---
_id: '2891'
abstract:
- lang: eng
  text: "Quantitative automata are nondeterministic finite automata with edge weights.
    They value a\r\nrun by some function from the sequence of visited weights to the
    reals, and value a word by its\r\nminimal/maximal run. They generalize boolean
    automata, and have gained much attention in\r\nrecent years. Unfortunately, important
    automaton classes, such as sum, discounted-sum, and\r\nlimit-average automata,
    cannot be determinized. Yet, the quantitative setting provides the potential\r\nof
    approximate determinization. We define approximate determinization with respect
    to\r\na distance function, and investigate this potential.\r\nWe show that sum
    automata cannot be determinized approximately with respect to any\r\ndistance
    function. However, restricting to nonnegative weights allows for approximate determinization\r\nwith
    respect to some distance functions.\r\nDiscounted-sum automata allow for approximate
    determinization, as the influence of a word’s\r\nsuffix is decaying. However,
    the naive approach, of unfolding the automaton computations up\r\nto a sufficient
    level, is shown to be doubly exponential in the discount factor. We provide an\r\nalternative
    construction that is singly exponential in the discount factor, in the precision,
    and\r\nin the number of states. We prove matching lower bounds, showing exponential
    dependency on\r\neach of these three parameters.\r\nAverage and limit-average
    automata are shown to prohibit approximate determinization with\r\nrespect to
    any distance function, and this is the case even for two weights, 0 and 1."
acknowledgement: We thank Laurent Doyen for great ideas and valuable help in analyzing
  discounted-sum automata.
alternative_title:
- LIPIcs
author:
- first_name: Udi
  full_name: Boker, Udi
  id: 31E297B6-F248-11E8-B48F-1D18A9856A87
  last_name: Boker
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
citation:
  ama: 'Boker U, Henzinger TA. Approximate determinization of quantitative automata.
    In: <i>Leibniz International Proceedings in Informatics</i>. Vol 18. Schloss Dagstuhl
    - Leibniz-Zentrum für Informatik; 2012:362-373. doi:<a href="https://doi.org/10.4230/LIPIcs.FSTTCS.2012.362">10.4230/LIPIcs.FSTTCS.2012.362</a>'
  apa: 'Boker, U., &#38; Henzinger, T. A. (2012). Approximate determinization of quantitative
    automata. In <i>Leibniz International Proceedings in Informatics</i> (Vol. 18,
    pp. 362–373). Hyderabad, India: Schloss Dagstuhl - Leibniz-Zentrum für Informatik.
    <a href="https://doi.org/10.4230/LIPIcs.FSTTCS.2012.362">https://doi.org/10.4230/LIPIcs.FSTTCS.2012.362</a>'
  chicago: Boker, Udi, and Thomas A Henzinger. “Approximate Determinization of Quantitative
    Automata.” In <i>Leibniz International Proceedings in Informatics</i>, 18:362–73.
    Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2012. <a href="https://doi.org/10.4230/LIPIcs.FSTTCS.2012.362">https://doi.org/10.4230/LIPIcs.FSTTCS.2012.362</a>.
  ieee: U. Boker and T. A. Henzinger, “Approximate determinization of quantitative
    automata,” in <i>Leibniz International Proceedings in Informatics</i>, Hyderabad,
    India, 2012, vol. 18, pp. 362–373.
  ista: 'Boker U, Henzinger TA. 2012. Approximate determinization of quantitative
    automata. Leibniz International Proceedings in Informatics. FSTTCS: Foundations
    of Software Technology and Theoretical Computer Science, LIPIcs, vol. 18, 362–373.'
  mla: Boker, Udi, and Thomas A. Henzinger. “Approximate Determinization of Quantitative
    Automata.” <i>Leibniz International Proceedings in Informatics</i>, vol. 18, Schloss
    Dagstuhl - Leibniz-Zentrum für Informatik, 2012, pp. 362–73, doi:<a href="https://doi.org/10.4230/LIPIcs.FSTTCS.2012.362">10.4230/LIPIcs.FSTTCS.2012.362</a>.
  short: U. Boker, T.A. Henzinger, in:, Leibniz International Proceedings in Informatics,
    Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2012, pp. 362–373.
conference:
  end_date: 2012-12-17
  location: Hyderabad, India
  name: 'FSTTCS: Foundations of Software Technology and Theoretical Computer Science'
  start_date: 2012-12-15
date_created: 2018-12-11T12:00:10Z
date_published: 2012-12-01T00:00:00Z
date_updated: 2021-01-12T07:00:31Z
day: '01'
ddc:
- '004'
department:
- _id: ToHe
doi: 10.4230/LIPIcs.FSTTCS.2012.362
ec_funded: 1
file:
- access_level: open_access
  checksum: 88da18d3e2cb2e5011d7d10ce38a3864
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:10:37Z
  date_updated: 2020-07-14T12:45:52Z
  file_id: '4826'
  file_name: IST-2017-805-v1+1_34.pdf
  file_size: 559069
  relation: main_file
file_date_updated: 2020-07-14T12:45:52Z
has_accepted_license: '1'
intvolume: '        18'
language:
- iso: eng
month: '12'
oa: 1
oa_version: Published Version
page: 362 - 373
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
publication: Leibniz International Proceedings in Informatics
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
publist_id: '3867'
pubrep_id: '805'
quality_controlled: '1'
scopus_import: 1
status: public
title: Approximate determinization of quantitative automata
tmp:
  image: /images/cc_by_nc_nd.png
  legal_code_url: https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode
  name: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International
    (CC BY-NC-ND 4.0)
  short: CC BY-NC-ND (4.0)
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 18
year: '2012'
...
---
_id: '2902'
abstract:
- lang: eng
  text: 'We present an algorithm for simplifying linear cartographic objects and results
    obtained with a computer program implementing this algorithm. '
article_processing_charge: No
article_type: original
author:
- first_name: Herbert
  full_name: Edelsbrunner, Herbert
  id: 3FB178DA-F248-11E8-B48F-1D18A9856A87
  last_name: Edelsbrunner
  orcid: 0000-0002-9823-6833
- first_name: Oleg
  full_name: Musin, Oleg
  last_name: Musin
- first_name: Alexey
  full_name: Ukhalov, Alexey
  last_name: Ukhalov
- first_name: Olga
  full_name: Yakimova, Olga
  last_name: Yakimova
- first_name: Vladislav
  full_name: Alexeev, Vladislav
  last_name: Alexeev
- first_name: Victoriya
  full_name: Bogaevskaya, Victoriya
  last_name: Bogaevskaya
- first_name: Andrey
  full_name: Gorohov, Andrey
  last_name: Gorohov
- first_name: Margarita
  full_name: Preobrazhenskaya, Margarita
  last_name: Preobrazhenskaya
citation:
  ama: Edelsbrunner H, Musin O, Ukhalov A, et al. Fractal and computational geometry
    for generalizing cartographic objects. <i>Modeling and Analysis of Information
    Systems</i>. 2012;19(6):152-160.
  apa: Edelsbrunner, H., Musin, O., Ukhalov, A., Yakimova, O., Alexeev, V., Bogaevskaya,
    V., … Preobrazhenskaya, M. (2012). Fractal and computational geometry for generalizing
    cartographic objects. <i>Modeling and Analysis of Information Systems</i>. Russian
    Academy of Sciences.
  chicago: Edelsbrunner, Herbert, Oleg Musin, Alexey Ukhalov, Olga Yakimova, Vladislav
    Alexeev, Victoriya Bogaevskaya, Andrey Gorohov, and Margarita Preobrazhenskaya.
    “Fractal and computational geometry for generalizing cartographic objects.” <i>Modeling
    and Analysis of Information Systems</i>. Russian Academy of Sciences, 2012.
  ieee: H. Edelsbrunner <i>et al.</i>, “Fractal and computational geometry for generalizing
    cartographic objects,” <i>Modeling and Analysis of Information Systems</i>, vol.
    19, no. 6. Russian Academy of Sciences, pp. 152–160, 2012.
  ista: Edelsbrunner H, Musin O, Ukhalov A, Yakimova O, Alexeev V, Bogaevskaya V,
    Gorohov A, Preobrazhenskaya M. 2012. Fractal and computational geometry for generalizing
    cartographic objects. Modeling and Analysis of Information Systems. 19(6), 152–160.
  mla: Edelsbrunner, Herbert, et al. “Fractal and computational geometry for generalizing
    cartographic objects.” <i>Modeling and Analysis of Information Systems</i>, vol.
    19, no. 6, Russian Academy of Sciences, 2012, pp. 152–60.
  short: H. Edelsbrunner, O. Musin, A. Ukhalov, O. Yakimova, V. Alexeev, V. Bogaevskaya,
    A. Gorohov, M. Preobrazhenskaya, Modeling and Analysis of Information Systems
    19 (2012) 152–160.
date_created: 2018-12-11T12:00:15Z
date_published: 2012-12-01T00:00:00Z
date_updated: 2023-10-18T07:34:45Z
day: '01'
department:
- _id: HeEd
intvolume: '        19'
issue: '6'
language:
- iso: rus
main_file_link:
- open_access: '1'
  url: http://mi.mathnet.ru/eng/mais280
month: '12'
oa: 1
oa_version: Published Version
page: 152 - 160
publication: Modeling and Analysis of Information Systems
publication_status: published
publisher: Russian Academy of Sciences
publist_id: '3845'
quality_controlled: '1'
status: public
title: Fractal and computational geometry for generalizing cartographic objects
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 19
year: '2012'
...
---
_id: '2903'
abstract:
- lang: eng
  text: In order to enjoy a digital version of the Jordan Curve Theorem, it is common
    to use the closed topology for the foreground and the open topology for the background
    of a 2-dimensional binary image. In this paper, we introduce a single topology
    that enjoys this theorem for all thresholds decomposing a real-valued image into
    foreground and background. This topology is easy to construct and it generalizes
    to n-dimensional images.
author:
- first_name: Herbert
  full_name: Edelsbrunner, Herbert
  id: 3FB178DA-F248-11E8-B48F-1D18A9856A87
  last_name: Edelsbrunner
  orcid: 0000-0002-9823-6833
- first_name: Olga
  full_name: Symonova, Olga
  id: 3C0C7BC6-F248-11E8-B48F-1D18A9856A87
  last_name: Symonova
citation:
  ama: 'Edelsbrunner H, Symonova O. The adaptive topology of a digital image. In:
    IEEE; 2012:41-48. doi:<a href="https://doi.org/10.1109/ISVD.2012.11">10.1109/ISVD.2012.11</a>'
  apa: 'Edelsbrunner, H., &#38; Symonova, O. (2012). The adaptive topology of a digital
    image (pp. 41–48). Presented at the ISVD: International Symposium on Voronoi Diagrams
    in Science and Engineering, New Brunswick, NJ, USA : IEEE. <a href="https://doi.org/10.1109/ISVD.2012.11">https://doi.org/10.1109/ISVD.2012.11</a>'
  chicago: Edelsbrunner, Herbert, and Olga Symonova. “The Adaptive Topology of a Digital
    Image,” 41–48. IEEE, 2012. <a href="https://doi.org/10.1109/ISVD.2012.11">https://doi.org/10.1109/ISVD.2012.11</a>.
  ieee: 'H. Edelsbrunner and O. Symonova, “The adaptive topology of a digital image,”
    presented at the ISVD: International Symposium on Voronoi Diagrams in Science
    and Engineering, New Brunswick, NJ, USA , 2012, pp. 41–48.'
  ista: 'Edelsbrunner H, Symonova O. 2012. The adaptive topology of a digital image.
