@article{804,
  abstract     = {Polysaccharides (carbohydrates) are key regulators of a large number of cell biological processes. However, precise biochemical or genetic manipulation of these often complex structures is laborious and hampers experimental structure–function studies. Molecular Dynamics (MD) simulations provide a valuable alternative tool to generate and test hypotheses on saccharide function. Yet, currently used MD force fields often overestimate the aggregation propensity of polysaccharides, affecting the usability of those simulations. Here we tested MARTINI, a popular coarse-grained (CG) force field for biological macromolecules, for its ability to accurately represent molecular forces between saccharides. To this end, we calculated a thermodynamic solution property, the second virial coefficient of the osmotic pressure (B22). Comparison with light scattering experiments revealed a nonphysical aggregation of a prototypical polysaccharide in MARTINI, pointing at an imbalance of the nonbonded solute–solute, solute–water, and water–water interactions. This finding also applies to smaller oligosaccharides which were all found to aggregate in simulations even at moderate concentrations, well below their solubility limit. Finally, we explored the influence of the Lennard-Jones (LJ) interaction between saccharide molecules and propose a simple scaling of the LJ interaction strength that makes MARTINI more reliable for the simulation of saccharides.},
  author       = {Schmalhorst, Philipp S and Deluweit, Felix and Scherrers, Roger and Heisenberg, Carl-Philipp J and Sikora, Mateusz K},
  issn         = {15499618},
  journal      = {Journal of Chemical Theory and Computation},
  number       = {10},
  pages        = {5039 -- 5053},
  publisher    = {American Chemical Society},
  title        = {{Overcoming the limitations of the MARTINI force field in simulations of polysaccharides}},
  doi          = {10.1021/acs.jctc.7b00374},
  volume       = {13},
  year         = {2017},
}

@article{805,
  abstract     = {During corticogenesis, distinct classes of neurons are born from progenitor cells located in the ventricular and subventricular zones, from where they migrate towards the pial surface to assemble into highly organized layer-specific circuits. However, the precise and coordinated transcriptional network activity defining neuronal identity is still not understood. Here, we show that genetic depletion of the basic helix-loop-helix (bHLH) transcription factor E2A splice variant E47 increased the number of Tbr1-positive deep layer and Satb2-positive upper layer neurons at E14.5, while depletion of the alternatively spliced E12 variant did not affect layer-specific neurogenesis. While ChIP-Seq identified a big overlap for E12- and E47-specific binding sites in embryonic NSCs, including sites at the cyclin-dependent kinase inhibitor (CDKI) Cdkn1c gene locus, RNA-Seq revealed a unique transcriptional regulation by each splice variant. E47 activated the expression of the CDKI Cdkn1c through binding to a distal enhancer. Finally, overexpression of E47 in embryonic NSCs in vitro impaired neurite outgrowth and E47 overexpression in vivo by in utero electroporation disturbed proper layer-specific neurogenesis and upregulated p57(KIP2) expression. Overall, this study identified E2A target genes in embryonic NSCs and demonstrates that E47 regulates neuronal differentiation via p57(KIP2).},
  author       = {Pfurr, Sabrina and Chu, Yu and Bohrer, Christian and Greulich, Franziska and Beattie, Robert J and Mammadzada, Könül and Hils, Miriam and Arnold, Sebastian and Taylor, Verdon and Schachtrup, Kristina and Uhlenhaut, N Henriette and Schachtrup, Christian},
  journal      = {Development},
  pages        = {3917 -- 3931},
  publisher    = {Company of Biologists},
  title        = {{The E2A splice variant E47 regulates the differentiation of projection neurons via p57(KIP2) during cortical development}},
  doi          = {10.1242/dev.145698},
  volume       = {144},
  year         = {2017},
}

@article{807,
  abstract     = {On January the 1st, 2016 a new agreement between 32 Austrian scientific libraries and the publisher Springer took its effect: this deal covers accessing the licensed content on the one hand, and publishing open access on the other hand. More than 1000 papers by Austrian authors were published open access at Springer in the first year alone. The working group &quot;Springer Compact Evaluierung&quot; made the data for these articles available via the platform OpenAPC and would like to use this opportunity to give a short account of what this publishing agreement actually entails and the working group intends to do.},
  author       = {Andrae, Magdalena and Villányi, Márton},
  issn         = {10222588},
  journal      = {Mitteilungen der Vereinigung Österreichischer Bibliothekarinnen und Bibliothekare},
  number       = {2},
  pages        = {274 -- 280},
  publisher    = {VÖB},
  title        = {{Der Springer Compact-Deal – Ein erster Einblick in die Evaluierung einer Offsetting-Vereinbarung}},
  doi          = {10.31263/voebm.v70i2.1898},
  volume       = {70},
  year         = {2017},
}

