[{"month":"11","author":[{"last_name":"Montero","full_name":"Montero, Juan","first_name":"Juan"},{"last_name":"Heisenberg","full_name":"Heisenberg, Carl-Philipp J","orcid":"0000-0002-0912-4566","id":"39427864-F248-11E8-B48F-1D18A9856A87","first_name":"Carl-Philipp J"}],"volume":14,"date_updated":"2021-01-12T07:55:02Z","publication":"Trends in Cell Biology","doi":"10.1016/j.tcb.2004.09.008","extern":"1","issue":"11","status":"public","page":"620 - 627","publisher":"Cell Press","article_processing_charge":"No","citation":{"mla":"Montero, Juan, and Carl-Philipp J. Heisenberg. “Gastrulation Dynamics: Cells Move into Focus.” <i>Trends in Cell Biology</i>, vol. 14, no. 11, Cell Press, 2004, pp. 620–27, doi:<a href=\"https://doi.org/10.1016/j.tcb.2004.09.008\">10.1016/j.tcb.2004.09.008</a>.","short":"J. Montero, C.-P.J. Heisenberg, Trends in Cell Biology 14 (2004) 620–627.","ieee":"J. Montero and C.-P. J. Heisenberg, “Gastrulation dynamics: cells move into focus,” <i>Trends in Cell Biology</i>, vol. 14, no. 11. Cell Press, pp. 620–627, 2004.","apa":"Montero, J., &#38; Heisenberg, C.-P. J. (2004). Gastrulation dynamics: cells move into focus. <i>Trends in Cell Biology</i>. Cell Press. <a href=\"https://doi.org/10.1016/j.tcb.2004.09.008\">https://doi.org/10.1016/j.tcb.2004.09.008</a>","ama":"Montero J, Heisenberg C-PJ. Gastrulation dynamics: cells move into focus. <i>Trends in Cell Biology</i>. 2004;14(11):620-627. doi:<a href=\"https://doi.org/10.1016/j.tcb.2004.09.008\">10.1016/j.tcb.2004.09.008</a>","ista":"Montero J, Heisenberg C-PJ. 2004. Gastrulation dynamics: cells move into focus. Trends in Cell Biology. 14(11), 620–627.","chicago":"Montero, Juan, and Carl-Philipp J Heisenberg. “Gastrulation Dynamics: Cells Move into Focus.” <i>Trends in Cell Biology</i>. Cell Press, 2004. <a href=\"https://doi.org/10.1016/j.tcb.2004.09.008\">https://doi.org/10.1016/j.tcb.2004.09.008</a>."},"day":"01","publication_status":"published","publist_id":"1948","type":"journal_article","abstract":[{"lang":"eng","text":"During vertebrate gastrulation, a relatively limited number of blastodermal cells undergoes a stereotypical set of cellular movements that leads to formation of the three germ layers: ectoderm, mesoderm and endoderm. Gastrulation, therefore, provides a unique developmental system in which to study cell movements in vivo in a fairly simple cellular context. Recent advances have been made in elucidating the cellular and molecular mechanisms that underlie cell movements during zebrafish gastrulation. These findings can be compared with observations made in other model systems to identify potential general mechanisms of cell migration during development."}],"_id":"4172","language":[{"iso":"eng"}],"oa_version":"None","title":"Gastrulation dynamics: cells move into focus","date_created":"2018-12-11T12:07:23Z","date_published":"2004-11-01T00:00:00Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","year":"2004","intvolume":"        14"},{"volume":131,"author":[{"last_name":"Kruse","full_name":"Kruse, Karsten","first_name":"Karsten"},{"full_name":"Pantazis, Periklis","last_name":"Pantazis","first_name":"Periklis"},{"orcid":"0000-0003-4398-476X","id":"3E6DB97A-F248-11E8-B48F-1D18A9856A87","first_name":"Mark Tobias","full_name":"Bollenbach, Mark Tobias","last_name":"Bollenbach"},{"last_name":"Julicher","full_name":"Julicher, Frank","first_name":"Frank"},{"first_name":"Marcos","last_name":"Gonzalez Gaitan","full_name":"Gonzalez Gaitan, Marcos"}],"date_updated":"2021-01-12T07:55:26Z","publication":"Development","month":"01","doi":"10.1242/dev.01335","extern":"1","issue":"19","article_processing_charge":"No","status":"public","page":"4843 - 4856","publisher":"Company of Biologists","day":"01","citation":{"chicago":"Kruse, Karsten, Periklis Pantazis, Mark Tobias Bollenbach, Frank Julicher, and Marcos Gonzalez Gaitan. “Dpp Gradient Formation by Dynamin-Dependent Endocytosis: Receptor Trafficking and the Diffusion Model.” <i>Development</i>. Company of Biologists, 2004. <a href=\"https://doi.org/10.1242/dev.01335\">https://doi.org/10.1242/dev.01335</a>.","ista":"Kruse K, Pantazis P, Bollenbach MT, Julicher F, Gonzalez Gaitan M. 2004. Dpp gradient formation by dynamin-dependent endocytosis: receptor trafficking and the diffusion model. Development. 