[{"year":"2018","abstract":[{"lang":"eng","text":"Lesion and electrode location verification are traditionally done via histological examination of stained brain slices, a time-consuming procedure that requires manual estimation. Here, we describe a simple, straightforward method for quantifying lesions and locating electrodes in the brain that is less laborious and yields more detailed results. Whole brains are stained with osmium tetroxide, embedded in resin, and imaged with a micro-CT scanner. The scans result in 3D digital volumes of the brains with resolutions and virtual section thicknesses dependent on the sample size (12-15 and 5-6 µm per voxel for rat and zebra finch brains, respectively). Surface and deep lesions can be characterized, and single tetrodes, tetrode arrays, electrolytic lesions, and silicon probes can also be localized. Free and proprietary software allows experimenters to examine the sample volume from any plane and segment the volume manually or automatically. Because this method generates whole brain volume, lesions and electrodes can be quantified to a much higher degree than in current methods, which will help standardize comparisons within and across studies."}],"doi":"10.3791/58585","author":[{"first_name":"Javier","last_name":"Masís","full_name":"Masís, Javier"},{"full_name":"Mankus, David","last_name":"Mankus","first_name":"David"},{"first_name":"Steffen","full_name":"Wolff, Steffen","last_name":"Wolff"},{"first_name":"Grigori","full_name":"Guitchounts, Grigori","last_name":"Guitchounts"},{"orcid":"0000-0002-3937-1330","full_name":"Jösch, Maximilian A","last_name":"Jösch","id":"2BD278E6-F248-11E8-B48F-1D18A9856A87","first_name":"Maximilian A"},{"full_name":"Cox, David","last_name":"Cox","first_name":"David"}],"title":"A micro-CT-based method for characterising lesions and locating electrodes in small animal brains","_id":"6","publication_status":"published","status":"public","publication":"Journal of visualized experiments","date_updated":"2023-10-17T11:49:25Z","external_id":{"isi":["000456469400103"]},"date_published":"2018-11-08T00:00:00Z","scopus_import":"1","oa_version":"None","date_created":"2018-12-11T11:44:07Z","day":"08","department":[{"_id":"MaJö"}],"citation":{"chicago":"Masís, Javier, David Mankus, Steffen Wolff, Grigori Guitchounts, Maximilian A Jösch, and David Cox. “A Micro-CT-Based Method for Characterising Lesions and Locating Electrodes in Small Animal Brains.” <i>Journal of Visualized Experiments</i>. MyJove Corporation, 2018. <a href=\"https://doi.org/10.3791/58585\">https://doi.org/10.3791/58585</a>.","mla":"Masís, Javier, et al. “A Micro-CT-Based Method for Characterising Lesions and Locating Electrodes in Small Animal Brains.” <i>Journal of Visualized Experiments</i>, vol. 141, MyJove Corporation, 2018, doi:<a href=\"https://doi.org/10.3791/58585\">10.3791/58585</a>.","ieee":"J. Masís, D. Mankus, S. Wolff, G. Guitchounts, M. A. Jösch, and D. Cox, “A micro-CT-based method for characterising lesions and locating electrodes in small animal brains,” <i>Journal of visualized experiments</i>, vol. 141. MyJove Corporation, 2018.","apa":"Masís, J., Mankus, D., Wolff, S., Guitchounts, G., Jösch, M. A., &#38; Cox, D. (2018). A micro-CT-based method for characterising lesions and locating electrodes in small animal brains. <i>Journal of Visualized Experiments</i>. MyJove Corporation. <a href=\"https://doi.org/10.3791/58585\">https://doi.org/10.3791/58585</a>","short":"J. Masís, D. Mankus, S. Wolff, G. Guitchounts, M.A. Jösch, D. Cox, Journal of Visualized Experiments 141 (2018).","ista":"Masís J, Mankus D, Wolff S, Guitchounts G, Jösch MA, Cox D. 2018. A micro-CT-based method for characterising lesions and locating electrodes in small animal brains. Journal of visualized experiments. 141.","ama":"Masís J, Mankus D, Wolff S, Guitchounts G, Jösch MA, Cox D. A micro-CT-based method for characterising lesions and locating electrodes in small animal brains. <i>Journal of visualized experiments</i>. 2018;141. doi:<a href=\"https://doi.org/10.3791/58585\">10.3791/58585</a>"},"publist_id":"8050","month":"11","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","isi":1,"quality_controlled":"1","type":"journal_article","language":[{"iso":"eng"}],"volume":141,"article_processing_charge":"No","intvolume":"       141","publisher":"MyJove Corporation"},{"department":[{"_id":"ToHe"}],"day":"19","citation":{"ieee":"E. Clarke, T. A. Henzinger, and H. Veith, “Introduction to model checking,” in <i>Handbook of Model Checking</i>, T. A. Henzinger, Ed. Springer, 2018, pp. 1–26.","apa":"Clarke, E., Henzinger, T. A., &#38; Veith, H. (2018). Introduction to model checking. In T. A. Henzinger (Ed.), <i>Handbook of Model Checking</i> (pp. 1–26). Springer. <a href=\"https://doi.org/10.1007/978-3-319-10575-8_1\">https://doi.org/10.1007/978-3-319-10575-8_1</a>","short":"E. Clarke, T.A. Henzinger, H. Veith, in:, T.A. Henzinger (Ed.), Handbook of Model Checking, Springer, 2018, pp. 1–26.","ista":"Clarke E, Henzinger TA, Veith H. 2018.Introduction to model checking. In: Handbook of Model Checking. , 1–26.","ama":"Clarke E, Henzinger TA, Veith H. Introduction to model checking. In: Henzinger TA, ed. <i>Handbook of Model Checking</i>. Handbook of Model Checking. Springer; 2018:1-26. doi:<a href=\"https://doi.org/10.1007/978-3-319-10575-8_1\">10.1007/978-3-319-10575-8_1</a>","mla":"Clarke, Edmund, et al. “Introduction to Model Checking.” <i>Handbook of Model Checking</i>, edited by Thomas A Henzinger, Springer, 2018, pp. 1–26, doi:<a href=\"https://doi.org/10.1007/978-3-319-10575-8_1\">10.1007/978-3-319-10575-8_1</a>.","chicago":"Clarke, Edmund, Thomas A Henzinger, and Helmut Veith. “Introduction to Model Checking.” In <i>Handbook of Model Checking</i>, edited by Thomas A Henzinger, 1–26. Handbook of Model Checking. Springer, 2018. <a href=\"https://doi.org/10.1007/978-3-319-10575-8_1\">https://doi.org/10.1007/978-3-319-10575-8_1</a>."},"publist_id":"7994","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","month":"05","date_published":"2018-05-19T00:00:00Z","scopus_import":1,"oa_version":"None","date_created":"2018-12-11T11:44:25Z","series_title":"Handbook of Model Checking","publisher":"Springer","quality_controlled":"1","type":"book_chapter","language":[{"iso":"eng"}],"author":[{"first_name":"Edmund","full_name":"Clarke, Edmund","last_name":"Clarke"},{"first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724"},{"full_name":"Veith, Helmut","last_name":"Veith","first_name":"Helmut"}],"title":"Introduction to model checking","_id":"60","editor":[{"first_name":"Thomas A","last_name":"Henzinger","full_name":"Henzinger, Thomas A"}],"year":"2018","abstract":[{"lang":"eng","text":"Model checking is a computer-assisted method for the analysis of dynamical systems that can be modeled by state-transition systems. Drawing from research traditions in mathematical logic, programming languages, hardware design, and theoretical computer science, model checking is now widely used for the verification of hardware and software in industry. This chapter is an introduction and short survey of model checking. The chapter aims to motivate and link the individual chapters of the handbook, and to provide context for readers who are not familiar with model checking."}],"doi":"10.1007/978-3-319-10575-8_1","publication":"Handbook of Model Checking","date_updated":"2021-01-12T08:05:35Z","publication_status":"published","status":"public","page":"1 - 26"},{"date_published":"2018-09-01T00:00:00Z","date_created":"2019-02-14T13:24:11Z","oa_version":"None","scopus_import":1,"citation":{"short":"D.-A. Alistarh, W. Leiserson, A. Matveev, N. Shavit, ACM Transactions on Parallel Computing 4 (2018).","ista":"Alistarh D-A, Leiserson W, Matveev A, Shavit N. 2018. ThreadScan: Automatic and scalable memory reclamation. ACM Transactions on Parallel Computing. 4(4), 18.","ama":"Alistarh D-A, Leiserson W, Matveev A, Shavit N. ThreadScan: Automatic and scalable memory reclamation. <i>ACM Transactions on Parallel Computing</i>. 2018;4(4). doi:<a href=\"https://doi.org/10.1145/3201897\">10.1145/3201897</a>","ieee":"D.-A. Alistarh, W. Leiserson, A. Matveev, and N. Shavit, “ThreadScan: Automatic and scalable memory reclamation,” <i>ACM Transactions on Parallel Computing</i>, vol. 4, no. 4. Association for Computing Machinery, 2018.","apa":"Alistarh, D.-A., Leiserson, W., Matveev, A., &#38; Shavit, N. (2018). ThreadScan: Automatic and scalable memory reclamation. <i>ACM Transactions on Parallel Computing</i>. Association for Computing Machinery. <a href=\"https://doi.org/10.1145/3201897\">https://doi.org/10.1145/3201897</a>","chicago":"Alistarh, Dan-Adrian, William Leiserson, Alexander Matveev, and Nir Shavit. “ThreadScan: Automatic and Scalable Memory Reclamation.” <i>ACM Transactions on Parallel Computing</i>. Association for Computing Machinery, 2018. <a href=\"https://doi.org/10.1145/3201897\">https://doi.org/10.1145/3201897</a>.","mla":"Alistarh, Dan-Adrian, et al. “ThreadScan: Automatic and Scalable Memory Reclamation.” <i>ACM Transactions on Parallel Computing</i>, vol. 4, no. 4, 18, Association for Computing Machinery, 2018, doi:<a href=\"https://doi.org/10.1145/3201897\">10.1145/3201897</a>."},"department":[{"_id":"DaAl"}],"day":"01","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","month":"09","volume":4,"language":[{"iso":"eng"}],"type":"journal_article","quality_controlled":"1","publisher":"Association for Computing Machinery","intvolume":"         4","abstract":[{"text":"The concurrent memory reclamation problem is that of devising a way for a deallocating thread to verify that no other concurrent threads hold references to a memory block being deallocated. To date, in the absence of automatic garbage collection, there is no satisfactory solution to this problem; existing tracking methods like hazard pointers, reference counters, or epoch-based techniques like RCU are either prohibitively expensive or require significant programming expertise to the extent that implementing them efficiently can be worthy of a publication. None of the existing techniques are automatic or even semi-automated.\r\nIn this article, we take a new approach to concurrent memory reclamation. Instead of manually tracking access to memory locations as done in techniques like hazard pointers, or restricting shared accesses to specific epoch boundaries as in RCU, our algorithm, called ThreadScan, leverages operating system signaling to automatically detect which memory locations are being accessed by concurrent threads.