[{"oa_version":"None","type":"conference","department":[{"_id":"KrCh"}],"date_published":"2014-09-01T00:00:00Z","language":[{"iso":"eng"}],"doi":"10.1007/978-3-662-44584-6_9","conference":{"name":"CONCUR: Concurrency Theory","start_date":"2014-09-02","location":"Rome, Italy","end_date":"2014-09-05"},"publication_status":"published","publication":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","page":"109 - 124","date_created":"2018-12-11T11:55:26Z","volume":8704,"quality_controlled":"1","citation":{"ama":"Aminof B, Kotek T, Rubin S, Spegni F, Veith H. Parameterized model checking of rendezvous systems. In: Baldan P, Gorla D, eds. <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>. Vol 8704. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2014:109-124. doi:<a href=\"https://doi.org/10.1007/978-3-662-44584-6_9\">10.1007/978-3-662-44584-6_9</a>","ieee":"B. Aminof, T. Kotek, S. Rubin, F. Spegni, and H. Veith, “Parameterized model checking of rendezvous systems,” in <i>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, Rome, Italy, 2014, vol. 8704, pp. 109–124.","short":"B. Aminof, T. Kotek, S. Rubin, F. Spegni, H. Veith, in:, P. Baldan, D. Gorla (Eds.), Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2014, pp. 109–124.","mla":"Aminof, Benjamin, et al. “Parameterized Model Checking of Rendezvous Systems.” <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, edited by Paolo Baldan and Daniele Gorla, vol. 8704, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2014, pp. 109–24, doi:<a href=\"https://doi.org/10.1007/978-3-662-44584-6_9\">10.1007/978-3-662-44584-6_9</a>.","ista":"Aminof B, Kotek T, Rubin S, Spegni F, Veith H. 2014. Parameterized model checking of rendezvous systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). CONCUR: Concurrency Theory, LNCS, vol. 8704, 109–124.","apa":"Aminof, B., Kotek, T., Rubin, S., Spegni, F., &#38; Veith, H. (2014). Parameterized model checking of rendezvous systems. In P. Baldan &#38; D. Gorla (Eds.), <i>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i> (Vol. 8704, pp. 109–124). Rome, Italy: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. <a href=\"https://doi.org/10.1007/978-3-662-44584-6_9\">https://doi.org/10.1007/978-3-662-44584-6_9</a>","chicago":"Aminof, Benjamin, Tomer Kotek, Sacha Rubin, Francesco Spegni, and Helmut Veith. “Parameterized Model Checking of Rendezvous Systems.” In <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, edited by Paolo Baldan and Daniele Gorla, 8704:109–24. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2014. <a href=\"https://doi.org/10.1007/978-3-662-44584-6_9\">https://doi.org/10.1007/978-3-662-44584-6_9</a>."},"intvolume":"      8704","editor":[{"full_name":"Baldan, Paolo","last_name":"Baldan","first_name":"Paolo"},{"full_name":"Gorla, Daniele","last_name":"Gorla","first_name":"Daniele"}],"publist_id":"4994","author":[{"first_name":"Benjamin","last_name":"Aminof","id":"4A55BD00-F248-11E8-B48F-1D18A9856A87","full_name":"Aminof, Benjamin"},{"first_name":"Tomer","last_name":"Kotek","full_name":"Kotek, Tomer"},{"first_name":"Sacha","last_name":"Rubin","full_name":"Rubin, Sacha"},{"full_name":"Spegni, Francesco","first_name":"Francesco","last_name":"Spegni"},{"last_name":"Veith","first_name":"Helmut","full_name":"Veith, Helmut"}],"_id":"2052","acknowledgement":"The second, third, fourth and fifth authors were supported by the Austrian National Research Network S11403-N23 (RiSE) of the Austrian Science Fund (FWF) and by the Vienna Science and Technology Fund (WWTF) through grants PROSEED, ICT12-059, and VRG11-005.","abstract":[{"text":"A standard technique for solving the parameterized model checking problem is to reduce it to the classic model checking problem of finitely many finite-state systems. This work considers some of the theoretical power and limitations of this technique. We focus on concurrent systems in which processes communicate via pairwise rendezvous, as well as the special cases of disjunctive guards and token passing; specifications are expressed in indexed temporal logic without the next operator; and the underlying network topologies are generated by suitable Monadic Second Order Logic formulas and graph operations. First, we settle the exact computational complexity of the parameterized model checking problem for some of our concurrent systems, and establish new decidability results for others. Second, we consider the cases that model checking the parameterized system can be reduced to model checking some fixed number of processes, the number is known as a cutoff. We provide many cases for when such cutoffs can be computed, establish lower bounds on the size of such cutoffs, and identify cases where no cutoff exists. Third, we consider cases for which the parameterized system is equivalent to a single finite-state system (more precisely a Büchi word automaton), and establish tight bounds on the sizes of such automata.","lang":"eng"}],"date_updated":"2021-01-12T06:54:59Z","year":"2014","day":"01","alternative_title":["LNCS"],"month":"09","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","status":"public","publisher":"Schloss Dagstuhl - Leibniz-Zentrum für Informatik","title":"Parameterized model checking of rendezvous systems"},{"ec_funded":1,"month":"09","oa":1,"status":"public","_id":"2053","year":"2014","date_updated":"2021-01-12T06:55:00Z","abstract":[{"lang":"eng","text":"In contrast to the usual understanding of probabilistic systems as stochastic processes, recently these systems have also been regarded as transformers of probabilities. In this paper, we give a natural definition of strong bisimulation for probabilistic systems corresponding to this view that treats probability distributions as first-class citizens. Our definition applies in the same way to discrete systems as well as to systems with uncountable state and action spaces. Several examples demonstrate that our definition refines the understanding of behavioural equivalences of probabilistic systems. In particular, it solves a longstanding open problem concerning the representation of memoryless continuous time by memoryfull continuous time. Finally, we give algorithms for computing this bisimulation not only for finite but also for classes of uncountably infinite systems."}],"citation":{"short":"H. Hermanns, J. Krčál, J. Kretinsky, in:, P. Baldan, D. Gorla (Eds.), Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2014, pp. 249–265.","ama":"Hermanns H, Krčál J, Kretinsky J. Probabilistic bisimulation: Naturally on distributions. In: Baldan P, Gorla D, eds. <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>. Vol 8704. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2014:249-265. doi:<a href=\"https://doi.org/10.1007/978-3-662-44584-6_18\">10.1007/978-3-662-44584-6_18</a>","ieee":"H. Hermanns, J. Krčál, and J. Kretinsky, “Probabilistic bisimulation: Naturally on distributions,” in <i>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, Rome, Italy, 2014, vol. 8704, pp. 249–265.","ista":"Hermanns H, Krčál J, Kretinsky J. 2014. Probabilistic bisimulation: Naturally on distributions. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). CONCUR: Concurrency Theory, LNCS, vol. 8704, 249–265.","mla":"Hermanns, Holger, et al. “Probabilistic Bisimulation: Naturally on Distributions.” <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, edited by Paolo Baldan and Daniele Gorla, vol. 8704, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2014, pp. 249–65, doi:<a href=\"https://doi.org/10.1007/978-3-662-44584-6_18\">10.1007/978-3-662-44584-6_18</a>.","apa":"Hermanns, H., Krčál, J., &#38; Kretinsky, J. (2014). Probabilistic bisimulation: Naturally on distributions. In P. Baldan &#38; D. Gorla (Eds.), <i>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i> (Vol. 8704, pp. 249–265). Rome, Italy: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. <a href=\"https://doi.org/10.1007/978-3-662-44584-6_18\">https://doi.org/10.1007/978-3-662-44584-6_18</a>","chicago":"Hermanns, Holger, Jan Krčál, and Jan Kretinsky. “Probabilistic Bisimulation: Naturally on Distributions.” In <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, edited by Paolo Baldan and Daniele Gorla, 8704:249–65. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2014. <a href=\"https://doi.org/10.1007/978-3-662-44584-6_18\">https://doi.org/10.1007/978-3-662-44584-6_18</a>."},"intvolume":"      8704","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1404.5084"}],"date_published":"2014-09-01T00:00:00Z","oa_version":"Submitted Version","conference":{"name":"CONCUR: Concurrency Theory","start_date":"2014-09-02","location":"Rome, Italy","end_date":"2014-09-05"},"publication_status":"published","doi":"10.1007/978-3-662-44584-6_18","alternative_title":["LNCS"],"title":"Probabilistic bisimulation: Naturally on distributions","publisher":"Schloss Dagstuhl - Leibniz-Zentrum für Informatik","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","project":[{"call_identifier":"FP7","name":"Quantitative Reactive Modeling","_id":"25EE3708-B435-11E9-9278-68D0E5697425","grant_number":"267989"},{"grant_number":"S11402-N23","_id":"25F5A88A-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Moderne Concurrency Paradigms"}],"author":[{"full_name":"Hermanns, Holger","last_name":"Hermanns","first_name":"Holger"},{"full_name":"Krčál, Jan","last_name":"Krčál","first_name":"Jan"},{"orcid":"0000-0002-8122-2881","first_name":"Jan","last_name":"Kretinsky","id":"44CEF464-F248-11E8-B48F-1D18A9856A87","full_name":"Kretinsky, Jan"}],"day":"01","acknowledgement":"This work is supported by the EU 7th Framework Programme under grant agreements 295261 (MEALS) and 318490 (SENSATION), Czech Science Foundation under grant agreement P202/12/G061, the DFG Transregional Collaborative Research Centre SFB/TR 14 AVACS, and by the CAS/SAFEA International Partnership Program for Creative Research Teams.","editor":[{"full_name":"Baldan, Paolo","first_name":"Paolo","last_name":"Baldan"},{"full_name":"Gorla, Daniele","first_name":"Daniele","last_name":"Gorla"}],"volume":8704,"publist_id":"4993","language":[{"iso":"eng"}],"department":[{"_id":"ToHe"},{"_id":"KrCh"}],"type":"conference","date_created":"2018-12-11T11:55:27Z","page":"249 - 265","publication":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"_id":"2054","abstract":[{"lang":"eng","text":"We study two-player concurrent games on finite-state graphs played for an infinite number of rounds, where in each round, the two players (player 1 and player 2) choose their moves independently and simultaneously; the current state and the two moves determine the successor state. The objectives are ω-regular winning conditions specified as parity objectives. We consider the qualitative analysis problems: the computation of the almost-sure and limit-sure winning set of states, where player 1 can ensure to win with probability 1 and with probability arbitrarily close to 1, respectively. In general the almost-sure and limit-sure winning strategies require both infinite-memory as well as infinite-precision (to describe probabilities). While the qualitative analysis problem for concurrent parity games with infinite-memory, infinite-precision randomized strategies was studied before, we study the bounded-rationality problem for qualitative analysis of concurrent parity games, where the strategy set for player 1 is restricted to bounded-resource strategies. In terms of precision, strategies can be deterministic, uniform, finite-precision, or infinite-precision; and in terms of memory, strategies can be memoryless, finite-memory, or infinite-memory. We present a precise and complete characterization of the qualitative winning sets for all combinations of classes of strategies. In particular, we show that uniform memoryless strategies are as powerful as finite-precision infinite-memory strategies, and infinite-precision memoryless strategies are as powerful as infinite-precision finite-memory strategies. We show that the winning sets can be computed in (n2d+3) time, where n is the size of the game structure and 2d is the number of priorities (or colors), and our algorithms are symbolic. The membership problem of whether a state belongs to a winning set can be decided in NP ∩ coNP. Our symbolic algorithms are based on a characterization of the winning sets as μ-calculus formulas, however, our μ-calculus formulas are crucially different from the ones for concurrent parity games (without bounded rationality); and our memoryless witness strategy constructions are significantly different from the infinite-memory witness strategy constructions for concurrent parity games."