[{"quality_controlled":"1","language":[{"iso":"eng"}],"type":"journal_article","publisher":"Wiley-Blackwell","intvolume":"        23","date_created":"2018-12-11T11:56:07Z","scopus_import":1,"date_published":"2014-01-01T00:00:00Z","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4814","department":[{"_id":"NiBa"}],"page":"198 - 211","related_material":{"record":[{"id":"9754","status":"public","relation":"research_data"}]},"date_updated":"2023-02-23T14:07:09Z","publication":"Molecular Ecology","year":"2014","oa":1,"volume":23,"has_accepted_license":"1","file":[{"date_updated":"2020-07-14T12:45:31Z","checksum":"4de1ab255976a8ae77eb0e55ad62ecc9","content_type":"application/pdf","access_level":"open_access","file_size":807444,"relation":"main_file","creator":"system","file_name":"IST-2016-559-v1+1_Hearn_et_al.pdf","date_created":"2018-12-12T10:07:52Z","file_id":"4651"},{"file_id":"4652","date_created":"2018-12-12T10:07:53Z","file_name":"IST-2016-559-v1+2_Hearn_et_al_Suppl.pdf","relation":"main_file","creator":"system","file_size":1518088,"date_updated":"2020-07-14T12:45:31Z","access_level":"open_access","content_type":"application/pdf","checksum":"01a8073e071c088500425f910b0f1f71"}],"oa_version":"Submitted Version","ddc":["570"],"file_date_updated":"2020-07-14T12:45:31Z","month":"01","citation":{"ieee":"J. Hearn, G. Stone, L. Bunnefeld, J. Nicholls, N. H. Barton, and K. Lohse, “Likelihood-based inference of population history from low-coverage de novo genome assemblies,” <i>Molecular Ecology</i>, vol. 23, no. 1. Wiley-Blackwell, pp. 198–211, 2014.","apa":"Hearn, J., Stone, G., Bunnefeld, L., Nicholls, J., Barton, N. H., &#38; Lohse, K. (2014). Likelihood-based inference of population history from low-coverage de novo genome assemblies. <i>Molecular Ecology</i>. Wiley-Blackwell. <a href=\"https://doi.org/10.1111/mec.12578\">https://doi.org/10.1111/mec.12578</a>","ista":"Hearn J, Stone G, Bunnefeld L, Nicholls J, Barton NH, Lohse K. 2014. Likelihood-based inference of population history from low-coverage de novo genome assemblies. Molecular Ecology. 23(1), 198–211.","ama":"Hearn J, Stone G, Bunnefeld L, Nicholls J, Barton NH, Lohse K. Likelihood-based inference of population history from low-coverage de novo genome assemblies. <i>Molecular Ecology</i>. 2014;23(1):198-211. doi:<a href=\"https://doi.org/10.1111/mec.12578\">10.1111/mec.12578</a>","short":"J. Hearn, G. Stone, L. Bunnefeld, J. Nicholls, N.H. Barton, K. Lohse, Molecular Ecology 23 (2014) 198–211.","mla":"Hearn, Jack, et al. “Likelihood-Based Inference of Population History from Low-Coverage de Novo Genome Assemblies.” <i>Molecular Ecology</i>, vol. 23, no. 1, Wiley-Blackwell, 2014, pp. 198–211, doi:<a href=\"https://doi.org/10.1111/mec.12578\">10.1111/mec.12578</a>.","chicago":"Hearn, Jack, Graham Stone, Lynsey Bunnefeld, James Nicholls, Nicholas H Barton, and Konrad Lohse. “Likelihood-Based Inference of Population History from Low-Coverage de Novo Genome Assemblies.” <i>Molecular Ecology</i>. Wiley-Blackwell, 2014. <a href=\"https://doi.org/10.1111/mec.12578\">https://doi.org/10.1111/mec.12578</a>."},"pubrep_id":"559","day":"01","publication_status":"published","acknowledgement":"This work was funded by NERC grants to G Stone, J Nicholls, K Lohse and N Barton (NE/J010499, NBAF375, NE/E014453/1 and NER/B/S2003/00856).","status":"public","doi":"10.1111/mec.12578","abstract":[{"text":" Short-read sequencing technologies have in principle made it feasible to draw detailed inferences about the recent history of any organism. In practice, however, this remains challenging due to the difficulty of genome assembly in most organisms and the lack of statistical methods powerful enough to discriminate between recent, nonequilibrium histories. We address both the assembly and inference challenges. We develop a bioinformatic pipeline for generating outgroup-rooted alignments of orthologous sequence blocks from de novo low-coverage short-read data for a small number of genomes, and show how such sequence blocks can be used to fit explicit models of population divergence and admixture in a likelihood framework. To illustrate our approach, we reconstruct the Pleistocene history of an oak-feeding insect (the oak gallwasp Biorhiza pallida), which, in common with many other taxa, was restricted during Pleistocene ice ages to a longitudinal series of southern refugia spanning the Western Palaearctic. Our analysis of sequence blocks sampled from a single genome from each of three major glacial refugia reveals support for an unexpected history dominated by recent admixture. Despite the fact that 80% of the genome is affected by admixture during the last glacial cycle, we are able to infer the deeper divergence history of these populations. These inferences are robust to variation in block length, mutation model and the sampling location of individual genomes within refugia. This combination of de novo assembly and numerical likelihood calculation provides a powerful framework for estimating recent population history that can be applied to any organism without the need for prior genetic resources.","lang":"eng"}],"issue":"1","_id":"2170","title":"Likelihood-based inference of population history from low-coverage de novo genome assemblies","author":[{"first_name":"Jack","last_name":"Hearn","full_name":"Hearn, Jack"},{"full_name":"Stone, Graham","last_name":"Stone","first_name":"Graham"},{"full_name":"Bunnefeld, Lynsey","last_name":"Bunnefeld","first_name":"Lynsey"},{"first_name":"James","last_name":"Nicholls","full_name":"Nicholls, James"},{"full_name":"Barton, Nicholas H","last_name":"Barton","id":"4880FE40-F248-11E8-B48F-1D18A9856A87","first_name":"Nicholas H","orcid":"0000-0002-8548-5240"},{"full_name":"Lohse, Konrad","last_name":"Lohse","first_name":"Konrad"}]},{"issue":"PART 3","abstract":[{"lang":"eng","text":"We present LS-CRF, a new method for training cyclic Conditional Random Fields (CRFs) from large datasets that is inspired by classical closed-form expressions for the maximum likelihood parameters of a generative graphical model with tree topology. Training a CRF with LS-CRF requires only solving a set of independent regression problems, each of which can be solved efficiently in closed form or by an iterative solver. This makes LS-CRF orders of magnitude faster than classical CRF training based on probabilistic inference, and at the same time more flexible and easier to implement than other approximate techniques, such as pseudolikelihood or piecewise training. We apply LS-CRF to the task of semantic image segmentation, showing that it achieves on par accuracy to other training techniques at higher speed, thereby allowing efficient CRF training from very large training sets. For example, training a linearly parameterized pairwise CRF on 150,000 images requires less than one hour on a modern workstation."}],"doi":"10.1007/978-3-319-10578-9_36","author":[{"first_name":"Alexander","id":"2D157DB6-F248-11E8-B48F-1D18A9856A87","last_name":"Kolesnikov","full_name":"Kolesnikov, Alexander"},{"first_name":"Matthieu","full_name":"Guillaumin, Matthieu","last_name":"Guillaumin"},{"first_name":"Vittorio","full_name":"Ferrari, Vittorio","last_name":"Ferrari"},{"full_name":"Lampert, Christoph","last_name":"Lampert","id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","first_name":"Christoph","orcid":"0000-0001-8622-7887"}],"title":"Closed-form approximate CRF training for scalable image segmentation","editor":[{"first_name":"David","full_name":"Fleet, David","last_name":"Fleet"},{"full_name":"Pajdla, Tomas","last_name":"Pajdla","first_name":"Tomas"},{"last_name":"Schiele","full_name":"Schiele, Bernt","first_name":"Bernt"},{"first_name":"Tinne","last_name":"Tuytelaars","full_name":"Tuytelaars, Tinne"}],"_id":"2171","status":"public","publication_status":"published","ec_funded":1,"project":[{"name":"Lifelong Learning of Visual Scene Understanding","call_identifier":"FP7","_id":"2532554C-B435-11E9-9278-68D0E5697425","grant_number":"308036"}],"conference":{"location":"Zurich, Switzerland","start_date":"2014-09-06","end_date":"2014-09-12","name":"ECCV: European Conference on Computer Vision"},"oa_version":"Submitted Version","day":"01","citation":{"chicago":"Kolesnikov, Alexander, Matthieu Guillaumin, Vittorio Ferrari, and Christoph Lampert. “Closed-Form Approximate CRF Training for Scalable Image Segmentation.” In <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, edited by David Fleet, Tomas Pajdla, Bernt Schiele, and Tinne Tuytelaars, 8691:550–65. Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-319-10578-9_36\">https://doi.org/10.1007/978-3-319-10578-9_36</a>.","mla":"Kolesnikov, Alexander, et al. “Closed-Form Approximate CRF Training for Scalable Image Segmentation.” <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, edited by David Fleet et al., vol. 8691, no. PART 3, Springer, 2014, pp. 550–65, doi:<a href=\"https://doi.org/10.1007/978-3-319-10578-9_36\">10.1007/978-3-319-10578-9_36</a>.","apa":"Kolesnikov, A., Guillaumin, M., Ferrari, V., &#38; Lampert, C. (2014). Closed-form approximate CRF training for scalable image segmentation. In D. Fleet, T. Pajdla, B. Schiele, &#38; T. Tuytelaars (Eds.), <i>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i> (Vol. 8691, pp. 550–565). Zurich, Switzerland: Springer. <a href=\"https://doi.org/10.1007/978-3-319-10578-9_36\">https://doi.org/10.1007/978-3-319-10578-9_36</a>","ieee":"A. Kolesnikov, M. Guillaumin, V. Ferrari, and C. Lampert, “Closed-form approximate CRF training for scalable image segmentation,” in <i>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, Zurich, Switzerland, 2014, vol. 8691, no. PART 3, pp. 550–565.","short":"A. Kolesnikov, M. Guillaumin, V. Ferrari, C. Lampert, in:, D. Fleet, T. Pajdla, B. Schiele, T. Tuytelaars (Eds.), Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 2014, pp. 550–565.","ista":"Kolesnikov A, Guillaumin M, Ferrari V, Lampert C. 2014. Closed-form approximate CRF training for scalable image segmentation. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). ECCV: European Conference on Computer Vision, LNCS, vol. 8691, 550–565.","ama":"Kolesnikov A, Guillaumin M, Ferrari V, Lampert C. Closed-form approximate CRF training for scalable image segmentation. In: Fleet D, Pajdla T, Schiele B, Tuytelaars T, eds. <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>. Vol 8691. Springer; 2014:550-565. doi:<a href=\"https://doi.org/10.1007/978-3-319-10578-9_36\">10.1007/978-3-319-10578-9_36</a>"},"month":"09","volume":8691,"year":"2014","alternative_title":["LNCS"],"oa":1,"page":"550 - 565","publication":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","date_updated":"2021-01-12T06:55:46Z","date_published":"2014-09-01T00:00:00Z","scopus_import":1,"date_created":"2018-12-11T11:56:07Z","department":[{"_id":"ChLa"}],"publist_id":"4813","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","language":[{"iso":"eng"}],"quality_controlled":"1","type":"conference","intvolume":"      8691","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1403.7057"}],"publisher":"Springer"},{"doi":"10.1109/CVPR.2014.182","year":"2014","abstract":[{"lang":"eng","text":"Fisher Kernels and Deep Learning were two developments with significant impact on large-scale object categorization in the last years. Both approaches were shown to achieve state-of-the-art results on large-scale object categorization datasets, such as ImageNet. Conceptually, however, they are perceived as very different and it is not uncommon for heated debates to spring up when advocates of both paradigms meet at conferences or workshops. In this work, we emphasize the similarities between both architectures rather than their differences and we argue that such a unified view allows us to transfer ideas from one domain to the other. As a concrete example we introduce a method for learning a support vector machine classifier with Fisher kernel at the same time as a task-specific data representation. We reinterpret the setting as a multi-layer feed forward network. Its final layer is the classifier, parameterized by a weight vector, and the two previous layers compute Fisher vectors, parameterized by the coefficients of a Gaussian mixture model. We introduce a gradient descent based learning algorithm that, in contrast to other feature learning techniques, is not just derived from intuition or biological analogy, but has a theoretical justification in the framework of statistical learning theory. Our experiments show that the new training procedure leads to significant improvements in classification accuracy while preserving the modularity and geometric interpretability of a support vector machine setup."}],"_id":"2172","author":[{"full_name":"Sydorov, Vladyslav","last_name":"Sydorov","first_name":"Vladyslav"},{"first_name":"Mayu","full_name":"Sakurada, Mayu","last_name":"Sakurada"},{"orcid":"0000-0001-8622-7887","last_name":"Lampert","full_name":"Lampert, Christoph","first_name":"Christoph","id":"40C20FD2-F248-11E8-B48F-1D18A9856A87"}],"title":"Deep Fisher Kernels – End to end learning of the Fisher Kernel GMM parameters","ec_funded":1,"page":"1402 - 1409","status":"public","publication_status":"published","date_updated":"2021-01-12T06:55:46Z","project":[{"name":"Lifelong Learning of Visual Scene Understanding","call_identifier":"FP7","grant_number":"308036","_id":"2532554C-B435-11E9-9278-68D0E5697425"}],"publication":"Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition","conference":{"name":"CVPR: Computer Vision and Pattern Recognition","location":"Columbus, USA","start_date":"2014-06-23","end_date":"2014-06-28"},"scopus_import":1,"oa_version":"None","date_created":"2018-12-11T11:56:08Z","date_published":"2014-09-24T00:00:00Z","publist_id":"4812","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","month":"09","day":"24","department":[{"_id":"ChLa"}],"citation":{"chicago":"Sydorov, Vladyslav, Mayu Sakurada, and Christoph Lampert. “Deep Fisher Kernels – End to End Learning of the Fisher Kernel GMM Parameters.” In <i>Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition</i>, 1402–9. IEEE, 2014. <a href=\"https://doi.org/10.1109/CVPR.2014.182\">https://doi.org/10.1109/CVPR.2014.182</a>.","mla":"Sydorov, Vladyslav, et al. “Deep Fisher Kernels – End to End Learning of the Fisher Kernel GMM Parameters.” <i>Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition</i>, IEEE, 2014, pp. 1402–09, doi:<a href=\"https://doi.org/10.1109/CVPR.2014.182\">10.1109/CVPR.2014.182</a>.","ama":"Sydorov V, Sakurada M, Lampert C. Deep Fisher Kernels – End to end learning of the Fisher Kernel GMM parameters. In: <i>Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition</i>. IEEE; 2014:1402-1409. doi:<a href=\"https://doi.org/10.1109/CVPR.2014.182\">10.1109/CVPR.2014.182</a>","short":"V. Sydorov, M. Sakurada, C. Lampert, in:, Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, IEEE, 2014, pp. 1402–1409.","ista":"Sydorov V, Sakurada M, Lampert C. 2014. Deep Fisher Kernels – End to end learning of the Fisher Kernel GMM parameters. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR: Computer Vision and Pattern Recognition, 1402–1409.","ieee":"V. Sydorov, M. Sakurada, and C. Lampert, “Deep Fisher Kernels – End to end learning of the Fisher Kernel GMM parameters,” in <i>Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition</i>, Columbus, USA, 2014, pp. 1402–1409.","apa":"Sydorov, V., Sakurada, M., &#38; Lampert, C. (2014). Deep Fisher Kernels – End to end learning of the Fisher Kernel GMM parameters. In <i>Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition</i> (pp. 1402–1409). Columbus, USA: IEEE. <a href=\"https://doi.org/10.1109/CVPR.2014.182\">https://doi.org/10.1109/CVPR.2014.182</a>"},"language":[{"iso":"eng"}],"quality_controlled":"1","type":"conference","publisher":"IEEE"},{"year":"2014","oa":1,"publication":"Proceedings of the British Machine Vision Conference 2014","date_updated":"2021-01-12T06:55:46Z","date_published":"2014-09-01T00:00:00Z","date_created":"2018-12-11T11:56:08Z","scopus_import":1,"department":[{"_id":"ChLa"}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publist_id":"4811","type":"conference","quality_controlled":"1","language":[{"iso":"eng"}],"publisher":"BMVA Press","abstract":[{"lang":"eng","text":"In this work we introduce a new approach to co-classification, i.e. the task of jointly classifying multiple, otherwise independent, data samples. The method we present, named CoConut, is based on the idea of adding a regularizer in the label space to encode certain priors on the resulting labelings. A regularizer that encourages labelings that are smooth across the test set, for instance, can be seen as a test-time variant of the cluster assumption, which has been proven useful at training time in semi-supervised learning. A regularizer that introduces a preference for certain class proportions can be regarded as a prior distribution on the class labels. CoConut can build on existing classifiers without making any assumptions on how they were obtained and without the need to re-train them. The use of a regularizer adds a new level of flexibility. It allows the integration of potentially new information at test time, even in other modalities than what the classifiers were trained on. We evaluate our framework on six datasets, reporting a clear performance gain in classification accuracy compared to the standard classification setup that predicts labels for each test sample separately.\r\n"}],"title":"CoConut: Co-classification with output space regularization","author":[{"full_name":"Khamis, Sameh","last_name":"Khamis","first_name":"Sameh"},{"orcid":"0000-0001-8622-7887","id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","first_name":"Christoph","full_name":"Lampert, Christoph","last_name":"Lampert"}],"_id":"2173","publication_status":"published","status":"public","ec_funded":1,"project":[{"_id":"2532554C-B435-11E9-9278-68D0E5697425","grant_number":"308036","name":"Lifelong Learning of Visual Scene Understanding","call_identifier":"FP7"}],"oa_version":"Published Version","conference":{"name":"BMVC: British Machine Vision Conference","start_date":"2014-09-01","location":"Nottingham, UK","end_date":"2014-09-05"},"pubrep_id":"490","citation":{"ama":"Khamis S, Lampert C. CoConut: Co-classification with output space regularization. In: <i>Proceedings of the British Machine Vision Conference 2014</i>. BMVA Press; 2014.","ista":"Khamis S, Lampert C. 2014. CoConut: Co-classification with output space regularization. Proceedings of the British Machine Vision Conference 2014. BMVC: British Machine Vision Conference.","short":"S. Khamis, C. Lampert, in:, Proceedings of the British Machine Vision Conference 2014, BMVA Press, 2014.","ieee":"S. Khamis and C. Lampert, “CoConut: Co-classification with output space regularization,” in <i>Proceedings of the British Machine Vision Conference 2014</i>, Nottingham, UK, 2014.","apa":"Khamis, S., &#38; Lampert, C. (2014). CoConut: Co-classification with output space regularization. In <i>Proceedings of the British Machine Vision Conference 2014</i>. Nottingham, UK: BMVA Press.","chicago":"Khamis, Sameh, and Christoph Lampert. “CoConut: Co-Classification with Output Space Regularization.” In <i>Proceedings of the British Machine Vision Conference 2014</i>. BMVA Press, 2014.","mla":"Khamis, Sameh, and Christoph Lampert. “CoConut: Co-Classification with Output Space Regularization.” <i>Proceedings of the British Machine Vision Conference 2014</i>, BMVA Press, 2014."},"day":"01","month":"09","ddc":["000"],"file_date_updated":"2020-07-14T12:45:31Z","has_accepted_license":"1","file":[{"file_name":"IST-2016-490-v1+1_khamis-bmvc2014.pdf","file_size":408172,"creator":"system","relation":"main_file","date_updated":"2020-07-14T12:45:31Z","access_level":"open_access","content_type":"application/pdf","checksum":"c4c6d3efdb8ee648faf3e76849839ce2","file_id":"4683","date_created":"2018-12-12T10:08:23Z"}]},{"year":"2014","oa":1,"page":"749 - 767","publication":"Genetics","date_updated":"2021-01-12T06:55:47Z","date_published":"2014-06-01T00:00:00Z","date_created":"2018-12-11T11:56:08Z","scopus_import":1,"department":[{"_id":"NiBa"}],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4809","type":"journal_article","quality_controlled":"1","language":[{"iso":"eng"}],"publisher":"Genetics Society of America","intvolume":"       197","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1404.1017"}],"abstract":[{"text":"When polygenic traits are under stabilizing selection, many different combinations of alleles allow close adaptation to the optimum. If alleles have equal effects, all combinations that result in the same deviation from the optimum are equivalent. Furthermore, the genetic variance that is maintained by mutation-selection balance is 2μ/S per locus, where μ is the mutation rate and S the strength of stabilizing selection. In reality, alleles vary in their effects, making the fitness landscape asymmetric and complicating analysis of the equilibria. We show that that the resulting genetic variance depends on the fraction of alleles near fixation, which contribute by 2μ/S, and on the total mutational effects of alleles that are at intermediate frequency. The inpplayfi between stabilizing selection and mutation leads to a sharp transition: alleles with effects smaller than a threshold value of 2 remain polymorphic, whereas those with larger effects are fixed. The genetic load in equilibrium is less than for traits of equal effects, and the fitness equilibria are more similar. We find p the optimum is displaced, alleles with effects close to the threshold value sweep first, and their rate of increase is bounded by Long-term response leads in general to well-adapted traits, unlike the case of equal effects that often end up at a suboptimal fitness peak. However, the particular peaks to which the populations converge are extremely sensitive to the initial states and to the speed of the shift of the optimum trait value.","lang":"eng"}],"issue":"2","doi":"10.1534/genetics.113.159111","title":"Stability and response of polygenic traits to stabilizing selection and mutation","author":[{"last_name":"De Vladar","full_name":"De Vladar, Harold","first_name":"Harold"},{"last_name":"Barton","full_name":"Barton, Nicholas H","first_name":"Nicholas H","id":"4880FE40-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8548-5240"}],"_id":"2174","status":"public","publication_status":"published","ec_funded":1,"project":[{"name":"Limits to selection in biology and in evolutionary computation","call_identifier":"FP7","grant_number":"250152","_id":"25B07788-B435-11E9-9278-68D0E5697425"}],"oa_version":"Submitted Version","citation":{"ama":"De Vladar H, Barton NH. Stability and response of polygenic traits to stabilizing selection and mutation. <i>Genetics</i>. 