\r\nInitial empirical evidence shows that ThreadScan scales surprisingly well and requires negligible programming effort beyond the standard use of Malloc and Free.","lang":"eng"}],"issue":"4","year":"2018","doi":"10.1145/3201897","title":"ThreadScan: Automatic and scalable memory reclamation","author":[{"orcid":"0000-0003-3650-940X","first_name":"Dan-Adrian","id":"4A899BFC-F248-11E8-B48F-1D18A9856A87","last_name":"Alistarh","full_name":"Alistarh, Dan-Adrian"},{"full_name":"Leiserson, William","last_name":"Leiserson","first_name":"William"},{"last_name":"Matveev","full_name":"Matveev, Alexander","first_name":"Alexander"},{"first_name":"Nir","last_name":"Shavit","full_name":"Shavit, Nir"}],"_id":"6001","related_material":{"record":[{"status":"public","relation":"earlier_version","id":"779"}]},"status":"public","publication_status":"published","article_number":"18","publication_identifier":{"issn":["2329-4949"]},"publication":"ACM Transactions on Parallel Computing","date_updated":"2023-02-23T13:17:54Z"},{"year":"2018","oa":1,"page":"1037-1090","date_updated":"2023-09-19T14:33:12Z","publication":"Archive for Rational Mechanics and Analysis","date_created":"2019-02-14T13:40:53Z","scopus_import":"1","date_published":"2018-09-01T00:00:00Z","external_id":{"arxiv":["1511.05935"],"isi":["000435367300003"]},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","department":[{"_id":"RoSe"}],"quality_controlled":"1","language":[{"iso":"eng"}],"type":"journal_article","isi":1,"publisher":"Springer Nature","intvolume":"       229","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1511.05935"}],"doi":"10.1007/s00205-018-1232-6","abstract":[{"lang":"eng","text":"The Bogoliubov free energy functional is analysed. The functional serves as a model of a translation-invariant Bose gas at positive temperature. We prove the existence of minimizers in the case of repulsive interactions given by a sufficiently regular two-body potential. Furthermore, we prove the existence of a phase transition in this model and provide its phase diagram."}],"issue":"3","_id":"6002","title":"The Bogoliubov free energy functional I: Existence of minimizers and phase diagram","author":[{"full_name":"Napiórkowski, Marcin M","last_name":"Napiórkowski","id":"4197AD04-F248-11E8-B48F-1D18A9856A87","first_name":"Marcin M"},{"first_name":"Robin","full_name":"Reuvers, Robin","last_name":"Reuvers"},{"first_name":"Jan Philip","full_name":"Solovej, Jan Philip","last_name":"Solovej"}],"status":"public","publication_status":"published","project":[{"name":"Structure of the Excitation Spectrum for Many-Body Quantum Systems","call_identifier":"FWF","grant_number":"P27533_N27","_id":"25C878CE-B435-11E9-9278-68D0E5697425"}],"publication_identifier":{"eissn":["1432-0673"],"issn":["0003-9527"]},"oa_version":"Preprint","month":"09","citation":{"ieee":"M. M. Napiórkowski, R. Reuvers, and J. P. Solovej, “The Bogoliubov free energy functional I: Existence of minimizers and phase diagram,” <i>Archive for Rational Mechanics and Analysis</i>, vol. 229, no. 3. Springer Nature, pp. 1037–1090, 2018.","apa":"Napiórkowski, M. M., Reuvers, R., &#38; Solovej, J. P. (2018). The Bogoliubov free energy functional I: Existence of minimizers and phase diagram. <i>Archive for Rational Mechanics and Analysis</i>. Springer Nature. <a href=\"https://doi.org/10.1007/s00205-018-1232-6\">https://doi.org/10.1007/s00205-018-1232-6</a>","short":"M.M. Napiórkowski, R. Reuvers, J.P. Solovej, Archive for Rational Mechanics and Analysis 229 (2018) 1037–1090.","ama":"Napiórkowski MM, Reuvers R, Solovej JP. The Bogoliubov free energy functional I: Existence of minimizers and phase diagram. <i>Archive for Rational Mechanics and Analysis</i>. 2018;229(3):1037-1090. doi:<a href=\"https://doi.org/10.1007/s00205-018-1232-6\">10.1007/s00205-018-1232-6</a>","ista":"Napiórkowski MM, Reuvers R, Solovej JP. 2018. The Bogoliubov free energy functional I: Existence of minimizers and phase diagram. Archive for Rational Mechanics and Analysis. 229(3), 1037–1090.","chicago":"Napiórkowski, Marcin M, Robin Reuvers, and Jan Philip Solovej. “The Bogoliubov Free Energy Functional I: Existence of Minimizers and Phase Diagram.” <i>Archive for Rational Mechanics and Analysis</i>. Springer Nature, 2018. <a href=\"https://doi.org/10.1007/s00205-018-1232-6\">https://doi.org/10.1007/s00205-018-1232-6</a>.","mla":"Napiórkowski, Marcin M., et al. “The Bogoliubov Free Energy Functional I: Existence of Minimizers and Phase Diagram.” <i>Archive for Rational Mechanics and Analysis</i>, vol. 229, no. 3, Springer Nature, 2018, pp. 1037–90, doi:<a href=\"https://doi.org/10.1007/s00205-018-1232-6\">10.1007/s00205-018-1232-6</a>."},"day":"01","article_processing_charge":"No","volume":229,"arxiv":1},{"title":"State of the art on stylized fabrication","author":[{"orcid":"0000-0001-6511-9385","last_name":"Bickel","full_name":"Bickel, Bernd","first_name":"Bernd","id":"49876194-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Paolo","last_name":"Cignoni","full_name":"Cignoni, Paolo"},{"full_name":"Malomo, Luigi","last_name":"Malomo","first_name":"Luigi"},{"full_name":"Pietroni, Nico","last_name":"Pietroni","first_name":"Nico"}],"_id":"6003","abstract":[{"text":"Digital fabrication devices are powerful tools for creating tangible reproductions of 3D digital models. Most available printing technologies aim at producing an accurate copy of a tridimensional shape. However, fabrication technologies can also be used to create a stylistic representation of a digital shape. We refer to this class of methods as ‘stylized fabrication methods’. These methods abstract geometric and physical features of a given shape to create an unconventional representation, to produce an optical illusion or to devise a particular interaction with the fabricated model. In this state‐of‐the‐art report, we classify and overview this broad and emerging class of approaches and also propose possible directions for future research.","lang":"eng"}],"issue":"6","doi":"10.1111/cgf.13327","publication_identifier":{"issn":["0167-7055"]},"project":[{"_id":"24F9549A-B435-11E9-9278-68D0E5697425","grant_number":"715767","call_identifier":"H2020","name":"MATERIALIZABLE: Intelligent fabrication-oriented Computational Design and Modeling"}],"publication_status":"published","status":"public","ec_funded":1,"citation":{"chicago":"Bickel, Bernd, Paolo Cignoni, Luigi Malomo, and Nico Pietroni. “State of the Art on Stylized Fabrication.” <i>Computer Graphics Forum</i>. Wiley, 2018. <a href=\"https://doi.org/10.1111/cgf.13327\">https://doi.org/10.1111/cgf.13327</a>.","mla":"Bickel, Bernd, et al. “State of the Art on Stylized Fabrication.” <i>Computer Graphics Forum</i>, vol. 37, no. 6, Wiley, 2018, pp. 325–42, doi:<a href=\"https://doi.org/10.1111/cgf.13327\">10.1111/cgf.13327</a>.","ieee":"B. Bickel, P. Cignoni, L. Malomo, and N. Pietroni, “State of the art on stylized fabrication,” <i>Computer Graphics Forum</i>, vol. 37, no. 6. Wiley, pp. 325–342, 2018.","apa":"Bickel, B., Cignoni, P., Malomo, L., &#38; Pietroni, N. (2018). State of the art on stylized fabrication. <i>Computer Graphics Forum</i>. Wiley. <a href=\"https://doi.org/10.1111/cgf.13327\">https://doi.org/10.1111/cgf.13327</a>","ama":"Bickel B, Cignoni P, Malomo L, Pietroni N. State of the art on stylized fabrication. <i>Computer Graphics Forum</i>. 2018;37(6):325-342. doi:<a href=\"https://doi.org/10.1111/cgf.13327\">10.1111/cgf.13327</a>","short":"B. Bickel, P. Cignoni, L. Malomo, N. Pietroni, Computer Graphics Forum 37 (2018) 325–342.","ista":"Bickel B, Cignoni P, Malomo L, Pietroni N. 2018. State of the art on stylized fabrication. Computer Graphics Forum. 37(6), 325–342."},"pubrep_id":"1051","day":"01","file_date_updated":"2020-07-14T12:47:15Z","ddc":["004"],"month":"09","oa_version":"Submitted Version","file":[{"date_updated":"2020-07-14T12:47:15Z","checksum":"d2bbe5c658d8159fbe9016a4f5e82b19","content_type":"application/pdf","access_level":"open_access","relation":"main_file","creator":"kschuh","file_size":6209349,"file_name":"StylizedFabricationSTAR-Personal.pdf","date_created":"2019-02-14T14:09:28Z","file_id":"6004"}],"has_accepted_license":"1","article_processing_charge":"No","volume":37,"oa":1,"year":"2018","publication":"Computer Graphics Forum","date_updated":"2023-09-19T14:33:40Z","page":"325-342","department":[{"_id":"BeBi"}],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","date_published":"2018-09-01T00:00:00Z","external_id":{"isi":["000437272800019"]},"date_created":"2019-02-14T13:52:25Z","scopus_import":"1","publisher":"Wiley","intvolume":"        37","isi":1,"quality_controlled":"1","language":[{"iso":"eng"}],"type":"journal_article"},{"intvolume":"       117","publisher":"Schloss Dagstuhl - Leibniz-Zentrum für Informatik","quality_controlled":"1","language":[{"iso":"eng"}],"type":"conference","department":[{"_id":"ToHe"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_published":"2018-08-01T00:00:00Z","scopus_import":"1","date_created":"2019-02-14T14:12:09Z","date_updated":"2023-02-23T14:02:58Z","related_material":{"record":[{"id":"963","relation":"earlier_version","status":"public"}]},"article_number":"23","oa":1,"alternative_title":["LIPIcs"],"year":"2018","tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"file":[{"file_size":542889,"relation":"main_file","creator":"dernst","file_name":"2018_LIPIcs_Avni.pdf","content_type":"application/pdf","checksum":"41ab2ae9b63f5eb49fa995250c0ba128","access_level":"open_access","date_updated":"2020-07-14T12:47:15Z","date_created":"2019-02-14T14:22:04Z","file_id":"6007"}],"has_accepted_license":"1","article_processing_charge":"No","volume":117,"day":"01","citation":{"chicago":"Avni, Guy, Shibashis Guha, and Orna Kupferman. “Timed Network Games with Clocks,” Vol. 117. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018. <a href=\"https://doi.org/10.4230/LIPICS.MFCS.2018.23\">https://doi.org/10.4230/LIPICS.MFCS.2018.23</a>.","mla":"Avni, Guy, et al. <i>Timed Network Games with Clocks</i>. Vol. 117, 23, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018, doi:<a href=\"https://doi.org/10.4230/LIPICS.MFCS.2018.23\">10.4230/LIPICS.MFCS.2018.23</a>.","apa":"Avni, G., Guha, S., &#38; Kupferman, O. (2018). Timed network games with clocks (Vol. 117). Presented at the MFCS: Mathematical Foundations of Computer Science, Liverpool, United Kingdom: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. <a href=\"https://doi.org/10.4230/LIPICS.MFCS.2018.23\">https://doi.org/10.4230/LIPICS.MFCS.2018.23</a>","ieee":"G. Avni, S. Guha, and O. Kupferman, “Timed network games with clocks,” presented at the MFCS: Mathematical Foundations of Computer Science, Liverpool, United Kingdom, 2018, vol. 117.","ista":"Avni G, Guha S, Kupferman O. 2018. Timed network games with clocks. MFCS: Mathematical Foundations of Computer Science, LIPIcs, vol. 117, 23.","ama":"Avni G, Guha S, Kupferman O. Timed network games with clocks. In: Vol 117. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2018. doi:<a href=\"https://doi.org/10.4230/LIPICS.MFCS.2018.23\">10.4230/LIPICS.MFCS.2018.23</a>","short":"G. Avni, S. Guha, O. Kupferman, in:, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2018."},"ddc":["000"],"file_date_updated":"2020-07-14T12:47:15Z","month":"08","license":"https://creativecommons.org/licenses/by/4.0/","conference":{"location":"Liverpool, United Kingdom","start_date":"2018-08-27","end_date":"2018-08-31","name":"MFCS: Mathematical Foundations of Computer Science"},"oa_version":"Published Version","publication_identifier":{"issn":["1868-8969"]},"project":[{"_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23","name":"Rigorous Systems Engineering","call_identifier":"FWF"},{"name":"The Wittgenstein Prize","call_identifier":"FWF","grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425"},{"name":"Formal Methods meets Algorithmic Game Theory","call_identifier":"FWF","grant_number":"M02369","_id":"264B3912-B435-11E9-9278-68D0E5697425"}],"publication_status":"published","status":"public","author":[{"orcid":"0000-0001-5588-8287","id":"463C8BC2-F248-11E8-B48F-1D18A9856A87","first_name":"Guy","full_name":"Avni, Guy","last_name":"Avni"},{"first_name":"Shibashis","full_name":"Guha, Shibashis","last_name":"Guha"},{"first_name":"Orna","last_name":"Kupferman","full_name":"Kupferman, Orna"}],"title":"Timed network games with clocks","_id":"6005","abstract":[{"text":"Network games are widely used as a model for selfish resource-allocation problems. In the classicalmodel, each player selects a path connecting her source and target vertices. The cost of traversingan edge depends on theload; namely, number of players that traverse it. Thus, it abstracts the factthat different users may use a resource at different times and for different durations, which playsan important role in determining the costs of the users in reality. For example, when transmittingpackets in a communication network, routing traffic in a road network, or processing a task in aproduction system, actual sharing and congestion of resources crucially depends on time.In [13], we introducedtimed network games, which add a time component to network games.Each vertexvin the network is associated with a cost function, mapping the load onvto theprice that a player pays for staying invfor one time unit with this load.  