}],"date_updated":"2023-02-23T11:23:36Z","year":"2014","month":"09","ec_funded":1,"status":"public","oa_version":"None","date_published":"2014-09-01T00:00:00Z","doi":"10.1007/978-3-662-44584-6_37","publication_status":"published","conference":{"location":"Rome, Italy","end_date":"2014-09-05","name":"CONCUR: Concurrency Theory","start_date":"2014-09-02"},"intvolume":"      8704","citation":{"chicago":"Chatterjee, Krishnendu. “Qualitative Concurrent Parity Games: Bounded Rationality.” In <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, edited by Paolo Baldan and Daniele Gorla, 8704:544–59. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2014. <a href=\"https://doi.org/10.1007/978-3-662-44584-6_37\">https://doi.org/10.1007/978-3-662-44584-6_37</a>.","mla":"Chatterjee, Krishnendu. “Qualitative Concurrent Parity Games: Bounded Rationality.” <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, edited by Paolo Baldan and Daniele Gorla, vol. 8704, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2014, pp. 544–59, doi:<a href=\"https://doi.org/10.1007/978-3-662-44584-6_37\">10.1007/978-3-662-44584-6_37</a>.","ista":"Chatterjee K. 2014. Qualitative concurrent parity games: Bounded rationality. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). CONCUR: Concurrency Theory, LNCS, vol. 8704, 544–559.","apa":"Chatterjee, K. (2014). Qualitative concurrent parity games: Bounded rationality. In P. Baldan &#38; D. Gorla (Eds.), <i>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i> (Vol. 8704, pp. 544–559). Rome, Italy: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. <a href=\"https://doi.org/10.1007/978-3-662-44584-6_37\">https://doi.org/10.1007/978-3-662-44584-6_37</a>","short":"K. Chatterjee, in:, P. Baldan, D. Gorla (Eds.), Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2014, pp. 544–559.","ama":"Chatterjee K. Qualitative concurrent parity games: Bounded rationality. In: Baldan P, Gorla D, eds. <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>. Vol 8704. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2014:544-559. doi:<a href=\"https://doi.org/10.1007/978-3-662-44584-6_37\">10.1007/978-3-662-44584-6_37</a>","ieee":"K. Chatterjee, “Qualitative concurrent parity games: Bounded rationality,” in <i>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, Rome, Italy, 2014, vol. 8704, pp. 544–559."},"author":[{"full_name":"Chatterjee, Krishnendu","orcid":"0000-0002-4561-241X","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","last_name":"Chatterjee"}],"project":[{"call_identifier":"FWF","name":"Modern Graph Algorithmic Techniques in Formal Verification","_id":"2584A770-B435-11E9-9278-68D0E5697425","grant_number":"P 23499-N23"},{"_id":"25863FF4-B435-11E9-9278-68D0E5697425","grant_number":"S11407","name":"Game Theory","call_identifier":"FWF"},{"name":"Quantitative Graph Games: Theory and Applications","call_identifier":"FP7","_id":"2581B60A-B435-11E9-9278-68D0E5697425","grant_number":"279307"},{"name":"Microsoft Research Faculty Fellowship","_id":"2587B514-B435-11E9-9278-68D0E5697425"}],"day":"01","alternative_title":["LNCS"],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publisher":"Schloss Dagstuhl - Leibniz-Zentrum für Informatik","title":"Qualitative concurrent parity games: Bounded rationality","type":"conference","department":[{"_id":"KrCh"}],"language":[{"iso":"eng"}],"publication":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","page":"544 - 559","date_created":"2018-12-11T11:55:27Z","quality_controlled":"1","volume":8704,"editor":[{"first_name":"Paolo","last_name":"Baldan","full_name":"Baldan, Paolo"},{"first_name":"Daniele","last_name":"Gorla","full_name":"Gorla, Daniele"}],"related_material":{"record":[{"status":"public","relation":"earlier_version","id":"3354"}]},"publist_id":"4992"},{"acknowledgement":"T. Petrov is supported by SystemsX.ch—the Swiss Inititative for Systems Biology.","day":"20","author":[{"first_name":"Arnab","last_name":"Ganguly","full_name":"Ganguly, Arnab"},{"full_name":"Petrov, Tatjana","last_name":"Petrov","id":"3D5811FC-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9041-0905","first_name":"Tatjana"},{"full_name":"Koeppl, Heinz","first_name":"Heinz","last_name":"Koeppl"}],"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","title":"Markov chain aggregation and its applications to combinatorial reaction networks","publication":"Journal of Mathematical Biology","date_created":"2018-12-11T11:55:28Z","page":"767 - 797","type":"journal_article","department":[{"_id":"CaGu"},{"_id":"ToHe"}],"language":[{"iso":"eng"}],"publist_id":"4990","volume":69,"quality_controlled":"1","abstract":[{"text":"We consider a continuous-time Markov chain (CTMC) whose state space is partitioned into aggregates, and each aggregate is assigned a probability measure. A sufficient condition for defining a CTMC over the aggregates is presented as a variant of weak lumpability, which also characterizes that the measure over the original process can be recovered from that of the aggregated one. We show how the applicability of de-aggregation depends on the initial distribution. The application section is devoted to illustrate how the developed theory aids in reducing CTMC models of biochemical systems particularly in connection to protein-protein interactions. We assume that the model is written by a biologist in form of site-graph-rewrite rules. Site-graph-rewrite rules compactly express that, often, only a local context of a protein (instead of a full molecular species) needs to be in a certain configuration in order to trigger a reaction event. This observation leads to suitable aggregate Markov chains with smaller state spaces, thereby providing sufficient reduction in computational complexity. This is further exemplified in two case studies: simple unbounded polymerization and early EGFR/insulin crosstalk.","lang":"eng"}],"issue":"3","date_updated":"2021-01-12T06:55:01Z","year":"2014","_id":"2056","status":"public","oa":1,"month":"11","doi":"10.1007/s00285-013-0738-7","publication_status":"published","oa_version":"Submitted Version","date_published":"2014-11-20T00:00:00Z","scopus_import":1,"main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1303.4532"}],"intvolume":"        69","citation":{"chicago":"Ganguly, Arnab, Tatjana Petrov, and Heinz Koeppl. “Markov Chain Aggregation and Its Applications to Combinatorial Reaction Networks.” <i>Journal of Mathematical Biology</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s00285-013-0738-7\">https://doi.org/10.1007/s00285-013-0738-7</a>.","ista":"Ganguly A, Petrov T, Koeppl H. 2014. Markov chain aggregation and its applications to combinatorial reaction networks. Journal of Mathematical Biology. 69(3), 767–797.","mla":"Ganguly, Arnab, et al. “Markov Chain Aggregation and Its Applications to Combinatorial Reaction Networks.” <i>Journal of Mathematical Biology</i>, vol. 69, no. 3, Springer, 2014, pp. 767–97, doi:<a href=\"https://doi.org/10.1007/s00285-013-0738-7\">10.1007/s00285-013-0738-7</a>.","apa":"Ganguly, A., Petrov, T., &#38; Koeppl, H. (2014). Markov chain aggregation and its applications to combinatorial reaction networks. <i>Journal of Mathematical Biology</i>. Springer. <a href=\"https://doi.org/10.1007/s00285-013-0738-7\">https://doi.org/10.1007/s00285-013-0738-7</a>","short":"A. Ganguly, T. Petrov, H. Koeppl, Journal of Mathematical Biology 69 (2014) 767–797.","ieee":"A. Ganguly, T. Petrov, and H. Koeppl, “Markov chain aggregation and its applications to combinatorial reaction networks,” <i>Journal of Mathematical Biology</i>, vol. 69, no. 3. Springer, pp. 767–797, 2014.","ama":"Ganguly A, Petrov T, Koeppl H. Markov chain aggregation and its applications to combinatorial reaction networks. <i>Journal of Mathematical Biology</i>. 2014;69(3):767-797. doi:<a href=\"https://doi.org/10.1007/s00285-013-0738-7\">10.1007/s00285-013-0738-7</a>"}},{"title":"Majority vote of diverse classifiers for late fusion","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","alternative_title":["LNCS"],"day":"01","author":[{"orcid":"0000-0002-8301-7240","first_name":"Emilie","last_name":"Morvant","id":"4BAC2A72-F248-11E8-B48F-1D18A9856A87","full_name":"Morvant, Emilie"},{"full_name":"Habrard, Amaury","first_name":"Amaury","last_name":"Habrard"},{"full_name":"Ayache, Stéphane","first_name":"Stéphane","last_name":"Ayache"}],"project":[{"grant_number":"308036","_id":"2532554C-B435-11E9-9278-68D0E5697425","name":"Lifelong Learning of Visual Scene Understanding","call_identifier":"FP7"}],"publist_id":"4989","quality_controlled":"1","volume":8621,"external_id":{"arxiv":["1404.7796"]},"publication":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","page":"153 - 162","date_created":"2018-12-11T11:55:28Z","department":[{"_id":"ChLa"}],"language":[{"iso":"eng"}],"type":"conference","oa":1,"status":"public","ec_funded":1,"month":"01","year":"2014","abstract":[{"lang":"eng","text":"In the past few years, a lot of attention has been devoted to multimedia indexing by fusing multimodal informations. Two kinds of fusion schemes are generally considered: The early fusion and the late fusion. We focus on late classifier fusion, where one combines the scores of each modality at the decision level. To tackle this problem, we investigate a recent and elegant well-founded quadratic program named MinCq coming from the machine learning PAC-Bayesian theory. MinCq looks for the weighted combination, over a set of real-valued functions seen as voters, leading to the lowest misclassification rate, while maximizing the voters’ diversity. We propose an extension of MinCq tailored to multimedia indexing. Our method is based on an order-preserving pairwise loss adapted to ranking that allows us to improve Mean Averaged Precision measure while taking into account the diversity of the voters that we want to fuse. We provide evidence that this method is naturally adapted to late fusion procedures and confirm the good behavior of our approach on the challenging PASCAL VOC’07 benchmark."}],"arxiv":1,"date_updated":"2021-01-12T06:55:01Z","_id":"2057","main_file_link":[{"url":"http://arxiv.org/abs/1404.7796","open_access":"1"}],"scopus_import":1,"intvolume":"      8621","citation":{"short":"E. Morvant, A. Habrard, S. Ayache, in:, Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 2014, pp. 153–162.","ama":"Morvant E, Habrard A, Ayache S. Majority vote of diverse classifiers for late fusion. In: <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>. Vol 8621. Springer; 2014:153-162. doi:<a href=\"https://doi.org/10.1007/978-3-662-44415-3_16\">10.1007/978-3-662-44415-3_16</a>","ieee":"E. Morvant, A. Habrard, and S. Ayache, “Majority vote of diverse classifiers for late fusion,” in <i>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, Joensuu, Finland, 2014, vol. 8621, pp. 153–162.","ista":"Morvant E, Habrard A, Ayache S. 2014. Majority vote of diverse classifiers for late fusion. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). IAPR: International Workshop on Structural, Syntactic, and Statistical Pattern Recognition, LNCS, vol. 8621, 153–162.","mla":"Morvant, Emilie, et al. “Majority Vote of Diverse Classifiers for Late Fusion.” <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, vol. 8621, Springer, 2014, pp. 153–62, doi:<a href=\"https://doi.org/10.1007/978-3-662-44415-3_16\">10.1007/978-3-662-44415-3_16</a>.","apa":"Morvant, E., Habrard, A., &#38; Ayache, S. (2014). Majority vote of diverse classifiers for late fusion. In <i>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i> (Vol. 8621, pp. 153–162). Joensuu, Finland: Springer. <a href=\"https://doi.org/10.1007/978-3-662-44415-3_16\">https://doi.org/10.1007/978-3-662-44415-3_16</a>","chicago":"Morvant, Emilie, Amaury Habrard, and Stéphane Ayache. “Majority Vote of Diverse Classifiers for Late Fusion.” In <i>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</i>, 8621:153–62. Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-662-44415-3_16\">https://doi.org/10.1007/978-3-662-44415-3_16</a>."},"doi":"10.1007/978-3-662-44415-3_16","conference":{"name":"IAPR: International Workshop on Structural, Syntactic, and Statistical Pattern Recognition","start_date":"2014-08-20","location":"Joensuu, Finland","end_date":"2014-08-22"},"publication_status":"published","date_published":"2014-01-01T00:00:00Z","oa_version":"Preprint"},{"title":"Blending liquids","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publisher":"ACM","file":[{"file_size":8387384,"relation":"main_file","content_type":"application/pdf","date_created":"2018-12-12T10:08:27Z","file_name":"IST-2016-606-v1+1_BlendingLiquids-Preprint.pdf","date_updated":"2020-07-14T12:45:27Z","access_level":"open_access","creator":"system","file_id":"4688","checksum":"1752760a2e71e254537f31c0d10d9c6c"}],"author":[{"last_name":"Raveendran","first_name":"Karthik","full_name":"Raveendran, Karthik"},{"last_name":"Wojtan","id":"3C61F1D2-F248-11E8-B48F-1D18A9856A87","first_name":"Christopher J","orcid":"0000-0001-6646-5546","full_name":"Wojtan, Christopher J"},{"full_name":"Thuerey, Nils","first_name":"Nils","last_name":"Thuerey"},{"full_name":"Türk, Greg","last_name":"Türk","first_name":"Greg"}],"project":[{"grant_number":"11-NSF-1070","_id":"25636330-B435-11E9-9278-68D0E5697425","name":"ROOTS Genome-wide Analysis of Root Traits"}],"day":"01","volume":33,"quality_controlled":"1","article_processing_charge":"No","pubrep_id":"606","publist_id":"4988","department":[{"_id":"ChWo"}],"language":[{"iso":"eng"}],"type":"conference","publication":"ACM Transactions on Graphics","date_created":"2018-12-11T11:55:28Z","has_accepted_license":"1","month":"07","oa":1,"status":"public","_id":"2058","article_number":"137","year":"2014","issue":"4","abstract":[{"text":"We present a method for smoothly blending between existing liquid animations. We introduce a semi-automatic method for matching two existing liquid animations, which we use to create new fluid motion that plausibly interpolates the input. Our contributions include a new space-time non-rigid iterative closest point algorithm that incorporates user guidance, a subsampling technique for efficient registration of meshes with millions of vertices, and a fast surface extraction algorithm that produces 3D triangle meshes from a 4D space-time surface. Our technique can be used to instantly create hundreds of new simulations, or to interactively explore complex parameter spaces. Our method is guaranteed to produce output that does not deviate from the input animations, and it generalizes to multiple dimensions. Because our method runs at interactive rates after the initial precomputation step, it has potential applications in games and training simulations.","lang":"eng"}],"date_updated":"2022-08-25T14:02:46Z","intvolume":"        33","citation":{"chicago":"Raveendran, Karthik, Chris Wojtan, Nils Thuerey, and Greg Türk. “Blending Liquids.” In <i>ACM Transactions on Graphics</i>, Vol. 33. ACM, 2014. <a href=\"https://doi.org/10.1145/2601097.2601126\">https://doi.org/10.1145/2601097.2601126</a>.","apa":"Raveendran, K., Wojtan, C., Thuerey, N., &#38; Türk, G. (2014). Blending liquids. In <i>ACM Transactions on Graphics</i> (Vol. 33). Vancouver, Canada: ACM. <a href=\"https://doi.org/10.1145/2601097.2601126\">https://doi.org/10.1145/2601097.2601126</a>","ista":"Raveendran K, Wojtan C, Thuerey N, Türk G. 2014. Blending liquids. ACM Transactions on Graphics. SIGGRAPH: International Conference and Exhibition on Computer Graphics and Interactive Techniques vol. 33, 137.","mla":"Raveendran, Karthik, et al. “Blending Liquids.” <i>ACM Transactions on Graphics</i>, vol. 33, no. 4, 137, ACM, 2014, doi:<a href=\"https://doi.org/10.1145/2601097.2601126\">10.1145/2601097.2601126</a>.","ama":"Raveendran K, Wojtan C, Thuerey N, Türk G. Blending liquids. In: <i>ACM Transactions on Graphics</i>. Vol 33. ACM; 2014. doi:<a href=\"https://doi.org/10.1145/2601097.2601126\">10.1145/2601097.2601126</a>","ieee":"K. Raveendran, C. Wojtan, N. Thuerey, and G. Türk, “Blending liquids,” in <i>ACM Transactions on Graphics</i>, Vancouver, Canada, 2014, vol. 33, no. 4.","short":"K. Raveendran, C. Wojtan, N. Thuerey, G. Türk, in:, ACM Transactions on Graphics, ACM, 2014."},"ddc":["000"],"scopus_import":"1","file_date_updated":"2020-07-14T12:45:27Z","date_published":"2014-07-01T00:00:00Z","oa_version":"Submitted Version","doi":"10.1145/2601097.2601126","publication_status":"published","conference":{"end_date":"2014-08-14","location":"Vancouver, Canada","start_date":"2014-08-10","name":"SIGGRAPH: International Conference and Exhibition on Computer Graphics and Interactive Techniques"}},{"date_created":"2018-12-11T11:55:29Z","page":"1077 - 1087","publication":"Protoplasma","has_accepted_license":"1","language":[{"iso":"eng"}],"department":[{"_id":"EvBe"}],"type":"journal_article","publist_id":"4987","pubrep_id":"394","volume":251,"quality_controlled":"1","day":"20","tmp":{"short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"acknowledgement":"The research was supported by the IPP PAS-IPGB SAS bilateral project (“Molecular analysis of auxin distribution in oilseed androgenic embryos”), IPP PAS-FWO VIB bilateral project (“Auxin as signaling molecule in doubled haploid production of rape (B. napus var. oleifera)”), individual national research project 2011/01/D/NZ9/02547, and VEGA 2-0090-14.","file":[{"file_size":6377990,"content_type":"application/pdf","relation":"main_file","access_level":"open_access","creator":"system","checksum":"d570a6073765118fc0bb83c31d96fa53","file_id":"5353","date_created":"2018-12-12T10:18:31Z","file_name":"IST-2015-394-v1+1_s00709-014-0616-1.pdf","date_updated":"2020-07-14T12:45:27Z"}],"author":[{"full_name":"Dubas, Ewa","last_name":"Dubas","first_name":"Ewa"},{"full_name":"Moravčíková, Jana","first_name":"Jana","last_name":"Moravčíková"},{"first_name":"Jana","last_name":"Libantová","full_name":"Libantová, Jana"},{"first_name":"Ildikó","last_name":"Matušíková","full_name":"Matušíková, Ildikó"},{"full_name":"Benková, Eva","first_name":"Eva","orcid":"0000-0002-8510-9739","id":"38F4F166-F248-11E8-B48F-1D18A9856A87","last_name":"Benková"},{"first_name":"Iwona","last_name":"Zur","full_name":"Zur, Iwona"},{"full_name":"Krzewska, Monika","last_name":"Krzewska","first_name":"Monika"}],"title":"The influence of heat stress on auxin distribution in transgenic B napus microspores and microspore derived embryos","publisher":"Springer","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publication_status":"published","doi":"10.1007/s00709-014-0616-1","date_published":"2014-02-20T00:00:00Z","oa_version":"Published Version","ddc":["580"],"scopus_import":1,"file_date_updated":"2020-07-14T12:45:27Z","citation":{"short":"E. Dubas, J. Moravčíková, J. Libantová, I. Matušíková, E. Benková, I. Zur, M. Krzewska, Protoplasma 251 (2014) 1077–1087.","ieee":"E. Dubas <i>et al.</i>, “The influence of heat stress on auxin distribution in transgenic B napus microspores and microspore derived embryos,” <i>Protoplasma</i>, vol. 251, no. 5. Springer, pp. 1077–1087, 2014.","ama":"Dubas E, Moravčíková J, Libantová J, et al. The influence of heat stress on auxin distribution in transgenic B napus microspores and microspore derived embryos. <i>Protoplasma</i>. 2014;251(5):1077-1087. doi:<a href=\"https://doi.org/10.1007/s00709-014-0616-1\">10.1007/s00709-014-0616-1</a>","chicago":"Dubas, Ewa, Jana Moravčíková, Jana Libantová, Ildikó Matušíková, Eva Benková, Iwona Zur, and Monika Krzewska. “The Influence of Heat Stress on Auxin Distribution in Transgenic B Napus Microspores and Microspore Derived Embryos.” <i>Protoplasma</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s00709-014-0616-1\">https://doi.org/10.1007/s00709-014-0616-1</a>.","ista":"Dubas E, Moravčíková J, Libantová J, Matušíková I, Benková E, Zur I, Krzewska M. 2014. The influence of heat stress on auxin distribution in transgenic B napus microspores and microspore derived embryos. Protoplasma. 251(5), 1077–1087.","apa":"Dubas, E., Moravčíková, J., Libantová, J., Matušíková, I., Benková, E., Zur, I., &#38; Krzewska, M. (2014). The influence of heat stress on auxin distribution in transgenic B napus microspores and microspore derived embryos. <i>Protoplasma</i>. Springer. <a href=\"https://doi.org/10.1007/s00709-014-0616-1\">https://doi.org/10.1007/s00709-014-0616-1</a>","mla":"Dubas, Ewa, et al. “The Influence of Heat Stress on Auxin Distribution in Transgenic B Napus Microspores and Microspore Derived Embryos.” <i>Protoplasma</i>, vol. 251, no. 5, Springer, 2014, pp. 1077–87, doi:<a href=\"https://doi.org/10.1007/s00709-014-0616-1\">10.1007/s00709-014-0616-1</a>."},"intvolume":"       251","year":"2014","date_updated":"2021-01-12T06:55:02Z","issue":"5","abstract":[{"text":"Plant embryogenesis is regulated by differential distribution of the plant hormone auxin. However, the cells establishing these gradients during microspore embryogenesis remain to be identified. For the first time, we describe, using the DR5 or DR5rev reporter gene systems, the GFP- and GUS-based auxin biosensors to monitor auxin during Brassica napus androgenesis at cellular resolution in the initial stages. Our study provides evidence that the distribution of auxin changes during embryo development and depends on the temperature-inducible in vitro culture conditions. For this, microspores (mcs) were induced to embryogenesis by heat treatment and then subjected to genetic modification via Agrobacterium tumefaciens. The duration of high temperature treatment had a significant influence on auxin distribution in isolated and in vitro-cultured microspores and on microspore-derived embryo development. In the “mild” heat-treated (1 day at 32 °C) mcs, auxin localized in a polar way already at the uni-nucleate microspore, which was critical for the initiation of embryos with suspensor-like structure. Assuming a mean mcs radius of 20 μm, endogenous auxin content in a single cell corresponded to concentration of 1.01 μM. In mcs subjected to a prolonged heat (5 days at 32 °C), although auxin concentration increased dozen times, auxin polarization was set up at a few-celled pro-embryos without suspensor. Those embryos were enclosed in the outer wall called the exine. The exine rupture was accompanied by the auxin gradient polarization. Relative quantitative estimation of auxin, using time-lapse imaging, revealed that primordia possess up to 1.3-fold higher amounts than those found in the root apices of transgenic MDEs in the presence of exogenous auxin. Our results show, for the first time, which concentration of endogenous auxin coincides with the first cell division and how the high temperature interplays with auxin, by what affects delay early establishing microspore polarity. Moreover, we present how the local auxin accumulation demonstrates the apical–basal axis formation of the androgenic embryo and directs the axiality of the adult haploid plant.","lang":"eng"}],"_id":"2059","oa":1,"status":"public","month":"02"},{"scopus_import":1,"publist_id":"4985","intvolume":"       251","citation":{"chicago":"Mazur, Ewa, Ewa Kurczyñska, and Jiří Friml. “Cellular Events during Interfascicular Cambium Ontogenesis in Inflorescence Stems of Arabidopsis.” <i>Protoplasma</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s00709-014-0620-5\">https://doi.org/10.1007/s00709-014-0620-5</a>.","mla":"Mazur, Ewa, et al. “Cellular Events during Interfascicular Cambium Ontogenesis in Inflorescence Stems of Arabidopsis.” <i>Protoplasma</i>, vol. 251, no. 5, Springer, 2014, pp. 1125–39, doi:<a href=\"https://doi.org/10.1007/s00709-014-0620-5\">10.1007/s00709-014-0620-5</a>.","apa":"Mazur, E., Kurczyñska, E., &#38; Friml, J. (2014). Cellular events during interfascicular cambium ontogenesis in inflorescence stems of Arabidopsis. <i>Protoplasma</i>. Springer. <a href=\"https://doi.org/10.1007/s00709-014-0620-5\">https://doi.org/10.1007/s00709-014-0620-5</a>","ista":"Mazur E, Kurczyñska E, Friml J. 2014. Cellular events during interfascicular cambium ontogenesis in inflorescence stems of Arabidopsis. Protoplasma. 