[{"oa_version":"Published Version","date_updated":"2026-04-08T06:59:33Z","page":"380","author":[{"orcid":"0000-0002-4901-7992","full_name":"Cipolloni, Giorgio","last_name":"Cipolloni","id":"42198EFA-F248-11E8-B48F-1D18A9856A87","first_name":"Giorgio"}],"title":"Fluctuations in the spectrum of random matrices","file_date_updated":"2021-01-25T14:19:10Z","article_processing_charge":"No","has_accepted_license":"1","status":"public","language":[{"iso":"eng"}],"date_published":"2021-01-25T00:00:00Z","doi":"10.15479/AT:ISTA:9022","day":"25","oa":1,"file":[{"file_size":4127796,"creator":"gcipollo","file_name":"thesis.pdf","date_created":"2021-01-25T14:19:03Z","success":1,"access_level":"open_access","file_id":"9043","date_updated":"2021-01-25T14:19:03Z","relation":"main_file","content_type":"application/pdf","checksum":"5a93658a5f19478372523ee232887e2b"},{"file_size":12775206,"creator":"gcipollo","file_name":"Thesis_files.zip","date_created":"2021-01-25T14:19:10Z","access_level":"closed","file_id":"9044","date_updated":"2021-01-25T14:19:10Z","relation":"source_file","checksum":"e8270eddfe6a988e92a53c88d1d19b8c","content_type":"application/zip"}],"degree_awarded":"PhD","ec_funded":1,"year":"2021","acknowledgement":"I gratefully acknowledge the financial support from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie Grant Agreement No. 665385 and my advisor’s ERC Advanced Grant No. 338804.","publication_identifier":{"issn":["2663-337X"]},"supervisor":[{"orcid":"0000-0001-5366-9603","last_name":"Erdös","full_name":"Erdös, László","id":"4DBD5372-F248-11E8-B48F-1D18A9856A87","first_name":"László"}],"ddc":["510"],"OA_place":"publisher","project":[{"call_identifier":"H2020","grant_number":"665385","_id":"2564DBCA-B435-11E9-9278-68D0E5697425","name":"International IST Doctoral Program"},{"call_identifier":"FP7","_id":"258DCDE6-B435-11E9-9278-68D0E5697425","name":"Random matrices, universality and disordered quantum systems","grant_number":"338804"}],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","date_created":"2021-01-21T18:16:54Z","publication_status":"published","alternative_title":["ISTA Thesis"],"_id":"9022","month":"01","type":"dissertation","abstract":[{"text":"In the first part of the thesis we consider Hermitian random matrices. Firstly, we consider sample covariance matrices XX∗ with X having independent identically distributed (i.i.d.) centred entries. We prove a Central Limit Theorem for differences of linear statistics of XX∗ and its minor after removing the first column of X. Secondly, we consider Wigner-type matrices and prove that the eigenvalue statistics near cusp singularities of the limiting density of states are universal and that they form a Pearcey process. Since the limiting eigenvalue distribution admits only square root (edge) and cubic root (cusp) singularities, this concludes the third and last remaining case of the Wigner-Dyson-Mehta universality conjecture. The main technical ingredients are an optimal local law at the cusp, and the proof of the fast relaxation to equilibrium of the Dyson Brownian motion in the cusp regime.\r\nIn the second part we consider non-Hermitian matrices X with centred i.i.d. entries. We normalise the entries of X to have variance N −1. It is well known that the empirical eigenvalue density converges to the uniform distribution on the unit disk (circular law). In the first project, we prove universality of the local eigenvalue statistics close to the edge of the spectrum. This is the non-Hermitian analogue of the TracyWidom universality at the Hermitian edge. Technically we analyse the evolution of the spectral distribution of X along the Ornstein-Uhlenbeck flow for very long time\r\n(up to t = +∞). In the second project, we consider linear statistics of eigenvalues for macroscopic test functions f in the Sobolev space H2+ϵ and prove their convergence to the projection of the Gaussian Free Field on the unit disk. We prove this result for non-Hermitian matrices with real or complex entries. The main technical ingredients are: (i) local law for products of two resolvents at different spectral parameters, (ii) analysis of correlated Dyson Brownian motions.\r\nIn the third and final part we discuss the mathematically rigorous application of supersymmetric techniques (SUSY ) to give a lower tail estimate of the lowest singular value of X − z, with z ∈ C. More precisely, we use superbosonisation formula to give an integral representation of the resolvent of (X − z)(X − z)∗ which reduces to two and three contour integrals in the complex and real case, respectively. The rigorous analysis of these integrals is quite challenging since simple saddle point analysis cannot be applied (the main contribution comes from a non-trivial manifold). Our result\r\nimproves classical smoothing inequalities in the regime |z| ≈ 1; this result is essential to prove edge universality for i.i.d. non-Hermitian matrices.","lang":"eng"}],"citation":{"short":"G. Cipolloni, Fluctuations in the Spectrum of Random Matrices, Institute of Science and Technology Austria, 2021.","mla":"Cipolloni, Giorgio. <i>Fluctuations in the Spectrum of Random Matrices</i>. Institute of Science and Technology Austria, 2021, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:9022\">10.15479/AT:ISTA:9022</a>.","ista":"Cipolloni G. 2021. Fluctuations in the spectrum of random matrices. Institute of Science and Technology Austria.","chicago":"Cipolloni, Giorgio. “Fluctuations in the Spectrum of Random Matrices.” Institute of Science and Technology Austria, 2021. <a href=\"https://doi.org/10.15479/AT:ISTA:9022\">https://doi.org/10.15479/AT:ISTA:9022</a>.","apa":"Cipolloni, G. (2021). <i>Fluctuations in the spectrum of random matrices</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:9022\">https://doi.org/10.15479/AT:ISTA:9022</a>","ama":"Cipolloni G. Fluctuations in the spectrum of random matrices. 2021. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:9022\">10.15479/AT:ISTA:9022</a>","ieee":"G. Cipolloni, “Fluctuations in the spectrum of random matrices,” Institute of Science and Technology Austria, 2021."},"department":[{"_id":"GradSch"},{"_id":"LaEr"}],"publisher":"Institute of Science and Technology Austria","corr_author":"1"},{"OA_place":"publisher","ddc":["530"],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","supervisor":[{"orcid":"0000-0002-1307-5074","last_name":"Goodrich","full_name":"Goodrich, Carl Peter","id":"EB352CD2-F68A-11E9-89C5-A432E6697425","first_name":"Carl Peter"}],"degree_awarded":"MS","year":"2021","publication_identifier":{"issn":["2791-4585"]},"date_published":"2021-12-07T00:00:00Z","doi":"10.15479/at:ista:10422","day":"07","oa":1,"file":[{"content_type":"application/x-zip-compressed","checksum":"114e8f4b2c002c6c352416c12de2c695","relation":"source_file","date_updated":"2022-03-10T12:10:25Z","file_id":"10424","access_level":"closed","creator":"cchlebak","file_size":394018,"file_name":"Thesis.zip","date_created":"2021-12-07T11:13:52Z"},{"access_level":"closed","date_created":"2021-12-07T11:14:01Z","file_name":"Preliminary_pages_Piankov.docx","file_size":47638,"creator":"cchlebak","relation":"source_file","content_type":"application/vnd.openxmlformats-officedocument.wordprocessingml.document","checksum":"cd15ae991ced352a9959815f794e657c","file_id":"10425","date_updated":"2022-03-10T12:10:25Z"},{"file_id":"10426","date_updated":"2021-12-07T11:20:35Z","relation":"main_file","content_type":"application/pdf","checksum":"e6899c798b75ba42fab9822bce309050","date_created":"2021-12-07T11:20:35Z","file_name":"2021_Piankov_combined.pdf","success":1,"file_size":484965,"creator":"cchlebak","access_level":"open_access"}],"file_date_updated":"2022-03-10T12:10:25Z","has_accepted_license":"1","article_processing_charge":"No","status":"public","language":[{"iso":"eng"}],"date_updated":"2026-04-08T06:58:55Z","author":[{"first_name":"Anton","id":"865E3C26-AA8C-11E9-A409-C4C4E5697425","last_name":"Piankov","full_name":"Piankov, Anton"}],"title":"Towards designer materials using customizable particle shape","oa_version":"Published Version","publisher":"Institute of Science and Technology Austria","corr_author":"1","department":[{"_id":"GradSch"},{"_id":"CaGo"}],"type":"dissertation","abstract":[{"text":"Those who aim to devise new materials with desirable properties usually examine present methods first. However, they will find out that some approaches can exist only conceptually without high chances to become practically useful. It seems that a numerical technique called automatic differentiation together with increasing supply of computational accelerators will soon shift many methods of the material design from the category ”unimaginable” to the category ”expensive but possible”. Approach we suggest is not an exception. Our overall goal is to have an efficient and generalizable approach allowing to solve inverse design problems. In this thesis we scratch its surface. We consider jammed systems of identical particles. And ask ourselves how the shape of those particles (or the parameters codifying it) may affect mechanical properties of the system. An indispensable part of reaching the answer is an appropriate particle parametrization. We come up with a simple, yet generalizable and purposeful scheme for it. Using our generalizable shape parameterization, we simulate the formation of a solid composed of pentagonal-like particles and measure anisotropy in the resulting elastic response. Through automatic differentiation techniques, we directly connect the shape parameters with the elastic response. Interestingly, for our system we find that less isotropic particles lead to a more isotropic elastic response. Together with other results known about our method it seems that it can be successfully generalized for different inverse design problems.","lang":"eng"}],"citation":{"ama":"Piankov A. Towards designer materials using customizable particle shape. 2021. doi:<a href=\"https://doi.org/10.15479/at:ista:10422\">10.15479/at:ista:10422</a>","apa":"Piankov, A. (2021). <i>Towards designer materials using customizable particle shape</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/at:ista:10422\">https://doi.org/10.15479/at:ista:10422</a>","ieee":"A. Piankov, “Towards designer materials using customizable particle shape,” Institute of Science and Technology Austria, 2021.","mla":"Piankov, Anton. <i>Towards Designer Materials Using Customizable Particle Shape</i>. Institute of Science and Technology Austria, 2021, doi:<a href=\"https://doi.org/10.15479/at:ista:10422\">10.15479/at:ista:10422</a>.","ista":"Piankov A. 2021. Towards designer materials using customizable particle shape. Institute of Science and Technology Austria.","chicago":"Piankov, Anton. “Towards Designer Materials Using Customizable Particle Shape.” Institute of Science and Technology Austria, 2021. <a href=\"https://doi.org/10.15479/at:ista:10422\">https://doi.org/10.15479/at:ista:10422</a>.","short":"A. Piankov, Towards Designer Materials Using Customizable Particle Shape, Institute of Science and Technology Austria, 2021."},"month":"12","_id":"10422","alternative_title":["ISTA Master's Thesis"],"date_created":"2021-12-07T10:48:06Z","publication_status":"published"},{"citation":{"mla":"Portinale, Lorenzo. <i>Discrete-to-Continuum Limits of Transport Problems and Gradient Flows in the Space of Measures</i>. Institute of Science and Technology Austria, 2021, doi:<a href=\"https://doi.org/10.15479/at:ista:10030\">10.15479/at:ista:10030</a>.","chicago":"Portinale, Lorenzo. “Discrete-to-Continuum Limits of Transport Problems and Gradient Flows in the Space of Measures.” Institute of Science and Technology Austria, 2021. <a href=\"https://doi.org/10.15479/at:ista:10030\">https://doi.org/10.15479/at:ista:10030</a>.","ista":"Portinale L. 2021. Discrete-to-continuum limits of transport problems and gradient flows in the space of measures. Institute of Science and Technology Austria.","ieee":"L. Portinale, “Discrete-to-continuum limits of transport problems and gradient flows in the space of measures,” Institute of Science and Technology Austria, 2021.","apa":"Portinale, L. (2021). <i>Discrete-to-continuum limits of transport problems and gradient flows in the space of measures</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/at:ista:10030\">https://doi.org/10.15479/at:ista:10030</a>","ama":"Portinale L. Discrete-to-continuum limits of transport problems and gradient flows in the space of measures. 2021. doi:<a href=\"https://doi.org/10.15479/at:ista:10030\">10.15479/at:ista:10030</a>","short":"L. Portinale, Discrete-to-Continuum Limits of Transport Problems and Gradient Flows in the Space of Measures, Institute of Science and Technology Austria, 2021."