@article{2852,
  abstract     = {A robust combiner for hash functions takes two candidate implementations and constructs a hash function which is secure as long as at least one of the candidates is secure. So far, hash function combiners only aim at preserving a single property such as collision-resistance or pseudorandomness. However, when hash functions are used in protocols like TLS they are often required to provide several properties simultaneously. We therefore put forward the notion of robust multi-property combiners and elaborate on different definitions for such combiners. We then propose a combiner that provably preserves (target) collision-resistance, pseudorandomness, and being a secure message authentication code. This combiner satisfies the strongest notion we propose, which requires that the combined function satisfies every security property which is satisfied by at least one of the underlying hash function. If the underlying hash functions have output length n, the combiner has output length 2 n. This basically matches a known lower bound for black-box combiners for collision-resistance only, thus the other properties can be achieved without penalizing the length of the hash values. We then propose a combiner which also preserves the property of being indifferentiable from a random oracle, slightly increasing the output length to 2 n+ω(log n). Moreover, we show how to augment our constructions in order to make them also robust for the one-wayness property, but in this case require an a priory upper bound on the input length.},
  author       = {Fischlin, Marc and Lehmann, Anja and Pietrzak, Krzysztof Z},
  journal      = {Journal of Cryptology},
  number       = {3},
  pages        = {397 -- 428},
  publisher    = {Springer},
  title        = {{Robust multi-property combiners for hash functions}},
  doi          = {10.1007/s00145-013-9148-7},
  volume       = {27},
  year         = {2014},
}

@inproceedings{2905,
  abstract     = {Persistent homology is a recent grandchild of homology that has found use in
science and engineering as well as in mathematics. This paper surveys the method as well
as the applications, neglecting completeness in favor of highlighting ideas and directions.},
  author       = {Edelsbrunner, Herbert and Morozovy, Dmitriy},
  location     = {Kraków, Poland},
  pages        = {31 -- 50},
  publisher    = {European Mathematical Society Publishing House},
  title        = {{Persistent homology: Theory and practice}},
  doi          = {10.4171/120-1/3},
  year         = {2014},
}

@article{3263,
  abstract     = {Adaptation in the retina is thought to optimize the encoding of natural light signals into sequences of spikes sent to the brain. While adaptive changes in retinal processing to the variations of the mean luminance level and second-order stimulus statistics have been documented before, no such measurements have been performed when higher-order moments of the light distribution change. We therefore measured the ganglion cell responses in the tiger salamander retina to controlled changes in the second (contrast), third (skew) and fourth (kurtosis) moments of the light intensity distribution of spatially uniform temporally independent stimuli. The skew and kurtosis of the stimuli were chosen to cover the range observed in natural scenes. We quantified adaptation in ganglion cells by studying linear-nonlinear models that capture well the retinal encoding properties across all stimuli. We found that the encoding properties of retinal ganglion cells change only marginally when higher-order statistics change, compared to the changes observed in response to the variation in contrast. By analyzing optimal coding in LN-type models, we showed that neurons can maintain a high information rate without large dynamic adaptation to changes in skew or kurtosis. This is because, for uncorrelated stimuli, spatio-temporal summation within the receptive field averages away non-gaussian aspects of the light intensity distribution.},
  author       = {Tkacik, Gasper and Ghosh, Anandamohan and Schneidman, Elad and Segev, Ronen},
  journal      = {PLoS One},
  number       = {1},
  publisher    = {Public Library of Science},
  title        = {{Adaptation to changes in higher-order stimulus statistics in the salamander retina}},
  doi          = {10.1371/journal.pone.0085841},
  volume       = {9},
  year         = {2014},
}

@inproceedings{10793,
  abstract     = {The Hanani–Tutte theorem is a classical result proved for the first time in the 1930s that characterizes planar graphs as graphs that admit a drawing in the plane in which every pair of edges not sharing a vertex cross an even number of times. We generalize this classical result to clustered graphs with two disjoint clusters, and show that a straightforward extension of our result to flat clustered graphs with three or more disjoint clusters is not possible.