Each edge in thenetwork is guarded by the time intervals in which it can be traversed, which forces the players tospend time in the vertices. In this work we significantly extend the way time can be referred toin timed network games. In the model we study, the network is equipped withclocks, and, as intimed automata, edges are guarded by constraints on the values of the clocks, and their traversalmay involve a reset of some clocks. We argue that the stronger model captures many realisticnetworks.  The addition of clocks breaks the techniques we developed in [13] and we developnew techniques in order to show that positive results on classic network games carry over to thestronger timed setting.","lang":"eng"}],"doi":"10.4230/LIPICS.MFCS.2018.23"},{"status":"public","publication_status":"published","project":[{"name":"Formal Methods meets Algorithmic Game Theory","call_identifier":"FWF","grant_number":"M02369","_id":"264B3912-B435-11E9-9278-68D0E5697425"},{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","name":"Rigorous Systems Engineering","call_identifier":"FWF"},{"grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425","name":"The Wittgenstein Prize","call_identifier":"FWF"}],"publication_identifier":{"issn":["2073-4336"]},"doi":"10.3390/g9030039","issue":"3","abstract":[{"lang":"eng","text":"Network games (NGs) are played on directed graphs and are extensively used in network design and analysis. Search problems for NGs include finding special strategy profiles such as a Nash equilibrium and a globally-optimal solution. The networks modeled by NGs may be huge. In formal verification, abstraction has proven to be an extremely effective technique for reasoning about systems with big and even infinite state spaces. We describe an abstraction-refinement methodology for reasoning about NGs. Our methodology is based on an abstraction function that maps the state space of an NG to a much smaller state space. We search for a global optimum and a Nash equilibrium by reasoning on an under- and an over-approximation defined on top of this smaller state space. When the approximations are too coarse to find such profiles, we refine the abstraction function. We extend the abstraction-refinement methodology to labeled networks, where the objectives of the players are regular languages. Our experimental results demonstrate the effectiveness of the methodology. "}],"_id":"6006","author":[{"orcid":"0000-0001-5588-8287","id":"463C8BC2-F248-11E8-B48F-1D18A9856A87","first_name":"Guy","full_name":"Avni, Guy","last_name":"Avni"},{"first_name":"Shibashis","last_name":"Guha","full_name":"Guha, Shibashis"},{"first_name":"Orna","full_name":"Kupferman, Orna","last_name":"Kupferman"}],"title":"An abstraction-refinement methodology for reasoning about network games","volume":9,"has_accepted_license":"1","file":[{"date_created":"2019-02-14T14:20:31Z","file_id":"6008","date_updated":"2020-07-14T12:47:16Z","checksum":"749d65ca4ce74256a029d9644a1b1cb0","content_type":"application/pdf","access_level":"open_access","file_size":505155,"relation":"main_file","creator":"kschuh","file_name":"2018_MDPI_Avni.pdf"}],"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"oa_version":"Published Version","file_date_updated":"2020-07-14T12:47:16Z","month":"09","ddc":["004"],"day":"01","citation":{"apa":"Avni, G., Guha, S., &#38; Kupferman, O. (2018). An abstraction-refinement methodology for reasoning about network games. <i>Games</i>. MDPI AG. <a href=\"https://doi.org/10.3390/g9030039\">https://doi.org/10.3390/g9030039</a>","ieee":"G. Avni, S. Guha, and O. Kupferman, “An abstraction-refinement methodology for reasoning about network games,” <i>Games</i>, vol. 9, no. 3. MDPI AG, 2018.","ista":"Avni G, Guha S, Kupferman O. 2018. An abstraction-refinement methodology for reasoning about network games. Games. 9(3), 39.","ama":"Avni G, Guha S, Kupferman O. An abstraction-refinement methodology for reasoning about network games. <i>Games</i>. 2018;9(3). doi:<a href=\"https://doi.org/10.3390/g9030039\">10.3390/g9030039</a>","short":"G. Avni, S. Guha, O. Kupferman, Games 9 (2018).","mla":"Avni, Guy, et al. “An Abstraction-Refinement Methodology for Reasoning about Network Games.” <i>Games</i>, vol. 9, no. 3, 39, MDPI AG, 2018, doi:<a href=\"https://doi.org/10.3390/g9030039\">10.3390/g9030039</a>.","chicago":"Avni, Guy, Shibashis Guha, and Orna Kupferman. “An Abstraction-Refinement Methodology for Reasoning about Network Games.” <i>Games</i>. MDPI AG, 2018. <a href=\"https://doi.org/10.3390/g9030039\">https://doi.org/10.3390/g9030039</a>."},"article_number":"39","related_material":{"record":[{"id":"1003","status":"public","relation":"earlier_version"}]},"date_updated":"2023-09-22T09:48:59Z","publication":"Games","year":"2018","oa":1,"language":[{"iso":"eng"}],"type":"journal_article","quality_controlled":"1","intvolume":"         9","publisher":"MDPI AG","scopus_import":1,"date_created":"2019-02-14T14:17:54Z","date_published":"2018-09-01T00:00:00Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","department":[{"_id":"ToHe"}]},{"doi":"10.1145/3210257","abstract":[{"text":"We study algorithmic questions wrt algebraic path properties in concurrent systems, where the transitions of the system are labeled from a complete, closed semiring. The algebraic path properties can model dataflow analysis problems, the shortest path problem, and many other natural problems that arise in program analysis. We consider that each component of the concurrent system is a graph with constant treewidth, a property satisfied by the controlflow graphs of most programs. We allow for multiple possible queries, which arise naturally in demand driven dataflow analysis. The study of multiple queries allows us to consider the tradeoff between the resource usage of the one-time preprocessing and for each individual query. The traditional approach constructs the product graph of all components and applies the best-known graph algorithm on the product. In this approach, even the answer to a single query requires the transitive closure (i.e., the results of all possible queries), which provides no room for tradeoff between preprocessing and query time.\r\nOur main contributions are algorithms that significantly improve the worst-case running time of the traditional approach, and provide various tradeoffs depending on the number of queries. For example, in a concurrent system of two components, the traditional approach requires hexic time in the worst case for answering one query as well as computing the transitive closure, whereas we show that with one-time preprocessing in almost cubic time, each subsequent query can be answered in at most linear time, and even the transitive closure can be computed in almost quartic time. Furthermore, we establish conditional optimality results showing that the worst-case running time of our algorithms cannot be improved without achieving major breakthroughs in graph algorithms (i.e., improving the worst-case bound for the shortest path problem in general graphs). Preliminary experimental results show that our algorithms perform favorably on several benchmarks.\r\n","lang":"eng"}],"issue":"3","_id":"6009","title":"Algorithms for algebraic path properties in concurrent systems of constant treewidth components","author":[{"full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","orcid":"0000-0002-4561-241X"},{"last_name":"Ibsen-Jensen","full_name":"Ibsen-Jensen, Rasmus","first_name":"Rasmus","id":"3B699956-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-4783-0389"},{"orcid":"0000-0003-1702-6584","id":"391365CE-F248-11E8-B48F-1D18A9856A87","first_name":"Amir Kafshdar","full_name":"Goharshady, Amir Kafshdar","last_name":"Goharshady"},{"last_name":"Pavlogiannis","full_name":"Pavlogiannis, Andreas","first_name":"Andreas","id":"49704004-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8943-0722"}],"ec_funded":1,"status":"public","publication_status":"published","project":[{"name":"Modern Graph Algorithmic Techniques in Formal Verification","call_identifier":"FWF","grant_number":"P 23499-N23","_id":"2584A770-B435-11E9-9278-68D0E5697425"},{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Rigorous Systems Engineering"},{"_id":"2581B60A-B435-11E9-9278-68D0E5697425","grant_number":"279307","name":"Quantitative Graph Games: Theory and Applications","call_identifier":"FP7"}],"publication_identifier":{"issn":["0164-0925"]},"oa_version":"Preprint","month":"08","citation":{"chicago":"Chatterjee, Krishnendu, Rasmus Ibsen-Jensen, Amir Kafshdar Goharshady, and Andreas Pavlogiannis. “Algorithms for Algebraic Path Properties in Concurrent Systems of Constant Treewidth Components.” <i>ACM Transactions on Programming Languages and Systems</i>. Association for Computing Machinery (ACM), 2018. <a href=\"https://doi.org/10.1145/3210257\">https://doi.org/10.1145/3210257</a>.","mla":"Chatterjee, Krishnendu, et al. “Algorithms for Algebraic Path Properties in Concurrent Systems of Constant Treewidth Components.” <i>ACM Transactions on Programming Languages and Systems</i>, vol. 40, no. 3, 9, Association for Computing Machinery (ACM), 2018, doi:<a href=\"https://doi.org/10.1145/3210257\">10.1145/3210257</a>.","ista":"Chatterjee K, Ibsen-Jensen R, Goharshady AK, Pavlogiannis A. 2018. Algorithms for algebraic path properties in concurrent systems of constant treewidth components. ACM Transactions on Programming Languages and Systems. 40(3), 9.","ama":"Chatterjee K, Ibsen-Jensen R, Goharshady AK, Pavlogiannis A. Algorithms for algebraic path properties in concurrent systems of constant treewidth components. <i>ACM Transactions on Programming Languages and Systems</i>. 