@phdthesis{818,
  abstract     = {Antibiotics have diverse effects on bacteria, including massive changes in bacterial gene expression. Whereas the gene expression changes under many antibiotics have been measured, the temporal organization of these responses and their dependence on the bacterial growth rate are unclear. As described in Chapter 1, we quantified the temporal gene expression changes in the bacterium Escherichia coli in response to the sudden exposure to antibiotics using a fluorescent reporter library and a robotic system. Our data show temporally structured gene expression responses, with response times for individual genes ranging from tens of minutes to several hours. We observed that many stress response genes were activated in response to antibiotics. As certain stress responses cross-protect bacteria from other stressors, we then asked whether cellular responses to antibiotics have a similar protective role in Chapter 2. Indeed, we found that the trimethoprim-induced acid stress response protects bacteria from subsequent acid stress. We combined microfluidics with time-lapse imaging to monitor survival, intracellular pH, and acid stress response in single cells. This approach revealed that the variable expression of the acid resistance operon gadBC strongly correlates with single-cell survival time. Cells with higher gadBC expression following trimethoprim maintain higher intracellular pH and survive the acid stress longer. Overall, we provide a way to identify single-cell cross-protection between antibiotics and environmental stressors from temporal gene expression data, and show how antibiotics can increase bacterial fitness in changing environments. While gene expression changes to antibiotics show a clear temporal structure at the population-level, it is unclear whether this clear temporal order is followed by every single cell. Using dual-reporter strains described in Chapter 3, we measured gene expression dynamics of promoter pairs in the same cells using microfluidics and microscopy. Chapter 4 shows that the oxidative stress response and the DNA stress response showed little timing variability and a clear temporal order under the antibiotic nitrofurantoin. In contrast, the acid stress response under trimethoprim ran independently from all other activated response programs including the DNA stress response, which showed particularly high timing variability in this stress condition. In summary, this approach provides insight into the temporal organization of gene expression programs at the single-cell level and suggests dependencies between response programs and the underlying variability-introducing mechanisms. Altogether, this work advances our understanding of the diverse effects that antibiotics have on bacteria. These results were obtained by taking into account gene expression dynamics, which allowed us to identify general principles, molecular mechanisms, and dependencies between genes. Our findings may have implications for infectious disease treatments, and microbial communities in the human body and in nature. },
  author       = {Mitosch, Karin},
  issn         = {2663-337X},
  pages        = {113},
  publisher    = {Institute of Science and Technology Austria},
  title        = {{Timing, variability and cross-protection in bacteria – insights from dynamic gene expression responses to antibiotics}},
  doi          = {10.15479/AT:ISTA:th_862},
  year         = {2017},
}

@phdthesis{819,
  abstract     = {Contagious diseases must transmit from infectious to susceptible hosts in order to reproduce. Whilst vectored pathogens can rely on intermediaries to find new hosts for them, many infectious pathogens require close contact or direct interaction between hosts for transmission. Hence, this means that conspecifics are often the main source of infection for most animals and so, in theory, animals should avoid conspecifics to reduce their risk of infection. Of course, in reality animals must interact with one another, as a bare minimum, to mate. However, being social provides many additional benefits and group living has become a taxonomically diverse and widespread trait. How then do social animals overcome the issue of increased disease? Over the last few decades, the social insects (ants, termites and some bees and wasps) have become a model system for studying disease in social animals. On paper, a social insect colony should be particularly susceptible to disease, given that they often contain thousands of potential hosts that are closely related and frequently interact, as well as exhibiting stable environmental conditions that encourage microbial growth. Yet, disease outbreaks appear to be rare and attempts to eradicate pest species using pathogens have failed time and again. Evolutionary biologists investigating this observation have discovered that the reduced disease susceptibility in social insects is, in part, due to collectively performed disease defences of the workers. These defences act like a “social immune system” for the colony, resulting in a per capita decrease in disease, termed social immunity. Our understanding of social immunity, and its importance in relation to the immunological defences of each insect, continues to grow, but there remain many open questions. In this thesis I have studied disease defence in garden ants. In the first data chapter, I use the invasive garden ant, Lasius neglectus, to investigate how colonies mitigate lethal infections and prevent them from spreading systemically. I find that ants have evolved ‘destructive disinfection’ – a behaviour that uses endogenously produced acidic poison to kill diseased brood and to prevent the pathogen from replicating. In the second experimental chapter, I continue to study the use of poison in invasive garden ant colonies, finding that it is sprayed prophylactically within the nest. However, this spraying has negative effects on developing pupae when they have had their cocoons artificially removed. Hence, I suggest that acidic nest sanitation may be maintaining larval cocoon spinning in this species. In the next experimental chapter, I investigated how colony founding black garden ant queens (Lasius niger) prevent disease when a co-foundress dies. I show that ant queens prophylactically perform undertaking behaviours, similar to those performed by the workers in mature nests. When a co-foundress was infected, these undertaking behaviours improved the survival of the healthy queen. In the final data chapter, I explored how immunocompetence (measured as antifungal activity) changes as incipient black garden ant colonies grow and mature, from the solitary queen phase to colonies with several hundred workers. Queen and worker antifungal activity varied throughout this time period, but despite social immunity, did not decrease as colonies matured. In addition to the above data chapters, this thesis includes two co-authored reviews. In the first, we examine the state of the art in the field of social immunity and how it might develop in the future. In the second, we identify several challenges and open questions in the study of disease defence in animals. We highlight how social insects offer a unique model to tackle some of these problems, as disease defence can be studied from the cell to the society. },
  author       = {Pull, Christopher},
  issn         = {2663-337X},
  pages        = {122},
  publisher    = {Institute of Science and Technology Austria},
  title        = {{Disease defence in garden ants}},
  doi          = {10.15479/AT:ISTA:th_861},
  year         = {2017},
}

