---
_id: '2179'
abstract:
- lang: eng
  text: We extend the proof of the local semicircle law for generalized Wigner matrices
    given in MR3068390 to the case when the matrix of variances has an eigenvalue
    -1. In particular, this result provides a short proof of the optimal local Marchenko-Pastur
    law at the hard edge (i.e. around zero) for sample covariance matrices X*X, where
    the variances of the entries of X may vary.
author:
- first_name: Oskari H
  full_name: Ajanki, Oskari H
  id: 36F2FB7E-F248-11E8-B48F-1D18A9856A87
  last_name: Ajanki
- first_name: László
  full_name: Erdös, László
  id: 4DBD5372-F248-11E8-B48F-1D18A9856A87
  last_name: Erdös
  orcid: 0000-0001-5366-9603
- first_name: Torben H
  full_name: Krüger, Torben H
  id: 3020C786-F248-11E8-B48F-1D18A9856A87
  last_name: Krüger
  orcid: 0000-0002-4821-3297
citation:
  ama: Ajanki OH, Erdös L, Krüger TH. Local semicircle law with imprimitive variance
    matrix. <i>Electronic Communications in Probability</i>. 2014;19. doi:<a href="https://doi.org/10.1214/ECP.v19-3121">10.1214/ECP.v19-3121</a>
  apa: Ajanki, O. H., Erdös, L., &#38; Krüger, T. H. (2014). Local semicircle law
    with imprimitive variance matrix. <i>Electronic Communications in Probability</i>.
    Institute of Mathematical Statistics. <a href="https://doi.org/10.1214/ECP.v19-3121">https://doi.org/10.1214/ECP.v19-3121</a>
  chicago: Ajanki, Oskari H, László Erdös, and Torben H Krüger. “Local Semicircle
    Law with Imprimitive Variance Matrix.” <i>Electronic Communications in Probability</i>.
    Institute of Mathematical Statistics, 2014. <a href="https://doi.org/10.1214/ECP.v19-3121">https://doi.org/10.1214/ECP.v19-3121</a>.
  ieee: O. H. Ajanki, L. Erdös, and T. H. Krüger, “Local semicircle law with imprimitive
    variance matrix,” <i>Electronic Communications in Probability</i>, vol. 19. Institute
    of Mathematical Statistics, 2014.
  ista: Ajanki OH, Erdös L, Krüger TH. 2014. Local semicircle law with imprimitive
    variance matrix. Electronic Communications in Probability. 19.
  mla: Ajanki, Oskari H., et al. “Local Semicircle Law with Imprimitive Variance Matrix.”
    <i>Electronic Communications in Probability</i>, vol. 19, Institute of Mathematical
    Statistics, 2014, doi:<a href="https://doi.org/10.1214/ECP.v19-3121">10.1214/ECP.v19-3121</a>.
  short: O.H. Ajanki, L. Erdös, T.H. Krüger, Electronic Communications in Probability
    19 (2014).
date_created: 2018-12-11T11:56:10Z
date_published: 2014-06-09T00:00:00Z
date_updated: 2021-01-12T06:55:48Z
day: '09'
ddc:
- '570'
department:
- _id: LaEr
doi: 10.1214/ECP.v19-3121
file:
- access_level: open_access
  checksum: bd8a041c76d62fe820bf73ff13ce7d1b
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:09:06Z
  date_updated: 2020-07-14T12:45:31Z
  file_id: '4729'
  file_name: IST-2016-426-v1+1_3121-17518-1-PB.pdf
  file_size: 327322
  relation: main_file
file_date_updated: 2020-07-14T12:45:31Z
has_accepted_license: '1'
intvolume: '        19'
language:
- iso: eng
month: '06'
oa: 1
oa_version: Published Version
publication: Electronic Communications in Probability
publication_status: published
publisher: Institute of Mathematical Statistics
publist_id: '4803'
pubrep_id: '426'
quality_controlled: '1'
scopus_import: 1
status: public
title: Local semicircle law with imprimitive variance matrix
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: journal_article
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 19
year: '2014'
...
---
_id: '2180'
abstract:
- lang: eng
  text: Weighted majority votes allow one to combine the output of several classifiers
    or voters. MinCq is a recent algorithm for optimizing the weight of each voter
    based on the minimization of a theoretical bound over the risk of the vote with
    elegant PAC-Bayesian generalization guarantees. However, while it has demonstrated
    good performance when combining weak classifiers, MinCq cannot make use of the
    useful a priori knowledge that one may have when using a mixture of weak and strong
    voters. In this paper, we propose P-MinCq, an extension of MinCq that can incorporate
    such knowledge in the form of a  constraint over the distribution of the weights,
    along with general proofs of convergence that stand in the sample compression
    setting for data-dependent voters. The approach is applied to a vote of k-NN classifiers
    with a specific modeling of the voters' performance. P-MinCq significantly outperforms
    the classic k-NN classifier, a symmetric NN and MinCq using the same voters. We
    show that it is also competitive with LMNN, a popular metric learning algorithm,
    and that combining both approaches further reduces the error.
acknowledgement: 'This work was funded by the French project SoLSTiCe ANR-13-BS02-01
  of the ANR. '
author:
- first_name: Aurélien
  full_name: Bellet, Aurélien
  last_name: Bellet
- first_name: Amaury
  full_name: Habrard, Amaury
  last_name: Habrard
- first_name: Emilie
  full_name: Morvant, Emilie
  id: 4BAC2A72-F248-11E8-B48F-1D18A9856A87
  last_name: Morvant
  orcid: 0000-0002-8301-7240
- first_name: Marc
  full_name: Sebban, Marc
  last_name: Sebban
citation:
  ama: Bellet A, Habrard A, Morvant E, Sebban M. Learning a priori constrained weighted
    majority votes. <i>Machine Learning</i>. 2014;97(1-2):129-154. doi:<a href="https://doi.org/10.1007/s10994-014-5462-z">10.1007/s10994-014-5462-z</a>
  apa: Bellet, A., Habrard, A., Morvant, E., &#38; Sebban, M. (2014). Learning a priori
    constrained weighted majority votes. <i>Machine Learning</i>. Springer. <a href="https://doi.org/10.1007/s10994-014-5462-z">https://doi.org/10.1007/s10994-014-5462-z</a>
  chicago: Bellet, Aurélien, Amaury Habrard, Emilie Morvant, and Marc Sebban. “Learning
    a Priori Constrained Weighted Majority Votes.” <i>Machine Learning</i>. Springer,
    2014. <a href="https://doi.org/10.1007/s10994-014-5462-z">https://doi.org/10.1007/s10994-014-5462-z</a>.
  ieee: A. Bellet, A. Habrard, E. Morvant, and M. Sebban, “Learning a priori constrained
    weighted majority votes,” <i>Machine Learning</i>, vol. 97, no. 1–2. Springer,
    pp. 129–154, 2014.
  ista: Bellet A, Habrard A, Morvant E, Sebban M. 2014. Learning a priori constrained
    weighted majority votes. Machine Learning. 97(1–2), 129–154.
  mla: Bellet, Aurélien, et al. “Learning a Priori Constrained Weighted Majority Votes.”
    <i>Machine Learning</i>, vol. 97, no. 1–2, Springer, 2014, pp. 129–54, doi:<a
    href="https://doi.org/10.1007/s10994-014-5462-z">10.1007/s10994-014-5462-z</a>.
  short: A. Bellet, A. Habrard, E. Morvant, M. Sebban, Machine Learning 97 (2014)
    129–154.
date_created: 2018-12-11T11:56:10Z
date_published: 2014-10-01T00:00:00Z
date_updated: 2021-01-12T06:55:49Z
day: '01'
department:
- _id: ChLa
doi: 10.1007/s10994-014-5462-z
ec_funded: 1
intvolume: '        97'
issue: 1-2
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://hal.archives-ouvertes.fr/hal-01009578/document
month: '10'
oa: 1
oa_version: Submitted Version
page: 129 - 154
project:
- _id: 2532554C-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '308036'
  name: Lifelong Learning of Visual Scene Understanding
publication: Machine Learning
publication_status: published
publisher: Springer
publist_id: '4802'
quality_controlled: '1'
scopus_import: 1
status: public
title: Learning a priori constrained weighted majority votes
type: journal_article
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 97
year: '2014'
...
---
_id: '2183'
abstract:
- lang: eng
  text: 'We describe a simple adaptive network of coupled chaotic maps. The network
    reaches a stationary state (frozen topology) for all values of the coupling parameter,
    although the dynamics of the maps at the nodes of the network can be nontrivial.
    The structure of the network shows interesting hierarchical properties and in
    certain parameter regions the dynamics is polysynchronous: Nodes can be divided
    in differently synchronized classes but, contrary to cluster synchronization,
    nodes in the same class need not be connected to each other. These complicated
    synchrony patterns have been conjectured to play roles in systems biology and
    circuits. The adaptive system we study describes ways whereby this behavior can
    evolve from undifferentiated nodes.'
acknowledgement: "V.B.S. is partially supported by contract MEC (Grant No. AYA2010-22111-C03-02).\r\n"
article_number: '062809'
article_processing_charge: No
author:
- first_name: Vicente
  full_name: Botella Soler, Vicente
  id: 421234E8-F248-11E8-B48F-1D18A9856A87
  last_name: Botella Soler
  orcid: 0000-0002-8790-1914
- first_name: Paul
  full_name: Glendinning, Paul
  last_name: Glendinning
citation:
  ama: Botella Soler V, Glendinning P. Hierarchy and polysynchrony in an adaptive
    network . <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>.
    2014;89(6). doi:<a href="https://doi.org/10.1103/PhysRevE.89.062809">10.1103/PhysRevE.89.062809</a>
  apa: Botella Soler, V., &#38; Glendinning, P. (2014). Hierarchy and polysynchrony
    in an adaptive network . <i>Physical Review E Statistical Nonlinear and Soft Matter
    Physics</i>. American Institute of Physics. <a href="https://doi.org/10.1103/PhysRevE.89.062809">https://doi.org/10.1103/PhysRevE.89.062809</a>
  chicago: Botella Soler, Vicente, and Paul Glendinning. “Hierarchy and Polysynchrony
    in an Adaptive Network .” <i>Physical Review E Statistical Nonlinear and Soft
    Matter Physics</i>. American Institute of Physics, 2014. <a href="https://doi.org/10.1103/PhysRevE.89.062809">https://doi.org/10.1103/PhysRevE.89.062809</a>.
  ieee: V. Botella Soler and P. Glendinning, “Hierarchy and polysynchrony in an adaptive
    network ,” <i>Physical Review E Statistical Nonlinear and Soft Matter Physics</i>,
    vol. 89, no. 6. American Institute of Physics, 2014.
  ista: Botella Soler V, Glendinning P. 2014. Hierarchy and polysynchrony in an adaptive
    network . Physical Review E Statistical Nonlinear and Soft Matter Physics. 89(6),
    062809.
  mla: Botella Soler, Vicente, and Paul Glendinning. “Hierarchy and Polysynchrony
    in an Adaptive Network .” <i>Physical Review E Statistical Nonlinear and Soft
    Matter Physics</i>, vol. 89, no. 6, 062809, American Institute of Physics, 2014,
    doi:<a href="https://doi.org/10.1103/PhysRevE.89.062809">10.1103/PhysRevE.89.062809</a>.
  short: V. Botella Soler, P. Glendinning, Physical Review E Statistical Nonlinear
    and Soft Matter Physics 89 (2014).
date_created: 2018-12-11T11:56:11Z
date_published: 2014-06-16T00:00:00Z
date_updated: 2022-08-25T14:04:45Z
day: '16'
department:
- _id: GaTk
doi: 10.1103/PhysRevE.89.062809
ec_funded: 1
intvolume: '        89'
issue: '6'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1403.3209
month: '06'
oa: 1
oa_version: Preprint
project:
- _id: 25681D80-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '291734'
  name: International IST Postdoc Fellowship Programme
publication: Physical Review E Statistical Nonlinear and Soft Matter Physics
publication_status: published
publisher: American Institute of Physics
publist_id: '4798'
quality_controlled: '1'
scopus_import: '1'
status: public
title: 'Hierarchy and polysynchrony in an adaptive network '
type: journal_article
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 89
year: '2014'
...