2014;197(2):749-767. doi:<a href=\"https://doi.org/10.1534/genetics.113.159111\">10.1534/genetics.113.159111</a>","ista":"De Vladar H, Barton NH. 2014. Stability and response of polygenic traits to stabilizing selection and mutation. Genetics. 197(2), 749–767.","short":"H. De Vladar, N.H. Barton, Genetics 197 (2014) 749–767.","ieee":"H. De Vladar and N. H. Barton, “Stability and response of polygenic traits to stabilizing selection and mutation,” <i>Genetics</i>, vol. 197, no. 2. Genetics Society of America, pp. 749–767, 2014.","apa":"De Vladar, H., &#38; Barton, N. H. (2014). Stability and response of polygenic traits to stabilizing selection and mutation. <i>Genetics</i>. Genetics Society of America. <a href=\"https://doi.org/10.1534/genetics.113.159111\">https://doi.org/10.1534/genetics.113.159111</a>","chicago":"De Vladar, Harold, and Nicholas H Barton. “Stability and Response of Polygenic Traits to Stabilizing Selection and Mutation.” <i>Genetics</i>. Genetics Society of America, 2014. <a href=\"https://doi.org/10.1534/genetics.113.159111\">https://doi.org/10.1534/genetics.113.159111</a>.","mla":"De Vladar, Harold, and Nicholas H. Barton. “Stability and Response of Polygenic Traits to Stabilizing Selection and Mutation.” <i>Genetics</i>, vol. 197, no. 2, Genetics Society of America, 2014, pp. 749–67, doi:<a href=\"https://doi.org/10.1534/genetics.113.159111\">10.1534/genetics.113.159111</a>."},"day":"01","month":"06","volume":197},{"oa":1,"year":"2014","date_updated":"2023-10-17T08:34:27Z","publication":"Future Neurology","page":"323 - 340","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publist_id":"4806","department":[{"_id":"SiHi"}],"date_created":"2018-12-11T11:56:09Z","scopus_import":"1","date_published":"2014-05-01T00:00:00Z","publisher":"Future Science Group","intvolume":"         9","language":[{"iso":"eng"}],"type":"journal_article","quality_controlled":"1","_id":"2175","title":"Monitoring neurogenesis in the cerebral cortex: an update","author":[{"id":"2C67902A-F248-11E8-B48F-1D18A9856A87","first_name":"Maria P","full_name":"Postiglione, Maria P","last_name":"Postiglione"},{"orcid":"0000-0003-2279-1061","last_name":"Hippenmeyer","full_name":"Hippenmeyer, Simon","first_name":"Simon","id":"37B36620-F248-11E8-B48F-1D18A9856A87"}],"doi":"10.2217/fnl.14.18","abstract":[{"lang":"eng","text":"The cerebral cortex, the seat of our cognitive abilities, is composed of an intricate network of billions of excitatory projection and inhibitory interneurons. Postmitotic cortical neurons are generated by a diverse set of neural stem cell progenitors within dedicated zones and defined periods of neurogenesis during embryonic development. Disruptions in neurogenesis can lead to alterations in the neuronal cytoarchitecture, which is thought to represent a major underlying cause for several neurological disorders, including microcephaly, autism and epilepsy. Although a number of signaling pathways regulating neurogenesis have been described, the precise cellular and molecular mechanisms regulating the functional neural stem cell properties in cortical neurogenesis remain unclear. Here, we discuss the most up-to-date strategies to monitor the fundamental mechanistic parameters of neuronal progenitor proliferation, and recent advances deciphering the logic and dynamics of neurogenesis."}],"issue":"3","project":[{"name":"Molecular Mechanisms of Cerebral Cortex Development","call_identifier":"FP7","_id":"25D61E48-B435-11E9-9278-68D0E5697425","grant_number":"618444"}],"publication_identifier":{"eissn":["1748-6971"],"issn":["1479-6708"]},"ec_funded":1,"status":"public","publication_status":"published","month":"05","ddc":["570"],"file_date_updated":"2020-07-14T12:45:31Z","pubrep_id":"528","citation":{"chicago":"Postiglione, Maria P, and Simon Hippenmeyer. “Monitoring Neurogenesis in the Cerebral Cortex: An Update.” <i>Future Neurology</i>. Future Science Group, 2014. <a href=\"https://doi.org/10.2217/fnl.14.18\">https://doi.org/10.2217/fnl.14.18</a>.","mla":"Postiglione, Maria P., and Simon Hippenmeyer. “Monitoring Neurogenesis in the Cerebral Cortex: An Update.” <i>Future Neurology</i>, vol. 9, no. 3, Future Science Group, 2014, pp. 323–40, doi:<a href=\"https://doi.org/10.2217/fnl.14.18\">10.2217/fnl.14.18</a>.","apa":"Postiglione, M. P., &#38; Hippenmeyer, S. (2014). Monitoring neurogenesis in the cerebral cortex: an update. <i>Future Neurology</i>. Future Science Group. <a href=\"https://doi.org/10.2217/fnl.14.18\">https://doi.org/10.2217/fnl.14.18</a>","ieee":"M. P. Postiglione and S. Hippenmeyer, “Monitoring neurogenesis in the cerebral cortex: an update,” <i>Future Neurology</i>, vol. 9, no. 3. Future Science Group, pp. 323–340, 2014.","short":"M.P. Postiglione, S. Hippenmeyer, Future Neurology 9 (2014) 323–340.","ama":"Postiglione MP, Hippenmeyer S. Monitoring neurogenesis in the cerebral cortex: an update. <i>Future Neurology</i>. 2014;9(3):323-340. doi:<a href=\"https://doi.org/10.2217/fnl.14.18\">10.2217/fnl.14.18</a>","ista":"Postiglione MP, Hippenmeyer S. 2014. Monitoring neurogenesis in the cerebral cortex: an update. Future Neurology. 9(3), 323–340."},"day":"01","oa_version":"Published Version","license":"https://creativecommons.org/licenses/by-nc-nd/4.0/","file":[{"date_updated":"2020-07-14T12:45:31Z","content_type":"application/pdf","checksum":"ba06659ecadabceec9a37dd8c4586dce","access_level":"open_access","relation":"main_file","file_size":3848424,"creator":"system","file_name":"IST-2016-528-v1+1_fnl.14.18.pdf","date_created":"2018-12-12T10:10:25Z","file_id":"4812"}],"tmp":{"name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","image":"/images/cc_by_nc_nd.png","short":"CC BY-NC-ND (4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode"},"article_processing_charge":"No","volume":9,"has_accepted_license":"1"},{"scopus_import":1,"date_created":"2018-12-11T11:56:09Z","oa_version":"None","date_published":"2014-05-29T00:00:00Z","publist_id":"4807","month":"05","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","day":"29","department":[{"_id":"PeJo"}],"citation":{"chicago":"Studer, Daniel, Shanting Zhao, Xuejun Chai, Peter M Jonas, Werner Graber, Sigrun Nestel, and Michael Frotscher. “Capture of Activity-Induced Ultrastructural Changes at Synapses by High-Pressure Freezing of Brain Tissue.” <i>Nature Protocols</i>. Nature Publishing Group, 2014. <a href=\"https://doi.org/10.1038/nprot.2014.099\">https://doi.org/10.1038/nprot.2014.099</a>.","mla":"Studer, Daniel, et al. “Capture of Activity-Induced Ultrastructural Changes at Synapses by High-Pressure Freezing of Brain Tissue.” <i>Nature Protocols</i>, vol. 9, no. 6, Nature Publishing Group, 2014, pp. 1480–95, doi:<a href=\"https://doi.org/10.1038/nprot.2014.099\">10.1038/nprot.2014.099</a>.","apa":"Studer, D., Zhao, S., Chai, X., Jonas, P. M., Graber, W., Nestel, S., &#38; Frotscher, M. (2014). Capture of activity-induced ultrastructural changes at synapses by high-pressure freezing of brain tissue. <i>Nature Protocols</i>. Nature Publishing Group. <a href=\"https://doi.org/10.1038/nprot.2014.099\">https://doi.org/10.1038/nprot.2014.099</a>","ieee":"D. Studer <i>et al.</i>, “Capture of activity-induced ultrastructural changes at synapses by high-pressure freezing of brain tissue,” <i>Nature Protocols</i>, vol. 9, no. 6. Nature Publishing Group, pp. 1480–1495, 2014.","ista":"Studer D, Zhao S, Chai X, Jonas PM, Graber W, Nestel S, Frotscher M. 2014. Capture of activity-induced ultrastructural changes at synapses by high-pressure freezing of brain tissue. Nature Protocols. 9(6), 1480–1495.","short":"D. Studer, S. Zhao, X. Chai, P.M. Jonas, W. Graber, S. Nestel, M. Frotscher, Nature Protocols 9 (2014) 1480–1495.","ama":"Studer D, Zhao S, Chai X, et al. Capture of activity-induced ultrastructural changes at synapses by high-pressure freezing of brain tissue. <i>Nature Protocols</i>. 2014;9(6):1480-1495. doi:<a href=\"https://doi.org/10.1038/nprot.2014.099\">10.1038/nprot.2014.099</a>"},"quality_controlled":"1","type":"journal_article","language":[{"iso":"eng"}],"volume":9,"intvolume":"         9","publisher":"Nature Publishing Group","doi":"10.1038/nprot.2014.099","year":"2014","issue":"6","abstract":[{"text":"Electron microscopy (EM) allows for the simultaneous visualization of all tissue components at high resolution. However, the extent to which conventional aldehyde fixation and ethanol dehydration of the tissue alter the fine structure of cells and organelles, thereby preventing detection of subtle structural changes induced by an experiment, has remained an issue. Attempts have been made to rapidly freeze tissue to preserve native ultrastructure. Shock-freezing of living tissue under high pressure (high-pressure freezing, HPF) followed by cryosubstitution of the tissue water avoids aldehyde fixation and dehydration in ethanol; the tissue water is immobilized in â ̂1/450 ms, and a close-to-native fine structure of cells, organelles and molecules is preserved. Here we describe a protocol for HPF that is useful to monitor ultrastructural changes associated with functional changes at synapses in the brain but can be applied to many other tissues as well. The procedure requires a high-pressure freezer and takes a minimum of 7 d but can be paused at several points.","lang":"eng"}],"_id":"2176","author":[{"full_name":"Studer, Daniel","last_name":"Studer","first_name":"Daniel"},{"last_name":"Zhao","full_name":"Zhao, Shanting","first_name":"Shanting"},{"first_name":"Xuejun","full_name":"Chai, Xuejun","last_name":"Chai"},{"full_name":"Jonas, Peter M","last_name":"Jonas","id":"353C1B58-F248-11E8-B48F-1D18A9856A87","first_name":"Peter M","orcid":"0000-0001-5001-4804"},{"first_name":"Werner","full_name":"Graber, Werner","last_name":"Graber"},{"first_name":"Sigrun","full_name":"Nestel, Sigrun","last_name":"Nestel"},{"full_name":"Frotscher, Michael","last_name":"Frotscher","first_name":"Michael"}],"title":"Capture of activity-induced ultrastructural changes at synapses by high-pressure freezing of brain tissue","page":"1480 - 1495","publication_status":"published","status":"public","project":[{"name":"Glutamaterge synaptische