[{"related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"838"}]},"file_date_updated":"2020-07-14T12:45:28Z","ddc":["000","004"],"volume":8616,"page":"113 - 130","date_created":"2018-12-11T11:55:36Z","type":"conference","month":"01","conference":{"start_date":"2014-08-17","end_date":"2014-08-21","location":"Santa Barbara, USA","name":"CRYPTO: International Cryptology Conference"},"author":[{"id":"3E0BFE38-F248-11E8-B48F-1D18A9856A87","full_name":"Gazi, Peter","first_name":"Peter","last_name":"Gazi"},{"last_name":"Pietrzak","full_name":"Pietrzak, Krzysztof Z","first_name":"Krzysztof Z","orcid":"0000-0002-9139-1654","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87"},{"id":"2B3E3DE8-F248-11E8-B48F-1D18A9856A87","last_name":"Rybar","first_name":"Michal","full_name":"Rybar, Michal"}],"language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a variable input-length function. A practical single-key variant of NMAC called HMAC is a very popular and widely deployed message authentication code (MAC). Security proofs and attacks for NMAC can typically be lifted to HMAC. NMAC was introduced by Bellare, Canetti and Krawczyk [Crypto'96], who proved it to be a secure pseudorandom function (PRF), and thus also a MAC, assuming that (1) f is a PRF and (2) the function we get when cascading f is weakly collision-resistant. Unfortunately, HMAC is typically instantiated with cryptographic hash functions like MD5 or SHA-1 for which (2) has been found to be wrong. To restore the provable guarantees for NMAC, Bellare [Crypto'06] showed its security based solely on the assumption that f is a PRF, albeit via a non-uniform reduction. - Our first contribution is a simpler and uniform proof for this fact: If f is an ε-secure PRF (against q queries) and a δ-non-adaptively secure PRF (against q queries), then NMAC f is an (ε+ℓqδ)-secure PRF against q queries of length at most ℓ blocks each. - We then show that this ε+ℓqδ bound is basically tight. For the most interesting case where ℓqδ ≥ ε we prove this by constructing an f for which an attack with advantage ℓqδ exists. This also violates the bound O(ℓε) on the PRF-security of NMAC recently claimed by Koblitz and Menezes. - Finally, we analyze the PRF-security of a modification of NMAC called NI [An and Bellare, Crypto'99] that differs mainly by using a compression function with an additional keying input. This avoids the constant rekeying on multi-block messages in NMAC and allows for a security proof starting by the standard switch from a PRF to a random function, followed by an information-theoretic analysis. We carry out such an analysis, obtaining a tight ℓq2/2 c bound for this step, improving over the trivial bound of ℓ2q2/2c. The proof borrows combinatorial techniques originally developed for proving the security of CBC-MAC [Bellare et al., Crypto'05]."}],"alternative_title":["LNCS"],"_id":"2082","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","project":[{"call_identifier":"FP7","grant_number":"259668","name":"Provable Security for Physical Cryptography","_id":"258C570E-B435-11E9-9278-68D0E5697425"}],"publisher":"Springer","ec_funded":1,"publist_id":"4955","has_accepted_license":"1","title":"The exact PRF-security of NMAC and HMAC","issue":"1","doi":"10.1007/978-3-662-44371-2_7","day":"01","year":"2014","oa":1,"date_updated":"2023-09-07T12:02:27Z","pubrep_id":"682","intvolume":"      8616","status":"public","editor":[{"first_name":"Juan","full_name":"Garay, Juan","last_name":"Garay"},{"first_name":"Rosario","full_name":"Gennaro, Rosario","last_name":"Gennaro"}],"citation":{"ista":"Gazi P, Pietrzak KZ, Rybar M. 2014. The exact PRF-security of NMAC and HMAC. CRYPTO: International Cryptology Conference, LNCS, vol. 8616, 113–130.","ieee":"P. Gazi, K. Z. Pietrzak, and M. Rybar, “The exact PRF-security of NMAC and HMAC,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, USA, 2014, vol. 8616, no. 1, pp. 113–130.","short":"P. Gazi, K.Z. Pietrzak, M. Rybar, in:, J. Garay, R. Gennaro (Eds.), Springer, 2014, pp. 113–130.","mla":"Gazi, Peter, et al. <i>The Exact PRF-Security of NMAC and HMAC</i>. Edited by Juan Garay and Rosario Gennaro, vol. 8616, no. 1, Springer, 2014, pp. 113–30, doi:<a href=\"https://doi.org/10.1007/978-3-662-44371-2_7\">10.1007/978-3-662-44371-2_7</a>.","chicago":"Gazi, Peter, Krzysztof Z Pietrzak, and Michal Rybar. “The Exact PRF-Security of NMAC and HMAC.” edited by Juan Garay and Rosario Gennaro, 8616:113–30. Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-662-44371-2_7\">https://doi.org/10.1007/978-3-662-44371-2_7</a>.","apa":"Gazi, P., Pietrzak, K. Z., &#38; Rybar, M. (2014). The exact PRF-security of NMAC and HMAC. In J. Garay &#38; R. Gennaro (Eds.) (Vol. 8616, pp. 113–130). Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, USA: Springer. <a href=\"https://doi.org/10.1007/978-3-662-44371-2_7\">https://doi.org/10.1007/978-3-662-44371-2_7</a>","ama":"Gazi P, Pietrzak KZ, Rybar M. The exact PRF-security of NMAC and HMAC. In: Garay J, Gennaro R, eds. Vol 8616. Springer; 2014:113-130. doi:<a href=\"https://doi.org/10.1007/978-3-662-44371-2_7\">10.1007/978-3-662-44371-2_7</a>"},"publication_status":"published","quality_controlled":"1","department":[{"_id":"KrPi"}],"file":[{"date_created":"2018-12-12T10:13:17Z","file_id":"4999","content_type":"application/pdf","creator":"system","date_updated":"2020-07-14T12:45:28Z","relation":"main_file","access_level":"open_access","file_size":492310,"checksum":"dab6ab36a5f6af94f2b597e6404ed11d","file_name":"IST-2016-682-v1+1_578.pdf"}],"oa_version":"Submitted Version","date_published":"2014-01-01T00:00:00Z"},{"year":"2014","issue":"8","has_accepted_license":"1","title":"Role of sex and migration in adaptation to sink environments","doi":"10.1111/evo.12440","day":"25","date_updated":"2023-02-23T14:06:51Z","status":"public","intvolume":"        68","oa":1,"quality_controlled":"1","publication_status":"published","citation":{"ama":"Lagator M, Morgan A, Neve P, Colegrave N. Role of sex and migration in adaptation to sink environments. <i>Evolution</i>. 2014;68(8):2296-2305. doi:<a href=\"https://doi.org/10.1111/evo.12440\">10.1111/evo.12440</a>","apa":"Lagator, M., Morgan, A., Neve, P., &#38; Colegrave, N. (2014). Role of sex and migration in adaptation to sink environments. <i>Evolution</i>. Wiley. <a href=\"https://doi.org/10.1111/evo.12440\">https://doi.org/10.1111/evo.12440</a>","chicago":"Lagator, Mato, Andrew Morgan, Paul Neve, and Nick Colegrave. “Role of Sex and Migration in Adaptation to Sink Environments.” <i>Evolution</i>. Wiley, 2014. <a href=\"https://doi.org/10.1111/evo.12440\">https://doi.org/10.1111/evo.12440</a>.","short":"M. Lagator, A. Morgan, P. Neve, N. Colegrave, Evolution 68 (2014) 2296–2305.","mla":"Lagator, Mato, et al. “Role of Sex and Migration in Adaptation to Sink Environments.” <i>Evolution</i>, vol. 68, no. 8, Wiley, 2014, pp. 2296–305, doi:<a href=\"https://doi.org/10.1111/evo.12440\">10.1111/evo.12440</a>.","ieee":"M. Lagator, A. Morgan, P. Neve, and N. Colegrave, “Role of sex and migration in adaptation to sink environments,” <i>Evolution</i>, vol. 68, no. 8. Wiley, pp. 2296–2305, 2014.","ista":"Lagator M, Morgan A, Neve P, Colegrave N. 2014. Role of sex and migration in adaptation to sink environments. Evolution. 68(8), 2296–2305."},"date_published":"2014-04-25T00:00:00Z","article_type":"original","department":[{"_id":"CaGu"}],"file":[{"date_created":"2020-05-14T16:40:31Z","file_id":"7845","content_type":"application/pdf","creator":"dernst","date_updated":"2020-07-14T12:45:28Z","relation":"main_file","access_level":"open_access","checksum":"8d459b07e4a11bb5fde92d969184fe48","file_size":467254,"file_name":"2014_Evolution_Lagator.pdf"}],"oa_version":"Published Version","page":"2296 - 2305","date_created":"2018-12-11T11:55:36Z","volume":68,"ddc":["570"],"file_date_updated":"2020-07-14T12:45:28Z","related_material":{"record":[{"id":"9747","relation":"research_data","status":"public"}]},"article_processing_charge":"No","publication":"Evolution","scopus_import":1,"month":"04","language":[{"iso":"eng"}],"author":[{"id":"345D25EC-F248-11E8-B48F-1D18A9856A87","first_name":"Mato","full_name":"Lagator, Mato","last_name":"Lagator"},{"last_name":"Morgan","first_name":"Andrew","full_name":"Morgan, Andrew"},{"first_name":"Paul","full_name":"Neve, Paul","last_name":"Neve"},{"last_name":"Colegrave","full_name":"Colegrave, Nick","first_name":"Nick"}],"type":"journal_article","_id":"2083","acknowledgement":"The authors are grateful to the Leverhulme Trust (F/00 215/AW) for funding this work.","abstract":[{"text":"Understanding the effects of sex and migration on adaptation to novel environments remains a key problem in evolutionary biology. Using a single-cell alga Chlamydomonas reinhardtii, we investigated how sex and migration affected rates of evolutionary rescue in a sink environment, and subsequent changes in fitness following evolutionary rescue. We show that sex and migration affect both the rate of evolutionary rescue and subsequent adaptation. However, their combined effects change as the populations adapt to a sink habitat. Both sex and migration independently increased rates of evolutionary rescue, but the effect of sex on subsequent fitness improvements, following initial rescue, changed with migration, as sex was beneficial in the absence of migration but constraining adaptation when combined with migration. These results suggest that sex and migration are beneficial during the initial stages of adaptation, but can become detrimental as the population adapts to its environment.","lang":"eng"}],"publist_id":"4954","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Wiley"},{"quality_controlled":"1","publication_status":"published","citation":{"chicago":"Grusch, Michael, Karin Schelch, Robert Riedler, Eva Gschaider-Reichhart, Christopher Differ, Walter Berger, Álvaro Inglés Prieto, and Harald L Janovjak. “Spatio-Temporally Precise Activation of Engineered Receptor Tyrosine Kinases by Light.” <i>EMBO Journal</i>. Wiley-Blackwell, 2014. <a href=\"https://doi.org/10.15252/embj.201387695\">https://doi.org/10.15252/embj.201387695</a>.","ama":"Grusch M, Schelch K, Riedler R, et al. Spatio-temporally precise activation of engineered receptor tyrosine kinases by light. <i>EMBO Journal</i>. 2014;33(15):1713-1726. doi:<a href=\"https://doi.org/10.15252/embj.201387695\">10.15252/embj.201387695</a>","apa":"Grusch, M., Schelch, K., Riedler, R., Gschaider-Reichhart, E., Differ, C., Berger, W., … Janovjak, H. L. (2014). Spatio-temporally precise activation of engineered receptor tyrosine kinases by light. <i>EMBO Journal</i>. Wiley-Blackwell. <a href=\"https://doi.org/10.15252/embj.201387695\">https://doi.org/10.15252/embj.201387695</a>","ista":"Grusch M, Schelch K, Riedler R, Gschaider-Reichhart E, Differ C, Berger W, Inglés Prieto Á, Janovjak HL. 2014. Spatio-temporally precise activation of engineered receptor tyrosine kinases by light. EMBO Journal. 33(15), 1713–1726.","short":"M. Grusch, K. Schelch, R. Riedler, E. Gschaider-Reichhart, C. Differ, W. Berger, Á. Inglés Prieto, H.L. Janovjak, EMBO Journal 33 (2014) 1713–1726.","mla":"Grusch, Michael, et al. “Spatio-Temporally Precise Activation of Engineered Receptor Tyrosine Kinases by Light.” <i>EMBO Journal</i>, vol. 33, no. 15, Wiley-Blackwell, 2014, pp. 1713–26, doi:<a href=\"https://doi.org/10.15252/embj.201387695\">10.15252/embj.201387695</a>.","ieee":"M. Grusch <i>et al.