We also give a new and short proof for a related result by Di Battista and Frati based on the matroid intersection algorithm.},
  author       = {Fulek, Radoslav and Kynčl, Jan and Malinović, Igor and Pálvölgyi, Dömötör},
  booktitle    = {International Symposium on Graph Drawing},
  issn         = {0302-9743},
  pages        = {428--436},
  publisher    = {Springer Nature},
  title        = {{Clustered planarity testing revisited}},
  doi          = {10.1007/978-3-662-45803-7_36},
  volume       = {8871},
  year         = {2014},
}

@book{10811,
  abstract     = {Auxin is an important signaling compound in plants and vital for plant development and growth. The present book, Auxin and its Role in Plant Development, provides the reader with detailed and comprehensive insight into the functioning of the molecule on the whole and specifically in plant development. In the first part, the functioning, metabolism and signaling pathways of auxin in plants are explained, the second part depicts the specific role of auxin in plant development and the third part describes the interaction and functioning of the signaling compound  upon stimuli of the environment. Each chapter is written by international experts in the respective field and designed for scientists and researchers in plant biology, plant development and cell biology to summarize the recent progress in understanding the role of auxin and suggest future perspectives for auxin research.},
  editor       = {Zažímalová, Eva and Petrášek, Jan and Benková, Eva},
  isbn         = {9783709115251},
  pages        = {444},
  publisher    = {Springer Nature},
  title        = {{Auxin and Its Role in Plant Development}},
  doi          = {10.1007/978-3-7091-1526-8},
  year         = {2014},
}

@article{10814,
  abstract     = {We review recent progress towards a rigorous understanding of the excitation spectrum of bosonic quantum many-body systems. In particular, we explain how one can rigorously establish the predictions resulting from the Bogoliubov approximation in the mean field limit. The latter predicts that the spectrum is made up of elementary excitations, whose energy behaves linearly in the momentum for small momentum. This property is crucial for the superfluid behavior of the system. We also discuss a list of open problems in this field.},
  author       = {Seiringer, Robert},
  issn         = {1869-7135},
  journal      = {Jahresbericht der Deutschen Mathematiker-Vereinigung},
  keywords     = {General Medicine},
  pages        = {21--41},
  publisher    = {Springer Nature},
  title        = {{The excitation spectrum for Bose fluids with weak interactions}},
  doi          = {10.1365/s13291-014-0083-9},
  volume       = {116},
  year         = {2014},
}

@article{10815,
  abstract     = {In the last several decades, developmental biology has clarified the molecular mechanisms of embryogenesis and organogenesis. In particular, it has demonstrated that the “tool-kit genes” essential for regulating developmental processes are not only highly conserved among species, but are also used as systems at various times and places in an organism to control distinct developmental events. Therefore, mutations in many of these tool-kit genes may cause congenital diseases involving morphological abnormalities. This link between genes and abnormal morphological phenotypes underscores the importance of understanding how cells behave and contribute to morphogenesis as a result of gene function. Recent improvements in live imaging and in quantitative analyses of cellular dynamics will advance our understanding of the cellular pathogenesis of congenital diseases associated with aberrant morphologies. In these studies, it is critical to select an appropriate model organism for the particular phenomenon of interest.},
  author       = {Hashimoto, Masakazu and Morita, Hitoshi and Ueno, Naoto},
  issn         = {0914-3505},
  journal      = {Congenital Anomalies},
  keywords     = {Developmental Biology, Embryology, General Medicine, Pediatrics, Perinatology, and Child Health},
  number       = {1},
  pages        = {1--7},
  publisher    = {Wiley},
  title        = {{Molecular and cellular mechanisms of development underlying congenital diseases}},
  doi          = {10.1111/cga.12039},
  volume       = {54},
  year         = {2014},
}