    ISVD: International Symposium on Voronoi Diagrams in Science and Engineering,
    41–48.'
  mla: Edelsbrunner, Herbert, and Olga Symonova. <i>The Adaptive Topology of a Digital
    Image</i>. IEEE, 2012, pp. 41–48, doi:<a href="https://doi.org/10.1109/ISVD.2012.11">10.1109/ISVD.2012.11</a>.
  short: H. Edelsbrunner, O. Symonova, in:, IEEE, 2012, pp. 41–48.
conference:
  end_date: 2012-06-29
  location: 'New Brunswick, NJ, USA '
  name: 'ISVD: International Symposium on Voronoi Diagrams in Science and Engineering'
  start_date: 2012-06-27
date_created: 2018-12-11T12:00:15Z
date_published: 2012-08-06T00:00:00Z
date_updated: 2021-01-12T07:00:35Z
day: '06'
ddc:
- '000'
department:
- _id: HeEd
- _id: MaJö
doi: 10.1109/ISVD.2012.11
file:
- access_level: open_access
  checksum: 444869a4e8abf07834f88b6e5cb5e9c3
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:09:41Z
  date_updated: 2020-07-14T12:45:52Z
  file_id: '4765'
  file_name: IST-2016-545-v1+1_2012-P-10-AdaptiveTopology.pdf
  file_size: 760548
  relation: main_file
file_date_updated: 2020-07-14T12:45:52Z
has_accepted_license: '1'
language:
- iso: eng
month: '08'
oa: 1
oa_version: Submitted Version
page: 41 - 48
publication_status: published
publisher: IEEE
publist_id: '3844'
pubrep_id: '545'
quality_controlled: '1'
scopus_import: 1
status: public
title: The adaptive topology of a digital image
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
year: '2012'
...
---
_id: '2904'
abstract:
- lang: eng
  text: Generalized van der Corput sequences are onedimensional, infinite sequences
    in the unit interval. They are generated from permutations in integer base b and
    are the building blocks of the multi-dimensional Halton sequences. Motivated by
    recent progress of Atanassov on the uniform distribution behavior of Halton sequences,
    we study, among others, permutations of the form P(i) = ai (mod b) for coprime
    integers a and b. We show that multipliers a that either divide b - 1 or b + 1
    generate van der Corput sequences with weak distribution properties. We give explicit
    lower bounds for the asymptotic distribution behavior of these sequences and relate
    them to sequences generated from the identity permutation in smaller bases, which
    are, due to Faure, the weakest distributed generalized van der Corput sequences.
- lang: fre
  text: Les suites de Van der Corput généralisées sont dessuites unidimensionnelles
    et infinies dans l’intervalle de l’unité.Elles sont générées par permutations
    des entiers de la basebetsont les éléments constitutifs des suites multi-dimensionnelles
    deHalton. Suites aux progrès récents d’Atanassov concernant le com-portement de
    distribution uniforme des suites de Halton nous nousintéressons aux permutations
    de la formuleP(i)  =ai(modb)pour les entiers premiers entre euxaetb. Dans cet
    article nousidentifions des multiplicateursagénérant des suites de Van derCorput
    ayant une mauvaise distribution. Nous donnons les bornesinférieures explicites
    pour cette distribution asymptotique asso-ciée à ces suites et relions ces dernières
    aux suites générées parpermutation d’identité, qui sont, selon Faure, les moins
    bien dis-tribuées des suites généralisées de Van der Corput dans une basedonnée.
article_processing_charge: No
article_type: original
author:
- first_name: Florian
  full_name: Pausinger, Florian
  id: 2A77D7A2-F248-11E8-B48F-1D18A9856A87
  last_name: Pausinger
  orcid: 0000-0002-8379-3768
citation:
  ama: Pausinger F. Weak multipliers for generalized van der Corput sequences. <i>Journal
    de Theorie des Nombres des Bordeaux</i>. 2012;24(3):729-749. doi:<a href="https://doi.org/10.5802/jtnb.819">10.5802/jtnb.819</a>
  apa: Pausinger, F. (2012). Weak multipliers for generalized van der Corput sequences.
    <i>Journal de Theorie Des Nombres Des Bordeaux</i>. Université de Bordeaux. <a
    href="https://doi.org/10.5802/jtnb.819">https://doi.org/10.5802/jtnb.819</a>
  chicago: Pausinger, Florian. “Weak Multipliers for Generalized van Der Corput Sequences.”
    <i>Journal de Theorie Des Nombres Des Bordeaux</i>. Université de Bordeaux, 2012.
    <a href="https://doi.org/10.5802/jtnb.819">https://doi.org/10.5802/jtnb.819</a>.
  ieee: F. Pausinger, “Weak multipliers for generalized van der Corput sequences,”
    <i>Journal de Theorie des Nombres des Bordeaux</i>, vol. 24, no. 3. Université
    de Bordeaux, pp. 729–749, 2012.
  ista: Pausinger F. 2012. Weak multipliers for generalized van der Corput sequences.
    Journal de Theorie des Nombres des Bordeaux. 24(3), 729–749.
  mla: Pausinger, Florian. “Weak Multipliers for Generalized van Der Corput Sequences.”
    <i>Journal de Theorie Des Nombres Des Bordeaux</i>, vol. 24, no. 3, Université
    de Bordeaux, 2012, pp. 729–49, doi:<a href="https://doi.org/10.5802/jtnb.819">10.5802/jtnb.819</a>.
  short: F. Pausinger, Journal de Theorie Des Nombres Des Bordeaux 24 (2012) 729–749.
date_created: 2018-12-11T12:00:15Z
date_published: 2012-01-01T00:00:00Z
date_updated: 2023-10-18T07:53:47Z
day: '01'
ddc:
- '510'
department:
- _id: HeEd
doi: 10.5802/jtnb.819
file:
- access_level: open_access
  checksum: 6954bfe9d7f4119fbdda7a11cf0f5c67
  content_type: application/pdf
  creator: dernst
  date_created: 2020-05-11T12:40:39Z
  date_updated: 2020-07-14T12:45:52Z
  file_id: '7819'
  file_name: JTNB_2012__24_3_729_0.pdf
  file_size: 819275
  relation: main_file
file_date_updated: 2020-07-14T12:45:52Z
has_accepted_license: '1'
intvolume: '        24'
issue: '3'
language:
- iso: eng
month: '01'
oa: 1
oa_version: Published Version
page: 729 - 749
publication: Journal de Theorie des Nombres des Bordeaux
publication_identifier:
  eissn:
  - 2118-8572
  issn:
  - 1246-7405
publication_status: published
publisher: Université de Bordeaux
publist_id: '3843'
quality_controlled: '1'
scopus_import: '1'
status: public
title: Weak multipliers for generalized van der Corput sequences
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 24
year: '2012'
...
---
_id: '2912'
article_processing_charge: No
author:
- first_name: Herbert
  full_name: Edelsbrunner, Herbert
  id: 3FB178DA-F248-11E8-B48F-1D18A9856A87
  last_name: Edelsbrunner
  orcid: 0000-0002-9823-6833
- first_name: Nataliya
  full_name: Strelkova, Nataliya
  last_name: Strelkova
citation:
  ama: Edelsbrunner H, Strelkova N. On the configuration space for the shortest networks.
    <i>Russian Mathematical Surveys</i>. 2012;67(6):1167–1168. doi:<a href="https://doi.org/10.4213/rm9503">10.4213/rm9503</a>
  apa: Edelsbrunner, H., &#38; Strelkova, N. (2012). On the configuration space for
    the shortest networks. <i>Russian Mathematical Surveys</i>. Russian Academy of
    Sciences. <a href="https://doi.org/10.4213/rm9503">https://doi.org/10.4213/rm9503</a>
  chicago: Edelsbrunner, Herbert, and Nataliya Strelkova. “On the Configuration Space
    for the Shortest Networks.” <i>Russian Mathematical Surveys</i>. Russian Academy
    of Sciences, 2012. <a href="https://doi.org/10.4213/rm9503">https://doi.org/10.4213/rm9503</a>.
  ieee: H. Edelsbrunner and N. Strelkova, “On the configuration space for the shortest
    networks,” <i>Russian Mathematical Surveys</i>, vol. 67, no. 6. Russian Academy
    of Sciences, pp. 1167–1168, 2012.
  ista: Edelsbrunner H, Strelkova N. 2012. On the configuration space for the shortest
    networks. Russian Mathematical Surveys. 67(6), 1167–1168.
  mla: Edelsbrunner, Herbert, and Nataliya Strelkova. “On the Configuration Space
    for the Shortest Networks.” <i>Russian Mathematical Surveys</i>, vol. 67, no.
    6, Russian Academy of Sciences, 2012, pp. 1167–1168, doi:<a href="https://doi.org/10.4213/rm9503">10.4213/rm9503</a>.
  short: H. Edelsbrunner, N. Strelkova, Russian Mathematical Surveys 67 (2012) 1167–1168.
date_created: 2018-12-11T12:00:18Z
date_published: 2012-10-01T00:00:00Z
date_updated: 2023-10-17T11:40:39Z
day: '01'
department:
- _id: HeEd
doi: 10.4213/rm9503
intvolume: '        67'
issue: '6'
language:
- iso: eng
month: '10'
oa_version: None
page: 1167–1168
publication: Russian Mathematical Surveys
publication_status: published
publisher: Russian Academy of Sciences
publist_id: '3831'
quality_controlled: '1'
status: public
title: On the configuration space for the shortest networks
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 67
year: '2012'
...
---
_id: '2915'
acknowledgement: "The project receives funding from the European Community’s Seventh
  Framework Programme under grant agreement\r\nno. ICT- 248273 GeRT."
article_processing_charge: No
author:
- first_name: Oliver
  full_name: Kroemer, Oliver
  last_name: Kroemer
- first_name: Christoph
  full_name: Lampert, Christoph
  id: 40C20FD2-F248-11E8-B48F-1D18A9856A87
  last_name: Lampert
  orcid: 0000-0001-8622-7887
- first_name: Jan
  full_name: Peters, Jan
  last_name: Peters
citation:
  ama: 'Kroemer O, Lampert C, Peters J. Multi-modal learning for dynamic tactile sensing.