},"type":"dissertation","abstract":[{"text":"This PhD thesis is primarily focused on the study of discrete transport problems, introduced for the first time in the seminal works of Maas [Maa11] and Mielke [Mie11] on finite state Markov chains and reaction-diffusion equations, respectively. More in detail, my research focuses on the study of transport costs on graphs, in particular the convergence and the stability of such problems in the discrete-to-continuum limit. This thesis also includes some results concerning\r\nnon-commutative optimal transport. The first chapter of this thesis consists of a general introduction to the optimal transport problems, both in the discrete, the continuous, and the non-commutative setting. Chapters 2 and 3 present the content of two works, obtained in collaboration with Peter Gladbach, Eva Kopfer, and Jan Maas, where we have been able to show the convergence of discrete transport costs on periodic graphs to suitable continuous ones, which can be described by means of a homogenisation result. We first focus on the particular case of quadratic costs on the real line and then extending the result to more general costs in arbitrary dimension. Our results are the first complete characterisation of limits of transport costs on periodic graphs in arbitrary dimension which do not rely on any additional symmetry. In Chapter 4 we turn our attention to one of the intriguing connection between evolution equations and optimal transport, represented by the theory of gradient flows. We show that discrete gradient flow structures associated to a finite volume approximation of a certain class of diffusive equations (Fokker–Planck) is stable in the limit of vanishing meshes, reproving the convergence of the scheme via the method of evolutionary Γ-convergence and exploiting a more variational point of view on the problem. This is based on a collaboration with Dominik Forkert and Jan Maas. Chapter 5 represents a change of perspective, moving away from the discrete world and reaching the non-commutative one. As in the discrete case, we discuss how classical tools coming from the commutative optimal transport can be translated into the setting of density matrices. In particular, in this final chapter we present a non-commutative version of the Schrödinger problem (or entropic regularised optimal transport problem) and discuss existence and characterisation of minimisers, a duality result, and present a non-commutative version of the well-known Sinkhorn algorithm to compute the above mentioned optimisers. This is based on a joint work with Dario Feliciangeli and Augusto Gerolin. Finally, Appendix A and B contain some additional material and discussions, with particular attention to Harnack inequalities and the regularity of flows on discrete spaces.","lang":"eng"}],"corr_author":"1","publisher":"Institute of Science and Technology Austria","department":[{"_id":"GradSch"},{"_id":"JaMa"}],"alternative_title":["ISTA Thesis"],"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"publication_status":"published","date_created":"2021-09-21T09:14:15Z","month":"09","_id":"10030","acknowledged_ssus":[{"_id":"M-Shop"},{"_id":"NanoFab"}],"year":"2021","acknowledgement":"The author gratefully acknowledges support by the Austrian Science Fund (FWF), grants No W1245.","publication_identifier":{"issn":["2663-337X"]},"degree_awarded":"PhD","oa":1,"file":[{"file_size":3876668,"creator":"cchlebak","date_created":"2021-09-21T09:17:34Z","file_name":"tex_and_pictures.zip","access_level":"closed","file_id":"10032","date_updated":"2022-03-10T12:14:42Z","relation":"source_file","checksum":"8cd60dcb8762e8f21867e21e8001e183","content_type":"application/x-zip-compressed"},{"file_id":"10047","date_updated":"2021-09-27T11:14:31Z","relation":"main_file","content_type":"application/pdf","checksum":"9789e9d967c853c1503ec7f307170279","date_created":"2021-09-27T11:14:31Z","file_name":"thesis_portinale_Final (1).pdf","file_size":2532673,"creator":"cchlebak","access_level":"open_access"}],"day":"22","doi":"10.15479/at:ista:10030","date_published":"2021-09-22T00:00:00Z","project":[{"call_identifier":"FWF","grant_number":"W1245","_id":"260788DE-B435-11E9-9278-68D0E5697425","name":"Dissipation and dispersion in nonlinear partial differential equations"},{"_id":"fc31cba2-9c52-11eb-aca3-ff467d239cd2","name":"Taming Complexity in Partial Differential Systems","grant_number":"F6504"}],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","ddc":["515"],"OA_place":"publisher","supervisor":[{"id":"4C5696CE-F248-11E8-B48F-1D18A9856A87","last_name":"Maas","full_name":"Maas, Jan","orcid":"0000-0002-0845-1338","first_name":"Jan"}],"oa_version":"Published Version","status":"public","language":[{"iso":"eng"}],"article_processing_charge":"No","has_accepted_license":"1","file_date_updated":"2022-03-10T12:14:42Z","author":[{"first_name":"Lorenzo","id":"30AD2CBC-F248-11E8-B48F-1D18A9856A87","last_name":"Portinale","full_name":"Portinale, Lorenzo"}],"title":"Discrete-to-continuum limits of transport problems and gradient flows in the space of measures","related_material":{"record":[{"id":"9792","relation":"part_of_dissertation","status":"public"},{"relation":"part_of_dissertation","id":"10022","status":"public"},{"status":"public","id":"7573","relation":"part_of_dissertation"}]},"date_updated":"2026-04-08T07:00:04Z"},{"month":"08","_id":"9733","alternative_title":["ISTA Thesis"],"date_created":"2021-07-27T15:48:30Z","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by-nd/4.0/legalcode","name":"Creative Commons Attribution-NoDerivatives 4.0 International (CC BY-ND 4.0)","short":"CC BY-ND (4.0)","image":"/image/cc_by_nd.png"},"publication_status":"published","publisher":"Institute of Science and Technology Austria","corr_author":"1","department":[{"_id":"GradSch"},{"_id":"RoSe"},{"_id":"JaMa"}],"citation":{"mla":"Feliciangeli, Dario. <i>The Polaron at Strong Coupling</i>. Institute of Science and Technology Austria, 2021, doi:<a href=\"https://doi.org/10.15479/at:ista:9733\">10.15479/at:ista:9733</a>.","ista":"Feliciangeli D. 2021. The polaron at strong coupling. Institute of Science and Technology Austria.","chicago":"Feliciangeli, Dario. “The Polaron at Strong Coupling.” Institute of Science and Technology Austria, 2021. <a href=\"https://doi.org/10.15479/at:ista:9733\">https://doi.org/10.15479/at:ista:9733</a>.","ama":"Feliciangeli D. The polaron at strong coupling. 2021. doi:<a href=\"https://doi.org/10.15479/at:ista:9733\">10.15479/at:ista:9733</a>","apa":"Feliciangeli, D. (2021). <i>The polaron at strong coupling</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/at:ista:9733\">https://doi.org/10.15479/at:ista:9733</a>","ieee":"D. Feliciangeli, “The polaron at strong coupling,” Institute of Science and Technology Austria, 2021.","short":"D. Feliciangeli, The Polaron at Strong Coupling, Institute of Science and Technology Austria, 2021."},"abstract":[{"lang":"eng","text":"This thesis is the result of the research carried out by the author during his PhD at IST Austria between 2017 and 2021. It mainly focuses on the Fröhlich polaron model, specifically to its regime of strong coupling. This model, which is rigorously introduced and discussed in the introduction, has been of great interest in condensed matter physics and field theory for more than eighty years. It is used to describe an electron interacting with the atoms of a solid material (the strength of this interaction is modeled by the presence of a coupling constant α in the Hamiltonian of the system). The particular regime examined here, which is mathematically described by considering the limit α →∞, displays many interesting features related to the emergence of classical behavior, which allows for a simplified effective description of the system under analysis. The properties, the range of validity and a quantitative analysis of the precision of such classical approximations are the main object of the present work. We specify our investigation to the study of the ground state energy of the system, its dynamics and its effective mass. For each of these problems, we provide in the introduction an overview of the previously known results and a detailed account of the original contributions by the author."}],"type":"dissertation","has_accepted_license":"1","article_processing_charge":"No","file_date_updated":"2022-03-10T12:13:57Z","status":"public","language":[{"iso":"eng"}],"page":"180","date_updated":"2026-04-08T06:59:50Z","related_material":{"record":[{"id":"9787","relation":"part_of_dissertation","status":"public"},{"status":"public","id":"9792","relation":"part_of_dissertation"},{"id":"9791","relation":"part_of_dissertation","status":"public"},{"status":"public","relation":"part_of_dissertation","id":"9781"},{"status":"public","relation":"part_of_dissertation","id":"9225"}]},"author":[{"first_name":"Dario","id":"41A639AA-F248-11E8-B48F-1D18A9856A87","last_name":"Feliciangeli","full_name":"Feliciangeli, Dario","orcid":"0000-0003-0754-8530"}],"title":"The polaron at strong coupling","oa_version":"Published Version","OA_place":"publisher","ddc":["515","519","539"],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","license":"https://creativecommons.org/licenses/by-nd/4.0/","project":[{"grant_number":"716117","name":"Optimal Transport and Stochastic Dynamics","_id":"256E75B8-B435-11E9-9278-68D0E5697425","call_identifier":"H2020"},{"name":"Analysis of quantum many-body systems","_id":"25C6DC12-B435-11E9-9278-68D0E5697425","grant_number":"694227","call_identifier":"H2020"},{"_id":"fc31cba2-9c52-11eb-aca3-ff467d239cd2","name":"Taming Complexity in Partial Differential Systems","grant_number":"F6504"}],"supervisor":[{"id":"4AFD0470-F248-11E8-B48F-1D18A9856A87","last_name":"Seiringer","full_name":"Seiringer, Robert","orcid":"0000-0002-6781-0521","first_name":"Robert"},{"first_name":"Jan","orcid":"0000-0002-0845-1338","id":"4C5696CE-F248-11E8-B48F-1D18A9856A87","last_name":"Maas","full_name":"Maas, Jan"}],"publication_identifier":{"issn":["2663-337X"]},"year":"2021","ec_funded":1,"degree_awarded":"PhD","date_published":"2021-08-20T00:00:00Z","oa":1,"file":[{"date_updated":"2021-09-06T09:28:56Z","file_id":"9944","checksum":"e88bb8ca43948abe060eb2d2fa719881","content_type":"application/pdf","relation":"main_file","file_name":"Thesis_FeliciangeliA.pdf","date_created":"2021-08-19T14:03:48Z","creator":"dfelicia","file_size":1958710,"access_level":"open_access"},{"date_created":"2021-08-19T14:06:35Z","file_name":"thesis.7z","creator":"dfelicia","file_size":3771669,"access_level":"closed","date_updated":"2022-03-10T12:13:57Z","file_id":"9945","content_type":"application/octet-stream","checksum":"72810843abee83705853505b3f8348aa","relation":"source_file"}],"day":"20","doi":"10.15479/at:ista:9733"},{"file_date_updated":"2021-11-09T09:00:50Z","article_processing_charge":"No","has_accepted_license":"1","status":"public","language":[{"iso":"eng"}],"page":"166","date_updated":"2026-04-08T07:00:31Z","related_material":{"record":[{"status":"public","id":"9987","relation":"part_of_dissertation"},{"status":"public","id":"10191","relation":"part_of_dissertation"},{"status":"public","id":"141","relation":"part_of_dissertation"},{"id":"10190","relation":"part_of_dissertation","status":"public"}]},"title":"Improved verification techniques for concurrent systems","author":[{"first_name":"Viktor","full_name":"Toman, Viktor","last_name":"Toman","id":"3AF3DA7C-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-9036-063X"}],"keyword":["concurrency","verification","model checking"],"oa_version":"Published Version","OA_place":"publisher","ddc":["000"],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","project":[{"grant_number":"665385","name":"International IST Doctoral Program","_id":"2564DBCA-B435-11E9-9278-68D0E5697425","call_identifier":"H2020"},{"call_identifier":"FWF","_id":"25F2ACDE-B435-11E9-9278-68D0E5697425","name":"Rigorous Systems Engineering","grant_number":"S11402-N23"},{"_id":"25892FC0-B435-11E9-9278-68D0E5697425","name":"Efficient Algorithms for Computer Aided Verification","grant_number":"ICT15-003"},{"grant_number":"863818","name":"Formal Methods for Stochastic Models: Algorithms and Applications","_id":"0599E47C-7A3F-11EA-A408-12923DDC885E","call_identifier":"H2020"}],"supervisor":[{"first_name":"Krishnendu","full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X"}],"degree_awarded":"PhD","ec_funded":1,"publication_identifier":{"issn":["2663-337X"]},"year":"2021","acknowledged_ssus":[{"_id":"SSU"}],"date_published":"2021-10-31T00:00:00Z","doi":"10.15479/at:ista:10199","day":"31","file":[{"content_type":"application/pdf","checksum":"4f412a1ee60952221b499a4b1268df35","relation":"main_file","date_updated":"2021-11-08T14:12:22Z","file_id":"10225","access_level":"open_access","creator":"vtoman","file_size":2915234,"file_name":"toman_th_final.pdf","date_created":"2021-11-08T14:12:22Z"},{"date_updated":"2021-11-09T09:00:50Z","file_id":"10226","content_type":"application/zip","checksum":"9584943f99127be2dd2963f6784c37d4","relation":"source_file","creator":"vtoman","file_size":8616056,"date_created":"2021-11-08T14:12:46Z","file_name":"toman_thesis.zip","access_level":"closed"}],"oa":1,"month":"10","_id":"10199","alternative_title":["ISTA Thesis"],"date_created":"2021-10-29T20:09:01Z","publication_status":"published","corr_author":"1","publisher":"Institute of Science and Technology Austria","department":[{"_id":"GradSch"},{"_id":"KrCh"}],"type":"dissertation","abstract":[{"lang":"eng","text":"The design and verification of concurrent systems remains an open challenge due to the non-determinism that arises from the inter-process communication. In particular, concurrent programs are notoriously difficult both to be written correctly and to be analyzed formally, as complex thread interaction has to be accounted for. The difficulties are further exacerbated when concurrent programs get executed on modern-day hardware, which contains various buffering and caching mechanisms for efficiency reasons. This causes further subtle non-determinism, which can often produce very unintuitive behavior of the concurrent programs. Model checking is at the forefront of tackling the verification problem, where the task is to decide, given as input a concurrent system and a desired property, whether the system satisfies the property. The inherent state-space explosion problem in model checking of concurrent systems causes naïve explicit methods not to scale, thus more inventive methods are required. One such method is stateless model checking (SMC), which explores in memory-efficient manner the program executions rather than the states of the program. State-of-the-art SMC is typically coupled with partial order reduction (POR) techniques, which argue that certain executions provably produce identical system behavior, thus limiting the amount of executions one needs to explore in order to cover all possible behaviors. Another method to tackle the state-space explosion is symbolic model checking, where the considered techniques operate on a succinct implicit representation of the input system rather than explicitly accessing the system. In this thesis we present new techniques for verification of concurrent systems. We present several novel POR methods for SMC of concurrent programs under various models of semantics, some of which account for write-buffering mechanisms. Additionally, we present novel algorithms for symbolic model checking of finite-state concurrent systems, where the desired property of the systems is to ensure a formally defined notion of fairness."