---
_id: '10897'
abstract:
- lang: eng
  text: Taking images is an efficient way to collect data about the physical world.
    It can be done fast and in exquisite detail. By definition, image processing is
    the field that concerns itself with the computation aimed at harnessing the information
    contained in images [10]. This talk is concerned with topological information.
    Our main thesis is that persistent homology [5] is a useful method to quantify
    and summarize topological information, building a bridge that connects algebraic
    topology with applications. We provide supporting evidence for this thesis by
    touching upon four technical developments in the overlap between persistent homology
    and image processing.
acknowledgement: This research is partially supported by the European Science Foundation
  (ESF) under the Research Network Programme, the European Union under the Toposys
  Project FP7-ICT-318493-STREP, the Russian Government under the Mega Project 11.G34.31.0053.
article_processing_charge: No
author:
- first_name: Herbert
  full_name: Edelsbrunner, Herbert
  id: 3FB178DA-F248-11E8-B48F-1D18A9856A87
  last_name: Edelsbrunner
  orcid: 0000-0002-9823-6833
citation:
  ama: 'Edelsbrunner H. Persistent homology in image processing. In: <i>Graph-Based
    Representations in Pattern Recognition</i>. Vol 7877. LNCS. Berlin, Heidelberg:
    Springer Nature; 2013:182-183. doi:<a href="https://doi.org/10.1007/978-3-642-38221-5_19">10.1007/978-3-642-38221-5_19</a>'
  apa: 'Edelsbrunner, H. (2013). Persistent homology in image processing. In <i>Graph-Based
    Representations in Pattern Recognition</i> (Vol. 7877, pp. 182–183). Berlin, Heidelberg:
    Springer Nature. <a href="https://doi.org/10.1007/978-3-642-38221-5_19">https://doi.org/10.1007/978-3-642-38221-5_19</a>'
  chicago: 'Edelsbrunner, Herbert. “Persistent Homology in Image Processing.” In <i>Graph-Based
    Representations in Pattern Recognition</i>, 7877:182–83. LNCS. Berlin, Heidelberg:
    Springer Nature, 2013. <a href="https://doi.org/10.1007/978-3-642-38221-5_19">https://doi.org/10.1007/978-3-642-38221-5_19</a>.'
  ieee: H. Edelsbrunner, “Persistent homology in image processing,” in <i>Graph-Based
    Representations in Pattern Recognition</i>, Vienna, Austria, 2013, vol. 7877,
    pp. 182–183.
  ista: 'Edelsbrunner H. 2013. Persistent homology in image processing. Graph-Based
    Representations in Pattern Recognition. GbRPR: Graph-based Representations in
    Pattern RecognitionLNCS vol. 7877, 182–183.'
  mla: Edelsbrunner, Herbert. “Persistent Homology in Image Processing.” <i>Graph-Based
    Representations in Pattern Recognition</i>, vol. 7877, Springer Nature, 2013,
    pp. 182–83, doi:<a href="https://doi.org/10.1007/978-3-642-38221-5_19">10.1007/978-3-642-38221-5_19</a>.
  short: H. Edelsbrunner, in:, Graph-Based Representations in Pattern Recognition,
    Springer Nature, Berlin, Heidelberg, 2013, pp. 182–183.
conference:
  end_date: 2013-05-17
  location: Vienna, Austria
  name: 'GbRPR: Graph-based Representations in Pattern Recognition'
  start_date: 2013-05-15
date_created: 2022-03-21T07:30:33Z
date_published: 2013-06-01T00:00:00Z
date_updated: 2023-09-05T15:10:20Z
day: '01'
department:
- _id: HeEd
doi: 10.1007/978-3-642-38221-5_19
ec_funded: 1
intvolume: '      7877'
language:
- iso: eng
month: '06'
oa_version: None
page: 182-183
place: Berlin, Heidelberg
project:
- _id: 255D761E-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '318493'
  name: Topological Complex Systems
publication: Graph-Based Representations in Pattern Recognition
publication_identifier:
  eisbn:
  - '9783642382215'
  eissn:
  - 1611-3349
  isbn:
  - '9783642382208'
  issn:
  - 0302-9743
publication_status: published
publisher: Springer Nature
quality_controlled: '1'
scopus_import: '1'
series_title: LNCS
status: public
title: Persistent homology in image processing
type: conference
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: 7877
year: '2013'
...
---
_id: '10898'
abstract:
- lang: eng
  text: A prominent remedy to multicore scalability issues in concurrent data structure
    implementations is to relax the sequential specification of the data structure.
    We present distributed queues (DQ), a new family of relaxed concurrent queue implementations.
    DQs implement relaxed queues with linearizable emptiness check and either configurable
    or bounded out-of-order behavior or pool behavior. Our experiments show that DQs
    outperform and outscale in micro- and macrobenchmarks all strict and relaxed queue
    as well as pool implementations that we considered.
article_number: '17'
article_processing_charge: No
author:
- first_name: Andreas
  full_name: Haas, Andreas
  last_name: Haas
- first_name: Michael
  full_name: Lippautz, Michael
  last_name: Lippautz
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000-0002-2985-7724
- first_name: Hannes
  full_name: Payer, Hannes
  last_name: Payer
- first_name: Ana
  full_name: Sokolova, Ana
  last_name: Sokolova
- first_name: Christoph M.
  full_name: Kirsch, Christoph M.
  last_name: Kirsch
- first_name: Ali
  full_name: Sezgin, Ali
  id: 4C7638DA-F248-11E8-B48F-1D18A9856A87
  last_name: Sezgin
citation:
  ama: 'Haas A, Lippautz M, Henzinger TA, et al. Distributed queues in shared memory:
    Multicore performance and scalability through quantitative relaxation. In: <i>Proceedings
    of the ACM International Conference on Computing Frontiers - CF ’13</i>. ACM Press;
    2013. doi:<a href="https://doi.org/10.1145/2482767.2482789">10.1145/2482767.2482789</a>'
  apa: 'Haas, A., Lippautz, M., Henzinger, T. A., Payer, H., Sokolova, A., Kirsch,
    C. M., &#38; Sezgin, A. (2013). Distributed queues in shared memory: Multicore
    performance and scalability through quantitative relaxation. In <i>Proceedings
    of the ACM International Conference on Computing Frontiers - CF ’13</i>. Ischia,
    Italy: ACM Press. <a href="https://doi.org/10.1145/2482767.2482789">https://doi.org/10.1145/2482767.2482789</a>'
  chicago: 'Haas, Andreas, Michael Lippautz, Thomas A Henzinger, Hannes Payer, Ana
    Sokolova, Christoph M. Kirsch, and Ali Sezgin. “Distributed Queues in Shared Memory:
    Multicore Performance and Scalability through Quantitative Relaxation.” In <i>Proceedings
    of the ACM International Conference on Computing Frontiers - CF ’13</i>. ACM Press,
    2013. <a href="https://doi.org/10.1145/2482767.2482789">https://doi.org/10.1145/2482767.2482789</a>.'
  ieee: 'A. Haas <i>et al.</i>, “Distributed queues in shared memory: Multicore performance
    and scalability through quantitative relaxation,” in <i>Proceedings of the ACM
    International Conference on Computing Frontiers - CF ’13</i>, Ischia, Italy, 2013,
    no. 5.'
  ista: 'Haas A, Lippautz M, Henzinger TA, Payer H, Sokolova A, Kirsch CM, Sezgin
    A. 2013. Distributed queues in shared memory: Multicore performance and scalability
    through quantitative relaxation. Proceedings of the ACM International Conference
    on Computing Frontiers - CF ’13. CF: Conference on Computing Frontiers, 17.'
  mla: 'Haas, Andreas, et al. “Distributed Queues in Shared Memory: Multicore Performance
    and Scalability through Quantitative Relaxation.” <i>Proceedings of the ACM International
    Conference on Computing Frontiers - CF ’13</i>, no. 5, 17, ACM Press, 2013, doi:<a
    href="https://doi.org/10.1145/2482767.2482789">10.1145/2482767.2482789</a>.'
  short: A. Haas, M. Lippautz, T.A. Henzinger, H. Payer, A. Sokolova, C.M. Kirsch,
    A. Sezgin, in:, Proceedings of the ACM International Conference on Computing Frontiers
    - CF ’13, ACM Press, 2013.
conference:
  end_date: 2013-05-16
  location: Ischia, Italy
  name: 'CF: Conference on Computing Frontiers'
  start_date: 2013-05-14
date_created: 2022-03-21T07:33:22Z
date_published: 2013-05-01T00:00:00Z
date_updated: 2022-06-21T08:01:19Z
day: '01'
department:
- _id: ToHe
doi: 10.1145/2482767.2482789
issue: '5'
language:
- iso: eng
month: '05'
oa_version: None
publication: Proceedings of the ACM International Conference on Computing Frontiers
  - CF '13
publication_identifier:
  isbn:
  - 978-145032053-5
publication_status: published
publisher: ACM Press
quality_controlled: '1'
scopus_import: '1'
status: public
title: 'Distributed queues in shared memory: Multicore performance and scalability
  through quantitative relaxation'
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2013'
...
---
_id: '10899'
article_processing_charge: No
author:
- first_name: Nicholas H
  full_name: Barton, Nicholas H
  id: 4880FE40-F248-11E8-B48F-1D18A9856A87
  last_name: Barton
  orcid: 0000-0002-8548-5240
citation:
  ama: 'Barton NH. Differentiation. In: <i>Encyclopedia of Biodiversity</i>. 2nd ed.
    Elsevier; 2013:508-515. doi:<a href="https://doi.org/10.1016/b978-0-12-384719-5.00031-9">10.1016/b978-0-12-384719-5.00031-9</a>'
  apa: Barton, N. H. (2013). Differentiation. In <i>Encyclopedia of Biodiversity</i>
    (2nd ed., pp. 508–515). Elsevier. <a href="https://doi.org/10.1016/b978-0-12-384719-5.00031-9">https://doi.org/10.1016/b978-0-12-384719-5.00031-9</a>
  chicago: Barton, Nicholas H. “Differentiation.” In <i>Encyclopedia of Biodiversity</i>,
    2nd ed., 508–15. Elsevier, 2013. <a href="https://doi.org/10.1016/b978-0-12-384719-5.00031-9">https://doi.org/10.1016/b978-0-12-384719-5.00031-9</a>.
  ieee: N. H. Barton, “Differentiation,” in <i>Encyclopedia of Biodiversity</i>, 2nd
    ed., Elsevier, 2013, pp. 508–515.
  ista: 'Barton NH. 2013.Differentiation. In: Encyclopedia of Biodiversity. , 508–515.'
  mla: Barton, Nicholas H. “Differentiation.” <i>Encyclopedia of Biodiversity</i>,
    2nd ed., Elsevier, 2013, pp. 508–15, doi:<a href="https://doi.org/10.1016/b978-0-12-384719-5.00031-9">10.1016/b978-0-12-384719-5.00031-9</a>.
  short: N.H. Barton, in:, Encyclopedia of Biodiversity, 2nd ed., Elsevier, 2013,
    pp. 508–515.
date_created: 2022-03-21T07:46:22Z
date_published: 2013-01-01T00:00:00Z
date_updated: 2022-06-20T09:18:06Z
day: '01'
department:
- _id: NiBa
doi: 10.1016/b978-0-12-384719-5.00031-9
edition: '2'
keyword:
- Adaptive landscape
- Cline
- Coalescent process
- Gene flow
- Hybrid zone
- Local adaptation
- Natural selection
- Neutral theory
- Population structure
- Speciation
language:
- iso: eng
month: '01'
oa_version: None
page: 508-515
publication: Encyclopedia of Biodiversity
publication_identifier:
  isbn:
  - 978-0-12-384720-1
publication_status: published
publisher: Elsevier
quality_controlled: '1'
scopus_import: '1'
status: public
title: Differentiation
type: book_chapter
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2013'
...