    In: Deutsches Zentrum für Luft und Raumfahrt; 2012.'
  apa: Kroemer, O., Lampert, C., &#38; Peters, J. (2012). Multi-modal learning for
    dynamic tactile sensing. Deutsches Zentrum für Luft und Raumfahrt.
  chicago: Kroemer, Oliver, Christoph Lampert, and Jan Peters. “Multi-Modal Learning
    for Dynamic Tactile Sensing.” Deutsches Zentrum für Luft und Raumfahrt, 2012.
  ieee: O. Kroemer, C. Lampert, and J. Peters, “Multi-modal learning for dynamic tactile
    sensing,” 2012.
  ista: Kroemer O, Lampert C, Peters J. 2012. Multi-modal learning for dynamic tactile
    sensing
  mla: Kroemer, Oliver, et al. <i>Multi-Modal Learning for Dynamic Tactile Sensing</i>.
    Deutsches Zentrum für Luft und Raumfahrt, 2012.
  short: O. Kroemer, C. Lampert, J. Peters, in:, Deutsches Zentrum für Luft und Raumfahrt,
    2012.
date_created: 2018-12-11T12:00:19Z
date_published: 2012-10-11T00:00:00Z
date_updated: 2023-10-17T07:58:59Z
day: '11'
department:
- _id: ChLa
language:
- iso: eng
month: '10'
oa_version: None
publication_status: published
publisher: Deutsches Zentrum für Luft und Raumfahrt
publist_id: '3828'
quality_controlled: '1'
status: public
title: Multi-modal learning for dynamic tactile sensing
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2012'
...
---
_id: '2916'
abstract:
- lang: eng
  text: The classical (boolean) notion of refinement for behavioral interfaces of
    system components is the alternating refinement preorder. In this paper, we define
    a quantitative measure for interfaces, called interface simulation distance. It
    makes the alternating refinement preorder quantitative by, intu- itively, tolerating
    errors (while counting them) in the alternating simulation game. We show that
    the interface simulation distance satisfies the triangle inequality, that the
    distance between two interfaces does not increase under parallel composition with
    a third interface, and that the distance between two interfaces can be bounded
    from above and below by distances between abstractions of the two interfaces.
    We illustrate the framework, and the properties of the distances under composition
    of interfaces, with two case studies.
arxiv: 1
author:
- first_name: Pavol
  full_name: Cerny, Pavol
  id: 4DCBEFFE-F248-11E8-B48F-1D18A9856A87
  last_name: Cerny
- first_name: Martin
  full_name: Chmelik, Martin
  id: 3624234E-F248-11E8-B48F-1D18A9856A87
  last_name: Chmelik
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Arjun
  full_name: Radhakrishna, Arjun
  id: 3B51CAC4-F248-11E8-B48F-1D18A9856A87
  last_name: Radhakrishna
citation:
  ama: 'Cerny P, Chmelik M, Henzinger TA, Radhakrishna A. Interface Simulation Distances.
    In: <i>Electronic Proceedings in Theoretical Computer Science</i>. Vol 96. EPTCS;
    2012:29-42. doi:<a href="https://doi.org/10.4204/EPTCS.96.3">10.4204/EPTCS.96.3</a>'
  apa: 'Cerny, P., Chmelik, M., Henzinger, T. A., &#38; Radhakrishna, A. (2012). Interface
    Simulation Distances. In <i>Electronic Proceedings in Theoretical Computer Science</i>
    (Vol. 96, pp. 29–42). Napoli, Italy: EPTCS. <a href="https://doi.org/10.4204/EPTCS.96.3">https://doi.org/10.4204/EPTCS.96.3</a>'
  chicago: Cerny, Pavol, Martin Chmelik, Thomas A Henzinger, and Arjun Radhakrishna.
    “Interface Simulation Distances.” In <i>Electronic Proceedings in Theoretical
    Computer Science</i>, 96:29–42. EPTCS, 2012. <a href="https://doi.org/10.4204/EPTCS.96.3">https://doi.org/10.4204/EPTCS.96.3</a>.
  ieee: P. Cerny, M. Chmelik, T. A. Henzinger, and A. Radhakrishna, “Interface Simulation
    Distances,” in <i>Electronic Proceedings in Theoretical Computer Science</i>,
    Napoli, Italy, 2012, vol. 96, pp. 29–42.
  ista: 'Cerny P, Chmelik M, Henzinger TA, Radhakrishna A. 2012. Interface Simulation
    Distances. Electronic Proceedings in Theoretical Computer Science. GandALF: Games,
    Automata, Logic, and Formal Verification vol. 96, 29–42.'
  mla: Cerny, Pavol, et al. “Interface Simulation Distances.” <i>Electronic Proceedings
    in Theoretical Computer Science</i>, vol. 96, EPTCS, 2012, pp. 29–42, doi:<a href="https://doi.org/10.4204/EPTCS.96.3">10.4204/EPTCS.96.3</a>.
  short: P. Cerny, M. Chmelik, T.A. Henzinger, A. Radhakrishna, in:, Electronic Proceedings
    in Theoretical Computer Science, EPTCS, 2012, pp. 29–42.
conference:
  end_date: 2012-09-08
  location: Napoli, Italy
  name: 'GandALF: Games, Automata, Logic, and Formal Verification'
  start_date: 2012-09-06
date_created: 2018-12-11T12:00:19Z
date_published: 2012-10-07T00:00:00Z
date_updated: 2023-02-23T10:12:05Z
day: '07'
department:
- _id: ToHe
- _id: KrCh
doi: 10.4204/EPTCS.96.3
ec_funded: 1
external_id:
  arxiv:
  - '1210.2450'
intvolume: '        96'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1210.2450
month: '10'
oa: 1
oa_version: Submitted Version
page: 29 - 42
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication: Electronic Proceedings in Theoretical Computer Science
publication_status: published
publisher: EPTCS
publist_id: '3827'
quality_controlled: '1'
related_material:
  record:
  - id: '1733'
    relation: later_version
    status: public
scopus_import: 1
status: public
title: Interface Simulation Distances
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 96
year: '2012'
...
---
_id: '2917'
abstract:
- lang: eng
  text: 'The search for extra-terrestrial intelligence (SETI) has been performed principally
    as a one-way survey, listening of radio frequencies across the Milky Way and other
    galaxies. However, scientists have engaged in an active messaging only rarely.
    This suggests the simple rationale that if other civilizations exist and take
    a similar approach to ours, namely listening but not broadcasting, the result
    is a silent universe. A simple game theoretical model, the prisoner''s dilemma,
    explains this situation: each player (civilization) can passively search (defect),
    or actively search and broadcast (cooperate). In order to maximize the payoff
    (or, equivalently, minimize the risks) the best strategy is not to broadcast.
    In fact, the active search has been opposed on the basis that it might be dangerous
    to expose ourselves. However, most of these ideas have not been based on objective
    arguments, and ignore accounting of the possible gains and losses. Thus, the question
    stands: should we perform an active search? I develop a game-theoretical framework
    where civilizations can be of different types, and explicitly apply it to a situation
    where societies are either interested in establishing a two-way communication
    or belligerent and in urge to exploit ours. The framework gives a quantitative
    solution (a mixed-strategy), which is how frequent we should perform the active
    SETI. This frequency is roughly proportional to the inverse of the risk, and can
    be extremely small. However, given the immense amount of stars being scanned,
    it supports active SETI. The model is compared with simulations, and the possible
    actions are evaluated through the San Marino scale, measuring the risks of messaging.'
author:
- first_name: Harold
  full_name: Vladar, Harold
  id: 2A181218-F248-11E8-B48F-1D18A9856A87
  last_name: Vladar
  orcid: 0000-0002-5985-7653
citation:
  ama: de Vladar H. The game of active search for extra terrestrial intelligence Breaking
    the Great Silence . <i>International Journal of Astrobiology</i>. 2012;12(1):53-62.
    doi:<a href="https://doi.org/10.1017/S1473550412000407">10.1017/S1473550412000407</a>
  apa: de Vladar, H. (2012). The game of active search for extra terrestrial intelligence
    Breaking the Great Silence . <i>International Journal of Astrobiology</i>. Cambridge
    University Press. <a href="https://doi.org/10.1017/S1473550412000407">https://doi.org/10.1017/S1473550412000407</a>
  chicago: Vladar, Harold de. “The Game of Active Search for Extra Terrestrial Intelligence
    Breaking the Great Silence .” <i>International Journal of Astrobiology</i>. Cambridge
    University Press, 2012. <a href="https://doi.org/10.1017/S1473550412000407">https://doi.org/10.1017/S1473550412000407</a>.
  ieee: H. de Vladar, “The game of active search for extra terrestrial intelligence
    Breaking the Great Silence ,” <i>International Journal of Astrobiology</i>, vol.
    12, no. 1. Cambridge University Press, pp. 53–62, 2012.
  ista: de Vladar H. 2012. The game of active search for extra terrestrial intelligence
    Breaking the Great Silence . International Journal of Astrobiology. 12(1), 53–62.
  mla: de Vladar, Harold. “The Game of Active Search for Extra Terrestrial Intelligence
    Breaking the Great Silence .” <i>International Journal of Astrobiology</i>, vol.
    12, no. 1, Cambridge University Press, 2012, pp. 53–62, doi:<a href="https://doi.org/10.1017/S1473550412000407">10.1017/S1473550412000407</a>.
  short: H. de Vladar, International Journal of Astrobiology 12 (2012) 53–62.
date_created: 2018-12-11T12:00:19Z
date_published: 2012-11-06T00:00:00Z
date_updated: 2021-01-12T07:00:41Z
day: '06'
department:
- _id: NiBa
doi: 10.1017/S1473550412000407
intvolume: '        12'
issue: '1'
language:
- iso: eng
month: '11'
oa_version: None
page: 53 - 62
publication: International Journal of Astrobiology
publication_status: published
publisher: Cambridge University Press
publist_id: '3821'
quality_controlled: '1'
scopus_import: 1
status: public
title: 'The game of active search for extra terrestrial intelligence Breaking the
  Great Silence '
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 12
year: '2012'
...
---
_id: '2928'
abstract:
- lang: eng
  text: '     This paper addresses the problem of approximate MAP-MRF inference in
    general graphical models. Following [36], we consider a family of linear programming
    relaxations of the problem where each relaxation is specified by a set of nested
    pairs of factors for which the marginalization constraint needs to be enforced.