}],"citation":{"short":"V. Toman, Improved Verification Techniques for Concurrent Systems, Institute of Science and Technology Austria, 2021.","mla":"Toman, Viktor. <i>Improved Verification Techniques for Concurrent Systems</i>. Institute of Science and Technology Austria, 2021, doi:<a href=\"https://doi.org/10.15479/at:ista:10199\">10.15479/at:ista:10199</a>.","chicago":"Toman, Viktor. “Improved Verification Techniques for Concurrent Systems.” Institute of Science and Technology Austria, 2021. <a href=\"https://doi.org/10.15479/at:ista:10199\">https://doi.org/10.15479/at:ista:10199</a>.","ista":"Toman V. 2021. Improved verification techniques for concurrent systems. Institute of Science and Technology Austria.","apa":"Toman, V. (2021). <i>Improved verification techniques for concurrent systems</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/at:ista:10199\">https://doi.org/10.15479/at:ista:10199</a>","ama":"Toman V. Improved verification techniques for concurrent systems. 2021. doi:<a href=\"https://doi.org/10.15479/at:ista:10199\">10.15479/at:ista:10199</a>","ieee":"V. Toman, “Improved verification techniques for concurrent systems,” Institute of Science and Technology Austria, 2021."}},{"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"publication_status":"published","date_created":"2021-10-27T15:05:34Z","external_id":{"arxiv":["2011.11763"]},"_id":"10191","month":"10","issue":"OOPSLA","scopus_import":"1","citation":{"short":"T.L. Bui, K. Chatterjee, T. Gautam, A. Pavlogiannis, V. Toman, Proceedings of the ACM on Programming Languages 5 (2021).","ama":"Bui TL, Chatterjee K, Gautam T, Pavlogiannis A, Toman V. The reads-from equivalence for the TSO and PSO memory models. <i>Proceedings of the ACM on Programming Languages</i>. 2021;5(OOPSLA). doi:<a href=\"https://doi.org/10.1145/3485541\">10.1145/3485541</a>","apa":"Bui, T. L., Chatterjee, K., Gautam, T., Pavlogiannis, A., &#38; Toman, V. (2021). The reads-from equivalence for the TSO and PSO memory models. <i>Proceedings of the ACM on Programming Languages</i>. Association for Computing Machinery. <a href=\"https://doi.org/10.1145/3485541\">https://doi.org/10.1145/3485541</a>","ieee":"T. L. Bui, K. Chatterjee, T. Gautam, A. Pavlogiannis, and V. Toman, “The reads-from equivalence for the TSO and PSO memory models,” <i>Proceedings of the ACM on Programming Languages</i>, vol. 5, no. OOPSLA. Association for Computing Machinery, 2021.","mla":"Bui, Truc Lam, et al. “The Reads-from Equivalence for the TSO and PSO Memory Models.” <i>Proceedings of the ACM on Programming Languages</i>, vol. 5, no. OOPSLA, 164, Association for Computing Machinery, 2021, doi:<a href=\"https://doi.org/10.1145/3485541\">10.1145/3485541</a>.","chicago":"Bui, Truc Lam, Krishnendu Chatterjee, Tushar Gautam, Andreas Pavlogiannis, and Viktor Toman. “The Reads-from Equivalence for the TSO and PSO Memory Models.” <i>Proceedings of the ACM on Programming Languages</i>. Association for Computing Machinery, 2021. <a href=\"https://doi.org/10.1145/3485541\">https://doi.org/10.1145/3485541</a>.","ista":"Bui TL, Chatterjee K, Gautam T, Pavlogiannis A, Toman V. 2021. The reads-from equivalence for the TSO and PSO memory models. Proceedings of the ACM on Programming Languages. 5(OOPSLA), 164."},"type":"journal_article","abstract":[{"text":"In this work we solve the algorithmic problem of consistency verification for the TSO and PSO memory models given a reads-from map, denoted VTSO-rf and VPSO-rf, respectively. For an execution of n events over k threads and d variables, we establish novel bounds that scale as nk+1 for TSO and as nk+1· min(nk2, 2k· d) for PSO. Moreover, based on our solution to these problems, we develop an SMC algorithm under TSO and PSO that uses the RF equivalence. The algorithm is exploration-optimal, in the sense that it is guaranteed to explore each class of the RF partitioning exactly once, and spends polynomial time per class when k is bounded. Finally, we implement all our algorithms in the SMC tool Nidhugg, and perform a large number of experiments over benchmarks from existing literature. Our experimental results show that our algorithms for VTSO-rf and VPSO-rf provide significant scalability improvements over standard alternatives. Moreover, when used for SMC, the RF partitioning is often much coarser than the standard Shasha-Snir partitioning for TSO/PSO, which yields a significant speedup in the model checking task.\r\n\r\n","lang":"eng"}],"quality_controlled":"1","volume":5,"department":[{"_id":"GradSch"},{"_id":"KrCh"}],"publisher":"Association for Computing Machinery","oa_version":"Published Version","keyword":["safety","risk","reliability and quality","software"],"title":"The reads-from equivalence for the TSO and PSO memory models","author":[{"last_name":"Bui","full_name":"Bui, Truc Lam","first_name":"Truc Lam"},{"orcid":"0000-0002-4561-241X","last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu"},{"first_name":"Tushar","last_name":"Gautam","full_name":"Gautam, Tushar"},{"orcid":"0000-0002-8943-0722","full_name":"Pavlogiannis, Andreas","last_name":"Pavlogiannis","id":"49704004-F248-11E8-B48F-1D18A9856A87","first_name":"Andreas"},{"first_name":"Viktor","orcid":"0000-0001-9036-063X","id":"3AF3DA7C-F248-11E8-B48F-1D18A9856A87","full_name":"Toman, Viktor","last_name":"Toman"}],"related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"10199"}]},"date_updated":"2026-04-08T07:00:31Z","status":"public","language":[{"iso":"eng"}],"has_accepted_license":"1","article_processing_charge":"No","file_date_updated":"2021-11-04T07:24:48Z","oa":1,"file":[{"file_size":2903485,"creator":"cchlebak","date_created":"2021-11-04T07:24:48Z","file_name":"2021_ProcACMPL_Bui.pdf","success":1,"access_level":"open_access","file_id":"10215","date_updated":"2021-11-04T07:24:48Z","relation":"main_file","content_type":"application/pdf","checksum":"9d6dce7b611853c529bb7b1915ac579e"}],"day":"15","doi":"10.1145/3485541","date_published":"2021-10-15T00:00:00Z","intvolume":"         5","article_number":"164","year":"2021","acknowledgement":"The research was partially funded by the ERC CoG 863818 (ForM-SMArt) and the Vienna Science\r\nand Technology Fund (WWTF) through project ICT15-003.","publication_identifier":{"eissn":["2475-1421"]},"article_type":"original","ec_funded":1,"arxiv":1,"publication":"Proceedings of the ACM on Programming Languages","project":[{"name":"Formal Methods for Stochastic Models: Algorithms and Applications","_id":"0599E47C-7A3F-11EA-A408-12923DDC885E","grant_number":"863818","call_identifier":"H2020"},{"grant_number":"ICT15-003","_id":"25892FC0-B435-11E9-9278-68D0E5697425","name":"Efficient Algorithms for Computer Aided Verification"}],"user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","ddc":["000"]},{"date_published":"2021-09-14T00:00:00Z","doi":"10.15479/at:ista:10007","day":"14","oa":1,"file":[{"access_level":"closed","date_created":"2021-09-13T11:03:24Z","file_name":"thesis_final_Hensel.zip","file_size":15022154,"creator":"shensel","relation":"source_file","checksum":"c8475faaf0b680b4971f638f1db16347","content_type":"application/x-zip-compressed","file_id":"10008","date_updated":"2021-09-15T14:37:30Z"},{"access_level":"open_access","date_created":"2021-09-13T14:18:56Z","file_name":"thesis_final_Hensel.pdf","creator":"shensel","file_size":6583638,"content_type":"application/pdf","checksum":"1a609937aa5275452822f45f2da17f07","relation":"main_file","date_updated":"2021-09-14T09:52:47Z","file_id":"10014"}],"degree_awarded":"PhD","ec_funded":1,"year":"2021","publication_identifier":{"issn":["2663-337X"]},"supervisor":[{"orcid":"0000-0002-0479-558X","id":"2C12A0B0-F248-11E8-B48F-1D18A9856A87","last_name":"Fischer","full_name":"Fischer, Julian L","first_name":"Julian L"}],"ddc":["515"],"OA_place":"publisher","project":[{"call_identifier":"H2020","grant_number":"665385","name":"International IST Doctoral Program","_id":"2564DBCA-B435-11E9-9278-68D0E5697425"},{"call_identifier":"H2020","_id":"0aa76401-070f-11eb-9043-b5bb049fa26d","name":"Bridging Scales in Random Materials","grant_number":"948819"}],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","oa_version":"Published Version","date_updated":"2026-04-08T07:01:01Z","page":"300","related_material":{"record":[{"status":"public","relation":"part_of_dissertation","id":"10012"},{"relation":"part_of_dissertation","id":"10013","status":"public"},{"status":"public","relation":"part_of_dissertation","id":"7489"}]},"author":[{"first_name":"Sebastian","orcid":"0000-0001-7252-8072","id":"4D23B7DA-F248-11E8-B48F-1D18A9856A87","full_name":"Hensel, Sebastian","last_name":"Hensel"}],"title":"Curvature driven interface evolution: Uniqueness properties of weak solution concepts","file_date_updated":"2021-09-15T14:37:30Z","article_processing_charge":"No","has_accepted_license":"1","language":[{"iso":"eng"}],"status":"public","abstract":[{"lang":"eng","text":"The present thesis is concerned with the derivation of weak-strong uniqueness principles for curvature driven interface evolution problems not satisfying a comparison principle. The specific examples being treated are two-phase Navier-Stokes flow with surface tension, modeling the evolution of two incompressible, viscous and immiscible fluids separated by a sharp interface, and multiphase mean curvature flow, which serves as an idealized model for the motion of grain boundaries in an annealing polycrystalline material. Our main results - obtained in joint works with Julian Fischer, Tim Laux and Theresa M. Simon - state that prior to the formation of geometric singularities due to topology changes, the weak solution concept of Abels (Interfaces Free Bound. 9, 2007) to two-phase Navier-Stokes flow with surface tension and the weak solution concept of Laux and Otto (Calc. Var. Partial Differential Equations 55, 2016) to multiphase mean curvature flow (for networks in R^2 or double bubbles in R^3) represents the unique solution to these interface evolution problems within the class of classical solutions, respectively. To the best of the author's knowledge, for interface evolution problems not admitting a geometric comparison principle the derivation of a weak-strong uniqueness principle represented an open problem, so that the works contained in the present thesis constitute the first positive results in this direction. The key ingredient of our approach consists of the introduction of a novel concept of relative entropies for a class of curvature driven interface evolution problems, for which the associated energy contains an interfacial contribution being proportional to the surface area of the evolving (network of) interface(s). The interfacial part of the relative entropy gives sufficient control on the interface error between a weak and a classical solution, and its time evolution can be computed, at least in principle, for any energy dissipating weak solution concept. A resulting stability estimate for the relative entropy essentially entails the above mentioned weak-strong uniqueness principles. The present thesis contains a detailed introduction to our relative entropy approach, which in particular highlights potential applications to other problems in curvature driven interface evolution not treated in this thesis."}],"type":"dissertation","citation":{"short":"S. Hensel, Curvature Driven Interface Evolution: Uniqueness Properties of Weak Solution Concepts, Institute of Science and Technology Austria, 2021.","apa":"Hensel, S. (2021). <i>Curvature driven interface evolution: Uniqueness properties of weak solution concepts</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/at:ista:10007\">https://doi.org/10.15479/at:ista:10007</a>","ama":"Hensel S. Curvature driven interface evolution: Uniqueness properties of weak solution concepts. 2021. doi:<a href=\"https://doi.org/10.15479/at:ista:10007\">10.15479/at:ista:10007</a>","ieee":"S. Hensel, “Curvature driven interface evolution: Uniqueness properties of weak solution concepts,” Institute of Science and Technology Austria, 2021.","chicago":"Hensel, Sebastian. “Curvature Driven Interface Evolution: Uniqueness Properties of Weak Solution Concepts.” Institute of Science and Technology Austria, 2021. <a href=\"https://doi.org/10.15479/at:ista:10007\">https://doi.org/10.15479/at:ista:10007</a>.","ista":"Hensel S. 2021. Curvature driven interface evolution: Uniqueness properties of weak solution concepts. Institute of Science and Technology Austria.","mla":"Hensel, Sebastian. <i>Curvature Driven Interface Evolution: Uniqueness Properties of Weak Solution Concepts</i>. Institute of Science and Technology Austria, 2021, doi:<a href=\"https://doi.org/10.15479/at:ista:10007\">10.15479/at:ista:10007</a>."