251(5), 1125–1139.","short":"E. Mazur, E. Kurczyñska, J. Friml, Protoplasma 251 (2014) 1125–1139.","ama":"Mazur E, Kurczyñska E, Friml J. Cellular events during interfascicular cambium ontogenesis in inflorescence stems of Arabidopsis. <i>Protoplasma</i>. 2014;251(5):1125-1139. doi:<a href=\"https://doi.org/10.1007/s00709-014-0620-5\">10.1007/s00709-014-0620-5</a>","ieee":"E. Mazur, E. Kurczyñska, and J. Friml, “Cellular events during interfascicular cambium ontogenesis in inflorescence stems of Arabidopsis,” <i>Protoplasma</i>, vol. 251, no. 5. Springer, pp. 1125–1139, 2014."},"volume":251,"quality_controlled":"1","publication":"Protoplasma","date_created":"2018-12-11T11:55:29Z","page":"1125 - 1139","doi":"10.1007/s00709-014-0620-5","publication_status":"published","date_published":"2014-02-14T00:00:00Z","department":[{"_id":"JiFr"}],"language":[{"iso":"eng"}],"type":"journal_article","oa_version":"None","title":"Cellular events during interfascicular cambium ontogenesis in inflorescence stems of Arabidopsis","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","status":"public","month":"02","year":"2014","day":"14","abstract":[{"lang":"eng","text":"Development of cambium and its activity is important for our knowledge of the mechanism of secondary growth. Arabidopsis thaliana emerges as a good model plant for such a kind of study. Thus, this paper reports on cellular events taking place in the interfascicular regions of inflorescence stems of A. thaliana, leading to the development of interfascicular cambium from differentiated interfascicular parenchyma cells (IPC). These events are as follows: appearance of auxin accumulation, PIN1 gene expression, polar PIN1 protein localization in the basal plasma membrane and periclinal divisions. Distribution of auxin was observed to be higher in differentiating into cambium parenchyma cells compared to cells within the pith and cortex. Expression of PIN1 in IPC was always preceded by auxin accumulation. Basal localization of PIN1 was already established in the cells prior to their periclinal division. These cellular events initiated within parenchyma cells adjacent to the vascular bundles and successively extended from that point towards the middle region of the interfascicular area, located between neighboring vascular bundles. The final consequence of which was the closure of the cambial ring within the stem. Changes in the chemical composition of IPC walls were also detected and included changes of pectic epitopes, xyloglucans (XG) and extensins rich in hydroxyproline (HRGPs). In summary, results presented in this paper describe interfascicular cambium ontogenesis in terms of successive cellular events in the interfascicular regions of inflorescence stems of Arabidopsis."}],"issue":"5","date_updated":"2021-01-12T06:55:03Z","_id":"2061","author":[{"full_name":"Mazur, Ewa","first_name":"Ewa","last_name":"Mazur"},{"first_name":"Ewa","last_name":"Kurczyñska","full_name":"Kurczyñska, Ewa"},{"full_name":"Friml, Jiří","first_name":"Jiří","orcid":"0000-0002-8302-7596","id":"4159519E-F248-11E8-B48F-1D18A9856A87","last_name":"Friml"}]},{"quality_controlled":"1","volume":345,"publist_id":"4984","pubrep_id":"821","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"PeJo"}],"has_accepted_license":"1","date_created":"2018-12-11T11:55:29Z","publication":"Science","publisher":"American Association for the Advancement of Science","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","title":"Fast-spiking parvalbumin^+ GABAergic interneurons: From cellular design to microcircuit function","project":[{"_id":"25C26B1E-B435-11E9-9278-68D0E5697425","grant_number":"P24909-B24","call_identifier":"FWF","name":"Mechanisms of transmitter release at GABAergic synapses"},{"call_identifier":"FP7","name":"Nanophysiology of fast-spiking, parvalbumin-expressing GABAergic interneurons","_id":"25C0F108-B435-11E9-9278-68D0E5697425","grant_number":"268548"}],"author":[{"full_name":"Hu, Hua","id":"4AC0145C-F248-11E8-B48F-1D18A9856A87","last_name":"Hu","first_name":"Hua"},{"first_name":"Jian","id":"3614E438-F248-11E8-B48F-1D18A9856A87","last_name":"Gan","full_name":"Gan, Jian"},{"orcid":"0000-0001-5001-4804","first_name":"Peter M","last_name":"Jonas","id":"353C1B58-F248-11E8-B48F-1D18A9856A87","full_name":"Jonas, Peter M"}],"file":[{"content_type":"application/pdf","relation":"main_file","file_size":215514,"file_id":"5185","creator":"system","checksum":"a0036a589037d37e86364fa25cc0a82f","access_level":"open_access","file_name":"IST-2017-821-v1+1_1255263JonasPVReviewTextR_Final.pdf","date_updated":"2020-07-14T12:45:27Z","date_created":"2018-12-12T10:16:00Z"},{"file_size":1732723,"content_type":"application/pdf","relation":"main_file","access_level":"open_access","file_id":"5186","checksum":"e1f57d2713725449cb898fdcb8ef47b8","creator":"system","date_created":"2018-12-12T10:16:01Z","date_updated":"2020-07-14T12:45:27Z","file_name":"IST-2017-821-v1+2_1255263JonasPVReviewFigures_Final.pdf"}],"day":"01","citation":{"short":"H. Hu, J. Gan, P.M. Jonas, Science 345 (2014).","ama":"Hu H, Gan J, Jonas PM. Fast-spiking parvalbumin^+ GABAergic interneurons: From cellular design to microcircuit function. <i>Science</i>. 2014;345(6196). doi:<a href=\"https://doi.org/10.1126/science.1255263\">10.1126/science.1255263</a>","ieee":"H. Hu, J. Gan, and P. M. Jonas, “Fast-spiking parvalbumin^+ GABAergic interneurons: From cellular design to microcircuit function,” <i>Science</i>, vol. 345, no. 6196. American Association for the Advancement of Science, 2014.","chicago":"Hu, Hua, Jian Gan, and Peter M Jonas. “Fast-Spiking Parvalbumin^+ GABAergic Interneurons: From Cellular Design to Microcircuit Function.” <i>Science</i>. American Association for the Advancement of Science, 2014. <a href=\"https://doi.org/10.1126/science.1255263\">https://doi.org/10.1126/science.1255263</a>.","mla":"Hu, Hua, et al. “Fast-Spiking Parvalbumin^+ GABAergic Interneurons: From Cellular Design to Microcircuit Function.” <i>Science</i>, vol. 345, no. 6196, 1255263, American Association for the Advancement of Science, 2014, doi:<a href=\"https://doi.org/10.1126/science.1255263\">10.1126/science.1255263</a>.","ista":"Hu H, Gan J, Jonas PM. 2014. Fast-spiking parvalbumin^+ GABAergic interneurons: From cellular design to microcircuit function. Science. 345(6196), 1255263.","apa":"Hu, H., Gan, J., &#38; Jonas, P. M. (2014). Fast-spiking parvalbumin^+ GABAergic interneurons: From cellular design to microcircuit function. <i>Science</i>. American Association for the Advancement of Science. <a href=\"https://doi.org/10.1126/science.1255263\">https://doi.org/10.1126/science.1255263</a>"},"intvolume":"       345","scopus_import":1,"file_date_updated":"2020-07-14T12:45:27Z","ddc":["570"],"oa_version":"Submitted Version","date_published":"2014-08-01T00:00:00Z","publication_status":"published","doi":"10.1126/science.1255263","month":"08","ec_funded":1,"status":"public","oa":1,"article_number":"1255263","_id":"2062","date_updated":"2021-01-12T06:55:03Z","issue":"6196","abstract":[{"text":"The success story of fast-spiking, parvalbumin-positive (PV+) GABAergic interneurons (GABA, γ-aminobutyric acid) in the mammalian central nervous system is noteworthy. In 1995, the properties of these interneurons were completely unknown. Twenty years later, thanks to the massive use of subcellular patch-clamp techniques, simultaneous multiple-cell recording, optogenetics, in vivo measurements, and computational approaches, our knowledge about PV+ interneurons became more extensive than for several types of pyramidal neurons. These findings have implications beyond the “small world” of basic research on GABAergic cells. For example, the results provide a first proof of principle that neuroscientists might be able to close the gaps between the molecular, cellular, network, and behavioral levels, representing one of the main challenges at the present time. Furthermore, the results may form the basis for PV+ interneurons as therapeutic targets for brain disease in the future. However, much needs to be learned about the basic function of these interneurons before clinical neuroscientists will be able to use PV+ interneurons for therapeutic purposes.","lang":"eng"}],"year":"2014"},{"publist_id":"4978","volume":8559,"quality_controlled":"1","intvolume":"      8559","citation":{"chicago":"Chatterjee, Krishnendu, Martin Chmelik, and Przemyslaw Daca. “CEGAR for Qualitative Analysis of Probabilistic Systems,” 8559:473–90. Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-319-08867-9_31\">https://doi.org/10.1007/978-3-319-08867-9_31</a>.","ista":"Chatterjee K, Chmelik M, Daca P. 2014. CEGAR for qualitative analysis of probabilistic systems. CAV: Computer Aided Verification, LNCS, vol. 8559, 473–490.","apa":"Chatterjee, K., Chmelik, M., &#38; Daca, P. (2014). CEGAR for qualitative analysis of probabilistic systems (Vol. 8559, pp. 473–490). Presented at the CAV: Computer Aided Verification, Vienna, Austria: Springer. <a href=\"https://doi.org/10.1007/978-3-319-08867-9_31\">https://doi.org/10.1007/978-3-319-08867-9_31</a>","mla":"Chatterjee, Krishnendu, et al. <i>CEGAR for Qualitative Analysis of Probabilistic Systems</i>. Vol. 8559, Springer, 2014, pp. 473–90, doi:<a href=\"https://doi.org/10.1007/978-3-319-08867-9_31\">10.1007/978-3-319-08867-9_31</a>.","ieee":"K. Chatterjee, M. Chmelik, and P. Daca, “CEGAR for qualitative analysis of probabilistic systems,” presented at the CAV: Computer Aided Verification, Vienna, Austria, 2014, vol. 8559, pp. 473–490.","ama":"Chatterjee K, Chmelik M, Daca P. CEGAR for qualitative analysis of probabilistic systems. In: Vol 8559. Springer; 2014:473-490. doi:<a href=\"https://doi.org/10.1007/978-3-319-08867-9_31\">10.1007/978-3-319-08867-9_31</a>","short":"K. Chatterjee, M. Chmelik, P. Daca, in:, Springer, 2014, pp. 473–490."