@inbook{10817,
  abstract     = {The Morse-Smale complex can be either explicitly or implicitly represented. Depending on the type of representation, the simplification of the Morse-Smale complex works differently. In the explicit representation, the Morse-Smale complex is directly simplified by explicitly reconnecting the critical points during the simplification. In the implicit representation, on the other hand, the Morse-Smale complex is given by a combinatorial gradient field. In this setting, the simplification changes the combinatorial flow, which yields an indirect simplification of the Morse-Smale complex. The topological complexity of the Morse-Smale complex is reduced in both representations. However, the simplifications generally yield different results. In this chapter, we emphasize properties of the two representations that cause these differences. We also provide a complexity analysis of the two schemes with respect to running time and memory consumption.},
  author       = {Günther, David and Reininghaus, Jan and Seidel, Hans-Peter and Weinkauf, Tino},
  booktitle    = {Topological Methods in Data Analysis and Visualization III.},
  editor       = {Bremer, Peer-Timo and Hotz, Ingrid and Pascucci, Valerio and Peikert, Ronald},
  isbn         = {9783319040981},
  issn         = {2197-666X},
  pages        = {135--150},
  publisher    = {Springer Nature},
  title        = {{Notes on the simplification of the Morse-Smale complex}},
  doi          = {10.1007/978-3-319-04099-8_9},
  year         = {2014},
}

@inproceedings{10884,
  abstract     = {We revisit the parameterized model checking problem for token-passing systems and specifications in indexed CTL  ∗ \X. Emerson and Namjoshi (1995, 2003) have shown that parameterized model checking of indexed CTL  ∗ \X in uni-directional token rings can be reduced to checking rings up to some cutoff size. Clarke et al. (2004) have shown a similar result for general topologies and indexed LTL \X, provided processes cannot choose the directions for sending or receiving the token.
We unify and substantially extend these results by systematically exploring fragments of indexed CTL  ∗ \X with respect to general topologies. For each fragment we establish whether a cutoff exists, and for some concrete topologies, such as rings, cliques and stars, we infer small cutoffs. Finally, we show that the problem becomes undecidable, and thus no cutoffs exist, if processes are allowed to choose the directions in which they send or from which they receive the token.},
  author       = {Aminof, Benjamin and Jacobs, Swen and Khalimov, Ayrat and Rubin, Sasha},
  booktitle    = {Verification, Model Checking, and Abstract Interpretation},
  isbn         = {9783642540127},
  issn         = {1611-3349},
  location     = {San Diego, CA, United States},
  pages        = {262--281},
  publisher    = {Springer Nature},
  title        = {{Parameterized model checking of token-passing systems}},
  doi          = {10.1007/978-3-642-54013-4_15},
  volume       = {8318},
  year         = {2014},
}

@inproceedings{10885,
  abstract     = {Two-player games on graphs provide the theoretical framework for many important problems such as reactive synthesis. While the traditional study of two-player zero-sum games has been extended to multi-player games with several notions of equilibria, they are decidable only for perfect-information games, whereas several applications require imperfect-information games.
In this paper we propose a new notion of equilibria, called doomsday equilibria, which is a strategy profile such that all players satisfy their own objective, and if any coalition of players deviates and violates even one of the players objective, then the objective of every player is violated.
We present algorithms and complexity results for deciding the existence of doomsday equilibria for various classes of ω-regular objectives, both for imperfect-information games, and for perfect-information games.We provide optimal complexity bounds for imperfect-information games, and in most cases for perfect-information games.},
  author       = {Chatterjee, Krishnendu and Doyen, Laurent and Filiot, Emmanuel and Raskin, Jean-François},
  booktitle    = {VMCAI 2014: Verification, Model Checking, and Abstract Interpretation},
  isbn         = {9783642540127},
  issn         = {1611-3349},
  location     = {San Diego, CA, United States},
  pages        = {78--97},
  publisher    = {Springer Nature},
  title        = {{Doomsday equilibria for omega-regular games}},
  doi          = {10.1007/978-3-642-54013-4_5},
  volume       = {8318},
  year         = {2014},
}

