on 3D supervision, annotation of 2D images with keypoints or poses, and/or training with multiple views of each object instance. Our framework is very general: it can be trained in similar settings to existing approaches, while also supporting weaker supervision. Importantly, it can be trained purely from 2D images, without pose annotations, and with only a single view per instance. We employ meshes as an output representation, instead of voxels used in most prior work. This allows us to reason over lighting parameters and exploit shading information during training, which previous 2D-supervised methods cannot. Thus, our method can learn to generate and reconstruct concave object classes. We evaluate our approach in various settings, showing that: (i) it learns to disentangle shape from pose and lighting; (ii) using shading in the loss improves performance compared to just silhouettes; (iii) when using a standard single white light, our model outperforms state-of-the-art 2D-supervised methods, both with and without pose supervision, thanks to exploiting shading cues; (iv) performance improves further when using multiple coloured lights, even approaching that of state-of-the-art 3D-supervised methods; (v) shapes produced by our model capture smooth surfaces and fine details better than voxel-based approaches; and (vi) our approach supports concave classes such as bathtubs and sofas, which methods based on silhouettes cannot learn.},
  author       = {Henderson, Paul M and Ferrari, Vittorio},
  issn         = {1573-1405},
  journal      = {International Journal of Computer Vision},
  pages        = {835--854},
  publisher    = {Springer Nature},
  title        = {{Learning single-image 3D reconstruction by generative modelling of shape, pose and shading}},
  doi          = {10.1007/s11263-019-01219-8},
  volume       = {128},
  year         = {2020},
}

@article{6997,
  author       = {Zhang, Yuzhou and Friml, Jiří},
  issn         = {1469-8137},
  journal      = {New Phytologist},
  number       = {3},
  pages        = {1049--1052},
  publisher    = {Wiley},
  title        = {{Auxin guides roots to avoid obstacles during gravitropic growth}},
  doi          = {10.1111/nph.16203},
  volume       = {225},
  year         = {2020},
}

@article{7004,
  abstract     = {We define an action of the (double of) Cohomological Hall algebra of Kontsevich and Soibelman on the cohomology of the moduli space of spiked instantons of Nekrasov. We identify this action with the one of the affine Yangian of gl(1). Based on that we derive the vertex algebra at the corner Wr1,r2,r3 of Gaiotto and Rapčák. We conjecture that our approach works for a big class of Calabi–Yau categories, including those associated with toric Calabi–Yau 3-folds.},
  author       = {Rapcak, Miroslav and Soibelman, Yan and Yang, Yaping and Zhao, Gufang},
  issn         = {1432-0916},
  journal      = {Communications in Mathematical Physics},
  pages        = {1803--1873},
  publisher    = {Springer Nature},
  title        = {{Cohomological Hall algebras, vertex algebras and instantons}},
  doi          = {10.1007/s00220-019-03575-5},
  volume       = {376},
  year         = {2020},
}

@article{7033,
  abstract     = {Removal of the Bax gene from mice completely protects the somas of retinal ganglion cells (RGCs) from apoptosis following optic nerve injury. This makes BAX a promising therapeutic target to prevent neurodegeneration. In this study, Bax+/− mice were used to test the hypothesis that lowering the quantity of BAX in RGCs would delay apoptosis following optic nerve injury. RGCs were damaged by performing optic nerve crush (ONC) and then immunostaining for phospho-cJUN, and quantitative PCR were used to monitor the status of the BAX activation mechanism in the months following injury. The apoptotic susceptibility of injured cells was directly tested by virally introducing GFP-BAX into Bax−/− RGCs after injury. The competency of quiescent RGCs to reactivate their BAX activation mechanism was tested by intravitreal injection of the JNK pathway agonist, anisomycin. Twenty-four weeks after ONC, Bax+/− mice had significantly less cell loss in their RGC layer than Bax+/+ mice 3 weeks after ONC. Bax+/− and Bax+/+ RGCs exhibited similar patterns of nuclear phospho-cJUN accumulation immediately after ONC, which persisted in Bax+/− RGCs for up to 7 weeks before abating. The transcriptional activation of BAX-activating genes was similar in Bax+/− and Bax+/+ RGCs following ONC. Intriguingly, cells deactivated their BAX activation mechanism between 7 and 12 weeks after crush. Introduction of GFP-BAX into Bax−/− cells at 4 weeks after ONC showed that these cells had a nearly normal capacity to activate this protein, but this capacity was lost 8 weeks after crush. Collectively, these data suggest that 8–12 weeks after crush, damaged cells no longer displayed increased susceptibility to BAX activation relative to their naïve counterparts. In this same timeframe, retinal glial activation and the signaling of the pro-apoptotic JNK pathway also abated. Quiescent RGCs did not show a timely reactivation of their JNK pathway following intravitreal injection with anisomycin. These findings demonstrate that lowering the quantity of BAX in RGCs is neuroprotective after acute injury. Damaged RGCs enter a quiescent state months after injury and are no longer responsive to an apoptotic stimulus. Quiescent RGCs will require rejuvenation to reacquire functionality.},
  author       = {Donahue, RJ and Maes, Margaret E and Grosser, JA and Nickells, RW},
  issn         = {1559-1182},
  journal      = {Molecular Neurobiology},
  number       = {2},
  pages        = {1070–1084},
  publisher    = {Springer Nature},
  title        = {{BAX-depleted retinal ganglion cells survive and become quiescent following optic nerve damage}},
  doi          = {10.1007/s12035-019-01783-7},
  volume       = {57},
  year         = {2020},
}