},"related_material":{"record":[{"id":"5412","status":"public","relation":"earlier_version"},{"status":"public","relation":"earlier_version","id":"5413"},{"id":"5414","relation":"earlier_version","status":"public"},{"status":"public","relation":"dissertation_contains","id":"1155"}]},"doi":"10.1007/978-3-319-08867-9_31","publication_status":"published","conference":{"start_date":"2014-07-18","name":"CAV: Computer Aided Verification","end_date":"2014-07-22","location":"Vienna, Austria"},"page":"473 - 490","date_created":"2018-12-11T11:55:30Z","type":"conference","oa_version":"None","department":[{"_id":"KrCh"},{"_id":"ToHe"}],"date_published":"2014-07-01T00:00:00Z","language":[{"iso":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","status":"public","publisher":"Springer","title":"CEGAR for qualitative analysis of probabilistic systems","alternative_title":["LNCS"],"month":"07","ec_funded":1,"abstract":[{"text":"We consider Markov decision processes (MDPs) which are a standard model for probabilistic systems.We focus on qualitative properties forMDPs that can express that desired behaviors of the system arise almost-surely (with probability 1) or with positive probability. We introduce a new simulation relation to capture the refinement relation ofMDPs with respect to qualitative properties, and present discrete graph theoretic algorithms with quadratic complexity to compute the simulation relation.We present an automated technique for assume-guarantee style reasoning for compositional analysis ofMDPs with qualitative properties by giving a counterexample guided abstraction-refinement approach to compute our new simulation relation. We have implemented our algorithms and show that the compositional analysis leads to significant improvements.","lang":"eng"}],"date_updated":"2023-09-07T11:58:33Z","year":"2014","day":"01","author":[{"full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","first_name":"Krishnendu"},{"full_name":"Chmelik, Martin","id":"3624234E-F248-11E8-B48F-1D18A9856A87","last_name":"Chmelik","first_name":"Martin"},{"full_name":"Daca, Przemyslaw","last_name":"Daca","id":"49351290-F248-11E8-B48F-1D18A9856A87","first_name":"Przemyslaw"}],"project":[{"call_identifier":"FWF","name":"Modern Graph Algorithmic Techniques in Formal Verification","grant_number":"P 23499-N23","_id":"2584A770-B435-11E9-9278-68D0E5697425"},{"call_identifier":"FWF","name":"Game Theory","grant_number":"S11407","_id":"25863FF4-B435-11E9-9278-68D0E5697425"},{"_id":"25F5A88A-B435-11E9-9278-68D0E5697425","grant_number":"S11402-N23","call_identifier":"FWF","name":"Moderne Concurrency Paradigms"},{"call_identifier":"FP7","name":"Quantitative Graph Games: Theory and Applications","_id":"2581B60A-B435-11E9-9278-68D0E5697425","grant_number":"279307"},{"name":"Microsoft Research Faculty Fellowship","_id":"2587B514-B435-11E9-9278-68D0E5697425"},{"call_identifier":"FP7","name":"Quantitative Reactive Modeling","grant_number":"267989","_id":"25EE3708-B435-11E9-9278-68D0E5697425"}],"_id":"2063"},{"publication_status":"published","doi":"10.1002/cne.23654","oa_version":"Submitted Version","date_published":"2014-07-29T00:00:00Z","scopus_import":1,"main_file_link":[{"open_access":"1","url":"http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4198489/"}],"citation":{"short":"M. Rubio, Y. Fukazawa, N. Kamasawa, C. Clarkson, E. Molnár, R. Shigemoto, Journal of Comparative Neurology 522 (2014) 4023–4042.","ama":"Rubio M, Fukazawa Y, Kamasawa N, Clarkson C, Molnár E, Shigemoto R. Target- and input-dependent organization of AMPA and NMDA receptors in synaptic connections of the cochlear nucleus. <i>Journal of Comparative Neurology</i>. 2014;522(18):4023-4042. doi:<a href=\"https://doi.org/10.1002/cne.23654\">10.1002/cne.23654</a>","ieee":"M. Rubio, Y. Fukazawa, N. Kamasawa, C. Clarkson, E. Molnár, and R. Shigemoto, “Target- and input-dependent organization of AMPA and NMDA receptors in synaptic connections of the cochlear nucleus,” <i>Journal of Comparative Neurology</i>, vol. 522, no. 18. Wiley-Blackwell, pp. 4023–4042, 2014.","chicago":"Rubio, Maía, Yugo Fukazawa, Naomi Kamasawa, Cheryl Clarkson, Elek Molnár, and Ryuichi Shigemoto. “Target- and Input-Dependent Organization of AMPA and NMDA Receptors in Synaptic Connections of the Cochlear Nucleus.” <i>Journal of Comparative Neurology</i>. Wiley-Blackwell, 2014. <a href=\"https://doi.org/10.1002/cne.23654\">https://doi.org/10.1002/cne.23654</a>.","ista":"Rubio M, Fukazawa Y, Kamasawa N, Clarkson C, Molnár E, Shigemoto R. 2014. Target- and input-dependent organization of AMPA and NMDA receptors in synaptic connections of the cochlear nucleus. Journal of Comparative Neurology. 522(18), 4023–4042.","apa":"Rubio, M., Fukazawa, Y., Kamasawa, N., Clarkson, C., Molnár, E., &#38; Shigemoto, R. (2014). Target- and input-dependent organization of AMPA and NMDA receptors in synaptic connections of the cochlear nucleus. <i>Journal of Comparative Neurology</i>. Wiley-Blackwell. <a href=\"https://doi.org/10.1002/cne.23654\">https://doi.org/10.1002/cne.23654</a>","mla":"Rubio, Maía, et al. “Target- and Input-Dependent Organization of AMPA and NMDA Receptors in Synaptic Connections of the Cochlear Nucleus.” <i>Journal of Comparative Neurology</i>, vol. 522, no. 18, Wiley-Blackwell, 2014, pp. 4023–42, doi:<a href=\"https://doi.org/10.1002/cne.23654\">10.1002/cne.23654</a>."},"intvolume":"       522","date_updated":"2021-01-12T06:55:05Z","abstract":[{"text":"We examined the synaptic structure, quantity, and distribution of α-amino-3-hydroxy-5-methylisoxazole-4-propionic acid (AMPA)- and N-methyl-D-aspartate (NMDA)-type glutamate receptors (AMPARs and NMDARs, respectively) in rat cochlear nuclei by a highly sensitive freeze-fracture replica labeling technique. Four excitatory synapses formed by two distinct inputs, auditory nerve (AN) and parallel fibers (PF), on different cell types were analyzed. These excitatory synapse types included AN synapses on bushy cells (AN-BC synapses) and fusiform cells (AN-FC synapses) and PF synapses on FC (PF-FC synapses) and cartwheel cell spines (PF-CwC synapses). Immunogold labeling revealed differences in synaptic structure as well as AMPAR and NMDAR number and/or density in both AN and PF synapses, indicating a target-dependent organization. The immunogold receptor labeling also identified differences in the synaptic organization of FCs based on AN or PF connections, indicating an input-dependent organization in FCs. Among the four excitatory synapse types, the AN-BC synapses were the smallest and had the most densely packed intramembrane particles (IMPs), whereas the PF-CwC synapses were the largest and had sparsely packed IMPs. All four synapse types showed positive correlations between the IMP-cluster area and the AMPAR number, indicating a common intrasynapse-type relationship for glutamatergic synapses. Immunogold particles for AMPARs were distributed over the entire area of individual AN synapses; PF synapses often showed synaptic areas devoid of labeling. The gold-labeling for NMDARs occurred in a mosaic fashion, with less positive correlations between the IMP-cluster area and the NMDAR number. Our observations reveal target- and input-dependent features in the structure, number, and organization of AMPARs and NMDARs in AN and PF synapses.","lang":"eng"}],"issue":"18","year":"2014","_id":"2064","status":"public","oa":1,"month":"07","page":"4023 - 4042","date_created":"2018-12-11T11:55:30Z","publication":"Journal of Comparative Neurology","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"RySh"}],"publist_id":"4974","quality_controlled":"1","volume":522,"acknowledgement":"National Institutes of Health (NIH) Grant Number: 1R01DC013048‐0; Biotechnology and Biological Sciences Research Council, UK Grant Number: BB/J015938/1\r\n","day":"29","author":[{"full_name":"Rubio, Maía","first_name":"Maía","last_name":"Rubio"},{"full_name":"Fukazawa, Yugo","last_name":"Fukazawa","first_name":"Yugo"},{"full_name":"Kamasawa, Naomi","last_name":"Kamasawa","first_name":"Naomi"},{"full_name":"Clarkson, Cheryl","first_name":"Cheryl","last_name":"Clarkson"},{"last_name":"Molnár","first_name":"Elek","full_name":"Molnár, Elek"},{"first_name":"Ryuichi","orcid":"0000-0001-8761-9444","id":"499F3ABC-F248-11E8-B48F-1D18A9856A87","last_name":"Shigemoto","full_name":"Shigemoto, Ryuichi"}],"publisher":"Wiley-Blackwell","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","title":"Target- and input-dependent organization of AMPA and NMDA receptors in synaptic connections of the cochlear nucleus"},{"pubrep_id":"682","publist_id":"4955","related_material":{"record":[{"relation":"dissertation_contains","status":"public","id":"838"}]},"quality_controlled":"1","editor":[{"first_name":"Juan","last_name":"Garay","full_name":"Garay, Juan"},{"last_name":"Gennaro","first_name":"Rosario","full_name":"Gennaro, Rosario"}],"volume":8616,"page":"113 - 130","date_created":"2018-12-11T11:55:36Z","has_accepted_license":"1","department":[{"_id":"KrPi"}],"language":[{"iso":"eng"}],"type":"conference","title":"The exact PRF-security of NMAC and HMAC","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","alternative_title":["LNCS"],"day":"01","file":[{"file_size":492310,"content_type":"application/pdf","relation":"main_file","access_level":"open_access","checksum":"dab6ab36a5f6af94f2b597e6404ed11d","file_id":"4999","creator":"system","date_created":"2018-12-12T10:13:17Z","file_name":"IST-2016-682-v1+1_578.pdf","date_updated":"2020-07-14T12:45:28Z"}],"author":[{"last_name":"Gazi","id":"3E0BFE38-F248-11E8-B48F-1D18A9856A87","first_name":"Peter","full_name":"Gazi, Peter"},{"first_name":"Krzysztof Z","orcid":"0000-0002-9139-1654","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","last_name":"Pietrzak","full_name":"Pietrzak, Krzysztof Z"},{"last_name":"Rybar","id":"2B3E3DE8-F248-11E8-B48F-1D18A9856A87","first_name":"Michal","full_name":"Rybar, Michal"}],"project":[{"grant_number":"259668","_id":"258C570E-B435-11E9-9278-68D0E5697425","name":"Provable Security for Physical Cryptography","call_identifier":"FP7"}],"ddc":["000","004"],"file_date_updated":"2020-07-14T12:45:28Z","citation":{"chicago":"Gazi, Peter, Krzysztof Z Pietrzak, and Michal Rybar. “The Exact PRF-Security of NMAC and HMAC.” edited by Juan Garay and Rosario Gennaro, 8616:113–30. Springer, 2014. <a href=\"https://doi.org/10.1007/978-3-662-44371-2_7\">https://doi.org/10.1007/978-3-662-44371-2_7</a>.","apa":"Gazi, P., Pietrzak, K. Z., &#38; Rybar, M. (2014). The exact PRF-security of NMAC and HMAC. In J. Garay &#38; R. Gennaro (Eds.) (Vol. 8616, pp. 113–130). Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, USA: Springer. <a href=\"https://doi.org/10.1007/978-3-662-44371-2_7\">https://doi.org/10.1007/978-3-662-44371-2_7</a>","ista":"Gazi P, Pietrzak KZ, Rybar M. 2014. The exact PRF-security of NMAC and HMAC. CRYPTO: International Cryptology Conference, LNCS, vol. 8616, 113–130.","mla":"Gazi, Peter, et al. <i>The Exact PRF-Security of NMAC and HMAC</i>. Edited by Juan Garay and Rosario Gennaro, vol. 8616, no. 1, Springer, 2014, pp. 113–30, doi:<a href=\"https://doi.org/10.1007/978-3-662-44371-2_7\">10.1007/978-3-662-44371-2_7</a>.","ieee":"P. Gazi, K. Z. Pietrzak, and M. Rybar, “The exact PRF-security of NMAC and HMAC,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, USA, 2014, vol. 8616, no. 1, pp. 113–130.","ama":"Gazi P, Pietrzak KZ, Rybar M. The exact PRF-security of NMAC and HMAC. In: Garay J, Gennaro R, eds. Vol 8616. Springer; 2014:113-130. doi:<a href=\"https://doi.org/10.1007/978-3-662-44371-2_7\">10.1007/978-3-662-44371-2_7</a>","short":"P. Gazi, K.Z. Pietrzak, M. Rybar, in:, J. Garay, R. Gennaro (Eds.), Springer, 2014, pp. 113–130."},"intvolume":"      8616","doi":"10.1007/978-3-662-44371-2_7","conference":{"start_date":"2014-08-17","name":"CRYPTO: International Cryptology Conference","end_date":"2014-08-21","location":"Santa Barbara, USA"},"publication_status":"published","date_published":"2014-01-01T00:00:00Z","oa_version":"Submitted Version","oa":1,"status":"public","ec_funded":1,"month":"01","year":"2014","abstract":[{"lang":"eng","text":"NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a variable input-length function. A practical single-key variant of NMAC called HMAC is a very popular and widely deployed message authentication code (MAC). Security proofs and attacks for NMAC can typically be lifted to HMAC. NMAC was introduced by Bellare, Canetti and Krawczyk [Crypto'96], who proved it to be a secure pseudorandom function (PRF), and thus also a MAC, assuming that (1) f is a PRF and (2) the function we get when cascading f is weakly collision-resistant. Unfortunately, HMAC is typically instantiated with cryptographic hash functions like MD5 or SHA-1 for which (2) has been found to be wrong. To restore the provable guarantees for NMAC, Bellare [Crypto'06] showed its security based solely on the assumption that f is a PRF, albeit via a non-uniform reduction. - Our first contribution is a simpler and uniform proof for this fact: If f is an ε-secure PRF (against q queries) and a δ-non-adaptively secure PRF (against q queries), then NMAC f is an (ε+ℓqδ)-secure PRF against q queries of length at most ℓ blocks each. - We then show that this ε+ℓqδ bound is basically tight. For the most interesting case where ℓqδ ≥ ε we prove this by constructing an f for which an attack with advantage ℓqδ exists. This also violates the bound O(ℓε) on the PRF-security of NMAC recently claimed by Koblitz and Menezes. - Finally, we analyze the PRF-security of a modification of NMAC called NI [An and Bellare, Crypto'99] that differs mainly by using a compression function with an additional keying input. This avoids the constant rekeying on multi-block messages in NMAC and allows for a security proof starting by the standard switch from a PRF to a random function, followed by an information-theoretic analysis. We carry out such an analysis, obtaining a tight ℓq2/2 c bound for this step, improving over the trivial bound of ℓ2q2/2c. The proof borrows combinatorial techniques originally developed for proving the security of CBC-MAC [Bellare et al., Crypto'05]."