@inproceedings{10886,
  abstract     = {We propose a method for visualizing two-dimensional symmetric positive definite tensor fields using the Heat Kernel Signature (HKS). The HKS is derived from the heat kernel and was originally introduced as an isometry invariant shape signature. Each positive definite tensor field defines a Riemannian manifold by considering the tensor field as a Riemannian metric. On this Riemmanian manifold we can apply the definition of the HKS. The resulting scalar quantity is used for the visualization of tensor fields. The HKS is closely related to the Gaussian curvature of the Riemannian manifold and the time parameter of the heat kernel allows a multiscale analysis in a natural way. In this way, the HKS represents field related scale space properties, enabling a level of detail analysis of tensor fields. This makes the HKS an interesting new scalar quantity for tensor fields, which differs significantly from usual tensor invariants like the trace or the determinant. A method for visualization and a numerical realization of the HKS for tensor fields is proposed in this chapter. To validate the approach we apply it to some illustrating simple examples as isolated critical points and to a medical diffusion tensor data set.},
  author       = {Zobel, Valentin and Reininghaus, Jan and Hotz, Ingrid},
  booktitle    = {Topological Methods in Data Analysis and Visualization III },
  isbn         = {9783319040981},
  issn         = {2197-666X},
  pages        = {249--262},
  publisher    = {Springer},
  title        = {{Visualization of two-dimensional symmetric positive definite tensor fields using the heat kernel signature}},
  doi          = {10.1007/978-3-319-04099-8_16},
  year         = {2014},
}

@inproceedings{10892,
  abstract     = {In this paper, we introduce planar matchings on directed pseudo-line arrangements, which yield a planar set of pseudo-line segments such that only matching-partners are adjacent. By translating the planar matching problem into a corresponding stable roommates problem we show that such matchings always exist.
Using our new framework, we establish, for the first time, a complete, rigorous definition of weighted straight skeletons, which are based on a so-called wavefront propagation process. We present a generalized and unified approach to treat structural changes in the wavefront that focuses on the restoration of weak planarity by finding planar matchings.},
  author       = {Biedl, Therese and Huber, Stefan and Palfrader, Peter},
  booktitle    = {25th International Symposium, ISAAC 2014},
  isbn         = {9783319130743},
  issn         = {1611-3349},
  location     = {Jeonju, Korea},
  pages        = {117--127},
  publisher    = {Springer Nature},
  title        = {{Planar matchings for weighted straight skeletons}},
  doi          = {10.1007/978-3-319-13075-0_10},
  volume       = {8889},
  year         = {2014},
}

@inbook{10893,
  abstract     = {Saddle periodic orbits are an essential and stable part of the topological skeleton of a 3D vector field. Nevertheless, there is currently no efficient algorithm to robustly extract these features. In this chapter, we present a novel technique to extract saddle periodic orbits. Exploiting the analytic properties of such an orbit, we propose a scalar measure based on the finite-time Lyapunov exponent (FTLE) that indicates its presence. Using persistent homology, we can then extract the robust cycles of this field. These cycles thereby represent the saddle periodic orbits of the given vector field. We discuss the different existing FTLE approximation schemes regarding their applicability to this specific problem and propose an adapted version of FTLE called Normalized Velocity Separation. Finally, we evaluate our method using simple analytic vector field data.},
  author       = {Kasten, Jens and Reininghaus, Jan and Reich, Wieland and Scheuermann, Gerik},
  booktitle    = {Topological Methods in Data Analysis and Visualization III },
  editor       = {Bremer, Peer-Timo and Hotz, Ingrid and Pascucci, Valerio and Peikert, Ronald},
  isbn         = {9783319040981},
  issn         = {2197-666X},
  pages        = {55--69},
  publisher    = {Springer},
  title        = {{Toward the extraction of saddle periodic orbits}},
  doi          = {10.1007/978-3-319-04099-8_4},
  volume       = {1},
  year         = {2014},
}