Übertragung und Plastizität in hippocampalen Mikroschaltkreisen","_id":"25BDE9A4-B435-11E9-9278-68D0E5697425","grant_number":"SFB-TR3-TP10B"}],"date_updated":"2021-01-12T06:55:47Z","publication":"Nature Protocols"},{"title":"On the computational complexity of betti numbers reductions from matrix rank","author":[{"orcid":"0000-0002-9823-6833","id":"3FB178DA-F248-11E8-B48F-1D18A9856A87","first_name":"Herbert","full_name":"Edelsbrunner, Herbert","last_name":"Edelsbrunner"},{"first_name":"Salman","id":"4BDBD4F2-F248-11E8-B48F-1D18A9856A87","last_name":"Parsa","full_name":"Parsa, Salman"}],"_id":"2177","abstract":[{"text":"We give evidence for the difficulty of computing Betti numbers of simplicial complexes over a finite field. We do this by reducing the rank computation for sparse matrices with to non-zero entries to computing Betti numbers of simplicial complexes consisting of at most a constant times to simplices. Together with the known reduction in the other direction, this implies that the two problems have the same computational complexity.","lang":"eng"}],"year":"2014","doi":"10.1137/1.9781611973402.11","publication":"Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms","date_updated":"2021-01-12T06:55:48Z","status":"public","publication_status":"published","page":"152 - 160","citation":{"apa":"Edelsbrunner, H., &#38; Parsa, S. (2014). On the computational complexity of betti numbers reductions from matrix rank. In <i>Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms</i> (pp. 152–160). Portland, USA: SIAM. <a href=\"https://doi.org/10.1137/1.9781611973402.11\">https://doi.org/10.1137/1.9781611973402.11</a>","ieee":"H. Edelsbrunner and S. Parsa, “On the computational complexity of betti numbers reductions from matrix rank,” in <i>Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms</i>, Portland, USA, 2014, pp. 152–160.","short":"H. Edelsbrunner, S. Parsa, in:, Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms, SIAM, 2014, pp. 152–160.","ista":"Edelsbrunner H, Parsa S. 2014. On the computational complexity of betti numbers reductions from matrix rank. Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms. SODA: Symposium on Discrete Algorithms, 152–160.","ama":"Edelsbrunner H, Parsa S. On the computational complexity of betti numbers reductions from matrix rank. In: <i>Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms</i>. SIAM; 2014:152-160. doi:<a href=\"https://doi.org/10.1137/1.9781611973402.11\">10.1137/1.9781611973402.11</a>","chicago":"Edelsbrunner, Herbert, and Salman Parsa. “On the Computational Complexity of Betti Numbers Reductions from Matrix Rank.” In <i>Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms</i>, 152–60. SIAM, 2014. <a href=\"https://doi.org/10.1137/1.9781611973402.11\">https://doi.org/10.1137/1.9781611973402.11</a>.","mla":"Edelsbrunner, Herbert, and Salman Parsa. “On the Computational Complexity of Betti Numbers Reductions from Matrix Rank.” <i>Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms</i>, SIAM, 2014, pp. 152–60, doi:<a href=\"https://doi.org/10.1137/1.9781611973402.11\">10.1137/1.9781611973402.11</a>."},"day":"01","department":[{"_id":"HeEd"}],"month":"01","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4805","date_published":"2014-01-01T00:00:00Z","date_created":"2018-12-11T11:56:09Z","oa_version":"None","scopus_import":1,"conference":{"end_date":"2014-01-07","start_date":"2014-01-05","location":"Portland, USA","name":"SODA: Symposium on Discrete Algorithms"},"publisher":"SIAM","quality_controlled":"1","language":[{"iso":"eng"}],"type":"conference"},{"page":"161 - 188","publication":"Beitrage zur Algebra und Geometrie","date_updated":"2021-01-12T06:55:48Z","year":"2014","oa":1,"language":[{"iso":"eng"}],"type":"journal_article","quality_controlled":"1","publisher":"Springer","main_file_link":[{"url":"http://arxiv.org/abs/1204.3070","open_access":"1"}],"intvolume":"        55","date_published":"2014-03-01T00:00:00Z","date_created":"2018-12-11T11:56:10Z","scopus_import":1,"department":[{"_id":"CaUh"}],"publist_id":"4804","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publication_status":"published","acknowledgement":"Research of Martín del Campo supported in part by NSF Grant DMS-915211.","status":"public","abstract":[{"text":"We consider the three-state toric homogeneous Markov chain model (THMC) without loops and initial parameters. At time T, the size of the design matrix is 6 × 3 · 2T-1 and the convex hull of its columns is the model polytope. We study the behavior of this polytope for T ≥ 3 and we show that it is defined by 24 facets for all T ≥ 5. Moreover, we give a complete description of these facets. From this, we deduce that the toric ideal associated with the design matrix is generated by binomials of degree at most 6. Our proof is based on a result due to Sturmfels, who gave a bound on the degree of the generators of a toric ideal, provided the normality of the corresponding toric variety. In our setting, we established the normality of the toric variety associated to the THMC model by studying the geometric properties of the model polytope.","lang":"eng"}],"issue":"1","doi":"10.1007/s13366-013-0178-y","title":"Markov degree of the three-state toric homogeneous Markov chain model","author":[{"first_name":"David","last_name":"Haws","full_name":"Haws, David"},{"id":"4CF47F6A-F248-11E8-B48F-1D18A9856A87","first_name":"Abraham","full_name":"Martin Del Campo Sanchez, Abraham","last_name":"Martin Del Campo Sanchez"},{"first_name":"Akimichi","last_name":"Takemura","full_name":"Takemura, Akimichi"},{"first_name":"Ruriko","full_name":"Yoshida, Ruriko","last_name":"Yoshida"}],"_id":"2178","volume":55,"oa_version":"Submitted Version","citation":{"ista":"Haws D, Martin del Campo Sanchez A, Takemura A, Yoshida R. 2014. Markov degree of the three-state toric homogeneous Markov chain model. Beitrage zur Algebra und Geometrie. 55(1), 161–188.","short":"D. Haws, A. Martin del Campo Sanchez, A. Takemura, R. Yoshida, Beitrage Zur Algebra Und Geometrie 55 (2014) 161–188.","ama":"Haws D, Martin del Campo Sanchez A, Takemura A, Yoshida R. Markov degree of the three-state toric homogeneous Markov chain model. <i>Beitrage zur Algebra und Geometrie</i>. 2014;55(1):161-188. doi:<a href=\"https://doi.org/10.1007/s13366-013-0178-y\">10.1007/s13366-013-0178-y</a>","apa":"Haws, D., Martin del Campo Sanchez, A., Takemura, A., &#38; Yoshida, R. (2014). Markov degree of the three-state toric homogeneous Markov chain model. <i>Beitrage Zur Algebra Und Geometrie</i>. Springer. <a href=\"https://doi.org/10.1007/s13366-013-0178-y\">https://doi.org/10.1007/s13366-013-0178-y</a>","ieee":"D. Haws, A. Martin del Campo Sanchez, A. Takemura, and R. Yoshida, “Markov degree of the three-state toric homogeneous Markov chain model,” <i>Beitrage zur Algebra und Geometrie</i>, vol. 55, no. 1. Springer, pp. 161–188, 2014.","mla":"Haws, David, et al. “Markov Degree of the Three-State Toric Homogeneous Markov Chain Model.” <i>Beitrage Zur Algebra Und Geometrie</i>, vol. 55, no. 1, Springer, 2014, pp. 161–88, doi:<a href=\"https://doi.org/10.1007/s13366-013-0178-y\">10.1007/s13366-013-0178-y</a>.","chicago":"Haws, David, Abraham Martin del Campo Sanchez, Akimichi Takemura, and Ruriko Yoshida. “Markov Degree of the Three-State Toric Homogeneous Markov Chain Model.” <i>Beitrage Zur Algebra Und Geometrie</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s13366-013-0178-y\">https://doi.org/10.1007/s13366-013-0178-y</a>."},"day":"01","month":"03"},{"file_date_updated":"2020-07-14T12:45:31Z","month":"06","ddc":["570"],"day":"09","pubrep_id":"426","citation":{"ieee":"O. H. Ajanki, L. Erdös, and T. H. Krüger, “Local semicircle law with imprimitive variance matrix,” <i>Electronic Communications in Probability</i>, vol. 19. Institute of Mathematical Statistics, 2014.","apa":"Ajanki, O. H., Erdös, L., &#38; Krüger, T. H. (2014). Local semicircle law with imprimitive variance matrix. <i>Electronic Communications in Probability</i>. Institute of Mathematical Statistics. <a href=\"https://doi.org/10.1214/ECP.v19-3121\">https://doi.org/10.1214/ECP.v19-3121</a>","short":"O.H. Ajanki, L. Erdös, T.H. Krüger, Electronic Communications in Probability 19 (2014).","ama":"Ajanki OH, Erdös L, Krüger TH. Local semicircle law with imprimitive variance matrix. <i>Electronic Communications in Probability</i>. 2014;19. doi:<a href=\"https://doi.org/10.1214/ECP.v19-3121\">10.1214/ECP.v19-3121</a>","ista":"Ajanki OH, Erdös L, Krüger TH. 2014. Local semicircle law with imprimitive variance matrix. Electronic Communications in Probability. 19.","mla":"Ajanki, Oskari H., et al. “Local Semicircle Law with Imprimitive Variance Matrix.” <i>Electronic Communications in Probability</i>, vol. 19, Institute of Mathematical Statistics, 2014, doi:<a href=\"https://doi.org/10.1214/ECP.v19-3121\">10.1214/ECP.v19-3121</a>.","chicago":"Ajanki, Oskari H, László Erdös, and Torben H Krüger. “Local Semicircle Law with Imprimitive Variance Matrix.” <i>Electronic Communications in Probability</i>. Institute of Mathematical Statistics, 2014. <a href=\"https://doi.org/10.1214/ECP.v19-3121\">https://doi.org/10.1214/ECP.v19-3121</a>."},"oa_version":"Published Version","file":[{"relation":"main_file","file_size":327322,"creator":"system","file_name":"IST-2016-426-v1+1_3121-17518-1-PB.pdf","date_updated":"2020-07-14T12:45:31Z","checksum":"bd8a041c76d62fe820bf73ff13ce7d1b","content_type":"application/pdf","access_level":"open_access","date_created":"2018-12-12T10:09:06Z","file_id":"4729"}],"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"volume":19,"has_accepted_license":"1","_id":"2179","author":[{"last_name":"Ajanki","full_name":"Ajanki, Oskari H","first_name":"Oskari H","id":"36F2FB7E-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Erdös, László","last_name":"Erdös","id":"4DBD5372-F248-11E8-B48F-1D18A9856A87","first_name":"László","orcid":"0000-0001-5366-9603"},{"full_name":"Krüger, Torben H","last_name":"Krüger","id":"3020C786-F248-11E8-B48F-1D18A9856A87","first_name":"Torben H","orcid":"0000-0002-4821-3297"}],"title":"Local semicircle law with imprimitive variance matrix","doi":"10.1214/ECP.v19-3121","abstract":[{"lang":"eng","text":"We extend the proof of the local semicircle law for generalized Wigner matrices given in MR3068390 to the case when the matrix of variances has an eigenvalue -1. In particular, this result provides a short proof of the optimal local Marchenko-Pastur law at the hard edge (i.e. around zero) for sample covariance matrices X*X, where the variances of the entries of X may vary."