    We develop a generalization of the TRW-S algorithm [9] for this problem, where
    we use a decomposition into junction chains, monotonic w.r.t. some ordering on
    the nodes. This generalizes the monotonic chains in [9] in a natural way. We also
    show how to deal with nested factors in an efficient way. Experiments show an
    improvement over min-sum diffusion, MPLP and subgradient ascent algorithms on
    a number of computer vision and natural language processing problems. '
article_processing_charge: No
arxiv: 1
author:
- first_name: Vladimir
  full_name: Kolmogorov, Vladimir
  id: 3D50B0BA-F248-11E8-B48F-1D18A9856A87
  last_name: Kolmogorov
- first_name: Thomas
  full_name: Schoenemann, Thomas
  last_name: Schoenemann
citation:
  ama: Kolmogorov V, Schoenemann T. Generalized sequential tree-reweighted message
    passing. <i>arXiv</i>. 2012.
  apa: Kolmogorov, V., &#38; Schoenemann, T. (2012). Generalized sequential tree-reweighted
    message passing. <i>arXiv</i>. ArXiv.
  chicago: Kolmogorov, Vladimir, and Thomas Schoenemann. “Generalized Sequential Tree-Reweighted
    Message Passing.” <i>ArXiv</i>. ArXiv, 2012.
  ieee: V. Kolmogorov and T. Schoenemann, “Generalized sequential tree-reweighted
    message passing,” <i>arXiv</i>. ArXiv, 2012.
  ista: Kolmogorov V, Schoenemann T. 2012. Generalized sequential tree-reweighted
    message passing. arXiv, .
  mla: Kolmogorov, Vladimir, and Thomas Schoenemann. “Generalized Sequential Tree-Reweighted
    Message Passing.” <i>ArXiv</i>, ArXiv, 2012.
  short: V. Kolmogorov, T. Schoenemann, ArXiv (2012).
date_created: 2018-12-11T12:00:23Z
date_published: 2012-05-29T00:00:00Z
date_updated: 2021-01-12T07:00:45Z
day: '29'
department:
- _id: VlKo
external_id:
  arxiv:
  - '1205.6352'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1205.6352
month: '05'
oa: 1
oa_version: Preprint
page: '16'
publication: arXiv
publication_status: published
publisher: ArXiv
publist_id: '3809'
status: public
title: Generalized sequential tree-reweighted message passing
type: preprint
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2012'
...
---
_id: '2930'
abstract:
- lang: eng
  text: "In this paper we investigate k-submodular functions. This natural family
    of discrete functions includes submodular and bisubmodular functions as the special
    cases k = 1 and k = 2 respectively.\r\n\r\nIn particular we generalize the known
    Min-Max-Theorem for submodular and bisubmodular functions. This theorem asserts
    that the minimum of the (bi)submodular function can be found by solving a maximization
    problem over a (bi)submodular polyhedron. We define a k-submodular polyhedron,
    prove a Min-Max-Theorem for k-submodular functions, and give a greedy algorithm
    to construct the vertices of the polyhedron.\r\n"
acknowledgement: "We would like to thank Andrei Krokhin for encourag- ing our cooperation,
  for helpful discussions, and for his critical reading of the manuscript.\r\n"
alternative_title:
- LNCS
author:
- first_name: Anna
  full_name: Huber, Anna
  last_name: Huber
- first_name: Vladimir
  full_name: Kolmogorov, Vladimir
  id: 3D50B0BA-F248-11E8-B48F-1D18A9856A87
  last_name: Kolmogorov
citation:
  ama: 'Huber A, Kolmogorov V. Towards minimizing k-submodular functions. In: Vol
    7422. Springer; 2012:451-462. doi:<a href="https://doi.org/10.1007/978-3-642-32147-4_40">10.1007/978-3-642-32147-4_40</a>'
  apa: 'Huber, A., &#38; Kolmogorov, V. (2012). Towards minimizing k-submodular functions
    (Vol. 7422, pp. 451–462). Presented at the ISCO: International Symposium on Combinatorial
    Optimization, Athens, Greece: Springer. <a href="https://doi.org/10.1007/978-3-642-32147-4_40">https://doi.org/10.1007/978-3-642-32147-4_40</a>'
  chicago: Huber, Anna, and Vladimir Kolmogorov. “Towards Minimizing K-Submodular
    Functions,” 7422:451–62. Springer, 2012. <a href="https://doi.org/10.1007/978-3-642-32147-4_40">https://doi.org/10.1007/978-3-642-32147-4_40</a>.
  ieee: 'A. Huber and V. Kolmogorov, “Towards minimizing k-submodular functions,”
    presented at the ISCO: International Symposium on Combinatorial Optimization,
    Athens, Greece, 2012, vol. 7422, pp. 451–462.'
  ista: 'Huber A, Kolmogorov V. 2012. Towards minimizing k-submodular functions. ISCO:
    International Symposium on Combinatorial Optimization, LNCS, vol. 7422, 451–462.'
  mla: Huber, Anna, and Vladimir Kolmogorov. <i>Towards Minimizing K-Submodular Functions</i>.
    Vol. 7422, Springer, 2012, pp. 451–62, doi:<a href="https://doi.org/10.1007/978-3-642-32147-4_40">10.1007/978-3-642-32147-4_40</a>.
  short: A. Huber, V. Kolmogorov, in:, Springer, 2012, pp. 451–462.
conference:
  end_date: 2012-04-21
  location: Athens, Greece
  name: 'ISCO: International Symposium on Combinatorial Optimization'
  start_date: 2012-04-19
date_created: 2018-12-11T12:00:24Z
date_published: 2012-04-01T00:00:00Z
date_updated: 2021-01-12T07:00:46Z
day: '01'
department:
- _id: VlKo
doi: 10.1007/978-3-642-32147-4_40
intvolume: '      7422'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1309.5469
month: '04'
oa: 1
oa_version: Preprint
page: 451 - 462
publication_status: published
publisher: Springer
publist_id: '3806'
quality_controlled: '1'
scopus_import: 1
status: public
title: Towards minimizing k-submodular functions
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 7422
year: '2012'
...
---
_id: '2931'
abstract:
- lang: eng
  text: "In this paper, we present a new approach for establishing correspondences
    between sparse image features related by an unknown nonrigid mapping and corrupted
    by clutter and occlusion, such as points extracted from images of different instances
    of the same object category. We formulate this matching task as an energy minimization
    problem by defining an elaborate objective function of the appearance and the
    spatial arrangement of the features. Optimization of this energy is an instance
    of graph matching, which is in general an NP-hard problem. We describe a novel
    graph matching optimization technique, which we refer to as dual decomposition
    (DD), and demonstrate on a variety of examples that this method outperforms existing
    graph matching algorithms. In the majority of our examples, DD is able to find
    the global minimum within a minute. The ability to globally optimize the objective
    allows us to accurately learn the parameters of our matching model from training
    examples. We show on several matching tasks that our learned model yields results
    superior to those of state-of-the-art methods.\r\n"
acknowledgement: This research was funded in part by Microsoft Research.
author:
- first_name: Lorenzo
  full_name: Torresani, Lorenzo
  last_name: Torresani
- first_name: Vladimir
  full_name: Kolmogorov, Vladimir
  id: 3D50B0BA-F248-11E8-B48F-1D18A9856A87
  last_name: Kolmogorov
- first_name: Carsten
  full_name: Rother, Carsten
  last_name: Rother
citation:
  ama: Torresani L, Kolmogorov V, Rother C. A dual decomposition approach to feature
    correspondence. <i>IEEE Transactions on Pattern Analysis and Machine Intelligence</i>.
    2012;35(2):259-271. doi:<a href="https://doi.org/10.1109/TPAMI.2012.105">10.1109/TPAMI.2012.105</a>
  apa: Torresani, L., Kolmogorov, V., &#38; Rother, C. (2012). A dual decomposition
    approach to feature correspondence. <i>IEEE Transactions on Pattern Analysis and
    Machine Intelligence</i>. IEEE. <a href="https://doi.org/10.1109/TPAMI.2012.105">https://doi.org/10.1109/TPAMI.2012.105</a>
  chicago: Torresani, Lorenzo, Vladimir Kolmogorov, and Carsten Rother. “A Dual Decomposition
    Approach to Feature Correspondence.” <i>IEEE Transactions on Pattern Analysis
    and Machine Intelligence</i>. IEEE, 2012. <a href="https://doi.org/10.1109/TPAMI.2012.105">https://doi.org/10.1109/TPAMI.2012.105</a>.
  ieee: L. Torresani, V. Kolmogorov, and C. Rother, “A dual decomposition approach
    to feature correspondence,” <i>IEEE Transactions on Pattern Analysis and Machine
    Intelligence</i>, vol. 35, no. 2. IEEE, pp. 259–271, 2012.
  ista: Torresani L, Kolmogorov V, Rother C. 2012. A dual decomposition approach to
    feature correspondence. IEEE Transactions on Pattern Analysis and Machine Intelligence.
    35(2), 259–271.
  mla: Torresani, Lorenzo, et al. “A Dual Decomposition Approach to Feature Correspondence.”
    <i>IEEE Transactions on Pattern Analysis and Machine Intelligence</i>, vol. 35,
    no. 2, IEEE, 2012, pp. 259–71, doi:<a href="https://doi.org/10.1109/TPAMI.2012.105">10.1109/TPAMI.2012.105</a>.
  short: L. Torresani, V. Kolmogorov, C. Rother, IEEE Transactions on Pattern Analysis
    and Machine Intelligence 35 (2012) 259–271.
date_created: 2018-12-11T12:00:24Z
date_published: 2012-05-08T00:00:00Z
date_updated: 2021-01-12T07:00:46Z
day: '08'
department:
- _id: VlKo
doi: 10.1109/TPAMI.2012.105
intvolume: '        35'
issue: '2'
language:
- iso: eng
month: '05'
oa_version: None
page: 259 - 271
project:
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication: IEEE Transactions on Pattern Analysis and Machine Intelligence
publication_status: published
publisher: IEEE
publist_id: '3805'
quality_controlled: '1'
scopus_import: 1
status: public
title: A dual decomposition approach to feature correspondence
type: journal_article
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 35
year: '2012'
...