---
_id: '2184'
abstract:
- lang: eng
  text: 'Given topological spaces X,Y, a fundamental problem of algebraic topology
    is understanding the structure of all continuous maps X→ Y. We consider a computational
    version, where X,Y are given as finite simplicial complexes, and the goal is to
    compute [X,Y], that is, all homotopy classes of suchmaps.We solve this problem
    in the stable range, where for some d ≥ 2, we have dim X ≤ 2d-2 and Y is (d-1)-connected;
    in particular, Y can be the d-dimensional sphere Sd. The algorithm combines classical
    tools and ideas from homotopy theory (obstruction theory, Postnikov systems, and
    simplicial sets) with algorithmic tools from effective algebraic topology (locally
    effective simplicial sets and objects with effective homology). In contrast, [X,Y]
    is known to be uncomputable for general X,Y, since for X = S1 it includes a well
    known undecidable problem: testing triviality of the fundamental group of Y. In
    follow-up papers, the algorithm is shown to run in polynomial time for d fixed,
    and extended to other problems, such as the extension problem, where we are given
    a subspace A ⊂ X and a map A→ Y and ask whether it extends to a map X → Y, or
    computing the Z2-index-everything in the stable range. Outside the stable range,
    the extension problem is undecidable.'
acknowledgement: The research by M. K. was supported by project GAUK 49209. The research
  by M. K. was also supported by project 1M0545 by the Ministry of Education of the
  Czech Republic and by Center of Excellence { Inst. for Theor. Comput. Sci., Prague
  (project P202/12/G061 of GACR). The research by U. W. was supported by the Swiss
  National Science Foundation (SNF Projects 200021-125309, 200020-138230, and PP00P2-138948).
article_number: '17 '
author:
- first_name: Martin
  full_name: Čadek, Martin
  last_name: Čadek
- first_name: Marek
  full_name: Krcál, Marek
  id: 33E21118-F248-11E8-B48F-1D18A9856A87
  last_name: Krcál
- first_name: Jiří
  full_name: Matoušek, Jiří
  last_name: Matoušek
- first_name: Francis
  full_name: Sergeraert, Francis
  last_name: Sergeraert
- first_name: Lukáš
  full_name: Vokřínek, Lukáš
  last_name: Vokřínek
- first_name: Uli
  full_name: Wagner, Uli
  id: 36690CA2-F248-11E8-B48F-1D18A9856A87
  last_name: Wagner
  orcid: 0000-0002-1494-0568
citation:
  ama: Čadek M, Krcál M, Matoušek J, Sergeraert F, Vokřínek L, Wagner U. Computing
    all maps into a sphere. <i>Journal of the ACM</i>. 2014;61(3). doi:<a href="https://doi.org/10.1145/2597629">10.1145/2597629</a>
  apa: Čadek, M., Krcál, M., Matoušek, J., Sergeraert, F., Vokřínek, L., &#38; Wagner,
    U. (2014). Computing all maps into a sphere. <i>Journal of the ACM</i>. ACM. <a
    href="https://doi.org/10.1145/2597629">https://doi.org/10.1145/2597629</a>
  chicago: Čadek, Martin, Marek Krcál, Jiří Matoušek, Francis Sergeraert, Lukáš Vokřínek,
    and Uli Wagner. “Computing All Maps into a Sphere.” <i>Journal of the ACM</i>.
    ACM, 2014. <a href="https://doi.org/10.1145/2597629">https://doi.org/10.1145/2597629</a>.
  ieee: M. Čadek, M. Krcál, J. Matoušek, F. Sergeraert, L. Vokřínek, and U. Wagner,
    “Computing all maps into a sphere,” <i>Journal of the ACM</i>, vol. 61, no. 3.
    ACM, 2014.
  ista: Čadek M, Krcál M, Matoušek J, Sergeraert F, Vokřínek L, Wagner U. 2014. Computing
    all maps into a sphere. Journal of the ACM. 61(3), 17.
  mla: Čadek, Martin, et al. “Computing All Maps into a Sphere.” <i>Journal of the
    ACM</i>, vol. 61, no. 3, 17, ACM, 2014, doi:<a href="https://doi.org/10.1145/2597629">10.1145/2597629</a>.
  short: M. Čadek, M. Krcál, J. Matoušek, F. Sergeraert, L. Vokřínek, U. Wagner, Journal
    of the ACM 61 (2014).
date_created: 2018-12-11T11:56:12Z
date_published: 2014-05-01T00:00:00Z
date_updated: 2021-01-12T06:55:50Z
day: '01'
department:
- _id: UlWa
- _id: HeEd
doi: 10.1145/2597629
intvolume: '        61'
issue: '3'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1105.6257
month: '05'
oa: 1
oa_version: Preprint
publication: Journal of the ACM
publication_status: published
publisher: ACM
publist_id: '4797'
quality_controlled: '1'
scopus_import: 1
status: public
title: Computing all maps into a sphere
type: journal_article
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 61
year: '2014'
...
---
_id: '2185'
abstract:
- lang: eng
  text: 'We revisit the classical problem of converting an imperfect source of randomness
    into a usable cryptographic key. Assume that we have some cryptographic application
    P that expects a uniformly random m-bit key R and ensures that the best attack
    (in some complexity class) against P(R) has success probability at most δ. Our
    goal is to design a key-derivation function (KDF) h that converts any random source
    X of min-entropy k into a sufficiently &quot;good&quot; key h(X), guaranteeing
    that P(h(X)) has comparable security δ′ which is ''close'' to δ. Seeded randomness
    extractors provide a generic way to solve this problem for all applications P,
    with resulting security δ′ = O(δ), provided that we start with entropy k ≥ m +
    2 log (1/δ) - O(1). By a result of Radhakrishnan and Ta-Shma, this bound on k
    (called the &quot;RT-bound&quot;) is also known to be tight in general. Unfortunately,
    in many situations the loss of 2 log (1/δ) bits of entropy is unacceptable. This
    motivates the study KDFs with less entropy waste by placing some restrictions
    on the source X or the application P. In this work we obtain the following new
    positive and negative results in this regard: - Efficient samplability of the
    source X does not help beat the RT-bound for general applications. This resolves
    the SRT (samplable RT) conjecture of Dachman-Soled et al. [DGKM12] in the affirmative,
    and also shows that the existence of computationally-secure extractors beating
    the RT-bound implies the existence of one-way functions. - We continue in the
    line of work initiated by Barak et al. [BDK+11] and construct new information-theoretic
    KDFs which beat the RT-bound for large but restricted classes of applications.
    Specifically, we design efficient KDFs that work for all unpredictability applications
    P (e.g., signatures, MACs, one-way functions, etc.) and can either: (1) extract
    all of the entropy k = m with a very modest security loss δ′ = O(δ·log (1/δ)),
    or alternatively, (2) achieve essentially optimal security δ′ = O(δ) with a very
    modest entropy loss k ≥ m + loglog (1/δ). In comparison, the best prior results
    from [BDK+11] for this class of applications would only guarantee δ′ = O(√δ) when
    k = m, and would need k ≥ m + log (1/δ) to get δ′ = O(δ). - The weaker bounds
    of [BDK+11] hold for a larger class of so-called &quot;square- friendly&quot;
    applications (which includes all unpredictability, but also some important indistinguishability,
    applications). Unfortunately, we show that these weaker bounds are tight for the
    larger class of applications. - We abstract out a clean, information-theoretic
    notion of (k,δ,δ′)- unpredictability extractors, which guarantee &quot;induced&quot;
    security δ′ for any δ-secure unpredictability application P, and characterize
    the parameters achievable for such unpredictability extractors. Of independent
    interest, we also relate this notion to the previously-known notion of (min-entropy)
    condensers, and improve the state-of-the-art parameters for such condensers.'
alternative_title:
- LNCS
author:
- first_name: Yevgeniy
  full_name: Dodis, Yevgeniy
  last_name: Dodis
- first_name: Krzysztof Z
  full_name: Pietrzak, Krzysztof Z
  id: 3E04A7AA-F248-11E8-B48F-1D18A9856A87
  last_name: Pietrzak
  orcid: 0000-0002-9139-1654
- first_name: Daniel
  full_name: Wichs, Daniel
  last_name: Wichs
citation:
  ama: 'Dodis Y, Pietrzak KZ, Wichs D. Key derivation without entropy waste. In: Nguyen
    P, Oswald E, eds. Vol 8441. Springer; 2014:93-110. doi:<a href="https://doi.org/10.1007/978-3-642-55220-5_6">10.1007/978-3-642-55220-5_6</a>'
  apa: 'Dodis, Y., Pietrzak, K. Z., &#38; Wichs, D. (2014). Key derivation without
    entropy waste. In P. Nguyen &#38; E. Oswald (Eds.) (Vol. 8441, pp. 93–110). Presented
    at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Copenhagen,
    Denmark: Springer. <a href="https://doi.org/10.1007/978-3-642-55220-5_6">https://doi.org/10.1007/978-3-642-55220-5_6</a>'
  chicago: Dodis, Yevgeniy, Krzysztof Z Pietrzak, and Daniel Wichs. “Key Derivation
    without Entropy Waste.” edited by Phong Nguyen and Elisabeth Oswald, 8441:93–110.
    Springer, 2014. <a href="https://doi.org/10.1007/978-3-642-55220-5_6">https://doi.org/10.1007/978-3-642-55220-5_6</a>.
  ieee: 'Y. Dodis, K. Z. Pietrzak, and D. Wichs, “Key derivation without entropy waste,”
    presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques,
    Copenhagen, Denmark, 2014, vol. 8441, pp. 93–110.'
  ista: 'Dodis Y, Pietrzak KZ, Wichs D. 2014. Key derivation without entropy waste.
    EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 8441,
    93–110.'
  mla: Dodis, Yevgeniy, et al. <i>Key Derivation without Entropy Waste</i>. Edited
    by Phong Nguyen and Elisabeth Oswald, vol. 8441, Springer, 2014, pp. 93–110, doi:<a
    href="https://doi.org/10.1007/978-3-642-55220-5_6">10.1007/978-3-642-55220-5_6</a>.
  short: Y. Dodis, K.Z. Pietrzak, D. Wichs, in:, P. Nguyen, E. Oswald (Eds.), Springer,
    2014, pp. 93–110.
conference:
  end_date: 2014-05-15
  location: Copenhagen, Denmark
  name: 'EUROCRYPT: Theory and Applications of Cryptographic Techniques'
  start_date: 2014-05-11
date_created: 2018-12-11T11:56:12Z
date_published: 2014-04-01T00:00:00Z
date_updated: 2021-01-12T06:55:51Z
day: '01'
ddc:
- '000'
- '004'
department:
- _id: KrPi
doi: 10.1007/978-3-642-55220-5_6
editor:
- first_name: Phong
  full_name: Nguyen, Phong
  last_name: Nguyen
- first_name: Elisabeth
  full_name: Oswald, Elisabeth
  last_name: Oswald
file:
- access_level: open_access
  checksum: da1aa01221086083b23c92e547b48ff4
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:08:43Z
  date_updated: 2020-07-14T12:45:31Z
  file_id: '4705'
  file_name: IST-2016-680-v1+1_708.pdf
  file_size: 505389
  relation: main_file
file_date_updated: 2020-07-14T12:45:31Z
has_accepted_license: '1'
intvolume: '      8441'
language:
- iso: eng
month: '04'
oa: 1
oa_version: Submitted Version
page: 93 - 110
publication_status: published
publisher: Springer
publist_id: '4795'
pubrep_id: '680'
quality_controlled: '1'
scopus_import: 1
status: public
title: Key derivation without entropy waste
type: conference
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 8441
year: '2014'
...
---
_id: '2186'
abstract:
- lang: eng
  text: We prove the existence of scattering states for the defocusing cubic Gross-Pitaevskii
    (GP) hierarchy in ℝ3. Moreover, we show that an exponential energy growth condition
    commonly used in the well-posedness theory of the GP hierarchy is, in a specific
    sense, necessary. In fact, we prove that without the latter, there exist initial
    data for the focusing cubic GP hierarchy for which instantaneous blowup occurs.
author:
- first_name: Thomas
  full_name: Chen, Thomas
  last_name: Chen
- first_name: Christian
  full_name: Hainzl, Christian
  last_name: Hainzl
- first_name: Nataša
  full_name: Pavlović, Nataša
  last_name: Pavlović
- first_name: Robert
  full_name: Seiringer, Robert
  id: 4AFD0470-F248-11E8-B48F-1D18A9856A87
  last_name: Seiringer
  orcid: 0000-0002-6781-0521
citation:
  ama: Chen T, Hainzl C, Pavlović N, Seiringer R. On the well-posedness and scattering
    for the Gross-Pitaevskii hierarchy via quantum de Finetti. <i>Letters in Mathematical
    Physics</i>. 2014;104(7):871-891. doi:<a href="https://doi.org/10.1007/s11005-014-0693-2">10.1007/s11005-014-0693-2</a>
  apa: Chen, T., Hainzl, C., Pavlović, N., &#38; Seiringer, R. (2014). On the well-posedness
    and scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti. <i>Letters
    in Mathematical Physics</i>. Springer. <a href="https://doi.org/10.1007/s11005-014-0693-2">https://doi.org/10.1007/s11005-014-0693-2</a>
  chicago: Chen, Thomas, Christian Hainzl, Nataša Pavlović, and Robert Seiringer.
    “On the Well-Posedness and Scattering for the Gross-Pitaevskii Hierarchy via Quantum
    de Finetti.” <i>Letters in Mathematical Physics</i>. Springer, 2014. <a href="https://doi.org/10.1007/s11005-014-0693-2">https://doi.org/10.1007/s11005-014-0693-2</a>.
  ieee: T. Chen, C. Hainzl, N. Pavlović, and R. Seiringer, “On the well-posedness
    and scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti,” <i>Letters
    in Mathematical Physics</i>, vol. 104, no. 7. Springer, pp. 871–891, 2014.
  ista: Chen T, Hainzl C, Pavlović N, Seiringer R. 2014. On the well-posedness and
    scattering for the Gross-Pitaevskii hierarchy via quantum de Finetti. Letters
    in Mathematical Physics. 104(7), 871–891.
  mla: Chen, Thomas, et al. “On the Well-Posedness and Scattering for the Gross-Pitaevskii
    Hierarchy via Quantum de Finetti.” <i>Letters in Mathematical Physics</i>, vol.
    104, no. 7, Springer, 2014, pp. 871–91, doi:<a href="https://doi.org/10.1007/s11005-014-0693-2">10.1007/s11005-014-0693-2</a>.
  short: T. Chen, C. Hainzl, N. Pavlović, R. Seiringer, Letters in Mathematical Physics
    104 (2014) 871–891.
date_created: 2018-12-11T11:56:12Z
date_published: 2014-05-07T00:00:00Z
date_updated: 2021-01-12T06:55:51Z
day: '07'
department:
- _id: RoSe
doi: 10.1007/s11005-014-0693-2
intvolume: '       104'
issue: '7'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1311.2136
month: '05'
oa: 1
oa_version: Submitted Version
page: 871 - 891
project:
- _id: 26450934-B435-11E9-9278-68D0E5697425
  name: NSERC Postdoctoral fellowship
publication: Letters in Mathematical Physics
publication_status: published
publisher: Springer
publist_id: '4793'
quality_controlled: '1'
scopus_import: 1
status: public
title: On the well-posedness and scattering for the Gross-Pitaevskii hierarchy via
  quantum de Finetti
type: journal_article
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 104
year: '2014'
...
---
_id: '2187'
abstract:
- lang: eng
  text: 'Systems should not only be correct but also robust in the sense that they
    behave reasonably in unexpected situations. This article addresses synthesis of
    robust reactive systems from temporal specifications. Existing methods allow arbitrary
    behavior if assumptions in the specification are violated. To overcome this, we
    define two robustness notions, combine them, and show how to enforce them in synthesis.
    The first notion applies to safety properties: If safety assumptions are violated
    temporarily, we require that the system recovers to normal operation with as few
    errors as possible. The second notion requires that, if liveness assumptions are
    violated, as many guarantees as possible should be fulfilled nevertheless. We
    present a synthesis procedure achieving this for the important class of GR(1)
    specifications, and establish complexity bounds. We also present an implementation
    of a special case of robustness, and show experimental results.'
article_processing_charge: No
article_type: original
author:
- first_name: Roderick
  full_name: Bloem, Roderick
  last_name: Bloem
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Karin
  full_name: Greimel, Karin
  last_name: Greimel
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Georg
  full_name: Hofferek, Georg
  last_name: Hofferek
- first_name: Barbara
  full_name: Jobstmann, Barbara
  last_name: Jobstmann
- first_name: Bettina
  full_name: Könighofer, Bettina
  last_name: Könighofer
- first_name: Robert
  full_name: Könighofer, Robert
  last_name: Könighofer
citation:
  ama: Bloem R, Chatterjee K, Greimel K, et al. Synthesizing robust systems. <i>Acta
    Informatica</i>. 2014;51(3-4):193-220. doi:<a href="https://doi.org/10.1007/s00236-013-0191-5">10.1007/s00236-013-0191-5</a>
  apa: Bloem, R., Chatterjee, K., Greimel, K., Henzinger, T. A., Hofferek, G., Jobstmann,
    B., … Könighofer, R. (2014). Synthesizing robust systems. <i>Acta Informatica</i>.
    Springer. <a href="https://doi.org/10.1007/s00236-013-0191-5">https://doi.org/10.1007/s00236-013-0191-5</a>
  chicago: Bloem, Roderick, Krishnendu Chatterjee, Karin Greimel, Thomas A Henzinger,
    Georg Hofferek, Barbara Jobstmann, Bettina Könighofer, and Robert Könighofer.
    “Synthesizing Robust Systems.” <i>Acta Informatica</i>. Springer, 2014. <a href="https://doi.org/10.1007/s00236-013-0191-5">https://doi.org/10.1007/s00236-013-0191-5</a>.
  ieee: R. Bloem <i>et al.</i>, “Synthesizing robust systems,” <i>Acta Informatica</i>,
    vol. 51, no. 3–4. Springer, pp. 193–220, 2014.
  ista: Bloem R, Chatterjee K, Greimel K, Henzinger TA, Hofferek G, Jobstmann B, Könighofer
    B, Könighofer R. 2014. Synthesizing robust systems. Acta Informatica. 51(3–4),
    193–220.
  mla: Bloem, Roderick, et al. “Synthesizing Robust Systems.” <i>Acta Informatica</i>,
    vol. 51, no. 3–4, Springer, 2014, pp. 193–220, doi:<a href="https://doi.org/10.1007/s00236-013-0191-5">10.1007/s00236-013-0191-5</a>.
  short: R. Bloem, K. Chatterjee, K. Greimel, T.A. Henzinger, G. Hofferek, B. Jobstmann,
    B. Könighofer, R. Könighofer, Acta Informatica 51 (2014) 193–220.
date_created: 2018-12-11T11:56:13Z
date_published: 2014-06-01T00:00:00Z
date_updated: 2021-01-12T06:55:51Z
day: '01'
ddc:
- '621'
department:
- _id: KrCh
- _id: ToHe
doi: 10.1007/s00236-013-0191-5
ec_funded: 1
file:
- access_level: open_access
  checksum: d7f560f3d923f0f00aa10a0652f83273
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:16:44Z
  date_updated: 2020-07-14T12:45:31Z
  file_id: '5234'
  file_name: IST-2012-71-v1+1_Synthesizing_robust_systems.pdf
  file_size: 169523
  relation: main_file
file_date_updated: 2020-07-14T12:45:31Z
has_accepted_license: '1'
intvolume: '        51'
issue: 3-4
language:
- iso: eng
month: '06'
oa: 1
oa_version: Submitted Version
page: 193 - 220
project:
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
publication: Acta Informatica
publication_status: published
publisher: Springer
publist_id: '4787'
pubrep_id: '71'
quality_controlled: '1'
scopus_import: 1
status: public
title: Synthesizing robust systems
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 51
year: '2014'
...
---
_id: '2188'
abstract:
- lang: eng
  text: Although plant and animal cells use a similar core mechanism to deliver proteins
    to the plasma membrane, their different lifestyle, body organization and specific
    cell structures resulted in the acquisition of regulatory mechanisms that vary
    in the two kingdoms. In particular, cell polarity regulators do not seem to be
    conserved, because genes encoding key components are absent in plant genomes.
    In plants, the broad knowledge on polarity derives from the study of auxin transporters,
    the PIN-FORMED proteins, in the model plant Arabidopsis thaliana. In animals,
    much information is provided from the study of polarity in epithelial cells that
    exhibit basolateral and luminal apical polarities, separated by tight junctions.