},"department":[{"_id":"GradSch"},{"_id":"JuFi"}],"corr_author":"1","publisher":"Institute of Science and Technology Austria","date_created":"2021-09-13T11:12:34Z","publication_status":"published","alternative_title":["ISTA Thesis"],"_id":"10007","month":"09"},{"alternative_title":["ISTA Thesis"],"publication_status":"published","date_created":"2021-12-08T21:52:28Z","month":"12","_id":"10429","type":"dissertation","abstract":[{"lang":"eng","text":"The scalability of concurrent data structures and distributed algorithms strongly depends on\r\nreducing the contention for shared resources and the costs of synchronization and communication. We show how such cost reductions can be attained by relaxing the strict consistency conditions required by sequential implementations. In the first part of the thesis, we consider relaxation in the context of concurrent data structures. Specifically, in data structures \r\nsuch as priority queues, imposing strong semantics renders scalability impossible, since a correct implementation of the remove operation should return only the element with highest priority. Intuitively, attempting to invoke remove operations concurrently  creates a race condition. This bottleneck  can be circumvented by relaxing semantics of the affected data structure, thus allowing removal of the elements which are no longer required to have the highest priority. We prove that the randomized implementations of relaxed data structures provide provable guarantees on the priority of the removed elements even under concurrency. Additionally, we show that in some cases the relaxed data structures can be used to scale the classical algorithms which are usually implemented with the exact ones. In the second part, we study parallel variants of the  stochastic gradient descent (SGD) algorithm, which distribute computation  among the multiple processors, thus reducing the running time. Unfortunately, in order for standard parallel SGD to succeed, each processor has to maintain a local copy of the necessary model parameter, which is identical to the local copies of other processors; the overheads from this perfect consistency in terms of communication and synchronization can negate the speedup gained by distributing the computation. We show that the consistency conditions required by SGD can be  relaxed, allowing the algorithm to be more flexible in terms of tolerating quantized communication, asynchrony, or even crash faults, while its convergence remains asymptotically the same."}],"citation":{"chicago":"Nadiradze, Giorgi. “On Achieving Scalability through Relaxation.” Institute of Science and Technology Austria, 2021. <a href=\"https://doi.org/10.15479/at:ista:10429\">https://doi.org/10.15479/at:ista:10429</a>.","ista":"Nadiradze G. 2021. On achieving scalability through relaxation. Institute of Science and Technology Austria.","mla":"Nadiradze, Giorgi. <i>On Achieving Scalability through Relaxation</i>. Institute of Science and Technology Austria, 2021, doi:<a href=\"https://doi.org/10.15479/at:ista:10429\">10.15479/at:ista:10429</a>.","ieee":"G. Nadiradze, “On achieving scalability through relaxation,” Institute of Science and Technology Austria, 2021.","ama":"Nadiradze G. On achieving scalability through relaxation. 2021. doi:<a href=\"https://doi.org/10.15479/at:ista:10429\">10.15479/at:ista:10429</a>","apa":"Nadiradze, G. (2021). <i>On achieving scalability through relaxation</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/at:ista:10429\">https://doi.org/10.15479/at:ista:10429</a>","short":"G. Nadiradze, On Achieving Scalability through Relaxation, Institute of Science and Technology Austria, 2021."},"publisher":"Institute of Science and Technology Austria","corr_author":"1","department":[{"_id":"GradSch"},{"_id":"DaAl"}],"oa_version":"Published Version","status":"public","language":[{"iso":"eng"}],"file_date_updated":"2022-03-28T12:55:12Z","has_accepted_license":"1","article_processing_charge":"No","title":"On achieving scalability through relaxation","author":[{"last_name":"Nadiradze","full_name":"Nadiradze, Giorgi","id":"3279A00C-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-5634-0731","first_name":"Giorgi"}],"related_material":{"record":[{"id":"10435","relation":"part_of_dissertation","status":"public"},{"id":"10432","relation":"part_of_dissertation","status":"public"},{"relation":"part_of_dissertation","id":"6673","status":"public"},{"relation":"part_of_dissertation","id":"5965","status":"public"}]},"date_updated":"2026-04-08T07:00:46Z","page":"132","degree_awarded":"PhD","ec_funded":1,"publication_identifier":{"issn":["2663-337X"]},"year":"2021","doi":"10.15479/at:ista:10429","day":"09","file":[{"creator":"gnadirad","file_size":2370859,"success":1,"file_name":"Thesis_Final_09_12_2021.pdf","date_created":"2021-12-09T17:47:49Z","access_level":"open_access","date_updated":"2021-12-09T17:47:49Z","file_id":"10436","checksum":"6bf14e9a523387328f016c0689f5e10e","content_type":"application/pdf","relation":"main_file"},{"file_id":"10437","date_updated":"2022-03-28T12:55:12Z","relation":"source_file","checksum":"914d6c5ca86bd0add471971a8f4c4341","content_type":"application/zip","file_size":2596924,"creator":"gnadirad","date_created":"2021-12-09T17:47:49Z","file_name":"Thesis_Final_09_12_2021.zip","access_level":"closed"}],"oa":1,"date_published":"2021-12-09T00:00:00Z","project":[{"call_identifier":"H2020","_id":"268A44D6-B435-11E9-9278-68D0E5697425","name":"Elastic Coordination for Scalable Machine Learning","grant_number":"805223"}],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","ddc":["000"],"OA_place":"publisher","supervisor":[{"first_name":"Dan-Adrian","orcid":"0000-0003-3650-940X","full_name":"Alistarh, Dan-Adrian","last_name":"Alistarh","id":"4A899BFC-F248-11E8-B48F-1D18A9856A87"}]},{"publisher":"Institute of Science and Technology Austria","corr_author":"1","department":[{"_id":"GradSch"},{"_id":"ChLa"}],"type":"dissertation","abstract":[{"lang":"eng","text":"Deep learning is best known for its empirical success across a wide range of applications\r\nspanning computer vision, natural language processing and speech. Of equal significance,\r\nthough perhaps less known, are its ramifications for learning theory: deep networks have\r\nbeen observed to perform surprisingly well in the high-capacity regime, aka the overfitting\r\nor underspecified regime. Classically, this regime on the far right of the bias-variance curve\r\nis associated with poor generalisation; however, recent experiments with deep networks\r\nchallenge this view.\r\n\r\nThis thesis is devoted to investigating various aspects of underspecification in deep learning.\r\nFirst, we argue that deep learning models are underspecified on two levels: a) any given\r\ntraining dataset can be fit by many different functions, and b) any given function can be\r\nexpressed by many different parameter configurations. We refer to the second kind of\r\nunderspecification as parameterisation redundancy and we precisely characterise its extent.\r\nSecond, we characterise the implicit criteria (the inductive bias) that guide learning in the\r\nunderspecified regime. Specifically, we consider a nonlinear but tractable classification\r\nsetting, and show that given the choice, neural networks learn classifiers with a large margin.\r\nThird, we consider learning scenarios where the inductive bias is not by itself sufficient to\r\ndeal with underspecification. We then study different ways of ‘tightening the specification’: i)\r\nIn the setting of representation learning with variational autoencoders, we propose a hand-\r\ncrafted regulariser based on mutual information. ii) In the setting of binary classification, we\r\nconsider soft-label (real-valued) supervision. We derive a generalisation bound for linear\r\nnetworks supervised in this way and verify that soft labels facilitate fast learning. Finally, we\r\nexplore an application of soft-label supervision to the training of multi-exit models."}],"citation":{"mla":"Phuong, Mary. <i>Underspecification in Deep Learning</i>. Institute of Science and Technology Austria, 2021, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:9418\">10.15479/AT:ISTA:9418</a>.","ista":"Phuong M. 2021. Underspecification in deep learning. Institute of Science and Technology Austria.","chicago":"Phuong, Mary. “Underspecification in Deep Learning.” Institute of Science and Technology Austria, 2021. <a href=\"https://doi.org/10.15479/AT:ISTA:9418\">https://doi.org/10.15479/AT:ISTA:9418</a>.","ieee":"M. Phuong, “Underspecification in deep learning,” Institute of Science and Technology Austria, 2021.","ama":"Phuong M. Underspecification in deep learning. 2021. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:9418\">10.15479/AT:ISTA:9418</a>","apa":"Phuong, M. (2021). <i>Underspecification in deep learning</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:9418\">https://doi.org/10.15479/AT:ISTA:9418</a>","short":"M. Phuong, Underspecification in Deep Learning, Institute of Science and Technology Austria, 2021."},"month":"05","_id":"9418","alternative_title":["ISTA Thesis"],"date_created":"2021-05-24T13:06:23Z","publication_status":"published","OA_place":"publisher","ddc":["000"],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","supervisor":[{"first_name":"Christoph","last_name":"Lampert","full_name":"Lampert, Christoph","id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-8622-7887"}],"degree_awarded":"PhD","publication_identifier":{"issn":["2663-337X"]},"year":"2021","acknowledged_ssus":[{"_id":"ScienComp"},{"_id":"CampIT"},{"_id":"E-Lib"}],"date_published":"2021-05-30T00:00:00Z","day":"30","doi":"10.15479/AT:ISTA:9418","file":[{"access_level":"open_access","creator":"bphuong","file_size":2673905,"file_name":"mph-thesis-v519-pdfimages.pdf","date_created":"2021-05-24T11:22:29Z","success":1,"checksum":"4f0abe64114cfed264f9d36e8d1197e3","content_type":"application/pdf","relation":"main_file","date_updated":"2021-05-24T11:22:29Z","file_id":"9419"},{"access_level":"closed","date_created":"2021-05-24T11:56:02Z","file_name":"thesis.zip","file_size":92995100,"creator":"bphuong","relation":"source_file","checksum":"f5699e876bc770a9b0df8345a77720a2","content_type":"application/zip","file_id":"9420","date_updated":"2021-05-24T11:56:02Z"}],"oa":1,"file_date_updated":"2021-05-24T11:56:02Z","article_processing_charge":"No","has_accepted_license":"1","status":"public","language":[{"iso":"eng"}],"page":"125","related_material":{"record":[{"id":"7435","relation":"part_of_dissertation","status":"deleted"},{"id":"7481","relation":"part_of_dissertation","status":"public"},{"id":"9416","relation":"part_of_dissertation","status":"public"},{"relation":"part_of_dissertation","id":"7479","status":"public"}]},"date_updated":"2026-04-08T07:01:17Z","author":[{"id":"3EC6EE64-F248-11E8-B48F-1D18A9856A87","last_name":"Bui Thi Mai","full_name":"Bui Thi Mai, Phuong","first_name":"Phuong"}],"title":"Underspecification in deep learning","oa_version":"Published Version"},{"oa_version":"Published Version","date_updated":"2026-04-08T07:01:30Z","related_material":{"record":[{"status":"public","relation":"part_of_dissertation","id":"187"},{"relation":"part_of_dissertation","id":"8703","status":"public"}]},"page":"134","title":"Multi-cover persistence and Delaunay mosaics","author":[{"last_name":"Osang","full_name":"Osang, Georg F","id":"464B40D6-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8882-5116","first_name":"Georg F"}],"article_processing_charge":"No","has_accepted_license":"1","file_date_updated":"2021-02-03T10:37:28Z","language":[{"iso":"eng"}],"status":"public","date_published":"2021-02-01T00:00:00Z","oa":1,"file":[{"content_type":"application/zip","checksum":"bcf27986147cab0533b6abadd74e7629","relation":"source_file","date_updated":"2021-02-03T10:37:28Z","file_id":"9063","access_level":"closed","file_name":"thesis_source.zip","date_created":"2021-02-02T14:09:25Z","creator":"patrickd","file_size":13446994},{"date_created":"2021-02-02T14:09:18Z","success":1,"file_name":"thesis_pdfA2b.pdf","creator":"patrickd","file_size":5210329,"access_level":"open_access","date_updated":"2021-02-02T14:09:18Z","file_id":"9064","checksum":"9cc8af266579a464385bbe2aff6af606","content_type":"application/pdf","relation":"main_file"}],"doi":"10.15479/AT:ISTA:9056","day":"01","publication_identifier":{"issn":["2663-337X"]},"year":"2021","degree_awarded":"PhD","supervisor":[{"full_name":"Edelsbrunner, Herbert","last_name":"Edelsbrunner","id":"3FB178DA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9823-6833","first_name":"Herbert"}],"OA_place":"publisher","ddc":["006","514","516"],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","date_created":"2021-02-02T14:11:06Z","tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"publication_status":"published","alternative_title":["ISTA Thesis"],"_id":"9056","place":"Klosterneuburg","month":"02","citation":{"short":"G.F. Osang, Multi-Cover Persistence and Delaunay Mosaics, Institute of Science and Technology Austria, 2021.","ama":"Osang GF. Multi-cover persistence and Delaunay mosaics. 2021. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:9056\">10.15479/AT:ISTA:9056</a>","ieee":"G. F. Osang, “Multi-cover persistence and Delaunay mosaics,” Institute of Science and Technology Austria, Klosterneuburg, 2021.","apa":"Osang, G. F. (2021). <i>Multi-cover persistence and Delaunay mosaics</i>. Institute of Science and Technology Austria, Klosterneuburg. <a href=\"https://doi.org/10.15479/AT:ISTA:9056\">https://doi.org/10.15479/AT:ISTA:9056</a>","mla":"Osang, Georg F. <i>Multi-Cover Persistence and Delaunay Mosaics</i>. Institute of Science and Technology Austria, 2021, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:9056\">10.15479/AT:ISTA:9056</a>.","chicago":"Osang, Georg F. “Multi-Cover Persistence and Delaunay Mosaics.” Institute of Science and Technology Austria, 2021. <a href=\"https://doi.org/10.15479/AT:ISTA:9056\">https://doi.org/10.15479/AT:ISTA:9056</a>.","ista":"Osang GF. 2021. Multi-cover persistence and Delaunay mosaics. Klosterneuburg: Institute of Science and Technology Austria."