</i>, “Spatio-temporally precise activation of engineered receptor tyrosine kinases by light,” <i>EMBO Journal</i>, vol. 33, no. 15. Wiley-Blackwell, pp. 1713–1726, 2014."},"date_published":"2014-07-01T00:00:00Z","oa_version":"Submitted Version","department":[{"_id":"HaJa"}],"year":"2014","day":"01","doi":"10.15252/embj.201387695","issue":"15","title":"Spatio-temporally precise activation of engineered receptor tyrosine kinases by light","intvolume":"        33","status":"public","date_updated":"2023-09-07T12:49:09Z","oa":1,"acknowledgement":"European Union Seventh Framework Programme; Human Frontier Science Program; Oesterreichische Nationalbank Anniversary Fund 14211; Austrian Research Promotion Agency; FemTech","_id":"2084","abstract":[{"lang":"eng","text":"Receptor tyrosine kinases (RTKs) are a large family of cell surface receptors that sense growth factors and hormones and regulate a variety of cell behaviours in health and disease. Contactless activation of RTKs with spatial and temporal precision is currently not feasible. Here, we generated RTKs that are insensitive to endogenous ligands but can be selectively activated by low-intensity blue light. We screened light-oxygen-voltage (LOV)-sensing domains for their ability to activate RTKs by light-activated dimerization. Incorporation of LOV domains found in aureochrome photoreceptors of stramenopiles resulted in robust activation of the fibroblast growth factor receptor 1 (FGFR1), epidermal growth factor receptor (EGFR) and rearranged during transfection (RET). In human cancer and endothelial cells, light induced cellular signalling with spatial and temporal precision. Furthermore, light faithfully mimicked complex mitogenic and morphogenic cell behaviour induced by growth factors. RTKs under optical control (Opto-RTKs) provide a powerful optogenetic approach to actuate cellular signals and manipulate cell behaviour."}],"publist_id":"4953","main_file_link":[{"url":"http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4194103/","open_access":"1"}],"publisher":"Wiley-Blackwell","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","date_created":"2018-12-11T11:55:37Z","page":"1713 - 1726","related_material":{"record":[{"id":"418","relation":"dissertation_contains","status":"public"}]},"volume":33,"scopus_import":1,"publication":"EMBO Journal","type":"journal_article","month":"07","author":[{"last_name":"Grusch","full_name":"Grusch, Michael","first_name":"Michael"},{"last_name":"Schelch","first_name":"Karin","full_name":"Schelch, Karin"},{"last_name":"Riedler","full_name":"Riedler, Robert","first_name":"Robert"},{"first_name":"Eva","full_name":"Gschaider-Reichhart, Eva","last_name":"Gschaider-Reichhart","id":"3FEE232A-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-7218-7738"},{"first_name":"Christopher","full_name":"Differ, Christopher","last_name":"Differ"},{"full_name":"Berger, Walter","first_name":"Walter","last_name":"Berger"},{"id":"2A9DB292-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-5409-8571","last_name":"Inglés Prieto","full_name":"Inglés Prieto, Álvaro","first_name":"Álvaro"},{"orcid":"0000-0002-8023-9315","id":"33BA6C30-F248-11E8-B48F-1D18A9856A87","first_name":"Harald L","full_name":"Janovjak, Harald L","last_name":"Janovjak"}],"language":[{"iso":"eng"}]},{"publication":"PLoS One","scopus_import":1,"type":"journal_article","author":[{"last_name":"Wolf","first_name":"Stephan","full_name":"Wolf, Stephan"},{"full_name":"Mcmahon, Dino","first_name":"Dino","last_name":"Mcmahon"},{"first_name":"Ka","full_name":"Lim, Ka","last_name":"Lim"},{"last_name":"Pull","full_name":"Pull, Christopher","first_name":"Christopher","orcid":"0000-0003-1122-3982","id":"3C7F4840-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Clark, Suzanne","first_name":"Suzanne","last_name":"Clark"},{"full_name":"Paxton, Robert","first_name":"Robert","last_name":"Paxton"},{"last_name":"Osborne","first_name":"Juliet","full_name":"Osborne, Juliet"}],"month":"08","language":[{"iso":"eng"}],"date_created":"2018-12-11T11:55:37Z","related_material":{"record":[{"status":"public","id":"9888","relation":"research_data"}]},"file_date_updated":"2020-07-14T12:45:28Z","volume":9,"ddc":["570"],"publist_id":"4949","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publisher":"Public Library of Science","acknowledgement":"This study was funded jointly by a grant from BBSRC, Defra, NERC, the Scottish Government and the Wellcome Trust, under the Insect Pollinators Initiative (grant numbers BB/I00097/1 and BB/I000100/1). Rothamsted Research is a national institute of bioscience strategically funded by the UK Biotechnology and Biological Sciences Research Council (BBSRC).","_id":"2086","abstract":[{"lang":"eng","text":"Pathogens may gain a fitness advantage through manipulation of the behaviour of their hosts. Likewise, host behavioural changes can be a defence mechanism, counteracting the impact of pathogens on host fitness. We apply harmonic radar technology to characterize the impact of an emerging pathogen - Nosema ceranae (Microsporidia) - on honeybee (Apis mellifera) flight and orientation performance in the field. Honeybees are the most important commercial pollinators. Emerging diseases have been proposed to play a prominent role in colony decline, partly through sub-lethal behavioural manipulation of their hosts. We found that homing success was significantly reduced in diseased (65.8%) versus healthy foragers (92.5%). Although lost bees had significantly reduced continuous flight times and prolonged resting times, other flight characteristics and navigational abilities showed no significant difference between infected and non-infected bees. Our results suggest that infected bees express normal flight characteristics but are constrained in their homing ability, potentially compromising the colony by reducing its resource inputs, but also counteracting the intra-colony spread of infection. We provide the first high-resolution analysis of sub-lethal effects of an emerging disease on insect flight behaviour. The potential causes and the implications for both host and parasite are discussed."}],"date_updated":"2023-02-23T14:11:56Z","pubrep_id":"437","intvolume":"         9","status":"public","oa":1,"year":"2014","has_accepted_license":"1","title":"So near and yet so far: Harmonic radar reveals reduced homing ability of Nosema infected honeybees","issue":"8","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png"},"day":"06","doi":"10.1371/journal.pone.0103989","article_number":"e103989","date_published":"2014-08-06T00:00:00Z","department":[{"_id":"SyCr"}],"oa_version":"Published Version","file":[{"creator":"system","content_type":"application/pdf","file_id":"5042","date_created":"2018-12-12T10:13:55Z","file_name":"IST-2016-437-v1+1_journal.pone.0103989.pdf","file_size":1013386,"checksum":"2fc62c6739eada4bddf026afbae669db","access_level":"open_access","relation":"main_file","date_updated":"2020-07-14T12:45:28Z"}],"quality_controlled":"1","citation":{"apa":"Wolf, S., Mcmahon, D., Lim, K., Pull, C., Clark, S., Paxton, R., &#38; Osborne, J. (2014). So near and yet so far: Harmonic radar reveals reduced homing ability of Nosema infected honeybees. <i>PLoS One</i>. Public Library of Science. <a href=\"https://doi.org/10.1371/journal.pone.0103989\">https://doi.org/10.1371/journal.pone.0103989</a>","ama":"Wolf S, Mcmahon D, Lim K, et al. So near and yet so far: Harmonic radar reveals reduced homing ability of Nosema infected honeybees. <i>PLoS One</i>. 2014;9(8). doi:<a href=\"https://doi.org/10.1371/journal.pone.0103989\">10.1371/journal.pone.0103989</a>","chicago":"Wolf, Stephan, Dino Mcmahon, Ka Lim, Christopher Pull, Suzanne Clark, Robert Paxton, and Juliet Osborne. “So near and yet so Far: Harmonic Radar Reveals Reduced Homing Ability of Nosema Infected Honeybees.” <i>PLoS One</i>. Public Library of Science, 2014. <a href=\"https://doi.org/10.1371/journal.pone.0103989\">https://doi.org/10.1371/journal.pone.0103989</a>.","ieee":"S. Wolf <i>et al.</i>, “So near and yet so far: Harmonic radar reveals reduced homing ability of Nosema infected honeybees,” <i>PLoS One</i>, vol. 9, no. 8. Public Library of Science, 2014.","short":"S. Wolf, D. Mcmahon, K. Lim, C. Pull, S. Clark, R. Paxton, J. Osborne, PLoS One 9 (2014).","mla":"Wolf, Stephan, et al. “So near and yet so Far: Harmonic Radar Reveals Reduced Homing Ability of Nosema Infected Honeybees.” <i>PLoS One</i>, vol. 9, no. 8, e103989, Public Library of Science, 2014, doi:<a href=\"https://doi.org/10.1371/journal.pone.0103989\">10.1371/journal.pone.0103989</a>.","ista":"Wolf S, Mcmahon D, Lim K, Pull C, Clark S, Paxton R, Osborne J. 2014. So near and yet so far: Harmonic radar reveals reduced homing ability of Nosema infected honeybees. PLoS One. 9(8), e103989."},"publication_status":"published"},{"scopus_import":"1","article_processing_charge":"No","publication":"Journal of the ACM","language":[{"iso":"eng"}],"month":"05","author":[{"last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu","first_name":"Krishnendu","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Henzinger","full_name":"Henzinger, Monika H","first_name":"Monika H","orcid":"0000-0002-5008-6530","id":"540c9bbd-f2de-11ec-812d-d04a5be85630"}],"type":"journal_article","date_created":"2018-12-11T11:55:57Z","volume":61,"related_material":{"record":[{"status":"public","relation":"earlier_version","id":"3165"}]},"publist_id":"4883","ec_funded":1,"publisher":"ACM","project":[{"_id":"2584A770-B435-11E9-9278-68D0E5697425","name":"Modern Graph Algorithmic Techniques in Formal Verification","grant_number":"P 23499-N23","call_identifier":"FWF"},{"_id":"25892FC0-B435-11E9-9278-68D0E5697425","name":"Efficient Algorithms for Computer Aided Verification","grant_number":"ICT15-003"},{"name":"Game Theory","_id":"25863FF4-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","grant_number":"S11407"},{"call_identifier":"FP7","grant_number":"279307","name":"Quantitative Graph Games: Theory and Applications","_id":"2581B60A-B435-11E9-9278-68D0E5697425"},{"_id":"2587B514-B435-11E9-9278-68D0E5697425","name":"Microsoft Research Faculty Fellowship"}],"main_file_link":[{"open_access":"1","url":"https://eprints.cs.univie.ac.at/3933/"}],"user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","_id":"2141","abstract":[{"lang":"eng","text":"The computation of the winning set for Büchi objectives in alternating games on graphs is a central problem in computer-aided verification with a large number of applications. The long-standing best known upper bound for solving the problem is Õ(n ⋅ m), where n is the number of vertices and m is the number of edges in the graph. We are the first to break the Õ(n ⋅ m) boundary by presenting a new technique that reduces the running time to O(n2). This bound also leads to O(n2)-time algorithms for computing the set of almost-sure winning vertices for Büchi objectives (1) in alternating games with probabilistic transitions (improving an earlier bound of Õ(n ⋅ m)), (2) in concurrent graph games with constant actions (improving an earlier bound of O(n3)), and (3) in Markov decision processes (improving for m&gt;n4/3 an earlier bound of O(m ⋅ √m)). We then show how to maintain the winning set for Büchi objectives in alternating games under a sequence of edge insertions or a sequence of edge deletions in O(n) amortized time per operation. Our algorithms are the first dynamic algorithms for this problem. We then consider another core graph theoretic problem in verification of probabilistic systems, namely computing the maximal end-component decomposition of a graph. We present two improved static algorithms for the maximal end-component decomposition problem. Our first algorithm is an O(m ⋅ √m)-time algorithm, and our second algorithm is an O(n2)-time algorithm which is obtained using the same technique as for alternating Büchi games. Thus, we obtain an O(min &amp;lcu;m ⋅ √m,n2})-time algorithm improving the long-standing O(n ⋅ m) time bound. Finally, we show how to maintain the maximal end-component decomposition of a graph under a sequence of edge insertions or a sequence of edge deletions in O(n) amortized time per edge deletion, and O(m) worst-case time per edge insertion. Again, our algorithms are the first dynamic algorithms for this problem."