    In this review, we summarize the similarities and differences of the polarization
    mechanisms between plants and animals and survey the main genetic approaches that
    have been used to characterize new genes involved in polarity establishment in
    plants, including the frequently used forward and reverse genetics screens as
    well as a novel chemical genetics approach that is expected to overcome the limitation
    of classical genetics methods.
acknowledgement: "This work was supported by a grant from the Research Foundation-Flanders
  (Odysseus).\r\n\r\n"
article_number: '140017'
author:
- first_name: Urszula
  full_name: Kania, Urszula
  id: 4AE5C486-F248-11E8-B48F-1D18A9856A87
  last_name: Kania
- first_name: Matyas
  full_name: Fendrych, Matyas
  last_name: Fendrych
- first_name: Jiřĺ
  full_name: Friml, Jiřĺ
  id: 4159519E-F248-11E8-B48F-1D18A9856A87
  last_name: Friml
  orcid: 0000-0002-8302-7596
citation:
  ama: Kania U, Fendrych M, Friml J. Polar delivery in plants; commonalities and differences
    to animal epithelial cells. <i>Open Biology</i>. 2014;4(APRIL). doi:<a href="https://doi.org/10.1098/rsob.140017">10.1098/rsob.140017</a>
  apa: Kania, U., Fendrych, M., &#38; Friml, J. (2014). Polar delivery in plants;
    commonalities and differences to animal epithelial cells. <i>Open Biology</i>.
    Royal Society. <a href="https://doi.org/10.1098/rsob.140017">https://doi.org/10.1098/rsob.140017</a>
  chicago: Kania, Urszula, Matyas Fendrych, and Jiří Friml. “Polar Delivery in Plants;
    Commonalities and Differences to Animal Epithelial Cells.” <i>Open Biology</i>.
    Royal Society, 2014. <a href="https://doi.org/10.1098/rsob.140017">https://doi.org/10.1098/rsob.140017</a>.
  ieee: U. Kania, M. Fendrych, and J. Friml, “Polar delivery in plants; commonalities
    and differences to animal epithelial cells,” <i>Open Biology</i>, vol. 4, no.
    APRIL. Royal Society, 2014.
  ista: Kania U, Fendrych M, Friml J. 2014. Polar delivery in plants; commonalities
    and differences to animal epithelial cells. Open Biology. 4(APRIL), 140017.
  mla: Kania, Urszula, et al. “Polar Delivery in Plants; Commonalities and Differences
    to Animal Epithelial Cells.” <i>Open Biology</i>, vol. 4, no. APRIL, 140017, Royal
    Society, 2014, doi:<a href="https://doi.org/10.1098/rsob.140017">10.1098/rsob.140017</a>.
  short: U. Kania, M. Fendrych, J. Friml, Open Biology 4 (2014).
date_created: 2018-12-11T11:56:13Z
date_published: 2014-04-16T00:00:00Z
date_updated: 2021-01-12T06:55:52Z
day: '16'
ddc:
- '570'
department:
- _id: JiFr
doi: 10.1098/rsob.140017
file:
- access_level: open_access
  checksum: 2020627feff36cf0799167c84149fa75
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:13:40Z
  date_updated: 2020-07-14T12:45:31Z
  file_id: '5025'
  file_name: IST-2016-441-v1+1_140017.full.pdf
  file_size: 682570
  relation: main_file
file_date_updated: 2020-07-14T12:45:31Z
has_accepted_license: '1'
intvolume: '         4'
issue: APRIL
language:
- iso: eng
month: '04'
oa: 1
oa_version: Published Version
publication: Open Biology
publication_status: published
publisher: Royal Society
publist_id: '4786'
pubrep_id: '441'
quality_controlled: '1'
scopus_import: 1
status: public
title: Polar delivery in plants; commonalities and differences to animal epithelial
  cells
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: journal_article
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 4
year: '2014'
...
---
_id: '2189'
abstract:
- lang: fre
  text: En apprentissage automatique, nous parlons d'adaptation de domaine lorsque
    les données de test (cibles) et d'apprentissage (sources) sont générées selon
    différentes distributions. Nous devons donc développer des algorithmes de classification
    capables de s'adapter à une nouvelle distribution, pour laquelle aucune information
    sur les étiquettes n'est disponible. Nous attaquons cette problématique sous l'angle
    de l'approche PAC-Bayésienne qui se focalise sur l'apprentissage de modèles définis
    comme des votes de majorité sur un ensemble de fonctions. Dans ce contexte, nous
    introduisons PV-MinCq une version adaptative de l'algorithme (non adaptatif) MinCq.
    PV-MinCq suit le principe suivant. Nous transférons les étiquettes sources aux
    points cibles proches pour ensuite appliquer MinCq sur l'échantillon cible ``auto-étiqueté''
    (justifié par une borne théorique). Plus précisément, nous définissons un auto-étiquetage
    non itératif qui se focalise dans les régions où les distributions marginales
    source et cible sont les plus similaires. Dans un second temps, nous étudions
    l'influence de notre auto-étiquetage pour en déduire une procédure de validation
    des hyperparamètres. Finalement, notre approche montre des résultats empiriques
    prometteurs.
article_processing_charge: No
author:
- first_name: Emilie
  full_name: Morvant, Emilie
  id: 4BAC2A72-F248-11E8-B48F-1D18A9856A87
  last_name: Morvant
  orcid: 0000-0002-8301-7240
citation:
  ama: 'Morvant E. Adaptation de domaine de vote de majorité par auto-étiquetage non
    itératif. In: Vol 1. Elsevier; 2014:49-58.'
  apa: 'Morvant, E. (2014). Adaptation de domaine de vote de majorité par auto-étiquetage
    non itératif (Vol. 1, pp. 49–58). Presented at the CAP: Conférence Francophone
    sur l’Apprentissage Automatique (Machine Learning French Conference), Saint-Etienne,
    France: Elsevier.'
  chicago: Morvant, Emilie. “Adaptation de Domaine de Vote de Majorité Par Auto-Étiquetage
    Non Itératif,” 1:49–58. Elsevier, 2014.
  ieee: 'E. Morvant, “Adaptation de domaine de vote de majorité par auto-étiquetage
    non itératif,” presented at the CAP: Conférence Francophone sur l’Apprentissage
    Automatique (Machine Learning French Conference), Saint-Etienne, France, 2014,
    vol. 1, pp. 49–58.'
  ista: 'Morvant E. 2014. Adaptation de domaine de vote de majorité par auto-étiquetage
    non itératif. CAP: Conférence Francophone sur l’Apprentissage Automatique (Machine
    Learning French Conference) vol. 1, 49–58.'
  mla: Morvant, Emilie. <i>Adaptation de Domaine de Vote de Majorité Par Auto-Étiquetage
    Non Itératif</i>. Vol. 1, Elsevier, 2014, pp. 49–58.
  short: E. Morvant, in:, Elsevier, 2014, pp. 49–58.
conference:
  location: Saint-Etienne, France
  name: 'CAP: Conférence Francophone sur l''Apprentissage Automatique (Machine Learning
    French Conference)'
date_created: 2018-12-11T11:56:13Z
date_published: 2014-07-01T00:00:00Z
date_updated: 2021-01-12T06:55:52Z
day: '01'
department:
- _id: ChLa
intvolume: '         1'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://hal.archives-ouvertes.fr/hal-01005776/
month: '07'
oa: 1
oa_version: Preprint
page: 49-58
publication_status: published
publisher: Elsevier
publist_id: '4785'
quality_controlled: '1'
status: public
title: Adaptation de domaine de vote de majorité par auto-étiquetage non itératif
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 1
year: '2014'
...
---
_id: '2190'
abstract:
- lang: eng
  text: We present a new algorithm to construct a (generalized) deterministic Rabin
    automaton for an LTL formula φ. The automaton is the product of a master automaton
    and an array of slave automata, one for each G-subformula of φ. The slave automaton
    for G ψ is in charge of recognizing whether FG ψ holds. As opposed to standard
    determinization procedures, the states of all our automata have a clear logical
    structure, which allows for various optimizations. Our construction subsumes former
    algorithms for fragments of LTL. Experimental results show improvement in the
    sizes of the resulting automata compared to existing methods.
acknowledgement: The author is on leave from Faculty of Informatics, Masaryk University,
  Czech Republic, and partially supported by the Czech Science Foundation, grant No.
  P202/12/G061.
alternative_title:
- LNCS
author:
- first_name: Javier
  full_name: Esparza, Javier
  last_name: Esparza
- first_name: Jan
  full_name: Kretinsky, Jan
  id: 44CEF464-F248-11E8-B48F-1D18A9856A87
  last_name: Kretinsky
  orcid: 0000-0002-8122-2881
citation:
  ama: 'Esparza J, Kretinsky J. From LTL to deterministic automata: A safraless compositional
    approach. In: Vol 8559. Springer; 2014:192-208. doi:<a href="https://doi.org/10.1007/978-3-319-08867-9_13">10.1007/978-3-319-08867-9_13</a>'
  apa: 'Esparza, J., &#38; Kretinsky, J. (2014). From LTL to deterministic automata:
    A safraless compositional approach (Vol. 8559, pp. 192–208). Presented at the
    CAV: Computer Aided Verification, Springer. <a href="https://doi.org/10.1007/978-3-319-08867-9_13">https://doi.org/10.1007/978-3-319-08867-9_13</a>'
  chicago: 'Esparza, Javier, and Jan Kretinsky. “From LTL to Deterministic Automata:
    A Safraless Compositional Approach,” 8559:192–208. Springer, 2014. <a href="https://doi.org/10.1007/978-3-319-08867-9_13">https://doi.org/10.1007/978-3-319-08867-9_13</a>.'
  ieee: 'J. Esparza and J. Kretinsky, “From LTL to deterministic automata: A safraless
    compositional approach,” presented at the CAV: Computer Aided Verification, 2014,
    vol. 8559, pp. 192–208.'
  ista: 'Esparza J, Kretinsky J. 2014. From LTL to deterministic automata: A safraless
    compositional approach. CAV: Computer Aided Verification, LNCS, vol. 8559, 192–208.'
  mla: 'Esparza, Javier, and Jan Kretinsky. <i>From LTL to Deterministic Automata:
    A Safraless Compositional Approach</i>. Vol. 8559, Springer, 2014, pp. 192–208,
    doi:<a href="https://doi.org/10.1007/978-3-319-08867-9_13">10.1007/978-3-319-08867-9_13</a>.'
  short: J. Esparza, J. Kretinsky, in:, Springer, 2014, pp. 192–208.
conference:
  name: 'CAV: Computer Aided Verification'
date_created: 2018-12-11T11:56:14Z
date_published: 2014-01-01T00:00:00Z
date_updated: 2021-01-12T06:55:53Z
day: '01'
department:
- _id: ToHe
- _id: KrCh
doi: 10.1007/978-3-319-08867-9_13
ec_funded: 1
intvolume: '      8559'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1402.3388
month: '01'
oa: 1
oa_version: Submitted Version
page: 192 - 208
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
publication_status: published
publisher: Springer
publist_id: '4784'
quality_controlled: '1'
status: public
title: 'From LTL to deterministic automata: A safraless compositional approach'
type: conference
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 8559
year: '2014'
...
---
_id: '2211'
abstract:
- lang: eng
  text: 'In two-player finite-state stochastic games of partial observation on graphs,
    in every state of the graph, the players simultaneously choose an action, and
    their joint actions determine a probability distribution over the successor states.