@inproceedings{10894,
  abstract     = {PHAT is a C++ library for the computation of persistent homology by matrix reduction. We aim for a simple generic design that decouples algorithms from data structures without sacrificing efficiency or user-friendliness. This makes PHAT a versatile platform for experimenting with algorithmic ideas and comparing them to state of the art implementations.},
  author       = {Bauer, Ulrich and Kerber, Michael and Reininghaus, Jan and Wagner, Hubert},
  booktitle    = {ICMS 2014: International Congress on Mathematical Software},
  isbn         = {9783662441985},
  issn         = {1611-3349},
  location     = {Seoul, South Korea},
  pages        = {137--143},
  publisher    = {Springer Berlin Heidelberg},
  title        = {{PHAT – Persistent Homology Algorithms Toolbox}},
  doi          = {10.1007/978-3-662-44199-2_24},
  volume       = {8592},
  year         = {2014},
}

@inproceedings{8044,
  abstract     = {Many questions concerning models in quantum mechanics require a detailed analysis of the spectrum of the corresponding Hamiltonian, a linear operator on a suitable Hilbert space. Of particular relevance for an understanding of the low-temperature properties of a system is the structure of the excitation spectrum, which is the part of the spectrum close to the spectral bottom. We present recent progress on this question for bosonic many-body quantum systems with weak two-body interactions. Such system are currently of great interest, due to their experimental realization in ultra-cold atomic gases. We investigate the accuracy of the Bogoliubov approximations, which predicts that the low-energy spectrum is made up of sums of elementary excitations, with linear dispersion law at low momentum. The latter property is crucial for the superfluid behavior the system.},
  author       = {Seiringer, Robert},
  booktitle    = {Proceeding of the International Congress of Mathematicans},
  isbn         = {9788961058063},
  location     = {Seoul, South Korea},
  pages        = {1175--1194},
  publisher    = {International Congress of Mathematicians},
  title        = {{Structure of the excitation spectrum for many-body quantum systems}},
  volume       = {3},
  year         = {2014},
}

@article{1629,
  abstract     = {We propose a method for propagating edit operations in 2D vector graphics, based on geometric relationship functions. These functions quantify the geometric relationship of a point to a polygon, such as the distance to the boundary or the direction to the closest corner vertex. The level sets of the relationship functions describe points with the same relationship to a polygon. For a given query point, we first determine a set of relationships to local features, construct all level sets for these relationships, and accumulate them. The maxima of the resulting distribution are points with similar geometric relationships. We show extensions to handle mirror symmetries, and discuss the use of relationship functions as local coordinate systems. Our method can be applied, for example, to interactive floorplan editing, and it is especially useful for large layouts, where individual edits would be cumbersome. We demonstrate populating 2D layouts with tens to hundreds of objects by propagating relatively few edit operations.},
  author       = {Guerrero, Paul and Jeschke, Stefan and Wimmer, Michael and Wonka, Peter},
  journal      = {ACM Transactions on Graphics},
  number       = {2},
  publisher    = {ACM},
  title        = {{Edit propagation using geometric relationship functions}},
  doi          = {10.1145/2591010},
  volume       = {33},
  year         = {2014},
}