}],"status":"public","publication_status":"published","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4803","department":[{"_id":"LaEr"}],"scopus_import":1,"date_created":"2018-12-11T11:56:10Z","date_published":"2014-06-09T00:00:00Z","intvolume":"        19","publisher":"Institute of Mathematical Statistics","language":[{"iso":"eng"}],"quality_controlled":"1","type":"journal_article","oa":1,"year":"2014","date_updated":"2021-01-12T06:55:48Z","publication":"Electronic Communications in Probability"},{"oa":1,"year":"2014","publication":"Machine Learning","date_updated":"2021-01-12T06:55:49Z","page":"129 - 154","department":[{"_id":"ChLa"}],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4802","date_published":"2014-10-01T00:00:00Z","scopus_import":1,"date_created":"2018-12-11T11:56:10Z","main_file_link":[{"url":"https://hal.archives-ouvertes.fr/hal-01009578/document","open_access":"1"}],"intvolume":"        97","publisher":"Springer","language":[{"iso":"eng"}],"quality_controlled":"1","type":"journal_article","author":[{"first_name":"Aurélien","last_name":"Bellet","full_name":"Bellet, Aurélien"},{"full_name":"Habrard, Amaury","last_name":"Habrard","first_name":"Amaury"},{"orcid":"0000-0002-8301-7240","last_name":"Morvant","full_name":"Morvant, Emilie","first_name":"Emilie","id":"4BAC2A72-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Sebban, Marc","last_name":"Sebban","first_name":"Marc"}],"title":"Learning a priori constrained weighted majority votes","_id":"2180","issue":"1-2","abstract":[{"text":"Weighted majority votes allow one to combine the output of several classifiers or voters. MinCq is a recent algorithm for optimizing the weight of each voter based on the minimization of a theoretical bound over the risk of the vote with elegant PAC-Bayesian generalization guarantees. However, while it has demonstrated good performance when combining weak classifiers, MinCq cannot make use of the useful a priori knowledge that one may have when using a mixture of weak and strong voters. In this paper, we propose P-MinCq, an extension of MinCq that can incorporate such knowledge in the form of a  constraint over the distribution of the weights, along with general proofs of convergence that stand in the sample compression setting for data-dependent voters. The approach is applied to a vote of k-NN classifiers with a specific modeling of the voters' performance. P-MinCq significantly outperforms the classic k-NN classifier, a symmetric NN and MinCq using the same voters. We show that it is also competitive with LMNN, a popular metric learning algorithm, and that combining both approaches further reduces the error.","lang":"eng"}],"doi":"10.1007/s10994-014-5462-z","project":[{"call_identifier":"FP7","name":"Lifelong Learning of Visual Scene Understanding","_id":"2532554C-B435-11E9-9278-68D0E5697425","grant_number":"308036"}],"acknowledgement":"This work was funded by the French project SoLSTiCe ANR-13-BS02-01 of the ANR. ","publication_status":"published","status":"public","ec_funded":1,"day":"01","citation":{"ama":"Bellet A, Habrard A, Morvant E, Sebban M. Learning a priori constrained weighted majority votes. <i>Machine Learning</i>. 2014;97(1-2):129-154. doi:<a href=\"https://doi.org/10.1007/s10994-014-5462-z\">10.1007/s10994-014-5462-z</a>","ista":"Bellet A, Habrard A, Morvant E, Sebban M. 2014. Learning a priori constrained weighted majority votes. Machine Learning. 97(1–2), 129–154.","short":"A. Bellet, A. Habrard, E. Morvant, M. Sebban, Machine Learning 97 (2014) 129–154.","apa":"Bellet, A., Habrard, A., Morvant, E., &#38; Sebban, M. (2014). Learning a priori constrained weighted majority votes. <i>Machine Learning</i>. Springer. <a href=\"https://doi.org/10.1007/s10994-014-5462-z\">https://doi.org/10.1007/s10994-014-5462-z</a>","ieee":"A. Bellet, A. Habrard, E. Morvant, and M. Sebban, “Learning a priori constrained weighted majority votes,” <i>Machine Learning</i>, vol. 97, no. 1–2. Springer, pp. 129–154, 2014.","mla":"Bellet, Aurélien, et al. “Learning a Priori Constrained Weighted Majority Votes.” <i>Machine Learning</i>, vol. 97, no. 1–2, Springer, 2014, pp. 129–54, doi:<a href=\"https://doi.org/10.1007/s10994-014-5462-z\">10.1007/s10994-014-5462-z</a>.","chicago":"Bellet, Aurélien, Amaury Habrard, Emilie Morvant, and Marc Sebban. “Learning a Priori Constrained Weighted Majority Votes.” <i>Machine Learning</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s10994-014-5462-z\">https://doi.org/10.1007/s10994-014-5462-z</a>."},"month":"10","oa_version":"Submitted Version","volume":97},{"oa_version":"Preprint","month":"06","day":"16","citation":{"mla":"Botella Soler, Vicente, and Paul Glendinning. “Hierarchy and Polysynchrony in an Adaptive Network .” <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>, vol. 89, no. 6, 062809, American Institute of Physics, 2014, doi:<a href=\"https://doi.org/10.1103/PhysRevE.89.062809\">10.1103/PhysRevE.89.062809</a>.","chicago":"Botella Soler, Vicente, and Paul Glendinning. “Hierarchy and Polysynchrony in an Adaptive Network .” <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>. American Institute of Physics, 2014. <a href=\"https://doi.org/10.1103/PhysRevE.89.062809\">https://doi.org/10.1103/PhysRevE.89.062809</a>.","ama":"Botella Soler V, Glendinning P. Hierarchy and polysynchrony in an adaptive network . <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>. 2014;89(6). doi:<a href=\"https://doi.org/10.1103/PhysRevE.89.062809\">10.1103/PhysRevE.89.062809</a>","ista":"Botella Soler V, Glendinning P. 2014. Hierarchy and polysynchrony in an adaptive network . Physical Review E Statistical Nonlinear and Soft Matter Physics. 89(6), 062809.","short":"V. Botella Soler, P. Glendinning, Physical Review E Statistical Nonlinear and Soft Matter Physics 89 (2014).","ieee":"V. Botella Soler and P. Glendinning, “Hierarchy and polysynchrony in an adaptive network ,” <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>, vol. 89, no. 6. American Institute of Physics, 2014.","apa":"Botella Soler, V., &#38; Glendinning, P. (2014). Hierarchy and polysynchrony in an adaptive network . <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>. American Institute of Physics. <a href=\"https://doi.org/10.1103/PhysRevE.89.062809\">https://doi.org/10.1103/PhysRevE.89.062809</a>"},"article_processing_charge":"No","volume":89,"doi":"10.1103/PhysRevE.89.062809","issue":"6","abstract":[{"text":"We describe a simple adaptive network of coupled chaotic maps. The network reaches a stationary state (frozen topology) for all values of the coupling parameter, although the dynamics of the maps at the nodes of the network can be nontrivial. The structure of the network shows interesting hierarchical properties and in certain parameter regions the dynamics is polysynchronous: Nodes can be divided in differently synchronized classes but, contrary to cluster synchronization, nodes in the same class need not be connected to each other. These complicated synchrony patterns have been conjectured to play roles in systems biology and circuits. The adaptive system we study describes ways whereby this behavior can evolve from undifferentiated nodes.","lang":"eng"}],"_id":"2183","author":[{"orcid":"0000-0002-8790-1914","first_name":"Vicente","id":"421234E8-F248-11E8-B48F-1D18A9856A87","last_name":"Botella Soler","full_name":"Botella Soler, Vicente"},{"first_name":"Paul","full_name":"Glendinning, Paul","last_name":"Glendinning"}],"title":"Hierarchy and polysynchrony in an adaptive network ","ec_funded":1,"acknowledgement":"V.B.S. is partially supported by contract MEC (Grant No. AYA2010-22111-C03-02).\r\n","status":"public","publication_status":"published","project":[{"call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme","_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734"}],"scopus_import":"1","date_created":"2018-12-11T11:56:11Z","date_published":"2014-06-16T00:00:00Z","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publist_id":"4798","department":[{"_id":"GaTk"}],"language":[{"iso":"eng"}],"type":"journal_article","quality_controlled":"1","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1403.3209"}],"intvolume":"        89","publisher":"American Institute of Physics","year":"2014","oa":1,"article_number":"062809","date_updated":"2022-08-25T14:04:45Z","publication":"Physical Review E Statistical Nonlinear and Soft Matter Physics"},{"oa_version":"Preprint","citation":{"ama":"Čadek M, Krcál M, Matoušek J, Sergeraert F, Vokřínek L, Wagner U. Computing all maps into a sphere. <i>Journal of the ACM</i>. 2014;61(3). doi:<a href=\"https://doi.org/10.1145/2597629\">10.1145/2597629</a>","ista":"Čadek M, Krcál M, Matoušek J, Sergeraert F, Vokřínek L, Wagner U. 2014. Computing all maps into a sphere. Journal of the ACM. 61(3), 17.","short":"M. Čadek, M. Krcál, J. Matoušek, F. Sergeraert, L. Vokřínek, U. Wagner, Journal of the ACM 61 (2014).","apa":"Čadek, M., Krcál, M., Matoušek, J., Sergeraert, F., Vokřínek, L., &#38; Wagner, U. (2014). Computing all maps into a sphere. <i>Journal of the ACM</i>. ACM. <a href=\"https://doi.org/10.1145/2597629\">https://doi.org/10.1145/2597629</a>","ieee":"M. Čadek, M. Krcál, J. Matoušek, F. Sergeraert, L. Vokřínek, and U. Wagner, “Computing all maps into a sphere,” <i>Journal of the ACM</i>, vol. 61, no. 3. ACM, 2014.","mla":"Čadek, Martin, et al. “Computing All Maps into a Sphere.” <i>Journal of the ACM</i>, vol. 61, no. 3, 17, ACM, 2014, doi:<a href=\"https://doi.org/10.1145/2597629\">10.1145/2597629</a>.","chicago":"Čadek, Martin, Marek Krcál, Jiří Matoušek, Francis Sergeraert, Lukáš Vokřínek, and Uli Wagner. “Computing All Maps into a Sphere.” <i>Journal of the ACM</i>. ACM, 2014. <a href=\"https://doi.org/10.1145/2597629\">https://doi.org/10.1145/2597629</a>."},"day":"01","month":"05","volume":61,"abstract":[{"lang":"eng","text":"Given topological spaces X,Y, a fundamental problem of algebraic topology is understanding the structure of all continuous maps X→ Y. We consider a computational version, where X,Y are given as finite simplicial complexes, and the goal is to compute [X,Y], that is, all homotopy classes of suchmaps.We solve this problem in the stable range, where for some d ≥ 2, we have dim X ≤ 2d-2 and Y is (d-1)-connected; in particular, Y can be the d-dimensional sphere Sd. The algorithm combines classical tools and ideas from homotopy theory (obstruction theory, Postnikov systems, and simplicial sets) with algorithmic tools from effective algebraic topology (locally effective simplicial sets and objects with effective homology). In contrast, [X,Y] is known to be uncomputable for general X,Y, since for X = S1 it includes a well known undecidable problem: testing triviality of the fundamental group of Y. In follow-up papers, the algorithm is shown to run in polynomial time for d fixed, and extended to other problems, such as the extension problem, where we are given a subspace A ⊂ X and a map A→ Y and ask whether it extends to a map X → Y, or computing the Z2-index-everything in the stable range. Outside the stable range, the extension problem is undecidable."