    The game is played for infinitely many rounds and thus the players construct an
    infinite path in the graph. We consider reachability objectives where the first
    player tries to ensure a target state to be visited almost-surely (i.e., with
    probability 1) or positively (i.e., with positive probability), no matter the
    strategy of the second player. We classify such games according to the information
    and to the power of randomization available to the players. On the basis of information,
    the game can be one-sided with either (a) player 1, or (b) player 2 having partial
    observation (and the other player has perfect observation), or two-sided with
    (c) both players having partial observation. On the basis of randomization, (a)
    the players may not be allowed to use randomization (pure strategies), or (b)
    they may choose a probability distribution over actions but the actual random
    choice is external and not visible to the player (actions invisible), or (c) they
    may use full randomization. Our main results for pure strategies are as follows:
    (1) For one-sided games with player 2 having perfect observation we show that
    (in contrast to full randomized strategies) belief-based (subset-construction
    based) strategies are not sufficient, and we present an exponential upper bound
    on memory both for almost-sure and positive winning strategies; we show that the
    problem of deciding the existence of almost-sure and positive winning strategies
    for player 1 is EXPTIME-complete and present symbolic algorithms that avoid the
    explicit exponential construction. (2) For one-sided games with player 1 having
    perfect observation we show that nonelementarymemory is both necessary and sufficient
    for both almost-sure and positive winning strategies. (3) We show that for the
    general (two-sided) case finite-memory strategies are sufficient for both positive
    and almost-sure winning, and at least nonelementary memory is required. We establish
    the equivalence of the almost-sure winning problems for pure strategies and for
    randomized strategies with actions invisible. Our equivalence result exhibit serious
    flaws in previous results of the literature: we show a nonelementary memory lower
    bound for almost-sure winning whereas an exponential upper bound was previously
    claimed.'
article_number: '16'
arxiv: 1
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Laurent
  full_name: Doyen, Laurent
  last_name: Doyen
citation:
  ama: 'Chatterjee K, Doyen L. Partial-observation stochastic games: How to win when
    belief fails. <i>ACM Transactions on Computational Logic (TOCL)</i>. 2014;15(2).
    doi:<a href="https://doi.org/10.1145/2579821">10.1145/2579821</a>'
  apa: 'Chatterjee, K., &#38; Doyen, L. (2014). Partial-observation stochastic games:
    How to win when belief fails. <i>ACM Transactions on Computational Logic (TOCL)</i>.
    ACM. <a href="https://doi.org/10.1145/2579821">https://doi.org/10.1145/2579821</a>'
  chicago: 'Chatterjee, Krishnendu, and Laurent Doyen. “Partial-Observation Stochastic
    Games: How to Win When Belief Fails.” <i>ACM Transactions on Computational Logic
    (TOCL)</i>. ACM, 2014. <a href="https://doi.org/10.1145/2579821">https://doi.org/10.1145/2579821</a>.'
  ieee: 'K. Chatterjee and L. Doyen, “Partial-observation stochastic games: How to
    win when belief fails,” <i>ACM Transactions on Computational Logic (TOCL)</i>,
    vol. 15, no. 2. ACM, 2014.'
  ista: 'Chatterjee K, Doyen L. 2014. Partial-observation stochastic games: How to
    win when belief fails. ACM Transactions on Computational Logic (TOCL). 15(2),
    16.'
  mla: 'Chatterjee, Krishnendu, and Laurent Doyen. “Partial-Observation Stochastic
    Games: How to Win When Belief Fails.” <i>ACM Transactions on Computational Logic
    (TOCL)</i>, vol. 15, no. 2, 16, ACM, 2014, doi:<a href="https://doi.org/10.1145/2579821">10.1145/2579821</a>.'
  short: K. Chatterjee, L. Doyen, ACM Transactions on Computational Logic (TOCL) 15
    (2014).
date_created: 2018-12-11T11:56:21Z
date_published: 2014-04-01T00:00:00Z
date_updated: 2023-02-23T12:23:43Z
day: '01'
department:
- _id: KrCh
doi: 10.1145/2579821
external_id:
  arxiv:
  - '1107.2141'
intvolume: '        15'
issue: '2'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1107.2141
month: '04'
oa: 1
oa_version: Preprint
publication: ACM Transactions on Computational Logic (TOCL)
publication_status: published
publisher: ACM
publist_id: '4759'
quality_controlled: '1'
related_material:
  record:
  - id: '1903'
    relation: earlier_version
    status: public
  - id: '2955'
    relation: earlier_version
    status: public
  - id: '5381'
    relation: earlier_version
    status: public
scopus_import: 1
status: public
title: 'Partial-observation stochastic games: How to win when belief fails'
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 15
year: '2014'
...
---
_id: '2212'
abstract:
- lang: eng
  text: 'The theory of graph games is the foundation for modeling and synthesizing
    reactive processes. In the synthesis of stochastic processes, we use 2 1/2-player
    games where some transitions of the game graph are controlled by two adversarial
    players, the System and the Environment, and the other transitions are determined
    probabilistically. We consider 2 1/2-player games where the objective of the System
    is the conjunction of a qualitative objective (specified as a parity condition)
    and a quantitative objective (specified as a mean-payoff condition). We establish
    that the problem of deciding whether the System can ensure that the probability
    to satisfy the mean-payoff parity objective is at least a given threshold is in
    NP ∩ coNP, matching the best known bound in the special case of 2-player games
    (where all transitions are deterministic). We present an algorithm running in
    time O(d·n2d·MeanGame) to compute the set of almost-sure winning states from which
    the objective can be ensured with probability 1, where n is the number of states
    of the game, d the number of priorities of the parity objective, and MeanGame
    is the complexity to compute the set of almost-sure winning states in 2 1/2-player
    mean-payoff games. Our results are useful in the synthesis of stochastic reactive
    systems with both functional requirement (given as a qualitative objective) and
    performance requirement (given as a quantitative objective). '
acknowledgement: "This research was supported by European project Cassting (FP7-601148).\r\nA
  Technical Report of this paper is available at: \r\nhttps://repository.ist.ac.at/id/eprint/128."
alternative_title:
- LNCS
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Laurent
  full_name: Doyen, Laurent
  last_name: Doyen
- first_name: Hugo
  full_name: Gimbert, Hugo
  last_name: Gimbert
- first_name: Youssouf
  full_name: Oualhadj, Youssouf
  last_name: Oualhadj
citation:
  ama: 'Chatterjee K, Doyen L, Gimbert H, Oualhadj Y. Perfect-information stochastic
    mean-payoff parity games. In: Vol 8412. Springer; 2014:210-225. doi:<a href="https://doi.org/10.1007/978-3-642-54830-7_14">10.1007/978-3-642-54830-7_14</a>'
  apa: 'Chatterjee, K., Doyen, L., Gimbert, H., &#38; Oualhadj, Y. (2014). Perfect-information
    stochastic mean-payoff parity games (Vol. 8412, pp. 210–225). Presented at the
    FoSSaCS: Foundations of Software Science and Computation Structures, Grenoble,
    France: Springer. <a href="https://doi.org/10.1007/978-3-642-54830-7_14">https://doi.org/10.1007/978-3-642-54830-7_14</a>'
  chicago: Chatterjee, Krishnendu, Laurent Doyen, Hugo Gimbert, and Youssouf Oualhadj.
    “Perfect-Information Stochastic Mean-Payoff Parity Games,” 8412:210–25. Springer,
    2014. <a href="https://doi.org/10.1007/978-3-642-54830-7_14">https://doi.org/10.1007/978-3-642-54830-7_14</a>.
  ieee: 'K. Chatterjee, L. Doyen, H. Gimbert, and Y. Oualhadj, “Perfect-information
    stochastic mean-payoff parity games,” presented at the FoSSaCS: Foundations of
    Software Science and Computation Structures, Grenoble, France, 2014, vol. 8412,
    pp. 210–225.'
  ista: 'Chatterjee K, Doyen L, Gimbert H, Oualhadj Y. 2014. Perfect-information stochastic
    mean-payoff parity games. FoSSaCS: Foundations of Software Science and Computation
    Structures, LNCS, vol. 8412, 210–225.'
  mla: Chatterjee, Krishnendu, et al. <i>Perfect-Information Stochastic Mean-Payoff
    Parity Games</i>. Vol. 8412, Springer, 2014, pp. 210–25, doi:<a href="https://doi.org/10.1007/978-3-642-54830-7_14">10.1007/978-3-642-54830-7_14</a>.
  short: K. Chatterjee, L. Doyen, H. Gimbert, Y. Oualhadj, in:, Springer, 2014, pp.
    210–225.
conference:
  end_date: 2014-04-13
  location: Grenoble, France
  name: 'FoSSaCS: Foundations of Software Science and Computation Structures'
  start_date: 2014-04-05
date_created: 2018-12-11T11:56:21Z
date_published: 2014-04-01T00:00:00Z
date_updated: 2023-02-23T12:24:50Z
day: '01'
department:
- _id: KrCh
doi: 10.1007/978-3-642-54830-7_14
ec_funded: 1
intvolume: '      8412'
language:
- iso: eng
month: '04'
oa_version: None
page: 210 - 225
project:
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 25863FF4-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11407
  name: Game Theory
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication_status: published
publisher: Springer
publist_id: '4758'
quality_controlled: '1'
related_material:
  record:
  - id: '5405'
    relation: earlier_version
    status: public
scopus_import: 1
status: public
title: Perfect-information stochastic mean-payoff parity games
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 8412
year: '2014'
...
---
_id: '2213'
abstract:
- lang: eng
  text: We consider two-player partial-observation stochastic games on finitestate
    graphs where player 1 has partial observation and player 2 has perfect observation.
    The winning condition we study are ε-regular conditions specified as parity objectives.
    The qualitative-analysis problem given a partial-observation stochastic game and
    a parity objective asks whether there is a strategy to ensure that the objective
    is satisfied with probability 1 (resp. positive probability). These qualitative-analysis
    problems are known to be undecidable. However in many applications the relevant
    question is the existence of finite-memory strategies, and the qualitative-analysis
    problems under finite-memory strategies was recently shown to be decidable in
    2EXPTIME.We improve the complexity and show that the qualitative-analysis problems
    for partial-observation stochastic parity games under finite-memory strategies
    are EXPTIME-complete; and also establish optimal (exponential) memory bounds for
    finite-memory strategies required for qualitative analysis.
acknowledgement: 'This research was supported by European project Cassting (FP7-601148),
  NSF grants CNS 1049862 and CCF-1139011, by NSF Expe ditions in Computing project
  “ExCAPE: Expeditions in Computer Augmented Program Engineering”, by BSF grant 9800096,
  and by gift from Intel.'
alternative_title:
- LNCS
arxiv: 1
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Laurent
  full_name: Doyen, Laurent
  last_name: Doyen
- first_name: Sumit
  full_name: Nain, Sumit
  last_name: Nain
- first_name: Moshe
  full_name: Vardi, Moshe
  last_name: Vardi
citation:
  ama: 'Chatterjee K, Doyen L, Nain S, Vardi M. The complexity of partial-observation
    stochastic parity games with finite-memory strategies. In: Vol 8412. Springer;
    2014:242-257. doi:<a href="https://doi.org/10.1007/978-3-642-54830-7_16">10.1007/978-3-642-54830-7_16</a>'
  apa: 'Chatterjee, K., Doyen, L., Nain, S., &#38; Vardi, M. (2014). The complexity
    of partial-observation stochastic parity games with finite-memory strategies (Vol.