}],"status":"public","intvolume":"        61","date_updated":"2025-06-02T08:53:48Z","oa":1,"year":"2014","day":"01","article_number":"a15","doi":"10.1145/2597631","title":"Efficient and dynamic algorithms for alternating Büchi games and maximal end-component decomposition","issue":"3","date_published":"2014-05-01T00:00:00Z","oa_version":"Submitted Version","department":[{"_id":"KrCh"}],"quality_controlled":"1","publication_status":"published","citation":{"ista":"Chatterjee K, Henzinger MH. 2014. Efficient and dynamic algorithms for alternating Büchi games and maximal end-component decomposition. Journal of the ACM. 61(3), a15.","ieee":"K. Chatterjee and M. H. Henzinger, “Efficient and dynamic algorithms for alternating Büchi games and maximal end-component decomposition,” <i>Journal of the ACM</i>, vol. 61, no. 3. ACM, 2014.","short":"K. Chatterjee, M.H. Henzinger, Journal of the ACM 61 (2014).","mla":"Chatterjee, Krishnendu, and Monika H. Henzinger. “Efficient and Dynamic Algorithms for Alternating Büchi Games and Maximal End-Component Decomposition.” <i>Journal of the ACM</i>, vol. 61, no. 3, a15, ACM, 2014, doi:<a href=\"https://doi.org/10.1145/2597631\">10.1145/2597631</a>.","chicago":"Chatterjee, Krishnendu, and Monika H Henzinger. “Efficient and Dynamic Algorithms for Alternating Büchi Games and Maximal End-Component Decomposition.” <i>Journal of the ACM</i>. ACM, 2014. <a href=\"https://doi.org/10.1145/2597631\">https://doi.org/10.1145/2597631</a>.","ama":"Chatterjee K, Henzinger MH. Efficient and dynamic algorithms for alternating Büchi games and maximal end-component decomposition. <i>Journal of the ACM</i>. 2014;61(3). doi:<a href=\"https://doi.org/10.1145/2597631\">10.1145/2597631</a>","apa":"Chatterjee, K., &#38; Henzinger, M. H. (2014). Efficient and dynamic algorithms for alternating Büchi games and maximal end-component decomposition. <i>Journal of the ACM</i>. ACM. <a href=\"https://doi.org/10.1145/2597631\">https://doi.org/10.1145/2597631</a>"}},{"author":[{"orcid":"0000-0002-9683-0724","id":"2ADD483A-F248-11E8-B48F-1D18A9856A87","full_name":"Bauer, Ulrich","first_name":"Ulrich","last_name":"Bauer"},{"last_name":"Lesnick","full_name":"Lesnick, Michael","first_name":"Michael"}],"month":"06","language":[{"iso":"eng"}],"oa":1,"conference":{"location":"Kyoto, Japan","name":"SoCG: Symposium on Computational Geometry","end_date":"2014-06-11","start_date":"2014-06-08"},"type":"conference","publication":"Proceedings of the Annual Symposium on Computational Geometry","date_updated":"2021-01-12T06:55:38Z","status":"public","scopus_import":1,"title":"Induced matchings of barcodes and the algebraic stability of persistence","day":"01","doi":"10.1145/2582112.2582168","page":"355 - 364","year":"2014","date_created":"2018-12-11T11:56:01Z","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","department":[{"_id":"HeEd"}],"oa_version":"Submitted Version","publisher":"ACM","project":[{"grant_number":"318493","call_identifier":"FP7","_id":"255D761E-B435-11E9-9278-68D0E5697425","name":"Topological Complex Systems"}],"main_file_link":[{"url":"http://arxiv.org/abs/1311.3681","open_access":"1"}],"date_published":"2014-06-01T00:00:00Z","ec_funded":1,"publist_id":"4853","citation":{"mla":"Bauer, Ulrich, and Michael Lesnick. “Induced Matchings of Barcodes and the Algebraic Stability of Persistence.” <i>Proceedings of the Annual Symposium on Computational Geometry</i>, ACM, 2014, pp. 355–64, doi:<a href=\"https://doi.org/10.1145/2582112.2582168\">10.1145/2582112.2582168</a>.","short":"U. Bauer, M. Lesnick, in:, Proceedings of the Annual Symposium on Computational Geometry, ACM, 2014, pp. 355–364.","ieee":"U. Bauer and M. Lesnick, “Induced matchings of barcodes and the algebraic stability of persistence,” in <i>Proceedings of the Annual Symposium on Computational Geometry</i>, Kyoto, Japan, 2014, pp. 355–364.","ista":"Bauer U, Lesnick M. 2014. Induced matchings of barcodes and the algebraic stability of persistence. Proceedings of the Annual Symposium on Computational Geometry. SoCG: Symposium on Computational Geometry, 355–364.","apa":"Bauer, U., &#38; Lesnick, M. (2014). Induced matchings of barcodes and the algebraic stability of persistence. In <i>Proceedings of the Annual Symposium on Computational Geometry</i> (pp. 355–364). Kyoto, Japan: ACM. <a href=\"https://doi.org/10.1145/2582112.2582168\">https://doi.org/10.1145/2582112.2582168</a>","ama":"Bauer U, Lesnick M. Induced matchings of barcodes and the algebraic stability of persistence. In: <i>Proceedings of the Annual Symposium on Computational Geometry</i>. ACM; 2014:355-364. doi:<a href=\"https://doi.org/10.1145/2582112.2582168\">10.1145/2582112.2582168</a>","chicago":"Bauer, Ulrich, and Michael Lesnick. “Induced Matchings of Barcodes and the Algebraic Stability of Persistence.” In <i>Proceedings of the Annual Symposium on Computational Geometry</i>, 355–64. ACM, 2014. <a href=\"https://doi.org/10.1145/2582112.2582168\">https://doi.org/10.1145/2582112.2582168</a>."},"publication_status":"published","abstract":[{"lang":"eng","text":"We define a simple, explicit map sending a morphism f : M → N of pointwise finite dimensional persistence modules to a matching between the barcodes of M and N. Our main result is that, in a precise sense, the quality of this matching is tightly controlled by the lengths of the longest intervals in the barcodes of ker f and coker f . As an immediate corollary, we obtain a new proof of the algebraic stability theorem for persistence barcodes [5, 9], a fundamental result in the theory of persistent homology. In contrast to previous proofs, ours shows explicitly how a δ-interleaving morphism between two persistence modules induces a δ-matching between the barcodes of the two modules. Our main result also specializes to a structure theorem for submodules and quotients of persistence modules. Copyright is held by the owner/author(s)."}],"quality_controlled":"1","_id":"2153"},{"volume":52,"date_created":"2018-12-11T11:56:01Z","page":"1 - 33","type":"journal_article","language":[{"iso":"eng"}],"month":"07","author":[{"last_name":"Matoušek","full_name":"Matoušek, Jiří","first_name":"Jiří"},{"orcid":"0000-0002-1494-0568","id":"36690CA2-F248-11E8-B48F-1D18A9856A87","first_name":"Uli","full_name":"Wagner, Uli","last_name":"Wagner"}],"scopus_import":1,"publication":"Discrete & Computational Geometry","abstract":[{"text":"A result of Boros and Füredi (d = 2) and of Bárány (arbitrary d) asserts that for every d there exists cd &gt; 0 such that for every n-point set P ⊂ ℝd, some point of ℝd is covered by at least (Formula presented.) of the d-simplices spanned by the points of P. The largest possible value of cd has been the subject of ongoing research. Recently Gromov improved the existing lower bounds considerably by introducing a new, topological proof method. We provide an exposition of the combinatorial component of Gromov's approach, in terms accessible to combinatorialists and discrete geometers, and we investigate the limits of his method. In particular, we give tighter bounds on the cofilling profiles for the (n - 1)-simplex. These bounds yield a minor improvement over Gromov's lower bounds on cd for large d, but they also show that the room for further improvement through the cofilling profiles alone is quite small. We also prove a slightly better lower bound for c3 by an approach using an additional structure besides the cofilling profiles. We formulate a combinatorial extremal problem whose solution might perhaps lead to a tight lower bound for cd.","lang":"eng"}],"acknowledgement":"Swiss National Science Foundation (SNF 200021-125309, 200020-138230, 200020-12507)","_id":"2154","project":[{"name":"Embeddings in Higher Dimensions: Algorithms and Combinatorics","_id":"25FA3206-B435-11E9-9278-68D0E5697425","grant_number":"PP00P2_138948"}],"main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1102.3515"}],"publisher":"Springer","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4852","day":"01","doi":"10.1007/s00454-014-9584-7","title":"On Gromov's method of selecting heavily covered points","issue":"1","year":"2014","oa":1,"intvolume":"        52","status":"public","date_updated":"2021-01-12T06:55:38Z","publication_status":"published","citation":{"ista":"Matoušek J, Wagner U. 2014. On Gromov’s method of selecting heavily covered points. Discrete &#38; Computational Geometry. 52(1), 1–33.","mla":"Matoušek, Jiří, and Uli Wagner. “On Gromov’s Method of Selecting Heavily Covered Points.” <i>Discrete &#38; Computational Geometry</i>, vol. 52, no. 1, Springer, 2014, pp. 1–33, doi:<a href=\"https://doi.org/10.1007/s00454-014-9584-7\">10.1007/s00454-014-9584-7</a>.","short":"J. Matoušek, U. Wagner, Discrete &#38; Computational Geometry 52 (2014) 1–33.","ieee":"J. Matoušek and U. Wagner, “On Gromov’s method of selecting heavily covered points,” <i>Discrete &#38; Computational Geometry</i>, vol. 52, no. 1. Springer, pp. 1–33, 2014.","chicago":"Matoušek, Jiří, and Uli Wagner. “On Gromov’s Method of Selecting Heavily Covered Points.” <i>Discrete &#38; Computational Geometry</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s00454-014-9584-7\">https://doi.org/10.1007/s00454-014-9584-7</a>.","ama":"Matoušek J, Wagner U. On Gromov’s method of selecting heavily covered points. <i>Discrete &#38; Computational Geometry</i>. 