---
_id: '2936'
abstract:
- lang: eng
  text: The notion of delays arises naturally in many computational models, such as,
    in the design of circuits, control systems, and dataflow languages. In this work,
    we introduce automata with delay blocks (ADBs), extending finite state automata
    with variable time delay blocks, for deferring individual transition output symbols,
    in a discrete-time setting. We show that the ADB languages strictly subsume the
    regular languages, and are incomparable in expressive power to the context-free
    languages. We show that ADBs are closed under union, concatenation and Kleene
    star, and under intersection with regular languages, but not closed under complementation
    and intersection with other ADB languages. We show that the emptiness and the
    membership problems are decidable in polynomial time for ADBs, whereas the universality
    problem is undecidable. Finally we consider the linear-time model checking problem,
    i.e., whether the language of an ADB is contained in a regular language, and show
    that the model checking problem is PSPACE-complete. Copyright 2012 ACM.
acknowledgement: 'This work has been financially supported in part by the European
  Commission FP7-ICT Cognitive Systems, Interaction, and Robotics under the contract
  # 270180 (NOPTILUS); by Fundacao para Ciencia e Tecnologia under project PTDC/EEA-CRO/104901/2008
  (Modeling and control of Networked vehicle systems in persistent autonomous operations);
  by Austrian Science Fund (FWF) Grant No P 23499-N23 on Modern Graph Algorithmic
  Techniques in Formal Verification; FWF NFN Grant No S11407-N23 (RiSE); ERC Start
  grant (279307: Graph Games); Microsoft faculty fellows award; ERC Advanced grant
  QUAREM; and FWF Grant No S11403-N23 (RiSE).'
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Vinayak
  full_name: Prabhu, Vinayak
  last_name: Prabhu
citation:
  ama: 'Chatterjee K, Henzinger TA, Prabhu V. Finite automata with time delay blocks.
    In: <i>Roceedings of the Tenth ACM International Conference on Embedded Software</i>.
    ACM; 2012:43-52. doi:<a href="https://doi.org/10.1145/2380356.2380370">10.1145/2380356.2380370</a>'
  apa: 'Chatterjee, K., Henzinger, T. A., &#38; Prabhu, V. (2012). Finite automata
    with time delay blocks. In <i>roceedings of the tenth ACM international conference
    on Embedded software</i> (pp. 43–52). Tampere, Finland: ACM. <a href="https://doi.org/10.1145/2380356.2380370">https://doi.org/10.1145/2380356.2380370</a>'
  chicago: Chatterjee, Krishnendu, Thomas A Henzinger, and Vinayak Prabhu. “Finite
    Automata with Time Delay Blocks.” In <i>Roceedings of the Tenth ACM International
    Conference on Embedded Software</i>, 43–52. ACM, 2012. <a href="https://doi.org/10.1145/2380356.2380370">https://doi.org/10.1145/2380356.2380370</a>.
  ieee: K. Chatterjee, T. A. Henzinger, and V. Prabhu, “Finite automata with time
    delay blocks,” in <i>roceedings of the tenth ACM international conference on Embedded
    software</i>, Tampere, Finland, 2012, pp. 43–52.
  ista: 'Chatterjee K, Henzinger TA, Prabhu V. 2012. Finite automata with time delay
    blocks. roceedings of the tenth ACM international conference on Embedded software.
    EMSOFT: Embedded Software , 43–52.'
  mla: Chatterjee, Krishnendu, et al. “Finite Automata with Time Delay Blocks.” <i>Roceedings
    of the Tenth ACM International Conference on Embedded Software</i>, ACM, 2012,
    pp. 43–52, doi:<a href="https://doi.org/10.1145/2380356.2380370">10.1145/2380356.2380370</a>.
  short: K. Chatterjee, T.A. Henzinger, V. Prabhu, in:, Roceedings of the Tenth ACM
    International Conference on Embedded Software, ACM, 2012, pp. 43–52.
conference:
  end_date: 2012-10-12
  location: Tampere, Finland
  name: 'EMSOFT: Embedded Software '
  start_date: 2012-10-07
date_created: 2018-12-11T12:00:26Z
date_published: 2012-10-01T00:00:00Z
date_updated: 2021-01-12T07:39:53Z
day: '01'
department:
- _id: KrCh
- _id: ToHe
doi: 10.1145/2380356.2380370
ec_funded: 1
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1207.7019
month: '10'
oa: 1
oa_version: Preprint
page: 43 - 52
project:
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
publication: roceedings of the tenth ACM international conference on Embedded software
publication_status: published
publisher: ACM
publist_id: '3799'
quality_controlled: '1'
scopus_import: 1
status: public
title: Finite automata with time delay blocks
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
year: '2012'
...
---
_id: '2937'
abstract:
- lang: eng
  text: Developers building cryptography into security-sensitive applications face
    a daunting task. Not only must they understand the security guarantees delivered
    by the constructions they choose, they must also implement and combine them correctly
    and efficiently. Cryptographic compilers free developers from this task by turning
    high-level specifications of security goals into efficient implementations. Yet,
    trusting such tools is hard as they rely on complex mathematical machinery and
    claim security properties that are subtle and difficult to verify. In this paper
    we present ZKCrypt, an optimizing cryptographic compiler achieving an unprecedented
    level of assurance without sacrificing practicality for a comprehensive class
    of cryptographic protocols, known as Zero-Knowledge Proofs of Knowledge. The pipeline
    of ZKCrypt integrates purpose-built verified compilers and verifying compilers
    producing formal proofs in the CertiCrypt framework. By combining the guarantees
    delivered by each stage, ZKCrypt provides assurance that the output implementation
    securely realizes the abstract proof goal given as input. We report on the main
    characteristics of ZKCrypt, highlight new definitions and concepts at its foundations,
    and illustrate its applicability through a representative example of an anonymous
    credential system.
acknowledgement: This work was partially funded by National Funds through the FCT
  - Fundação para a Ciência e a Tecnologia (Portuguese Foundation for Science and
  Technology) within project ENI-AC/2224/2009, by ENIAC Joint Undertaking under grant
  agreement number 120224, European Projects FP7-256980 NESSoS and FP7-229599 AMAROUT,
  Spanish National project TIN2009-14599 DESAFIOS 10, and Madrid Regional project
  S2009TIC-1465 PROMETIDOS.
author:
- first_name: José
  full_name: Almeida, José
  last_name: Almeida
- first_name: Manuel
  full_name: Barbosa, Manuel
  last_name: Barbosa
- first_name: Endre
  full_name: Bangerter, Endre
  last_name: Bangerter
- first_name: Gilles
  full_name: Barthe, Gilles
  last_name: Barthe
- first_name: Stephan
  full_name: Krenn, Stephan
  id: 329FCCF0-F248-11E8-B48F-1D18A9856A87
  last_name: Krenn
  orcid: 0000-0003-2835-9093
- first_name: Santiago
  full_name: Béguelin, Santiago
  last_name: Béguelin
citation:
  ama: 'Almeida J, Barbosa M, Bangerter E, Barthe G, Krenn S, Béguelin S. Full proof
    cryptography: Verifiable compilation of efficient zero-knowledge protocols. In:
    <i>Proceedings of the 2012 ACM Conference on Computer and Communications Security</i>.
    ACM; 2012:488-500. doi:<a href="https://doi.org/10.1145/2382196.2382249">10.1145/2382196.2382249</a>'
  apa: 'Almeida, J., Barbosa, M., Bangerter, E., Barthe, G., Krenn, S., &#38; Béguelin,
    S. (2012). Full proof cryptography: Verifiable compilation of efficient zero-knowledge
    protocols. In <i>Proceedings of the 2012 ACM conference on Computer and communications
    security</i> (pp. 488–500). Raleigh, NC, USA: ACM. <a href="https://doi.org/10.1145/2382196.2382249">https://doi.org/10.1145/2382196.2382249</a>'
  chicago: 'Almeida, José, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan
    Krenn, and Santiago Béguelin. “Full Proof Cryptography: Verifiable Compilation
    of Efficient Zero-Knowledge Protocols.” In <i>Proceedings of the 2012 ACM Conference
    on Computer and Communications Security</i>, 488–500. ACM, 2012. <a href="https://doi.org/10.1145/2382196.2382249">https://doi.org/10.1145/2382196.2382249</a>.'
  ieee: 'J. Almeida, M. Barbosa, E. Bangerter, G. Barthe, S. Krenn, and S. Béguelin,
    “Full proof cryptography: Verifiable compilation of efficient zero-knowledge protocols,”
    in <i>Proceedings of the 2012 ACM conference on Computer and communications security</i>,
    Raleigh, NC, USA, 2012, pp. 488–500.'
  ista: 'Almeida J, Barbosa M, Bangerter E, Barthe G, Krenn S, Béguelin S. 2012. Full
    proof cryptography: Verifiable compilation of efficient zero-knowledge protocols.
    Proceedings of the 2012 ACM conference on Computer and communications security.
    CCS: Computer and Communications Security, 488–500.'
  mla: 'Almeida, José, et al. “Full Proof Cryptography: Verifiable Compilation of
    Efficient Zero-Knowledge Protocols.” <i>Proceedings of the 2012 ACM Conference
    on Computer and Communications Security</i>, ACM, 2012, pp. 488–500, doi:<a href="https://doi.org/10.1145/2382196.2382249">10.1145/2382196.2382249</a>.'
  short: J. Almeida, M. Barbosa, E. Bangerter, G. Barthe, S. Krenn, S. Béguelin, in:,
    Proceedings of the 2012 ACM Conference on Computer and Communications Security,
    ACM, 2012, pp. 488–500.
conference:
  end_date: 2012-10-18
  location: Raleigh, NC, USA
  name: 'CCS: Computer and Communications Security'
  start_date: 2012-10-16
date_created: 2018-12-11T12:00:26Z
date_published: 2012-10-01T00:00:00Z
date_updated: 2021-01-12T07:39:53Z
day: '01'
department:
- _id: KrPi
doi: 10.1145/2382196.2382249
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2012/258
month: '10'
oa: 1
oa_version: Submitted Version
page: 488 - 500
publication: Proceedings of the 2012 ACM conference on Computer and communications
  security
publication_status: published
publisher: ACM
publist_id: '3798'
quality_controlled: '1'
scopus_import: 1
status: public
title: 'Full proof cryptography: Verifiable compilation of efficient zero-knowledge
  protocols'
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
year: '2012'
...
---
_id: '2938'
abstract:
- lang: eng
  text: 'Social insects have a very high potential to become invasive pest species.