}],"issue":"1","date_updated":"2023-09-07T12:02:27Z","_id":"2082"},{"scopus_import":1,"file_date_updated":"2020-07-14T12:45:28Z","ddc":["570"],"intvolume":"        68","citation":{"short":"M. Lagator, A. Morgan, P. Neve, N. Colegrave, Evolution 68 (2014) 2296–2305.","ama":"Lagator M, Morgan A, Neve P, Colegrave N. Role of sex and migration in adaptation to sink environments. <i>Evolution</i>. 2014;68(8):2296-2305. doi:<a href=\"https://doi.org/10.1111/evo.12440\">10.1111/evo.12440</a>","ieee":"M. Lagator, A. Morgan, P. Neve, and N. Colegrave, “Role of sex and migration in adaptation to sink environments,” <i>Evolution</i>, vol. 68, no. 8. Wiley, pp. 2296–2305, 2014.","chicago":"Lagator, Mato, Andrew Morgan, Paul Neve, and Nick Colegrave. “Role of Sex and Migration in Adaptation to Sink Environments.” <i>Evolution</i>. Wiley, 2014. <a href=\"https://doi.org/10.1111/evo.12440\">https://doi.org/10.1111/evo.12440</a>.","mla":"Lagator, Mato, et al. “Role of Sex and Migration in Adaptation to Sink Environments.” <i>Evolution</i>, vol. 68, no. 8, Wiley, 2014, pp. 2296–305, doi:<a href=\"https://doi.org/10.1111/evo.12440\">10.1111/evo.12440</a>.","apa":"Lagator, M., Morgan, A., Neve, P., &#38; Colegrave, N. (2014). Role of sex and migration in adaptation to sink environments. <i>Evolution</i>. Wiley. <a href=\"https://doi.org/10.1111/evo.12440\">https://doi.org/10.1111/evo.12440</a>","ista":"Lagator M, Morgan A, Neve P, Colegrave N. 2014. Role of sex and migration in adaptation to sink environments. Evolution. 68(8), 2296–2305."},"doi":"10.1111/evo.12440","publication_status":"published","oa_version":"Published Version","date_published":"2014-04-25T00:00:00Z","status":"public","oa":1,"month":"04","abstract":[{"lang":"eng","text":"Understanding the effects of sex and migration on adaptation to novel environments remains a key problem in evolutionary biology. Using a single-cell alga Chlamydomonas reinhardtii, we investigated how sex and migration affected rates of evolutionary rescue in a sink environment, and subsequent changes in fitness following evolutionary rescue. We show that sex and migration affect both the rate of evolutionary rescue and subsequent adaptation. However, their combined effects change as the populations adapt to a sink habitat. Both sex and migration independently increased rates of evolutionary rescue, but the effect of sex on subsequent fitness improvements, following initial rescue, changed with migration, as sex was beneficial in the absence of migration but constraining adaptation when combined with migration. These results suggest that sex and migration are beneficial during the initial stages of adaptation, but can become detrimental as the population adapts to its environment."}],"issue":"8","date_updated":"2023-02-23T14:06:51Z","year":"2014","_id":"2083","article_processing_charge":"No","article_type":"original","publist_id":"4954","volume":68,"quality_controlled":"1","related_material":{"record":[{"id":"9747","status":"public","relation":"research_data"}]},"has_accepted_license":"1","publication":"Evolution","page":"2296 - 2305","date_created":"2018-12-11T11:55:36Z","type":"journal_article","department":[{"_id":"CaGu"}],"language":[{"iso":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Wiley","title":"Role of sex and migration in adaptation to sink environments","acknowledgement":"The authors are grateful to the Leverhulme Trust (F/00 215/AW) for funding this work.","day":"25","author":[{"first_name":"Mato","id":"345D25EC-F248-11E8-B48F-1D18A9856A87","last_name":"Lagator","full_name":"Lagator, Mato"},{"first_name":"Andrew","last_name":"Morgan","full_name":"Morgan, Andrew"},{"full_name":"Neve, Paul","last_name":"Neve","first_name":"Paul"},{"full_name":"Colegrave, Nick","first_name":"Nick","last_name":"Colegrave"}],"file":[{"creator":"dernst","checksum":"8d459b07e4a11bb5fde92d969184fe48","file_id":"7845","access_level":"open_access","file_name":"2014_Evolution_Lagator.pdf","date_updated":"2020-07-14T12:45:28Z","date_created":"2020-05-14T16:40:31Z","content_type":"application/pdf","relation":"main_file","file_size":467254}]},{"_id":"2084","year":"2014","date_updated":"2023-09-07T12:49:09Z","abstract":[{"lang":"eng","text":"Receptor tyrosine kinases (RTKs) are a large family of cell surface receptors that sense growth factors and hormones and regulate a variety of cell behaviours in health and disease. Contactless activation of RTKs with spatial and temporal precision is currently not feasible. Here, we generated RTKs that are insensitive to endogenous ligands but can be selectively activated by low-intensity blue light. We screened light-oxygen-voltage (LOV)-sensing domains for their ability to activate RTKs by light-activated dimerization. Incorporation of LOV domains found in aureochrome photoreceptors of stramenopiles resulted in robust activation of the fibroblast growth factor receptor 1 (FGFR1), epidermal growth factor receptor (EGFR) and rearranged during transfection (RET). In human cancer and endothelial cells, light induced cellular signalling with spatial and temporal precision. Furthermore, light faithfully mimicked complex mitogenic and morphogenic cell behaviour induced by growth factors. RTKs under optical control (Opto-RTKs) provide a powerful optogenetic approach to actuate cellular signals and manipulate cell behaviour."}],"issue":"15","month":"07","oa":1,"status":"public","date_published":"2014-07-01T00:00:00Z","oa_version":"Submitted Version","publication_status":"published","doi":"10.15252/embj.201387695","citation":{"short":"M. Grusch, K. Schelch, R. Riedler, E. Gschaider-Reichhart, C. Differ, W. Berger, Á. Inglés Prieto, H.L. Janovjak, EMBO Journal 33 (2014) 1713–1726.","ama":"Grusch M, Schelch K, Riedler R, et al. Spatio-temporally precise activation of engineered receptor tyrosine kinases by light. <i>EMBO Journal</i>. 2014;33(15):1713-1726. doi:<a href=\"https://doi.org/10.15252/embj.201387695\">10.15252/embj.201387695</a>","ieee":"M. Grusch <i>et al.</i>, “Spatio-temporally precise activation of engineered receptor tyrosine kinases by light,” <i>EMBO Journal</i>, vol. 33, no. 15. Wiley-Blackwell, pp. 1713–1726, 2014.","chicago":"Grusch, Michael, Karin Schelch, Robert Riedler, Eva Gschaider-Reichhart, Christopher Differ, Walter Berger, Álvaro Inglés Prieto, and Harald L Janovjak. “Spatio-Temporally Precise Activation of Engineered Receptor Tyrosine Kinases by Light.” <i>EMBO Journal</i>. Wiley-Blackwell, 2014. <a href=\"https://doi.org/10.15252/embj.201387695\">https://doi.org/10.15252/embj.201387695</a>.","apa":"Grusch, M., Schelch, K., Riedler, R., Gschaider-Reichhart, E., Differ, C., Berger, W., … Janovjak, H. L. (2014). Spatio-temporally precise activation of engineered receptor tyrosine kinases by light. <i>EMBO Journal</i>. Wiley-Blackwell. <a href=\"https://doi.org/10.15252/embj.201387695\">https://doi.org/10.15252/embj.201387695</a>","mla":"Grusch, Michael, et al. “Spatio-Temporally Precise Activation of Engineered Receptor Tyrosine Kinases by Light.” <i>EMBO Journal</i>, vol. 33, no. 15, Wiley-Blackwell, 2014, pp. 1713–26, doi:<a href=\"https://doi.org/10.15252/embj.201387695\">10.15252/embj.201387695</a>.","ista":"Grusch M, Schelch K, Riedler R, Gschaider-Reichhart E, Differ C, Berger W, Inglés Prieto Á, Janovjak HL. 2014. Spatio-temporally precise activation of engineered receptor tyrosine kinases by light. EMBO Journal. 33(15), 1713–1726."},"intvolume":"        33","main_file_link":[{"url":"http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4194103/","open_access":"1"}],"scopus_import":1,"author":[{"full_name":"Grusch, Michael","last_name":"Grusch","first_name":"Michael"},{"first_name":"Karin","last_name":"Schelch","full_name":"Schelch, Karin"},{"first_name":"Robert","last_name":"Riedler","full_name":"Riedler, Robert"},{"last_name":"Gschaider-Reichhart","id":"3FEE232A-F248-11E8-B48F-1D18A9856A87","first_name":"Eva","orcid":"0000-0002-7218-7738","full_name":"Gschaider-Reichhart, Eva"},{"first_name":"Christopher","last_name":"Differ","full_name":"Differ, Christopher"},{"last_name":"Berger","first_name":"Walter","full_name":"Berger, Walter"},{"id":"2A9DB292-F248-11E8-B48F-1D18A9856A87","last_name":"Inglés Prieto","first_name":"Álvaro","orcid":"0000-0002-5409-8571","full_name":"Inglés Prieto, Álvaro"},{"full_name":"Janovjak, Harald L","last_name":"Janovjak","id":"33BA6C30-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8023-9315","first_name":"Harald L"}],"day":"01","acknowledgement":"European Union Seventh Framework Programme; Human Frontier Science Program; Oesterreichische Nationalbank Anniversary Fund 14211; Austrian Research Promotion Agency; FemTech","title":"Spatio-temporally precise activation of engineered receptor tyrosine kinases by light","publisher":"Wiley-Blackwell","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","language":[{"iso":"eng"}],"department":[{"_id":"HaJa"}],"type":"journal_article","date_created":"2018-12-11T11:55:37Z","page":"1713 - 1726","publication":"EMBO Journal","related_material":{"record":[{"id":"418","relation":"dissertation_contains","status":"public"}]},"quality_controlled":"1","volume":33,"publist_id":"4953"},{"publication_status":"published","doi":"10.1371/journal.pone.0103989","oa_version":"Published Version","date_published":"2014-08-06T00:00:00Z","scopus_import":1,"file_date_updated":"2020-07-14T12:45:28Z","ddc":["570"],"intvolume":"         9","citation":{"apa":"Wolf, S., Mcmahon, D., Lim, K., Pull, C., Clark, S., Paxton, R., &#38; Osborne, J. (2014). So near and yet so far: Harmonic radar reveals reduced homing ability of Nosema infected honeybees. <i>PLoS One</i>. Public Library of Science. <a href=\"https://doi.org/10.1371/journal.pone.0103989\">https://doi.org/10.1371/journal.pone.0103989</a>","mla":"Wolf, Stephan, et al. “So near and yet so Far: Harmonic Radar Reveals Reduced Homing Ability of Nosema Infected Honeybees.” <i>PLoS One</i>, vol. 9, no. 8, e103989, Public Library of Science, 2014, doi:<a href=\"https://doi.org/10.1371/journal.pone.0103989\">10.1371/journal.pone.0103989</a>.","ista":"Wolf S, Mcmahon D, Lim K, Pull C, Clark S, Paxton R, Osborne J. 2014. So near and yet so far: Harmonic radar reveals reduced homing ability of Nosema infected honeybees. PLoS One. 9(8), e103989.","chicago":"Wolf, Stephan, Dino Mcmahon, Ka Lim, Christopher Pull, Suzanne Clark, Robert Paxton, and Juliet Osborne. “So near and yet so Far: Harmonic Radar Reveals Reduced Homing Ability of Nosema Infected Honeybees.” <i>PLoS One</i>. Public Library of Science, 2014. <a href=\"https://doi.org/10.1371/journal.pone.0103989\">https://doi.org/10.1371/journal.pone.0103989</a>.","ieee":"S. Wolf <i>et al.</i>, “So near and yet so far: Harmonic radar reveals reduced homing ability of Nosema infected honeybees,” <i>PLoS One</i>, vol. 9, no. 8. Public Library of Science, 2014.","ama":"Wolf S, Mcmahon D, Lim K, et al. So near and yet so far: Harmonic radar reveals reduced homing ability of Nosema infected honeybees. <i>PLoS One</i>. 2014;9(8). doi:<a href=\"https://doi.org/10.1371/journal.pone.0103989\">10.1371/journal.pone.0103989</a>","short":"S. Wolf, D. Mcmahon, K. Lim, C. Pull, S. Clark, R. Paxton, J. Osborne, PLoS One 9 (2014)."