2014;52(1):1-33. doi:<a href=\"https://doi.org/10.1007/s00454-014-9584-7\">10.1007/s00454-014-9584-7</a>","apa":"Matoušek, J., &#38; Wagner, U. (2014). On Gromov’s method of selecting heavily covered points. <i>Discrete &#38; Computational Geometry</i>. Springer. <a href=\"https://doi.org/10.1007/s00454-014-9584-7\">https://doi.org/10.1007/s00454-014-9584-7</a>"},"quality_controlled":"1","oa_version":"Submitted Version","department":[{"_id":"UlWa"}],"date_published":"2014-07-01T00:00:00Z"},{"month":"06","language":[{"iso":"eng"}],"author":[{"id":"2ADD483A-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9683-0724","last_name":"Bauer","full_name":"Bauer, Ulrich","first_name":"Ulrich"},{"orcid":"0000-0002-9823-6833","id":"3FB178DA-F248-11E8-B48F-1D18A9856A87","last_name":"Edelsbrunner","full_name":"Edelsbrunner, Herbert","first_name":"Herbert"}],"conference":{"end_date":"2014-06-11","start_date":"2014-06-08","name":"SoCG: Symposium on Computational Geometry","location":"Kyoto, Japan"},"type":"conference","scopus_import":1,"publication":"Proceedings of the Annual Symposium on Computational Geometry","date_created":"2018-12-11T11:56:01Z","page":"484 - 490","publisher":"ACM","project":[{"_id":"255D761E-B435-11E9-9278-68D0E5697425","name":"Topological Complex Systems","grant_number":"318493","call_identifier":"FP7"}],"main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1312.1231"}],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4851","ec_funded":1,"abstract":[{"text":"Given a finite set of points in Rn and a positive radius, we study the Čech, Delaunay-Čech, alpha, and wrap complexes as instances of a generalized discrete Morse theory. We prove that the latter three complexes are simple-homotopy equivalent. Our results have applications in topological data analysis and in the reconstruction of shapes from sampled data. Copyright is held by the owner/author(s).","lang":"eng"}],"_id":"2155","acknowledgement":"This research is partially supported by ESF under the ACAT Research Network Programme, and by the Russian Government under mega project 11.G34.31.0053","oa":1,"status":"public","date_updated":"2021-01-12T06:55:38Z","day":"01","doi":"10.1145/2582112.2582167","title":"The morse theory of Čech and Delaunay filtrations","year":"2014","oa_version":"Submitted Version","department":[{"_id":"HeEd"}],"date_published":"2014-06-01T00:00:00Z","publication_status":"published","citation":{"ista":"Bauer U, Edelsbrunner H. 2014. The morse theory of Čech and Delaunay filtrations. Proceedings of the Annual Symposium on Computational Geometry. SoCG: Symposium on Computational Geometry, 484–490.","ieee":"U. Bauer and H. Edelsbrunner, “The morse theory of Čech and Delaunay filtrations,” in <i>Proceedings of the Annual Symposium on Computational Geometry</i>, Kyoto, Japan, 2014, pp. 484–490.","short":"U. Bauer, H. Edelsbrunner, in:, Proceedings of the Annual Symposium on Computational Geometry, ACM, 2014, pp. 484–490.","mla":"Bauer, Ulrich, and Herbert Edelsbrunner. “The Morse Theory of Čech and Delaunay Filtrations.” <i>Proceedings of the Annual Symposium on Computational Geometry</i>, ACM, 2014, pp. 484–90, doi:<a href=\"https://doi.org/10.1145/2582112.2582167\">10.1145/2582112.2582167</a>.","chicago":"Bauer, Ulrich, and Herbert Edelsbrunner. “The Morse Theory of Čech and Delaunay Filtrations.” In <i>Proceedings of the Annual Symposium on Computational Geometry</i>, 484–90. ACM, 2014. <a href=\"https://doi.org/10.1145/2582112.2582167\">https://doi.org/10.1145/2582112.2582167</a>.","ama":"Bauer U, Edelsbrunner H. The morse theory of Čech and Delaunay filtrations. In: <i>Proceedings of the Annual Symposium on Computational Geometry</i>. ACM; 2014:484-490. doi:<a href=\"https://doi.org/10.1145/2582112.2582167\">10.1145/2582112.2582167</a>","apa":"Bauer, U., &#38; Edelsbrunner, H. (2014). The morse theory of Čech and Delaunay filtrations. In <i>Proceedings of the Annual Symposium on Computational Geometry</i> (pp. 484–490). Kyoto, Japan: ACM. <a href=\"https://doi.org/10.1145/2582112.2582167\">https://doi.org/10.1145/2582112.2582167</a>"},"quality_controlled":"1"},{"day":"01","doi":"10.1145/2582112.2582169","title":"Measuring distance between Reeb graphs","year":"2014","oa":1,"status":"public","date_updated":"2021-01-12T06:55:39Z","citation":{"ista":"Bauer U, Ge X, Wang Y. 2014. Measuring distance between Reeb graphs. Proceedings of the Annual Symposium on Computational Geometry. SoCG: Symposium on Computational Geometry, 464–473.","mla":"Bauer, Ulrich, et al. “Measuring Distance between Reeb Graphs.” <i>Proceedings of the Annual Symposium on Computational Geometry</i>, ACM, 2014, pp. 464–73, doi:<a href=\"https://doi.org/10.1145/2582112.2582169\">10.1145/2582112.2582169</a>.","short":"U. Bauer, X. Ge, Y. Wang, in:, Proceedings of the Annual Symposium on Computational Geometry, ACM, 2014, pp. 464–473.","ieee":"U. Bauer, X. Ge, and Y. Wang, “Measuring distance between Reeb graphs,” in <i>Proceedings of the Annual Symposium on Computational Geometry</i>, Kyoto, Japan, 2014, pp. 464–473.","chicago":"Bauer, Ulrich, Xiaoyin Ge, and Yusu Wang. “Measuring Distance between Reeb Graphs.” In <i>Proceedings of the Annual Symposium on Computational Geometry</i>, 464–73. ACM, 2014. <a href=\"https://doi.org/10.1145/2582112.2582169\">https://doi.org/10.1145/2582112.2582169</a>.","ama":"Bauer U, Ge X, Wang Y. Measuring distance between Reeb graphs. In: <i>Proceedings of the Annual Symposium on Computational Geometry</i>. ACM; 2014:464-473. doi:<a href=\"https://doi.org/10.1145/2582112.2582169\">10.1145/2582112.2582169</a>","apa":"Bauer, U., Ge, X., &#38; Wang, Y. (2014). Measuring distance between Reeb graphs. In <i>Proceedings of the Annual Symposium on Computational Geometry</i> (pp. 464–473). Kyoto, Japan: ACM. <a href=\"https://doi.org/10.1145/2582112.2582169\">https://doi.org/10.1145/2582112.2582169</a>"},"publication_status":"published","quality_controlled":"1","oa_version":"Submitted Version","department":[{"_id":"HeEd"}],"date_published":"2014-06-01T00:00:00Z","date_created":"2018-12-11T11:56:02Z","page":"464 - 473","type":"conference","conference":{"name":"SoCG: Symposium on Computational Geometry","location":"Kyoto, Japan","end_date":"2014-06-11","start_date":"2014-06-08"},"month":"06","language":[{"iso":"eng"}],"author":[{"orcid":"0000-0002-9683-0724","id":"2ADD483A-F248-11E8-B48F-1D18A9856A87","full_name":"Bauer, Ulrich","first_name":"Ulrich","last_name":"Bauer"},{"full_name":"Ge, Xiaoyin","first_name":"Xiaoyin","last_name":"Ge"},{"first_name":"Yusu","full_name":"Wang, Yusu","last_name":"Wang"}],"scopus_import":1,"publication":"Proceedings of the Annual Symposium on Computational Geometry","abstract":[{"text":"We propose a metric for Reeb graphs, called the functional distortion distance. Under this distance, the Reeb graph is stable against small changes of input functions. At the same time, it remains discriminative at differentiating input functions. In particular, the main result is that the functional distortion distance between two Reeb graphs is bounded from below by the bottleneck distance between both the ordinary and extended persistence diagrams for appropriate dimensions. As an application of our results, we analyze a natural simplification scheme for Reeb graphs, and show that persistent features in Reeb graph remains persistent under simplification. Understanding the stability of important features of the Reeb graph under simplification is an interesting problem on its own right, and critical to the practical usage of Reeb graphs. Copyright is held by the owner/author(s).","lang":"eng"}],"acknowledgement":"National Science Foundation under grants CCF-1319406, CCF-1116258.","_id":"2156","project":[{"call_identifier":"FP7","grant_number":"318493","name":"Topological Complex Systems","_id":"255D761E-B435-11E9-9278-68D0E5697425"}],"main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1307.2839"}],"publisher":"ACM","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4850","ec_funded":1},{"language":[{"iso":"eng"}],"oa":1,"month":"06","author":[{"last_name":"Matoušek","first_name":"Jiří","full_name":"Matoušek, Jiří"},{"last_name":"Sedgwick","full_name":"Sedgwick, Eric","first_name":"Eric"},{"full_name":"Tancer, Martin","first_name":"Martin","last_name":"Tancer","id":"38AC689C-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-1191-6714"},{"orcid":"0000-0002-1494-0568","id":"36690CA2-F248-11E8-B48F-1D18A9856A87","last_name":"Wagner","first_name":"Uli","full_name":"Wagner, Uli"}],"conference":{"end_date":"2014-06-11","start_date":"2014-06-08","name":"SoCG: Symposium on Computational Geometry","location":"Kyoto, Japan"},"type":"conference","publication":"Proceedings of the Annual Symposium on Computational Geometry","date_updated":"2023-09-11T13:38:49Z","status":"public","scopus_import":1,"title":"Embeddability in the 3 sphere is decidable","related_material":{"record":[{"status":"public","id":"425","relation":"later_version"}]},"day":"01","doi":"10.1145/2582112.2582137","page":"78 - 84","year":"2014","date_created":"2018-12-11T11:56:02Z","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","department":[{"_id":"UlWa"}],"publisher":"ACM","oa_version":"Submitted Version","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1402.0815"}],"date_published":"2014-06-01T00:00:00Z","publist_id":"4849","citation":{"ista":"Matoušek J, Sedgwick E, Tancer M, Wagner U. 2014. Embeddability in the 3 sphere is decidable. Proceedings of the Annual Symposium on Computational Geometry. SoCG: Symposium on Computational Geometry, 78–84.","ieee":"J. Matoušek, E. Sedgwick, M. Tancer, and U. Wagner, “Embeddability in the 3 sphere is decidable,” in <i>Proceedings of the Annual Symposium on Computational Geometry</i>, Kyoto, Japan, 2014, pp. 78–84.","mla":"Matoušek, Jiří, et al. “Embeddability in the 3 Sphere Is Decidable.” <i>Proceedings of the Annual Symposium on Computational Geometry</i>, ACM, 2014, pp. 78–84, doi:<a href=\"https://doi.org/10.1145/2582112.2582137\">10.1145/2582112.2582137</a>.","short":"J. Matoušek, E. Sedgwick, M. Tancer, U. Wagner, in:, Proceedings of the Annual Symposium on Computational Geometry, ACM, 2014, pp. 78–84.","chicago":"Matoušek, Jiří, Eric Sedgwick, Martin Tancer, and Uli Wagner. “Embeddability in the 3 Sphere Is Decidable.” In <i>Proceedings of the Annual Symposium on Computational Geometry</i>, 78–84. ACM, 2014. <a href=\"https://doi.org/10.1145/2582112.2582137\">https://doi.org/10.1145/2582112.2582137</a>.","apa":"Matoušek, J., Sedgwick, E., Tancer, M., &#38; Wagner, U. (2014). Embeddability in the 3 sphere is decidable. In <i>Proceedings of the Annual Symposium on Computational Geometry</i> (pp. 78–84). Kyoto, Japan: ACM. <a href=\"https://doi.org/10.1145/2582112.2582137\">https://doi.org/10.1145/2582112.2582137</a>","ama":"Matoušek J, Sedgwick E, Tancer M, Wagner U. Embeddability in the 3 sphere is decidable. In: <i>Proceedings of the Annual Symposium on Computational Geometry</i>. ACM; 2014:78-84. doi:<a href=\"https://doi.org/10.1145/2582112.2582137\">10.1145/2582112.2582137</a>"},"publication_status":"published","abstract":[{"text":"We show that the following algorithmic problem is decidable: given a 2-dimensional simplicial complex, can it be embedded (topologically, or equivalently, piecewise linearly) in ℝ3? By a known reduction, it suffices to decide the embeddability of a given triangulated 3-manifold X into the 3-sphere S3. The main step, which allows us to simplify X and recurse, is in proving that if X can be embedded in S3, then there is also an embedding in which X has a short meridian, i.e., an essential curve in the boundary of X bounding a disk in S3 nX with length bounded by a computable function of the number of tetrahedra of X.","lang":"eng"}],"quality_controlled":"1","_id":"2157","acknowledgement":"ERC Advanced Grant No. 267165; Grant GRADR Eurogiga GIG/11/E023  (SNSF-PP00P2-138948); Swiss National Science Foundation  (SNSF-200020-138230)."