131(19), 4843–4856.","ama":"Kruse K, Pantazis P, Bollenbach MT, Julicher F, Gonzalez Gaitan M. Dpp gradient formation by dynamin-dependent endocytosis: receptor trafficking and the diffusion model. <i>Development</i>. 2004;131(19):4843-4856. doi:<a href=\"https://doi.org/10.1242/dev.01335\">10.1242/dev.01335</a>","apa":"Kruse, K., Pantazis, P., Bollenbach, M. T., Julicher, F., &#38; Gonzalez Gaitan, M. (2004). Dpp gradient formation by dynamin-dependent endocytosis: receptor trafficking and the diffusion model. <i>Development</i>. Company of Biologists. <a href=\"https://doi.org/10.1242/dev.01335\">https://doi.org/10.1242/dev.01335</a>","ieee":"K. Kruse, P. Pantazis, M. T. Bollenbach, F. Julicher, and M. Gonzalez Gaitan, “Dpp gradient formation by dynamin-dependent endocytosis: receptor trafficking and the diffusion model,” <i>Development</i>, vol. 131, no. 19. Company of Biologists, pp. 4843–4856, 2004.","short":"K. Kruse, P. Pantazis, M.T. Bollenbach, F. Julicher, M. Gonzalez Gaitan, Development 131 (2004) 4843–4856.","mla":"Kruse, Karsten, et al. “Dpp Gradient Formation by Dynamin-Dependent Endocytosis: Receptor Trafficking and the Diffusion Model.” <i>Development</i>, vol. 131, no. 19, Company of Biologists, 2004, pp. 4843–56, doi:<a href=\"https://doi.org/10.1242/dev.01335\">10.1242/dev.01335</a>."},"language":[{"iso":"eng"}],"_id":"4224","abstract":[{"lang":"eng","text":"Developing cells acquire positional information by reading the graded distribution of morphogens. In Drosophila, the Dpp morphogen forms a long-range concentration gradient by spreading from a restricted source in the developing wing. It has been assumed that Dpp spreads by extracellular diffusion. Under this assumption, the main role of endocytosis in gradient formation is to downregulate receptors at the cell surface. These surface receptors bind to the ligand and thereby interfere with its long-range movement. Recent experiments indicate that Dpp spreading is mediated by Dynamin-dependent endocytosis in the target tissue, suggesting that extracellular diffusion alone cannot account for Dpp dispersal. Here, we perform a theoretical study of a model for morphogen spreading based on extracellular diffusion, which takes into account receptor binding and trafficking. We compare profiles of ligand and surface receptors obtained in this model with experimental data. To this end, we monitored directly the pool of surface receptors and extracellular Dpp with specific antibodies. We conclude that current models considering pure extracellular diffusion cannot explain the observed role of endocytosis during Dpp long-range movement."}],"publication_status":"published","type":"journal_article","publist_id":"1893","date_created":"2018-12-11T12:07:41Z","title":"Dpp gradient formation by dynamin-dependent endocytosis: receptor trafficking and the diffusion model","date_published":"2004-01-01T00:00:00Z","oa_version":"None","intvolume":"       131","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","year":"2004"},{"oa_version":"None","title":"Métodos no lineales y sus aplicaciones en dinámicas aleatorias de poblaciones celulares","date_created":"2018-12-11T12:07:46Z","date_published":"2004-01-01T00:00:00Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","year":"2004","day":"01","citation":{"chicago":"Vladar, Harold de. “Métodos No Lineales y Sus Aplicaciones En Dinámicas Aleatorias de Poblaciones Celulares.” Centro de estudios avazados, IVIC, 2004.","ama":"de Vladar H. Métodos no lineales y sus aplicaciones en dinámicas aleatorias de poblaciones celulares. 