    8412, pp. 242–257). Presented at the FoSSaCS: Foundations of Software Science
    and Computation Structures, Grenoble, France: Springer. <a href="https://doi.org/10.1007/978-3-642-54830-7_16">https://doi.org/10.1007/978-3-642-54830-7_16</a>'
  chicago: Chatterjee, Krishnendu, Laurent Doyen, Sumit Nain, and Moshe Vardi. “The
    Complexity of Partial-Observation Stochastic Parity Games with Finite-Memory Strategies,”
    8412:242–57. Springer, 2014. <a href="https://doi.org/10.1007/978-3-642-54830-7_16">https://doi.org/10.1007/978-3-642-54830-7_16</a>.
  ieee: 'K. Chatterjee, L. Doyen, S. Nain, and M. Vardi, “The complexity of partial-observation
    stochastic parity games with finite-memory strategies,” presented at the FoSSaCS:
    Foundations of Software Science and Computation Structures, Grenoble, France,
    2014, vol. 8412, pp. 242–257.'
  ista: 'Chatterjee K, Doyen L, Nain S, Vardi M. 2014. The complexity of partial-observation
    stochastic parity games with finite-memory strategies. FoSSaCS: Foundations of
    Software Science and Computation Structures, LNCS, vol. 8412, 242–257.'
  mla: Chatterjee, Krishnendu, et al. <i>The Complexity of Partial-Observation Stochastic
    Parity Games with Finite-Memory Strategies</i>. Vol. 8412, Springer, 2014, pp.
    242–57, doi:<a href="https://doi.org/10.1007/978-3-642-54830-7_16">10.1007/978-3-642-54830-7_16</a>.
  short: K. Chatterjee, L. Doyen, S. Nain, M. Vardi, in:, Springer, 2014, pp. 242–257.
conference:
  end_date: 2014-04-13
  location: Grenoble, France
  name: 'FoSSaCS: Foundations of Software Science and Computation Structures'
  start_date: 2014-04-05
date_created: 2018-12-11T11:56:21Z
date_published: 2014-04-01T00:00:00Z
date_updated: 2023-02-23T12:24:58Z
day: '01'
department:
- _id: KrCh
doi: 10.1007/978-3-642-54830-7_16
ec_funded: 1
external_id:
  arxiv:
  - '1401.3289'
intvolume: '      8412'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1401.3289
month: '04'
oa: 1
oa_version: Preprint
page: 242 - 257
project:
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 25863FF4-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11407
  name: Game Theory
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication_status: published
publisher: Springer
publist_id: '4757'
quality_controlled: '1'
related_material:
  record:
  - id: '5408'
    relation: earlier_version
    status: public
scopus_import: 1
status: public
title: The complexity of partial-observation stochastic parity games with finite-memory
  strategies
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 8412
year: '2014'
...
---
_id: '2214'
abstract:
- lang: eng
  text: A hallmark of immune cell trafficking is directional guidance via gradients
    of soluble or surface bound chemokines. Vascular endothelial cells produce, transport
    and deposit either their own chemokines or chemokines produced by the underlying
    stroma. Endothelial heparan sulfate (HS) was suggested to be a critical scaffold
    for these chemokine pools, but it is unclear how steep chemokine gradients are
    sustained between the lumenal and ablumenal aspects of blood vessels. Addressing
    this question by semi-quantitative immunostaining of HS moieties around blood
    vessels with a pan anti-HS IgM mAb, we found a striking HS enrichment in the basal
    lamina of resting and inflamed post capillary skin venules, as well as in high
    endothelial venules (HEVs) of lymph nodes. Staining of skin vessels with a glycocalyx
    probe further suggested that their lumenal glycocalyx contains much lower HS density
    than their basolateral extracellular matrix (ECM). This polarized HS pattern was
    observed also in isolated resting and inflamed microvascular dermal cells. Notably,
    progressive skin inflammation resulted in massive ECM deposition and in further
    HS enrichment around skin post capillary venules and their associated pericytes.
    Inflammation-dependent HS enrichment was not compromised in mice deficient in
    the main HS degrading enzyme, heparanase. Our results suggest that the blood vasculature
    patterns steep gradients of HS scaffolds between their lumenal and basolateral
    endothelial aspects, and that inflammatory processes can further enrich the HS
    content nearby inflamed vessels. We propose that chemokine gradients between the
    lumenal and ablumenal sides of vessels could be favored by these sharp HS scaffold
    gradients.
acknowledgement: Michael Sixt's research is supported by the European Research Council
  (ERC Starting grant).
article_number: e85699
author:
- first_name: Liat
  full_name: Stoler Barak, Liat
  last_name: Stoler Barak
- first_name: Christine
  full_name: Moussion, Christine
  id: 3356F664-F248-11E8-B48F-1D18A9856A87
  last_name: Moussion
- first_name: Elias
  full_name: Shezen, Elias
  last_name: Shezen
- first_name: Miki
  full_name: Hatzav, Miki
  last_name: Hatzav
- first_name: Michael K
  full_name: Sixt, Michael K
  id: 41E9FBEA-F248-11E8-B48F-1D18A9856A87
  last_name: Sixt
  orcid: 0000-0002-6620-9179
- first_name: Ronen
  full_name: Alon, Ronen
  last_name: Alon
citation:
  ama: Stoler Barak L, Moussion C, Shezen E, Hatzav M, Sixt MK, Alon R. Blood vessels
    pattern heparan sulfate gradients between their apical and basolateral aspects.
    <i>PLoS One</i>. 2014;9(1). doi:<a href="https://doi.org/10.1371/journal.pone.0085699">10.1371/journal.pone.0085699</a>
  apa: Stoler Barak, L., Moussion, C., Shezen, E., Hatzav, M., Sixt, M. K., &#38;
    Alon, R. (2014). Blood vessels pattern heparan sulfate gradients between their
    apical and basolateral aspects. <i>PLoS One</i>. Public Library of Science. <a
    href="https://doi.org/10.1371/journal.pone.0085699">https://doi.org/10.1371/journal.pone.0085699</a>
  chicago: Stoler Barak, Liat, Christine Moussion, Elias Shezen, Miki Hatzav, Michael
    K Sixt, and Ronen Alon. “Blood Vessels Pattern Heparan Sulfate Gradients between
    Their Apical and Basolateral Aspects.” <i>PLoS One</i>. Public Library of Science,
    2014. <a href="https://doi.org/10.1371/journal.pone.0085699">https://doi.org/10.1371/journal.pone.0085699</a>.
  ieee: L. Stoler Barak, C. Moussion, E. Shezen, M. Hatzav, M. K. Sixt, and R. Alon,
    “Blood vessels pattern heparan sulfate gradients between their apical and basolateral
    aspects,” <i>PLoS One</i>, vol. 9, no. 1. Public Library of Science, 2014.
  ista: Stoler Barak L, Moussion C, Shezen E, Hatzav M, Sixt MK, Alon R. 2014. Blood
    vessels pattern heparan sulfate gradients between their apical and basolateral
    aspects. PLoS One. 9(1), e85699.
  mla: Stoler Barak, Liat, et al. “Blood Vessels Pattern Heparan Sulfate Gradients
    between Their Apical and Basolateral Aspects.” <i>PLoS One</i>, vol. 9, no. 1,
    e85699, Public Library of Science, 2014, doi:<a href="https://doi.org/10.1371/journal.pone.0085699">10.1371/journal.pone.0085699</a>.
  short: L. Stoler Barak, C. Moussion, E. Shezen, M. Hatzav, M.K. Sixt, R. Alon, PLoS
    One 9 (2014).
date_created: 2018-12-11T11:56:22Z
date_published: 2014-01-22T00:00:00Z
date_updated: 2021-01-12T06:56:03Z
day: '22'
ddc:
- '570'
department:
- _id: MiSi
doi: 10.1371/journal.pone.0085699
ec_funded: 1
file:
- access_level: open_access
  checksum: 84a8033bda2e07e39405f5acc85f4eca
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:07:48Z
  date_updated: 2020-07-14T12:45:33Z
  file_id: '4646'
  file_name: IST-2016-433-v1+1_journal.pone.0085699.pdf
  file_size: 12634775
  relation: main_file
file_date_updated: 2020-07-14T12:45:33Z
has_accepted_license: '1'
intvolume: '         9'
issue: '1'
language:
- iso: eng
month: '01'
oa: 1
oa_version: Published Version
project:
- _id: 25A76F58-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '289720'
  name: Stromal Cell-immune Cell Interactions in Health and Disease
publication: PLoS One
publication_status: published
publisher: Public Library of Science
publist_id: '4756'
pubrep_id: '433'
quality_controlled: '1'
scopus_import: 1
status: public
title: Blood vessels pattern heparan sulfate gradients between their apical and basolateral
  aspects
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: journal_article
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 9
year: '2014'
...
---
_id: '2215'
abstract:
- lang: eng
  text: Homologous recombination is crucial for genome stability and for genetic exchange.
    Although our knowledge of the principle steps in recombination and its machinery
    is well advanced, homology search, the critical step of exploring the genome for
    homologous sequences to enable recombination, has remained mostly enigmatic. However,
    recent methodological advances have provided considerable new insights into this
    fundamental step in recombination that can be integrated into a mechanistic model.
    These advances emphasize the importance of genomic proximity and nuclear organization
    for homology search and the critical role of homology search mediators in this
    process. They also aid our understanding of how homology search might lead to
    unwanted and potentially disease-promoting recombination events.
acknowledgement: J.R. was supported by a Boehringer Ingelheim Fonds PhD stipend.
author:
- first_name: Jörg
  full_name: Renkawitz, Jörg
  id: 3F0587C8-F248-11E8-B48F-1D18A9856A87
  last_name: Renkawitz
  orcid: 0000-0003-2856-3369
- first_name: Claudio
  full_name: Lademann, Claudio
  last_name: Lademann
- first_name: Stefan
  full_name: Jentsch, Stefan
  last_name: Jentsch
citation:
  ama: Renkawitz J, Lademann C, Jentsch S. Mechanisms and principles of homology search
    during recombination. <i>Nature Reviews Molecular Cell Biology</i>. 2014;15(6):369-383.
    doi:<a href="https://doi.org/10.1038/nrm3805">10.1038/nrm3805</a>
  apa: Renkawitz, J., Lademann, C., &#38; Jentsch, S. (2014). Mechanisms and principles
    of homology search during recombination. <i>Nature Reviews Molecular Cell Biology</i>.
    Nature Publishing Group. <a href="https://doi.org/10.1038/nrm3805">https://doi.org/10.1038/nrm3805</a>
  chicago: Renkawitz, Jörg, Claudio Lademann, and Stefan Jentsch. “Mechanisms and
    Principles of Homology Search during Recombination.” <i>Nature Reviews Molecular
    Cell Biology</i>. Nature Publishing Group, 2014. <a href="https://doi.org/10.1038/nrm3805">https://doi.org/10.1038/nrm3805</a>.
  ieee: J. Renkawitz, C. Lademann, and S. Jentsch, “Mechanisms and principles of homology
    search during recombination,” <i>Nature Reviews Molecular Cell Biology</i>, vol.