---
_id: '10900'
abstract:
- lang: eng
  text: Leukocyte migration through the interstitial space is crucial for the maintenance
    of tolerance and immunity. The main cues for leukocyte trafficking are chemokines
    thought to directionally guide these cells towards their targets. However, model
    systems that facilitate quantification of chemokine-guided leukocyte migration
    in vivo are uncommon. Here we describe an ex vivo crawl-in assay using explanted
    mouse ears that allows the visualization of chemokine-dependent dendritic cell
    (DC) motility in the dermal interstitium in real time. We present methods for
    the preparation of mouse ear sheets and their use in multidimensional confocal
    imaging experiments to monitor and analyze the directional migration of fluorescently
    labelled DCs through the dermis and into afferent lymphatic vessels. The assay
    provides a more physiological approach to study leukocyte migration than in vitro
    three-dimensional (3D) or 2-dimensional (2D) migration assays such as collagen
    gels and transwell assays.
acknowledgement: We would like to thank Alexander Eichner and Ingrid de Vries for
  discussion and critical reading of the manuscript, and Mary Frank for assistance
  with the recording of videos and images in Fig. 1. M.S. is supported through funding
  from the German Research Foundation (DFG). M.W. acknowledges the Alexander von Humboldt
  Foundation for funding.
alternative_title:
- Methods in Molecular Biology
article_processing_charge: No
author:
- first_name: Michele
  full_name: Weber, Michele
  id: 3A3FC708-F248-11E8-B48F-1D18A9856A87
  last_name: Weber
- first_name: Michael K
  full_name: Sixt, Michael K
  id: 41E9FBEA-F248-11E8-B48F-1D18A9856A87
  last_name: Sixt
  orcid: 0000-0002-6620-9179
citation:
  ama: 'Weber M, Sixt MK. Live Cell Imaging of Chemotactic Dendritic Cell Migration
    in Explanted Mouse Ear Preparations. In: Cardona A, Ubogu E, eds. <i>Chemokines</i>.
    Vol 1013. MIMB. Totowa, NJ: Humana Press; 2013:215-226. doi:<a href="https://doi.org/10.1007/978-1-62703-426-5_14">10.1007/978-1-62703-426-5_14</a>'
  apa: 'Weber, M., &#38; Sixt, M. K. (2013). Live Cell Imaging of Chemotactic Dendritic
    Cell Migration in Explanted Mouse Ear Preparations. In A. Cardona &#38; E. Ubogu
    (Eds.), <i>Chemokines</i> (Vol. 1013, pp. 215–226). Totowa, NJ: Humana Press.
    <a href="https://doi.org/10.1007/978-1-62703-426-5_14">https://doi.org/10.1007/978-1-62703-426-5_14</a>'
  chicago: 'Weber, Michele, and Michael K Sixt. “Live Cell Imaging of Chemotactic
    Dendritic Cell Migration in Explanted Mouse Ear Preparations.” In <i>Chemokines</i>,
    edited by Astrid Cardona and Eroboghene Ubogu, 1013:215–26. MIMB. Totowa, NJ:
    Humana Press, 2013. <a href="https://doi.org/10.1007/978-1-62703-426-5_14">https://doi.org/10.1007/978-1-62703-426-5_14</a>.'
  ieee: 'M. Weber and M. K. Sixt, “Live Cell Imaging of Chemotactic Dendritic Cell
    Migration in Explanted Mouse Ear Preparations,” in <i>Chemokines</i>, vol. 1013,
    A. Cardona and E. Ubogu, Eds. Totowa, NJ: Humana Press, 2013, pp. 215–226.'
  ista: 'Weber M, Sixt MK. 2013.Live Cell Imaging of Chemotactic Dendritic Cell Migration
    in Explanted Mouse Ear Preparations. In: Chemokines. Methods in Molecular Biology,
    vol. 1013, 215–226.'
  mla: Weber, Michele, and Michael K. Sixt. “Live Cell Imaging of Chemotactic Dendritic
    Cell Migration in Explanted Mouse Ear Preparations.” <i>Chemokines</i>, edited
    by Astrid Cardona and Eroboghene Ubogu, vol. 1013, Humana Press, 2013, pp. 215–26,
    doi:<a href="https://doi.org/10.1007/978-1-62703-426-5_14">10.1007/978-1-62703-426-5_14</a>.
  short: M. Weber, M.K. Sixt, in:, A. Cardona, E. Ubogu (Eds.), Chemokines, Humana
    Press, Totowa, NJ, 2013, pp. 215–226.
date_created: 2022-03-21T07:47:41Z
date_published: 2013-04-03T00:00:00Z
date_updated: 2023-09-05T13:15:33Z
day: '03'
department:
- _id: MiSi
doi: 10.1007/978-1-62703-426-5_14
editor:
- first_name: Astrid
  full_name: Cardona, Astrid
  last_name: Cardona
- first_name: Eroboghene
  full_name: Ubogu, Eroboghene
  last_name: Ubogu
external_id:
  pmid:
  - '23625502'
intvolume: '      1013'
language:
- iso: eng
month: '04'
oa_version: None
page: 215-226
place: Totowa, NJ
pmid: 1
publication: Chemokines
publication_identifier:
  eisbn:
  - '9781627034265'
  eissn:
  - 1940-6029
  isbn:
  - '9781627034258'
  issn:
  - 1064-3745
publication_status: published
publisher: Humana Press
quality_controlled: '1'
scopus_import: '1'
series_title: MIMB
status: public
title: Live Cell Imaging of Chemotactic Dendritic Cell Migration in Explanted Mouse
  Ear Preparations
type: book_chapter
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: 1013
year: '2013'
...
---
_id: '10902'
abstract:
- lang: eng
  text: We consider how to edit strings from a source language so that the edited
    strings belong to a target language, where the languages are given as deterministic
    finite automata. Non-streaming (or offline) transducers perform edits given the
    whole source string. We show that the class of deterministic one-pass transducers
    with registers along with increment and min operation suffices for computing optimal
    edit distance, whereas the same class of transducers without the min operation
    is not sufficient. Streaming (or online) transducers perform edits as the letters
    of the source string are received. We present a polynomial time algorithm for
    the partial-repair problem that given a bound α asks for the construction of a
    deterministic streaming transducer (if one exists) that ensures that the ‘maximum
    fraction’ η of the strings of the source language are edited, within cost α, to
    the target language.
acknowledgement: 'The research was supported by Austrian Science Fund (FWF) Grant
  No P 23499-N23, FWF NFN Grant No S11407-N23 (RiSE), ERC Start grant (279307: Graph
  Games), and Microsoft faculty fellows award. Thanks to Gabriele Puppis for suggesting
  the problem of identifying a deterministic transducer to compute the optimal cost,
  and to Martin Chmelik for his comments on the introduction.'
alternative_title:
- LNCS
article_processing_charge: No
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Siddhesh
  full_name: Chaubal, Siddhesh
  last_name: Chaubal
- first_name: Sasha
  full_name: Rubin, Sasha
  id: 2EC51194-F248-11E8-B48F-1D18A9856A87
  last_name: Rubin
citation:
  ama: 'Chatterjee K, Chaubal S, Rubin S. How to travel between languages. In: <i>7th
    International Conference on Language and Automata Theory and Applications</i>.
    Vol 7810. LNCS. Berlin, Heidelberg: Springer Nature; 2013:214-225. doi:<a href="https://doi.org/10.1007/978-3-642-37064-9_20">10.1007/978-3-642-37064-9_20</a>'
  apa: 'Chatterjee, K., Chaubal, S., &#38; Rubin, S. (2013). How to travel between
    languages. In <i>7th International Conference on Language and Automata Theory
    and Applications</i> (Vol. 7810, pp. 214–225). Berlin, Heidelberg: Springer Nature.
    <a href="https://doi.org/10.1007/978-3-642-37064-9_20">https://doi.org/10.1007/978-3-642-37064-9_20</a>'
  chicago: 'Chatterjee, Krishnendu, Siddhesh Chaubal, and Sasha Rubin. “How to Travel
    between Languages.” In <i>7th International Conference on Language and Automata
    Theory and Applications</i>, 7810:214–25. LNCS. Berlin, Heidelberg: Springer Nature,
    2013. <a href="https://doi.org/10.1007/978-3-642-37064-9_20">https://doi.org/10.1007/978-3-642-37064-9_20</a>.'
  ieee: K. Chatterjee, S. Chaubal, and S. Rubin, “How to travel between languages,”
    in <i>7th International Conference on Language and Automata Theory and Applications</i>,
    Bilbao, Spain, 2013, vol. 7810, pp. 214–225.
  ista: 'Chatterjee K, Chaubal S, Rubin S. 2013. How to travel between languages.
    7th International Conference on Language and Automata Theory and Applications.
    LATA: Conference on Language and Automata Theory and ApplicationsLNCS, LNCS, vol.
    7810, 214–225.'
  mla: Chatterjee, Krishnendu, et al. “How to Travel between Languages.” <i>7th International
    Conference on Language and Automata Theory and Applications</i>, vol. 7810, Springer
    Nature, 2013, pp. 214–25, doi:<a href="https://doi.org/10.1007/978-3-642-37064-9_20">10.1007/978-3-642-37064-9_20</a>.
  short: K. Chatterjee, S. Chaubal, S. Rubin, in:, 7th International Conference on
    Language and Automata Theory and Applications, Springer Nature, Berlin, Heidelberg,
    2013, pp. 214–225.
conference:
  end_date: 2013-04-05
  location: Bilbao, Spain
  name: 'LATA: Conference on Language and Automata Theory and Applications'
  start_date: 2013-04-02
date_created: 2022-03-21T07:56:21Z
date_published: 2013-04-15T00:00:00Z
date_updated: 2023-09-05T15:10:38Z
day: '15'
department:
- _id: KrCh
doi: 10.1007/978-3-642-37064-9_20
ec_funded: 1
intvolume: '      7810'
language:
- iso: eng
month: '04'
oa_version: None
page: 214-225
place: Berlin, Heidelberg
project:
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 25863FF4-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11407
  name: Game Theory
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication: 7th International Conference on Language and Automata Theory and Applications
publication_identifier:
  eisbn:
  - '9783642370649'
  eissn:
  - 1611-3349
  isbn:
  - '9783642370632'
  issn:
  - 0302-9743
publication_status: published
publisher: Springer Nature
quality_controlled: '1'
scopus_import: '1'
series_title: LNCS
status: public
title: How to travel between languages
type: conference
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: 7810
year: '2013'
...