@phdthesis{820,
  abstract     = {The lac operon is a classic model system for bacterial gene regulation, and has been studied extensively in E. coli, a classic model organism. However, not much is known about E. coli’s ecology and life outside the laboratory, in particular in soil and water environments. The natural diversity of the lac operon outside the laboratory, its role in the ecology of E. coli and the selection pressures it is exposed to, are similarly unknown.
In Chapter Two of this thesis, I explore the genetic diversity, phylogenetic history and signatures of selection of the lac operon across 20 natural isolates of E. coli and divergent clades of Escherichia. I found that complete lac operons were present in all isolates examined, which in all but one case were functional. The lac operon phylogeny conformed to the whole-genome phylogeny of the divergent Escherichia clades, which excludes horizontal gene transfer as an explanation for the presence of functional lac operons in these clades. All lac operon genes showed a signature of purifying selection; this signature was strongest for the lacY gene. Lac operon genes of human and environmental isolates showed similar signatures of selection, except the lacZ gene, which showed a stronger signature of selection in environmental isolates.
In Chapter Three, I try to identify the natural genetic variation relevant for phenotype and fitness in the lac operon, comparing growth rate on lactose and LacZ activity of the lac operons of these wild isolates in a common genetic background. Sequence variation in the lac promoter region, upstream of the -10 and -35 RNA polymerase binding motif, predicted variation in LacZ activity at full induction, using a thermodynamic model of polymerase binding (Tugrul, 2016). However, neither variation in LacZ activity, nor RNA polymerase binding predicted by the model correlated with variation in growth rate. Lac operons of human and environmental isolates did not differ systematically in either growth rate on lactose or LacZ protein activity, suggesting that these lac operons have been exposed to similar selection pressures. We thus have no evidence that the phenotypic variation we measured is relevant for fitness.
To start assessing the effect of genomic background on the growth phenotype conferred by the lac operon, I compared growth on minimal medium with lactose between lac operon constructs and the corresponding original isolates, I found that maximal growth rate was determined by genomic background, with almost all backgrounds conferring higher growth rates than lab strain K12 MG1655. However, I found no evidence that the lactose concentration at which growth was half maximal depended on genomic background.},
  author       = {Jesse, Fabienne},
  issn         = {2663-337X},
  pages        = {87},
  publisher    = {Institute of Science and Technology Austria},
  title        = {{The lac operon in the wild}},
  doi          = {10.15479/AT:ISTA:th_857},
  year         = {2017},
}

@phdthesis{821,
  abstract     = {This dissertation focuses on algorithmic aspects of program verification, and presents modeling and complexity advances on several problems related to the
static analysis of programs, the stateless model checking of concurrent programs, and the competitive analysis of real-time scheduling algorithms.
Our contributions can be broadly grouped into five categories.