2018;40(3). doi:<a href=\"https://doi.org/10.1145/3210257\">10.1145/3210257</a>","short":"K. Chatterjee, R. Ibsen-Jensen, A.K. Goharshady, A. Pavlogiannis, ACM Transactions on Programming Languages and Systems 40 (2018).","ieee":"K. Chatterjee, R. Ibsen-Jensen, A. K. Goharshady, and A. Pavlogiannis, “Algorithms for algebraic path properties in concurrent systems of constant treewidth components,” <i>ACM Transactions on Programming Languages and Systems</i>, vol. 40, no. 3. Association for Computing Machinery (ACM), 2018.","apa":"Chatterjee, K., Ibsen-Jensen, R., Goharshady, A. K., &#38; Pavlogiannis, A. (2018). Algorithms for algebraic path properties in concurrent systems of constant treewidth components. <i>ACM Transactions on Programming Languages and Systems</i>. Association for Computing Machinery (ACM). <a href=\"https://doi.org/10.1145/3210257\">https://doi.org/10.1145/3210257</a>"},"day":"01","volume":40,"article_processing_charge":"No","arxiv":1,"year":"2018","oa":1,"article_number":"9","related_material":{"record":[{"relation":"earlier_version","status":"public","id":"1437"},{"id":"5441","status":"public","relation":"earlier_version"},{"id":"5442","status":"public","relation":"earlier_version"},{"status":"public","relation":"dissertation_contains","id":"8934"}]},"date_updated":"2024-03-25T23:30:19Z","publication":"ACM Transactions on Programming Languages and Systems","date_created":"2019-02-14T14:31:52Z","scopus_import":"1","date_published":"2018-08-01T00:00:00Z","external_id":{"isi":["000444694800001"],"arxiv":["1510.07565"]},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","department":[{"_id":"KrCh"}],"quality_controlled":"1","type":"journal_article","language":[{"iso":"eng"}],"isi":1,"publisher":"Association for Computing Machinery (ACM)","main_file_link":[{"url":"https://arxiv.org/abs/1510.07565","open_access":"1"}],"intvolume":"        40"},{"date_published":"2018-08-07T00:00:00Z","external_id":{"pmid":["30026198"],"isi":["000440982000020"]},"date_created":"2019-02-14T14:33:34Z","scopus_import":"1","department":[{"_id":"MaJö"}],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","isi":1,"language":[{"iso":"eng"}],"quality_controlled":"1","type":"journal_article","publisher":"National Academy of Sciences","intvolume":"       115","main_file_link":[{"url":"https://www.ncbi.nlm.nih.gov/pubmed/30026198","open_access":"1"}],"year":"2018","oa":1,"page":"E7615-E7623","publication":"Proceedings of the National Academy of Sciences","date_updated":"2023-09-19T14:35:36Z","oa_version":"Submitted Version","citation":{"chicago":"Garrido-Charad, Florencia, Tomas A Vega Zuniga, Cristián Gutiérrez-Ibáñez, Pedro Fernandez, Luciana López-Jury, Cristian González-Cabrera, Harvey J. Karten, Harald Luksch, and Gonzalo J. Marín. ““Shepherd’s Crook” Neurons Drive and Synchronize the Enhancing and Suppressive Mechanisms of the Midbrain Stimulus Selection Network.” <i>Proceedings of the National Academy of Sciences</i>. National Academy of Sciences, 2018. <a href=\"https://doi.org/10.1073/pnas.1804517115\">https://doi.org/10.1073/pnas.1804517115</a>.","mla":"Garrido-Charad, Florencia, et al. ““Shepherd’s Crook” Neurons Drive and Synchronize the Enhancing and Suppressive Mechanisms of the Midbrain Stimulus Selection Network.” <i>Proceedings of the National Academy of Sciences</i>, vol. 115, no. 32, National Academy of Sciences, 2018, pp. E7615–23, doi:<a href=\"https://doi.org/10.1073/pnas.1804517115\">10.1073/pnas.1804517115</a>.","short":"F. Garrido-Charad, T.A. Vega Zuniga, C. Gutiérrez-Ibáñez, P. Fernandez, L. López-Jury, C. González-Cabrera, H.J. Karten, H. Luksch, G.J. Marín, Proceedings of the National Academy of Sciences 115 (2018) E7615–E7623.","ista":"Garrido-Charad F, Vega Zuniga TA, Gutiérrez-Ibáñez C, Fernandez P, López-Jury L, González-Cabrera C, Karten HJ, Luksch H, Marín GJ. 2018. “Shepherd’s crook” neurons drive and synchronize the enhancing and suppressive mechanisms of the midbrain stimulus selection network. Proceedings of the National Academy of Sciences. 115(32), E7615–E7623.","ama":"Garrido-Charad F, Vega Zuniga TA, Gutiérrez-Ibáñez C, et al. “Shepherd’s crook” neurons drive and synchronize the enhancing and suppressive mechanisms of the midbrain stimulus selection network. <i>Proceedings of the National Academy of Sciences</i>. 2018;115(32):E7615-E7623. doi:<a href=\"https://doi.org/10.1073/pnas.1804517115\">10.1073/pnas.1804517115</a>","apa":"Garrido-Charad, F., Vega Zuniga, T. A., Gutiérrez-Ibáñez, C., Fernandez, P., López-Jury, L., González-Cabrera, C., … Marín, G. J. (2018). “Shepherd’s crook” neurons drive and synchronize the enhancing and suppressive mechanisms of the midbrain stimulus selection network. <i>Proceedings of the National Academy of Sciences</i>. National Academy of Sciences. <a href=\"https://doi.org/10.1073/pnas.1804517115\">https://doi.org/10.1073/pnas.1804517115</a>","ieee":"F. Garrido-Charad <i>et al.</i>, ““Shepherd’s crook” neurons drive and synchronize the enhancing and suppressive mechanisms of the midbrain stimulus selection network,” <i>Proceedings of the National Academy of Sciences</i>, vol. 115, no. 32. National Academy of Sciences, pp. E7615–E7623, 2018."},"day":"07","pmid":1,"month":"08","volume":115,"article_processing_charge":"No","abstract":[{"text":"The optic tectum (TeO), or superior colliculus, is a multisensory midbrain center that organizes spatially orienting responses to relevant stimuli. To define the stimulus with the highest priority at each moment, a network of reciprocal connections between the TeO and the isthmi promotes competition between concurrent tectal inputs. In the avian midbrain, the neurons mediating enhancement and suppression of tectal inputs are located in separate isthmic nuclei, facilitating the analysis of the neural processes that mediate competition. A specific subset of radial neurons in the intermediate tectal layers relay retinal inputs to the isthmi, but at present it is unclear whether separate neurons innervate individual nuclei or a single neural type sends a common input to several of them. In this study, we used in vitro neural tracing and cell-filling experiments in chickens to show that single neurons innervate, via axon collaterals, the three nuclei that comprise the isthmotectal network. This demonstrates that the input signals representing the strength of the incoming stimuli are simultaneously relayed to the mechanisms promoting both enhancement and suppression of the input signals. By performing in vivo recordings in anesthetized chicks, we also show that this common input generates synchrony between both antagonistic mechanisms, demonstrating that activity enhancement and suppression are closely coordinated. From a computational point of view, these results suggest that these tectal neurons constitute integrative nodes that combine inputs from different sources to drive in parallel several concurrent neural processes, each performing complementary functions within the network through different firing patterns and connectivity.","lang":"eng"}],"issue":"32","doi":"10.1073/pnas.1804517115","title":"“Shepherd’s crook” neurons drive and synchronize the enhancing and suppressive mechanisms of the midbrain stimulus selection network","author":[{"first_name":"Florencia","full_name":"Garrido-Charad, Florencia","last_name":"Garrido-Charad"},{"first_name":"Tomas A","id":"2E7C4E78-F248-11E8-B48F-1D18A9856A87","last_name":"Vega Zuniga","full_name":"Vega Zuniga, Tomas A"},{"last_name":"Gutiérrez-Ibáñez","full_name":"Gutiérrez-Ibáñez, Cristián","first_name":"Cristián"},{"full_name":"Fernandez, Pedro","last_name":"Fernandez","first_name":"Pedro"},{"last_name":"López-Jury","full_name":"López-Jury, Luciana","first_name":"Luciana"},{"first_name":"Cristian","full_name":"González-Cabrera, Cristian","last_name":"González-Cabrera"},{"last_name":"Karten","full_name":"Karten, Harvey J.","first_name":"Harvey J."},{"first_name":"Harald","last_name":"Luksch","full_name":"Luksch, Harald"},{"first_name":"Gonzalo J.","full_name":"Marín, Gonzalo J.","last_name":"Marín"}],"_id":"6010","status":"public","publication_status":"published","publication_identifier":{"issn":["0027-8424"],"eissn":["1091-6490"]}},{"arxiv":1,"volume":80,"article_processing_charge":"No","citation":{"ista":"Kuzborskij I, Lampert C. 2018. Data-dependent stability of stochastic gradient descent. Proceedings of the 35 th International Conference on Machine Learning. ICML: International Conference on Machine Learning vol. 80, 2815–2824.","ama":"Kuzborskij I, Lampert C. Data-dependent stability of stochastic gradient descent. In: <i>Proceedings of the 35 Th International Conference on Machine Learning</i>. Vol 80. ML Research Press; 2018:2815-2824.","short":"I. Kuzborskij, C. Lampert, in:, Proceedings of the 35 Th International Conference on Machine Learning, ML Research Press, 2018, pp. 2815–2824.","ieee":"I. Kuzborskij and C. Lampert, “Data-dependent stability of stochastic gradient descent,” in <i>Proceedings of the 35 th International Conference on Machine Learning</i>, Stockholm, Sweden, 2018, vol. 80, pp. 2815–2824.","apa":"Kuzborskij, I., &#38; Lampert, C. (2018). Data-dependent stability of stochastic gradient descent. In <i>Proceedings of the 35 th International Conference on Machine Learning</i> (Vol. 80, pp. 2815–2824). Stockholm, Sweden: ML Research Press.","chicago":"Kuzborskij, Ilja, and Christoph Lampert. “Data-Dependent Stability of Stochastic Gradient Descent.” In <i>Proceedings of the 35 Th International Conference on Machine Learning</i>, 80:2815–24. ML Research Press, 2018.","mla":"Kuzborskij, Ilja, and Christoph Lampert. “Data-Dependent Stability of Stochastic Gradient Descent.” <i>Proceedings of the 35 Th International Conference on Machine Learning</i>, vol. 80, ML Research Press, 2018, pp. 2815–24."},"day":"01","month":"02","oa_version":"Preprint","conference":{"name":"ICML: International Conference on Machine Learning","location":"Stockholm, Sweden","start_date":"2018-07-10","end_date":"2018-07-15"},"project":[{"call_identifier":"FP7","name":"Lifelong Learning of Visual Scene Understanding","_id":"2532554C-B435-11E9-9278-68D0E5697425","grant_number":"308036"}],"publication_status":"published","status":"public","ec_funded":1,"title":"Data-dependent stability of stochastic gradient descent","author":[{"full_name":"Kuzborskij, Ilja","last_name":"Kuzborskij","first_name":"Ilja"},{"full_name":"Lampert, Christoph","last_name":"Lampert","id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","first_name":"Christoph","orcid":"0000-0001-8622-7887"}],"_id":"6011","abstract":[{"text":"We establish a data-dependent notion of algorithmic stability for Stochastic Gradient Descent (SGD), and employ it to develop novel generalization bounds. This is in contrast to previous distribution-free algorithmic stability results for SGD which depend on the worst-case constants. By virtue of the data-dependent argument, our bounds provide new insights into learning with SGD on convex and non-convex problems. In the convex case, we show that the bound on the generalization error depends on the risk at the initialization point. In the non-convex case, we prove that the expected curvature of the objective function around the initialization point has crucial influence on the generalization error. In both cases, our results suggest a simple data-driven strategy to stabilize SGD by pre-screening its initialization. As a corollary, our results allow us to show optimistic generalization bounds that exhibit fast convergence rates for SGD subject to a vanishing empirical risk and low noise of stochastic gradient. ","lang":"eng"}],"publisher":"ML Research Press","main_file_link":[{"url":"https://arxiv.org/abs/1703.01678","open_access":"1"}],"intvolume":"        80","isi":1,"quality_controlled":"1","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"ChLa"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_published":"2018-02-01T00:00:00Z","external_id":{"arxiv":["1703.01678"],"isi":["000683379202095"]},"date_created":"2019-02-14T14:51:57Z","scopus_import":"1","publication":"Proceedings of the 35 th International Conference on Machine Learning","date_updated":"2023-10-17T09:51:13Z","page":"2815-2824","oa":1,"year":"2018"},{"isi":1,"language":[{"iso":"eng"}],"type":"conference","quality_controlled":"1","publisher":"ML Research Press","intvolume":"        