---
_id: '827'
abstract:
- lang: eng
  text: As sessile organisms, plants have to be able to adapt to a continuously changing
    environment. Plants that perceive some of these changes as stress signals activate
    signaling pathways to modulate their development and to enable them to survive.
    The complex responses to environmental cues are to a large extent mediated by
    plant hormones that together orchestrate the final plant response. The phytohormone
    cytokinin is involved in many plant developmental processes. Recently, it has
    been established that cytokinin plays an important role in stress responses, but
    does not act alone. Indeed, the hormonal control of plant development and stress
    adaptation is the outcome of a complex network of multiple synergistic and antagonistic
    interactions between various hormones. Here, we review the recent findings on
    the cytokinin function as part of this hormonal network. We focus on the importance
    of the crosstalk between cytokinin and other hormones, such as abscisic acid,
    jasmonate, salicylic acid, ethylene, and auxin in the modulation of plant development
    and stress adaptation. Finally, the impact of the current research in the biotechnological
    industry will be discussed.
article_number: '451'
author:
- first_name: José
  full_name: O'Brien, José
  last_name: O'Brien
- first_name: Eva
  full_name: Benková, Eva
  id: 38F4F166-F248-11E8-B48F-1D18A9856A87
  last_name: Benková
  orcid: 0000-0002-8510-9739
citation:
  ama: O’Brien J, Benková E. Cytokinin cross talking during biotic and abiotic stress
    responses. <i>Frontiers in Plant Science</i>. 2013;4. doi:<a href="https://doi.org/10.3389/fpls.2013.00451">10.3389/fpls.2013.00451</a>
  apa: O’Brien, J., &#38; Benková, E. (2013). Cytokinin cross talking during biotic
    and abiotic stress responses. <i>Frontiers in Plant Science</i>. Frontiers Research
    Foundation. <a href="https://doi.org/10.3389/fpls.2013.00451">https://doi.org/10.3389/fpls.2013.00451</a>
  chicago: O’Brien, José, and Eva Benková. “Cytokinin Cross Talking during Biotic
    and Abiotic Stress Responses.” <i>Frontiers in Plant Science</i>. Frontiers Research
    Foundation, 2013. <a href="https://doi.org/10.3389/fpls.2013.00451">https://doi.org/10.3389/fpls.2013.00451</a>.
  ieee: J. O’Brien and E. Benková, “Cytokinin cross talking during biotic and abiotic
    stress responses,” <i>Frontiers in Plant Science</i>, vol. 4. Frontiers Research
    Foundation, 2013.
  ista: O’Brien J, Benková E. 2013. Cytokinin cross talking during biotic and abiotic
    stress responses. Frontiers in Plant Science. 4, 451.
  mla: O’Brien, José, and Eva Benková. “Cytokinin Cross Talking during Biotic and
    Abiotic Stress Responses.” <i>Frontiers in Plant Science</i>, vol. 4, 451, Frontiers
    Research Foundation, 2013, doi:<a href="https://doi.org/10.3389/fpls.2013.00451">10.3389/fpls.2013.00451</a>.
  short: J. O’Brien, E. Benková, Frontiers in Plant Science 4 (2013).
date_created: 2018-12-11T11:48:43Z
date_published: 2013-11-19T00:00:00Z
date_updated: 2021-01-12T08:17:50Z
day: '19'
ddc:
- '580'
department:
- _id: EvBe
doi: 10.3389/fpls.2013.00451
ec_funded: 1
file:
- access_level: open_access
  checksum: fdc25ddd1bf9a99b99f662cdbafeddd4
  content_type: application/pdf
  creator: dernst
  date_created: 2019-01-31T10:40:38Z
  date_updated: 2020-07-14T12:48:11Z
  file_id: '5903'
  file_name: 2013_FrontiersPlant_OBrien.pdf
  file_size: 953299
  relation: main_file
file_date_updated: 2020-07-14T12:48:11Z
has_accepted_license: '1'
intvolume: '         4'
language:
- iso: eng
month: '11'
oa: 1
oa_version: Published Version
project:
- _id: 253FCA6A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '207362'
  name: Hormonal cross-talk in plant organogenesis
publication: Frontiers in Plant Science
publication_status: published
publisher: Frontiers Research Foundation
publist_id: '6821'
quality_controlled: '1'
scopus_import: 1
status: public
title: Cytokinin cross talking during biotic and abiotic stress responses
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 4
year: '2013'
...
---
_id: '828'
abstract:
- lang: eng
  text: The plant root system is essential for providing anchorage to the soil, supplying
    minerals and water, and synthesizing metabolites. It is a dynamic organ modulated
    by external cues such as environmental signals, water and nutrients availability,
    salinity and others. Lateral roots (LRs) are initiated from the primary root post-embryonically,
    after which they progress through discrete developmental stages which can be independently
    controlled, providing a high level of plasticity during root system formation.
    Within this review, main contributions are presented, from the classical forward
    genetic screens to the more recent high-throughput approaches, combined with computer
    model predictions, dissecting how LRs and thereby root system architecture is
    established and developed.
article_number: '537'
author:
- first_name: Candela
  full_name: Cuesta, Candela
  id: 33A3C818-F248-11E8-B48F-1D18A9856A87
  last_name: Cuesta
  orcid: 0000-0003-1923-2410
- first_name: Krzysztof T
  full_name: Wabnik, Krzysztof T
  id: 4DE369A4-F248-11E8-B48F-1D18A9856A87
  last_name: Wabnik
  orcid: 0000-0001-7263-0560
- first_name: Eva
  full_name: Benková, Eva
  id: 38F4F166-F248-11E8-B48F-1D18A9856A87
  last_name: Benková
  orcid: 0000-0002-8510-9739
citation:
  ama: Cuesta C, Wabnik KT, Benková E. Systems approaches to study root architecture
    dynamics. <i>Frontiers in Plant Science</i>. 2013;4. doi:<a href="https://doi.org/10.3389/fpls.2013.00537">10.3389/fpls.2013.00537</a>
  apa: Cuesta, C., Wabnik, K. T., &#38; Benková, E. (2013). Systems approaches to
    study root architecture dynamics. <i>Frontiers in Plant Science</i>. Frontiers
    Research Foundation. <a href="https://doi.org/10.3389/fpls.2013.00537">https://doi.org/10.3389/fpls.2013.00537</a>
  chicago: Cuesta, Candela, Krzysztof T Wabnik, and Eva Benková. “Systems Approaches
    to Study Root Architecture Dynamics.” <i>Frontiers in Plant Science</i>. Frontiers
    Research Foundation, 2013. <a href="https://doi.org/10.3389/fpls.2013.00537">https://doi.org/10.3389/fpls.2013.00537</a>.
  ieee: C. Cuesta, K. T. Wabnik, and E. Benková, “Systems approaches to study root
    architecture dynamics,” <i>Frontiers in Plant Science</i>, vol. 4. Frontiers Research
    Foundation, 2013.
  ista: Cuesta C, Wabnik KT, Benková E. 2013. Systems approaches to study root architecture
    dynamics. Frontiers in Plant Science. 4, 537.
  mla: Cuesta, Candela, et al. “Systems Approaches to Study Root Architecture Dynamics.”
    <i>Frontiers in Plant Science</i>, vol. 4, 537, Frontiers Research Foundation,
    2013, doi:<a href="https://doi.org/10.3389/fpls.2013.00537">10.3389/fpls.2013.00537</a>.
  short: C. Cuesta, K.T. Wabnik, E. Benková, Frontiers in Plant Science 4 (2013).
date_created: 2018-12-11T11:48:43Z
date_published: 2013-12-26T00:00:00Z
date_updated: 2021-01-12T08:17:52Z
day: '26'
ddc:
- '580'
department:
- _id: EvBe
doi: 10.3389/fpls.2013.00537
ec_funded: 1
file:
- access_level: open_access
  checksum: 0185b3c4d7df9a94bd3ce5a66d213506
  content_type: application/pdf
  creator: dernst
  date_created: 2019-01-31T10:36:43Z
  date_updated: 2020-07-14T12:48:11Z
  file_id: '5902'
  file_name: 2013_FrontiersPlant_Cuesta.pdf
  file_size: 710835
  relation: main_file
file_date_updated: 2020-07-14T12:48:11Z
has_accepted_license: '1'
intvolume: '         4'
language:
- iso: eng
month: '12'
oa: 1
oa_version: Published Version
project:
- _id: 253FCA6A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '207362'
  name: Hormonal cross-talk in plant organogenesis
publication: Frontiers in Plant Science
publication_status: published
publisher: Frontiers Research Foundation
publist_id: '6820'
quality_controlled: '1'
scopus_import: 1
status: public
title: Systems approaches to study root architecture dynamics
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 4
year: '2013'
...
---
_id: '2000'
abstract:
- lang: eng
  text: In this work we present a flexible tool for tumor progression, which simulates
    the evolutionary dynamics of cancer. Tumor progression implements a multi-type
    branching process where the key parameters are the fitness landscape, the mutation
    rate, and the average time of cell division. The fitness of a cancer cell depends
    on the mutations it has accumulated. The input to our tool could be any fitness
    landscape, mutation rate, and cell division time, and the tool produces the growth
    dynamics and all relevant statistics.
alternative_title:
- LNCS
arxiv: 1
author:
- first_name: Johannes
  full_name: Reiter, Johannes
  id: 4A918E98-F248-11E8-B48F-1D18A9856A87
  last_name: Reiter
  orcid: 0000-0002-0170-7353
- first_name: Ivana
  full_name: Božić, Ivana
  last_name: Božić
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Martin
  full_name: Nowak, Martin
  last_name: Nowak
citation:
  ama: 'Reiter J, Božić I, Chatterjee K, Nowak M. TTP: Tool for tumor progression.
    In: <i>Proceedings of 25th Int. Conf. on Computer Aided Verification</i>. Vol
    8044. Lecture Notes in Computer Science. Springer; 2013:101-106. doi:<a href="https://doi.org/10.1007/978-3-642-39799-8_6">10.1007/978-3-642-39799-8_6</a>'
  apa: 'Reiter, J., Božić, I., Chatterjee, K., &#38; Nowak, M. (2013). TTP: Tool for
    tumor progression. In <i>Proceedings of 25th Int. Conf. on Computer Aided Verification</i>
    (Vol. 8044, pp. 101–106). St. Petersburg, Russia: Springer. <a href="https://doi.org/10.1007/978-3-642-39799-8_6">https://doi.org/10.1007/978-3-642-39799-8_6</a>'
  chicago: 'Reiter, Johannes, Ivana Božić, Krishnendu Chatterjee, and Martin Nowak.
    “TTP: Tool for Tumor Progression.” In <i>Proceedings of 25th Int. Conf. on Computer
    Aided Verification</i>, 8044:101–6. Lecture Notes in Computer Science. Springer,
    2013. <a href="https://doi.org/10.1007/978-3-642-39799-8_6">https://doi.org/10.1007/978-3-642-39799-8_6</a>.'
  ieee: 'J. Reiter, I. Božić, K. Chatterjee, and M. Nowak, “TTP: Tool for tumor progression,”
    in <i>Proceedings of 25th Int. Conf. on Computer Aided Verification</i>, St. Petersburg,
    Russia, 2013, vol. 8044, pp. 101–106.'
  ista: 'Reiter J, Božić I, Chatterjee K, Nowak M. 2013. TTP: Tool for tumor progression.