    Here, we explore how their social lifestyle and their interaction with parasites
    may contribute to this invasive success. Similar to solitary species, parasite
    release followed by the evolution of increased competitive ability can promote
    establishment of introduced social insect hosts in their introduced range. Genetic
    bottlenecks during introduction of low numbers of founder individuals decrease
    the genetic diversity at three levels: the population, the colony and the individual,
    with the colony level being specific to social insects. Reduced genetic diversity
    can affect both the individual immune system and the collective colony-level disease
    defences (social immunity). Still, the dual immune system is likely to make social
    insects more robust to parasite attack. Changes in social structure from small,
    family-based, territorially aggressive societies in native populations towards
    huge networks of cooperating nests (unicoloniality) occur in some invasive social
    insects, for example, most invasive ants and some termites. Unicoloniality is
    likely to affect disease dynamics in multiple ways. The free exchange of individuals
    within the population leads to an increased genetic heterogeneity among individuals
    of a single nest, thereby decreasing disease transmission. However, the multitude
    of reproductively active queens per colony buffers the effect of individual diseased
    queens and their offspring, which may result in a higher level of vertical disease
    transmission in unicolonial societies. Lastly, unicoloniality provides a competitive
    advantage over native species, allowing them to quickly become the dominant species
    in the habitat, which in turn selects for parasite adaptation to this common host
    genotype and thus eventually a high parasite pressure. Overall, invasions by insect
    societies are characterized by general features applying to all introduced species,
    as well as idiosyncrasies that emerge from their social lifestyle. It is important
    to study these effects in concert to be able to develop efficient management and
    biocontrol strategies. © 2012 British Ecological Society.'
acknowledgement: We thank Mark Brown, Christopher Pull, Meghan L. Vyleta, Miriam Stock,
  Barbara Casillas-Perez and three anonymous reviewers for valuable comments on the
  manuscript and Eva Sixt for ant drawings. Funding was obtained from the German Science
  Foundation (DFG, by an Individual Research Grant to S.C.) and the European Research
  Council (ERC, by an ERC-Starting Grant to SC and an Individual Marie Curie EIF fellowship
  to L.desU.). The authors declare no conflict of interests.
author:
- first_name: Line V
  full_name: Ugelvig, Line V
  id: 3DC97C8E-F248-11E8-B48F-1D18A9856A87
  last_name: Ugelvig
  orcid: 0000-0003-1832-8883
- first_name: Sylvia
  full_name: Cremer, Sylvia
  id: 2F64EC8C-F248-11E8-B48F-1D18A9856A87
  last_name: Cremer
  orcid: 0000-0002-2193-3868
citation:
  ama: Ugelvig LV, Cremer S. Effects of social immunity and unicoloniality on host
    parasite interactions in invasive insect societies. <i>Functional Ecology</i>.
    2012;26(6):1300-1312. doi:<a href="https://doi.org/10.1111/1365-2435.12013">10.1111/1365-2435.12013</a>
  apa: Ugelvig, L. V., &#38; Cremer, S. (2012). Effects of social immunity and unicoloniality
    on host parasite interactions in invasive insect societies. <i>Functional Ecology</i>.
    Wiley-Blackwell. <a href="https://doi.org/10.1111/1365-2435.12013">https://doi.org/10.1111/1365-2435.12013</a>
  chicago: Ugelvig, Line V, and Sylvia Cremer. “Effects of Social Immunity and Unicoloniality
    on Host Parasite Interactions in Invasive Insect Societies.” <i>Functional Ecology</i>.
    Wiley-Blackwell, 2012. <a href="https://doi.org/10.1111/1365-2435.12013">https://doi.org/10.1111/1365-2435.12013</a>.
  ieee: L. V. Ugelvig and S. Cremer, “Effects of social immunity and unicoloniality
    on host parasite interactions in invasive insect societies,” <i>Functional Ecology</i>,
    vol. 26, no. 6. Wiley-Blackwell, pp. 1300–1312, 2012.
  ista: Ugelvig LV, Cremer S. 2012. Effects of social immunity and unicoloniality
    on host parasite interactions in invasive insect societies. Functional Ecology.
    26(6), 1300–1312.
  mla: Ugelvig, Line V., and Sylvia Cremer. “Effects of Social Immunity and Unicoloniality
    on Host Parasite Interactions in Invasive Insect Societies.” <i>Functional Ecology</i>,
    vol. 26, no. 6, Wiley-Blackwell, 2012, pp. 1300–12, doi:<a href="https://doi.org/10.1111/1365-2435.12013">10.1111/1365-2435.12013</a>.
  short: L.V. Ugelvig, S. Cremer, Functional Ecology 26 (2012) 1300–1312.
date_created: 2018-12-11T12:00:27Z
date_published: 2012-01-01T00:00:00Z
date_updated: 2021-01-12T07:39:54Z
day: '01'
department:
- _id: SyCr
doi: 10.1111/1365-2435.12013
intvolume: '        26'
issue: '6'
language:
- iso: eng
month: '01'
oa_version: None
page: 1300 - 1312
publication: Functional Ecology
publication_status: published
publisher: Wiley-Blackwell
publist_id: '3797'
quality_controlled: '1'
scopus_import: 1
status: public
title: Effects of social immunity and unicoloniality on host parasite interactions
  in invasive insect societies
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 26
year: '2012'
...
---
_id: '2941'
author:
- first_name: Nikolai
  full_name: Dolbilin, Nikolai
  last_name: Dolbilin
- first_name: Herbert
  full_name: Edelsbrunner, Herbert
  id: 3FB178DA-F248-11E8-B48F-1D18A9856A87
  last_name: Edelsbrunner
  orcid: 0000-0002-9823-6833
- first_name: Oleg
  full_name: Musin, Oleg
  last_name: Musin
citation:
  ama: Dolbilin N, Edelsbrunner H, Musin O. On the optimality of functionals over
    triangulations of Delaunay sets. <i>Russian Mathematical Surveys</i>. 2012;67(4):781-783.
    doi:<a href="https://doi.org/10.1070/RM2012v067n04ABEH004807">10.1070/RM2012v067n04ABEH004807</a>
  apa: Dolbilin, N., Edelsbrunner, H., &#38; Musin, O. (2012). On the optimality of
    functionals over triangulations of Delaunay sets. <i>Russian Mathematical Surveys</i>.
    IOP Publishing. <a href="https://doi.org/10.1070/RM2012v067n04ABEH004807">https://doi.org/10.1070/RM2012v067n04ABEH004807</a>
  chicago: Dolbilin, Nikolai, Herbert Edelsbrunner, and Oleg Musin. “On the Optimality
    of Functionals over Triangulations of Delaunay Sets.” <i>Russian Mathematical
    Surveys</i>. IOP Publishing, 2012. <a href="https://doi.org/10.1070/RM2012v067n04ABEH004807">https://doi.org/10.1070/RM2012v067n04ABEH004807</a>.
  ieee: N. Dolbilin, H. Edelsbrunner, and O. Musin, “On the optimality of functionals
    over triangulations of Delaunay sets,” <i>Russian Mathematical Surveys</i>, vol.
    67, no. 4. IOP Publishing, pp. 781–783, 2012.
  ista: Dolbilin N, Edelsbrunner H, Musin O. 2012. On the optimality of functionals
    over triangulations of Delaunay sets. Russian Mathematical Surveys. 67(4), 781–783.
  mla: Dolbilin, Nikolai, et al. “On the Optimality of Functionals over Triangulations
    of Delaunay Sets.” <i>Russian Mathematical Surveys</i>, vol. 67, no. 4, IOP Publishing,
    2012, pp. 781–83, doi:<a href="https://doi.org/10.1070/RM2012v067n04ABEH004807">10.1070/RM2012v067n04ABEH004807</a>.
  short: N. Dolbilin, H. Edelsbrunner, O. Musin, Russian Mathematical Surveys 67 (2012)
    781–783.
date_created: 2018-12-11T12:00:28Z
date_published: 2012-11-01T00:00:00Z
date_updated: 2021-01-12T07:39:55Z
day: '01'
ddc:
- '510'
department:
- _id: HeEd
doi: 10.1070/RM2012v067n04ABEH004807
file:
- access_level: open_access
  checksum: 389a5ae53d6347de36c3468034f2821d
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:16:49Z
  date_updated: 2020-07-14T12:45:55Z
  file_id: '5239'
  file_name: IST-2013-132-v1+1_2012-J-04-Functional-E.pdf
  file_size: 253816
  relation: main_file
file_date_updated: 2020-07-14T12:45:55Z
has_accepted_license: '1'
intvolume: '        67'
issue: '4'
language:
- iso: eng
month: '11'
oa: 1
oa_version: Submitted Version
page: 781 - 783
publication: Russian Mathematical Surveys
publication_status: published
publisher: IOP Publishing
publist_id: '3792'
pubrep_id: '132'
quality_controlled: '1'
scopus_import: 1
status: public
title: On the optimality of functionals over triangulations of Delaunay sets
type: journal_article
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 67
year: '2012'
...
---
_id: '2942'
abstract:
- lang: eng
  text: Interface theories provide a formal framework for component-based development
    of software and hardware which supports the incremental design of systems and
    the independent implementability of components. These capabilities are ensured
    through mathematical properties of the parallel composition operator and the refinement
    relation for components. More recently, a conjunction operation was added to interface
    theories in order to provide support for handling multiple viewpoints, requirements
    engineering, and component reuse. Unfortunately, the conjunction operator does
    not allow independent implementability in general. In this paper, we study conditions
    that need to be imposed on interface models in order to enforce independent implementability
    with respect to conjunction. We focus on multiple viewpoint specifications and
    propose a new compatibility criterion between two interfaces, which we call orthogonality.
    We show that orthogonal interfaces can be refined separately, while preserving
    both orthogonality and composability with other interfaces. We illustrate the
    independent implementability of different viewpoints with a FIFO buffer example.
acknowledgement: ERC Advanced Grant QUAREM (Quantitative Reactive Modeling), FWF National
  Research Network RISE (Rigorous Systems Engineering)
alternative_title:
- LNCS
author:
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Dejan
  full_name: Nickovic, Dejan
  id: 41BCEE5C-F248-11E8-B48F-1D18A9856A87
  last_name: Nickovic
citation:
  ama: 'Henzinger TA, Nickovic D. Independent implementability of viewpoints. In:
    <i> Conference Proceedings Monterey Workshop 2012</i>. Vol 7539. Springer; 2012:380-395.
    doi:<a href="https://doi.org/10.1007/978-3-642-34059-8_20">10.1007/978-3-642-34059-8_20</a>'
  apa: 'Henzinger, T. A., &#38; Nickovic, D. (2012). Independent implementability
    of viewpoints. In <i> Conference proceedings Monterey Workshop 2012</i> (Vol.
    7539, pp. 380–395). Oxford, UK: Springer. <a href="https://doi.org/10.1007/978-3-642-34059-8_20">https://doi.org/10.1007/978-3-642-34059-8_20</a>'
  chicago: Henzinger, Thomas A, and Dejan Nickovic. “Independent Implementability
    of Viewpoints.” In <i> Conference Proceedings Monterey Workshop 2012</i>, 7539:380–95.
    Springer, 2012. <a href="https://doi.org/10.1007/978-3-642-34059-8_20">https://doi.org/10.1007/978-3-642-34059-8_20</a>.
  ieee: T. A. Henzinger and D. Nickovic, “Independent implementability of viewpoints,”
    in <i> Conference proceedings Monterey Workshop 2012</i>, Oxford, UK, 2012, vol.