},"type":"dissertation","abstract":[{"text":"In this thesis we study persistence of multi-covers of Euclidean balls and the geometric structures underlying their computation, in particular Delaunay mosaics and Voronoi tessellations. The k-fold cover for some discrete input point set consists of the space where at least k balls of radius r around the input points overlap. Persistence is a notion that captures, in some sense, the topology of the shape underlying the input. While persistence is usually computed for the union of balls, the k-fold cover is of interest as it captures local density,\r\nand thus might approximate the shape of the input better if the input data is noisy. To compute persistence of these k-fold covers, we need a discretization that is provided by higher-order Delaunay mosaics. We present and implement a simple and efficient algorithm for the computation of higher-order Delaunay mosaics, and use it to give experimental results for their combinatorial properties. The algorithm makes use of a new geometric structure, the rhomboid tiling. It contains the higher-order Delaunay mosaics as slices, and by introducing a filtration\r\nfunction on the tiling, we also obtain higher-order α-shapes as slices. These allow us to compute persistence of the multi-covers for varying radius r; the computation for varying k is less straight-foward and involves the rhomboid tiling directly. We apply our algorithms to experimental sphere packings to shed light on their structural properties. Finally, inspired by periodic structures in packings and materials, we propose and implement an algorithm for periodic Delaunay triangulations to be integrated into the Computational Geometry Algorithms Library (CGAL), and discuss the implications on persistence for periodic data sets.","lang":"eng"}],"department":[{"_id":"HeEd"},{"_id":"GradSch"}],"publisher":"Institute of Science and Technology Austria","corr_author":"1"},{"year":"2021","date_published":"2021-05-01T00:00:00Z","day":"01","file":[{"file_id":"9417","date_updated":"2021-05-24T11:15:57Z","relation":"main_file","checksum":"f34ff17017527db5ba6927f817bdd125","content_type":"application/pdf","file_name":"iclr2021_conference.pdf","date_created":"2021-05-24T11:15:57Z","file_size":502356,"creator":"bphuong","access_level":"open_access"}],"oa":1,"ddc":["000"],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publication":"9th International Conference on Learning Representations","oa_version":"Published Version","file_date_updated":"2021-05-24T11:15:57Z","article_processing_charge":"No","has_accepted_license":"1","status":"public","language":[{"iso":"eng"}],"related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"9418"}]},"date_updated":"2026-04-08T07:01:16Z","author":[{"first_name":"Phuong","last_name":"Bui Thi Mai","full_name":"Bui Thi Mai, Phuong","id":"3EC6EE64-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Christoph","orcid":"0000-0001-8622-7887","id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","last_name":"Lampert","full_name":"Lampert, Christoph"}],"title":"The inductive bias of ReLU networks on orthogonally separable data","quality_controlled":"1","abstract":[{"text":"We study the inductive bias of two-layer ReLU networks trained by gradient flow. We identify a class of easy-to-learn (`orthogonally separable') datasets, and characterise the solution that ReLU networks trained on such datasets converge to. Irrespective of network width, the solution turns out to be a combination of two max-margin classifiers: one corresponding to the positive data subset and one corresponding to the negative data subset. The proof is based on the recently introduced concept of extremal sectors, for which we prove a number of properties in the context of orthogonal separability. In particular, we prove stationarity of activation patterns from some time  onwards, which enables a reduction of the ReLU network to an ensemble of linear subnetworks.","lang":"eng"}],"type":"conference","citation":{"short":"M. Phuong, C. Lampert, in:, 9th International Conference on Learning Representations, 2021.","mla":"Phuong, Mary, and Christoph Lampert. “The Inductive Bias of ReLU Networks on Orthogonally Separable Data.” <i>9th International Conference on Learning Representations</i>, 2021.","ista":"Phuong M, Lampert C. 2021. The inductive bias of ReLU networks on orthogonally separable data. 9th International Conference on Learning Representations. ICLR: International Conference on Learning Representations.","chicago":"Phuong, Mary, and Christoph Lampert. “The Inductive Bias of ReLU Networks on Orthogonally Separable Data.” In <i>9th International Conference on Learning Representations</i>, 2021.","apa":"Phuong, M., &#38; Lampert, C. (2021). The inductive bias of ReLU networks on orthogonally separable data. In <i>9th International Conference on Learning Representations</i>. Virtual.","ieee":"M. Phuong and C. Lampert, “The inductive bias of ReLU networks on orthogonally separable data,” in <i>9th International Conference on Learning Representations</i>, Virtual, 2021.","ama":"Phuong M, Lampert C. The inductive bias of ReLU networks on orthogonally separable data. In: <i>9th International Conference on Learning Representations</i>. ; 2021."},"main_file_link":[{"open_access":"1","url":"https://openreview.net/pdf?id=krz7T0xU9Z_"}],"corr_author":"1","department":[{"_id":"GradSch"},{"_id":"ChLa"}],"conference":{"end_date":"2021-05-07","location":"Virtual","name":"ICLR: International Conference on Learning Representations","start_date":"2021-05-03"},"date_created":"2021-05-24T11:16:46Z","publication_status":"published","scopus_import":"1","month":"05","_id":"9416"},{"alternative_title":["ISTA Thesis"],"date_created":"2021-08-16T09:44:09Z","publication_status":"published","month":"08","_id":"9920","type":"dissertation","abstract":[{"text":"This work is concerned with two fascinating circuit quantum electrodynamics components, the Josephson junction and the geometric superinductor, and the interesting experiments that can be done by combining the two. The Josephson junction has revolutionized the field of superconducting circuits as a non-linear dissipation-less circuit element and is used in almost all superconducting qubit implementations since the 90s. On the other hand, the superinductor is a relatively new circuit element introduced as a key component of the fluxonium qubit in 2009. This is an inductor with characteristic impedance larger than the resistance quantum and self-resonance frequency in the GHz regime. The combination of these two elements can occur in two fundamental ways: in parallel and in series. When connected in parallel the two create the fluxonium qubit, a loop with large inductance and a rich energy spectrum reliant on quantum tunneling. On the other hand placing the two elements in series aids with the measurement of the IV curve of a single Josephson junction in a high impedance environment. In this limit theory predicts that the junction will behave as its dual element: the phase-slip junction. While the Josephson junction acts as a non-linear inductor the phase-slip junction has the behavior of a non-linear capacitance and can be used to measure new Josephson junction phenomena, namely Coulomb blockade of Cooper pairs and phase-locked Bloch oscillations. The latter experiment allows for a direct link between frequency and current which is an elusive connection in quantum metrology. This work introduces the geometric superinductor, a superconducting circuit element where the high inductance is due to the geometry rather than the material properties of the superconductor, realized from a highly miniaturized superconducting planar coil. These structures will be described and characterized as resonators and qubit inductors and progress towards the measurement of phase-locked Bloch oscillations will be presented.","lang":"eng"}],"citation":{"mla":"Peruzzo, Matilda. <i>Geometric Superinductors and Their Applications in Circuit Quantum Electrodynamics</i>. Institute of Science and Technology Austria, 2021, doi:<a href=\"https://doi.org/10.15479/at:ista:9920\">10.15479/at:ista:9920</a>.","chicago":"Peruzzo, Matilda. “Geometric Superinductors and Their Applications in Circuit Quantum Electrodynamics.” Institute of Science and Technology Austria, 2021. <a href=\"https://doi.org/10.15479/at:ista:9920\">https://doi.org/10.15479/at:ista:9920</a>.","ista":"Peruzzo M. 2021. Geometric superinductors and their applications in circuit quantum electrodynamics. Institute of Science and Technology Austria.","ieee":"M. Peruzzo, “Geometric superinductors and their applications in circuit quantum electrodynamics,” Institute of Science and Technology Austria, 2021.","apa":"Peruzzo, M. (2021). <i>Geometric superinductors and their applications in circuit quantum electrodynamics</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/at:ista:9920\">https://doi.org/10.15479/at:ista:9920</a>","ama":"Peruzzo M. Geometric superinductors and their applications in circuit quantum electrodynamics. 2021. doi:<a href=\"https://doi.org/10.15479/at:ista:9920\">10.15479/at:ista:9920</a>","short":"M. Peruzzo, Geometric Superinductors and Their Applications in Circuit Quantum Electrodynamics, Institute of Science and Technology Austria, 2021."},"publisher":"Institute of Science and Technology Austria","corr_author":"1","department":[{"_id":"GradSch"},{"_id":"JoFi"}],"keyword":["quantum computing","superinductor","quantum metrology"],"oa_version":"Published Version","file_date_updated":"2021-09-06T08:39:47Z","has_accepted_license":"1","article_processing_charge":"No","status":"public","language":[{"iso":"eng"}],"related_material":{"record":[{"id":"9928","relation":"part_of_dissertation","status":"public"},{"status":"public","id":"8755","relation":"part_of_dissertation"}]},"date_updated":"2026-04-15T06:43:02Z","page":"149","title":"Geometric superinductors and their applications in circuit quantum electrodynamics","author":[{"first_name":"Matilda","orcid":"0000-0002-3415-4628","last_name":"Peruzzo","full_name":"Peruzzo, Matilda","id":"3F920B30-F248-11E8-B48F-1D18A9856A87"}],"degree_awarded":"PhD","publication_identifier":{"issn":["2663-337X"],"isbn":["978-3-99078-013-8"]},"year":"2021","acknowledged_ssus":[{"_id":"NanoFab"},{"_id":"M-Shop"}],"date_published":"2021-08-19T00:00:00Z","doi":"10.15479/at:ista:9920","day":"19","file":[{"relation":"source_file","content_type":"application/x-zip-compressed","checksum":"3cd1986efde5121d7581f6fcf9090da8","file_id":"9924","date_updated":"2021-09-06T08:39:47Z","access_level":"closed","file_name":"GeometricSuperinductorsForCQED.zip","date_created":"2021-08-16T09:33:21Z","file_size":151387283,"creator":"mperuzzo"},{"access_level":"open_access","creator":"mperuzzo","file_size":17596344,"date_created":"2021-08-18T14:20:06Z","file_name":"GeometricSuperinductorsAndTheirApplicationsIncQED-1b.pdf","checksum":"50928c621cdf0775d7a5906b9dc8602c","content_type":"application/pdf","relation":"main_file","date_updated":"2021-09-06T08:39:47Z","file_id":"9939"},{"description":"Extra copy of the thesis as PDF/A-2b","date_created":"2021-08-18T14:20:09Z","file_name":"GeometricSuperinductorsAndTheirApplicationsIncQED-2b.pdf","file_size":17592425,"creator":"mperuzzo","access_level":"closed","file_id":"9940","date_updated":"2021-09-06T08:39:47Z","relation":"other","content_type":"application/pdf","checksum":"37f486aa1b622fe44af00d627ec13f6c"}],"oa":1,"ddc":["539"],"OA_place":"publisher","user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","supervisor":[{"orcid":"0000-0001-8112-028X","id":"4B591CBA-F248-11E8-B48F-1D18A9856A87","full_name":"Fink, Johannes M","last_name":"Fink","first_name":"Johannes M"}]},{"external_id":{"isi":["000674930900132"]},"publication_status":"published","date_created":"2021-08-08T22:01:27Z","month":"08","issue":"4","scopus_import":"1","_id":"9818","citation":{"apa":"Sperl, G., Narain, R., &#38; Wojtan, C. (2021). Mechanics-aware deformation of yarn pattern geometry. <i>ACM Transactions on Graphics</i>. Association for Computing Machinery. <a href=\"https://doi.org/10.1145/3450626.3459816\">https://doi.org/10.1145/3450626.3459816</a>","ieee":"G. Sperl, R. Narain, and C. Wojtan, “Mechanics-aware deformation of yarn pattern geometry,” <i>ACM Transactions on Graphics</i>, vol. 40, no. 4. Association for Computing Machinery, 2021.","ama":"Sperl G, Narain R, Wojtan C. Mechanics-aware deformation of yarn pattern geometry. <i>ACM Transactions on Graphics</i>. 2021;40(4). doi:<a href=\"https://doi.org/10.1145/3450626.3459816\">10.1145/3450626.3459816</a>","mla":"Sperl, Georg, et al. “Mechanics-Aware Deformation of Yarn Pattern Geometry.” <i>ACM Transactions on Graphics</i>, vol. 40, no. 4, 168, Association for Computing Machinery, 2021, doi:<a href=\"https://doi.org/10.1145/3450626.3459816\">10.1145/3450626.3459816</a>.","chicago":"Sperl, Georg, Rahul Narain, and Chris Wojtan. “Mechanics-Aware Deformation of Yarn Pattern Geometry.” <i>ACM Transactions on Graphics</i>. Association for Computing Machinery, 2021. <a href=\"https://doi.org/10.1145/3450626.3459816\">https://doi.org/10.1145/3450626.3459816</a>.","ista":"Sperl G, Narain R, Wojtan C. 2021. Mechanics-aware deformation of yarn pattern geometry. ACM Transactions on Graphics. 40(4), 168.","short":"G. Sperl, R. Narain, C. Wojtan, ACM Transactions on Graphics 40 (2021)."},"abstract":[{"text":"Triangle mesh-based simulations are able to produce satisfying animations of knitted and woven cloth; however, they lack the rich geometric detail of yarn-level simulations. Naive texturing approaches do not consider yarn-level physics, while full yarn-level simulations may become prohibitively expensive for large garments. We propose a method to animate yarn-level cloth geometry on top of an underlying deforming mesh in a mechanics-aware fashion. Using triangle strains to interpolate precomputed yarn geometry, we are able to reproduce effects such as knit loops tightening under stretching. In combination with precomputed mesh animation or real-time mesh simulation, our method is able to animate yarn-level cloth in real-time at large scales.","lang":"eng"}],"type":"journal_article","quality_controlled":"1","publisher":"Association for Computing Machinery","main_file_link":[{"url":"https://doi.org/10.1145/3450626.3459816","open_access":"1"}],"volume":40,"department":[{"_id":"GradSch"},{"_id":"ChWo"}],"oa_version":"Published Version","status":"public","language":[{"iso":"eng"}],"article_processing_charge":"Yes (in subscription journal)","author":[{"first_name":"Georg","full_name":"Sperl, Georg","last_name":"Sperl","id":"4DD40360-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Narain, Rahul","last_name":"Narain","first_name":"Rahul"},{"id":"3C61F1D2-F248-11E8-B48F-1D18A9856A87","full_name":"Wojtan, Christopher J","last_name":"Wojtan","orcid":"0000-0001-6646-5546","first_name":"Christopher J"}],"title":"Mechanics-aware deformation of yarn pattern geometry","date_updated":"2026-04-16T08:21:26Z","related_material":{"record":[{"id":"9327","relation":"software","status":"public"},{"id":"12358","relation":"dissertation_contains","status":"public"}],"link":[{"url":"https://ist.ac.at/en/news/knitting-virtual-yarn/","description":"News on IST Webpage","relation":"press_release"}]},"article_number":"168","acknowledged_ssus":[{"_id":"ScienComp"}],"article_type":"original","publication_identifier":{"eissn":["1557-7368"],"issn":["0730-0301"]},"acknowledgement":"We wish to thank the anonymous reviewers and the members of the Visual Computing Group at IST Austria for their valuable feedback. We also thank Seddi Labs for providing the garment model with fold-over seams.