    Proceedings of 25th Int. Conf. on Computer Aided Verification. CAV: Computer Aided
    VerificationLecture Notes in Computer Science, LNCS, vol. 8044, 101–106.'
  mla: 'Reiter, Johannes, et al. “TTP: Tool for Tumor Progression.” <i>Proceedings
    of 25th Int. Conf. on Computer Aided Verification</i>, vol. 8044, Springer, 2013,
    pp. 101–06, doi:<a href="https://doi.org/10.1007/978-3-642-39799-8_6">10.1007/978-3-642-39799-8_6</a>.'
  short: J. Reiter, I. Božić, K. Chatterjee, M. Nowak, in:, Proceedings of 25th Int.
    Conf. on Computer Aided Verification, Springer, 2013, pp. 101–106.
conference:
  end_date: 2013-07-19
  location: St. Petersburg, Russia
  name: 'CAV: Computer Aided Verification'
  start_date: 2013-07-13
date_created: 2018-12-11T11:55:08Z
date_published: 2013-01-01T00:00:00Z
date_updated: 2023-09-07T11:40:43Z
day: '01'
department:
- _id: KrCh
doi: 10.1007/978-3-642-39799-8_6
ec_funded: 1
external_id:
  arxiv:
  - '1303.5251'
intvolume: '      8044'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1303.5251
month: '01'
oa: 1
oa_version: Preprint
page: 101 - 106
project:
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication: Proceedings of 25th Int. Conf. on Computer Aided Verification
publication_status: published
publisher: Springer
publist_id: '5077'
quality_controlled: '1'
related_material:
  record:
  - id: '5399'
    relation: earlier_version
    status: public
  - id: '1400'
    relation: dissertation_contains
    status: public
scopus_import: 1
series_title: Lecture Notes in Computer Science
status: public
title: 'TTP: Tool for tumor progression'
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 8044
year: '2013'
...
---
_id: '2009'
abstract:
- lang: eng
  text: Traditional statistical methods for confidentiality protection of statistical
    databases do not scale well to deal with GWAS databases especially in terms of
    guarantees regarding protection from linkage to external information. The more
    recent concept of differential privacy, introduced by the cryptographic community,
    is an approach which provides a rigorous definition of privacy with meaningful
    privacy guarantees in the presence of arbitrary external information, although
    the guarantees may come at a serious price in terms of data utility. Building
    on such notions, we propose new methods to release aggregate GWAS data without
    compromising an individual’s privacy. We present methods for releasing differentially
    private minor allele frequencies, chi-square statistics and p-values. We compare
    these approaches on simulated data and on a GWAS study of canine hair length involving
    685 dogs. We also propose a privacy-preserving method for finding genome-wide
    associations based on a differentially-private approach to penalized logistic
    regression.
article_processing_charge: No
author:
- first_name: Caroline
  full_name: Uhler, Caroline
  id: 49ADD78E-F248-11E8-B48F-1D18A9856A87
  last_name: Uhler
  orcid: 0000-0002-7008-0216
- first_name: Aleksandra
  full_name: Slavkovic, Aleksandra
  last_name: Slavkovic
- first_name: Stephen
  full_name: Fienberg, Stephen
  last_name: Fienberg
citation:
  ama: Uhler C, Slavkovic A, Fienberg S. Privacy-preserving data sharing for genome-wide
    association studies. <i>Journal of Privacy and Confidentiality </i>. 2013;5(1):137-166.
    doi:<a href="https://doi.org/10.29012/jpc.v5i1.629">10.29012/jpc.v5i1.629</a>
  apa: Uhler, C., Slavkovic, A., &#38; Fienberg, S. (2013). Privacy-preserving data
    sharing for genome-wide association studies. <i>Journal of Privacy and Confidentiality
    </i>. Carnegie Mellon University. <a href="https://doi.org/10.29012/jpc.v5i1.629">https://doi.org/10.29012/jpc.v5i1.629</a>
  chicago: Uhler, Caroline, Aleksandra Slavkovic, and Stephen Fienberg. “Privacy-Preserving
    Data Sharing for Genome-Wide Association Studies.” <i>Journal of Privacy and Confidentiality
    </i>. Carnegie Mellon University, 2013. <a href="https://doi.org/10.29012/jpc.v5i1.629">https://doi.org/10.29012/jpc.v5i1.629</a>.
  ieee: C. Uhler, A. Slavkovic, and S. Fienberg, “Privacy-preserving data sharing
    for genome-wide association studies,” <i>Journal of Privacy and Confidentiality
    </i>, vol. 5, no. 1. Carnegie Mellon University, pp. 137–166, 2013.
  ista: Uhler C, Slavkovic A, Fienberg S. 2013. Privacy-preserving data sharing for
    genome-wide association studies. Journal of Privacy and Confidentiality . 5(1),
    137–166.
  mla: Uhler, Caroline, et al. “Privacy-Preserving Data Sharing for Genome-Wide Association
    Studies.” <i>Journal of Privacy and Confidentiality </i>, vol. 5, no. 1, Carnegie
    Mellon University, 2013, pp. 137–66, doi:<a href="https://doi.org/10.29012/jpc.v5i1.629">10.29012/jpc.v5i1.629</a>.
  short: C. Uhler, A. Slavkovic, S. Fienberg, Journal of Privacy and Confidentiality  5
    (2013) 137–166.
date_created: 2018-12-11T11:55:11Z
date_published: 2013-08-01T00:00:00Z
date_updated: 2021-01-12T06:54:41Z
day: '01'
department:
- _id: CaUh
doi: 10.29012/jpc.v5i1.629
intvolume: '         5'
issue: '1'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://repository.cmu.edu/jpc/vol5/iss1/6
month: '08'
oa: 1
oa_version: Published Version
page: 137 - 166
publication: 'Journal of Privacy and Confidentiality '
publication_status: published
publisher: Carnegie Mellon University
publist_id: '5067'
quality_controlled: '1'
status: public
title: Privacy-preserving data sharing for genome-wide association studies
type: journal_article
user_id: 3E5EF7F0-F248-11E8-B48F-1D18A9856A87
volume: 5
year: '2013'
...
---
_id: '2010'
abstract:
- lang: eng
  text: Many algorithms for inferring causality rely heavily on the faithfulness assumption.
    The main justification for imposing this assumption is that the set of unfaithful
    distributions has Lebesgue measure zero, since it can be seen as a collection
    of hypersurfaces in a hypercube. However, due to sampling error the faithfulness
    condition alone is not sufficient for statistical estimation, and strong-faithfulness
    has been proposed and assumed to achieve uniform or high-dimensional consistency.
    In contrast to the plain faithfulness assumption, the set of distributions that
    is not strong-faithful has nonzero Lebesgue measure and in fact, can be surprisingly
    large as we show in this paper. We study the strong-faithfulness condition from
    a geometric and combinatorial point of view and give upper and lower bounds on
    the Lebesgue measure of strong-faithful distributions for various classes of directed
    acyclic graphs. Our results imply fundamental limitations for the PC-algorithm
    and potentially also for other algorithms based on partial correlation testing
    in the Gaussian case.
arxiv: 1
author:
- first_name: Caroline
  full_name: Uhler, Caroline
  id: 49ADD78E-F248-11E8-B48F-1D18A9856A87
  last_name: Uhler
  orcid: 0000-0002-7008-0216
- first_name: Garvesh
  full_name: Raskutti, Garvesh
  last_name: Raskutti
- first_name: Peter
  full_name: Bühlmann, Peter
  last_name: Bühlmann
- first_name: Bin
  full_name: Yu, Bin
  last_name: Yu
citation:
  ama: Uhler C, Raskutti G, Bühlmann P, Yu B. Geometry of the faithfulness assumption
    in causal inference. <i>The Annals of Statistics</i>. 2013;41(2):436-463. doi:<a
    href="https://doi.org/10.1214/12-AOS1080">10.1214/12-AOS1080</a>
  apa: Uhler, C., Raskutti, G., Bühlmann, P., &#38; Yu, B. (2013). Geometry of the
    faithfulness assumption in causal inference. <i>The Annals of Statistics</i>.
    Institute of Mathematical Statistics. <a href="https://doi.org/10.1214/12-AOS1080">https://doi.org/10.1214/12-AOS1080</a>
  chicago: Uhler, Caroline, Garvesh Raskutti, Peter Bühlmann, and Bin Yu. “Geometry
    of the Faithfulness Assumption in Causal Inference.” <i>The Annals of Statistics</i>.
    Institute of Mathematical Statistics, 2013. <a href="https://doi.org/10.1214/12-AOS1080">https://doi.org/10.1214/12-AOS1080</a>.
  ieee: C. Uhler, G. Raskutti, P. Bühlmann, and B. Yu, “Geometry of the faithfulness
    assumption in causal inference,” <i>The Annals of Statistics</i>, vol. 41, no.
    2. Institute of Mathematical Statistics, pp. 436–463, 2013.
  ista: Uhler C, Raskutti G, Bühlmann P, Yu B. 2013. Geometry of the faithfulness
    assumption in causal inference. The Annals of Statistics. 41(2), 436–463.
  mla: Uhler, Caroline, et al. “Geometry of the Faithfulness Assumption in Causal
    Inference.” <i>The Annals of Statistics</i>, vol. 41, no. 2, Institute of Mathematical
    Statistics, 2013, pp. 436–63, doi:<a href="https://doi.org/10.1214/12-AOS1080">10.1214/12-AOS1080</a>.
  short: C. Uhler, G. Raskutti, P. Bühlmann, B. Yu, The Annals of Statistics 41 (2013)
    436–463.
date_created: 2018-12-11T11:55:11Z
date_published: 2013-04-01T00:00:00Z
date_updated: 2021-01-12T06:54:42Z
day: '01'
department:
- _id: CaUh
doi: 10.1214/12-AOS1080
external_id:
  arxiv:
  - '1207.0547'
intvolume: '        41'
issue: '2'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: www.doi.org/10.1214/12-AOS1080
month: '04'
oa: 1
oa_version: Published Version
page: 436 - 463
publication: The Annals of Statistics
publication_status: published
publisher: Institute of Mathematical Statistics
publist_id: '5066'
quality_controlled: '1'
scopus_import: 1
status: public
title: Geometry of the faithfulness assumption in causal inference
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 41
year: '2013'
...
---
_id: '2181'
abstract:
- lang: eng
  text: 'There is a trade-off between performance and correctness in implementing
    concurrent data structures. Better performance may be achieved at the expense
    of relaxing correctness, by redefining the semantics of data structures. We address
    such a redefinition of data structure semantics and present a systematic and formal
    framework for obtaining new data structures by quantitatively relaxing existing
    ones. We view a data structure as a sequential specification S containing all
    &quot;legal&quot; sequences over an alphabet of method calls. Relaxing the data
    structure corresponds to defining a distance from any sequence over the alphabet
    to the sequential specification: the k-relaxed sequential specification contains
    all sequences over the alphabet within distance k from the original specification.