    7539, pp. 380–395.
  ista: Henzinger TA, Nickovic D. 2012. Independent implementability of viewpoints.  Conference
    proceedings Monterey Workshop 2012. Monterey Workshop 2012, LNCS, vol. 7539, 380–395.
  mla: Henzinger, Thomas A., and Dejan Nickovic. “Independent Implementability of
    Viewpoints.” <i> Conference Proceedings Monterey Workshop 2012</i>, vol. 7539,
    Springer, 2012, pp. 380–95, doi:<a href="https://doi.org/10.1007/978-3-642-34059-8_20">10.1007/978-3-642-34059-8_20</a>.
  short: T.A. Henzinger, D. Nickovic, in:,  Conference Proceedings Monterey Workshop
    2012, Springer, 2012, pp. 380–395.
conference:
  end_date: 2012-03-21
  location: Oxford, UK
  name: Monterey Workshop 2012
  start_date: 2012-03-19
date_created: 2018-12-11T12:00:28Z
date_published: 2012-09-16T00:00:00Z
date_updated: 2021-01-12T07:39:56Z
day: '16'
department:
- _id: ToHe
doi: 10.1007/978-3-642-34059-8_20
ec_funded: 1
intvolume: '      7539'
language:
- iso: eng
month: '09'
oa_version: None
page: 380 - 395
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
publication: ' Conference proceedings Monterey Workshop 2012'
publication_status: published
publisher: Springer
publist_id: '3791'
quality_controlled: '1'
scopus_import: 1
status: public
title: Independent implementability of viewpoints
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 7539
year: '2012'
...
---
_id: '2943'
abstract:
- lang: eng
  text: We examine whether the Escherichia coli chromosome is folded into a self-adherent
    nucleoprotein complex, or alternately is a confined but otherwise unconstrained
    self-avoiding polymer. We address this through in vivo visualization, using an
    inducible GFP fusion to the nucleoid-associated protein Fis to non-specifically
    decorate the entire chromosome. For a range of different growth conditions, the
    chromosome is a compact structure that does not fill the volume of the cell, and
    which moves from the new pole to the cell centre. During rapid growth, chromosome
    segregation occurs well before cell division, with daughter chromosomes coupled
    by a thin inter-daughter filament before complete segregation, whereas during
    slow growth chromosomes stay adjacent until cell division occurs. Image correlation
    analysis indicates that sub-nucleoid structure is stable on a 1min timescale,
    comparable to the timescale for redistribution time measured for GFP-Fis after
    photobleaching. Optical deconvolution and writhe calculation analysis indicate
    that the nucleoid has a large-scale coiled organization rather than being an amorphous
    mass. Our observations are consistent with the chromosome having a self-adherent
    filament organization.
acknowledgement: We thank Professor Philippe Cluzel and Mr Lance Min for providing
  advice and materials. Jeannette Chau provided technical support. Work at NU was
  supported by NSF Grants DMR-0715099, MCB-1022117, DMR-1206868, DMR-0520513 and DMR-1121262
  (NU-MRSEC), by NIH-NCI Grant U54CA143869-01 (NU-PS-OC) and by the Chicago Biomedical
  Consortium with support from the Searle Funds at the Chicago Community Trust. Work
  at UCLA was supported by NIH Grant GM038509.
author:
- first_name: Nastaran
  full_name: Hadizadeh Yazdi, Nastaran
  last_name: Hadizadeh Yazdi
- first_name: Calin C
  full_name: Guet, Calin C
  id: 47F8433E-F248-11E8-B48F-1D18A9856A87
  last_name: Guet
  orcid: 0000-0001-6220-2052
- first_name: Reid
  full_name: Johnson, Reid
  last_name: Johnson
- first_name: John
  full_name: Marko, John
  last_name: Marko
citation:
  ama: Hadizadeh Yazdi N, Guet CC, Johnson R, Marko J. Variation of the folding and
    dynamics of the Escherichia coli chromosome with growth conditions. <i>Molecular
    Microbiology</i>. 2012;86(6):1318-1333. doi:<a href="https://doi.org/10.1111/mmi.12071">10.1111/mmi.12071</a>
  apa: Hadizadeh Yazdi, N., Guet, C. C., Johnson, R., &#38; Marko, J. (2012). Variation
    of the folding and dynamics of the Escherichia coli chromosome with growth conditions.
    <i>Molecular Microbiology</i>. Wiley-Blackwell. <a href="https://doi.org/10.1111/mmi.12071">https://doi.org/10.1111/mmi.12071</a>
  chicago: Hadizadeh Yazdi, Nastaran, Calin C Guet, Reid Johnson, and John Marko.
    “Variation of the Folding and Dynamics of the Escherichia Coli Chromosome with
    Growth Conditions.” <i>Molecular Microbiology</i>. Wiley-Blackwell, 2012. <a href="https://doi.org/10.1111/mmi.12071">https://doi.org/10.1111/mmi.12071</a>.
  ieee: N. Hadizadeh Yazdi, C. C. Guet, R. Johnson, and J. Marko, “Variation of the
    folding and dynamics of the Escherichia coli chromosome with growth conditions,”
    <i>Molecular Microbiology</i>, vol. 86, no. 6. Wiley-Blackwell, pp. 1318–1333,
    2012.
  ista: Hadizadeh Yazdi N, Guet CC, Johnson R, Marko J. 2012. Variation of the folding
    and dynamics of the Escherichia coli chromosome with growth conditions. Molecular
    Microbiology. 86(6), 1318–1333.
  mla: Hadizadeh Yazdi, Nastaran, et al. “Variation of the Folding and Dynamics of
    the Escherichia Coli Chromosome with Growth Conditions.” <i>Molecular Microbiology</i>,
    vol. 86, no. 6, Wiley-Blackwell, 2012, pp. 1318–33, doi:<a href="https://doi.org/10.1111/mmi.12071">10.1111/mmi.12071</a>.
  short: N. Hadizadeh Yazdi, C.C. Guet, R. Johnson, J. Marko, Molecular Microbiology
    86 (2012) 1318–1333.
date_created: 2018-12-11T12:00:28Z
date_published: 2012-11-09T00:00:00Z
date_updated: 2021-01-12T07:39:56Z
day: '09'
department:
- _id: CaGu
doi: 10.1111/mmi.12071
intvolume: '        86'
issue: '6'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://europepmc.org/articles/pmc3524407
month: '11'
oa: 1
oa_version: Submitted Version
page: 1318 - 1333
publication: Molecular Microbiology
publication_status: published
publisher: Wiley-Blackwell
publist_id: '3790'
quality_controlled: '1'
scopus_import: 1
status: public
title: Variation of the folding and dynamics of the Escherichia coli chromosome with
  growth conditions
type: journal_article
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 86
year: '2012'
...
---
_id: '2945'
abstract:
- lang: eng
  text: In search of foreign antigens, lymphocytes recirculate from the blood, through
    lymph nodes, into lymphatics and back to the blood. Dendritic cells also migrate
    to lymph nodes for optimal interaction with lymphocytes. This continuous trafficking
    of immune cells into and out of lymph nodes is essential for immune surveillance
    of foreign invaders. In this article, we review our current understanding of the
    functions of high endothelial venules (HEVs), stroma and lymphatics in the entry,
    positioning and exit of immune cells in lymph nodes during homeostasis, and we
    highlight the unexpected role of dendritic cells in the control of lymphocyte
    homing through HEVs.
acknowledgement: We thank M. Sixt and A. Peixoto for helpful comments on the manuscript.
  Work in the laboratory of J.-P.G. is supported by grants from Fondation ARC pour
  la Recherche sur le Cancer, Agence Nationale de la Recherche (ANR), Institut National
  du Cancer (INCA), Fondation RITC and Région Midi-Pyrénées. Research by R.F. is supported
  by Deutsche Forschungsgemeinschaft (DFG) grants SFB621-A1, SFB738-B5, SFB587-B3,
  SFB900-B1 and KFO 250-FO 334/2-1. We regret that, owing to space limitations, we
  could not always quote the work of colleagues who have contributed to the field.
author:
- first_name: Jean
  full_name: Girard, Jean
  last_name: Girard
- first_name: Christine
  full_name: Moussion, Christine
  id: 3356F664-F248-11E8-B48F-1D18A9856A87
  last_name: Moussion
- first_name: Reinhold
  full_name: Förster, Reinhold
  last_name: Förster
citation:
  ama: Girard J, Moussion C, Förster R. HEVs, lymphatics and homeostatic immune cell
    trafficking in lymph nodes. <i>Nature Reviews Immunology</i>. 2012;12(11):762-773.
    doi:<a href="https://doi.org/10.1038/nri3298">10.1038/nri3298</a>
  apa: Girard, J., Moussion, C., &#38; Förster, R. (2012). HEVs, lymphatics and homeostatic
    immune cell trafficking in lymph nodes. <i>Nature Reviews Immunology</i>. Nature
    Publishing Group. <a href="https://doi.org/10.1038/nri3298">https://doi.org/10.1038/nri3298</a>
  chicago: Girard, Jean, Christine Moussion, and Reinhold Förster. “HEVs, Lymphatics
    and Homeostatic Immune Cell Trafficking in Lymph Nodes.” <i>Nature Reviews Immunology</i>.
    Nature Publishing Group, 2012. <a href="https://doi.org/10.1038/nri3298">https://doi.org/10.1038/nri3298</a>.
  ieee: J. Girard, C. Moussion, and R. Förster, “HEVs, lymphatics and homeostatic
    immune cell trafficking in lymph nodes,” <i>Nature Reviews Immunology</i>, vol.
    12, no. 11. Nature Publishing Group, pp. 762–773, 2012.
  ista: Girard J, Moussion C, Förster R. 2012. HEVs, lymphatics and homeostatic immune
    cell trafficking in lymph nodes. Nature Reviews Immunology. 12(11), 762–773.
  mla: Girard, Jean, et al. “HEVs, Lymphatics and Homeostatic Immune Cell Trafficking
    in Lymph Nodes.” <i>Nature Reviews Immunology</i>, vol. 12, no. 11, Nature Publishing
    Group, 2012, pp. 762–73, doi:<a href="https://doi.org/10.1038/nri3298">10.1038/nri3298</a>.
  short: J. Girard, C. Moussion, R. Förster, Nature Reviews Immunology 12 (2012) 762–773.
date_created: 2018-12-11T12:00:29Z
date_published: 2012-11-01T00:00:00Z
date_updated: 2021-01-12T07:39:57Z
day: '01'
department:
- _id: MiSi
doi: 10.1038/nri3298
intvolume: '        12'
issue: '11'
language:
- iso: eng
month: '11'
oa_version: None
page: 762 - 773
publication: Nature Reviews Immunology
publication_status: published
publisher: Nature Publishing Group
publist_id: '3787'
quality_controlled: '1'
scopus_import: 1
status: public
title: HEVs, lymphatics and homeostatic immune cell trafficking in lymph nodes
type: journal_article
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 12
year: '2012'
...