2004.","ista":"de Vladar H. 2004. Métodos no lineales y sus aplicaciones en dinámicas aleatorias de poblaciones celulares. Centro de estudios avazados, IVIC.","apa":"de Vladar, H. (2004). <i>Métodos no lineales y sus aplicaciones en dinámicas aleatorias de poblaciones celulares</i>. Centro de estudios avazados, IVIC.","mla":"de Vladar, Harold. <i>Métodos No Lineales y Sus Aplicaciones En Dinámicas Aleatorias de Poblaciones Celulares</i>. Centro de estudios avazados, IVIC, 2004.","short":"H. de Vladar, Métodos No Lineales y Sus Aplicaciones En Dinámicas Aleatorias de Poblaciones Celulares, Centro de estudios avazados, IVIC, 2004.","ieee":"H. de Vladar, “Métodos no lineales y sus aplicaciones en dinámicas aleatorias de poblaciones celulares,” Centro de estudios avazados, IVIC, 2004."},"publication_status":"published","type":"dissertation","publist_id":"1877","_id":"4236","language":[{"iso":"eng"}],"extern":"1","status":"public","publisher":"Centro de estudios avazados, IVIC","article_processing_charge":"No","month":"01","author":[{"full_name":"de Vladar, Harold","last_name":"de Vladar","orcid":"0000-0002-5985-7653","first_name":"Harold","id":"2A181218-F248-11E8-B48F-1D18A9856A87"}],"date_updated":"2025-07-01T12:02:56Z"},{"citation":{"chicago":"Vladar, Harold de, and J. González. “Dynamic Response of Cancer under the Influence of Immunological Activity and Therapy.” <i>Journal of Theoretical Biology</i>. Elsevier, 2004. <a href=\"https://doi.org/10.1016/j.jtbi.2003.11.012\">https://doi.org/10.1016/j.jtbi.2003.11.012</a>.","ista":"de Vladar H, González J. 2004. Dynamic response of cancer under the influence of immunological activity and therapy. Journal of Theoretical Biology. 227(3), 335–348.","ama":"de Vladar H, González J. Dynamic response of cancer under the influence of immunological activity and therapy. <i>Journal of Theoretical Biology</i>. 2004;227(3):335-348. doi:<a href=\"https://doi.org/10.1016/j.jtbi.2003.11.012\">10.1016/j.jtbi.2003.11.012</a>","apa":"de Vladar, H., &#38; González, J. (2004). Dynamic response of cancer under the influence of immunological activity and therapy. <i>Journal of Theoretical Biology</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.jtbi.2003.11.012\">https://doi.org/10.1016/j.jtbi.2003.11.012</a>","ieee":"H. de Vladar and J. González, “Dynamic response of cancer under the influence of immunological activity and therapy,” <i>Journal of Theoretical Biology</i>, vol. 227, no. 3. Elsevier, pp. 335–348, 2004.","short":"H. de Vladar, J. González, Journal of Theoretical Biology 227 (2004) 335–348.","mla":"de Vladar, Harold, and J. González. “Dynamic Response of Cancer under the Influence of Immunological Activity and Therapy.” <i>Journal of Theoretical Biology</i>, vol. 227, no. 3, Elsevier, 2004, pp. 335–48, doi:<a href=\"https://doi.org/10.1016/j.jtbi.2003.11.012\">10.1016/j.jtbi.2003.11.012</a>."},"day":"07","type":"journal_article","quality_controlled":"1","language":[{"iso":"eng"}],"_id":"4238","abstract":[{"lang":"eng","text":"The dynamical basis of tumoral growth has been controversial. Many models have been proposed to explain cancer development. The descriptions employ exponential, potential, logistic or Gompertzian growth laws. Some of these models are concerned with the interaction between cancer and the immunological, system. Among other properties, these models are concerned with the microscopic behavior of tumors and the emergence of cancer. We propose a modification of a previous model by Stepanova, which describes the specific immunological response against cancer. The modification consists of the substitution of a Gompertian law for the exponential rate used for tumoral growth. This modification is motivated by the numerous works confirming that Gompertz's equation correctly describes solid tumor growth. The modified model predicts that near zero, tumors always tend to grow. Immunological contraposition never suffices to induce a complete regression of the tumor. Instead, a stable microscopic equilibrium between cancer and immunological activity can be attained. In other words, our model predicts that the theory of immune surveillance is plausible. A macroscopic equilibrium in which the system develops