    15, no. 6. Nature Publishing Group, pp. 369–383, 2014.
  ista: Renkawitz J, Lademann C, Jentsch S. 2014. Mechanisms and principles of homology
    search during recombination. Nature Reviews Molecular Cell Biology. 15(6), 369–383.
  mla: Renkawitz, Jörg, et al. “Mechanisms and Principles of Homology Search during
    Recombination.” <i>Nature Reviews Molecular Cell Biology</i>, vol. 15, no. 6,
    Nature Publishing Group, 2014, pp. 369–83, doi:<a href="https://doi.org/10.1038/nrm3805">10.1038/nrm3805</a>.
  short: J. Renkawitz, C. Lademann, S. Jentsch, Nature Reviews Molecular Cell Biology
    15 (2014) 369–383.
date_created: 2018-12-11T11:56:22Z
date_published: 2014-05-14T00:00:00Z
date_updated: 2021-01-12T06:56:03Z
day: '14'
department:
- _id: MiSi
doi: 10.1038/nrm3805
intvolume: '        15'
issue: '6'
language:
- iso: eng
month: '05'
oa_version: None
page: 369 - 383
publication: Nature Reviews Molecular Cell Biology
publication_status: published
publisher: Nature Publishing Group
publist_id: '4755'
quality_controlled: '1'
scopus_import: 1
status: public
title: Mechanisms and principles of homology search during recombination
type: journal_article
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 15
year: '2014'
...
---
_id: '2216'
abstract:
- lang: eng
  text: The edit distance between two (untimed) traces is the minimum cost of a sequence
    of edit operations (insertion, deletion, or substitution) needed to transform
    one trace to the other. Edit distances have been extensively studied in the untimed
    setting, and form the basis for approximate matching of sequences in different
    domains such as coding theory, parsing, and speech recognition. In this paper,
    we lift the study of edit distances from untimed languages to the timed setting.
    We define an edit distance between timed words which incorporates both the edit
    distance between the untimed words and the absolute difference in time stamps.
    Our edit distance between two timed words is computable in polynomial time. Further,
    we show that the edit distance between a timed word and a timed language generated
    by a timed automaton, defined as the edit distance between the word and the closest
    word in the language, is PSPACE-complete. While computing the edit distance between
    two timed automata is undecidable, we show that the approximate version, where
    we decide if the edit distance between two timed automata is either less than
    a given parameter or more than δ away from the parameter, for δ &gt; 0, can be
    solved in exponential space and is EXPSPACE-hard. Our definitions and techniques
    can be generalized to the setting of hybrid systems, and analogous decidability
    results hold for rectangular automata.
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Rasmus
  full_name: Ibsen-Jensen, Rasmus
  id: 3B699956-F248-11E8-B48F-1D18A9856A87
  last_name: Ibsen-Jensen
  orcid: 0000-0003-4783-0389
- first_name: Ritankar
  full_name: Majumdar, Ritankar
  last_name: Majumdar
citation:
  ama: 'Chatterjee K, Ibsen-Jensen R, Majumdar R. Edit distance for timed automata.
    In: Springer; 2014:303-312. doi:<a href="https://doi.org/10.1145/2562059.2562141">10.1145/2562059.2562141</a>'
  apa: 'Chatterjee, K., Ibsen-Jensen, R., &#38; Majumdar, R. (2014). Edit distance
    for timed automata (pp. 303–312). Presented at the HSCC: Hybrid Systems - Computation
    and Control, Berlin, Germany: Springer. <a href="https://doi.org/10.1145/2562059.2562141">https://doi.org/10.1145/2562059.2562141</a>'
  chicago: Chatterjee, Krishnendu, Rasmus Ibsen-Jensen, and Ritankar Majumdar. “Edit
    Distance for Timed Automata,” 303–12. Springer, 2014. <a href="https://doi.org/10.1145/2562059.2562141">https://doi.org/10.1145/2562059.2562141</a>.
  ieee: 'K. Chatterjee, R. Ibsen-Jensen, and R. Majumdar, “Edit distance for timed
    automata,” presented at the HSCC: Hybrid Systems - Computation and Control, Berlin,
    Germany, 2014, pp. 303–312.'
  ista: 'Chatterjee K, Ibsen-Jensen R, Majumdar R. 2014. Edit distance for timed automata.
    HSCC: Hybrid Systems - Computation and Control, 303–312.'
  mla: Chatterjee, Krishnendu, et al. <i>Edit Distance for Timed Automata</i>. Springer,
    2014, pp. 303–12, doi:<a href="https://doi.org/10.1145/2562059.2562141">10.1145/2562059.2562141</a>.
  short: K. Chatterjee, R. Ibsen-Jensen, R. Majumdar, in:, Springer, 2014, pp. 303–312.
conference:
  end_date: 2017-04-17
  location: Berlin, Germany
  name: 'HSCC: Hybrid Systems - Computation and Control'
  start_date: 2017-04-15
date_created: 2018-12-11T11:56:22Z
date_published: 2014-01-01T00:00:00Z
date_updated: 2023-02-23T12:25:01Z
day: '01'
department:
- _id: KrCh
doi: 10.1145/2562059.2562141
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://dl.acm.org/citation.cfm?doid=2562059.2562141
month: '01'
oa: 1
oa_version: Submitted Version
page: 303 - 312
publication_status: published
publisher: Springer
publist_id: '4752'
quality_controlled: '1'
related_material:
  record:
  - id: '5409'
    relation: earlier_version
    status: public
status: public
title: Edit distance for timed automata
type: conference
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
year: '2014'
...
---
_id: '2217'
abstract:
- lang: eng
  text: "As hybrid systems involve continuous behaviors, they should be evaluated
    by quantitative methods, rather than qualitative methods. In this paper we adapt
    a quantitative framework, called model measuring, to the hybrid systems domain.
    The model-measuring problem asks, given a model M and a specification, what is
    the maximal distance such that all models within that distance from M satisfy
    (or violate) the specification. A distance function on models is given as part
    of the input of the problem. Distances, especially related to continuous behaviors
    are more natural in the hybrid case than the discrete case. We are interested
    in distances represented by monotonic hybrid automata, a hybrid counterpart of
    (discrete) weighted automata, whose recognized timed languages are monotone (w.r.t.
    inclusion) in the values of parameters.\r\n\r\nThe contributions of this paper
    are twofold. First, we give sufficient conditions under which the model-measuring
    problem can be solved. Second, we discuss the modeling of distances and applications
    of the model-measuring problem."
acknowledgement: "This  work  was  supported  in  part  by  the  Austrian  Science
  Fund  NFN  RiSE  (Rigorous  Systems  Engineering)  and  by the ERC Advanced Grant
  QUAREM (Quantitative Reactive Modeling).\r\nA Technical Report of this paper is
  available at: \r\nhttps://repository.ist.ac.at/id/eprint/171"
article_processing_charge: No
author:
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Jan
  full_name: Otop, Jan
  id: 2FC5DA74-F248-11E8-B48F-1D18A9856A87
  last_name: Otop
citation:
  ama: 'Henzinger TA, Otop J. Model measuring for hybrid systems. In: <i>Proceedings
    of the 17th International Conference on Hybrid Systems: Computation and Control</i>.
    Springer; 2014:213-222. doi:<a href="https://doi.org/10.1145/2562059.2562130">10.1145/2562059.2562130</a>'
  apa: 'Henzinger, T. A., &#38; Otop, J. (2014). Model measuring for hybrid systems.
    In <i>Proceedings of the 17th international conference on Hybrid systems: computation
    and control</i> (pp. 213–222). Berlin, Germany: Springer. <a href="https://doi.org/10.1145/2562059.2562130">https://doi.org/10.1145/2562059.2562130</a>'
  chicago: 'Henzinger, Thomas A, and Jan Otop. “Model Measuring for Hybrid Systems.”
    In <i>Proceedings of the 17th International Conference on Hybrid Systems: Computation
    and Control</i>, 213–22. Springer, 2014. <a href="https://doi.org/10.1145/2562059.2562130">https://doi.org/10.1145/2562059.2562130</a>.'
  ieee: 'T. A. Henzinger and J. Otop, “Model measuring for hybrid systems,” in <i>Proceedings
    of the 17th international conference on Hybrid systems: computation and control</i>,
    Berlin, Germany, 2014, pp. 213–222.'
  ista: 'Henzinger TA, Otop J. 2014. Model measuring for hybrid systems. Proceedings
    of the 17th international conference on Hybrid systems: computation and control.
    HSCC: Hybrid Systems - Computation and Control, 213–222.'
  mla: 'Henzinger, Thomas A., and Jan Otop. “Model Measuring for Hybrid Systems.”
    <i>Proceedings of the 17th International Conference on Hybrid Systems: Computation
    and Control</i>, Springer, 2014, pp. 213–22, doi:<a href="https://doi.org/10.1145/2562059.2562130">10.1145/2562059.2562130</a>.'
  short: 'T.A. Henzinger, J. Otop, in:, Proceedings of the 17th International Conference
    on Hybrid Systems: Computation and Control, Springer, 2014, pp. 213–222.'
conference:
  end_date: 2014-04-17
  location: Berlin, Germany
  name: 'HSCC: Hybrid Systems - Computation and Control'
  start_date: 2014-04-15
date_created: 2018-12-11T11:56:23Z
date_published: 2014-04-01T00:00:00Z
date_updated: 2023-02-23T12:25:23Z
day: '01'
department:
- _id: ToHe
doi: 10.1145/2562059.2562130
ec_funded: 1
language:
- iso: eng
month: '04'
oa_version: None
page: 213 - 222
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
publication: 'Proceedings of the 17th international conference on Hybrid systems:
  computation and control'
publication_status: published
publisher: Springer
publist_id: '4751'
quality_controlled: '1'
related_material:
  record:
  - id: '5416'
    relation: earlier_version
    status: public
scopus_import: 1
status: public
title: Model measuring for hybrid systems
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2014'
...
---
_id: '2218'
abstract:
- lang: eng
  text: While fixing concurrency bugs, program repair algorithms may introduce new
    concurrency bugs. We present an algorithm that avoids such regressions. The solution
    space is given by a set of program transformations we consider in the repair process.
    These include reordering of instructions within a thread and inserting atomic
    sections. The new algorithm learns a constraint on the space of candidate solutions,
    from both positive examples (error-free traces) and counterexamples (error traces).
    From each counterexample, the algorithm learns a constraint necessary to remove
    the errors. From each positive examples, it learns a constraint that is necessary
    in order to prevent the repair from turning the trace into an error trace. We
    implemented the algorithm and evaluated it on simplified Linux device drivers
    with known bugs.
alternative_title:
- LNCS
author:
- first_name: Pavol
  full_name: Cerny, Pavol
  last_name: Cerny
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Arjun
  full_name: Radhakrishna, Arjun
  id: 3B51CAC4-F248-11E8-B48F-1D18A9856A87
  last_name: Radhakrishna
- first_name: Leonid
  full_name: Ryzhyk, Leonid
  last_name: Ryzhyk
- first_name: Thorsten
  full_name: Tarrach, Thorsten
  id: 3D6E8F2C-F248-11E8-B48F-1D18A9856A87
  last_name: Tarrach
  orcid: 0000-0003-4409-8487
citation:
  ama: 'Cerny P, Henzinger TA, Radhakrishna A, Ryzhyk L, Tarrach T. Regression-free
    synthesis for concurrency. In: Vol 8559. Springer; 2014:568-584. doi:<a href="https://doi.org/10.1007/978-3-319-08867-9_38">10.1007/978-3-319-08867-9_38</a>'
  apa: 'Cerny, P., Henzinger, T. A., Radhakrishna, A., Ryzhyk, L., &#38; Tarrach,
    T. (2014). Regression-free synthesis for concurrency (Vol. 8559, pp. 568–584).
    Presented at the CAV: Computer Aided Verification, Vienna, Austria: Springer.