---
_id: '2946'
abstract:
- lang: eng
  text: MicroRNAs (miRNAs) are small noncoding RNAs that function in literally all
    cellular processes. miRNAs interact with Argonaute (Ago) proteins and guide them
    to specific target sites located in the 3′-untranslated region (3′-UTR) of target
    mRNAs leading to translational repression and deadenylation-induced mRNA degradation.
    Most miRNAs are processed from hairpin-structured precursors by the consecutive
    action of the RNase III enzymes Drosha and Dicer. However, processing of miR-451
    is Dicer independent and cleavage is mediated by the endonuclease Ago2. Here we
    have characterized miR-451 sequence and structure requirements for processing
    as well as sorting of miRNAs into different Ago proteins. Pre-miR-451 appears
    to be optimized for Ago2 cleavage and changes result in reduced processing. In
    addition, we show that the mature miR-451 only associates with Ago2 suggesting
    that mature miRNAs are not exchanged between different members of the Ago protein
    family. Based on cloning and deep sequencing of endogenous miRNAs associated with
    Ago1-3, we do not find evidence for miRNA sorting in human cells. However, Ago
    identity appears to influence the length of some miRNAs, while others remain unaffected.
acknowledgement: "Deutsche Forschungsgemeinschaft (DFG) (SFB 960 and FOR855); European
  Research Council (ERC grant ‘sRNAs’); European Union (FP7 project ‘ONCOMIRs’); German
  Bundesministerium für Bildung und Forschung (BMBF, NGFN+, FKZ PIM-01GS0804-5); Bavarian
  Genome Research Network (BayGene to G.M.); The Netherlands Organization for Scientific
  Research (NWO, VIDI grant to E.B.). Funding for open access charge: DFG via the
  open access publishing program. \r\n\r\nWe thank Sigrun Ammon and Corinna Friederich
  for technical assistance and Sebastian Petri and Daniel Schraivogel for helpful
  discussions."
author:
- first_name: Anne
  full_name: Dueck, Anne
  last_name: Dueck
- first_name: Christian
  full_name: Ziegler, Christian
  last_name: Ziegler
- first_name: Alexander
  full_name: Eichner, Alexander
  id: 4DFA52AE-F248-11E8-B48F-1D18A9856A87
  last_name: Eichner
- first_name: Eugène
  full_name: Berezikov, Eugène
  last_name: Berezikov
- first_name: Gunter
  full_name: Meister, Gunter
  last_name: Meister
citation:
  ama: Dueck A, Ziegler C, Eichner A, Berezikov E, Meister G. MicroRNAs associated
    with the different human Argonaute proteins. <i>Nucleic Acids Research</i>. 2012;40(19):9850-9862.
    doi:<a href="https://doi.org/10.1093/nar/gks705">10.1093/nar/gks705</a>
  apa: Dueck, A., Ziegler, C., Eichner, A., Berezikov, E., &#38; Meister, G. (2012).
    MicroRNAs associated with the different human Argonaute proteins. <i>Nucleic Acids
    Research</i>. Oxford University Press. <a href="https://doi.org/10.1093/nar/gks705">https://doi.org/10.1093/nar/gks705</a>
  chicago: Dueck, Anne, Christian Ziegler, Alexander Eichner, Eugène Berezikov, and
    Gunter Meister. “MicroRNAs Associated with the Different Human Argonaute Proteins.”
    <i>Nucleic Acids Research</i>. Oxford University Press, 2012. <a href="https://doi.org/10.1093/nar/gks705">https://doi.org/10.1093/nar/gks705</a>.
  ieee: A. Dueck, C. Ziegler, A. Eichner, E. Berezikov, and G. Meister, “MicroRNAs
    associated with the different human Argonaute proteins,” <i>Nucleic Acids Research</i>,
    vol. 40, no. 19. Oxford University Press, pp. 9850–9862, 2012.
  ista: Dueck A, Ziegler C, Eichner A, Berezikov E, Meister G. 2012. MicroRNAs associated
    with the different human Argonaute proteins. Nucleic Acids Research. 40(19), 9850–9862.
  mla: Dueck, Anne, et al. “MicroRNAs Associated with the Different Human Argonaute
    Proteins.” <i>Nucleic Acids Research</i>, vol. 40, no. 19, Oxford University Press,
    2012, pp. 9850–62, doi:<a href="https://doi.org/10.1093/nar/gks705">10.1093/nar/gks705</a>.
  short: A. Dueck, C. Ziegler, A. Eichner, E. Berezikov, G. Meister, Nucleic Acids
    Research 40 (2012) 9850–9862.
date_created: 2018-12-11T12:00:29Z
date_published: 2012-10-01T00:00:00Z
date_updated: 2021-01-12T07:39:57Z
day: '01'
ddc:
- '570'
department:
- _id: MiSi
doi: 10.1093/nar/gks705
file:
- access_level: open_access
  checksum: 1bb8d1ff894014b481657a21083c941c
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:13:12Z
  date_updated: 2020-07-14T12:45:55Z
  file_id: '4993'
  file_name: IST-2015-383-v1+1_Nucl._Acids_Res.-2012-Dueck-9850-62.pdf
  file_size: 8126936
  relation: main_file
file_date_updated: 2020-07-14T12:45:55Z
has_accepted_license: '1'
intvolume: '        40'
issue: '19'
language:
- iso: eng
license: https://creativecommons.org/licenses/by-nc/4.0/
month: '10'
oa: 1
oa_version: Published Version
page: 9850 - 9862
publication: Nucleic Acids Research
publication_status: published
publisher: Oxford University Press
publist_id: '3786'
pubrep_id: '383'
quality_controlled: '1'
scopus_import: 1
status: public
title: MicroRNAs associated with the different human Argonaute proteins
tmp:
  image: /images/cc_by_nc.png
  legal_code_url: https://creativecommons.org/licenses/by-nc/4.0/legalcode
  name: Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)
  short: CC BY-NC (4.0)
type: journal_article
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 40
year: '2012'
...
---
_id: '2947'
abstract:
- lang: eng
  text: We introduce games with probabilistic uncertainty, a model for controller
    synthesis in which the controller observes the state through imprecise sensors
    that provide correct information about the current state with a fixed probability.
    That is, in each step, the sensors return an observed state, and given the observed
    state, there is a probability distribution (due to the estimation error) over
    the actual current state. The controller must base its decision on the observed
    state (rather than the actual current state, which it does not know). On the other
    hand, we assume that the environment can perfectly observe the current state.
    We show that controller synthesis for qualitative ω-regular objectives in our
    model can be reduced in polynomial time to standard partial-observation stochastic
    games, and vice-versa. As a consequence we establish the precise decidability
    frontier for the new class of games, and establish optimal complexity results
    for all the decidable problems.
acknowledgement: 'The research was supported by Austrian Science Fund (FWF) Grant
  No P 23499-N23 on Modern Graph Algorithmic Techniques in Formal Verification, FWF
  NFN Grant No S11407-N23 (RiSE), ERC Start grant (279307: Graph Games), and Microsoft
  faculty fellows award.'
alternative_title:
- LNCS
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Martin
  full_name: Chmelik, Martin
  id: 3624234E-F248-11E8-B48F-1D18A9856A87
  last_name: Chmelik
- first_name: Ritankar
  full_name: Majumdar, Ritankar
  last_name: Majumdar
citation:
  ama: 'Chatterjee K, Chmelik M, Majumdar R. Equivalence of games with probabilistic
    uncertainty and partial observation games. In: Vol 7561. Springer; 2012:385-399.
    doi:<a href="https://doi.org/10.1007/978-3-642-33386-6_30">10.1007/978-3-642-33386-6_30</a>'
  apa: 'Chatterjee, K., Chmelik, M., &#38; Majumdar, R. (2012). Equivalence of games
    with probabilistic uncertainty and partial observation games (Vol. 7561, pp. 385–399).
    Presented at the  ATVA: Automated Technology for Verification and Analysis, Thiruvananthapuram,
    India: Springer. <a href="https://doi.org/10.1007/978-3-642-33386-6_30">https://doi.org/10.1007/978-3-642-33386-6_30</a>'
  chicago: Chatterjee, Krishnendu, Martin Chmelik, and Ritankar Majumdar. “Equivalence
    of Games with Probabilistic Uncertainty and Partial Observation Games,” 7561:385–99.
    Springer, 2012. <a href="https://doi.org/10.1007/978-3-642-33386-6_30">https://doi.org/10.1007/978-3-642-33386-6_30</a>.
  ieee: 'K. Chatterjee, M. Chmelik, and R. Majumdar, “Equivalence of games with probabilistic
    uncertainty and partial observation games,” presented at the  ATVA: Automated
    Technology for Verification and Analysis, Thiruvananthapuram, India, 2012, vol.
    7561, pp. 385–399.'
  ista: 'Chatterjee K, Chmelik M, Majumdar R. 2012. Equivalence of games with probabilistic
    uncertainty and partial observation games.  ATVA: Automated Technology for Verification
    and Analysis, LNCS, vol. 7561, 385–399.'
  mla: Chatterjee, Krishnendu, et al. <i>Equivalence of Games with Probabilistic Uncertainty
    and Partial Observation Games</i>. Vol. 7561, Springer, 2012, pp. 385–99, doi:<a
    href="https://doi.org/10.1007/978-3-642-33386-6_30">10.1007/978-3-642-33386-6_30</a>.
  short: K. Chatterjee, M. Chmelik, R. Majumdar, in:, Springer, 2012, pp. 385–399.
conference:
  end_date: 2012-10-06
  location: Thiruvananthapuram, India
  name: ' ATVA: Automated Technology for Verification and Analysis'
  start_date: 2012-10-03
date_created: 2018-12-11T12:00:29Z
date_published: 2012-06-01T00:00:00Z
date_updated: 2021-01-12T07:39:58Z
day: '01'
department:
- _id: KrCh
doi: 10.1007/978-3-642-33386-6_30
ec_funded: 1
intvolume: '      7561'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1202.4140
month: '06'
oa: 1
oa_version: Preprint
page: 385 - 399
project:
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication_status: published
publisher: Springer
publist_id: '3785'
quality_controlled: '1'
scopus_import: 1
status: public
title: Equivalence of games with probabilistic uncertainty and partial observation
  games
type: conference
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 7561
year: '2012'
...