\r\nThis research was supported by the Scientific Service Units (SSU) of IST Austria through resources provided by Scientific\r\nComputing. This project has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 638176. Rahul Narain is supported by a Pankaj Gupta Young Faculty Fellowship and a gift from Adobe Inc.","year":"2021","ec_funded":1,"oa":1,"doi":"10.1145/3450626.3459816","day":"01","date_published":"2021-08-01T00:00:00Z","intvolume":"        40","user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","project":[{"call_identifier":"H2020","grant_number":"638176","_id":"2533E772-B435-11E9-9278-68D0E5697425","name":"Big Splash: Efficient Simulation of Natural Phenomena at Extremely Large Scales"}],"isi":1,"publication":"ACM Transactions on Graphics"},{"status":"public","month":"05","has_accepted_license":"1","file_date_updated":"2021-04-26T09:33:44Z","author":[{"first_name":"Georg","id":"4DD40360-F248-11E8-B48F-1D18A9856A87","full_name":"Sperl, Georg","last_name":"Sperl"},{"full_name":"Narain, Rahul","last_name":"Narain","first_name":"Rahul"},{"id":"3C61F1D2-F248-11E8-B48F-1D18A9856A87","last_name":"Wojtan","full_name":"Wojtan, Christopher J","orcid":"0000-0001-6646-5546","first_name":"Christopher J"}],"title":"Mechanics-Aware Deformation of Yarn Pattern Geometry (Additional Animation/Model Data)","_id":"9327","related_material":{"record":[{"status":"public","relation":"used_for_analysis_in","id":"9818"}]},"date_updated":"2026-04-16T08:21:25Z","gitlab_commit_id":"6a77e7e22769230ae5f5edaa090fb4b828e57573","tmp":{"short":"MIT","name":"The MIT License","legal_code_url":"https://opensource.org/licenses/MIT"},"date_created":"2021-04-16T14:26:19Z","publisher":"IST Austria","user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","license":"https://opensource.org/licenses/MIT","ddc":["005"],"gitlab_url":"https://git.ist.ac.at/gsperl/MADYPG","department":[{"_id":"GradSch"},{"_id":"ChWo"}],"year":"2021","oa":1,"citation":{"short":"G. Sperl, R. Narain, C. Wojtan, (2021).","apa":"Sperl, G., Narain, R., &#38; Wojtan, C. (2021). Mechanics-Aware Deformation of Yarn Pattern Geometry (Additional Animation/Model Data). IST Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:9327\">https://doi.org/10.15479/AT:ISTA:9327</a>","ama":"Sperl G, Narain R, Wojtan C. Mechanics-Aware Deformation of Yarn Pattern Geometry (Additional Animation/Model Data). 2021. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:9327\">10.15479/AT:ISTA:9327</a>","ieee":"G. Sperl, R. Narain, and C. Wojtan, “Mechanics-Aware Deformation of Yarn Pattern Geometry (Additional Animation/Model Data).” IST Austria, 2021.","mla":"Sperl, Georg, et al. <i>Mechanics-Aware Deformation of Yarn Pattern Geometry (Additional Animation/Model Data)</i>. IST Austria, 2021, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:9327\">10.15479/AT:ISTA:9327</a>.","ista":"Sperl G, Narain R, Wojtan C. 2021. Mechanics-Aware Deformation of Yarn Pattern Geometry (Additional Animation/Model Data), IST Austria, <a href=\"https://doi.org/10.15479/AT:ISTA:9327\">10.15479/AT:ISTA:9327</a>.","chicago":"Sperl, Georg, Rahul Narain, and Chris Wojtan. “Mechanics-Aware Deformation of Yarn Pattern Geometry (Additional Animation/Model Data).” IST Austria, 2021. <a href=\"https://doi.org/10.15479/AT:ISTA:9327\">https://doi.org/10.15479/AT:ISTA:9327</a>."},"file":[{"access_level":"open_access","file_size":802586232,"creator":"gsperl","date_created":"2021-04-16T14:15:12Z","file_name":"MADYPG_extra_data.zip","success":1,"relation":"main_file","checksum":"0324cb519273371708743f3282e7c081","content_type":"application/zip","file_id":"9328","date_updated":"2021-04-16T14:15:12Z"},{"date_updated":"2021-04-26T09:33:44Z","file_id":"9353","checksum":"4c224551adf852b136ec21a4e13f0c1b","content_type":"application/gzip","relation":"main_file","date_created":"2021-04-26T09:33:44Z","file_name":"MADYPG.zip","creator":"pub-gitlab-bot","file_size":64962865,"access_level":"open_access"}],"abstract":[{"lang":"eng","text":"This archive contains the missing sweater mesh animations and displacement models for the code of \"Mechanics-Aware Deformation of Yarn Pattern Geometry\"\r\n\r\nCode Repository: https://git.ist.ac.at/gsperl/MADYPG"}],"type":"software","doi":"10.15479/AT:ISTA:9327","date_published":"2021-05-01T00:00:00Z"},{"acknowledgement":"Guillermo Pascual-Perez and Michelle Yeo were funded by the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska–Curie Grant Agreement No. 665385; the remaining contributors to this project have received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (682815 - TOCNeT).","year":"2021","publication_identifier":{"issn":["0302-9743"],"eissn":["1611-3349"],"isbn":["9783030755386"]},"ec_funded":1,"date_published":"2021-05-11T00:00:00Z","intvolume":"     12704","oa":1,"day":"11","doi":"10.1007/978-3-030-75539-3_17","user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","project":[{"call_identifier":"H2020","grant_number":"665385","_id":"2564DBCA-B435-11E9-9278-68D0E5697425","name":"International IST Doctoral Program"},{"_id":"258AA5B2-B435-11E9-9278-68D0E5697425","name":"Teaching Old Crypto New Tricks","grant_number":"682815","call_identifier":"H2020"}],"publication":"Topics in Cryptology – CT-RSA 2021","oa_version":"Submitted Version","article_processing_charge":"No","status":"public","language":[{"iso":"eng"}],"page":"399-421","date_updated":"2026-04-16T09:28:46Z","author":[{"orcid":"0000-0002-7553-6606","id":"D33D2B18-E445-11E9-ABB7-15F4E5697425","full_name":"Auerbach, Benedikt","last_name":"Auerbach","first_name":"Benedikt"},{"full_name":"Chakraborty, Suvradip","last_name":"Chakraborty","id":"B9CD0494-D033-11E9-B219-A439E6697425","first_name":"Suvradip"},{"id":"3E83A2F8-F248-11E8-B48F-1D18A9856A87","last_name":"Klein","full_name":"Klein, Karen","first_name":"Karen"},{"first_name":"Guillermo","orcid":"0000-0001-8630-415X","full_name":"Pascual Perez, Guillermo","last_name":"Pascual Perez","id":"2D7ABD02-F248-11E8-B48F-1D18A9856A87"},{"orcid":"0000-0002-9139-1654","last_name":"Pietrzak","full_name":"Pietrzak, Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","first_name":"Krzysztof Z"},{"id":"488F98B0-F248-11E8-B48F-1D18A9856A87","last_name":"Walter","full_name":"Walter, Michael","orcid":"0000-0003-3186-2482","first_name":"Michael"},{"orcid":"0009-0001-3676-4809","full_name":"Yeo, Michelle X","last_name":"Yeo","id":"2D82B818-F248-11E8-B48F-1D18A9856A87","first_name":"Michelle X"}],"title":"Inverse-Sybil attacks in automated contact tracing","quality_controlled":"1","citation":{"short":"B. Auerbach, S. Chakraborty, K. Klein, G. Pascual Perez, K.Z. Pietrzak, M. Walter, M.X. Yeo, in:, Topics in Cryptology – CT-RSA 2021, Springer Nature, 2021, pp. 399–421.","mla":"Auerbach, Benedikt, et al. “Inverse-Sybil Attacks in Automated Contact Tracing.” <i>Topics in Cryptology – CT-RSA 2021</i>, vol. 12704, Springer Nature, 2021, pp. 399–421, doi:<a href=\"https://doi.org/10.1007/978-3-030-75539-3_17\">10.1007/978-3-030-75539-3_17</a>.","chicago":"Auerbach, Benedikt, Suvradip Chakraborty, Karen Klein, Guillermo Pascual Perez, Krzysztof Z Pietrzak, Michael Walter, and Michelle X Yeo. “Inverse-Sybil Attacks in Automated Contact Tracing.” In <i>Topics in Cryptology – CT-RSA 2021</i>, 12704:399–421. Springer Nature, 2021. <a href=\"https://doi.org/10.1007/978-3-030-75539-3_17\">https://doi.org/10.1007/978-3-030-75539-3_17</a>.","ista":"Auerbach B, Chakraborty S, Klein K, Pascual Perez G, Pietrzak KZ, Walter M, Yeo MX. 2021. Inverse-Sybil attacks in automated contact tracing. Topics in Cryptology – CT-RSA 2021. CT-RSA: Cryptographers’ Track at the RSA Conference, LNCS, vol. 12704, 399–421.","ieee":"B. Auerbach <i>et al.</i>, “Inverse-Sybil attacks in automated contact tracing,” in <i>Topics in Cryptology – CT-RSA 2021</i>, Virtual Event, 2021, vol. 12704, pp. 399–421.","ama":"Auerbach B, Chakraborty S, Klein K, et al. Inverse-Sybil attacks in automated contact tracing. In: <i>Topics in Cryptology – CT-RSA 2021</i>. Vol 12704. Springer Nature; 2021:399-421. doi:<a href=\"https://doi.org/10.1007/978-3-030-75539-3_17\">10.1007/978-3-030-75539-3_17</a>","apa":"Auerbach, B., Chakraborty, S., Klein, K., Pascual Perez, G., Pietrzak, K. Z., Walter, M., &#38; Yeo, M. X. (2021). Inverse-Sybil attacks in automated contact tracing. In <i>Topics in Cryptology – CT-RSA 2021</i> (Vol. 12704, pp. 399–421). Virtual Event: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-75539-3_17\">https://doi.org/10.1007/978-3-030-75539-3_17</a>"},"type":"conference","abstract":[{"text":"Automated contract tracing aims at supporting manual contact tracing during pandemics by alerting users of encounters with infected people. There are currently many proposals for protocols (like the “decentralized” DP-3T and PACT or the “centralized” ROBERT and DESIRE) to be run on mobile phones, where the basic idea is to regularly broadcast (using low energy Bluetooth) some values, and at the same time store (a function of) incoming messages broadcasted by users in their proximity. In the existing proposals one can trigger false positives on a massive scale by an “inverse-Sybil” attack, where a large number of devices (malicious users or hacked phones) pretend to be the same user, such that later, just a single person needs to be diagnosed (and allowed to upload) to trigger an alert for all users who were in proximity to any of this large group of devices.\r\n\r\nWe propose the first protocols that do not succumb to such attacks assuming the devices involved in the attack do not constantly communicate, which we observe is a necessary assumption. The high level idea of the protocols is to derive the values to be broadcasted by a hash chain, so that two (or more) devices who want to launch an inverse-Sybil attack will not be able to connect their respective chains and thus only one of them will be able to upload. Our protocols also achieve security against replay, belated replay, and one of them even against relay attacks.","lang":"eng"}],"main_file_link":[{"url":"https://eprint.iacr.org/2020/670","open_access":"1"}],"publisher":"Springer Nature","corr_author":"1","department":[{"_id":"KrPi"},{"_id":"GradSch"}],"volume":12704,"alternative_title":["LNCS"],"conference":{"end_date":"2021-05-20","location":"Virtual Event","name":"CT-RSA: Cryptographers’ Track at the RSA Conference","start_date":"2021-05-17"},"date_created":"2021-08-08T22:01:30Z","publication_status":"published","scopus_import":"1","month":"05","_id":"9826"},{"department":[{"_id":"GradSch"},{"_id":"KrPi"}],"publisher":"Institute of Science and Technology Austria","corr_author":"1","type":"dissertation","abstract":[{"text":"Many security definitions come in two flavors: a stronger “adaptive” flavor, where the adversary can arbitrarily make various choices during the course of the attack, and a weaker “selective” flavor where the adversary must commit to some or all of their choices a-priori. For example, in the context of identity-based encryption, selective security requires the adversary to decide on the identity of the attacked party at the very beginning of the game whereas adaptive security allows the attacker to first see the master public key and some secret keys before making this choice. Often, it appears to be much easier to achieve selective security than it is to achieve adaptive security. A series of several recent works shows how to cleverly achieve adaptive security in several such scenarios including generalized selective decryption [Pan07][FJP15], constrained PRFs [FKPR14], and Yao’s garbled circuits [JW16]. Although the above works expressed vague intuition that they share a common technique, the connection was never made precise. In this work we present a new framework (published at Crypto ’17 [JKK+17a]) that connects all of these works and allows us to present them in a unified and simplified fashion. Having the framework in place, we show how to achieve adaptive security for proxy re-encryption schemes (published at PKC ’19 [FKKP19]) and provide the first adaptive security proofs for continuous group key agreement protocols (published at S&P ’21 [KPW+21]). Questioning optimality of our framework, we then show that currently used proof techniques cannot lead to significantly better security guarantees for \"graph-building\" games (published at TCC ’21 [KKPW21a]). These games cover generalized selective decryption, as well as the security of prominent constructions for constrained PRFs, continuous group key agreement, and proxy re-encryption. Finally, we revisit the adaptive security of Yao’s garbled circuits and extend the analysis of Jafargholi and Wichs in two directions: While they prove adaptive security only for a modified construction with increased online complexity, we provide the first positive results for the original construction by Yao (published at TCC ’21 [KKP21a]). On the negative side, we prove that the results of Jafargholi and Wichs are essentially optimal by showing that no black-box reduction can provide a significantly better security bound (published at Crypto ’21 [KKPW21c]).","lang":"eng"}],"citation":{"chicago":"Klein, Karen. “On the Adaptive Security of Graph-Based Games.” Institute of Science and Technology Austria, 2021. <a href=\"https://doi.org/10.15479/at:ista:10035\">https://doi.org/10.15479/at:ista:10035</a>.","ista":"Klein K. 2021. On the adaptive security of graph-based games. Institute of Science and Technology Austria.","mla":"Klein, Karen. <i>On the Adaptive Security of Graph-Based Games</i>. Institute of Science and Technology Austria, 2021, doi:<a href=\"https://doi.org/10.15479/at:ista:10035\">10.15479/at:ista:10035</a>.","ama":"Klein K. On the adaptive security of graph-based games. 