},"date_updated":"2023-02-23T14:11:56Z","issue":"8","abstract":[{"text":"Pathogens may gain a fitness advantage through manipulation of the behaviour of their hosts. Likewise, host behavioural changes can be a defence mechanism, counteracting the impact of pathogens on host fitness. We apply harmonic radar technology to characterize the impact of an emerging pathogen - Nosema ceranae (Microsporidia) - on honeybee (Apis mellifera) flight and orientation performance in the field. Honeybees are the most important commercial pollinators. Emerging diseases have been proposed to play a prominent role in colony decline, partly through sub-lethal behavioural manipulation of their hosts. We found that homing success was significantly reduced in diseased (65.8%) versus healthy foragers (92.5%). Although lost bees had significantly reduced continuous flight times and prolonged resting times, other flight characteristics and navigational abilities showed no significant difference between infected and non-infected bees. Our results suggest that infected bees express normal flight characteristics but are constrained in their homing ability, potentially compromising the colony by reducing its resource inputs, but also counteracting the intra-colony spread of infection. We provide the first high-resolution analysis of sub-lethal effects of an emerging disease on insect flight behaviour. The potential causes and the implications for both host and parasite are discussed.","lang":"eng"}],"year":"2014","article_number":"e103989","_id":"2086","status":"public","oa":1,"month":"08","has_accepted_license":"1","date_created":"2018-12-11T11:55:37Z","publication":"PLoS One","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"SyCr"}],"publist_id":"4949","pubrep_id":"437","volume":9,"quality_controlled":"1","related_material":{"record":[{"status":"public","relation":"research_data","id":"9888"}]},"acknowledgement":"This study was funded jointly by a grant from BBSRC, Defra, NERC, the Scottish Government and the Wellcome Trust, under the Insect Pollinators Initiative (grant numbers BB/I00097/1 and BB/I000100/1). Rothamsted Research is a national institute of bioscience strategically funded by the UK Biotechnology and Biological Sciences Research Council (BBSRC).","tmp":{"short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"day":"06","author":[{"last_name":"Wolf","first_name":"Stephan","full_name":"Wolf, Stephan"},{"full_name":"Mcmahon, Dino","first_name":"Dino","last_name":"Mcmahon"},{"full_name":"Lim, Ka","last_name":"Lim","first_name":"Ka"},{"full_name":"Pull, Christopher","id":"3C7F4840-F248-11E8-B48F-1D18A9856A87","last_name":"Pull","orcid":"0000-0003-1122-3982","first_name":"Christopher"},{"full_name":"Clark, Suzanne","last_name":"Clark","first_name":"Suzanne"},{"full_name":"Paxton, Robert","first_name":"Robert","last_name":"Paxton"},{"full_name":"Osborne, Juliet","last_name":"Osborne","first_name":"Juliet"}],"file":[{"file_size":1013386,"relation":"main_file","content_type":"application/pdf","date_created":"2018-12-12T10:13:55Z","file_name":"IST-2016-437-v1+1_journal.pone.0103989.pdf","date_updated":"2020-07-14T12:45:28Z","access_level":"open_access","checksum":"2fc62c6739eada4bddf026afbae669db","creator":"system","file_id":"5042"}],"publisher":"Public Library of Science","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","title":"So near and yet so far: Harmonic radar reveals reduced homing ability of Nosema infected honeybees"},{"scopus_import":"1","main_file_link":[{"open_access":"1","url":"https://eprints.cs.univie.ac.at/3933/"}],"citation":{"short":"K. Chatterjee, M.H. Henzinger, Journal of the ACM 61 (2014).","ieee":"K. Chatterjee and M. H. Henzinger, “Efficient and dynamic algorithms for alternating Büchi games and maximal end-component decomposition,” <i>Journal of the ACM</i>, vol. 61, no. 3. ACM, 2014.","ama":"Chatterjee K, Henzinger MH. Efficient and dynamic algorithms for alternating Büchi games and maximal end-component decomposition. <i>Journal of the ACM</i>. 2014;61(3). doi:<a href=\"https://doi.org/10.1145/2597631\">10.1145/2597631</a>","mla":"Chatterjee, Krishnendu, and Monika H. Henzinger. “Efficient and Dynamic Algorithms for Alternating Büchi Games and Maximal End-Component Decomposition.” <i>Journal of the ACM</i>, vol. 61, no. 3, a15, ACM, 2014, doi:<a href=\"https://doi.org/10.1145/2597631\">10.1145/2597631</a>.","ista":"Chatterjee K, Henzinger MH. 2014. Efficient and dynamic algorithms for alternating Büchi games and maximal end-component decomposition. Journal of the ACM. 61(3), a15.","apa":"Chatterjee, K., &#38; Henzinger, M. H. (2014). Efficient and dynamic algorithms for alternating Büchi games and maximal end-component decomposition. <i>Journal of the ACM</i>. ACM. <a href=\"https://doi.org/10.1145/2597631\">https://doi.org/10.1145/2597631</a>","chicago":"Chatterjee, Krishnendu, and Monika H Henzinger. “Efficient and Dynamic Algorithms for Alternating Büchi Games and Maximal End-Component Decomposition.” <i>Journal of the ACM</i>. ACM, 2014. <a href=\"https://doi.org/10.1145/2597631\">https://doi.org/10.1145/2597631</a>."},"intvolume":"        61","doi":"10.1145/2597631","publication_status":"published","date_published":"2014-05-01T00:00:00Z","oa_version":"Submitted Version","oa":1,"status":"public","ec_funded":1,"month":"05","year":"2014","issue":"3","abstract":[{"text":"The computation of the winning set for Büchi objectives in alternating games on graphs is a central problem in computer-aided verification with a large number of applications. The long-standing best known upper bound for solving the problem is Õ(n ⋅ m), where n is the number of vertices and m is the number of edges in the graph. We are the first to break the Õ(n ⋅ m) boundary by presenting a new technique that reduces the running time to O(n2). This bound also leads to O(n2)-time algorithms for computing the set of almost-sure winning vertices for Büchi objectives (1) in alternating games with probabilistic transitions (improving an earlier bound of Õ(n ⋅ m)), (2) in concurrent graph games with constant actions (improving an earlier bound of O(n3)), and (3) in Markov decision processes (improving for m&gt;n4/3 an earlier bound of O(m ⋅ √m)). We then show how to maintain the winning set for Büchi objectives in alternating games under a sequence of edge insertions or a sequence of edge deletions in O(n) amortized time per operation. Our algorithms are the first dynamic algorithms for this problem. We then consider another core graph theoretic problem in verification of probabilistic systems, namely computing the maximal end-component decomposition of a graph. We present two improved static algorithms for the maximal end-component decomposition problem. Our first algorithm is an O(m ⋅ √m)-time algorithm, and our second algorithm is an O(n2)-time algorithm which is obtained using the same technique as for alternating Büchi games. Thus, we obtain an O(min &amp;lcu;m ⋅ √m,n2})-time algorithm improving the long-standing O(n ⋅ m) time bound. Finally, we show how to maintain the maximal end-component decomposition of a graph under a sequence of edge insertions or a sequence of edge deletions in O(n) amortized time per edge deletion, and O(m) worst-case time per edge insertion. Again, our algorithms are the first dynamic algorithms for this problem.","lang":"eng"}],"date_updated":"2025-06-02T08:53:48Z","_id":"2141","article_number":"a15","article_processing_charge":"No","publist_id":"4883","related_material":{"record":[{"status":"public","relation":"earlier_version","id":"3165"}]},"volume":61,"quality_controlled":"1","publication":"Journal of the ACM","date_created":"2018-12-11T11:55:57Z","department":[{"_id":"KrCh"}],"language":[{"iso":"eng"}],"type":"journal_article","title":"Efficient and dynamic algorithms for alternating Büchi games and maximal end-component decomposition","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","publisher":"ACM","day":"01","author":[{"orcid":"0000-0002-4561-241X","first_name":"Krishnendu","last_name":"Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu"},{"full_name":"Henzinger, Monika H","first_name":"Monika H","orcid":"0000-0002-5008-6530","last_name":"Henzinger","id":"540c9bbd-f2de-11ec-812d-d04a5be85630"}],"project":[{"_id":"2584A770-B435-11E9-9278-68D0E5697425","grant_number":"P 23499-N23","name":"Modern Graph Algorithmic Techniques in Formal Verification","call_identifier":"FWF"},{"name":"Efficient Algorithms for Computer Aided Verification","_id":"25892FC0-B435-11E9-9278-68D0E5697425","grant_number":"ICT15-003"},{"name":"Game Theory","call_identifier":"FWF","_id":"25863FF4-B435-11E9-9278-68D0E5697425","grant_number":"S11407"},{"grant_number":"279307","_id":"2581B60A-B435-11E9-9278-68D0E5697425","name":"Quantitative Graph Games: Theory and Applications","call_identifier":"FP7"},{"name":"Microsoft Research Faculty Fellowship","_id":"2587B514-B435-11E9-9278-68D0E5697425"}]},{"author":[{"full_name":"Bauer, Ulrich","orcid":"0000-0002-9683-0724","first_name":"Ulrich","last_name":"Bauer","id":"2ADD483A-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Lesnick, Michael","first_name":"Michael","last_name":"Lesnick"}],"project":[{"call_identifier":"FP7","name":"Topological Complex Systems","grant_number":"318493","_id":"255D761E-B435-11E9-9278-68D0E5697425"}],"_id":"2153","abstract":[{"text":"We define a simple, explicit map sending a morphism f : M → N of pointwise finite dimensional persistence modules to a matching between the barcodes of M and N. Our main result is that, in a precise sense, the quality of this matching is tightly controlled by the lengths of the longest intervals in the barcodes of ker f and coker f . As an immediate corollary, we obtain a new proof of the algebraic stability theorem for persistence barcodes [5, 9], a fundamental result in the theory of persistent homology. In contrast to previous proofs, ours shows explicitly how a δ-interleaving morphism between two persistence modules induces a δ-matching between the barcodes of the two modules. Our main result also specializes to a structure theorem for submodules and quotients of persistence modules. Copyright is held by the owner/author(s).","lang":"eng"}],"date_updated":"2021-01-12T06:55:38Z","year":"2014","day":"01","month":"06","ec_funded":1,"user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publisher":"ACM","status":"public","oa":1,"title":"Induced matchings of barcodes and the algebraic stability of persistence","type":"conference","oa_version":"Submitted Version","date_published":"2014-06-01T00:00:00Z","department":[{"_id":"HeEd"}],"language":[{"iso":"eng"}],"doi":"10.1145/2582112.2582168","publication_status":"published","conference":{"end_date":"2014-06-11","location":"Kyoto, Japan","start_date":"2014-06-08","name":"SoCG: Symposium on Computational Geometry"},"publication":"Proceedings of the Annual Symposium on Computational Geometry","page":"355 - 364","date_created":"2018-12-11T11:56:01Z","quality_controlled":"1","citation":{"short":"U. Bauer, M. Lesnick, in:, Proceedings of the Annual Symposium on Computational Geometry, ACM, 2014, pp. 355–364.","ama":"Bauer U, Lesnick M. Induced matchings of barcodes and the algebraic stability of persistence. In: <i>Proceedings of the Annual Symposium on Computational Geometry</i>. ACM; 2014:355-364. doi:<a href=\"https://doi.org/10.1145/2582112.2582168\">10.1145/2582112.2582168</a>","ieee":"U. Bauer and M. Lesnick, “Induced matchings of barcodes and the algebraic stability of persistence,” in <i>Proceedings of the Annual Symposium on Computational Geometry</i>, Kyoto, Japan, 2014, pp. 355–364.","chicago":"Bauer, Ulrich, and Michael Lesnick. “Induced Matchings of Barcodes and the Algebraic Stability of Persistence.” In <i>Proceedings of the Annual Symposium on Computational Geometry</i>, 355–64. ACM, 2014. <a href=\"https://doi.org/10.1145/2582112.2582168\">https://doi.org/10.1145/2582112.2582168</a>.","apa":"Bauer, U., &#38; Lesnick, M. (2014). Induced matchings of barcodes and the algebraic stability of persistence. In <i>Proceedings of the Annual Symposium on Computational Geometry</i> (pp. 355–364). Kyoto, Japan: ACM. <a href=\"https://doi.org/10.1145/2582112.2582168\">https://doi.org/10.1145/2582112.2582168</a>","mla":"Bauer, Ulrich, and Michael Lesnick. “Induced Matchings of Barcodes and the Algebraic Stability of Persistence.” <i>Proceedings of the Annual Symposium on Computational Geometry</i>, ACM, 2014, pp. 355–64, doi:<a href=\"https://doi.org/10.1145/2582112.2582168\">10.1145/2582112.2582168</a>.","ista":"Bauer U, Lesnick M. 2014. Induced matchings of barcodes and the algebraic stability of persistence. Proceedings of the Annual Symposium on Computational Geometry. SoCG: Symposium on Computational Geometry, 355–364."