    In contrast to other existing work, our relaxations are semantic (distance in
    terms of data structure states). As an instantiation of our framework, we present
    two simple yet generic relaxation schemes, called out-of-order and stuttering
    relaxation, along with several ways of computing distances. We show that the out-of-order
    relaxation, when further instantiated to stacks, queues, and priority queues,
    amounts to tolerating bounded out-of-order behavior, which cannot be captured
    by a purely syntactic relaxation (distance in terms of sequence manipulation,
    e.g. edit distance). We give concurrent implementations of relaxed data structures
    and demonstrate that bounded relaxations provide the means for trading correctness
    for performance in a controlled way. The relaxations are monotonic which further
    highlights the trade-off: increasing k increases the number of permitted sequences,
    which as we demonstrate can lead to better performance. Finally, since a relaxed
    stack or queue also implements a pool, we actually have new concurrent pool implementations
    that outperform the state-of-the-art ones.'
acknowledgement: ' and an Elise Richter Fellowship (Austrian Science Fund V00125). '
author:
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Christoph
  full_name: Kirsch, Christoph
  last_name: Kirsch
- first_name: Hannes
  full_name: Payer, Hannes
  last_name: Payer
- first_name: Ali
  full_name: Sezgin, Ali
  id: 4C7638DA-F248-11E8-B48F-1D18A9856A87
  last_name: Sezgin
- first_name: Ana
  full_name: Sokolova, Ana
  last_name: Sokolova
citation:
  ama: 'Henzinger TA, Kirsch C, Payer H, Sezgin A, Sokolova A. Quantitative relaxation
    of concurrent data structures. In: <i>Proceedings of the 40th Annual ACM SIGPLAN-SIGACT
    Symposium on Principles of Programming Language</i>. ACM; 2013:317-328. doi:<a
    href="https://doi.org/10.1145/2429069.2429109">10.1145/2429069.2429109</a>'
  apa: 'Henzinger, T. A., Kirsch, C., Payer, H., Sezgin, A., &#38; Sokolova, A. (2013).
    Quantitative relaxation of concurrent data structures. In <i>Proceedings of the
    40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming language</i>
    (pp. 317–328). Rome, Italy: ACM. <a href="https://doi.org/10.1145/2429069.2429109">https://doi.org/10.1145/2429069.2429109</a>'
  chicago: Henzinger, Thomas A, Christoph Kirsch, Hannes Payer, Ali Sezgin, and Ana
    Sokolova. “Quantitative Relaxation of Concurrent Data Structures.” In <i>Proceedings
    of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Language</i>,
    317–28. ACM, 2013. <a href="https://doi.org/10.1145/2429069.2429109">https://doi.org/10.1145/2429069.2429109</a>.
  ieee: T. A. Henzinger, C. Kirsch, H. Payer, A. Sezgin, and A. Sokolova, “Quantitative
    relaxation of concurrent data structures,” in <i>Proceedings of the 40th annual
    ACM SIGPLAN-SIGACT symposium on Principles of programming language</i>, Rome,
    Italy, 2013, pp. 317–328.
  ista: 'Henzinger TA, Kirsch C, Payer H, Sezgin A, Sokolova A. 2013. Quantitative
    relaxation of concurrent data structures. Proceedings of the 40th annual ACM SIGPLAN-SIGACT
    symposium on Principles of programming language. POPL: Principles of Programming
    Languages, 317–328.'
  mla: Henzinger, Thomas A., et al. “Quantitative Relaxation of Concurrent Data Structures.”
    <i>Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of
    Programming Language</i>, ACM, 2013, pp. 317–28, doi:<a href="https://doi.org/10.1145/2429069.2429109">10.1145/2429069.2429109</a>.
  short: T.A. Henzinger, C. Kirsch, H. Payer, A. Sezgin, A. Sokolova, in:, Proceedings
    of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Language,
    ACM, 2013, pp. 317–328.
conference:
  end_date: 2013-01-25
  location: Rome, Italy
  name: 'POPL: Principles of Programming Languages'
  start_date: 2013-01-23
date_created: 2018-12-11T11:56:11Z
date_published: 2013-01-01T00:00:00Z
date_updated: 2023-02-21T16:06:49Z
day: '01'
ddc:
- '000'
- '004'
department:
- _id: ToHe
doi: 10.1145/2429069.2429109
ec_funded: 1
file:
- access_level: open_access
  checksum: adf465e70948f4e80e48057524516456
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:14:33Z
  date_updated: 2020-07-14T12:45:31Z
  file_id: '5086'
  file_name: IST-2014-198-v1+1_popl128-henzinger-clean.pdf
  file_size: 294689
  relation: main_file
file_date_updated: 2020-07-14T12:45:31Z
has_accepted_license: '1'
language:
- iso: eng
month: '01'
oa: 1
oa_version: Submitted Version
page: 317 - 328
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
publication: Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles
  of programming language
publication_identifier:
  isbn:
  - 978-1-4503-1832-7
publication_status: published
publisher: ACM
publist_id: '4801'
pubrep_id: '198'
quality_controlled: '1'
related_material:
  record:
  - id: '10901'
    relation: later_version
    status: deleted
scopus_import: 1
status: public
title: Quantitative relaxation of concurrent data structures
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2013'
...
---
_id: '2182'
abstract:
- lang: eng
  text: We propose a general framework for abstraction with respect to quantitative
    properties, such as worst-case execution time, or power consumption. Our framework
    provides a systematic way for counter-example guided abstraction refinement for
    quantitative properties. The salient aspect of the framework is that it allows
    anytime verification, that is, verification algorithms that can be stopped at
    any time (for example, due to exhaustion of memory), and report approximations
    that improve monotonically when the algorithms are given more time. We instantiate
    the framework with a number of quantitative abstractions and refinement schemes,
    which differ in terms of how much quantitative information they keep from the
    original system. We introduce both state-based and trace-based quantitative abstractions,
    and we describe conditions that define classes of quantitative properties for
    which the abstractions provide over-approximations. We give algorithms for evaluating
    the quantitative properties on the abstract systems. We present algorithms for
    counter-example based refinements for quantitative properties for both state-based
    and segment-based abstractions. We perform a case study on worst-case execution
    time of executables to evaluate the anytime verification aspect and the quantitative
    abstractions we proposed.
author:
- first_name: Pavol
  full_name: Cerny, Pavol
  id: 4DCBEFFE-F248-11E8-B48F-1D18A9856A87
  last_name: Cerny
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Arjun
  full_name: Radhakrishna, Arjun
  id: 3B51CAC4-F248-11E8-B48F-1D18A9856A87
  last_name: Radhakrishna
citation:
  ama: 'Cerny P, Henzinger TA, Radhakrishna A. Quantitative abstraction refinement.
    In: <i>Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles
    of Programming Language</i>. ACM; 2013:115-128. doi:<a href="https://doi.org/10.1145/2429069.2429085">10.1145/2429069.2429085</a>'
  apa: 'Cerny, P., Henzinger, T. A., &#38; Radhakrishna, A. (2013). Quantitative abstraction
    refinement. In <i>Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium
    on Principles of programming language</i> (pp. 115–128). Rome, Italy: ACM. <a
    href="https://doi.org/10.1145/2429069.2429085">https://doi.org/10.1145/2429069.2429085</a>'
  chicago: Cerny, Pavol, Thomas A Henzinger, and Arjun Radhakrishna. “Quantitative
    Abstraction Refinement.” In <i>Proceedings of the 40th Annual ACM SIGPLAN-SIGACT
    Symposium on Principles of Programming Language</i>, 115–28. ACM, 2013. <a href="https://doi.org/10.1145/2429069.2429085">https://doi.org/10.1145/2429069.2429085</a>.
  ieee: P. Cerny, T. A. Henzinger, and A. Radhakrishna, “Quantitative abstraction
    refinement,” in <i>Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium
    on Principles of programming language</i>, Rome, Italy, 2013, pp. 115–128.
  ista: 'Cerny P, Henzinger TA, Radhakrishna A. 2013. Quantitative abstraction refinement.
    Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming
    language. POPL: Principles of Programming Languages, 115–128.'
  mla: Cerny, Pavol, et al. “Quantitative Abstraction Refinement.” <i>Proceedings
    of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Language</i>,
    ACM, 2013, pp. 115–28, doi:<a href="https://doi.org/10.1145/2429069.2429085">10.1145/2429069.2429085</a>.
  short: P. Cerny, T.A. Henzinger, A. Radhakrishna, in:, Proceedings of the 40th Annual
    ACM SIGPLAN-SIGACT Symposium on Principles of Programming Language, ACM, 2013,
    pp. 115–128.
conference:
  end_date: 2013-01-25
  location: Rome, Italy
  name: 'POPL: Principles of Programming Languages'
  start_date: 2013-07-23
date_created: 2018-12-11T11:56:11Z
date_published: 2013-01-01T00:00:00Z
date_updated: 2021-01-12T06:55:50Z
day: '01'
department:
- _id: ToHe
doi: 10.1145/2429069.2429085
ec_funded: 1
language:
- iso: eng
month: '01'
oa_version: None
page: 115 - 128
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25F5A88A-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S11402-N23
  name: Moderne Concurrency Paradigms
publication: Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles
  of programming language
publication_status: published
publisher: ACM
publist_id: '4800'
quality_controlled: '1'
scopus_import: 1
status: public
title: Quantitative abstraction refinement
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2013'
...
---
_id: '2209'
abstract:
- lang: eng
  text: "A straight skeleton is a well-known geometric structure, and several algorithms
    exist to construct the straight skeleton for a given polygon or planar straight-line
    graph. In this paper, we ask the reverse question: Given the straight skeleton
    (in form of a planar straight-line graph, with some rays to infinity), can we
    reconstruct a planar straight-line graph for which this was the straight skeleton?