80","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1806.07259"}],"external_id":{"isi":["000683379204058"],"arxiv":["1806.07259"]},"date_published":"2018-02-01T00:00:00Z","date_created":"2019-02-14T15:21:07Z","scopus_import":"1","department":[{"_id":"ChLa"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","related_material":{"link":[{"description":"News on IST Homepage","url":"https://ist.ac.at/en/news/first-machine-learning-method-capable-of-accurate-extrapolation/","relation":"press_release"}]},"page":"4442-4450","publication":"Proceedings of the 35th International Conference on Machine Learning","date_updated":"2023-10-17T09:50:53Z","year":"2018","oa":1,"volume":80,"article_processing_charge":"No","arxiv":1,"oa_version":"Preprint","conference":{"name":"ICML: International Conference on Machine Learning","location":"Stockholm, Sweden","start_date":"2018-07-10","end_date":"2018-07-15"},"citation":{"ieee":"S. Sahoo, C. Lampert, and G. S. Martius, “Learning equations for extrapolation and control,” in <i>Proceedings of the 35th International Conference on Machine Learning</i>, Stockholm, Sweden, 2018, vol. 80, pp. 4442–4450.","apa":"Sahoo, S., Lampert, C., &#38; Martius, G. S. (2018). Learning equations for extrapolation and control. In <i>Proceedings of the 35th International Conference on Machine Learning</i> (Vol. 80, pp. 4442–4450). Stockholm, Sweden: ML Research Press.","short":"S. Sahoo, C. Lampert, G.S. Martius, in:, Proceedings of the 35th International Conference on Machine Learning, ML Research Press, 2018, pp. 4442–4450.","ama":"Sahoo S, Lampert C, Martius GS. Learning equations for extrapolation and control. In: <i>Proceedings of the 35th International Conference on Machine Learning</i>. Vol 80. ML Research Press; 2018:4442-4450.","ista":"Sahoo S, Lampert C, Martius GS. 2018. Learning equations for extrapolation and control. Proceedings of the 35th International Conference on Machine Learning. ICML: International Conference on Machine Learning vol. 80, 4442–4450.","chicago":"Sahoo, Subham, Christoph Lampert, and Georg S Martius. “Learning Equations for Extrapolation and Control.” In <i>Proceedings of the 35th International Conference on Machine Learning</i>, 80:4442–50. ML Research Press, 2018.","mla":"Sahoo, Subham, et al. “Learning Equations for Extrapolation and Control.” <i>Proceedings of the 35th International Conference on Machine Learning</i>, vol. 80, ML Research Press, 2018, pp. 4442–50."},"day":"01","month":"02","publication_status":"published","status":"public","ec_funded":1,"project":[{"call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme","grant_number":"291734","_id":"25681D80-B435-11E9-9278-68D0E5697425"}],"abstract":[{"text":"We present an approach to identify concise equations from data using a shallow neural network approach. In contrast to ordinary black-box regression, this approach allows understanding functional relations and generalizing them from observed data to unseen parts of the parameter space. We show how to extend the class of learnable equations for a recently proposed equation learning network to include divisions, and we improve the learning and model selection strategy to be useful for challenging real-world data. For systems governed by analytical expressions, our method can in many cases identify the true underlying equation and extrapolate to unseen domains. We demonstrate its effectiveness by experiments on a cart-pendulum system, where only 2 random rollouts are required to learn the forward dynamics and successfully achieve the swing-up task.","lang":"eng"}],"title":"Learning equations for extrapolation and control","author":[{"first_name":"Subham","last_name":"Sahoo","full_name":"Sahoo, Subham"},{"orcid":"0000-0001-8622-7887","id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","first_name":"Christoph","full_name":"Lampert, Christoph","last_name":"Lampert"},{"id":"3A276B68-F248-11E8-B48F-1D18A9856A87","first_name":"Georg S","full_name":"Martius, Georg S","last_name":"Martius"}],"_id":"6012"},{"isi":1,"volume":"2018-October","article_processing_charge":"No","language":[{"iso":"eng"}],"type":"conference","quality_controlled":"1","publisher":"IEEE","external_id":{"isi":["000465106800060"]},"date_published":"2018-12-31T00:00:00Z","oa_version":"None","date_created":"2019-02-17T22:59:25Z","conference":{"end_date":"2018-10-24","start_date":"2018-10-21","location":"Cape Town, South Africa","name":"SiPS: Workshop on Signal Processing Systems"},"scopus_import":"1","citation":{"chicago":"Stojanov, Alen, Tyler Michael Smith, Dan-Adrian Alistarh, and Markus Puschel. “Fast Quantized Arithmetic on X86: Trading Compute for Data Movement.” In <i>2018 IEEE International Workshop on Signal Processing Systems</i>, Vol. 2018–October. IEEE, 2018. <a href=\"https://doi.org/10.1109/SiPS.2018.8598402\">https://doi.org/10.1109/SiPS.2018.8598402</a>.","mla":"Stojanov, Alen, et al. “Fast Quantized Arithmetic on X86: Trading Compute for Data Movement.” <i>2018 IEEE International Workshop on Signal Processing Systems</i>, vol. 2018–October, 8598402, IEEE, 2018, doi:<a href=\"https://doi.org/10.1109/SiPS.2018.8598402\">10.1109/SiPS.2018.8598402</a>.","ista":"Stojanov A, Smith TM, Alistarh D-A, Puschel M. 2018. Fast quantized arithmetic on x86: Trading compute for data movement. 2018 IEEE International Workshop on Signal Processing Systems. SiPS: Workshop on Signal Processing Systems vol. 2018–October, 8598402.","ama":"Stojanov A, Smith TM, Alistarh D-A, Puschel M. Fast quantized arithmetic on x86: Trading compute for data movement. In: <i>2018 IEEE International Workshop on Signal Processing Systems</i>. Vol 2018-October. IEEE; 2018. doi:<a href=\"https://doi.org/10.1109/SiPS.2018.8598402\">10.1109/SiPS.2018.8598402</a>","short":"A. Stojanov, T.M. Smith, D.-A. Alistarh, M. Puschel, in:, 2018 IEEE International Workshop on Signal Processing Systems, IEEE, 2018.","apa":"Stojanov, A., Smith, T. M., Alistarh, D.-A., &#38; Puschel, M. (2018). Fast quantized arithmetic on x86: Trading compute for data movement. In <i>2018 IEEE International Workshop on Signal Processing Systems</i> (Vol. 2018–October). Cape Town, South Africa: IEEE. <a href=\"https://doi.org/10.1109/SiPS.2018.8598402\">https://doi.org/10.1109/SiPS.2018.8598402</a>","ieee":"A. Stojanov, T. M. Smith, D.-A. Alistarh, and M. Puschel, “Fast quantized arithmetic on x86: Trading compute for data movement,” in <i>2018 IEEE International Workshop on Signal Processing Systems</i>, Cape Town, South Africa, 2018, vol. 2018–October."},"day":"31","department":[{"_id":"DaAl"}],"month":"12","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","status":"public","publication_status":"published","article_number":"8598402","publication":"2018 IEEE International Workshop on Signal Processing Systems","date_updated":"2023-09-19T14:41:51Z","abstract":[{"text":"We introduce Clover, a new library for efficient computation using low-precision data, providing mathematical routines required by fundamental methods in optimization and sparse recovery. Our library faithfully implements variants of stochastic quantization that guarantee convergence at low precision, and supports data formats from 4-bit quantized to 32-bit IEEE-754 on current Intel processors. In particular, we show that 4-bit can be implemented efficiently using Intel AVX despite the lack of native support for this data format. Experimental results with dot product, matrix-vector multiplication (MVM), gradient descent (GD), and iterative hard thresholding (IHT) demonstrate that the attainable speedups are in many cases close to linear with respect to the reduction of precision due to reduced data movement. Finally, for GD and IHT, we show examples of absolute speedup achieved by 4-bit versus 32-bit, by iterating until a given target error is achieved.","lang":"eng"}],"year":"2018","doi":"10.1109/SiPS.2018.8598402","title":"Fast quantized arithmetic on x86: Trading compute for data movement","author":[{"last_name":"Stojanov","full_name":"Stojanov, Alen","first_name":"Alen"},{"last_name":"Smith","full_name":"Smith, Tyler Michael","first_name":"Tyler Michael"},{"last_name":"Alistarh","full_name":"Alistarh, Dan-Adrian","first_name":"Dan-Adrian","id":"4A899BFC-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-3650-940X"},{"full_name":"Puschel, Markus","last_name":"Puschel","first_name":"Markus"}],"_id":"6031"},{"year":"2018","oa":1,"article_number":"22","article_type":"original","related_material":{"record":[{"id":"1192","relation":"earlier_version","status":"public"}]},"date_updated":"2023-09-20T11:20:26Z","publication":"ACM Transactions on Algorithms","date_created":"2019-02-17T22:59:25Z","scopus_import":"1","date_published":"2018-12-01T00:00:00Z","external_id":{"arxiv":["1602.03124"],"isi":["000468036500007"]},"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","department":[{"_id":"VlKo"}],"type":"journal_article","quality_controlled":"1","language":[{"iso":"eng"}],"isi":1,"publisher":"ACM","intvolume":"        15","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1602.03124"}],"doi":"10.1145/3230649","abstract":[{"text":"The main result of this article is a generalization of the classical blossom algorithm for finding perfect matchings. Our algorithm can efficiently solve Boolean CSPs where each variable appears in exactly two constraints (we call it edge CSP) and all constraints are even Δ-matroid relations (represented by lists of tuples). As a consequence of this, we settle the complexity classification of planar Boolean CSPs started by Dvorak and Kupec. Using a reduction to even Δ-matroids, we then extend the tractability result to larger classes of Δ-matroids that we call efficiently coverable. It properly includes classes that were known to be tractable before, namely, co-independent, compact, local, linear, and binary, with the following caveat:We represent Δ-matroids by lists of tuples, while the last two use a representation by matrices. Since an n ×n matrix can represent exponentially many tuples, our tractability result is not strictly stronger than the known algorithm for linear and binary Δ-matroids.","lang":"eng"}],"issue":"2","_id":"6032","title":"Even delta-matroids and the complexity of planar boolean CSPs","author":[{"first_name":"Alexandr","id":"3B32BAA8-F248-11E8-B48F-1D18A9856A87","last_name":"Kazda","full_name":"Kazda, Alexandr"},{"first_name":"Vladimir","id":"3D50B0BA-F248-11E8-B48F-1D18A9856A87","last_name":"Kolmogorov","full_name":"Kolmogorov, Vladimir"},{"id":"3CB3BC06-F248-11E8-B48F-1D18A9856A87","first_name":"Michal","full_name":"Rolinek, Michal","last_name":"Rolinek"}],"ec_funded":1,"publication_status":"published","status":"public","project":[{"_id":"25FBA906-B435-11E9-9278-68D0E5697425","grant_number":"616160","name":"Discrete Optimization in Computer Vision: Theory and Practice","call_identifier":"FP7"}],"oa_version":"Preprint","month":"12","citation":{"chicago":"Kazda, Alexandr, Vladimir Kolmogorov, and Michal Rolinek. “Even Delta-Matroids and the Complexity of Planar Boolean CSPs.” <i>ACM Transactions on Algorithms</i>. ACM, 2018. <a href=\"https://doi.org/10.1145/3230649\">https://doi.org/10.1145/3230649</a>.","mla":"Kazda, Alexandr, et al. “Even Delta-Matroids and the Complexity of Planar Boolean CSPs.” <i>ACM Transactions on Algorithms</i>, vol. 15, no. 2, 22, ACM, 2018, doi:<a href=\"https://doi.org/10.1145/3230649\">10.1145/3230649</a>.","apa":"Kazda, A., Kolmogorov, V., &#38; Rolinek, M. (2018). Even delta-matroids and the complexity of planar boolean CSPs. <i>ACM Transactions on Algorithms</i>. ACM. <a href=\"https://doi.org/10.1145/3230649\">https://doi.org/10.1145/3230649</a>","ieee":"A. Kazda, V. Kolmogorov, and M. Rolinek, “Even delta-matroids and the complexity of planar boolean CSPs,” <i>ACM Transactions on Algorithms</i>, vol. 15, no. 2. ACM, 2018.","ama":"Kazda A, Kolmogorov V, Rolinek M. Even delta-matroids and the complexity of planar boolean CSPs. <i>ACM Transactions on Algorithms</i>. 