@inproceedings{1643,
  abstract     = {We extend the notion of verifiable random functions (VRF) to constrained VRFs, which generalize the concept of constrained pseudorandom functions, put forward by Boneh and Waters (Asiacrypt’13), and independently by Kiayias et al. (CCS’13) and Boyle et al. (PKC’14), who call them delegatable PRFs and functional PRFs, respectively. In a standard VRF the secret key sk allows one to evaluate a pseudorandom function at any point of its domain; in addition, it enables computation of a non-interactive proof that the function value was computed correctly. In a constrained VRF from the key sk one can derive constrained keys skS for subsets S of the domain, which allow computation of function values and proofs only at points in S. After formally defining constrained VRFs, we derive instantiations from the multilinear-maps-based constrained PRFs by Boneh and Waters, yielding a VRF with constrained keys for any set that can be decided by a polynomial-size circuit. Our VRFs have the same function values as the Boneh-Waters PRFs and are proved secure under the same hardness assumption, showing that verifiability comes at no cost. Constrained (functional) VRFs were stated as an open problem by Boyle et al.},
  author       = {Fuchsbauer, Georg},
  booktitle    = {SCN 2014},
  editor       = {Abdalla, Michel and De Prisco, Roberto},
  location     = {Amalfi, Italy},
  pages        = {95 -- 114},
  publisher    = {Springer},
  title        = {{Constrained Verifiable Random Functions }},
  doi          = {10.1007/978-3-319-10879-7_7},
  volume       = {8642},
  year         = {2014},
}

@inproceedings{1702,
  abstract     = {In this paper we present INTERHORN, a solver for recursion-free Horn clauses. The main application domain of INTERHORN lies in solving interpolation problems arising in software verification. We show how a range of interpolation problems, including path, transition, nested, state/transition and well-founded interpolation can be handled directly by INTERHORN. By detailing these interpolation problems and their Horn clause representations, we hope to encourage the emergence of a common back-end interpolation interface useful for diverse verification tools.},
  author       = {Gupta, Ashutosh and Popeea, Corneliu and Rybalchenko, Andrey},
  booktitle    = {Electronic Proceedings in Theoretical Computer Science, EPTCS},
  location     = {Vienna, Austria},
  pages        = {31 -- 38},
  publisher    = {Open Publishing},
  title        = {{Generalised interpolation by solving recursion free-horn clauses}},
  doi          = {10.4204/EPTCS.169.5},
  volume       = {169},
  year         = {2014},
}

@inproceedings{1708,
  abstract     = {It has been long argued that, because of inherent ambiguity and noise, the brain needs to represent uncertainty in the form of probability distributions. The neural encoding of such distributions remains however highly controversial. Here we present a novel circuit model for representing multidimensional real-valued distributions using a spike based spatio-temporal code. Our model combines the computational advantages of the currently competing models for probabilistic codes and exhibits realistic neural responses along a variety of classic measures. Furthermore, the model highlights the challenges associated with interpreting neural activity in relation to behavioral uncertainty and points to alternative population-level approaches for the experimental validation of distributed representations.},
  author       = {Savin, Cristina and Denève, Sophie},
  location     = {Montreal, Canada},
  number       = {January},
  pages        = {2024 -- 2032},
  publisher    = {Neural Information Processing Systems},
  title        = {{Spatio-temporal representations of uncertainty in spiking neural networks}},
  volume       = {3},
  year         = {2014},
}

@article{1733,
  abstract     = {The classical (boolean) notion of refinement for behavioral interfaces of system components is the alternating refinement preorder. In this paper, we define a distance for interfaces, called interface simulation distance. It makes the alternating refinement preorder quantitative by, intuitively, tolerating errors (while counting them) in the alternating simulation game. We show that the interface simulation distance satisfies the triangle inequality, that the distance between two interfaces does not increase under parallel composition with a third interface, that the distance between two interfaces can be bounded from above and below by distances between abstractions of the two interfaces, and how to synthesize an interface from incompatible requirements. We illustrate the framework, and the properties of the distances under composition of interfaces, with two case studies.},
  author       = {Cerny, Pavol and Chmelik, Martin and Henzinger, Thomas A and Radhakrishna, Arjun},
  journal      = {Theoretical Computer Science},
  number       = {3},
  pages        = {348 -- 363},
  publisher    = {Elsevier},
  title        = {{Interface simulation distances}},
  doi          = {10.1016/j.tcs.2014.08.019},
  volume       = {560},
  year         = {2014},
}