},{"oa":1,"external_id":{"pmid":["24959970"]},"date_updated":"2021-01-12T06:55:40Z","status":"public","intvolume":"        30","issue":"1","title":"New paradigms in the establishment and maintenance of gradients during directed cell migration","doi":"10.1016/j.ceb.2014.05.010","day":"01","year":"2014","department":[{"_id":"MiSi"}],"oa_version":"Submitted Version","date_published":"2014-10-01T00:00:00Z","citation":{"chicago":"Majumdar, Ritankar, Michael K Sixt, and Carole Parent. “New Paradigms in the Establishment and Maintenance of Gradients during Directed Cell Migration.” <i>Current Opinion in Cell Biology</i>. Elsevier, 2014. <a href=\"https://doi.org/10.1016/j.ceb.2014.05.010\">https://doi.org/10.1016/j.ceb.2014.05.010</a>.","ama":"Majumdar R, Sixt MK, Parent C. New paradigms in the establishment and maintenance of gradients during directed cell migration. <i>Current Opinion in Cell Biology</i>. 2014;30(1):33-40. doi:<a href=\"https://doi.org/10.1016/j.ceb.2014.05.010\">10.1016/j.ceb.2014.05.010</a>","apa":"Majumdar, R., Sixt, M. K., &#38; Parent, C. (2014). New paradigms in the establishment and maintenance of gradients during directed cell migration. <i>Current Opinion in Cell Biology</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.ceb.2014.05.010\">https://doi.org/10.1016/j.ceb.2014.05.010</a>","ista":"Majumdar R, Sixt MK, Parent C. 2014. New paradigms in the establishment and maintenance of gradients during directed cell migration. Current Opinion in Cell Biology. 30(1), 33–40.","short":"R. Majumdar, M.K. Sixt, C. Parent, Current Opinion in Cell Biology 30 (2014) 33–40.","mla":"Majumdar, Ritankar, et al. “New Paradigms in the Establishment and Maintenance of Gradients during Directed Cell Migration.” <i>Current Opinion in Cell Biology</i>, vol. 30, no. 1, Elsevier, 2014, pp. 33–40, doi:<a href=\"https://doi.org/10.1016/j.ceb.2014.05.010\">10.1016/j.ceb.2014.05.010</a>.","ieee":"R. Majumdar, M. K. Sixt, and C. Parent, “New paradigms in the establishment and maintenance of gradients during directed cell migration,” <i>Current Opinion in Cell Biology</i>, vol. 30, no. 1. Elsevier, pp. 33–40, 2014."},"publication_status":"published","quality_controlled":"1","author":[{"last_name":"Majumdar","full_name":"Majumdar, Ritankar","first_name":"Ritankar"},{"last_name":"Sixt","first_name":"Michael K","full_name":"Sixt, Michael K","orcid":"0000-0002-6620-9179","id":"41E9FBEA-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Parent, Carole","first_name":"Carole","last_name":"Parent"}],"language":[{"iso":"eng"}],"month":"10","type":"journal_article","publication":"Current Opinion in Cell Biology","scopus_import":1,"volume":30,"page":"33 - 40","date_created":"2018-12-11T11:56:03Z","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publisher":"Elsevier","main_file_link":[{"url":"http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4177954/","open_access":"1"}],"publist_id":"4848","abstract":[{"text":"Directional guidance of migrating cells is relatively well explored in the reductionist setting of cell culture experiments. Here spatial gradients of chemical cues as well as gradients of mechanical substrate characteristics prove sufficient to attract single cells as well as their collectives. How such gradients present and act in the context of an organism is far less clear. Here we review recent advances in understanding how guidance cues emerge and operate in the physiological context.","lang":"eng"}],"pmid":1,"_id":"2158","acknowledgement":"This effort was supported by the Intramural Research Program of the Center for Cancer Research, NCI, National Institutes of Health and the European Research Council (ERC)."},{"quality_controlled":"1","publication_status":"published","citation":{"chicago":"Mabillard, Isaac, and Uli Wagner. “Eliminating Tverberg Points, I. An Analogue of the Whitney Trick.” In <i>Proceedings of the Annual Symposium on Computational Geometry</i>, 171–80. ACM, 2014. <a href=\"https://doi.org/10.1145/2582112.2582134\">https://doi.org/10.1145/2582112.2582134</a>.","apa":"Mabillard, I., &#38; Wagner, U. (2014). Eliminating Tverberg points, I. An analogue of the Whitney trick. In <i>Proceedings of the Annual Symposium on Computational Geometry</i> (pp. 171–180). Kyoto, Japan: ACM. <a href=\"https://doi.org/10.1145/2582112.2582134\">https://doi.org/10.1145/2582112.2582134</a>","ama":"Mabillard I, Wagner U. Eliminating Tverberg points, I. An analogue of the Whitney trick. In: <i>Proceedings of the Annual Symposium on Computational Geometry</i>. ACM; 2014:171-180. doi:<a href=\"https://doi.org/10.1145/2582112.2582134\">10.1145/2582112.2582134</a>","ista":"Mabillard I, Wagner U. 2014. Eliminating Tverberg points, I. An analogue of the Whitney trick. Proceedings of the Annual Symposium on Computational Geometry. SoCG: Symposium on Computational Geometry, 171–180.","mla":"Mabillard, Isaac, and Uli Wagner. “Eliminating Tverberg Points, I. An Analogue of the Whitney Trick.” <i>Proceedings of the Annual Symposium on Computational Geometry</i>, ACM, 2014, pp. 171–80, doi:<a href=\"https://doi.org/10.1145/2582112.2582134\">10.1145/2582112.2582134</a>.","short":"I. Mabillard, U. Wagner, in:, Proceedings of the Annual Symposium on Computational Geometry, ACM, 2014, pp. 171–180.","ieee":"I. Mabillard and U. Wagner, “Eliminating Tverberg points, I. An analogue of the Whitney trick,” in <i>Proceedings of the Annual Symposium on Computational Geometry</i>, Kyoto, Japan, 2014, pp. 171–180."},"date_published":"2014-06-08T00:00:00Z","department":[{"_id":"UlWa"}],"oa_version":"Submitted Version","file":[{"file_name":"IST-2016-534-v1+1_Eliminating_Tverberg_points_I._An_analogue_of_the_Whitney_trick.pdf","relation":"main_file","access_level":"open_access","file_size":914396,"checksum":"2aae223fee8ffeaf57bbabd8d92b6a2c","date_updated":"2020-07-14T12:45:30Z","creator":"system","file_id":"4735","content_type":"application/pdf","date_created":"2018-12-12T10:09:12Z"}],"year":"2014","has_accepted_license":"1","title":"Eliminating Tverberg points, I. An analogue of the Whitney trick","day":"08","doi":"10.1145/2582112.2582134","pubrep_id":"534","date_updated":"2023-09-07T11:56:27Z","status":"public","oa":1,"_id":"2159","acknowledgement":"Swiss National Science Foundation (Project SNSF-PP00P2-138948)","abstract":[{"lang":"eng","text":"Motivated by topological Tverberg-type problems, we consider multiple (double, triple, and higher multiplicity) selfintersection points of maps from finite simplicial complexes (compact polyhedra) into ℝd and study conditions under which such multiple points can be eliminated. The most classical case is that of embeddings (i.e., maps without double points) of a κ-dimensional complex K into ℝ2κ. For this problem, the work of van Kampen, Shapiro, and Wu provides an efficiently testable necessary condition for embeddability (namely, vanishing of the van Kampen ob-struction). For κ ≥ 3, the condition is also sufficient, and yields a polynomial-time algorithm for deciding embeddability: One starts with an arbitrary map f : K→ℝ2κ, which generically has finitely many double points; if k ≥ 3 and if the obstruction vanishes then one can successively remove these double points by local modifications of the map f. One of the main tools is the famous Whitney trick that permits eliminating pairs of double points of opposite intersection sign. We are interested in generalizing this approach to intersection points of higher multiplicity. We call a point y 2 ℝd an r-fold Tverberg point of a map f : Kκ →ℝd if y lies in the intersection f(σ1)∩. ∩f(σr) of the images of r pairwise disjoint simplices of K. The analogue of (non-)embeddability that we study is the problem Tverbergκ r→d: Given a κ-dimensional complex K, does it satisfy a Tverberg-type theorem with parameters r and d, i.e., does every map f : K κ → ℝd have an r-fold Tverberg point? Here, we show that for fixed r, κ and d of the form d = rm and k = (r-1)m, m ≥ 3, there is a polynomial-time algorithm for deciding this (based on the vanishing of a cohomological obstruction, as in the case of embeddings). Our main tool is an r-fold analogue of the Whitney trick: Given r pairwise disjoint simplices of K such that the intersection of their images contains two r-fold Tverberg points y+ and y- of opposite intersection sign, we can eliminate y+ and y- by a local isotopy of f. In a subsequent paper, we plan to develop this further and present a generalization of the classical Haeiger-Weber Theorem (which yields a necessary and sufficient condition for embeddability of κ-complexes into ℝd for a wider range of dimensions) to intersection points of higher multiplicity."}],"publist_id":"4847","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publisher":"ACM","page":"171 - 180","date_created":"2018-12-11T11:56:03Z","ddc":["510"],"related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"1123"}]},"file_date_updated":"2020-07-14T12:45:30Z","publication":"Proceedings of the Annual Symposium on Computational Geometry","scopus_import":1,"author":[{"id":"32BF9DAA-F248-11E8-B48F-1D18A9856A87","full_name":"Mabillard, Isaac","first_name":"Isaac","last_name":"Mabillard"},{"orcid":"0000-0002-1494-0568","id":"36690CA2-F248-11E8-B48F-1D18A9856A87","last_name":"Wagner","first_name":"Uli","full_name":"Wagner, Uli"}],"language":[{"iso":"eng"}],"conference":{"end_date":"2014-06-11","start_date":"2014-06-08","location":"Kyoto, Japan","name":"SoCG: Symposium on Computational Geometry"},"month":"06","type":"conference"},{"quality_controlled":"1","_id":"2160","publication_status":"published","citation":{"ista":"Pentina A, Lampert C. 2014. A PAC-Bayesian bound for Lifelong Learning. ICML: International Conference on Machine Learning vol. 32, 991–999.","mla":"Pentina, Anastasia, and Christoph Lampert. <i>A PAC-Bayesian Bound for Lifelong Learning</i>. Vol. 32, ML Research Press, 2014, pp. 991–99.","short":"A. Pentina, C. Lampert, in:, ML Research Press, 2014, pp. 991–999.","ieee":"A. Pentina and C. Lampert, “A PAC-Bayesian bound for Lifelong Learning,” presented at the ICML: International Conference on Machine Learning, Beijing, China, 2014, vol. 32, pp. 991–999.","chicago":"Pentina, Anastasia, and Christoph Lampert. “A PAC-Bayesian Bound for Lifelong Learning,” 32:991–99. ML Research Press, 2014.","apa":"Pentina, A., &#38; Lampert, C. (2014). A PAC-Bayesian bound for Lifelong Learning (Vol. 32, pp. 991–999). Presented at the ICML: International Conference on Machine Learning, Beijing, China: ML Research Press.","ama":"Pentina A, Lampert C. A PAC-Bayesian bound for Lifelong Learning. In: Vol 32. ML Research Press; 2014:991-999."},"abstract":[{"lang":"eng","text":"Transfer learning has received a lot of attention in the machine learning community over the last years, and several effective algorithms have been developed. However, relatively little is known about their theoretical properties, especially in the setting of lifelong learning, where the goal is to transfer information to tasks for which no data have been observed so far. In this work we study lifelong learning from a theoretical perspective. Our main result is a PAC-Bayesian generalization bound that offers a unified view on existing paradigms for transfer learning, such as the transfer of parameters or the transfer of low-dimensional representations. We also use the bound to derive two principled lifelong learning algorithms, and we show that these yield results comparable with existing methods."