    We show how to reduce this problem to the problem of finding a line that intersects
    a set of convex polygons. We can find these convex polygons and all such lines
    in $O(nlog n)$ time in the Real RAM computer model, where $n$ denotes the number
    of edges of the input graph. We also explain how our approach can be used for
    recognizing Voronoi diagrams of points, thereby completing a partial solution
    provided by Ash and Bolker in 1985.\r\n"
alternative_title:
- '2013 10th International Symposium on Voronoi Diagrams in Science and Engineering
  (ISVD 2013) '
author:
- first_name: Therese
  full_name: Biedl, Therese
  last_name: Biedl
- first_name: Martin
  full_name: Held, Martin
  last_name: Held
- first_name: Stefan
  full_name: Huber, Stefan
  id: 4700A070-F248-11E8-B48F-1D18A9856A87
  last_name: Huber
  orcid: 0000-0002-8871-5814
citation:
  ama: 'Biedl T, Held M, Huber S. Recognizing straight skeletons and Voronoi diagrams
    and reconstructing their input. In: IEEE; 2013:37-46. doi:<a href="https://doi.org/10.1109/ISVD.2013.11">10.1109/ISVD.2013.11</a>'
  apa: 'Biedl, T., Held, M., &#38; Huber, S. (2013). Recognizing straight skeletons
    and Voronoi diagrams and reconstructing their input (pp. 37–46). Presented at
    the ISVD: Voronoi Diagrams in Science and Engineering, St. Petersburg, Russia:
    IEEE. <a href="https://doi.org/10.1109/ISVD.2013.11">https://doi.org/10.1109/ISVD.2013.11</a>'
  chicago: Biedl, Therese, Martin Held, and Stefan Huber. “Recognizing Straight Skeletons
    and Voronoi Diagrams and Reconstructing Their Input,” 37–46. IEEE, 2013. <a href="https://doi.org/10.1109/ISVD.2013.11">https://doi.org/10.1109/ISVD.2013.11</a>.
  ieee: 'T. Biedl, M. Held, and S. Huber, “Recognizing straight skeletons and Voronoi
    diagrams and reconstructing their input,” presented at the ISVD: Voronoi Diagrams
    in Science and Engineering, St. Petersburg, Russia, 2013, pp. 37–46.'
  ista: 'Biedl T, Held M, Huber S. 2013. Recognizing straight skeletons and Voronoi
    diagrams and reconstructing their input. ISVD: Voronoi Diagrams in Science and
    Engineering, 2013 10th International Symposium on Voronoi Diagrams in Science
    and Engineering (ISVD 2013) , , 37–46.'
  mla: Biedl, Therese, et al. <i>Recognizing Straight Skeletons and Voronoi Diagrams
    and Reconstructing Their Input</i>. IEEE, 2013, pp. 37–46, doi:<a href="https://doi.org/10.1109/ISVD.2013.11">10.1109/ISVD.2013.11</a>.
  short: T. Biedl, M. Held, S. Huber, in:, IEEE, 2013, pp. 37–46.
conference:
  end_date: 2013-07-10
  location: St. Petersburg, Russia
  name: 'ISVD: Voronoi Diagrams in Science and Engineering'
  start_date: 2013-07-08
date_created: 2018-12-11T11:56:20Z
date_published: 2013-12-01T00:00:00Z
date_updated: 2021-01-12T06:56:00Z
day: '01'
department:
- _id: HeEd
doi: 10.1109/ISVD.2013.11
language:
- iso: eng
month: '12'
oa_version: None
page: 37 - 46
publication_identifier:
  eisbn:
  - '978-0-7695-5037-4 '
publication_status: published
publisher: IEEE
publist_id: '4763'
quality_controlled: '1'
scopus_import: 1
status: public
title: Recognizing straight skeletons and Voronoi diagrams and reconstructing their
  input
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2013'
...
---
_id: '2210'
abstract:
- lang: eng
  text: 'A straight skeleton is a well-known geometric structure, and several algorithms
    exist to construct the straight skeleton for a given polygon. In this paper, we
    ask the reverse question: Given the straight skeleton (in form of a tree with
    a drawing in the plane, but with the exact position of the leaves unspecified),
    can we reconstruct the polygon? We show that in most cases there exists at most
    one polygon; in the remaining case there is an infinite number of polygons determined
    by one angle that can range in an interval. We can find this (set of) polygon(s)
    in linear time in the Real RAM computer model.'
author:
- first_name: Therese
  full_name: Biedl, Therese
  last_name: Biedl
- first_name: Martin
  full_name: Held, Martin
  last_name: Held
- first_name: Stefan
  full_name: Huber, Stefan
  id: 4700A070-F248-11E8-B48F-1D18A9856A87
  last_name: Huber
  orcid: 0000-0002-8871-5814
citation:
  ama: 'Biedl T, Held M, Huber S. Reconstructing polygons from embedded straight skeletons.
    In: <i>29th European Workshop on Computational Geometry</i>. TU Braunschweig;
    2013:95-98.'
  apa: 'Biedl, T., Held, M., &#38; Huber, S. (2013). Reconstructing polygons from
    embedded straight skeletons. In <i>29th European Workshop on Computational Geometry</i>
    (pp. 95–98). Braunschweig, Germany: TU Braunschweig.'
  chicago: Biedl, Therese, Martin Held, and Stefan Huber. “Reconstructing Polygons
    from Embedded Straight Skeletons.” In <i>29th European Workshop on Computational
    Geometry</i>, 95–98. TU Braunschweig, 2013.
  ieee: T. Biedl, M. Held, and S. Huber, “Reconstructing polygons from embedded straight
    skeletons,” in <i>29th European Workshop on Computational Geometry</i>, Braunschweig,
    Germany, 2013, pp. 95–98.
  ista: 'Biedl T, Held M, Huber S. 2013. Reconstructing polygons from embedded straight
    skeletons. 29th European Workshop on Computational Geometry. EuroCG: European
    Workshop on Computational Geometry, 95–98.'
  mla: Biedl, Therese, et al. “Reconstructing Polygons from Embedded Straight Skeletons.”
    <i>29th European Workshop on Computational Geometry</i>, TU Braunschweig, 2013,
    pp. 95–98.
  short: T. Biedl, M. Held, S. Huber, in:, 29th European Workshop on Computational
    Geometry, TU Braunschweig, 2013, pp. 95–98.
conference:
  end_date: 2013-03-20
  location: Braunschweig, Germany
  name: 'EuroCG: European Workshop on Computational Geometry'
  start_date: 2013-03-17
date_created: 2018-12-11T11:56:21Z
date_published: 2013-03-01T00:00:00Z
date_updated: 2021-01-12T06:56:00Z
day: '01'
department:
- _id: HeEd
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://www.ibr.cs.tu-bs.de/alg/eurocg13/booklet_eurocg13.pdf
month: '03'
oa: 1
oa_version: Submitted Version
page: 95 - 98
publication: 29th European Workshop on Computational Geometry
publication_status: published
publisher: TU Braunschweig
publist_id: '4762'
status: public
title: Reconstructing polygons from embedded straight skeletons
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2013'
...
---
_id: '2237'
abstract:
- lang: eng
  text: We describe new extensions of the Vampire theorem prover for computing tree
    interpolants. These extensions generalize Craig interpolation in Vampire, and
    can also be used to derive sequence interpolants. We evaluated our implementation
    on a large number of examples over the theory of linear integer arithmetic and
    integer-indexed arrays, with and without quantifiers. When compared to other methods,
    our experiments show that some examples could only be solved by our implementation.
alternative_title:
- LNCS
article_processing_charge: No
author:
- first_name: Régis
  full_name: Blanc, Régis
  last_name: Blanc
- first_name: Ashutosh
  full_name: Gupta, Ashutosh
  id: 335E5684-F248-11E8-B48F-1D18A9856A87
  last_name: Gupta
- first_name: Laura
  full_name: Kovács, Laura
  last_name: Kovács
- first_name: Bernhard
  full_name: Kragl, Bernhard
  id: 320FC952-F248-11E8-B48F-1D18A9856A87
  last_name: Kragl
  orcid: 0000-0001-7745-9117
citation:
  ama: Blanc R, Gupta A, Kovács L, Kragl B. Tree interpolation in Vampire. 2013;8312:173-181.
    doi:<a href="https://doi.org/10.1007/978-3-642-45221-5_13">10.1007/978-3-642-45221-5_13</a>
  apa: 'Blanc, R., Gupta, A., Kovács, L., &#38; Kragl, B. (2013). Tree interpolation
    in Vampire. Presented at the LPAR: Logic for Programming, Artificial Intelligence,
    and Reasoning, Stellenbosch, South Africa: Springer. <a href="https://doi.org/10.1007/978-3-642-45221-5_13">https://doi.org/10.1007/978-3-642-45221-5_13</a>'
  chicago: Blanc, Régis, Ashutosh Gupta, Laura Kovács, and Bernhard Kragl. “Tree Interpolation
    in Vampire.” Lecture Notes in Computer Science. Springer, 2013. <a href="https://doi.org/10.1007/978-3-642-45221-5_13">https://doi.org/10.1007/978-3-642-45221-5_13</a>.
  ieee: R. Blanc, A. Gupta, L. Kovács, and B. Kragl, “Tree interpolation in Vampire,”
    vol. 8312. Springer, pp. 173–181, 2013.
  ista: Blanc R, Gupta A, Kovács L, Kragl B. 2013. Tree interpolation in Vampire.
    8312, 173–181.
  mla: Blanc, Régis, et al. <i>Tree Interpolation in Vampire</i>. Vol. 8312, Springer,
    2013, pp. 173–81, doi:<a href="https://doi.org/10.1007/978-3-642-45221-5_13">10.1007/978-3-642-45221-5_13</a>.
  short: R. Blanc, A. Gupta, L. Kovács, B. Kragl, 8312 (2013) 173–181.
conference:
  end_date: 2013-12-19
  location: Stellenbosch, South Africa
  name: 'LPAR: Logic for Programming, Artificial Intelligence, and Reasoning'
  start_date: 2013-12-14
date_created: 2018-12-11T11:56:29Z
date_published: 2013-01-14T00:00:00Z
date_updated: 2020-08-11T10:09:42Z
day: '14'
ddc:
- '000'
department:
- _id: ToHe
doi: 10.1007/978-3-642-45221-5_13
file:
- access_level: open_access
  checksum: 9cebaafca032e6769d273f393305c705
  content_type: application/pdf
  creator: dernst
  date_created: 2020-05-15T11:10:40Z
  date_updated: 2020-07-14T12:45:34Z
  file_id: '7858'
  file_name: 2013_LPAR_Blanc.pdf
  file_size: 279206
  relation: main_file
file_date_updated: 2020-07-14T12:45:34Z
has_accepted_license: '1'
intvolume: '      8312'
language:
- iso: eng
month: '01'
oa: 1
oa_version: Submitted Version
page: 173 - 181
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
publication_status: published
publisher: Springer
publist_id: '4724'
quality_controlled: '1'
scopus_import: 1
series_title: Lecture Notes in Computer Science
status: public
title: Tree interpolation in Vampire
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 8312
year: '2013'
...
---
_id: '2238'
abstract:
- lang: eng
  text: "We study the problem of achieving a given value in Markov decision processes
    (MDPs) with several independent discounted reward objectives. We consider a generalised
    version of discounted reward objectives, in which the amount of discounting depends
    on the states visited and on the objective. This definition extends the usual
    definition of discounted reward, and allows to capture the systems in which the
    value of different commodities diminish at different and variable rates.\r\n\r\nWe
    establish results for two prominent subclasses of the problem, namely state-discount
    models where the discount factors are only dependent on the state of the MDP (and
    independent of the objective), and reward-discount models where they are only
    dependent on the objective (but not on the state of the MDP). For the state-discount
    models we use a straightforward reduction to expected total reward and show that
    the problem whether a value is achievable can be solved in polynomial time. For
    the reward-discount model we show that memory and randomisation of the strategies
    are required, but nevertheless that the problem is decidable and it is sufficient
    to consider strategies which after a certain number of steps behave in a memoryless
    way.\r\n\r\nFor the general case, we show that when restricted to graphs (i.e.