}],"issue":"3","doi":"10.1145/2597629","title":"Computing all maps into a sphere","author":[{"first_name":"Martin","full_name":"Čadek, Martin","last_name":"Čadek"},{"first_name":"Marek","id":"33E21118-F248-11E8-B48F-1D18A9856A87","last_name":"Krcál","full_name":"Krcál, Marek"},{"first_name":"Jiří","last_name":"Matoušek","full_name":"Matoušek, Jiří"},{"last_name":"Sergeraert","full_name":"Sergeraert, Francis","first_name":"Francis"},{"first_name":"Lukáš","last_name":"Vokřínek","full_name":"Vokřínek, Lukáš"},{"last_name":"Wagner","full_name":"Wagner, Uli","first_name":"Uli","id":"36690CA2-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-1494-0568"}],"_id":"2184","publication_status":"published","acknowledgement":"The research by M. K. was supported by project GAUK 49209. The research by M. K. was also supported by project 1M0545 by the Ministry of Education of the Czech Republic and by Center of Excellence { Inst. for Theor. Comput. Sci., Prague (project P202/12/G061 of GACR). The research by U. W. was supported by the Swiss National Science Foundation (SNF Projects 200021-125309, 200020-138230, and PP00P2-138948).","status":"public","date_published":"2014-05-01T00:00:00Z","date_created":"2018-12-11T11:56:12Z","scopus_import":1,"department":[{"_id":"UlWa"},{"_id":"HeEd"}],"publist_id":"4797","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","language":[{"iso":"eng"}],"type":"journal_article","quality_controlled":"1","publisher":"ACM","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1105.6257"}],"intvolume":"        61","year":"2014","oa":1,"article_number":"17 ","publication":"Journal of the ACM","date_updated":"2021-01-12T06:55:50Z"},{"intvolume":"      8441","publisher":"Springer","quality_controlled":"1","type":"conference","language":[{"iso":"eng"}],"publist_id":"4795","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","department":[{"_id":"KrPi"}],"scopus_import":1,"date_created":"2018-12-11T11:56:12Z","date_published":"2014-04-01T00:00:00Z","date_updated":"2021-01-12T06:55:51Z","page":"93 - 110","oa":1,"year":"2014","alternative_title":["LNCS"],"file":[{"creator":"system","relation":"main_file","file_size":505389,"file_name":"IST-2016-680-v1+1_708.pdf","date_updated":"2020-07-14T12:45:31Z","checksum":"da1aa01221086083b23c92e547b48ff4","content_type":"application/pdf","access_level":"open_access","date_created":"2018-12-12T10:08:43Z","file_id":"4705"}],"volume":8441,"has_accepted_license":"1","ddc":["000","004"],"month":"04","file_date_updated":"2020-07-14T12:45:31Z","day":"01","citation":{"ista":"Dodis Y, Pietrzak KZ, Wichs D. 2014. Key derivation without entropy waste. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 8441, 93–110.","ama":"Dodis Y, Pietrzak KZ, Wichs D. Key derivation without entropy waste. In: Nguyen P, Oswald E, eds. Vol 8441. Springer; 2014:93-110. doi:<a href=\"https://doi.org/10.1007/978-3-642-55220-5_6\">10.1007/978-3-642-55220-5_6</a>","short":"Y. Dodis, K.Z. Pietrzak, D. Wichs, in:, P. Nguyen, E. Oswald (Eds.), Springer, 2014, pp. 93–110.","apa":"Dodis, Y., Pietrzak, K. Z., &#38; Wichs, D. (2014). Key derivation without entropy waste. In P. Nguyen &#38; E. Oswald (Eds.) (Vol. 8441, pp. 93–110). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark: Springer. <a href=\"https://doi.org/10.1007/978-3-642-55220-5_6\">https://doi.org/10.1007/978-3-642-55220-5_6</a>","ieee":"Y. Dodis, K. Z. Pietrzak, and D. Wichs, “Key derivation without entropy waste,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, 2014, vol. 8441, pp. 93–110.","mla":"Dodis, Yevgeniy, et al. <i>Key Derivation without Entropy Waste</i>. Edited by Phong Nguyen and Elisabeth Oswald, vol. 8441, Springer, 2014, pp. 93–110, doi:<a href=\"https://doi.org/10.1007/978-3-642-55220-5_6\">10.1007/978-3-642-55220-5_6</a>.","chicago":"Dodis, Yevgeniy, Krzysztof Z Pietrzak, and Daniel Wichs. “Key Derivation without Entropy Waste.” edited by Phong Nguyen and Elisabeth Oswald, 8441:93–110. Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-642-55220-5_6\">https://doi.org/10.1007/978-3-642-55220-5_6</a>."},"pubrep_id":"680","conference":{"name":"EUROCRYPT: Theory and Applications of Cryptographic Techniques","end_date":"2014-05-15","start_date":"2014-05-11","location":"Copenhagen, Denmark"},"oa_version":"Submitted Version","publication_status":"published","status":"public","_id":"2185","editor":[{"full_name":"Nguyen, Phong","last_name":"Nguyen","first_name":"Phong"},{"first_name":"Elisabeth","last_name":"Oswald","full_name":"Oswald, Elisabeth"}],"author":[{"first_name":"Yevgeniy","last_name":"Dodis","full_name":"Dodis, Yevgeniy"},{"orcid":"0000-0002-9139-1654","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","first_name":"Krzysztof Z","full_name":"Pietrzak, Krzysztof Z","last_name":"Pietrzak"},{"first_name":"Daniel","full_name":"Wichs, Daniel","last_name":"Wichs"}],"title":"Key derivation without entropy waste","doi":"10.1007/978-3-642-55220-5_6","abstract":[{"lang":"eng","text":"We revisit the classical problem of converting an imperfect source of randomness into a usable cryptographic key. Assume that we have some cryptographic application P that expects a uniformly random m-bit key R and ensures that the best attack (in some complexity class) against P(R) has success probability at most δ. Our goal is to design a key-derivation function (KDF) h that converts any random source X of min-entropy k into a sufficiently &quot;good&quot; key h(X), guaranteeing that P(h(X)) has comparable security δ′ which is 'close' to δ. Seeded randomness extractors provide a generic way to solve this problem for all applications P, with resulting security δ′ = O(δ), provided that we start with entropy k ≥ m + 2 log (1/δ) - O(1). By a result of Radhakrishnan and Ta-Shma, this bound on k (called the &quot;RT-bound&quot;) is also known to be tight in general. Unfortunately, in many situations the loss of 2 log (1/δ) bits of entropy is unacceptable. This motivates the study KDFs with less entropy waste by placing some restrictions on the source X or the application P. In this work we obtain the following new positive and negative results in this regard: - Efficient samplability of the source X does not help beat the RT-bound for general applications. This resolves the SRT (samplable RT) conjecture of Dachman-Soled et al. [DGKM12] in the affirmative, and also shows that the existence of computationally-secure extractors beating the RT-bound implies the existence of one-way functions. - We continue in the line of work initiated by Barak et al. [BDK+11] and construct new information-theoretic KDFs which beat the RT-bound for large but restricted classes of applications. Specifically, we design efficient KDFs that work for all unpredictability applications P (e.g., signatures, MACs, one-way functions, etc.) and can either: (1) extract all of the entropy k = m with a very modest security loss δ′ = O(δ·log (1/δ)), or alternatively, (2) achieve essentially optimal security δ′ = O(δ) with a very modest entropy loss k ≥ m + loglog (1/δ). In comparison, the best prior results from [BDK+11] for this class of applications would only guarantee δ′ = O(√δ) when k = m, and would need k ≥ m + log (1/δ) to get δ′ = O(δ). - The weaker bounds of [BDK+11] hold for a larger class of so-called &quot;square- friendly&quot; applications (which includes all unpredictability, but also some important indistinguishability, applications). Unfortunately, we show that these weaker bounds are tight for the larger class of applications. - We abstract out a clean, information-theoretic notion of (k,δ,δ′)- unpredictability extractors, which guarantee &quot;induced&quot; security δ′ for any δ-secure unpredictability application P, and characterize the parameters achievable for such unpredictability extractors. Of independent interest, we also relate this notion to the previously-known notion of (min-entropy) condensers, and improve the state-of-the-art parameters for such condensers."}]},{"title":"On the well-posedness and scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti","author":[{"full_name":"Chen, Thomas","last_name":"Chen","first_name":"Thomas"},{"full_name":"Hainzl, Christian","last_name":"Hainzl","first_name":"Christian"},{"first_name":"Nataša","full_name":"Pavlović, Nataša","last_name":"Pavlović"},{"first_name":"Robert","id":"4AFD0470-F248-11E8-B48F-1D18A9856A87","last_name":"Seiringer","full_name":"Seiringer, Robert","orcid":"0000-0002-6781-0521"}],"_id":"2186","abstract":[{"lang":"eng","text":"We prove the existence of scattering states for the defocusing cubic Gross-Pitaevskii (GP) hierarchy in ℝ3. Moreover, we show that an exponential energy growth condition commonly used in the well-posedness theory of the GP hierarchy is, in a specific sense, necessary. In fact, we prove that without the latter, there exist initial data for the focusing cubic GP hierarchy for which instantaneous blowup occurs."}],"issue":"7","doi":"10.1007/s11005-014-0693-2","project":[{"_id":"26450934-B435-11E9-9278-68D0E5697425","name":"NSERC Postdoctoral fellowship"}],"publication_status":"published","status":"public","citation":{"short":"T. Chen, C. Hainzl, N. Pavlović, R. Seiringer, Letters in Mathematical Physics 104 (2014) 871–891.","ama":"Chen T, Hainzl C, Pavlović N, Seiringer R. On the well-posedness and scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti. <i>Letters in Mathematical Physics</i>. 2014;104(7):871-891. doi:<a href=\"https://doi.org/10.1007/s11005-014-0693-2\">10.1007/s11005-014-0693-2</a>","ista":"Chen T, Hainzl C, Pavlović N, Seiringer R. 2014. On the well-posedness and scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti. Letters in Mathematical Physics. 104(7), 871–891.","ieee":"T. Chen, C. Hainzl, N. Pavlović, and R. Seiringer, “On the well-posedness and scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti,” <i>Letters in Mathematical Physics</i>, vol. 104, no. 7. Springer, pp. 871–891, 2014.","apa":"Chen, T., Hainzl, C., Pavlović, N., &#38; Seiringer, R. (2014). On the well-posedness and scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti. <i>Letters in Mathematical Physics</i>. Springer. <a href=\"https://doi.org/10.1007/s11005-014-0693-2\">https://doi.org/10.1007/s11005-014-0693-2</a>","mla":"Chen, Thomas, et al. “On the Well-Posedness and Scattering for the Gross-Pitaevskii Hierarchy via Quantum de Finetti.” <i>Letters in Mathematical Physics</i>, vol. 104, no. 7, Springer, 2014, pp. 871–91, doi:<a href=\"https://doi.org/10.1007/s11005-014-0693-2\">10.1007/s11005-014-0693-2</a>.","chicago":"Chen, Thomas, Christian Hainzl, Nataša Pavlović, and Robert Seiringer. “On the Well-Posedness and Scattering for the Gross-Pitaevskii Hierarchy via Quantum de Finetti.” <i>Letters in Mathematical Physics</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s11005-014-0693-2\">https://doi.org/10.1007/s11005-014-0693-2</a>."