2018;15(2). doi:<a href=\"https://doi.org/10.1145/3230649\">10.1145/3230649</a>","ista":"Kazda A, Kolmogorov V, Rolinek M. 2018. Even delta-matroids and the complexity of planar boolean CSPs. ACM Transactions on Algorithms. 15(2), 22.","short":"A. Kazda, V. Kolmogorov, M. Rolinek, ACM Transactions on Algorithms 15 (2018)."},"day":"01","article_processing_charge":"No","volume":15,"arxiv":1},{"oa":1,"year":"2018","date_updated":"2023-09-19T10:39:09Z","publication":"Annales de l'Institut Henri Poincare (C) Non Linear Analysis","page":"1267-1319","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","publist_id":"7199","department":[{"_id":"JuFi"}],"scopus_import":"1","date_created":"2018-12-11T11:47:27Z","date_published":"2018-08-01T00:00:00Z","external_id":{"arxiv":["1607.00268"],"isi":["000437975500005"]},"intvolume":"        35","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1607.00268"}],"publisher":"Elsevier","type":"journal_article","language":[{"iso":"eng"}],"quality_controlled":"1","isi":1,"_id":"606","author":[{"last_name":"Duerinckx","full_name":"Duerinckx, Mitia","first_name":"Mitia"},{"last_name":"Fischer","full_name":"Fischer, Julian L","first_name":"Julian L","id":"2C12A0B0-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-0479-558X"}],"title":"Well-posedness for mean-field evolutions arising in superconductivity","doi":"10.1016/j.anihpc.2017.11.004","issue":"5","abstract":[{"lang":"eng","text":"We establish the existence of a global solution for a new family of fluid-like equations, which are obtained in certain regimes in as the mean-field evolution of the supercurrent density in a (2D section of a) type-II superconductor with pinning and with imposed electric current. We also consider general vortex-sheet initial data, and investigate the uniqueness and regularity properties of the solution. For some choice of parameters, the equation under investigation coincides with the so-called lake equation from 2D shallow water fluid dynamics, and our analysis then leads to a new existence result for rough initial data."}],"status":"public","publication_status":"published","acknowledgement":"The work of the author is supported by F.R.S.-FNRS ( Fonds de la Recherche Scientifique - FNRS ) through a Research Fellowship.\r\n\r\n","month":"08","day":"01","citation":{"chicago":"Duerinckx, Mitia, and Julian L Fischer. “Well-Posedness for Mean-Field Evolutions Arising in Superconductivity.” <i>Annales de l’Institut Henri Poincare (C) Non Linear Analysis</i>. Elsevier, 2018. <a href=\"https://doi.org/10.1016/j.anihpc.2017.11.004\">https://doi.org/10.1016/j.anihpc.2017.11.004</a>.","mla":"Duerinckx, Mitia, and Julian L. Fischer. “Well-Posedness for Mean-Field Evolutions Arising in Superconductivity.” <i>Annales de l’Institut Henri Poincare (C) Non Linear Analysis</i>, vol. 35, no. 5, Elsevier, 2018, pp. 1267–319, doi:<a href=\"https://doi.org/10.1016/j.anihpc.2017.11.004\">10.1016/j.anihpc.2017.11.004</a>.","ama":"Duerinckx M, Fischer JL. Well-posedness for mean-field evolutions arising in superconductivity. <i>Annales de l’Institut Henri Poincare (C) Non Linear Analysis</i>. 2018;35(5):1267-1319. doi:<a href=\"https://doi.org/10.1016/j.anihpc.2017.11.004\">10.1016/j.anihpc.2017.11.004</a>","ista":"Duerinckx M, Fischer JL. 2018. Well-posedness for mean-field evolutions arising in superconductivity. Annales de l’Institut Henri Poincare (C) Non Linear Analysis. 35(5), 1267–1319.","short":"M. Duerinckx, J.L. Fischer, Annales de l’Institut Henri Poincare (C) Non Linear Analysis 35 (2018) 1267–1319.","apa":"Duerinckx, M., &#38; Fischer, J. L. (2018). Well-posedness for mean-field evolutions arising in superconductivity. <i>Annales de l’Institut Henri Poincare (C) Non Linear Analysis</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.anihpc.2017.11.004\">https://doi.org/10.1016/j.anihpc.2017.11.004</a>","ieee":"M. Duerinckx and J. L. Fischer, “Well-posedness for mean-field evolutions arising in superconductivity,” <i>Annales de l’Institut Henri Poincare (C) Non Linear Analysis</i>, vol. 35, no. 5. Elsevier, pp. 1267–1319, 2018."},"oa_version":"Submitted Version","arxiv":1,"volume":35,"article_processing_charge":"No"},{"abstract":[{"text":"We study the Fokker-Planck equation derived in the large system limit of the Markovian process describing the dynamics of quantitative traits. The Fokker-Planck equation is posed on a bounded domain and its transport and diffusion coefficients vanish on the domain's boundary. We first argue that, despite this degeneracy, the standard no-flux boundary condition is valid. We derive the weak formulation of the problem and prove the existence and uniqueness of its solutions by constructing the corresponding contraction semigroup on a suitable function space. Then, we prove that for the parameter regime with high enough mutation rate the problem exhibits a positive spectral gap, which implies exponential convergence to equilibrium.Next, we provide a simple derivation of the so-called Dynamic Maximum Entropy (DynMaxEnt) method for approximation of observables (moments) of the Fokker-Planck solution, which can be interpreted as a nonlinear Galerkin approximation. The limited applicability of the DynMaxEnt method inspires us to introduce its modified version that is valid for the whole range of admissible parameters. Finally, we present several numerical experiments to demonstrate the performance of both the original and modified DynMaxEnt methods. We observe that in the parameter regimes where both methods are valid, the modified one exhibits slightly better approximation properties compared to the original one.","lang":"eng"}],"doi":"10.1016/j.physd.2017.10.015","title":"Well posedness and maximum entropy approximation for the dynamics of quantitative traits","author":[{"orcid":"0000-0002-7214-0171","first_name":"Katarina","id":"2BA24EA0-F248-11E8-B48F-1D18A9856A87","last_name":"Bodova","full_name":"Bodova, Katarina"},{"full_name":"Haskovec, Jan","last_name":"Haskovec","first_name":"Jan"},{"first_name":"Peter","last_name":"Markowich","full_name":"Markowich, Peter"}],"_id":"607","publication_status":"published","status":"public","acknowledgement":"JH and PM are funded by KAUST baseline funds and grant no. 1000000193 .\r\nWe thank Nicholas Barton (IST Austria) for his useful comments and suggestions. \r\n\r\n","oa_version":"Submitted Version","citation":{"chicago":"Bodova, Katarina, Jan Haskovec, and Peter Markowich. “Well Posedness and Maximum Entropy Approximation for the Dynamics of Quantitative Traits.” <i>Physica D: Nonlinear Phenomena</i>. Elsevier, 2018. <a href=\"https://doi.org/10.1016/j.physd.2017.10.015\">https://doi.org/10.1016/j.physd.2017.10.015</a>.","mla":"Bodova, Katarina, et al. “Well Posedness and Maximum Entropy Approximation for the Dynamics of Quantitative Traits.” <i>Physica D: Nonlinear Phenomena</i>, vol. 376–377, Elsevier, 2018, pp. 108–20, doi:<a href=\"https://doi.org/10.1016/j.physd.2017.10.015\">10.1016/j.physd.2017.10.015</a>.","ieee":"K. Bodova, J. Haskovec, and P. Markowich, “Well posedness and maximum entropy approximation for the dynamics of quantitative traits,” <i>Physica D: Nonlinear Phenomena</i>, vol. 376–377. Elsevier, pp. 108–120, 2018.","apa":"Bodova, K., Haskovec, J., &#38; Markowich, P. (2018). Well posedness and maximum entropy approximation for the dynamics of quantitative traits. <i>Physica D: Nonlinear Phenomena</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.physd.2017.10.015\">https://doi.org/10.1016/j.physd.2017.10.015</a>","ama":"Bodova K, Haskovec J, Markowich P. Well posedness and maximum entropy approximation for the dynamics of quantitative traits. <i>Physica D: Nonlinear Phenomena</i>. 2018;376-377:108-120. doi:<a href=\"https://doi.org/10.1016/j.physd.2017.10.015\">10.1016/j.physd.2017.10.015</a>","short":"K. Bodova, J. Haskovec, P. Markowich, Physica D: Nonlinear Phenomena 376–377 (2018) 108–120.","ista":"Bodova K, Haskovec J, Markowich P. 2018. Well posedness and maximum entropy approximation for the dynamics of quantitative traits. Physica D: Nonlinear Phenomena. 376–377, 108–120."},"day":"01","month":"08","volume":"376-377","article_processing_charge":"No","arxiv":1,"year":"2018","oa":1,"page":"108-120","publication":"Physica D: Nonlinear Phenomena","date_updated":"2023-09-19T10:38:34Z","date_published":"2018-08-01T00:00:00Z","external_id":{"arxiv":["1704.08757"],"isi":["000437962900012"]},"date_created":"2018-12-11T11:47:28Z","scopus_import":"1","department":[{"_id":"NiBa"},{"_id":"GaTk"}],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","publist_id":"7198","isi":1,"type":"journal_article","quality_controlled":"1","language":[{"iso":"eng"}],"publisher":"Elsevier","main_file_link":[{"url":"https://arxiv.org/abs/1704.08757","open_access":"1"}]},{"department":[{"_id":"ToHe"}],"publist_id":"7197","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","date_published":"2018-02-15T00:00:00Z","external_id":{"isi":["000424959200003"]},"date_created":"2018-12-11T11:47:28Z","scopus_import":"1","publisher":"Elsevier","intvolume":"       712","main_file_link":[{"open_access":"1","url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.636.4529"}],"isi":1,"language":[{"iso":"eng"}],"quality_controlled":"1","type":"journal_article","oa":1,"year":"2018","publication":"Theoretical Computer Science","date_updated":"2023-09-19T10:00:21Z","page":"50 - 72","article_type":"original","citation":{"chicago":"Avni, Guy, and Orna Kupferman. “Synthesis from Component Libraries with Costs.” <i>Theoretical Computer Science</i>. Elsevier, 2018. <a href=\"https://doi.org/10.1016/j.tcs.2017.11.001\">https://doi.org/10.1016/j.tcs.2017.11.001</a>.","mla":"Avni, Guy, and Orna Kupferman. “Synthesis from Component Libraries with Costs.” <i>Theoretical Computer Science</i>, vol. 712, Elsevier, 2018, pp. 50–72, doi:<a href=\"https://doi.org/10.1016/j.tcs.2017.11.001\">10.1016/j.tcs.2017.11.001</a>.","apa":"Avni, G., &#38; Kupferman, O. (2018). Synthesis from component libraries with costs. <i>Theoretical Computer Science</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.tcs.2017.11.001\">https://doi.org/10.1016/j.tcs.2017.11.001</a>","ieee":"G. Avni and O. Kupferman, “Synthesis from component libraries with costs,” <i>Theoretical Computer Science</i>, vol. 712. Elsevier, pp. 50–72, 2018.","short":"G. Avni, O. Kupferman, Theoretical Computer Science 712 (2018) 50–72.","ama":"Avni G, Kupferman O. Synthesis from component libraries with costs. <i>Theoretical Computer Science</i>. 2018;712:50-72. doi:<a href=\"https://doi.org/10.1016/j.tcs.2017.11.001\">10.1016/j.tcs.2017.11.001</a>","ista":"Avni G, Kupferman O. 2018. Synthesis from component libraries with costs. Theoretical Computer Science. 712, 50–72."