    <a href="https://doi.org/10.1007/978-3-319-08867-9_38">https://doi.org/10.1007/978-3-319-08867-9_38</a>'
  chicago: Cerny, Pavol, Thomas A Henzinger, Arjun Radhakrishna, Leonid Ryzhyk, and
    Thorsten Tarrach. “Regression-Free Synthesis for Concurrency,” 8559:568–84. Springer,
    2014. <a href="https://doi.org/10.1007/978-3-319-08867-9_38">https://doi.org/10.1007/978-3-319-08867-9_38</a>.
  ieee: 'P. Cerny, T. A. Henzinger, A. Radhakrishna, L. Ryzhyk, and T. Tarrach, “Regression-free
    synthesis for concurrency,” presented at the CAV: Computer Aided Verification,
    Vienna, Austria, 2014, vol. 8559, pp. 568–584.'
  ista: 'Cerny P, Henzinger TA, Radhakrishna A, Ryzhyk L, Tarrach T. 2014. Regression-free
    synthesis for concurrency. CAV: Computer Aided Verification, LNCS, vol. 8559,
    568–584.'
  mla: Cerny, Pavol, et al. <i>Regression-Free Synthesis for Concurrency</i>. Vol.
    8559, Springer, 2014, pp. 568–84, doi:<a href="https://doi.org/10.1007/978-3-319-08867-9_38">10.1007/978-3-319-08867-9_38</a>.
  short: P. Cerny, T.A. Henzinger, A. Radhakrishna, L. Ryzhyk, T. Tarrach, in:, Springer,
    2014, pp. 568–584.
conference:
  end_date: 2014-07-22
  location: Vienna, Austria
  name: 'CAV: Computer Aided Verification'
  start_date: 2014-07-18
date_created: 2018-12-11T11:56:23Z
date_published: 2014-07-22T00:00:00Z
date_updated: 2023-09-07T11:57:01Z
day: '22'
ddc:
- '000'
department:
- _id: ToHe
doi: 10.1007/978-3-319-08867-9_38
ec_funded: 1
file:
- access_level: open_access
  checksum: a631d3105509f239724644e77a1212e2
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:13:14Z
  date_updated: 2020-07-14T12:45:33Z
  file_id: '4995'
  file_name: IST-2014-297-v1+1_cav14-final.pdf
  file_size: 416732
  relation: main_file
- access_level: open_access
  checksum: f8b0f748cc9fa697ca992cc56c87bc4e
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:13:15Z
  date_updated: 2020-07-14T12:45:33Z
  file_id: '4996'
  file_name: IST-2014-297-v2+1_cav14-final2.pdf
  file_size: 616293
  relation: main_file
file_date_updated: 2020-07-14T12:45:33Z
has_accepted_license: '1'
intvolume: '      8559'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://link.springer.com/chapter/10.1007%2F978-3-319-08867-9_38
month: '07'
oa: 1
oa_version: Submitted Version
page: 568 - 584
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
publication_identifier:
  isbn:
  - 978-331908866-2
publication_status: published
publisher: Springer
publist_id: '4749'
pubrep_id: '297'
quality_controlled: '1'
related_material:
  record:
  - id: '1130'
    relation: dissertation_contains
    status: public
status: public
title: Regression-free synthesis for concurrency
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 8559
year: '2014'
...
---
_id: '2219'
abstract:
- lang: eng
  text: Recently, Döttling et al. (ASIACRYPT 2012) proposed the first chosen-ciphertext
    (IND-CCA) secure public-key encryption scheme from the learning parity with noise
    (LPN) assumption. In this work we give an alternative scheme which is conceptually
    simpler and more efficient. At the core of our construction is a trapdoor technique
    originally proposed for lattices by Micciancio and Peikert (EUROCRYPT 2012), which
    we adapt to the LPN setting. The main technical tool is a new double-trapdoor
    mechanism, together with a trapdoor switching lemma based on a computational variant
    of the leftover hash lemma.
alternative_title:
- LNCS
author:
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
- first_name: Daniel
  full_name: Masny, Daniel
  last_name: Masny
- first_name: Krzysztof Z
  full_name: Pietrzak, Krzysztof Z
  id: 3E04A7AA-F248-11E8-B48F-1D18A9856A87
  last_name: Pietrzak
  orcid: 0000-0002-9139-1654
citation:
  ama: 'Kiltz E, Masny D, Pietrzak KZ. Simple chosen-ciphertext security from low
    noise LPN. In: Vol 8383. Springer; 2014:1-18. doi:<a href="https://doi.org/10.1007/978-3-642-54631-0_1">10.1007/978-3-642-54631-0_1</a>'
  apa: 'Kiltz, E., Masny, D., &#38; Pietrzak, K. Z. (2014). Simple chosen-ciphertext
    security from low noise LPN (Vol. 8383, pp. 1–18). Presented at the IACR: International
    Conference on Practice and Theory in Public-Key Cryptography, Springer. <a href="https://doi.org/10.1007/978-3-642-54631-0_1">https://doi.org/10.1007/978-3-642-54631-0_1</a>'
  chicago: Kiltz, Eike, Daniel Masny, and Krzysztof Z Pietrzak. “Simple Chosen-Ciphertext
    Security from Low Noise LPN,” 8383:1–18. Springer, 2014. <a href="https://doi.org/10.1007/978-3-642-54631-0_1">https://doi.org/10.1007/978-3-642-54631-0_1</a>.
  ieee: 'E. Kiltz, D. Masny, and K. Z. Pietrzak, “Simple chosen-ciphertext security
    from low noise LPN,” presented at the IACR: International Conference on Practice
    and Theory in Public-Key Cryptography, 2014, vol. 8383, pp. 1–18.'
  ista: 'Kiltz E, Masny D, Pietrzak KZ. 2014. Simple chosen-ciphertext security from
    low noise LPN. IACR: International Conference on Practice and Theory in Public-Key
    Cryptography, LNCS, vol. 8383, 1–18.'
  mla: Kiltz, Eike, et al. <i>Simple Chosen-Ciphertext Security from Low Noise LPN</i>.
    Vol. 8383, Springer, 2014, pp. 1–18, doi:<a href="https://doi.org/10.1007/978-3-642-54631-0_1">10.1007/978-3-642-54631-0_1</a>.
  short: E. Kiltz, D. Masny, K.Z. Pietrzak, in:, Springer, 2014, pp. 1–18.
conference:
  name: 'IACR: International Conference on Practice and Theory in Public-Key Cryptography'
date_created: 2018-12-11T11:56:24Z
date_published: 2014-03-01T00:00:00Z
date_updated: 2021-01-12T06:56:05Z
day: '01'
department:
- _id: KrPi
doi: 10.1007/978-3-642-54631-0_1
intvolume: '      8383'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2015/401
month: '03'
oa: 1
oa_version: Submitted Version
page: 1 - 18
publication_identifier:
  isbn:
  - 978-364254630-3
publication_status: published
publisher: Springer
publist_id: '4748'
quality_controlled: '1'
scopus_import: 1
status: public
title: Simple chosen-ciphertext security from low noise LPN
type: conference
user_id: 4435EBFC-F248-11E8-B48F-1D18A9856A87
volume: 8383
year: '2014'
...
---
_id: '2220'
abstract:
- lang: eng
  text: In this issue of Chemistry & Biology, Cokol and colleagues report a systematic
    study of drug interactions between antifungal compounds. Suppressive drug interactions
    occur more frequently than previously realized and come in different flavors with
    interesting implications.
author:
- first_name: Marjon
  full_name: De Vos, Marjon
  id: 3111FFAC-F248-11E8-B48F-1D18A9856A87
  last_name: De Vos
- first_name: Mark Tobias
  full_name: Bollenbach, Mark Tobias
  id: 3E6DB97A-F248-11E8-B48F-1D18A9856A87
  last_name: Bollenbach
  orcid: 0000-0003-4398-476X
citation:
  ama: de Vos M, Bollenbach MT. Suppressive drug interactions between antifungals.
    <i>Chemistry and Biology</i>. 2014;21(4):439-440. doi:<a href="https://doi.org/10.1016/j.chembiol.2014.04.004">10.1016/j.chembiol.2014.04.004</a>
  apa: de Vos, M., &#38; Bollenbach, M. T. (2014). Suppressive drug interactions between
    antifungals. <i>Chemistry and Biology</i>. Cell Press. <a href="https://doi.org/10.1016/j.chembiol.2014.04.004">https://doi.org/10.1016/j.chembiol.2014.04.004</a>
  chicago: Vos, Marjon de, and Mark Tobias Bollenbach. “Suppressive Drug Interactions
    between Antifungals.” <i>Chemistry and Biology</i>. Cell Press, 2014. <a href="https://doi.org/10.1016/j.chembiol.2014.04.004">https://doi.org/10.1016/j.chembiol.2014.04.004</a>.
  ieee: M. de Vos and M. T. Bollenbach, “Suppressive drug interactions between antifungals,”
    <i>Chemistry and Biology</i>, vol. 21, no. 4. Cell Press, pp. 439–440, 2014.
  ista: de Vos M, Bollenbach MT. 2014. Suppressive drug interactions between antifungals.
    Chemistry and Biology. 21(4), 439–440.
  mla: de Vos, Marjon, and Mark Tobias Bollenbach. “Suppressive Drug Interactions
    between Antifungals.” <i>Chemistry and Biology</i>, vol. 21, no. 4, Cell Press,
    2014, pp. 439–40, doi:<a href="https://doi.org/10.1016/j.chembiol.2014.04.004">10.1016/j.chembiol.2014.04.004</a>.
  short: M. de Vos, M.T. Bollenbach, Chemistry and Biology 21 (2014) 439–440.
date_created: 2018-12-11T11:56:24Z
date_published: 2014-04-24T00:00:00Z
date_updated: 2021-01-12T06:56:06Z
day: '24'
department:
- _id: ToBo
doi: 10.1016/j.chembiol.2014.04.004
external_id:
  pmid:
  - '24766845'
intvolume: '        21'
issue: '4'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.ncbi.nlm.nih.gov/pubmed/24766845
month: '04'
oa: 1
oa_version: Published Version
page: 439 - 440
pmid: 1
publication: Chemistry and Biology
publication_identifier:
  issn:
  - '10745521'
publication_status: published
publisher: Cell Press
publist_id: '4747'
quality_controlled: '1'
scopus_import: 1
status: public
title: Suppressive drug interactions between antifungals
type: journal_article
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 21
year: '2014'
...