}],"date_published":"2014-05-10T00:00:00Z","publist_id":"4844","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","department":[{"_id":"ChLa"}],"oa_version":"Submitted Version","publisher":"ML Research Press","main_file_link":[{"url":"https://dl.acm.org/citation.cfm?id=3045003","open_access":"1"}],"page":"991 - 999","year":"2014","date_created":"2018-12-11T11:56:03Z","volume":32,"title":"A PAC-Bayesian bound for Lifelong Learning","day":"10","article_processing_charge":"No","date_updated":"2023-10-17T11:54:24Z","status":"public","intvolume":"        32","scopus_import":"1","oa":1,"conference":{"end_date":"2014-06-26","start_date":"2014-06-21","location":"Beijing, China","name":"ICML: International Conference on Machine Learning"},"month":"05","language":[{"iso":"eng"}],"author":[{"first_name":"Anastasia","full_name":"Pentina, Anastasia","last_name":"Pentina","id":"42E87FC6-F248-11E8-B48F-1D18A9856A87"},{"id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-8622-7887","last_name":"Lampert","first_name":"Christoph","full_name":"Lampert, Christoph"}],"type":"conference"},{"acknowledgement":"We thank Katrin Kellner for colony establishment and characterization, Mike Bidochka for the fungal strain, Meghan Vyleta for fungal strain characterization, Martina Klatt and Simon Tragust for help in the laboratory, Dimitri Missoh for developing the software BioLogic, and Mark Brown and Raphaël Jeanson for discussion and help with data analysis. The study was funded by the European Research Council (ERC Starting Grant to SC; Marie Curie IEF to LVU) and the German Research Foundation DFG (to SC and to JH), and CW received funding by the doctoral school Diversité du Vivant (Cotutelle project to CD and SC).\r\n","_id":"2161","abstract":[{"text":"Repeated pathogen exposure is a common threat in colonies of social insects, posing selection pressures on colony members to respond with improved disease-defense performance. We here tested whether experience gained by repeated tending of low-level fungus-exposed (Metarhizium robertsii) larvae may alter the performance of sanitary brood care in the clonal ant, Platythyrea punctata. We trained ants individually over nine consecutive trials to either sham-treated or fungus-exposed larvae. We then compared the larval grooming behavior of naive and trained ants and measured how effectively they removed infectious fungal conidiospores from the fungus-exposed larvae. We found that the ants changed the duration of larval grooming in response to both, larval treatment and their level of experience: (1) sham-treated larvae received longer grooming than the fungus-exposed larvae and (2) trained ants performed less self-grooming but longer larval grooming than naive ants, which was true for both, ants trained to fungus-exposed and also to sham-treated larvae. Ants that groomed the fungus-exposed larvae for longer periods removed a higher number of fungal conidiospores from the surface of the fungus-exposed larvae. As experienced ants performed longer larval grooming, they were more effective in fungal removal, thus making them better caretakers under pathogen attack of the colony. By studying this clonal ant, we can thus conclude that even in the absence of genetic variation between colony members, differences in experience levels of brood care may affect performance of sanitary brood care in social insects.","lang":"eng"}],"ec_funded":1,"publist_id":"4823","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","project":[{"grant_number":"291734","call_identifier":"FP7","_id":"25681D80-B435-11E9-9278-68D0E5697425","name":"International IST Postdoc Fellowship Programme"},{"_id":"25DC711C-B435-11E9-9278-68D0E5697425","name":"Social Vaccination in Ant Colonies: from Individual Mechanisms to Society Effects","grant_number":"243071","call_identifier":"FP7"},{"_id":"25DAF0B2-B435-11E9-9278-68D0E5697425","name":"Host-Parasite Coevolution","grant_number":"CR-118/3-1"}],"publisher":"Springer","page":"1701 - 1710","date_created":"2018-12-11T11:56:03Z","related_material":{"record":[{"status":"public","id":"9742","relation":"research_data"}]},"volume":68,"publication":"Behavioral Ecology and Sociobiology","article_processing_charge":"No","scopus_import":"1","type":"journal_article","author":[{"full_name":"Westhus, Claudia","first_name":"Claudia","last_name":"Westhus","id":"ca9c6ca9-e8aa-11ec-a586-b9471ede0494"},{"first_name":"Line V","full_name":"Ugelvig, Line V","last_name":"Ugelvig","orcid":"0000-0003-1832-8883","id":"3DC97C8E-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Tourdot","full_name":"Tourdot, Edouard","first_name":"Edouard"},{"last_name":"Heinze","full_name":"Heinze, Jürgen","first_name":"Jürgen"},{"last_name":"Doums","full_name":"Doums, Claudie","first_name":"Claudie"},{"last_name":"Cremer","first_name":"Sylvia","full_name":"Cremer, Sylvia","orcid":"0000-0002-2193-3868","id":"2F64EC8C-F248-11E8-B48F-1D18A9856A87"}],"language":[{"iso":"eng"}],"month":"07","quality_controlled":"1","citation":{"ama":"Westhus C, Ugelvig LV, Tourdot E, Heinze J, Doums C, Cremer S. Increased grooming after repeated brood care provides sanitary benefits in a clonal ant. <i>Behavioral Ecology and Sociobiology</i>. 2014;68(10):1701-1710. doi:<a href=\"https://doi.org/10.1007/s00265-014-1778-8\">10.1007/s00265-014-1778-8</a>","apa":"Westhus, C., Ugelvig, L. V., Tourdot, E., Heinze, J., Doums, C., &#38; Cremer, S. (2014). Increased grooming after repeated brood care provides sanitary benefits in a clonal ant. <i>Behavioral Ecology and Sociobiology</i>. Springer. <a href=\"https://doi.org/10.1007/s00265-014-1778-8\">https://doi.org/10.1007/s00265-014-1778-8</a>","chicago":"Westhus, Claudia, Line V Ugelvig, Edouard Tourdot, Jürgen Heinze, Claudie Doums, and Sylvia Cremer. “Increased Grooming after Repeated Brood Care Provides Sanitary Benefits in a Clonal Ant.” <i>Behavioral Ecology and Sociobiology</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s00265-014-1778-8\">https://doi.org/10.1007/s00265-014-1778-8</a>.","ieee":"C. Westhus, L. V. Ugelvig, E. Tourdot, J. Heinze, C. Doums, and S. Cremer, “Increased grooming after repeated brood care provides sanitary benefits in a clonal ant,” <i>Behavioral Ecology and Sociobiology</i>, vol. 68, no. 10. Springer, pp. 1701–1710, 2014.","short":"C. Westhus, L.V. Ugelvig, E. Tourdot, J. Heinze, C. Doums, S. Cremer, Behavioral Ecology and Sociobiology 68 (2014) 1701–1710.","mla":"Westhus, Claudia, et al. “Increased Grooming after Repeated Brood Care Provides Sanitary Benefits in a Clonal Ant.” <i>Behavioral Ecology and Sociobiology</i>, vol. 68, no. 10, Springer, 2014, pp. 1701–10, doi:<a href=\"https://doi.org/10.1007/s00265-014-1778-8\">10.1007/s00265-014-1778-8</a>.","ista":"Westhus C, Ugelvig LV, Tourdot E, Heinze J, Doums C, Cremer S. 2014. Increased grooming after repeated brood care provides sanitary benefits in a clonal ant. Behavioral Ecology and Sociobiology. 68(10), 1701–1710."},"publication_status":"published","article_type":"original","date_published":"2014-07-23T00:00:00Z","department":[{"_id":"SyCr"}],"oa_version":"None","year":"2014","issue":"10","title":"Increased grooming after repeated brood care provides sanitary benefits in a clonal ant","publication_identifier":{"issn":["0340-5443"]},"day":"23","doi":"10.1007/s00265-014-1778-8","date_updated":"2023-02-23T14:06:46Z","intvolume":"        68","status":"public"},{"date_created":"2018-12-11T11:56:04Z","page":"122 - 133","related_material":{"record":[{"status":"public","id":"5404","relation":"earlier_version"}]},"volume":8573,"type":"conference","author":[{"first_name":"Krishnendu","full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Ibsen-Jensen","full_name":"Ibsen-Jensen, Rasmus","first_name":"Rasmus","orcid":"0000-0003-4783-0389","id":"3B699956-F248-11E8-B48F-1D18A9856A87"}],"month":"01","language":[{"iso":"eng"}],"conference":{"location":"Copenhagen, Denmark","name":"ICST: International Conference on Software Testing, Verification and Validation","end_date":"2014-07-11","start_date":"2014-07-08"},"alternative_title":["LNCS"],"_id":"2162","abstract":[{"lang":"eng","text":"We study two-player (zero-sum) concurrent mean-payoff games played on a finite-state graph. We focus on the important sub-class of ergodic games where all states are visited infinitely often with probability 1. The algorithmic study of ergodic games was initiated in a seminal work of Hoffman and Karp in 1966, but all basic complexity questions have remained unresolved. Our main results for ergodic games are as follows: We establish (1) an optimal exponential bound on the patience of stationary strategies (where patience of a distribution is the inverse of the smallest positive probability and represents a complexity measure of a stationary strategy); (2) the approximation problem lies in FNP; (3) the approximation problem is at least as hard as the decision problem for simple stochastic games (for which NP ∩ coNP is the long-standing best known bound). We present a variant of the strategy-iteration algorithm by Hoffman and Karp; show that both our algorithm and the classical value-iteration algorithm can approximate the value in exponential time; and identify a subclass where the value-iteration algorithm is a FPTAS. We also show that the exact value can be expressed in the existential theory of the reals, and establish square-root sum hardness for a related class of games."}],"publist_id":"4822","ec_funded":1,"main_file_link":[{"url":"http://arxiv.org/abs/1404.5734","open_access":"1"}],"project":[{"call_identifier":"FWF","grant_number":"P 23499-N23","name":"Modern Graph Algorithmic Techniques in Formal Verification","_id":"2584A770-B435-11E9-9278-68D0E5697425"},{"grant_number":"S11407","call_identifier":"FWF","_id":"25863FF4-B435-11E9-9278-68D0E5697425","name":"Game Theory"},{"name":"Quantitative Graph Games: Theory and Applications","_id":"2581B60A-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","grant_number":"279307"},{"_id":"2587B514-B435-11E9-9278-68D0E5697425","name":"Microsoft Research Faculty Fellowship"}],"publisher":"Springer","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","year":"2014","day":"01","doi":"10.1007/978-3-662-43951-7_11","title":"The complexity of ergodic mean payoff games","issue":"Part 2","intvolume":"      8573","status":"public","date_updated":"2023-02-23T12:24:48Z","external_id":{"arxiv":["1404.5734"]},"oa":1,"quality_controlled":"1","arxiv":1,"citation":{"chicago":"Chatterjee, Krishnendu, and Rasmus Ibsen-Jensen. “The Complexity of Ergodic Mean Payoff Games,” 8573:122–33. Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-662-43951-7_11\">https://doi.org/10.1007/978-3-662-43951-7_11</a>.","apa":"Chatterjee, K., &#38; Ibsen-Jensen, R. (2014). The complexity of ergodic mean payoff games (Vol. 8573, pp. 122–133). Presented at the ICST: International Conference on Software Testing, Verification and Validation, Copenhagen, Denmark: Springer. <a href=\"https://doi.org/10.1007/978-3-662-43951-7_11\">https://doi.org/10.1007/978-3-662-43951-7_11</a>","ama":"Chatterjee K, Ibsen-Jensen R. The complexity of ergodic mean payoff games. In: Vol 8573. Springer; 2014:122-133. doi:<a href=\"https://doi.org/10.1007/978-3-662-43951-7_11\">10.1007/978-3-662-43951-7_11</a>","ista":"Chatterjee K, Ibsen-Jensen R. 2014. The complexity of ergodic mean payoff games. ICST: International Conference on Software Testing, Verification and Validation, LNCS, vol. 8573, 122–133.","ieee":"K. Chatterjee and R. Ibsen-Jensen, “The complexity of ergodic mean payoff games,” presented at the ICST: International Conference on Software Testing, Verification and Validation, Copenhagen, Denmark, 2014, vol. 8573, no. Part 2, pp. 122–133.","short":"K. Chatterjee, R. Ibsen-Jensen, in:, Springer, 2014, pp. 122–133.","mla":"Chatterjee, Krishnendu, and Rasmus Ibsen-Jensen. <i>The Complexity of Ergodic Mean Payoff Games</i>. Vol. 8573, no. Part 2, Springer, 2014, pp. 122–33, doi:<a href=\"https://doi.org/10.1007/978-3-662-43951-7_11\">10.1007/978-3-662-43951-7_11</a>."},"publication_status":"published","date_published":"2014-01-01T00:00:00Z","oa_version":"Preprint","department":[{"_id":"KrCh"}]},{"date_published":"2014-01-01T00:00:00Z","oa_version":"Preprint","department":[{"_id":"KrCh"}],"arxiv":1,"quality_controlled":"1","publication_status":"published","citation":{"ista":"Chatterjee K, Doyen L. 2014. Games with a weak adversary. Lecture Notes in Computer Science. ICALP: Automata, Languages and Programming, LNCS, vol. 8573, 110–121.","mla":"Chatterjee, Krishnendu, and Laurent Doyen. “Games with a Weak Adversary.” <i>Lecture Notes in Computer Science</i>, vol. 8573, no. Part 2, Springer, 2014, pp. 110–21, doi:<a href=\"https://doi.org/10.1007/978-3-662-43951-7_10\">10.1007/978-3-662-43951-7_10</a>.","short":"K. Chatterjee, L. Doyen, in:, Lecture Notes in Computer Science, Springer, 2014, pp. 110–121.","ieee":"K. Chatterjee and L. Doyen, “Games with a weak adversary,” in <i>Lecture Notes in Computer Science</i>, Copenhagen, Denmark, 2014, vol. 8573, no. Part 2, pp. 110–121.","chicago":"Chatterjee, Krishnendu, and Laurent Doyen. “Games with a Weak Adversary.” In <i>Lecture Notes in Computer Science</i>, 8573:110–21. Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-662-43951-7_10\">https://doi.org/10.1007/978-3-662-43951-7_10</a>.","ama":"Chatterjee K, Doyen L. Games with a weak adversary. In: <i>Lecture Notes in Computer Science</i>. Vol 8573. Springer; 2014:110-121. doi:<a href=\"https://doi.org/10.1007/978-3-662-43951-7_10\">10.1007/978-3-662-43951-7_10</a>","apa":"Chatterjee, K., &#38; Doyen, L. (2014). Games with a weak adversary. In <i>Lecture Notes in Computer Science</i> (Vol. 8573, pp. 110–121). Copenhagen, Denmark: Springer. <a href=\"https://doi.org/10.1007/978-3-662-43951-7_10\">https://doi.org/10.1007/978-3-662-43951-7_10</a>"},"status":"public","intvolume":"      8573","date_updated":"2023-02-23T12:25:29Z","external_id":{"arxiv":["1404.5453"]},"oa":1,"year":"2014","doi":"10.1007/978-3-662-43951-7_10","day":"01","title":"Games with a weak adversary","issue":"Part 2","publist_id":"4821","ec_funded":1,"publisher":"Springer","main_file_link":[{"url":"https://arxiv.org/abs/1404.5453","open_access":"1"}],"project":[{"grant_number":"P 23499-N23","call_identifier":"FWF","_id":"2584A770-B435-11E9-9278-68D0E5697425","name":"Modern Graph Algorithmic Techniques in Formal Verification"},{"call_identifier":"FWF","grant_number":"S11407","name":"Game Theory","_id":"25863FF4-B435-11E9-9278-68D0E5697425"},{"_id":"2581B60A-B435-11E9-9278-68D0E5697425","name":"Quantitative Graph Games: Theory and Applications","grant_number":"279307","call_identifier":"FP7"},{"_id":"2587B514-B435-11E9-9278-68D0E5697425","name":"Microsoft Research Faculty Fellowship"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","_id":"2163","acknowledgement":"This research was partly supported by European project Cassting (FP7-601148).\r\nTechnical Report under https://research-explorer.app.ist.ac.at/record/5418\r\n","alternative_title":["LNCS"],"abstract":[{"text":"We consider multi-player graph games with partial-observation and parity objective. While the decision problem for three-player games with a coalition of the first and second players against the third player is undecidable in general, we present a decidability result for partial-observation games where the first and third player are in a coalition against the second player, thus where the second player is adversarial but weaker due to partial-observation. We establish tight complexity bounds in the case where player 1 is less informed than player 2, namely 2-EXPTIME-completeness for parity objectives. The symmetric case of player 1 more informed than player 2 is much more complicated, and we show that already in the case where player 1 has perfect observation, memory of size non-elementary is necessary in general for reachability objectives, and the problem is decidable for safety and reachability objectives. From our results we derive new complexity results for partial-observation stochastic games.","lang":"eng"}],"publication":"Lecture Notes in Computer Science","month":"01","language":[{"iso":"eng"}],"conference":{"name":"ICALP: Automata, Languages and Programming","location":"Copenhagen, Denmark","start_date":"2014-07-08","end_date":"2014-07-11"},"author":[{"first_name":"Krishnendu","full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Doyen","full_name":"Doyen, Laurent","first_name":"Laurent"}],"type":"conference","date_created":"2018-12-11T11:56:04Z","page":"110 - 121","volume":8573,"related_material":{"record":[{"status":"public","id":"5418","relation":"earlier_version"}]}},{"type":"journal_article","month":"08","author":[{"last_name":"Chai","full_name":"Chai, Xuejun","first_name":"Xuejun"},{"last_name":"Münzner","first_name":"Gert","full_name":"Münzner, Gert"},{"first_name":"Shanting","full_name":"Zhao, Shanting","last_name":"Zhao"},{"last_name":"Tinnes","full_name":"Tinnes, Stefanie","first_name":"Stefanie"},{"id":"3F3CA136-F248-11E8-B48F-1D18A9856A87","full_name":"Kowalski, Janina","first_name":"Janina","last_name":"Kowalski"},{"last_name":"Häussler","first_name":"Ute","full_name":"Häussler, Ute"},{"last_name":"Young","full_name":"Young, Christina","first_name":"Christina"},{"first_name":"Carola","full_name":"Haas, Carola","last_name":"Haas"},{"full_name":"Frotscher, Michael","first_name":"Michael","last_name":"Frotscher"}],"language":[{"iso":"eng"}],"date_updated":"2021-01-12T06:55:43Z","publication":"Cerebral Cortex","intvolume":"        24","scopus_import":1,"status":"public","issue":"8","title":"Epilepsy-induced motility of differentiated neurons","volume":24,"day":"01","doi":"10.1093/cercor/bht067","page":"2130 - 2140","date_created":"2018-12-11T11:56:04Z","year":"2014","department":[{"_id":"PeJo"}],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publisher":"Oxford University Press","oa_version":"None","date_published":"2014-08-01T00:00:00Z","publist_id":"4820","abstract":[{"lang":"eng","text":"Neuronal ectopia, such as granule cell dispersion (GCD) in temporal lobe epilepsy (TLE), has been assumed to result from a migration defect during development. Indeed, recent studies reported that aberrant migration of neonatal-generated dentate granule cells (GCs) increased the risk to develop epilepsy later in life. On the contrary, in the present study, we show that fully differentiated GCs become motile following the induction of epileptiform activity, resulting in GCD. Hippocampal slice cultures from transgenic mice expressing green fluorescent protein in differentiated, but not in newly generated GCs, were incubated with the glutamate receptor agonist kainate (KA), which induced GC burst activity and GCD. Using real-time microscopy, we observed that KA-exposed, differentiated GCs translocated their cell bodies and changed their dendritic organization. As found in human TLE, KA application was associated with decreased expression of the extracellular matrix protein Reelin, particularly in hilar interneurons. Together these findings suggest that KA-induced motility of differentiated GCs contributes to the development of GCD and establish slice cultures as a model to study neuronal changes induced by epileptiform activity. "}],"publication_status":"published","citation":{"ama":"Chai X, Münzner G, Zhao S, et al. Epilepsy-induced motility of differentiated neurons. <i>Cerebral Cortex</i>. 2014;24(8):2130-2140. doi:<a href=\"https://doi.org/10.1093/cercor/bht067\">10.1093/cercor/bht067</a>","apa":"Chai, X., Münzner, G., Zhao, S., Tinnes, S., Kowalski, J., Häussler, U., … Frotscher, M. (2014). Epilepsy-induced motility of differentiated neurons. <i>Cerebral Cortex</i>. Oxford University Press. <a href=\"https://doi.org/10.1093/cercor/bht067\">https://doi.org/10.1093/cercor/bht067</a>","chicago":"Chai, Xuejun, Gert Münzner, Shanting Zhao, Stefanie Tinnes, Janina Kowalski, Ute Häussler, Christina Young, Carola Haas, and Michael Frotscher. “Epilepsy-Induced Motility of Differentiated Neurons.” <i>Cerebral Cortex</i>. Oxford University Press, 2014. <a href=\"https://doi.org/10.1093/cercor/bht067\">https://doi.org/10.1093/cercor/bht067</a>.","short":"X. Chai, G. Münzner, S. Zhao, S. Tinnes, J. Kowalski, U. Häussler, C. Young, C. Haas, M. Frotscher, Cerebral Cortex 24 (2014) 2130–2140.","mla":"Chai, Xuejun, et al. “Epilepsy-Induced Motility of Differentiated Neurons.” <i>Cerebral Cortex</i>, vol. 24, no. 8, Oxford University Press, 2014, pp. 2130–40, doi:<a href=\"https://doi.org/10.1093/cercor/bht067\">10.1093/cercor/bht067</a>.","ieee":"X. Chai <i>et al.</i>, “Epilepsy-induced motility of differentiated neurons,” <i>Cerebral Cortex</i>, vol. 24, no. 8. Oxford University Press, pp. 2130–2140, 2014.","ista":"Chai X, Münzner G, Zhao S, Tinnes S, Kowalski J, Häussler U, Young C, Haas C, Frotscher M. 2014. Epilepsy-induced motility of differentiated neurons. Cerebral Cortex. 24(8), 2130–2140."