},"publist_id":"4853","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1311.3681"}],"scopus_import":1},{"publication":"Discrete & Computational Geometry","date_created":"2018-12-11T11:56:01Z","page":"1 - 33","department":[{"_id":"UlWa"}],"language":[{"iso":"eng"}],"type":"journal_article","publist_id":"4852","quality_controlled":"1","volume":52,"day":"01","acknowledgement":"Swiss National Science Foundation (SNF 200021-125309, 200020-138230, 200020-12507)","author":[{"full_name":"Matoušek, Jiří","first_name":"Jiří","last_name":"Matoušek"},{"first_name":"Uli","orcid":"0000-0002-1494-0568","last_name":"Wagner","id":"36690CA2-F248-11E8-B48F-1D18A9856A87","full_name":"Wagner, Uli"}],"project":[{"grant_number":"PP00P2_138948","_id":"25FA3206-B435-11E9-9278-68D0E5697425","name":"Embeddings in Higher Dimensions: Algorithms and Combinatorics"}],"title":"On Gromov's method of selecting heavily covered points","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","doi":"10.1007/s00454-014-9584-7","publication_status":"published","date_published":"2014-07-01T00:00:00Z","oa_version":"Submitted Version","scopus_import":1,"main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1102.3515"}],"citation":{"apa":"Matoušek, J., &#38; Wagner, U. (2014). On Gromov’s method of selecting heavily covered points. <i>Discrete &#38; Computational Geometry</i>. Springer. <a href=\"https://doi.org/10.1007/s00454-014-9584-7\">https://doi.org/10.1007/s00454-014-9584-7</a>","ista":"Matoušek J, Wagner U. 2014. On Gromov’s method of selecting heavily covered points. Discrete &#38; Computational Geometry. 52(1), 1–33.","mla":"Matoušek, Jiří, and Uli Wagner. “On Gromov’s Method of Selecting Heavily Covered Points.” <i>Discrete &#38; Computational Geometry</i>, vol. 52, no. 1, Springer, 2014, pp. 1–33, doi:<a href=\"https://doi.org/10.1007/s00454-014-9584-7\">10.1007/s00454-014-9584-7</a>.","chicago":"Matoušek, Jiří, and Uli Wagner. “On Gromov’s Method of Selecting Heavily Covered Points.” <i>Discrete &#38; Computational Geometry</i>. Springer, 2014. <a href=\"https://doi.org/10.1007/s00454-014-9584-7\">https://doi.org/10.1007/s00454-014-9584-7</a>.","ama":"Matoušek J, Wagner U. On Gromov’s method of selecting heavily covered points. <i>Discrete &#38; Computational Geometry</i>. 2014;52(1):1-33. doi:<a href=\"https://doi.org/10.1007/s00454-014-9584-7\">10.1007/s00454-014-9584-7</a>","ieee":"J. Matoušek and U. Wagner, “On Gromov’s method of selecting heavily covered points,” <i>Discrete &#38; Computational Geometry</i>, vol. 52, no. 1. Springer, pp. 1–33, 2014.","short":"J. Matoušek, U. Wagner, Discrete &#38; Computational Geometry 52 (2014) 1–33."},"intvolume":"        52","year":"2014","issue":"1","abstract":[{"text":"A result of Boros and Füredi (d = 2) and of Bárány (arbitrary d) asserts that for every d there exists cd &gt; 0 such that for every n-point set P ⊂ ℝd, some point of ℝd is covered by at least (Formula presented.) of the d-simplices spanned by the points of P. The largest possible value of cd has been the subject of ongoing research. Recently Gromov improved the existing lower bounds considerably by introducing a new, topological proof method. We provide an exposition of the combinatorial component of Gromov's approach, in terms accessible to combinatorialists and discrete geometers, and we investigate the limits of his method. In particular, we give tighter bounds on the cofilling profiles for the (n - 1)-simplex. These bounds yield a minor improvement over Gromov's lower bounds on cd for large d, but they also show that the room for further improvement through the cofilling profiles alone is quite small. We also prove a slightly better lower bound for c3 by an approach using an additional structure besides the cofilling profiles. We formulate a combinatorial extremal problem whose solution might perhaps lead to a tight lower bound for cd.","lang":"eng"}],"date_updated":"2021-01-12T06:55:38Z","_id":"2154","oa":1,"status":"public","month":"07"},{"quality_controlled":"1","publist_id":"4851","language":[{"iso":"eng"}],"department":[{"_id":"HeEd"}],"type":"conference","date_created":"2018-12-11T11:56:01Z","page":"484 - 490","publication":"Proceedings of the Annual Symposium on Computational Geometry","title":"The morse theory of Čech and Delaunay filtrations","publisher":"ACM","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","project":[{"name":"Topological Complex Systems","call_identifier":"FP7","_id":"255D761E-B435-11E9-9278-68D0E5697425","grant_number":"318493"}],"author":[{"last_name":"Bauer","id":"2ADD483A-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9683-0724","first_name":"Ulrich","full_name":"Bauer, Ulrich"},{"first_name":"Herbert","orcid":"0000-0002-9823-6833","last_name":"Edelsbrunner","id":"3FB178DA-F248-11E8-B48F-1D18A9856A87","full_name":"Edelsbrunner, Herbert"}],"day":"01","acknowledgement":"This research is partially supported by ESF under the ACAT Research Network Programme, and by the Russian Government under mega project 11.G34.31.0053","citation":{"ista":"Bauer U, Edelsbrunner H. 2014. The morse theory of Čech and Delaunay filtrations. Proceedings of the Annual Symposium on Computational Geometry. SoCG: Symposium on Computational Geometry, 484–490.","mla":"Bauer, Ulrich, and Herbert Edelsbrunner. “The Morse Theory of Čech and Delaunay Filtrations.” <i>Proceedings of the Annual Symposium on Computational Geometry</i>, ACM, 2014, pp. 484–90, doi:<a href=\"https://doi.org/10.1145/2582112.2582167\">10.1145/2582112.2582167</a>.","apa":"Bauer, U., &#38; Edelsbrunner, H. (2014). The morse theory of Čech and Delaunay filtrations. In <i>Proceedings of the Annual Symposium on Computational Geometry</i> (pp. 484–490). Kyoto, Japan: ACM. <a href=\"https://doi.org/10.1145/2582112.2582167\">https://doi.org/10.1145/2582112.2582167</a>","chicago":"Bauer, Ulrich, and Herbert Edelsbrunner. “The Morse Theory of Čech and Delaunay Filtrations.” In <i>Proceedings of the Annual Symposium on Computational Geometry</i>, 484–90. ACM, 2014. <a href=\"https://doi.org/10.1145/2582112.2582167\">https://doi.org/10.1145/2582112.2582167</a>.","short":"U. Bauer, H. Edelsbrunner, in:, Proceedings of the Annual Symposium on Computational Geometry, ACM, 2014, pp. 484–490.","ieee":"U. Bauer and H. Edelsbrunner, “The morse theory of Čech and Delaunay filtrations,” in <i>Proceedings of the Annual Symposium on Computational Geometry</i>, Kyoto, Japan, 2014, pp. 484–490.","ama":"Bauer U, Edelsbrunner H. The morse theory of Čech and Delaunay filtrations. In: <i>Proceedings of the Annual Symposium on Computational Geometry</i>. ACM; 2014:484-490. doi:<a href=\"https://doi.org/10.1145/2582112.2582167\">10.1145/2582112.2582167</a>"},"scopus_import":1,"main_file_link":[{"url":"http://arxiv.org/abs/1312.1231","open_access":"1"}],"date_published":"2014-06-01T00:00:00Z","oa_version":"Submitted Version","publication_status":"published","conference":{"location":"Kyoto, Japan","end_date":"2014-06-11","name":"SoCG: Symposium on Computational Geometry","start_date":"2014-06-08"},"doi":"10.1145/2582112.2582167","ec_funded":1,"month":"06","oa":1,"status":"public","_id":"2155","year":"2014","date_updated":"2021-01-12T06:55:38Z","abstract":[{"lang":"eng","text":"Given a finite set of points in Rn and a positive radius, we study the Čech, Delaunay-Čech, alpha, and wrap complexes as instances of a generalized discrete Morse theory. We prove that the latter three complexes are simple-homotopy equivalent. Our results have applications in topological data analysis and in the reconstruction of shapes from sampled data. Copyright is held by the owner/author(s)."}]},{"publisher":"ACM","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","title":"Measuring distance between Reeb graphs","project":[{"_id":"255D761E-B435-11E9-9278-68D0E5697425","grant_number":"318493","call_identifier":"FP7","name":"Topological Complex Systems"}],"author":[{"last_name":"Bauer","id":"2ADD483A-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9683-0724","first_name":"Ulrich","full_name":"Bauer, Ulrich"},{"first_name":"Xiaoyin","last_name":"Ge","full_name":"Ge, Xiaoyin"},{"first_name":"Yusu","last_name":"Wang","full_name":"Wang, Yusu"}],"acknowledgement":"National Science Foundation under grants CCF-1319406, CCF-1116258.","day":"01","quality_controlled":"1","publist_id":"4850","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"HeEd"}],"page":"464 - 473","date_created":"2018-12-11T11:56:02Z","publication":"Proceedings of the Annual Symposium on Computational Geometry","month":"06","ec_funded":1,"status":"public","oa":1,"_id":"2156","date_updated":"2021-01-12T06:55:39Z","abstract":[{"lang":"eng","text":"We propose a metric for Reeb graphs, called the functional distortion distance. Under this distance, the Reeb graph is stable against small changes of input functions. At the same time, it remains discriminative at differentiating input functions. In particular, the main result is that the functional distortion distance between two Reeb graphs is bounded from below by the bottleneck distance between both the ordinary and extended persistence diagrams for appropriate dimensions. As an application of our results, we analyze a natural simplification scheme for Reeb graphs, and show that persistent features in Reeb graph remains persistent under simplification. Understanding the stability of important features of the Reeb graph under simplification is an interesting problem on its own right, and critical to the practical usage of Reeb graphs. Copyright is held by the owner/author(s)."}],"year":"2014","citation":{"chicago":"Bauer, Ulrich, Xiaoyin Ge, and Yusu Wang. “Measuring Distance between Reeb Graphs.” In <i>Proceedings of the Annual Symposium on Computational Geometry</i>, 464–73. ACM, 2014. <a href=\"https://doi.org/10.1145/2582112.2582169\">https://doi.org/10.1145/2582112.2582169</a>.","ista":"Bauer U, Ge X, Wang Y. 2014. Measuring distance between Reeb graphs. Proceedings of the Annual Symposium on Computational Geometry. SoCG: Symposium on Computational Geometry, 464–473.","apa":"Bauer, U., Ge, X., &#38; Wang, Y. (2014). Measuring distance between Reeb graphs. In <i>Proceedings of the Annual Symposium on Computational Geometry</i> (pp. 464–473). Kyoto, Japan: ACM. <a href=\"https://doi.org/10.1145/2582112.2582169\">https://doi.org/10.1145/2582112.2582169</a>","mla":"Bauer, Ulrich, et al. “Measuring Distance between Reeb Graphs.” <i>Proceedings of the Annual Symposium on Computational Geometry</i>, ACM, 2014, pp. 464–73, doi:<a href=\"https://doi.org/10.1145/2582112.2582169\">10.1145/2582112.2582169</a>.","short":"U. Bauer, X. Ge, Y. Wang, in:, Proceedings of the Annual Symposium on Computational Geometry, ACM, 2014, pp. 464–473.","ama":"Bauer U, Ge X, Wang Y. Measuring distance between Reeb graphs. In: <i>Proceedings of the Annual Symposium on Computational Geometry</i>. ACM; 2014:464-473. doi:<a href=\"https://doi.org/10.1145/2582112.2582169\">10.1145/2582112.2582169</a>","ieee":"U. Bauer, X. Ge, and Y. Wang, “Measuring distance between Reeb graphs,” in <i>Proceedings of the Annual Symposium on Computational Geometry</i>, Kyoto, Japan, 2014, pp. 464–473."},"scopus_import":1,"main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1307.2839"}],"oa_version":"Submitted Version","date_published":"2014-06-01T00:00:00Z","conference":{"name":"SoCG: Symposium on Computational Geometry","start_date":"2014-06-08","location":"Kyoto, Japan","end_date":"2014-06-11"},"publication_status":"published","doi":"10.1145/2582112.2582169"}]