},"day":"15","month":"02","oa_version":"Published Version","volume":712,"article_processing_charge":"No","title":"Synthesis from component libraries with costs","author":[{"orcid":"0000-0001-5588-8287","id":"463C8BC2-F248-11E8-B48F-1D18A9856A87","first_name":"Guy","full_name":"Avni, Guy","last_name":"Avni"},{"full_name":"Kupferman, Orna","last_name":"Kupferman","first_name":"Orna"}],"_id":"608","abstract":[{"text":"Synthesis is the automated construction of a system from its specification. In real life, hardware and software systems are rarely constructed from scratch. Rather, a system is typically constructed from a library of components. Lustig and Vardi formalized this intuition and studied LTL synthesis from component libraries. In real life, designers seek optimal systems. In this paper we add optimality considerations to the setting. We distinguish between quality considerations (for example, size - the smaller a system is, the better it is), and pricing (for example, the payment to the company who manufactured the component). We study the problem of designing systems with minimal quality-cost and price. A key point is that while the quality cost is individual - the choices of a designer are independent of choices made by other designers that use the same library, pricing gives rise to a resource-allocation game - designers that use the same component share its price, with the share being proportional to the number of uses (a component can be used several times in a design). We study both closed and open settings, and in both we solve the problem of finding an optimal design. In a setting with multiple designers, we also study the game-theoretic problems of the induced resource-allocation game.","lang":"eng"}],"doi":"10.1016/j.tcs.2017.11.001","project":[{"name":"Quantitative Reactive Modeling","call_identifier":"FP7","_id":"25EE3708-B435-11E9-9278-68D0E5697425","grant_number":"267989"},{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Rigorous Systems Engineering"},{"grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425","name":"The Wittgenstein Prize","call_identifier":"FWF"}],"publication_status":"published","status":"public","ec_funded":1},{"citation":{"mla":"Bondarenko, Andriy, et al. “There Is No Strongly Regular Graph with Parameters (460; 153; 32; 60).” <i>Contemporary Computational Mathematics</i>, Springer, 2018, pp. 131–34, doi:<a href=\"https://doi.org/10.1007/978-3-319-72456-0_7\">10.1007/978-3-319-72456-0_7</a>.","chicago":"Bondarenko, Andriy, Anton Mellit, Andriy Prymak, Danylo Radchenko, and Maryna Viazovska. “There Is No Strongly Regular Graph with Parameters (460; 153; 32; 60).” In <i>Contemporary Computational Mathematics</i>, 131–34. Springer, 2018. <a href=\"https://doi.org/10.1007/978-3-319-72456-0_7\">https://doi.org/10.1007/978-3-319-72456-0_7</a>.","apa":"Bondarenko, A., Mellit, A., Prymak, A., Radchenko, D., &#38; Viazovska, M. (2018). There is no strongly regular graph with parameters (460; 153; 32; 60). In <i>Contemporary Computational Mathematics</i> (pp. 131–134). Springer. <a href=\"https://doi.org/10.1007/978-3-319-72456-0_7\">https://doi.org/10.1007/978-3-319-72456-0_7</a>","ieee":"A. Bondarenko, A. Mellit, A. Prymak, D. Radchenko, and M. Viazovska, “There is no strongly regular graph with parameters (460; 153; 32; 60),” in <i>Contemporary Computational Mathematics</i>, Springer, 2018, pp. 131–134.","ista":"Bondarenko A, Mellit A, Prymak A, Radchenko D, Viazovska M. 2018.There is no strongly regular graph with parameters (460; 153; 32; 60). In: Contemporary Computational Mathematics. , 131–134.","short":"A. Bondarenko, A. Mellit, A. Prymak, D. Radchenko, M. Viazovska, in:, Contemporary Computational Mathematics, Springer, 2018, pp. 131–134.","ama":"Bondarenko A, Mellit A, Prymak A, Radchenko D, Viazovska M. There is no strongly regular graph with parameters (460; 153; 32; 60). In: <i>Contemporary Computational Mathematics</i>. Springer; 2018:131-134. doi:<a href=\"https://doi.org/10.1007/978-3-319-72456-0_7\">10.1007/978-3-319-72456-0_7</a>"},"department":[{"_id":"TaHa"}],"day":"23","publist_id":"7993","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","month":"05","external_id":{"arxiv":["1509.06286"]},"date_published":"2018-05-23T00:00:00Z","extern":"1","date_created":"2018-12-11T11:44:25Z","oa_version":"Preprint","publisher":"Springer","arxiv":1,"main_file_link":[{"url":"https://arxiv.org/abs/1509.06286","open_access":"1"}],"article_processing_charge":"No","type":"book_chapter","quality_controlled":"1","language":[{"iso":"eng"}],"oa":1,"title":"There is no strongly regular graph with parameters (460; 153; 32; 60)","author":[{"first_name":"Andriy","full_name":"Bondarenko, Andriy","last_name":"Bondarenko"},{"first_name":"Anton","id":"388D3134-F248-11E8-B48F-1D18A9856A87","last_name":"Mellit","full_name":"Mellit, Anton"},{"first_name":"Andriy","full_name":"Prymak, Andriy","last_name":"Prymak"},{"full_name":"Radchenko, Danylo","last_name":"Radchenko","first_name":"Danylo"},{"full_name":"Viazovska, Maryna","last_name":"Viazovska","first_name":"Maryna"}],"_id":"61","abstract":[{"text":"We prove that there is no strongly regular graph (SRG) with parameters (460; 153; 32; 60). The proof is based on a recent lower bound on the number of 4-cliques in a SRG and some applications of Euclidean representation of SRGs. ","lang":"eng"}],"year":"2018","doi":"10.1007/978-3-319-72456-0_7","publication":"Contemporary Computational Mathematics","date_updated":"2021-01-12T08:06:06Z","status":"public","publication_status":"published","page":"131 - 134"},{"department":[{"_id":"RySh"}],"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","publist_id":"7192","date_published":"2018-04-01T00:00:00Z","external_id":{"isi":["000428419500030"]},"scopus_import":"1","date_created":"2018-12-11T11:47:29Z","intvolume":"       223","publisher":"Springer","isi":1,"quality_controlled":"1","type":"journal_article","language":[{"iso":"eng"}],"oa":1,"year":"2018","publication":"Brain Structure and Function","date_updated":"2024-03-25T23:30:16Z","related_material":{"record":[{"relation":"dissertation_contains","status":"public","id":"9562"}]},"article_type":"original","page":"1565 - 1587","day":"01","citation":{"ama":"Luján R, Aguado C, Ciruela F, et al. Differential association of GABAB receptors with their effector ion channels in Purkinje cells. <i>Brain Structure and Function</i>. 2018;223(3):1565-1587. doi:<a href=\"https://doi.org/10.1007/s00429-017-1568-y\">10.1007/s00429-017-1568-y</a>","ista":"Luján R, Aguado C, Ciruela F, Cózar J, Kleindienst D, De La Ossa L, Bettler B, Wickman K, Watanabe M, Shigemoto R, Fukazawa Y. 2018. Differential association of GABAB receptors with their effector ion channels in Purkinje cells. Brain Structure and Function. 223(3), 1565–1587.","short":"R. Luján, C. Aguado, F. Ciruela, J. Cózar, D. Kleindienst, L. De La Ossa, B. Bettler, K. Wickman, M. Watanabe, R. Shigemoto, Y. Fukazawa, Brain Structure and Function 223 (2018) 1565–1587.","ieee":"R. Luján <i>et al.</i>, “Differential association of GABAB receptors with their effector ion channels in Purkinje cells,” <i>Brain Structure and Function</i>, vol. 223, no. 3. Springer, pp. 1565–1587, 2018.","apa":"Luján, R., Aguado, C., Ciruela, F., Cózar, J., Kleindienst, D., De La Ossa, L., … Fukazawa, Y. (2018). Differential association of GABAB receptors with their effector ion channels in Purkinje cells. <i>Brain Structure and Function</i>. Springer. <a href=\"https://doi.org/10.1007/s00429-017-1568-y\">https://doi.org/10.1007/s00429-017-1568-y</a>","chicago":"Luján, Rafael, Carolina Aguado, Francisco Ciruela, Javier Cózar, David Kleindienst, Luis De La Ossa, Bernhard Bettler, et al. “Differential Association of GABAB Receptors with Their Effector Ion Channels in Purkinje Cells.” <i>Brain Structure and Function</i>. Springer, 2018. <a href=\"https://doi.org/10.1007/s00429-017-1568-y\">https://doi.org/10.1007/s00429-017-1568-y</a>.","mla":"Luján, Rafael, et al. “Differential Association of GABAB Receptors with Their Effector Ion Channels in Purkinje Cells.” <i>Brain Structure and Function</i>, vol. 223, no. 3, Springer, 2018, pp. 1565–87, doi:<a href=\"https://doi.org/10.1007/s00429-017-1568-y\">10.1007/s00429-017-1568-y</a>."},"pubrep_id":"1013","ddc":["571"],"file_date_updated":"2020-07-14T12:47:20Z","month":"04","oa_version":"Published Version","file":[{"date_created":"2018-12-12T10:15:36Z","file_id":"5157","creator":"system","relation":"main_file","file_size":5542926,"file_name":"IST-2018-1013-v1+1_2018_Kleindienst_Differential.pdf","date_updated":"2020-07-14T12:47:20Z","content_type":"application/pdf","checksum":"a55b3103476ecb5f4f983d8801807e8b","access_level":"open_access"}],"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"has_accepted_license":"1","volume":223,"article_processing_charge":"No","author":[{"full_name":"Luján, Rafael","last_name":"Luján","first_name":"Rafael"},{"full_name":"Aguado, Carolina","last_name":"Aguado","first_name":"Carolina"},{"first_name":"Francisco","full_name":"Ciruela, Francisco","last_name":"Ciruela"},{"full_name":"Cózar, Javier","last_name":"Cózar","first_name":"Javier"},{"last_name":"Kleindienst","full_name":"Kleindienst, David","first_name":"David","id":"42E121A4-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Luis","full_name":"De La Ossa, Luis","last_name":"De La Ossa"},{"first_name":"Bernhard","full_name":"Bettler, Bernhard","last_name":"Bettler"},{"full_name":"Wickman, Kevin","last_name":"Wickman","first_name":"Kevin"},{"full_name":"Watanabe, Masahiko","last_name":"Watanabe","first_name":"Masahiko"},{"orcid":"0000-0001-8761-9444","full_name":"Shigemoto, Ryuichi","last_name":"Shigemoto","id":"499F3ABC-F248-11E8-B48F-1D18A9856A87","first_name":"Ryuichi"},{"first_name":"Yugo","last_name":"Fukazawa","full_name":"Fukazawa, Yugo"}],"title":"Differential association of GABAB receptors with their effector ion channels in Purkinje cells","_id":"612","issue":"3","abstract":[{"lang":"eng","text":"Metabotropic GABAB receptors mediate slow inhibitory effects presynaptically and postsynaptically through the modulation of different effector signalling pathways. Here, we analysed the distribution of GABAB receptors using highly sensitive SDS-digested freeze-fracture replica labelling in mouse cerebellar Purkinje cells. Immunoreactivity for GABAB1 was observed on presynaptic and, more abundantly, on postsynaptic compartments, showing both scattered and clustered distribution patterns. Quantitative analysis of immunoparticles revealed a somato-dendritic gradient, with the density of immunoparticles increasing 26-fold from somata to dendritic spines. To understand the spatial relationship of GABAB receptors with two key effector ion channels, the G protein-gated inwardly rectifying K+ (GIRK/Kir3) channel and the voltage-dependent Ca2+ channel, biochemical and immunohistochemical approaches were performed. Co-immunoprecipitation analysis demonstrated that GABAB receptors co-assembled with GIRK and CaV2.1 channels in the cerebellum. Using double-labelling immunoelectron microscopic techniques, co-clustering between GABAB1 and GIRK2 was detected in dendritic spines, whereas they were mainly segregated in the dendritic shafts. In contrast, co-clustering of GABAB1 and CaV2.1 was detected in dendritic shafts but not spines. Presynaptically, although no significant co-clustering of GABAB1 and GIRK2 or CaV2.1 channels was detected, inter-cluster distance for GABAB1 and GIRK2 was significantly smaller in the active zone than in the dendritic shafts, and that for GABAB1 and CaV2.1 was significantly smaller in the active zone than in the dendritic shafts and spines. Thus, GABAB receptors are associated with GIRK and CaV2.1 channels in different subcellular compartments. These data provide a better framework for understanding the different roles played by GABAB receptors and their effector ion channels in the cerebellar network."