Our first contribution is a set of new algorithms and data structures for the quantitative and data-flow analysis of programs, based on the graph-theoretic notion of treewidth.
It has been observed that the control-flow graphs of typical programs have special structure, and are characterized as graphs of small treewidth.
We utilize this structural property to provide faster algorithms for the quantitative and data-flow analysis of recursive and concurrent programs.
In most cases we make an algebraic treatment of the considered problem,
where several interesting analyses, such as the reachability, shortest path, and certain kind of data-flow analysis problems follow as special cases. 
We exploit the constant-treewidth property to obtain algorithmic improvements for on-demand versions of the problems, 
and provide data structures with various tradeoffs between the resources spent in the preprocessing and querying phase.
We also improve on the algorithmic complexity of quantitative problems outside the algebraic path framework,
namely of the minimum mean-payoff, minimum ratio, and minimum initial credit for energy problems.


Our second contribution is a set of algorithms for Dyck reachability with applications to data-dependence analysis and alias analysis.
In particular, we develop an optimal algorithm for Dyck reachability on bidirected graphs, which are ubiquitous in context-insensitive, field-sensitive points-to analysis.
Additionally, we develop an efficient algorithm for context-sensitive data-dependence analysis via Dyck reachability,
where the task is to obtain analysis summaries of library code in the presence of callbacks.
Our algorithm preprocesses libraries in almost linear time, after which the contribution of the library in the complexity of the client analysis is (i)~linear in the number of call sites and (ii)~only logarithmic in the size of the whole library, as opposed to linear in the size of the whole library.
Finally, we prove that Dyck reachability is Boolean Matrix Multiplication-hard in general, and the hardness also holds for graphs of constant treewidth.
This hardness result strongly indicates that there exist no combinatorial algorithms for Dyck reachability with truly subcubic complexity.


Our third contribution is the formalization and algorithmic treatment of the Quantitative Interprocedural Analysis framework.
In this framework, the transitions of a recursive program are annotated as good, bad or neutral, and receive a weight which measures
the magnitude of their respective effect.
The Quantitative Interprocedural Analysis problem asks to determine whether there exists an infinite run of the program where the long-run ratio of the bad weights over the good weights is above a given threshold.
We illustrate how several quantitative problems related to static analysis of recursive programs can be instantiated in this framework,
and present some case studies to this direction.


Our fourth contribution is a new dynamic partial-order reduction for the stateless model checking of concurrent programs. Traditional approaches rely on the standard Mazurkiewicz equivalence between  traces, by means of partitioning the trace space into equivalence classes, and attempting to explore a few representatives from each class.
We present a new dynamic partial-order reduction method  called the Data-centric Partial Order Reduction (DC-DPOR).
Our algorithm is based on a new equivalence between traces, called the observation equivalence.
DC-DPOR explores a coarser partitioning of the trace space than any exploration method based on the standard Mazurkiewicz equivalence.
Depending on the program, the new partitioning can be even exponentially coarser.
Additionally, DC-DPOR spends only polynomial time in each explored class.


Our fifth contribution is the use of automata and game-theoretic verification techniques in the competitive analysis and synthesis of real-time scheduling algorithms for firm-deadline tasks.
On the analysis side, we leverage automata on infinite words to compute the competitive ratio of real-time schedulers subject to various environmental constraints.
On the synthesis side, we introduce a new instance of two-player mean-payoff partial-information games, and show
how the synthesis of an optimal real-time scheduler can be reduced to computing winning strategies in this new type of games.},
  author       = {Pavlogiannis, Andreas},
  issn         = {2663-337X},
  pages        = {418},
  publisher    = {Institute of Science and Technology Austria},
  title        = {{Algorithmic advances in program analysis and their applications}},
  doi          = {10.15479/AT:ISTA:th_854},
  year         = {2017},
}

@article{822,
  abstract     = {Polymicrobial infections constitute small ecosystems that accommodate several bacterial species. Commonly, these bacteria are investigated in isolation. However, it is unknown to what extent the isolates interact and whether their interactions alter bacterial growth and ecosystem resilience in the presence and absence of antibiotics. We quantified the complete ecological interaction network for 72 bacterial isolates collected from 23 individuals diagnosed with polymicrobial urinary tract infections and found that most interactions cluster based on evolutionary relatedness. Statistical network analysis revealed that competitive and cooperative reciprocal interactions are enriched in the global network, while cooperative interactions are depleted in the individual host community networks. A population dynamics model parameterized by our measurements suggests that interactions restrict community stability, explaining the observed species diversity of these communities. We further show that the clinical isolates frequently protect each other from clinically relevant antibiotics. Together, these results highlight that ecological interactions are crucial for the growth and survival of bacteria in polymicrobial infection communities and affect their assembly and resilience. },
  author       = {De Vos, Marjon and Zagórski, Marcin P and Mcnally, Alan and Bollenbach, Mark Tobias},
  issn         = {00278424},
  journal      = {PNAS},
  number       = {40},
  pages        = {10666 -- 10671},
  publisher    = {National Academy of Sciences},
  title        = {{Interaction networks, ecological stability, and collective antibiotic tolerance in polymicrobial infections}},
  doi          = {10.1073/pnas.1713372114},
  volume       = {114},
  year         = {2017},
}