cancer is also possible. In this case, immunological activity is depleted. This is consistent with the phenomena of cancer tolerance. Both equilibrium points can coexist or can exist without the other. In all cases the fixed point at zero tumor size is unstable. Since immunity cannot induce a complete tumor regression, a therapy is required. We include constant-dose therapies and show that they are insufficient. Final levels of immunocompetent cells and tumoral cells are finite, thus post-treatment regrowth of the tumor is certain. We also evaluate late-intensification therapies which are successful. They induce an asymptotic regression to zero tumor size. Immune response is also suppressed by the therapy, and thus plays a negligible role in the remission. We conclude that treatment evaluation should be successful without taking into account immunological effects. (C) 2003 Elsevier Ltd. All rights reserved."}],"date_published":"2004-04-07T00:00:00Z","year":"2004","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","intvolume":"       227","date_updated":"2025-07-01T12:00:54Z","publication":"Journal of Theoretical Biology","scopus_import":"1","issue":"3","status":"public","page":"335 - 348","publist_id":"1876","publication_status":"published","oa_version":"None","date_created":"2018-12-11T12:07:46Z","title":"Dynamic response of cancer under the influence of immunological activity and therapy","article_type":"original","month":"04","author":[{"full_name":"de Vladar, Harold","last_name":"de Vladar","first_name":"Harold","id":"2A181218-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-5985-7653"},{"last_name":"González","full_name":"González, J.","first_name":"J."}],"volume":227,"doi":"10.1016/j.jtbi.2003.11.012","related_material":{"record":[{"status":"public","id":"4235","relation":"later_version"}]},"extern":"1","publisher":"Elsevier","article_processing_charge":"No"},{"_id":"4239","abstract":[{"lang":"eng","text":"The first living organisms were not necessarily the result of the assembly of fully structured biochemical mechanisms involving macromolecules, but at least some life-related processes, as we know them today, probably appeared alongside the structural integration and early evolution of these proto-organisms. Along these ideas, we consider that spatial compartmentalization and protein functionality are tightly related in their origin. A possible scenario of this relationship is the early polymerization of amino acids (AA) embedded in amphiphilic membranes. The resulting membrane-embedded proto-proteins could have played an important role modulating the transport of elements or ions between the internal compartment and the environment. This scenario is congruent with selectivity arguments of AA (Hitz & DeLuisi, 2000) (i.e., 20 out of nearly 70 originally available (Croning & Chang, 1993; Engel & Nagy, 1982)) and their homochirality (Hitz et al., 2001). Other mechanisms of peptide bond formation, such as alumina-catalyzed reactions (Bujdak & Rode, 2002), polymerization on clay surfaces (Bujdak & Rode, 1996) and polymerization mediated by thioesters (De Duve, 1996), can also lead to this scenario."}],"language":[{"iso":"eng"}],"type":"book_chapter","quality_controlled":"1","citation":{"ama":"de Vladar H, Cipriani R, Scharifker B, Bubis J. A Mechanism for the Prebiotic Emergence of Proteins. In: Seckbach J, Chela Flores J, Owen T, Raulin F, eds. <i>Life in the Universe. From the Miller Experiment to the Search for Life on Other Worlds</i>. Vol 7. COLE. Springer; 2004:83-87. doi:<a href=\"https://doi.org/10.1007/978-94-007-1003-0_12\">10.1007/978-94-007-1003-0_12</a>","ista":"de Vladar H, Cipriani R, Scharifker B, Bubis J. 2004.A Mechanism for the Prebiotic Emergence of Proteins. In: Life in the Universe. From the Miller Experiment to the Search for Life on Other Worlds. Cellular Origin, Life in Extreme Habitats and Astrobiology, vol. 7, 83–87.","chicago":"Vladar, Harold de, Roberto Cipriani, Benjamin Scharifker, and Jose Bubis. “A Mechanism for the Prebiotic