2021. doi:<a href=\"https://doi.org/10.15479/at:ista:10035\">10.15479/at:ista:10035</a>","apa":"Klein, K. (2021). <i>On the adaptive security of graph-based games</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/at:ista:10035\">https://doi.org/10.15479/at:ista:10035</a>","ieee":"K. Klein, “On the adaptive security of graph-based games,” Institute of Science and Technology Austria, 2021.","short":"K. Klein, On the Adaptive Security of Graph-Based Games, Institute of Science and Technology Austria, 2021."},"_id":"10035","month":"09","date_created":"2021-09-23T07:31:44Z","publication_status":"published","tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"alternative_title":["ISTA Thesis"],"supervisor":[{"first_name":"Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","full_name":"Pietrzak, Krzysztof Z","last_name":"Pietrzak","orcid":"0000-0002-9139-1654"}],"OA_place":"publisher","ddc":["519"],"project":[{"call_identifier":"H2020","name":"Teaching Old Crypto New Tricks","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","grant_number":"682815"}],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","date_published":"2021-09-23T00:00:00Z","doi":"10.15479/at:ista:10035","day":"23","oa":1,"file":[{"checksum":"73a44345c683e81f3e765efbf86fdcc5","content_type":"application/pdf","relation":"main_file","date_updated":"2021-10-04T12:22:33Z","file_id":"10082","access_level":"open_access","creator":"cchlebak","file_size":2104726,"date_created":"2021-10-04T12:22:33Z","file_name":"thesis_pdfa.pdf","success":1},{"date_updated":"2022-03-10T12:15:18Z","file_id":"10085","checksum":"7b80df30a0e686c3ef6a56d4e1c59e29","content_type":"application/x-zip-compressed","relation":"source_file","file_name":"thesis_final (1).zip","date_created":"2021-10-05T07:04:37Z","creator":"cchlebak","file_size":9538359,"access_level":"closed"}],"ec_funded":1,"degree_awarded":"PhD","year":"2021","publication_identifier":{"issn":["2663-337X"]},"acknowledgement":"I want to acknowledge the funding by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (682815 - TOCNeT).\r\n","page":"276","date_updated":"2026-04-16T09:52:03Z","related_material":{"record":[{"status":"public","relation":"part_of_dissertation","id":"10044"},{"relation":"part_of_dissertation","id":"10048","status":"public"},{"status":"public","relation":"part_of_dissertation","id":"10041"},{"relation":"part_of_dissertation","id":"10049","status":"public"},{"relation":"part_of_dissertation","id":"637","status":"public"},{"status":"public","relation":"part_of_dissertation","id":"6430"}]},"author":[{"id":"3E83A2F8-F248-11E8-B48F-1D18A9856A87","last_name":"Klein","full_name":"Klein, Karen","first_name":"Karen"}],"title":"On the adaptive security of graph-based games","file_date_updated":"2022-03-10T12:15:18Z","has_accepted_license":"1","article_processing_charge":"No","status":"public","language":[{"iso":"eng"}],"oa_version":"Published Version"},{"_id":"9760","month":"07","scopus_import":"1","publication_status":"published","tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"date_created":"2021-08-01T22:01:21Z","external_id":{"isi":["000669830600001"],"arxiv":["2101.05742"]},"volume":5,"department":[{"_id":"GradSch"},{"_id":"MaSe"}],"corr_author":"1","publisher":"Verein zur Förderung des Open Access Publizierens in den Quantenwissenschaften","abstract":[{"lang":"eng","text":"The quantum approximate optimization algorithm (QAOA) is a prospective near-term quantum algorithm due to its modest circuit depth and promising benchmarks. However, an external parameter optimization required in the QAOA could become a performance bottleneck. This motivates studies of the optimization landscape and search for heuristic ways of parameter initialization. In this work we visualize the optimization landscape of the QAOA applied to the MaxCut problem on random graphs, demonstrating that random initialization of the QAOA is prone to converging to local minima with suboptimal performance. We introduce the initialization of QAOA parameters based on the Trotterized quantum annealing (TQA) protocol, parameterized by the Trotter time step. We find that the TQA initialization allows to circumvent\r\nthe issue of false minima for a broad range of time steps, yielding the same performance as the best result out of an exponentially scaling number of random initializations. Moreover, we demonstrate that the optimal value of the time step coincides with the point of proliferation of Trotter errors in quantum annealing. Our results suggest practical ways of initializing QAOA protocols on near-term quantum devices and reveal new connections between QAOA and quantum annealing."}],"type":"journal_article","citation":{"apa":"Sack, S., &#38; Serbyn, M. (2021). Quantum annealing initialization of the quantum approximate optimization algorithm. <i>Quantum</i>. Verein zur Förderung des Open Access Publizierens in den Quantenwissenschaften. <a href=\"https://doi.org/10.22331/Q-2021-07-01-491\">https://doi.org/10.22331/Q-2021-07-01-491</a>","ieee":"S. Sack and M. Serbyn, “Quantum annealing initialization of the quantum approximate optimization algorithm,” <i>Quantum</i>, vol. 5. Verein zur Förderung des Open Access Publizierens in den Quantenwissenschaften, 2021.","ama":"Sack S, Serbyn M. Quantum annealing initialization of the quantum approximate optimization algorithm. <i>Quantum</i>. 2021;5. doi:<a href=\"https://doi.org/10.22331/Q-2021-07-01-491\">10.22331/Q-2021-07-01-491</a>","mla":"Sack, Stefan, and Maksym Serbyn. “Quantum Annealing Initialization of the Quantum Approximate Optimization Algorithm.” <i>Quantum</i>, vol. 5, 491, Verein zur Förderung des Open Access Publizierens in den Quantenwissenschaften, 2021, doi:<a href=\"https://doi.org/10.22331/Q-2021-07-01-491\">10.22331/Q-2021-07-01-491</a>.","ista":"Sack S, Serbyn M. 2021. Quantum annealing initialization of the quantum approximate optimization algorithm. Quantum. 5, 491.","chicago":"Sack, Stefan, and Maksym Serbyn. “Quantum Annealing Initialization of the Quantum Approximate Optimization Algorithm.” <i>Quantum</i>. Verein zur Förderung des Open Access Publizierens in den Quantenwissenschaften, 2021. <a href=\"https://doi.org/10.22331/Q-2021-07-01-491\">https://doi.org/10.22331/Q-2021-07-01-491</a>.","short":"S. Sack, M. Serbyn, Quantum 5 (2021)."},"quality_controlled":"1","title":"Quantum annealing initialization of the quantum approximate optimization algorithm","author":[{"first_name":"Stefan","last_name":"Sack","full_name":"Sack, Stefan","id":"dd622248-f6e0-11ea-865d-ce382a1c81a5","orcid":"0000-0001-5400-8508"},{"orcid":"0000-0002-2399-5827","full_name":"Serbyn, Maksym","last_name":"Serbyn","id":"47809E7E-F248-11E8-B48F-1D18A9856A87","first_name":"Maksym"}],"date_updated":"2026-05-14T22:30:24Z","related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"14622"}]},"language":[{"iso":"eng"}],"status":"public","file_date_updated":"2021-08-06T06:44:31Z","article_processing_charge":"Yes","has_accepted_license":"1","oa_version":"Published Version","publication":"Quantum","arxiv":1,"isi":1,"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","project":[{"call_identifier":"H2020","_id":"23841C26-32DE-11EA-91FC-C7463DDC885E","name":"Non-Ergodic Quantum Matter: Universality, Dynamics and Control","grant_number":"850899"}],"ddc":["530"],"day":"01","doi":"10.22331/Q-2021-07-01-491","oa":1,"file":[{"relation":"main_file","content_type":"application/pdf","checksum":"9706c2bb8e748e9b5b138381995a7f6f","file_id":"9774","date_updated":"2021-08-06T06:44:31Z","access_level":"open_access","file_size":2312482,"creator":"cchlebak","date_created":"2021-08-06T06:44:31Z","file_name":"2021_Quantum_Sack.pdf"}],"intvolume":"         5","date_published":"2021-07-01T00:00:00Z","article_number":"491","ec_funded":1,"acknowledgement":"We would like to thank D. Abanin and R. Medina for fruitful discussions and A. Smith and I. Kim for valuable feedback on the manuscript. We acknowledge support by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation program (Grant Agreement No. 850899).","article_type":"original","year":"2021","publication_identifier":{"eissn":["2521-327X"]}},{"department":[{"_id":"GradSch"},{"_id":"JoCs"},{"_id":"GaTk"}],"publication":"bioRxiv","publisher":"Cold Spring Harbor Laboratory","project":[{"call_identifier":"FP7","_id":"25681D80-B435-11E9-9278-68D0E5697425","name":"International IST Postdoc Fellowship Programme","grant_number":"291734"},{"call_identifier":"H2020","name":"International IST Doctoral Program","_id":"2564DBCA-B435-11E9-9278-68D0E5697425","grant_number":"665385"},{"grant_number":"281511","_id":"257A4776-B435-11E9-9278-68D0E5697425","name":"Memory-related information processing in neuronal circuits of the hippocampus and entorhinal cortex","call_identifier":"FP7"},{"_id":"626c45b5-2b32-11ec-9570-e509828c1ba6","name":"Efficient coding with biophysical realism","grant_number":"P34015"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","main_file_link":[{"url":"https://www.biorxiv.org/content/10.1101/2021.09.28.460602","open_access":"1"}],"oa":1,"citation":{"ama":"Nardin M, Csicsvari JL, Tkačik G, Savin C. The structure of hippocampal CA1 interactions optimizes spatial coding across experience. <i>bioRxiv</i>. doi:<a href=\"https://doi.org/10.1101/2021.09.28.460602\">10.1101/2021.09.28.460602</a>","ieee":"M. Nardin, J. L. Csicsvari, G. Tkačik, and C. Savin, “The structure of hippocampal CA1 interactions optimizes spatial coding across experience,” <i>bioRxiv</i>. Cold Spring Harbor Laboratory.","apa":"Nardin, M., Csicsvari, J. L., Tkačik, G., &#38; Savin, C. (n.d.). The structure of hippocampal CA1 interactions optimizes spatial coding across experience. <i>bioRxiv</i>. Cold Spring Harbor Laboratory. <a href=\"https://doi.org/10.1101/2021.09.28.460602\">https://doi.org/10.1101/2021.09.28.460602</a>","ista":"Nardin M, Csicsvari JL, Tkačik G, Savin C. The structure of hippocampal CA1 interactions optimizes spatial coding across experience. bioRxiv, <a href=\"https://doi.org/10.1101/2021.09.28.460602\">10.1101/2021.09.28.460602</a>.","chicago":"Nardin, Michele, Jozsef L Csicsvari, Gašper Tkačik, and Cristina Savin. “The Structure of Hippocampal CA1 Interactions Optimizes Spatial Coding across Experience.” <i>BioRxiv</i>. Cold Spring Harbor Laboratory, n.d. <a href=\"https://doi.org/10.1101/2021.09.28.460602\">https://doi.org/10.1101/2021.09.28.460602</a>.","mla":"Nardin, Michele, et al. “The Structure of Hippocampal CA1 Interactions Optimizes Spatial Coding across Experience.” <i>BioRxiv</i>, Cold Spring Harbor Laboratory, doi:<a href=\"https://doi.org/10.1101/2021.09.28.460602\">10.1101/2021.09.28.460602</a>.","short":"M. Nardin, J.L. Csicsvari, G. Tkačik, C. Savin, BioRxiv (n.d.)."},"day":"29","abstract":[{"text":"Although much is known about how single neurons in the hippocampus represent an animal’s position, how cell-cell interactions contribute to spatial coding remains poorly understood. Using a novel statistical estimator and theoretical modeling, both developed in the framework of maximum entropy models, we reveal highly structured cell-to-cell interactions whose statistics depend on familiar vs. novel environment. In both conditions the circuit interactions optimize the encoding of spatial information, but for regimes that differ in the signal-to-noise ratio of their spatial inputs. Moreover, the topology of the interactions facilitates linear decodability, making the information easy to read out by downstream circuits. These findings suggest that the efficient coding hypothesis is not applicable only to individual neuron properties in the sensory periphery, but also to neural interactions in the central brain.","lang":"eng"}],"type":"preprint","doi":"10.1101/2021.09.28.460602","date_published":"2021-09-29T00:00:00Z","acknowledgement":"We thank Peter Baracskay, Karola Kaefer and Hugo Malagon-Vina for the acquisition of the data. We thank Federico Stella for comments on an earlier version of the manuscript. MN was supported by European Union Horizon 2020 grant 665385, JC was supported by European Research Council consolidator grant 281511, GT was supported by the Austrian Science Fund (FWF) grant P34015, CS was supported by an IST fellow grant, National Institute of Mental Health Award 1R01MH125571-01, by the National Science Foundation under NSF Award No. 1922658 and a Google faculty award.","year":"2021","ec_funded":1,"title":"The structure of hippocampal CA1 interactions optimizes spatial coding across experience","author":[{"first_name":"Michele","last_name":"Nardin","full_name":"Nardin, Michele","id":"30BD0376-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-8849-6570"},{"first_name":"Jozsef L","full_name":"Csicsvari, Jozsef L","last_name":"Csicsvari","id":"3FA14672-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-5193-4036"},{"orcid":"0000-0002-6699-1455","id":"3D494DCA-F248-11E8-B48F-1D18A9856A87","full_name":"Tkačik, Gašper","last_name":"Tkačik","first_name":"Gašper"},{"first_name":"Cristina","full_name":"Savin, Cristina","last_name":"Savin","id":"3933349E-F248-11E8-B48F-1D18A9856A87"}],"related_material":{"record":[{"id":"14656","relation":"later_version","status":"public"},{"status":"public","relation":"dissertation_contains","id":"11932"}]},"_id":"10077","date_updated":"2026-05-14T22:30:42Z","month":"09","language":[{"iso":"eng"}],"status":"public","article_processing_charge":"No","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","short":"CC