},"day":"07","month":"05","oa_version":"Submitted Version","volume":104,"oa":1,"year":"2014","publication":"Letters in Mathematical Physics","date_updated":"2021-01-12T06:55:51Z","page":"871 - 891","department":[{"_id":"RoSe"}],"publist_id":"4793","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","date_published":"2014-05-07T00:00:00Z","date_created":"2018-12-11T11:56:12Z","scopus_import":1,"publisher":"Springer","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1311.2136"}],"intvolume":"       104","type":"journal_article","quality_controlled":"1","language":[{"iso":"eng"}]},{"article_type":"original","page":"193 - 220","date_updated":"2021-01-12T06:55:51Z","publication":"Acta Informatica","year":"2014","oa":1,"type":"journal_article","language":[{"iso":"eng"}],"quality_controlled":"1","intvolume":"        51","publisher":"Springer","scopus_import":1,"date_created":"2018-12-11T11:56:13Z","date_published":"2014-06-01T00:00:00Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publist_id":"4787","department":[{"_id":"KrCh"},{"_id":"ToHe"}],"ec_funded":1,"publication_status":"published","status":"public","project":[{"call_identifier":"FWF","name":"Moderne Concurrency Paradigms","grant_number":"S11402-N23","_id":"25F5A88A-B435-11E9-9278-68D0E5697425"},{"grant_number":"P 23499-N23","_id":"2584A770-B435-11E9-9278-68D0E5697425","name":"Modern Graph Algorithmic Techniques in Formal Verification","call_identifier":"FWF"},{"call_identifier":"FP7","name":"Quantitative Graph Games: Theory and Applications","grant_number":"279307","_id":"2581B60A-B435-11E9-9278-68D0E5697425"},{"_id":"2587B514-B435-11E9-9278-68D0E5697425","name":"Microsoft Research Faculty Fellowship"},{"_id":"25EE3708-B435-11E9-9278-68D0E5697425","grant_number":"267989","call_identifier":"FP7","name":"Quantitative Reactive Modeling"}],"doi":"10.1007/s00236-013-0191-5","issue":"3-4","abstract":[{"text":"Systems should not only be correct but also robust in the sense that they behave reasonably in unexpected situations. This article addresses synthesis of robust reactive systems from temporal specifications. Existing methods allow arbitrary behavior if assumptions in the specification are violated. To overcome this, we define two robustness notions, combine them, and show how to enforce them in synthesis. The first notion applies to safety properties: If safety assumptions are violated temporarily, we require that the system recovers to normal operation with as few errors as possible. The second notion requires that, if liveness assumptions are violated, as many guarantees as possible should be fulfilled nevertheless. We present a synthesis procedure achieving this for the important class of GR(1) specifications, and establish complexity bounds. We also present an implementation of a special case of robustness, and show experimental results.","lang":"eng"}],"_id":"2187","author":[{"full_name":"Bloem, Roderick","last_name":"Bloem","first_name":"Roderick"},{"orcid":"0000-0002-4561-241X","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu"},{"full_name":"Greimel, Karin","last_name":"Greimel","first_name":"Karin"},{"first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000−0002−2985−7724"},{"full_name":"Hofferek, Georg","last_name":"Hofferek","first_name":"Georg"},{"last_name":"Jobstmann","full_name":"Jobstmann, Barbara","first_name":"Barbara"},{"first_name":"Bettina","full_name":"Könighofer, Bettina","last_name":"Könighofer"},{"full_name":"Könighofer, Robert","last_name":"Könighofer","first_name":"Robert"}],"title":"Synthesizing robust systems","volume":51,"article_processing_charge":"No","has_accepted_license":"1","file":[{"date_updated":"2020-07-14T12:45:31Z","access_level":"open_access","content_type":"application/pdf","checksum":"d7f560f3d923f0f00aa10a0652f83273","file_name":"IST-2012-71-v1+1_Synthesizing_robust_systems.pdf","relation":"main_file","creator":"system","file_size":169523,"file_id":"5234","date_created":"2018-12-12T10:16:44Z"}],"oa_version":"Submitted Version","file_date_updated":"2020-07-14T12:45:31Z","ddc":["621"],"month":"06","day":"01","citation":{"mla":"Bloem, Roderick, et al. “Synthesizing Robust Systems.” <i>Acta Informatica</i>, vol. 51, no. 3–4, Springer, 2014, pp. 193–220, doi:<a href=\"https://doi.org/10.1007/s00236-013-0191-5\">10.1007/s00236-013-0191-5</a>.","chicago":"Bloem, Roderick, Krishnendu Chatterjee, Karin Greimel, Thomas A Henzinger, Georg Hofferek, Barbara Jobstmann, Bettina Könighofer, and Robert Könighofer. “Synthesizing Robust Systems.” <i>Acta Informatica</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s00236-013-0191-5\">https://doi.org/10.1007/s00236-013-0191-5</a>.","short":"R. Bloem, K. Chatterjee, K. Greimel, T.A. Henzinger, G. Hofferek, B. Jobstmann, B. Könighofer, R. Könighofer, Acta Informatica 51 (2014) 193–220.","ama":"Bloem R, Chatterjee K, Greimel K, et al. Synthesizing robust systems. <i>Acta Informatica</i>. 2014;51(3-4):193-220. doi:<a href=\"https://doi.org/10.1007/s00236-013-0191-5\">10.1007/s00236-013-0191-5</a>","ista":"Bloem R, Chatterjee K, Greimel K, Henzinger TA, Hofferek G, Jobstmann B, Könighofer B, Könighofer R. 2014. Synthesizing robust systems. Acta Informatica. 51(3–4), 193–220.","apa":"Bloem, R., Chatterjee, K., Greimel, K., Henzinger, T. A., Hofferek, G., Jobstmann, B., … Könighofer, R. (2014). Synthesizing robust systems. <i>Acta Informatica</i>. Springer. <a href=\"https://doi.org/10.1007/s00236-013-0191-5\">https://doi.org/10.1007/s00236-013-0191-5</a>","ieee":"R. Bloem <i>et al.</i>, “Synthesizing robust systems,” <i>Acta Informatica</i>, vol. 51, no. 3–4. Springer, pp. 193–220, 2014."},"pubrep_id":"71"},{"article_number":"140017","publication":"Open Biology","date_updated":"2021-01-12T06:55:52Z","year":"2014","oa":1,"type":"journal_article","language":[{"iso":"eng"}],"quality_controlled":"1","intvolume":"         4","publisher":"Royal Society","date_published":"2014-04-16T00:00:00Z","scopus_import":1,"date_created":"2018-12-11T11:56:13Z","department":[{"_id":"JiFr"}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publist_id":"4786","acknowledgement":"This work was supported by a grant from the Research Foundation-Flanders (Odysseus).\r\n\r\n","status":"public","publication_status":"published","issue":"APRIL","abstract":[{"lang":"eng","text":"Although plant and animal cells use a similar core mechanism to deliver proteins to the plasma membrane, their different lifestyle, body organization and specific cell structures resulted in the acquisition of regulatory mechanisms that vary in the two kingdoms. In particular, cell polarity regulators do not seem to be conserved, because genes encoding key components are absent in plant genomes. In plants, the broad knowledge on polarity derives from the study of auxin transporters, the PIN-FORMED proteins, in the model plant Arabidopsis thaliana. In animals, much information is provided from the study of polarity in epithelial cells that exhibit basolateral and luminal apical polarities, separated by tight junctions. In this review, we summarize the similarities and differences of the polarization mechanisms between plants and animals and survey the main genetic approaches that have been used to characterize new genes involved in polarity establishment in plants, including the frequently used forward and reverse genetics screens as well as a novel chemical genetics approach that is expected to overcome the limitation of classical genetics methods."}],"doi":"10.1098/rsob.140017","author":[{"full_name":"Kania, Urszula","last_name":"Kania","id":"4AE5C486-F248-11E8-B48F-1D18A9856A87","first_name":"Urszula"},{"full_name":"Fendrych, Matyas","last_name":"Fendrych","first_name":"Matyas"},{"orcid":"0000-0002-8302-7596","last_name":"Friml","full_name":"Friml, Jiřĺ","first_name":"Jiřĺ","id":"4159519E-F248-11E8-B48F-1D18A9856A87"}],"title":"Polar delivery in plants; commonalities and differences to animal epithelial cells","_id":"2188","has_accepted_license":"1","volume":4,"file":[{"date_updated":"2020-07-14T12:45:31Z","content_type":"application/pdf","checksum":"2020627feff36cf0799167c84149fa75","access_level":"open_access","relation":"main_file","file_size":682570,"creator":"system","file_name":"IST-2016-441-v1+1_140017.full.pdf","date_created":"2018-12-12T10:13:40Z","file_id":"5025"}],"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"oa_version":"Published Version","day":"16","citation":{"ieee":"U. Kania, M. Fendrych, and J. Friml, “Polar delivery in plants; commonalities and differences to animal epithelial cells,” <i>Open Biology</i>, vol. 4, no. APRIL. Royal Society, 2014.","apa":"Kania, U., Fendrych, M., &#38; Friml, J. (2014). Polar delivery in plants; commonalities and differences to animal epithelial cells. <i>Open Biology</i>. Royal Society. <a href=\"https://doi.org/10.1098/rsob.140017\">https://doi.org/10.1098/rsob.140017</a>","ama":"Kania U, Fendrych M, Friml J. Polar delivery in plants; commonalities and differences to animal epithelial cells. <i>Open Biology</i>. 2014;4(APRIL). doi:<a href=\"https://doi.org/10.1098/rsob.140017\">10.1098/rsob.140017</a>","short":"U. Kania, M. Fendrych, J. Friml, Open Biology 4 (2014).","ista":"Kania U, Fendrych M, Friml J. 2014. Polar delivery in plants; commonalities and differences to animal epithelial cells. Open Biology. 4(APRIL), 140017.","chicago":"Kania, Urszula, Matyas Fendrych, and Jiří Friml. “Polar Delivery in Plants; Commonalities and Differences to Animal Epithelial Cells.” <i>Open Biology</i>. Royal Society, 2014. <a href=\"https://doi.org/10.1098/rsob.140017\">https://doi.org/10.1098/rsob.140017</a>.","mla":"Kania, Urszula, et al. “Polar Delivery in Plants; Commonalities and Differences to Animal Epithelial Cells.” <i>Open Biology</i>, vol. 4, no. APRIL, 140017, Royal Society, 2014, doi:<a href=\"https://doi.org/10.1098/rsob.140017\">10.1098/rsob.140017</a>."},"pubrep_id":"441","month":"04","ddc":["570"],"file_date_updated":"2020-07-14T12:45:31Z"},{"page":"49-58","status":"public","publication_status":"published","date_updated":"2021-01-12T06:55:52Z","abstract":[{"lang":"fre","text":"En apprentissage automatique, nous parlons d'adaptation de domaine lorsque les données de test (cibles) et d'apprentissage (sources) sont générées selon différentes distributions. Nous devons donc développer des algorithmes de classification capables de s'adapter à une nouvelle distribution, pour laquelle aucune information sur les étiquettes n'est disponible. Nous attaquons cette problématique sous l'angle de l'approche PAC-Bayésienne qui se focalise sur l'apprentissage de modèles définis comme des votes de majorité sur un ensemble de fonctions. Dans ce contexte, nous introduisons PV-MinCq une version adaptative de l'algorithme (non adaptatif) MinCq. PV-MinCq suit le principe suivant. Nous transférons les étiquettes sources aux points cibles proches pour ensuite appliquer MinCq sur l'échantillon cible ``auto-étiqueté'' (justifié par une borne théorique). Plus précisément, nous définissons un auto-étiquetage non itératif qui se focalise dans les régions où les distributions marginales source et cible sont les plus similaires. Dans un second temps, nous étudions l'influence de notre auto-étiquetage pour en déduire une procédure de validation des hyperparamètres. Finalement, notre approche montre des résultats empiriques prometteurs."