},"quality_controlled":"1","_id":"2164"},{"abstract":[{"text":"Model-based testing is a promising technology for black-box software and hardware testing, in which test cases are generated automatically from high-level specifications. Nowadays, systems typically consist of multiple interacting components and, due to their complexity, testing presents a considerable portion of the effort and cost in the design process. Exploiting the compositional structure of system specifications can considerably reduce the effort in model-based testing. Moreover, inferring properties about the system from testing its individual components allows the designer to reduce the amount of integration testing. In this paper, we study compositional properties of the ioco-testing theory. We propose a new approach to composition and hiding operations, inspired by contract-based design and interface theories. These operations preserve behaviors that are compatible under composition and hiding, and prune away incompatible ones. The resulting specification characterizes the input sequences for which the unit testing of components is sufficient to infer the correctness of component integration without the need for further tests. We provide a methodology that uses these results to minimize integration testing effort, but also to detect potential weaknesses in specifications. While we focus on asynchronous models and the ioco conformance relation, the resulting methodology can be applied to a broader class of systems.","lang":"eng"}],"_id":"2167","project":[{"call_identifier":"FP7","grant_number":"267989","name":"Quantitative Reactive Modeling","_id":"25EE3708-B435-11E9-9278-68D0E5697425"},{"grant_number":"S11402-N23","call_identifier":"FWF","_id":"25F5A88A-B435-11E9-9278-68D0E5697425","name":"Moderne Concurrency Paradigms"}],"main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1904.07083"}],"publisher":"IEEE","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publist_id":"4817","ec_funded":1,"related_material":{"record":[{"relation":"earlier_version","id":"5411","status":"public"},{"relation":"dissertation_contains","id":"1155","status":"public"}]},"date_created":"2018-12-11T11:56:06Z","type":"conference","author":[{"last_name":"Daca","first_name":"Przemyslaw","full_name":"Daca, Przemyslaw","id":"49351290-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Henzinger","full_name":"Henzinger, Thomas A","first_name":"Thomas A","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Willibald","full_name":"Krenn, Willibald","last_name":"Krenn"},{"first_name":"Dejan","full_name":"Nickovic, Dejan","last_name":"Nickovic"}],"language":[{"iso":"eng"}],"month":"03","conference":{"start_date":"2014-03-31","end_date":"2014-04-04","location":"Cleveland, USA","name":"ICST: International Conference on Software Testing, Verification and Validation"},"scopus_import":1,"publication":"IEEE 7th International Conference on Software Testing, Verification and Validation","article_processing_charge":"No","citation":{"apa":"Daca, P., Henzinger, T. A., Krenn, W., &#38; Nickovic, D. (2014). Compositional specifications for IOCO testing. In <i>IEEE 7th International Conference on Software Testing, Verification and Validation</i>. Cleveland, USA: IEEE. <a href=\"https://doi.org/10.1109/ICST.2014.50\">https://doi.org/10.1109/ICST.2014.50</a>","ama":"Daca P, Henzinger TA, Krenn W, Nickovic D. Compositional specifications for IOCO testing. In: <i>IEEE 7th International Conference on Software Testing, Verification and Validation</i>. IEEE; 2014. doi:<a href=\"https://doi.org/10.1109/ICST.2014.50\">10.1109/ICST.2014.50</a>","chicago":"Daca, Przemyslaw, Thomas A Henzinger, Willibald Krenn, and Dejan Nickovic. “Compositional Specifications for IOCO Testing.” In <i>IEEE 7th International Conference on Software Testing, Verification and Validation</i>. IEEE, 2014. <a href=\"https://doi.org/10.1109/ICST.2014.50\">https://doi.org/10.1109/ICST.2014.50</a>.","mla":"Daca, Przemyslaw, et al. “Compositional Specifications for IOCO Testing.” <i>IEEE 7th International Conference on Software Testing, Verification and Validation</i>, 6823899, IEEE, 2014, doi:<a href=\"https://doi.org/10.1109/ICST.2014.50\">10.1109/ICST.2014.50</a>.","short":"P. Daca, T.A. Henzinger, W. Krenn, D. Nickovic, in:, IEEE 7th International Conference on Software Testing, Verification and Validation, IEEE, 2014.","ieee":"P. Daca, T. A. Henzinger, W. Krenn, and D. Nickovic, “Compositional specifications for IOCO testing,” in <i>IEEE 7th International Conference on Software Testing, Verification and Validation</i>, Cleveland, USA, 2014.","ista":"Daca P, Henzinger TA, Krenn W, Nickovic D. 2014. Compositional specifications for IOCO testing. IEEE 7th International Conference on Software Testing, Verification and Validation. ICST: International Conference on Software Testing, Verification and Validation, 6823899."},"publication_status":"published","quality_controlled":"1","arxiv":1,"oa_version":"Preprint","department":[{"_id":"ToHe"}],"date_published":"2014-03-01T00:00:00Z","article_number":"6823899","day":"01","doi":"10.1109/ICST.2014.50","publication_identifier":{"isbn":["978-1-4799-2255-0"],"issn":["2159-4848"]},"title":"Compositional specifications for IOCO testing","year":"2014","external_id":{"arxiv":["1904.07083"]},"oa":1,"status":"public","date_updated":"2023-09-07T11:58:33Z"},{"quality_controlled":"1","publication_status":"published","citation":{"chicago":"Kelleher, Jerome, Alison Etheridge, and Nicholas H Barton. “Coalescent Simulation in Continuous Space: Algorithms for Large Neighbourhood Size.” <i>Theoretical Population Biology</i>. Academic Press, 2014. <a href=\"https://doi.org/10.1016/j.tpb.2014.05.001\">https://doi.org/10.1016/j.tpb.2014.05.001</a>.","ama":"Kelleher J, Etheridge A, Barton NH. Coalescent simulation in continuous space: Algorithms for large neighbourhood size. <i>Theoretical Population Biology</i>. 2014;95:13-23. doi:<a href=\"https://doi.org/10.1016/j.tpb.2014.05.001\">10.1016/j.tpb.2014.05.001</a>","apa":"Kelleher, J., Etheridge, A., &#38; Barton, N. H. (2014). Coalescent simulation in continuous space: Algorithms for large neighbourhood size. <i>Theoretical Population Biology</i>. Academic Press. <a href=\"https://doi.org/10.1016/j.tpb.2014.05.001\">https://doi.org/10.1016/j.tpb.2014.05.001</a>","ista":"Kelleher J, Etheridge A, Barton NH. 2014. Coalescent simulation in continuous space: Algorithms for large neighbourhood size. Theoretical Population Biology. 95, 13–23.","ieee":"J. Kelleher, A. Etheridge, and N. H. Barton, “Coalescent simulation in continuous space: Algorithms for large neighbourhood size,” <i>Theoretical Population Biology</i>, vol. 95. Academic Press, pp. 13–23, 2014.","short":"J. Kelleher, A. Etheridge, N.H. Barton, Theoretical Population Biology 95 (2014) 13–23.","mla":"Kelleher, Jerome, et al. “Coalescent Simulation in Continuous Space: Algorithms for Large Neighbourhood Size.” <i>Theoretical Population Biology</i>, vol. 95, Academic Press, 2014, pp. 13–23, doi:<a href=\"https://doi.org/10.1016/j.tpb.2014.05.001\">10.1016/j.tpb.2014.05.001</a>."},"date_published":"2014-08-01T00:00:00Z","oa_version":"Published Version","file":[{"date_created":"2018-12-12T10:10:49Z","content_type":"application/pdf","file_id":"4839","creator":"system","date_updated":"2020-07-14T12:45:31Z","checksum":"979d7a8034e9df198f068f0d251f31bd","file_size":569005,"relation":"main_file","access_level":"open_access","file_name":"IST-2015-391-v1+1_1-s2.0-S0040580914000355-main.pdf"}],"department":[{"_id":"NiBa"}],"year":"2014","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png"},"day":"01","doi":"10.1016/j.tpb.2014.05.001","has_accepted_license":"1","title":"Coalescent simulation in continuous space: Algorithms for large neighbourhood size","status":"public","intvolume":"        95","pubrep_id":"391","date_updated":"2021-01-12T06:55:44Z","oa":1,"_id":"2168","abstract":[{"lang":"eng","text":"Many species have an essentially continuous distribution in space, in which there are no natural divisions between randomly mating subpopulations. Yet, the standard approach to modelling these populations is to impose an arbitrary grid of demes, adjusting deme sizes and migration rates in an attempt to capture the important features of the population. Such indirect methods are required because of the failure of the classical models of isolation by distance, which have been shown to have major technical flaws. A recently introduced model of extinction and recolonisation in two dimensions solves these technical problems, and provides a rigorous technical foundation for the study of populations evolving in a spatial continuum. The coalescent process for this model is simply stated, but direct simulation is very inefficient for large neighbourhood sizes. We present efficient and exact algorithms to simulate this coalescent process for arbitrary sample sizes and numbers of loci, and analyse these algorithms in detail."}],"publist_id":"4816","ec_funded":1,"publisher":"Academic Press","project":[{"call_identifier":"FP7","grant_number":"250152","name":"Limits to selection in biology and in evolutionary computation","_id":"25B07788-B435-11E9-9278-68D0E5697425"}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","date_created":"2018-12-11T11:56:06Z","page":"13 - 23","volume":95,"ddc":["570"],"file_date_updated":"2020-07-14T12:45:31Z","scopus_import":1,"publication":"Theoretical Population Biology","month":"08","language":[{"iso":"eng"}],"author":[{"last_name":"Kelleher","full_name":"Kelleher, Jerome","first_name":"Jerome"},{"last_name":"Etheridge","first_name":"Alison","full_name":"Etheridge, Alison"},{"last_name":"Barton","first_name":"Nicholas H","full_name":"Barton, Nicholas H","orcid":"0000-0002-8548-5240","id":"4880FE40-F248-11E8-B48F-1D18A9856A87"}],"type":"journal_article"},{"_id":"2169","quality_controlled":"1","publication_status":"published","citation":{"apa":"Barton, N. H., Novak, S., &#38; Paixao, T. (2014). Diverse forms of selection in evolution and computer science. <i>PNAS</i>. National Academy of Sciences. <a href=\"https://doi.org/10.1073/pnas.1410107111\">https://doi.org/10.1073/pnas.1410107111</a>","ama":"Barton NH, Novak S, Paixao T. Diverse forms of selection in evolution and computer science. <i>PNAS</i>. 2014;111(29):10398-10399. doi:<a href=\"https://doi.org/10.1073/pnas.1410107111\">10.1073/pnas.1410107111</a>","chicago":"Barton, Nicholas H, Sebastian Novak, and Tiago Paixao. “Diverse Forms of Selection in Evolution and Computer Science.” <i>PNAS</i>. National Academy of Sciences, 2014. <a href=\"https://doi.org/10.1073/pnas.1410107111\">https://doi.org/10.1073/pnas.1410107111</a>.","ieee":"N. H. Barton, S. Novak, and T. Paixao, “Diverse forms of selection in evolution and computer science,” <i>PNAS</i>, vol. 111, no. 29. National Academy of Sciences, pp. 10398–10399, 2014.","mla":"Barton, Nicholas H., et al. “Diverse Forms of Selection in Evolution and Computer Science.” <i>PNAS</i>, vol. 111, no. 29, National Academy of Sciences, 2014, pp. 10398–99, doi:<a href=\"https://doi.org/10.1073/pnas.1410107111\">10.1073/pnas.1410107111</a>.","short":"N.H. Barton, S. Novak, T. Paixao, PNAS 111 (2014) 10398–10399.","ista":"Barton NH, Novak S, Paixao T. 2014. Diverse forms of selection in evolution and computer science. PNAS. 111(29), 10398–10399."},"publist_id":"4815","date_published":"2014-07-22T00:00:00Z","publisher":"National Academy of Sciences","oa_version":"Submitted Version","main_file_link":[{"open_access":"1","url":"http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4115508/"}],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","department":[{"_id":"NiBa"}],"year":"2014","date_created":"2018-12-11T11:56:07Z","page":"10398 - 10399","day":"22","doi":"10.1073/pnas.1410107111","volume":111,"title":"Diverse forms of selection in evolution and computer science","issue":"29","status":"public","scopus_import":1,"intvolume":"       111","date_updated":"2021-01-12T06:55:45Z","publication":"PNAS","oa":1,"month":"07","author":[{"orcid":"0000-0002-8548-5240","id":"4880FE40-F248-11E8-B48F-1D18A9856A87","last_name":"Barton","first_name":"Nicholas H","full_name":"Barton, Nicholas H"},{"id":"461468AE-F248-11E8-B48F-1D18A9856A87","first_name":"Sebastian","full_name":"Novak, Sebastian","last_name":"Novak"},{"last_name":"Paixao","full_name":"Paixao, Tiago","first_name":"Tiago","orcid":"0000-0003-2361-3953","id":"2C5658E6-F248-11E8-B48F-1D18A9856A87"}],"language":[{"iso":"eng"}],"type":"journal_article"}]