BY-NC-ND (4.0)","image":"/images/cc_by_nc_nd.png"},"publication_status":"draft","oa_version":"Preprint","date_created":"2021-10-04T06:23:34Z"},{"author":[{"first_name":"Laura","last_name":"Schmid","full_name":"Schmid, Laura","id":"38B437DE-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-6978-7329"}],"title":"Evolution of cooperation via (in)direct reciprocity under imperfect information","related_material":{"record":[{"id":"9997","relation":"part_of_dissertation","status":"public"},{"status":"public","relation":"part_of_dissertation","id":"9402"},{"status":"public","id":"2","relation":"part_of_dissertation"}]},"date_updated":"2026-04-08T07:11:20Z","page":"171","language":[{"iso":"eng"}],"status":"public","article_processing_charge":"No","has_accepted_license":"1","file_date_updated":"2022-12-20T23:30:08Z","oa_version":"Published Version","supervisor":[{"last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","first_name":"Krishnendu"}],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","project":[{"_id":"2581B60A-B435-11E9-9278-68D0E5697425","name":"Quantitative Graph Games: Theory and Applications","grant_number":"279307","call_identifier":"FP7"},{"name":"Formal Methods for Stochastic Models: Algorithms and Applications","_id":"0599E47C-7A3F-11EA-A408-12923DDC885E","grant_number":"863818","call_identifier":"H2020"},{"call_identifier":"FWF","name":"Formal methods for the design and analysis of complex systems","_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211"},{"call_identifier":"FWF","grant_number":"P 23499-N23","_id":"2584A770-B435-11E9-9278-68D0E5697425","name":"Modern Graph Algorithmic Techniques in Formal Verification"},{"call_identifier":"FWF","grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","name":"Rigorous Systems Engineering"}],"OA_place":"publisher","ddc":["519","576"],"oa":1,"file":[{"creator":"lschmid","file_size":29703124,"date_created":"2021-11-18T12:41:46Z","file_name":"submission_new.zip","access_level":"closed","embargo_to":"open_access","date_updated":"2022-12-20T23:30:08Z","file_id":"10305","content_type":"application/zip","checksum":"86a05b430756ca12ae8107b6e6f3c1e5","relation":"source_file"},{"date_updated":"2022-12-20T23:30:08Z","file_id":"10306","content_type":"application/pdf","checksum":"d940af042e94660c6b6a7b4f0b184d47","relation":"main_file","date_created":"2021-11-18T12:59:15Z","file_name":"thesis_new_upload.pdf","embargo":"2022-10-18","creator":"lschmid","file_size":8320985,"access_level":"open_access"}],"day":"17","doi":"10.15479/at:ista:10293","date_published":"2021-11-17T00:00:00Z","year":"2021","publication_identifier":{"issn":["2663-337X"]},"degree_awarded":"PhD","ec_funded":1,"_id":"10293","month":"11","publication_status":"published","date_created":"2021-11-15T17:12:57Z","alternative_title":["ISTA Thesis"],"department":[{"_id":"GradSch"},{"_id":"KrCh"}],"publisher":"Institute of Science and Technology Austria","corr_author":"1","citation":{"ama":"Schmid L. Evolution of cooperation via (in)direct reciprocity under imperfect information. 2021. doi:<a href=\"https://doi.org/10.15479/at:ista:10293\">10.15479/at:ista:10293</a>","ieee":"L. Schmid, “Evolution of cooperation via (in)direct reciprocity under imperfect information,” Institute of Science and Technology Austria, 2021.","apa":"Schmid, L. (2021). <i>Evolution of cooperation via (in)direct reciprocity under imperfect information</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/at:ista:10293\">https://doi.org/10.15479/at:ista:10293</a>","mla":"Schmid, Laura. <i>Evolution of Cooperation via (in)Direct Reciprocity under Imperfect Information</i>. Institute of Science and Technology Austria, 2021, doi:<a href=\"https://doi.org/10.15479/at:ista:10293\">10.15479/at:ista:10293</a>.","ista":"Schmid L. 2021. Evolution of cooperation via (in)direct reciprocity under imperfect information. Institute of Science and Technology Austria.","chicago":"Schmid, Laura. “Evolution of Cooperation via (in)Direct Reciprocity under Imperfect Information.” Institute of Science and Technology Austria, 2021. <a href=\"https://doi.org/10.15479/at:ista:10293\">https://doi.org/10.15479/at:ista:10293</a>.","short":"L. Schmid, Evolution of Cooperation via (in)Direct Reciprocity under Imperfect Information, Institute of Science and Technology Austria, 2021."},"type":"dissertation","abstract":[{"lang":"eng","text":"Indirect reciprocity in evolutionary game theory is a prominent mechanism for explaining the evolution of cooperation among unrelated individuals. In contrast to direct reciprocity, which is based on individuals meeting repeatedly, and conditionally cooperating by using their own experiences, indirect reciprocity is based on individuals’ reputations. If a player helps another, this increases the helper’s public standing, benefitting them in the future. This lets cooperation in the population emerge without individuals having to meet more than once. While the two modes of reciprocity are intertwined, they are difficult to compare. Thus, they are usually studied in isolation. Direct reciprocity can maintain cooperation with simple strategies, and is robust against noise even when players do not remember more\r\nthan their partner’s last action. Meanwhile, indirect reciprocity requires its successful strategies, or social norms, to be more complex. Exhaustive search previously identified eight such norms, called the “leading eight”, which excel at maintaining cooperation. However, as the first result of this thesis, we show that the leading eight break down once we remove the fundamental assumption that information is synchronized and public, such that everyone agrees on reputations. Once we consider a more realistic scenario of imperfect information, where reputations are private, and individuals occasionally misinterpret or miss observations, the leading eight do not promote cooperation anymore. Instead, minor initial disagreements can proliferate, fragmenting populations into subgroups. In a next step, we consider ways to mitigate this issue. We first explore whether introducing “generosity” can stabilize cooperation when players use the leading eight strategies in noisy environments. This approach of modifying strategies to include probabilistic elements for coping with errors is known to work well in direct reciprocity. However, as we show here, it fails for the more complex norms of indirect reciprocity. Imperfect information still prevents cooperation from evolving. On the other hand, we succeeded to show in this thesis that modifying the leading eight to use “quantitative assessment”, i.e. tracking reputation scores on a scale beyond good and bad, and making overall judgments of others based on a threshold, is highly successful, even when noise increases in the environment. Cooperation can flourish when reputations\r\nare more nuanced, and players have a broader understanding what it means to be “good.” Finally, we present a single theoretical framework that unites the two modes of reciprocity despite their differences. Within this framework, we identify a novel simple and successful strategy for indirect reciprocity, which can cope with noisy environments and has an analogue in direct reciprocity. We can also analyze decision making when different sources of information are available. Our results help highlight that for sustaining cooperation, already the most simple rules of reciprocity can be sufficient."}]},{"date_created":"2021-09-09T07:37:20Z","publication_status":"published","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","short":"CC BY-NC-ND (4.0)","image":"/images/cc_by_nc_nd.png"},"alternative_title":["ISTA Thesis"],"_id":"9992","month":"09","abstract":[{"text":"Blood – this is what animals use to heal wounds fast and efficient. Plants do not have blood circulation and their cells cannot move. However, plants have evolved remarkable capacities to regenerate tissues and organs preventing further damage. In my PhD research, I studied the wound healing in the Arabidopsis root. I used a UV laser to ablate single cells in the root tip and observed the consequent wound healing. Interestingly, the inner adjacent cells induced a\r\ndivision plane switch and subsequently adopted the cell type of the killed cell to replace it. We termed this form of wound healing “restorative divisions”. This initial observation triggered the questions of my PhD studies: How and why do cells orient their division planes, how do they feel the wound and why does this happen only in inner adjacent cells.\r\nFor answering these questions, I used a quite simple experimental setup: 5 day - old seedlings were stained with propidium iodide to visualize cell walls and dead cells; ablation was carried out using a special laser cutter and a confocal microscope. Adaptation of the novel vertical microscope system made it possible to observe wounds in real time. This revealed that restorative divisions occur at increased frequency compared to normal divisions. Additionally,\r\nthe major plant hormone auxin accumulates in wound adjacent cells and drives the expression of the wound-stress responsive transcription factor ERF115. Using this as a marker gene for wound responses, we found that an important part of wound signalling is the sensing of the collapse of the ablated cell. The collapse causes a radical pressure drop, which results in strong tissue deformations. These deformations manifest in an invasion of the now free spot specifically by the inner adjacent cells within seconds, probably because of higher pressure of the inner tissues. Long-term imaging revealed that those deformed cells continuously expand towards the wound hole and that this is crucial for the restorative division. These wound-expanding cells exhibit an abnormal, biphasic polarity of microtubule arrays\r\nbefore the division. Experiments inhibiting cell expansion suggest that it is the biphasic stretching that induces those MT arrays. Adapting the micromanipulator aspiration system from animal scientists at our institute confirmed the hypothesis that stretching influences microtubule stability. In conclusion, this shows that microtubules react to tissue deformation\r\nand this facilitates the observed division plane switch. This puts mechanical cues and tensions at the most prominent position for explaining the growth and wound healing properties of plants. Hence, it shines light onto the importance of understanding mechanical signal transduction. ","lang":"eng"}],"type":"dissertation","citation":{"short":"L. Hörmayer, Wound Healing in the Arabidopsis Root Meristem, Institute of Science and Technology Austria, 2021.","chicago":"Hörmayer, Lukas. “Wound Healing in the Arabidopsis Root Meristem.” Institute of Science and Technology Austria, 2021. <a href=\"https://doi.org/10.15479/at:ista:9992\">https://doi.org/10.15479/at:ista:9992</a>.","ista":"Hörmayer L. 2021. Wound healing in the Arabidopsis root meristem. Institute of Science and Technology Austria.","mla":"Hörmayer, Lukas. <i>Wound Healing in the Arabidopsis Root Meristem</i>. Institute of Science and Technology Austria, 2021, doi:<a href=\"https://doi.org/10.15479/at:ista:9992\">10.15479/at:ista:9992</a>.","ieee":"L. Hörmayer, “Wound healing in the Arabidopsis root meristem,” Institute of Science and Technology Austria, 2021.","apa":"Hörmayer, L. (2021). <i>Wound healing in the Arabidopsis root meristem</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/at:ista:9992\">https://doi.org/10.15479/at:ista:9992</a>","ama":"Hörmayer L. Wound healing in the Arabidopsis root meristem. 2021. doi:<a href=\"https://doi.org/10.15479/at:ista:9992\">10.15479/at:ista:9992</a>"},"department":[{"_id":"GradSch"},{"_id":"JiFr"}],"corr_author":"1","publisher":"Institute of Science and Technology Austria","oa_version":"Published Version","related_material":{"record":[{"status":"public","id":"6943","relation":"part_of_dissertation"},{"id":"8002","relation":"part_of_dissertation","status":"public"},{"relation":"part_of_dissertation","id":"6351","status":"public"}]},"date_updated":"2026-04-08T07:11:47Z","page":"168","author":[{"first_name":"Lukas","last_name":"Hörmayer","full_name":"Hörmayer, Lukas","id":"2EEE7A2A-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-8295-2926"}],"title":"Wound healing in the Arabidopsis root meristem","file_date_updated":"2021-09-15T22:30:26Z","article_processing_charge":"No","has_accepted_license":"1","status":"public","language":[{"iso":"eng"}],"date_published":"2021-09-13T00:00:00Z","doi":"10.15479/at:ista:9992","day":"13","file":[{"file_size":25179004,"creator":"lhoermaye","date_created":"2021-09-09T07:29:48Z","file_name":"Thesis_vupload.docx","access_level":"closed","embargo_to":"open_access","file_id":"9993","date_updated":"2021-09-15T22:30:26Z","relation":"source_file","checksum":"c763064adaa720e16066c1a4f9682bbb","content_type":"application/vnd.openxmlformats-officedocument.wordprocessingml.document"},{"file_id":"9996","date_updated":"2021-09-15T22:30:26Z","relation":"main_file","checksum":"53911b06e93d7cdbbf4c7f4c162fa70f","content_type":"application/pdf","file_size":6246900,"creator":"lhoermaye","embargo":"2021-09-09","file_name":"Thesis_vfinal_pdfa.pdf","date_created":"2021-09-09T14:25:08Z","access_level":"open_access"}],"oa":1,"degree_awarded":"PhD","ec_funded":1,"publication_identifier":{"issn":["2663-337X"]},"year":"2021","acknowledged_ssus":[{"_id":"Bio"},{"_id":"LifeSc"}],"supervisor":[{"orcid":"0000-0002-8302-7596","id":"4159519E-F248-11E8-B48F-1D18A9856A87","full_name":"Friml, Jiří","last_name":"Friml","first_name":"Jiří"}],"OA_place":"publisher","ddc":["575"],"project":[{"call_identifier":"FWF","name":"RNA-directed DNA methylation in plant development","_id":"262EF96E-B435-11E9-9278-68D0E5697425","grant_number":"P29988"},{"call_identifier":"H2020","grant_number":"742985","_id":"261099A6-B435-11E9-9278-68D0E5697425","name":"Tracing Evolution of Auxin Transport and Polarity in Plants"}],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd"}]