    MDPs with no randomisation), pure strategies and discount factors of the form
    1/n where n is an integer, the problem is in PSPACE and finite memory suffices
    for achieving a given value. We also show that when the discount factors are not
    of the form 1/n, the memory required by a strategy can be infinite.\r\n"
alternative_title:
- LNCS
author:
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Vojtěch
  full_name: Forejt, Vojtěch
  last_name: Forejt
- first_name: Dominik
  full_name: Wojtczak, Dominik
  last_name: Wojtczak
citation:
  ama: Chatterjee K, Forejt V, Wojtczak D. Multi-objective discounted reward verification
    in graphs and MDPs. 2013;8312:228-242. doi:<a href="https://doi.org/10.1007/978-3-642-45221-5_17">10.1007/978-3-642-45221-5_17</a>
  apa: 'Chatterjee, K., Forejt, V., &#38; Wojtczak, D. (2013). Multi-objective discounted
    reward verification in graphs and MDPs. Presented at the LPAR: Logic for Programming,
    Artificial Intelligence, and Reasoning, Stellenbosch, South Africa: Springer.
    <a href="https://doi.org/10.1007/978-3-642-45221-5_17">https://doi.org/10.1007/978-3-642-45221-5_17</a>'
  chicago: Chatterjee, Krishnendu, Vojtěch Forejt, and Dominik Wojtczak. “Multi-Objective
    Discounted Reward Verification in Graphs and MDPs.” Lecture Notes in Computer
    Science. Springer, 2013. <a href="https://doi.org/10.1007/978-3-642-45221-5_17">https://doi.org/10.1007/978-3-642-45221-5_17</a>.
  ieee: K. Chatterjee, V. Forejt, and D. Wojtczak, “Multi-objective discounted reward
    verification in graphs and MDPs,” vol. 8312. Springer, pp. 228–242, 2013.
  ista: Chatterjee K, Forejt V, Wojtczak D. 2013. Multi-objective discounted reward
    verification in graphs and MDPs. 8312, 228–242.
  mla: Chatterjee, Krishnendu, et al. <i>Multi-Objective Discounted Reward Verification
    in Graphs and MDPs</i>. Vol. 8312, Springer, 2013, pp. 228–42, doi:<a href="https://doi.org/10.1007/978-3-642-45221-5_17">10.1007/978-3-642-45221-5_17</a>.
  short: K. Chatterjee, V. Forejt, D. Wojtczak, 8312 (2013) 228–242.
conference:
  end_date: 2013-12-19
  location: Stellenbosch, South Africa
  name: 'LPAR: Logic for Programming, Artificial Intelligence, and Reasoning'
  start_date: 2013-12-14
date_created: 2018-12-11T11:56:30Z
date_published: 2013-12-01T00:00:00Z
date_updated: 2020-08-11T10:09:42Z
day: '01'
department:
- _id: KrCh
doi: 10.1007/978-3-642-45221-5_17
ec_funded: 1
intvolume: '      8312'
language:
- iso: eng
month: '12'
oa_version: None
page: 228 - 242
project:
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
publication_status: published
publisher: Springer
publist_id: '4723'
quality_controlled: '1'
scopus_import: 1
series_title: Lecture Notes in Computer Science
status: public
title: Multi-objective discounted reward verification in graphs and MDPs
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 8312
year: '2013'
...
---
_id: '2243'
abstract:
- lang: eng
  text: We show that modal logic over universally first-order definable classes of
    transitive frames is decidable. More precisely, let K be an arbitrary class of
    transitive Kripke frames definable by a universal first-order sentence. We show
    that the global and finite global satisfiability problems of modal logic over
    K are decidable in NP, regardless of choice of K. We also show that the local
    satisfiability and the finite local satisfiability problems of modal logic over
    K are decidable in NEXPTIME.
alternative_title:
- LIPIcs
author:
- first_name: Jakub
  full_name: Michaliszyn, Jakub
  last_name: Michaliszyn
- first_name: Jan
  full_name: Otop, Jan
  id: 2FC5DA74-F248-11E8-B48F-1D18A9856A87
  last_name: Otop
citation:
  ama: Michaliszyn J, Otop J. Elementary modal logics over transitive structures.
    2013;23:563-577. doi:<a href="https://doi.org/10.4230/LIPIcs.CSL.2013.563">10.4230/LIPIcs.CSL.2013.563</a>
  apa: 'Michaliszyn, J., &#38; Otop, J. (2013). Elementary modal logics over transitive
    structures. Presented at the CSL: Computer Science Logic, Torino, Italy: Schloss
    Dagstuhl - Leibniz-Zentrum für Informatik. <a href="https://doi.org/10.4230/LIPIcs.CSL.2013.563">https://doi.org/10.4230/LIPIcs.CSL.2013.563</a>'
  chicago: Michaliszyn, Jakub, and Jan Otop. “Elementary Modal Logics over Transitive
    Structures.” Leibniz International Proceedings in Informatics. Schloss Dagstuhl
    - Leibniz-Zentrum für Informatik, 2013. <a href="https://doi.org/10.4230/LIPIcs.CSL.2013.563">https://doi.org/10.4230/LIPIcs.CSL.2013.563</a>.
  ieee: J. Michaliszyn and J. Otop, “Elementary modal logics over transitive structures,”
    vol. 23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, pp. 563–577, 2013.
  ista: Michaliszyn J, Otop J. 2013. Elementary modal logics over transitive structures.
    23, 563–577.
  mla: Michaliszyn, Jakub, and Jan Otop. <i>Elementary Modal Logics over Transitive
    Structures</i>. Vol. 23, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2013,
    pp. 563–77, doi:<a href="https://doi.org/10.4230/LIPIcs.CSL.2013.563">10.4230/LIPIcs.CSL.2013.563</a>.
  short: J. Michaliszyn, J. Otop, 23 (2013) 563–577.
conference:
  end_date: 2013-09-05
  location: Torino, Italy
  name: 'CSL: Computer Science Logic'
  start_date: 2013-09-02
date_created: 2018-12-11T11:56:32Z
date_published: 2013-09-01T00:00:00Z
date_updated: 2020-08-11T10:09:42Z
day: '01'
ddc:
- '000'
- '004'
department:
- _id: ToHe
doi: 10.4230/LIPIcs.CSL.2013.563
ec_funded: 1
file:
- access_level: open_access
  checksum: e0732e73a8b1e39483df7717d53e3e35
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:12:11Z
  date_updated: 2020-07-14T12:45:34Z
  file_id: '4929'
  file_name: IST-2016-136-v1+2_39.pdf
  file_size: 454915
  relation: main_file
file_date_updated: 2020-07-14T12:45:34Z
has_accepted_license: '1'
intvolume: '        23'
language:
- iso: eng
month: '09'
oa: 1
oa_version: Published Version
page: 563 - 577
project:
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
publist_id: '4708'
pubrep_id: '136'
quality_controlled: '1'
scopus_import: 1
series_title: Leibniz International Proceedings in Informatics
status: public
title: Elementary modal logics over transitive structures
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 23
year: '2013'
...
---
_id: '2244'
abstract:
- lang: eng
  text: 'We consider two systems (α1,...,αm) and (β1,...,βn) of curves drawn on a
    compact two-dimensional surface ℳ with boundary. Each αi and each βj is either
    an arc meeting the boundary of ℳ at its two endpoints, or a closed curve. The
    αi are pairwise disjoint except for possibly sharing endpoints, and similarly
    for the βj. We want to &quot;untangle&quot; the βj from the αi by a self-homeomorphism
    of ℳ; more precisely, we seek an homeomorphism φ: ℳ → ℳ fixing the boundary of
    ℳ pointwise such that the total number of crossings of the αi with the φ(βj) is
    as small as possible. This problem is motivated by an application in the algorithmic
    theory of embeddings and 3-manifolds. We prove that if ℳ is planar, i.e., a sphere
    with h ≥ 0 boundary components (&quot;holes&quot;), then O(mn) crossings can be
    achieved (independently of h), which is asymptotically tight, as an easy lower
    bound shows. In general, for an arbitrary (orientable or nonorientable) surface
    ℳ with h holes and of (orientable or nonorientable) genus g ≥ 0, we obtain an
    O((m + n)4) upper bound, again independent of h and g. '
acknowledgement: We would like to thank the authors of [GHR13] for mak- ing a draft
  of their paper available to us, and, in particular, T. Huynh for an e-mail correspondence.
alternative_title:
- LNCS
arxiv: 1
author:
- first_name: Jiří
  full_name: Matoušek, Jiří
  last_name: Matoušek
- first_name: Eric
  full_name: Sedgwick, Eric
  last_name: Sedgwick
- first_name: Martin
  full_name: Tancer, Martin
  id: 38AC689C-F248-11E8-B48F-1D18A9856A87
  last_name: Tancer
  orcid: 0000-0002-1191-6714
- first_name: Uli
  full_name: Wagner, Uli
  id: 36690CA2-F248-11E8-B48F-1D18A9856A87
  last_name: Wagner
  orcid: 0000-0002-1494-0568
citation:
  ama: Matoušek J, Sedgwick E, Tancer M, Wagner U. Untangling two systems of noncrossing
    curves. 2013;8242:472-483. doi:<a href="https://doi.org/10.1007/978-3-319-03841-4_41">10.1007/978-3-319-03841-4_41</a>
  apa: 'Matoušek, J., Sedgwick, E., Tancer, M., &#38; Wagner, U. (2013). Untangling
    two systems of noncrossing curves. Presented at the GD: Graph Drawing and Network
    Visualization, Bordeaux, France: Springer. <a href="https://doi.org/10.1007/978-3-319-03841-4_41">https://doi.org/10.1007/978-3-319-03841-4_41</a>'
  chicago: Matoušek, Jiří, Eric Sedgwick, Martin Tancer, and Uli Wagner. “Untangling
    Two Systems of Noncrossing Curves.” Lecture Notes in Computer Science. Springer,
    2013. <a href="https://doi.org/10.1007/978-3-319-03841-4_41">https://doi.org/10.1007/978-3-319-03841-4_41</a>.
  ieee: J. Matoušek, E. Sedgwick, M. Tancer, and U. Wagner, “Untangling two systems
    of noncrossing curves,” vol. 8242. Springer, pp. 472–483, 2013.
  ista: Matoušek J, Sedgwick E, Tancer M, Wagner U. 2013. Untangling two systems of
    noncrossing curves. 8242, 472–483.
  mla: Matoušek, Jiří, et al. <i>Untangling Two Systems of Noncrossing Curves</i>.
    Vol. 8242, Springer, 2013, pp. 472–83, doi:<a href="https://doi.org/10.1007/978-3-319-03841-4_41">10.1007/978-3-319-03841-4_41</a>.
  short: J. Matoušek, E. Sedgwick, M. Tancer, U. Wagner, 8242 (2013) 472–483.
conference:
  end_date: 2013-09-25
  location: Bordeaux, France
  name: 'GD: Graph Drawing and Network Visualization'
  start_date: 2013-09-23
date_created: 2018-12-11T11:56:32Z
date_published: 2013-09-01T00:00:00Z
date_updated: 2023-02-21T17:03:07Z
day: '01'
department:
- _id: UlWa
doi: 10.1007/978-3-319-03841-4_41
external_id:
  arxiv:
  - '1302.6475'
intvolume: '      8242'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://arxiv.org/abs/1302.6475
month: '09'
oa: 1
oa_version: Preprint
page: 472 - 483
project:
- _id: 25FA3206-B435-11E9-9278-68D0E5697425
  grant_number: PP00P2_138948
  name: 'Embeddings in Higher Dimensions: Algorithms and Combinatorics'
publication_status: published
publisher: Springer
publist_id: '4707'
quality_controlled: '1'
related_material:
  record:
  - id: '1411'
    relation: later_version
    status: public
scopus_import: 1
series_title: Lecture Notes in Computer Science
status: public
title: Untangling two systems of noncrossing curves
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 8242
year: '2013'
...