@article{823,
  abstract     = {The resolution of a linear system with positive integer variables is a basic yet difficult computational problem with many applications. We consider sparse uncorrelated random systems parametrised by the density c and the ratio α=N/M between number of variables N and number of constraints M. By means of ensemble calculations we show that the space of feasible solutions endows a Van-Der-Waals phase diagram in the plane (c, α). We give numerical evidence that the associated computational problems become more difficult across the critical point and in particular in the coexistence region.},
  author       = {Colabrese, Simona and De Martino, Daniele and Leuzzi, Luca and Marinari, Enzo},
  issn         = {17425468},
  journal      = { Journal of Statistical Mechanics: Theory and Experiment},
  number       = {9},
  publisher    = {IOPscience},
  title        = {{Phase transitions in integer linear problems}},
  doi          = {10.1088/1742-5468/aa85c3},
  volume       = {2017},
  year         = {2017},
}

@article{824,
  abstract     = {In shear flows at transitional Reynolds numbers, localized patches of turbulence, known as puffs, coexist with the laminar flow. Recently, Avila et al. (Phys. Rev. Lett., vol. 110, 2013, 224502) discovered two spatially localized relative periodic solutions for pipe flow, which appeared in a saddle-node bifurcation at low Reynolds number. Combining slicing methods for continuous symmetry reduction with Poincaré sections for the first time in a shear flow setting, we compute and visualize the unstable manifold of the lower-branch solution and show that it extends towards the neighbourhood of the upper-branch solution. Surprisingly, this connection even persists far above the bifurcation point and appears to mediate the first stage of the puff generation: amplification of streamwise localized fluctuations. When the state-space trajectories on the unstable manifold reach the vicinity of the upper branch, corresponding fluctuations expand in space and eventually take the usual shape of a puff.},
  author       = {Budanur, Nazmi B and Hof, Björn},
  issn         = {00221120},
  journal      = {Journal of Fluid Mechanics},
  publisher    = {Cambridge University Press},
  title        = {{Heteroclinic path to spatially localized chaos in pipe flow}},
  doi          = {10.1017/jfm.2017.516},
  volume       = {827},
  year         = {2017},
}

@article{825,
  abstract     = {What data is needed about data? Describing the process to answer this question for the institutional data repository IST DataRep.},
  author       = {Petritsch, Barbara},
  issn         = {10222588},
  journal      = {Mitteilungen der Vereinigung Österreichischer Bibliothekarinnen & Bibliothekare},
  number       = {2},
  pages        = {200 -- 207},
  publisher    = {VÖB},
  title        = {{Metadata for research data in practice}},
  doi          = {10.31263/voebm.v70i2.1678},
  volume       = {70},
  year         = {2017},
}

@inproceedings{833,
  abstract     = {We present an efficient algorithm to compute Euler characteristic curves of gray scale images of arbitrary dimension. In various applications the Euler characteristic curve is used as a descriptor of an image. Our algorithm is the first streaming algorithm for Euler characteristic curves. The usage of streaming removes the necessity to store the entire image in RAM. Experiments show that our implementation handles terabyte scale images on commodity hardware. Due to lock-free parallelism, it scales well with the number of processor cores. Additionally, we put the concept of the Euler characteristic curve in the wider context of computational topology. In particular, we explain the connection with persistence diagrams.},
  author       = {Heiss, Teresa and Wagner, Hubert},
  editor       = {Felsberg, Michael and Heyden, Anders and Krüger, Norbert},
  issn         = {03029743},
  location     = {Ystad, Sweden},
  pages        = {397 -- 409},
  publisher    = {Springer},
  title        = {{Streaming algorithm for Euler characteristic curves of multidimensional images}},
  doi          = {10.1007/978-3-319-64689-3_32},
  volume       = {10424},
  year         = {2017},
}