}],"doi":"10.1007/s00429-017-1568-y","project":[{"_id":"25CBA828-B435-11E9-9278-68D0E5697425","grant_number":"720270","call_identifier":"H2020","name":"Human Brain Project Specific Grant Agreement 1 (HBP SGA 1)"},{"_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734","name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7"}],"status":"public","publication_status":"published","ec_funded":1},{"author":[{"orcid":"0000-0003-1122-3982","last_name":"Pull","full_name":"Pull, Christopher","first_name":"Christopher","id":"3C7F4840-F248-11E8-B48F-1D18A9856A87"},{"orcid":"0000-0003-1832-8883","last_name":"Ugelvig","full_name":"Ugelvig, Line V","first_name":"Line V","id":"3DC97C8E-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Florian","id":"39523C54-F248-11E8-B48F-1D18A9856A87","last_name":"Wiesenhofer","full_name":"Wiesenhofer, Florian"},{"last_name":"Grasse","full_name":"Grasse, Anna V","first_name":"Anna V","id":"406F989C-F248-11E8-B48F-1D18A9856A87"},{"id":"35A7A418-F248-11E8-B48F-1D18A9856A87","first_name":"Simon","full_name":"Tragust, Simon","last_name":"Tragust"},{"last_name":"Schmitt","full_name":"Schmitt, Thomas","first_name":"Thomas"},{"first_name":"Mark","last_name":"Brown","full_name":"Brown, Mark"},{"last_name":"Cremer","full_name":"Cremer, Sylvia","first_name":"Sylvia","id":"2F64EC8C-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-2193-3868"}],"title":"Destructive disinfection of infected brood prevents systemic disease spread in ant colonies","_id":"616","abstract":[{"text":"Social insects protect their colonies from infectious disease through collective defences that result in social immunity. In ants, workers first try to prevent infection of colony members. Here, we show that if this fails and a pathogen establishes an infection, ants employ an efficient multicomponent behaviour − &quot;destructive disinfection&quot; − to prevent further spread of disease through the colony. Ants specifically target infected pupae during the pathogen's non-contagious incubation period, relying on chemical 'sickness cues' emitted by pupae. They then remove the pupal cocoon, perforate its cuticle and administer antimicrobial poison, which enters the body and prevents pathogen replication from the inside out. Like the immune system of a body that specifically targets and eliminates infected cells, this social immunity measure sacrifices infected brood to stop the pathogen completing its lifecycle, thus protecting the rest of the colony. Hence, the same principles of disease defence apply at different levels of biological organisation.","lang":"eng"}],"doi":"10.7554/eLife.32073","project":[{"grant_number":"243071","_id":"25DC711C-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","name":"Social Vaccination in Ant Colonies: from Individual Mechanisms to Society Effects"},{"call_identifier":"FP7","name":"Pathogen Detectors Collective disease defence and pathogen detection abilities in ant societies: a chemo-neuro-immunological approach","grant_number":"302004","_id":"25DDF0F0-B435-11E9-9278-68D0E5697425"}],"publication_status":"published","status":"public","ec_funded":1,"day":"09","citation":{"ieee":"C. Pull <i>et al.</i>, “Destructive disinfection of infected brood prevents systemic disease spread in ant colonies,” <i>eLife</i>, vol. 7. eLife Sciences Publications, 2018.","apa":"Pull, C., Ugelvig, L. V., Wiesenhofer, F., Grasse, A. V., Tragust, S., Schmitt, T., … Cremer, S. (2018). Destructive disinfection of infected brood prevents systemic disease spread in ant colonies. <i>ELife</i>. eLife Sciences Publications. <a href=\"https://doi.org/10.7554/eLife.32073\">https://doi.org/10.7554/eLife.32073</a>","ama":"Pull C, Ugelvig LV, Wiesenhofer F, et al. Destructive disinfection of infected brood prevents systemic disease spread in ant colonies. <i>eLife</i>. 2018;7. doi:<a href=\"https://doi.org/10.7554/eLife.32073\">10.7554/eLife.32073</a>","ista":"Pull C, Ugelvig LV, Wiesenhofer F, Grasse AV, Tragust S, Schmitt T, Brown M, Cremer S. 2018. Destructive disinfection of infected brood prevents systemic disease spread in ant colonies. eLife. 7, e32073.","short":"C. Pull, L.V. Ugelvig, F. Wiesenhofer, A.V. Grasse, S. Tragust, T. Schmitt, M. Brown, S. Cremer, ELife 7 (2018).","chicago":"Pull, Christopher, Line V Ugelvig, Florian Wiesenhofer, Anna V Grasse, Simon Tragust, Thomas Schmitt, Mark Brown, and Sylvia Cremer. “Destructive Disinfection of Infected Brood Prevents Systemic Disease Spread in Ant Colonies.” <i>ELife</i>. eLife Sciences Publications, 2018. <a href=\"https://doi.org/10.7554/eLife.32073\">https://doi.org/10.7554/eLife.32073</a>.","mla":"Pull, Christopher, et al. “Destructive Disinfection of Infected Brood Prevents Systemic Disease Spread in Ant Colonies.” <i>ELife</i>, vol. 7, e32073, eLife Sciences Publications, 2018, doi:<a href=\"https://doi.org/10.7554/eLife.32073\">10.7554/eLife.32073</a>."},"pubrep_id":"978","month":"01","file_date_updated":"2020-07-14T12:47:20Z","ddc":["570","590"],"oa_version":"Published Version","tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"file":[{"date_created":"2018-12-12T10:10:43Z","file_id":"4832","date_updated":"2020-07-14T12:47:20Z","checksum":"540f941e8d3530a9441e4affd94f07d7","content_type":"application/pdf","access_level":"open_access","creator":"system","file_size":1435585,"relation":"main_file","file_name":"IST-2018-978-v1+1_elife-32073-v1.pdf"}],"has_accepted_license":"1","volume":7,"article_processing_charge":"Yes","oa":1,"year":"2018","publication":"eLife","date_updated":"2023-09-11T12:54:26Z","related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"819"}]},"article_number":"e32073","department":[{"_id":"SyCr"}],"publist_id":"7188","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","external_id":{"isi":["000419601300001"]},"date_published":"2018-01-09T00:00:00Z","scopus_import":"1","date_created":"2018-12-11T11:47:31Z","intvolume":"         7","publisher":"eLife Sciences Publications","isi":1,"quality_controlled":"1","type":"journal_article","language":[{"iso":"eng"}]},{"external_id":{"isi":["000419307000014"],"pmid":["29150962"]},"date_published":"2018-01-01T00:00:00Z","scopus_import":"1","date_created":"2018-12-11T11:47:31Z","department":[{"_id":"SyCr"}],"publist_id":"7187","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","isi":1,"language":[{"iso":"eng"}],"type":"journal_article","quality_controlled":"1","intvolume":"        31","main_file_link":[{"open_access":"1","url":"https://doi.org/10.1111/jeb.13211"}],"publisher":"Wiley","year":"2018","oa":1,"article_type":"original","page":"159  - 171","publication":"Journal of Evolutionary Biology","date_updated":"2023-09-11T14:06:04Z","oa_version":"Published Version","day":"01","citation":{"apa":"Kutzer, M., Kurtz, J., &#38; Armitage, S. (2018). Genotype and diet affect resistance, survival, and fecundity but not fecundity tolerance. <i>Journal of Evolutionary Biology</i>. Wiley. <a href=\"https://doi.org/10.1111/jeb.13211\">https://doi.org/10.1111/jeb.13211</a>","ieee":"M. Kutzer, J. Kurtz, and S. Armitage, “Genotype and diet affect resistance, survival, and fecundity but not fecundity tolerance,” <i>Journal of Evolutionary Biology</i>, vol. 31, no. 1. Wiley, pp. 159–171, 2018.","ista":"Kutzer M, Kurtz J, Armitage S. 2018. Genotype and diet affect resistance, survival, and fecundity but not fecundity tolerance. Journal of Evolutionary Biology. 31(1), 159–171.","ama":"Kutzer M, Kurtz J, Armitage S. Genotype and diet affect resistance, survival, and fecundity but not fecundity tolerance. <i>Journal of Evolutionary Biology</i>. 2018;31(1):159-171. doi:<a href=\"https://doi.org/10.1111/jeb.13211\">10.1111/jeb.13211</a>","short":"M. Kutzer, J. Kurtz, S. Armitage, Journal of Evolutionary Biology 31 (2018) 159–171.","mla":"Kutzer, Megan, et al. “Genotype and Diet Affect Resistance, Survival, and Fecundity but Not Fecundity Tolerance.” <i>Journal of Evolutionary Biology</i>, vol. 31, no. 1, Wiley, 2018, pp. 159–71, doi:<a href=\"https://doi.org/10.1111/jeb.13211\">10.1111/jeb.13211</a>.","chicago":"Kutzer, Megan, Joachim Kurtz, and Sophie Armitage. “Genotype and Diet Affect Resistance, Survival, and Fecundity but Not Fecundity Tolerance.” <i>Journal of Evolutionary Biology</i>. Wiley, 2018. <a href=\"https://doi.org/10.1111/jeb.13211\">https://doi.org/10.1111/jeb.13211</a>."},"month":"01","pmid":1,"volume":31,"article_processing_charge":"No","issue":"1","abstract":[{"text":"Insects are exposed to a variety of potential pathogens in their environment, many of which can severely impact fitness and health. Consequently, hosts have evolved resistance and tolerance strategies to suppress or cope with infections. Hosts utilizing resistance improve fitness by clearing or reducing pathogen loads, and hosts utilizing tolerance reduce harmful fitness effects per pathogen load. To understand variation in, and selective pressures on, resistance and tolerance, we asked to what degree they are shaped by host genetic background, whether plasticity in these responses depends upon dietary environment, and whether there are interactions between these two factors. Females from ten wild-type Drosophila melanogaster genotypes were kept on high- or low-protein (yeast) diets and infected with one of two opportunistic bacterial pathogens, Lactococcus lactis or Pseudomonas entomophila. We measured host resistance as the inverse of bacterial load in the early infection phase. The relationship (slope) between fly fecundity and individual-level bacteria load provided our fecundity tolerance measure. Genotype and dietary yeast determined host fecundity and strongly affected survival after infection with pathogenic P. entomophila. There was considerable genetic variation in host resistance, a commonly found phenomenon resulting from for example varying resistance costs or frequency-dependent selection. Despite this variation and the reproductive cost of higher P. entomophila loads, fecundity tolerance did not vary across genotypes. The absence of genetic variation in tolerance may suggest that at this early infection stage, fecundity tolerance is fixed or that any evolved tolerance mechanisms are not expressed under these infection conditions.","lang":"eng"}],"doi":"10.1111/jeb.13211","author":[{"id":"29D0B332-F248-11E8-B48F-1D18A9856A87","first_name":"Megan","full_name":"Kutzer, Megan","last_name":"Kutzer","orcid":"0000-0002-8696-6978"},{"first_name":"Joachim","last_name":"Kurtz","full_name":"Kurtz, Joachim"},{"first_name":"Sophie","full_name":"Armitage, Sophie","last_name":"Armitage"}],"title":"Genotype and diet affect resistance, survival, and fecundity but not fecundity tolerance","_id":"617","publication_status":"published","status":"public","acknowledgement":"We would like to thank Susann Wicke for performing the genome-wide SNP/indel analyses, as well as Veronica Alves, Kevin Ferro, Momir Futo, Barbara Hasert, Dafne Maximo, Nora Schulz, Marlene Sroka, and Barth Wieczorek for technical help. We thank Brian Lazzaro for the L. lactis strain and Bruno Lemaitre for the Pseudomonas entomophila strain. We would like to thank two anonymous reviewers for their helpful comments. We are grateful to the Deutsche Forschungsgemeinschaft (DFG) priority programme 1399 ‘Host parasite coevolution’ for funding this project (AR 872/1-1). ","publication_identifier":{"issn":["1010-061X"],"eissn":["1420-9101"]}}]