}],"year":"2014","_id":"2189","title":"Adaptation de domaine de vote de majorité par auto-étiquetage non itératif","oa":1,"author":[{"orcid":"0000-0002-8301-7240","id":"4BAC2A72-F248-11E8-B48F-1D18A9856A87","first_name":"Emilie","full_name":"Morvant, Emilie","last_name":"Morvant"}],"volume":1,"article_processing_charge":"No","type":"conference","language":[{"iso":"eng"}],"quality_controlled":"1","publisher":"Elsevier","intvolume":"         1","main_file_link":[{"url":"https://hal.archives-ouvertes.fr/hal-01005776/","open_access":"1"}],"date_created":"2018-12-11T11:56:13Z","oa_version":"Preprint","conference":{"name":"CAP: Conférence Francophone sur l'Apprentissage Automatique (Machine Learning French Conference)","location":"Saint-Etienne, France"},"date_published":"2014-07-01T00:00:00Z","month":"07","publist_id":"4785","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","citation":{"ista":"Morvant E. 2014. Adaptation de domaine de vote de majorité par auto-étiquetage non itératif. CAP: Conférence Francophone sur l’Apprentissage Automatique (Machine Learning French Conference) vol. 1, 49–58.","short":"E. Morvant, in:, Elsevier, 2014, pp. 49–58.","ama":"Morvant E. Adaptation de domaine de vote de majorité par auto-étiquetage non itératif. In: Vol 1. Elsevier; 2014:49-58.","apa":"Morvant, E. (2014). Adaptation de domaine de vote de majorité par auto-étiquetage non itératif (Vol. 1, pp. 49–58). Presented at the CAP: Conférence Francophone sur l’Apprentissage Automatique (Machine Learning French Conference), Saint-Etienne, France: Elsevier.","ieee":"E. Morvant, “Adaptation de domaine de vote de majorité par auto-étiquetage non itératif,” presented at the CAP: Conférence Francophone sur l’Apprentissage Automatique (Machine Learning French Conference), Saint-Etienne, France, 2014, vol. 1, pp. 49–58.","chicago":"Morvant, Emilie. “Adaptation de Domaine de Vote de Majorité Par Auto-Étiquetage Non Itératif,” 1:49–58. Elsevier, 2014.","mla":"Morvant, Emilie. <i>Adaptation de Domaine de Vote de Majorité Par Auto-Étiquetage Non Itératif</i>. Vol. 1, Elsevier, 2014, pp. 49–58."},"day":"01","department":[{"_id":"ChLa"}]},{"page":"192 - 208","date_updated":"2021-01-12T06:55:53Z","alternative_title":["LNCS"],"year":"2014","oa":1,"language":[{"iso":"eng"}],"quality_controlled":"1","type":"conference","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1402.3388"}],"intvolume":"      8559","publisher":"Springer","date_published":"2014-01-01T00:00:00Z","date_created":"2018-12-11T11:56:14Z","department":[{"_id":"ToHe"},{"_id":"KrCh"}],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publist_id":"4784","acknowledgement":"The author is on leave from Faculty of Informatics, Masaryk University, Czech Republic, and partially supported by the Czech Science Foundation, grant No. P202/12/G061.","publication_status":"published","status":"public","ec_funded":1,"project":[{"name":"Quantitative Reactive Modeling","call_identifier":"FP7","grant_number":"267989","_id":"25EE3708-B435-11E9-9278-68D0E5697425"},{"grant_number":"S11402-N23","_id":"25F5A88A-B435-11E9-9278-68D0E5697425","name":"Moderne Concurrency Paradigms","call_identifier":"FWF"}],"abstract":[{"text":"We present a new algorithm to construct a (generalized) deterministic Rabin automaton for an LTL formula φ. The automaton is the product of a master automaton and an array of slave automata, one for each G-subformula of φ. The slave automaton for G ψ is in charge of recognizing whether FG ψ holds. As opposed to standard determinization procedures, the states of all our automata have a clear logical structure, which allows for various optimizations. Our construction subsumes former algorithms for fragments of LTL. Experimental results show improvement in the sizes of the resulting automata compared to existing methods.","lang":"eng"}],"doi":"10.1007/978-3-319-08867-9_13","author":[{"last_name":"Esparza","full_name":"Esparza, Javier","first_name":"Javier"},{"id":"44CEF464-F248-11E8-B48F-1D18A9856A87","first_name":"Jan","full_name":"Kretinsky, Jan","last_name":"Kretinsky","orcid":"0000-0002-8122-2881"}],"title":"From LTL to deterministic automata: A safraless compositional approach","_id":"2190","volume":8559,"conference":{"name":"CAV: Computer Aided Verification"},"oa_version":"Submitted Version","day":"01","citation":{"short":"J. Esparza, J. Kretinsky, in:, Springer, 2014, pp. 192–208.","ama":"Esparza J, Kretinsky J. From LTL to deterministic automata: A safraless compositional approach. In: Vol 8559. Springer; 2014:192-208. doi:<a href=\"https://doi.org/10.1007/978-3-319-08867-9_13\">10.1007/978-3-319-08867-9_13</a>","ista":"Esparza J, Kretinsky J. 2014. From LTL to deterministic automata: A safraless compositional approach. CAV: Computer Aided Verification, LNCS, vol. 8559, 192–208.","apa":"Esparza, J., &#38; Kretinsky, J. (2014). From LTL to deterministic automata: A safraless compositional approach (Vol. 8559, pp. 192–208). Presented at the CAV: Computer Aided Verification, Springer. <a href=\"https://doi.org/10.1007/978-3-319-08867-9_13\">https://doi.org/10.1007/978-3-319-08867-9_13</a>","ieee":"J. Esparza and J. Kretinsky, “From LTL to deterministic automata: A safraless compositional approach,” presented at the CAV: Computer Aided Verification, 2014, vol. 8559, pp. 192–208.","chicago":"Esparza, Javier, and Jan Kretinsky. “From LTL to Deterministic Automata: A Safraless Compositional Approach,” 8559:192–208. Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-319-08867-9_13\">https://doi.org/10.1007/978-3-319-08867-9_13</a>.","mla":"Esparza, Javier, and Jan Kretinsky. <i>From LTL to Deterministic Automata: A Safraless Compositional Approach</i>. Vol. 8559, Springer, 2014, pp. 192–208, doi:<a href=\"https://doi.org/10.1007/978-3-319-08867-9_13\">10.1007/978-3-319-08867-9_13</a>."},"month":"01"},{"oa":1,"year":"2014","date_updated":"2023-02-23T12:23:43Z","publication":"ACM Transactions on Computational Logic (TOCL)","article_number":"16","related_material":{"record":[{"id":"1903","status":"public","relation":"earlier_version"},{"status":"public","relation":"earlier_version","id":"2955"},{"id":"5381","status":"public","relation":"earlier_version"}]},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publist_id":"4759","department":[{"_id":"KrCh"}],"scopus_import":1,"date_created":"2018-12-11T11:56:21Z","date_published":"2014-04-01T00:00:00Z","external_id":{"arxiv":["1107.2141"]},"intvolume":"        15","main_file_link":[{"url":"http://arxiv.org/abs/1107.2141","open_access":"1"}],"publisher":"ACM","language":[{"iso":"eng"}],"quality_controlled":"1","type":"journal_article","_id":"2211","author":[{"first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu","orcid":"0000-0002-4561-241X"},{"full_name":"Doyen, Laurent","last_name":"Doyen","first_name":"Laurent"}],"title":"Partial-observation stochastic games: How to win when belief fails","doi":"10.1145/2579821","issue":"2","abstract":[{"lang":"eng","text":"In two-player finite-state stochastic games of partial observation on graphs, in every state of the graph, the players simultaneously choose an action, and their joint actions determine a probability distribution over the successor states. The game is played for infinitely many rounds and thus the players construct an infinite path in the graph. We consider reachability objectives where the first player tries to ensure a target state to be visited almost-surely (i.e., with probability 1) or positively (i.e., with positive probability), no matter the strategy of the second player. We classify such games according to the information and to the power of randomization available to the players. On the basis of information, the game can be one-sided with either (a) player 1, or (b) player 2 having partial observation (and the other player has perfect observation), or two-sided with (c) both players having partial observation. On the basis of randomization, (a) the players may not be allowed to use randomization (pure strategies), or (b) they may choose a probability distribution over actions but the actual random choice is external and not visible to the player (actions invisible), or (c) they may use full randomization. Our main results for pure strategies are as follows: (1) For one-sided games with player 2 having perfect observation we show that (in contrast to full randomized strategies) belief-based (subset-construction based) strategies are not sufficient, and we present an exponential upper bound on memory both for almost-sure and positive winning strategies; we show that the problem of deciding the existence of almost-sure and positive winning strategies for player 1 is EXPTIME-complete and present symbolic algorithms that avoid the explicit exponential construction. (2) For one-sided games with player 1 having perfect observation we show that nonelementarymemory is both necessary and sufficient for both almost-sure and positive winning strategies. (3) We show that for the general (two-sided) case finite-memory strategies are sufficient for both positive and almost-sure winning, and at least nonelementary memory is required. We establish the equivalence of the almost-sure winning problems for pure strategies and for randomized strategies with actions invisible. Our equivalence result exhibit serious flaws in previous results of the literature: we show a nonelementary memory lower bound for almost-sure winning whereas an exponential upper bound was previously claimed."}],"publication_status":"published","status":"public","month":"04","day":"01","citation":{"short":"K. Chatterjee, L. Doyen, ACM Transactions on Computational Logic (TOCL) 15 (2014).","ista":"Chatterjee K, Doyen L. 2014. Partial-observation stochastic games: How to win when belief fails. ACM Transactions on Computational Logic (TOCL). 15(2), 16.","ama":"Chatterjee K, Doyen L. Partial-observation stochastic games: How to win when belief fails. <i>ACM Transactions on Computational Logic (TOCL)</i>. 2014;15(2). doi:<a href=\"https://doi.org/10.1145/2579821\">10.1145/2579821</a>","ieee":"K. Chatterjee and L. Doyen, “Partial-observation stochastic games: How to win when belief fails,” <i>ACM Transactions on Computational Logic (TOCL)</i>, vol. 15, no. 2. ACM, 2014.","apa":"Chatterjee, K., &#38; Doyen, L. (2014). Partial-observation stochastic games: How to win when belief fails. <i>ACM Transactions on Computational Logic (TOCL)</i>. ACM. <a href=\"https://doi.org/10.1145/2579821\">https://doi.org/10.1145/2579821</a>","mla":"Chatterjee, Krishnendu, and Laurent Doyen. “Partial-Observation Stochastic Games: How to Win When Belief Fails.” <i>ACM Transactions on Computational Logic (TOCL)</i>, vol. 15, no. 2, 16, ACM, 2014, doi:<a href=\"https://doi.org/10.1145/2579821\">10.1145/2579821</a>.","chicago":"Chatterjee, Krishnendu, and Laurent Doyen. “Partial-Observation Stochastic Games: How to Win When Belief Fails.” <i>ACM Transactions on Computational Logic (TOCL)</i>. ACM, 2014. <a href=\"https://doi.org/10.1145/2579821\">https://doi.org/10.1145/2579821</a>."},"oa_version":"Preprint","arxiv":1,"volume":15}]