@article{834,
  abstract     = {Thermal and many-body localized phases are separated by a dynamical phase transition of a new kind. We analyze the distribution of off-diagonal matrix elements of local operators across this transition in two different models of disordered spin chains. We show that the behavior of matrix elements can be used to characterize the breakdown of thermalization and to extract the many-body Thouless energy. We find that upon increasing the disorder strength the system enters a critical region around the many-body localization transition. The properties of the system in this region are: (i) the Thouless energy becomes smaller than the level spacing, (ii) the matrix elements show critical dependence on the energy difference, and (iii) the matrix elements, viewed as amplitudes of a fictitious wave function, exhibit strong multifractality. This critical region decreases with the system size, which we interpret as evidence for a diverging correlation length at the many-body localization transition. Our findings show that the correlation length becomes larger than the accessible system sizes in a broad range of disorder strength values and shed light on the critical behavior near the many-body localization transition.},
  author       = {Serbyn, Maksym and Zlatko, Papic and Abanin, Dmitry},
  issn         = {24699950},
  journal      = {Physical Review B - Condensed Matter and Materials Physics},
  number       = {10},
  publisher    = {American Physical Society},
  title        = {{Thouless energy and multifractality across the many-body localization transition}},
  doi          = {10.1103/PhysRevB.96.104201},
  volume       = {96},
  year         = {2017},
}

@inproceedings{836,
  abstract     = {Recent research has examined how to study the topological features of a continuous self-map by means of the persistence of the eigenspaces, for given eigenvalues, of the endomorphism induced in homology over a field. This raised the question of how to select dynamically significant eigenvalues. The present paper aims to answer this question, giving an algorithm that computes the persistence of eigenspaces for every eigenvalue simultaneously, also expressing said eigenspaces as direct sums of “finite” and “singular” subspaces.},
  author       = {Ethier, Marc and Jablonski, Grzegorz and Mrozek, Marian},
  booktitle    = {Special Sessions in Applications of Computer Algebra},
  isbn         = {978-331956930-7},
  location     = {Kalamata, Greece},
  pages        = {119 -- 136},
  publisher    = {Springer},
  title        = {{Finding eigenvalues of self-maps with the Kronecker canonical form}},
  doi          = {10.1007/978-3-319-56932-1_8},
  volume       = {198},
  year         = {2017},
}

@phdthesis{837,
  abstract     = {The hippocampus is a key brain region for memory and notably for spatial memory, and is needed for both spatial working and reference memories. Hippocampal place cells selectively discharge in specific locations of the environment to form mnemonic represen tations of space. Several behavioral protocols have been designed to test spatial memory which requires the experimental subject to utilize working memory and reference memory. However, less is known about how these memory traces are presented in the hippo campus, especially considering tasks that require both spatial working and long -term reference memory demand. The aim of my thesis was to elucidate how spatial working memory, reference memory, and the combination of both are represented in the hippocampus. In this thesis, using a radial eight -arm maze, I examined how the combined demand on these memories influenced place cell assemblies while reference memories were partially updated by changing some of the reward- arms. This was contrasted with task varian ts requiring working or reference memories only. Reference memory update led to gradual place field shifts towards the rewards on the switched arms. Cells developed enhanced firing in passes between newly -rewarded arms as compared to those containing an unchanged reward. The working memory task did not show such gradual changes. Place assemblies on occasions replayed trajectories of the maze; at decision points the next arm choice was preferentially replayed in tasks needing reference memory while in the pure working memory task the previously visited arm was replayed. Hence trajectory replay only reflected the decision of the animal in tasks needing reference memory update. At the reward locations, in all three tasks outbound trajectories of the current arm were preferentially replayed, showing the animals’ next path to the center. At reward locations trajectories were replayed preferentially in reverse temporal order. Moreover, in the center reverse replay was seen in the working memory task but in the other tasks forward replay was seen. Hence, the direction of reactivation was determined by the goal locations so that part of the trajectory which was closer to the goal was reactivated later in an HSE while places further away from the goal were reactivated earlier. Altogether my work demonstrated that reference memory update triggers several levels of reorganization of the hippocampal cognitive map which are not seen in simpler working memory demand s. Moreover, hippocampus is likely to be involved in spatial decisions through reactivating planned trajectories when reference memory recall is required for such a decision. },
  author       = {Xu, Haibing},
  issn         = {2663-337X},
  pages        = {93},
  publisher    = {Institute of Science and Technology Austria},
  title        = {{Reactivation of the hippocampal cognitive map in goal-directed spatial tasks}},
  doi          = {10.15479/AT:ISTA:th_858},
  year         = {2017},
}