---
_id: '2247'
abstract:
- lang: eng
  text: Cooperative behavior, where one individual incurs a cost to help another,
    is a wide spread phenomenon. Here we study direct reciprocity in the context of
    the alternating Prisoner's Dilemma. We consider all strategies that can be implemented
    by one and two-state automata. We calculate the payoff matrix of all pairwise
    encounters in the presence of noise. We explore deterministic selection dynamics
    with and without mutation. Using different error rates and payoff values, we observe
    convergence to a small number of distinct equilibria. Two of them are uncooperative
    strict Nash equilibria representing always-defect (ALLD) and Grim. The third equilibrium
    is mixed and represents a cooperative alliance of several strategies, dominated
    by a strategy which we call Forgiver. Forgiver cooperates whenever the opponent
    has cooperated; it defects once when the opponent has defected, but subsequently
    Forgiver attempts to re-establish cooperation even if the opponent has defected
    again. Forgiver is not an evolutionarily stable strategy, but the alliance, which
    it rules, is asymptotically stable. For a wide range of parameter values the most
    commonly observed outcome is convergence to the mixed equilibrium, dominated by
    Forgiver. Our results show that although forgiving might incur a short-term loss
    it can lead to a long-term gain. Forgiveness facilitates stable cooperation in
    the presence of exploitation and noise.
article_number: e80814
author:
- first_name: Benjamin
  full_name: Zagorsky, Benjamin
  last_name: Zagorsky
- first_name: Johannes
  full_name: Reiter, Johannes
  id: 4A918E98-F248-11E8-B48F-1D18A9856A87
  last_name: Reiter
  orcid: 0000-0002-0170-7353
- first_name: Krishnendu
  full_name: Chatterjee, Krishnendu
  id: 2E5DCA20-F248-11E8-B48F-1D18A9856A87
  last_name: Chatterjee
  orcid: 0000-0002-4561-241X
- first_name: Martin
  full_name: Nowak, Martin
  last_name: Nowak
citation:
  ama: Zagorsky B, Reiter J, Chatterjee K, Nowak M. Forgiver triumphs in alternating
    prisoner’s dilemma . <i>PLoS One</i>. 2013;8(12). doi:<a href="https://doi.org/10.1371/journal.pone.0080814">10.1371/journal.pone.0080814</a>
  apa: Zagorsky, B., Reiter, J., Chatterjee, K., &#38; Nowak, M. (2013). Forgiver
    triumphs in alternating prisoner’s dilemma . <i>PLoS One</i>. Public Library of
    Science. <a href="https://doi.org/10.1371/journal.pone.0080814">https://doi.org/10.1371/journal.pone.0080814</a>
  chicago: Zagorsky, Benjamin, Johannes Reiter, Krishnendu Chatterjee, and Martin
    Nowak. “Forgiver Triumphs in Alternating Prisoner’s Dilemma .” <i>PLoS One</i>.
    Public Library of Science, 2013. <a href="https://doi.org/10.1371/journal.pone.0080814">https://doi.org/10.1371/journal.pone.0080814</a>.
  ieee: B. Zagorsky, J. Reiter, K. Chatterjee, and M. Nowak, “Forgiver triumphs in
    alternating prisoner’s dilemma ,” <i>PLoS One</i>, vol. 8, no. 12. Public Library
    of Science, 2013.
  ista: Zagorsky B, Reiter J, Chatterjee K, Nowak M. 2013. Forgiver triumphs in alternating
    prisoner’s dilemma . PLoS One. 8(12), e80814.
  mla: Zagorsky, Benjamin, et al. “Forgiver Triumphs in Alternating Prisoner’s Dilemma
    .” <i>PLoS One</i>, vol. 8, no. 12, e80814, Public Library of Science, 2013, doi:<a
    href="https://doi.org/10.1371/journal.pone.0080814">10.1371/journal.pone.0080814</a>.
  short: B. Zagorsky, J. Reiter, K. Chatterjee, M. Nowak, PLoS One 8 (2013).
date_created: 2018-12-11T11:56:33Z
date_published: 2013-12-12T00:00:00Z
date_updated: 2023-09-07T11:40:43Z
day: '12'
ddc:
- '000'
department:
- _id: KrCh
doi: 10.1371/journal.pone.0080814
ec_funded: 1
file:
- access_level: open_access
  checksum: 808e8b9e6e89658bee4ffbbfac1bd19d
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:11:15Z
  date_updated: 2020-07-14T12:45:34Z
  file_id: '4868'
  file_name: IST-2016-409-v1+1_journal.pone.0080814.pdf
  file_size: 1050042
  relation: main_file
file_date_updated: 2020-07-14T12:45:34Z
has_accepted_license: '1'
intvolume: '         8'
issue: '12'
language:
- iso: eng
month: '12'
oa: 1
oa_version: Published Version
project:
- _id: 2581B60A-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '279307'
  name: 'Quantitative Graph Games: Theory and Applications'
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 2584A770-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: P 23499-N23
  name: Modern Graph Algorithmic Techniques in Formal Verification
- _id: 2587B514-B435-11E9-9278-68D0E5697425
  name: Microsoft Research Faculty Fellowship
publication: PLoS One
publication_status: published
publisher: Public Library of Science
publist_id: '4702'
pubrep_id: '409'
quality_controlled: '1'
related_material:
  record:
  - id: '9749'
    relation: research_data
    status: public
  - id: '1400'
    relation: dissertation_contains
    status: public
scopus_import: 1
status: public
title: 'Forgiver triumphs in alternating prisoner''s dilemma '
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 8
year: '2013'
...
---
_id: '2258'
abstract:
- lang: eng
  text: "In a digital signature scheme with message recovery, rather than transmitting
    the message m and its signature σ, a single enhanced signature τ is transmitted.
    The verifier is able to recover m from τ and at the same time verify its authenticity.
    The two most important parameters of such a scheme are its security and overhead
    |τ| − |m|. A simple argument shows that for any scheme with “n bits security”
    |τ| − |m| ≥ n, i.e., the overhead is lower bounded by the security parameter n.
    Currently, the best known constructions in the random oracle model are far from
    this lower bound requiring an overhead of n + logq h , where q h is the number
    of queries to the random oracle. In this paper we give a construction which basically
    matches the n bit lower bound. We propose a simple digital signature scheme with
    n + o(logq h ) bits overhead, where q h denotes the number of random oracle queries.\r\n\r\nOur
    construction works in two steps. First, we propose a signature scheme with message
    recovery having optimal overhead in a new ideal model, the random invertible function
    model. Second, we show that a four-round Feistel network with random oracles as
    round functions is tightly “public-indifferentiable” from a random invertible
    function. At the core of our indifferentiability proof is an almost tight upper
    bound for the expected number of edges of the densest “small” subgraph of a random
    Cayley graph, which may be of independent interest.\r\n"
alternative_title:
- LNCS
author:
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
- first_name: Krzysztof Z
  full_name: Pietrzak, Krzysztof Z
  id: 3E04A7AA-F248-11E8-B48F-1D18A9856A87
  last_name: Pietrzak
  orcid: 0000-0002-9139-1654
- first_name: Mario
  full_name: Szegedy, Mario
  last_name: Szegedy
citation:
  ama: Kiltz E, Pietrzak KZ, Szegedy M. Digital signatures with minimal overhead from
    indifferentiable random invertible functions. 2013;8042:571-588. doi:<a href="https://doi.org/10.1007/978-3-642-40041-4_31">10.1007/978-3-642-40041-4_31</a>
  apa: 'Kiltz, E., Pietrzak, K. Z., &#38; Szegedy, M. (2013). Digital signatures with
    minimal overhead from indifferentiable random invertible functions. Presented
    at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United
    States: Springer. <a href="https://doi.org/10.1007/978-3-642-40041-4_31">https://doi.org/10.1007/978-3-642-40041-4_31</a>'
  chicago: Kiltz, Eike, Krzysztof Z Pietrzak, and Mario Szegedy. “Digital Signatures
    with Minimal Overhead from Indifferentiable Random Invertible Functions.” Lecture
    Notes in Computer Science. Springer, 2013. <a href="https://doi.org/10.1007/978-3-642-40041-4_31">https://doi.org/10.1007/978-3-642-40041-4_31</a>.
  ieee: E. Kiltz, K. Z. Pietrzak, and M. Szegedy, “Digital signatures with minimal
    overhead from indifferentiable random invertible functions,” vol. 8042. Springer,
    pp. 571–588, 2013.
  ista: Kiltz E, Pietrzak KZ, Szegedy M. 2013. Digital signatures with minimal overhead
    from indifferentiable random invertible functions. 8042, 571–588.
  mla: Kiltz, Eike, et al. <i>Digital Signatures with Minimal Overhead from Indifferentiable
    Random Invertible Functions</i>. Vol. 8042, Springer, 2013, pp. 571–88, doi:<a
    href="https://doi.org/10.1007/978-3-642-40041-4_31">10.1007/978-3-642-40041-4_31</a>.
  short: E. Kiltz, K.Z. Pietrzak, M. Szegedy, 8042 (2013) 571–588.
conference:
  end_date: 2013-08-22
  location: Santa Barbara, CA, United States
  name: 'CRYPTO: International Cryptology Conference'
  start_date: 2013-08-18
date_created: 2018-12-11T11:56:37Z
date_published: 2013-01-01T00:00:00Z
date_updated: 2021-01-12T06:56:21Z
day: '01'
ddc:
- '000'
- '004'
department:
- _id: KrPi
doi: 10.1007/978-3-642-40041-4_31
ec_funded: 1
file:
- access_level: open_access
  checksum: 18a3f602cb41de184dc0e16a0e907633
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:09:20Z
  date_updated: 2020-07-14T12:45:35Z
  file_id: '4744'
  file_name: IST-2016-685-v1+1_658.pdf
  file_size: 493175
  relation: main_file
file_date_updated: 2020-07-14T12:45:35Z
has_accepted_license: '1'
intvolume: '      8042'
language:
- iso: eng
month: '01'
oa: 1
oa_version: Submitted Version
page: 571 - 588
project:
- _id: 258C570E-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '259668'
  name: Provable Security for Physical Cryptography
publication_status: published
publisher: Springer
publist_id: '4688'
pubrep_id: '685'
quality_controlled: '1'
scopus_import: 1
series_title: Lecture Notes in Computer Science
status: public
title: Digital signatures with minimal overhead from indifferentiable random invertible
  functions
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 8042
year: '2013'
...