@phdthesis{838,
  abstract     = {In this thesis we discuss the exact security of message authentications codes HMAC , NMAC , and PMAC . NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a variable input-length function. A practical single-key variant of NMAC called HMAC is a very popular and widely deployed message authentication code (MAC). PMAC is a block-cipher based mode of operation, which also happens to be the most famous fully parallel MAC. NMAC was introduced by Bellare, Canetti and Krawczyk Crypto’96, who proved it to be a secure pseudorandom function (PRF), and thus also a MAC, under two assumptions. Unfortunately, for many instantiations of HMAC one of them has been found to be wrong. To restore the provable guarantees for NMAC , Bellare [Crypto’06] showed its security without this assumption. PMAC was introduced by Black and Rogaway at Eurocrypt 2002. If instantiated with a pseudorandom permutation over n -bit strings, PMAC constitutes a provably secure variable input-length PRF. For adversaries making q queries, each of length at most ` (in n -bit blocks), and of total length σ ≤ q` , the original paper proves an upper bound on the distinguishing advantage of O ( σ 2 / 2 n ), while the currently best bound is O ( qσ/ 2 n ). In this work we show that this bound is tight by giving an attack with advantage Ω( q 2 `/ 2 n ). In the PMAC construction one initially XORs a mask to every message block, where the mask for the i th block is computed as τ i := γ i · L , where L is a (secret) random value, and γ i is the i -th codeword of the Gray code. Our attack applies more generally to any sequence of γ i ’s which contains a large coset of a subgroup of GF (2 n ). As for NMAC , our first contribution is a simpler and uniform proof: If f is an ε -secure PRF (against q queries) and a δ - non-adaptively secure PRF (against q queries), then NMAC f is an ( ε + `qδ )-secure PRF against q queries of length at most ` blocks each. We also show that this ε + `qδ bound is basically tight by constructing an f for which an attack with advantage `qδ exists. Moreover, we analyze the PRF-security of a modification of NMAC called NI by An and Bellare that avoids the constant rekeying on multi-block messages in NMAC and allows for an information-theoretic analysis. We carry out such an analysis, obtaining a tight `q 2 / 2 c bound for this step, improving over the trivial bound of ` 2 q 2 / 2 c . Finally, we investigate, if the security of PMAC can be further improved by using τ i ’s that are k -wise independent, for k &gt; 1 (the original has k = 1). We observe that the security of PMAC will not increase in general if k = 2, and then prove that the security increases to O ( q 2 / 2 n ), if the k = 4. Due to simple extension attacks, this is the best bound one can hope for, using any distribution on the masks. Whether k = 3 is already sufficient to get this level of security is left as an open problem. Keywords: Message authentication codes, Pseudorandom functions, HMAC, PMAC. },
  author       = {Rybar, Michal},
  issn         = {2663-337X},
  pages        = {86},
  publisher    = {Institute of Science and Technology Austria},
  title        = {{(The exact security of) Message authentication codes}},
  doi          = {10.15479/AT:ISTA:th_828},
  year         = {2017},
}

@phdthesis{839,
  abstract     = {This thesis describes a brittle fracture simulation method for visual effects applications. Building upon a symmetric Galerkin boundary element method, we first compute stress intensity factors following the theory of linear elastic fracture mechanics. We then use these stress intensities to simulate the motion of a propagating crack front at a significantly higher resolution than the overall deformation of the breaking object. Allowing for spatial variations of the material's toughness during crack propagation produces visually realistic, highly-detailed fracture surfaces. Furthermore, we introduce approximations for stress intensities and crack opening displacements, resulting in both practical speed-up and theoretically superior runtime complexity compared to previous methods. While we choose a quasi-static approach to fracture mechanics, ignoring dynamic deformations, we also couple our fracture simulation framework to a standard rigid-body dynamics solver, enabling visual effects artists to simulate both large scale motion, as well as fracturing due to collision forces in a combined system. As fractures inside of an object grow, their geometry must be represented both in the coarse boundary element mesh, as well as at the desired fine output resolution. Using a boundary element method, we avoid complicated volumetric meshing operations. Instead we describe a simple set of surface meshing operations that allow us to progressively add cracks to the mesh of an object and still re-use all previously computed entries of the linear boundary element system matrix. On the high resolution level, we opt for an implicit surface representation. We then describe how to capture fracture surfaces during crack propagation, as well as separate the individual fragments resulting from the fracture process, based on this implicit representation. We show results obtained with our method, either solving the full boundary element system in every time step, or alternatively using our fast approximations. These results demonstrate that both of these methods perform well in basic test cases and produce realistic fracture surfaces. Furthermore we show that our fast approximations substantially out-perform the standard approach in more demanding scenarios. Finally, these two methods naturally combine, using the full solution while the problem size is manageably small and switching to the fast approximations later on. The resulting hybrid method gives the user a direct way to choose between speed and accuracy of the simulation. },
  author       = {Hahn, David},
  issn         = {2663-337X},
  pages        = {124},
  publisher    = {Institute of Science and Technology Austria},
  title        = {{Brittle fracture simulation with boundary elements for computer graphics}},
  doi          = {10.15479/AT:ISTA:th_855},
  year         = {2017},
}

@inbook{84,
  abstract     = {The advent of high-throughput technologies and the concurrent advances in information sciences have led to a data revolution in biology. This revolution is most significant in molecular biology, with an increase in the number and scale of the “omics” projects over the last decade. Genomics projects, for example, have produced impressive advances in our knowledge of the information concealed into genomes, from the many genes that encode for the proteins that are responsible for most if not all cellular functions, to the noncoding regions that are now known to provide regulatory functions. Proteomics initiatives help to decipher the role of post-translation modifications on the protein structures and provide maps of protein-protein interactions, while functional genomics is the field that attempts to make use of the data produced by these projects to understand protein functions. The biggest challenge today is to assimilate the wealth of information provided by these initiatives into a conceptual framework that will help us decipher life. For example, the current views of the relationship between protein structure and function remain fragmented. We know of their sequences, more and more about their structures, we have information on their biological activities, but we have difficulties connecting this dotted line into an informed whole. We lack the experimental and computational tools for directly studying protein structure, function, and dynamics at the molecular and supra-molecular levels. In this chapter, we review some of the current developments in building the computational tools that are needed, focusing on the role that geometry and topology play in these efforts. One of our goals is to raise the general awareness about the importance of geometric methods in elucidating the mysterious foundations of our very existence. Another goal is the broadening of what we consider a geometric algorithm. There is plenty of valuable no-man’s-land between combinatorial and numerical algorithms, and it seems opportune to explore this land with a computational-geometric frame of mind.},
  author       = {Edelsbrunner, Herbert and Koehl, Patrice},
  booktitle    = {Handbook of Discrete and Computational Geometry, Third Edition},
  editor       = {Toth, Csaba and O'Rourke, Joseph and Goodman, Jacob},
  pages        = {1709 -- 1735},
  publisher    = {Taylor & Francis},
  title        = {{Computational topology for structural molecular biology}},
  doi          = {10.1201/9781315119601},
  year         = {2017},
}

@article{840,
  abstract     = {Heavy holes confined in quantum dots are predicted to be promising candidates for the realization of spin qubits with long coherence times. Here we focus on such heavy-hole states confined in germanium hut wires. By tuning the growth density of the latter we can realize a T-like structure between two neighboring wires. Such a structure allows the realization of a charge sensor, which is electrostatically and tunnel coupled to a quantum dot, with charge-transfer signals as high as 0.3 e. By integrating the T-like structure into a radiofrequency reflectometry setup, single-shot measurements allowing the extraction of hole tunneling times are performed. The extracted tunneling times of less than 10 μs are attributed to the small effective mass of Ge heavy-hole states and pave the way toward projective spin readout measurements.},
  author       = {Vukusic, Lada and Kukucka, Josip and Watzinger, Hannes and Katsaros, Georgios},
  issn         = {15306984},
  journal      = {Nano Letters},
  number       = {9},
  pages        = {5706 -- 5710},
  publisher    = {American Chemical Society},
  title        = {{Fast hole tunneling times in germanium hut wires probed by single-shot reflectometry}},
  doi          = {10.1021/acs.nanolett.7b02627},
  volume       = {17},
  year         = {2017},
}

@article{2016,
  abstract     = {The Ising model is one of the simplest and most famous models of interacting systems. It was originally proposed to model ferromagnetic interactions in statistical physics and is now widely used to model spatial processes in many areas such as ecology, sociology, and genetics, usually without testing its goodness-of-fit. Here, we propose an exact goodness-of-fit test for the finite-lattice Ising model. The theory of Markov bases has been developed in algebraic statistics for exact goodness-of-fit testing using a Monte Carlo approach. However, this beautiful theory has fallen short of its promise for applications, because finding a Markov basis is usually computationally intractable. We develop a Monte Carlo method for exact goodness-of-fit testing for the Ising model which avoids computing a Markov basis and also leads to a better connectivity of the Markov chain and hence to a faster convergence. We show how this method can be applied to analyze the spatial organization of receptors on the cell membrane.},
  author       = {Martin Del Campo Sanchez, Abraham and Cepeda Humerez, Sarah A and Uhler, Caroline},
  issn         = {03036898},
  journal      = {Scandinavian Journal of Statistics},
  number       = {2},
  pages        = {285 -- 306},
  publisher    = {Wiley-Blackwell},
  title        = {{Exact goodness-of-fit testing for the Ising model}},
  doi          = {10.1111/sjos.12251},
  volume       = {44},
  year         = {2017},
}