Emergence of Proteins.” In <i>Life in the Universe. From the Miller Experiment to the Search for Life on Other Worlds</i>, edited by J. Seckbach, J. Chela Flores, T. Owen, and F. Raulin, 7:83–87. COLE. Springer, 2004. <a href=\"https://doi.org/10.1007/978-94-007-1003-0_12\">https://doi.org/10.1007/978-94-007-1003-0_12</a>.","mla":"de Vladar, Harold, et al. “A Mechanism for the Prebiotic Emergence of Proteins.” <i>Life in the Universe. From the Miller Experiment to the Search for Life on Other Worlds</i>, edited by J. Seckbach et al., vol. 7, Springer, 2004, pp. 83–87, doi:<a href=\"https://doi.org/10.1007/978-94-007-1003-0_12\">10.1007/978-94-007-1003-0_12</a>.","short":"H. de Vladar, R. Cipriani, B. Scharifker, J. Bubis, in:, J. Seckbach, J. Chela Flores, T. Owen, F. Raulin (Eds.), Life in the Universe. From the Miller Experiment to the Search for Life on Other Worlds, Springer, 2004, pp. 83–87.","ieee":"H. de Vladar, R. Cipriani, B. Scharifker, and J. Bubis, “A Mechanism for the Prebiotic Emergence of Proteins,” in <i>Life in the Universe. From the Miller Experiment to the Search for Life on Other Worlds</i>, vol. 7, J. Seckbach, J. Chela Flores, T. Owen, and F. Raulin, Eds. Springer, 2004, pp. 83–87.","apa":"de Vladar, H., Cipriani, R., Scharifker, B., &#38; Bubis, J. (2004). A Mechanism for the Prebiotic Emergence of Proteins. In J. Seckbach, J. Chela Flores, T. Owen, &#38; F. Raulin (Eds.), <i>Life in the Universe. From the Miller Experiment to the Search for Life on Other Worlds</i> (Vol. 7, pp. 83–87). Springer. <a href=\"https://doi.org/10.1007/978-94-007-1003-0_12\">https://doi.org/10.1007/978-94-007-1003-0_12</a>"},"day":"01","intvolume":"         7","year":"2004","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_published":"2004-01-01T00:00:00Z","publication":"Life in the Universe. From the Miller Experiment to the Search for Life on Other Worlds","date_updated":"2025-06-26T09:14:02Z","page":"83 - 87","status":"public","editor":[{"first_name":"J.","last_name":"Seckbach","full_name":"Seckbach, J."},{"full_name":"Chela Flores, J.","last_name":"Chela Flores","first_name":"J."},{"first_name":"T.","full_name":"Owen, T.","last_name":"Owen"},{"first_name":"F.","full_name":"Raulin, F.","last_name":"Raulin"}],"scopus_import":"1","publist_id":"1875","publication_status":"published","alternative_title":["Cellular Origin, Life in Extreme Habitats and Astrobiology"],"date_created":"2018-12-11T12:07:47Z","title":"A Mechanism for the Prebiotic Emergence of Proteins","oa_version":"None","doi":"10.1007/978-94-007-1003-0_12","author":[{"orcid":"0000-0002-5985-7653","id":"2A181218-F248-11E8-B48F-1D18A9856A87","first_name":"Harold","last_name":"Vladar","full_name":"Vladar, Harold"},{"first_name":"Roberto","last_name":"Cipriani","full_name":"Cipriani, Roberto"},{"first_name":"Benjamin","full_name":"Scharifker, Benjamin","last_name":"Scharifker"},{"first_name":"Jose","full_name":"Bubis, Jose","last_name":"Bubis"}],"volume":7,"month":"01","article_processing_charge":"No","publisher":"Springer","series_title":"COLE","extern":"1"},{"day":"01","citation":{"ieee":"N. H. Barton, A. Etheridge, and A. Sturm, “Coalescence in a Random Background,” <i>Annals of Applied Probability</i>, vol. 14, no. 2. Institute of Mathematical Statistics, pp. 754–785, 2004.","short":"N.H. Barton, A. Etheridge, A. Sturm, Annals of Applied Probability 14 (2004) 754–785.","mla":"Barton, Nicholas H., et al. “Coalescence in a Random Background.” <i>Annals of Applied Probability</i>, vol. 14, no. 2, Institute of Mathematical Statistics, 2004, pp. 754–85.","apa":"Barton, N. H., Etheridge, A., &#38; Sturm, A. (2004). Coalescence in a Random Background. <i>Annals of Applied Probability</i>. Institute of Mathematical Statistics.","ista":"Barton NH, Etheridge A, Sturm A. 2004. Coalescence in a Random Background. Annals of Applied Probability. 14(2), 754–785.","ama":"Barton NH, Etheridge A, Sturm A. Coalescence in a Random Background. <i>Annals of Applied Probability</i>. 2004;14(2):754-785.","chicago":"Barton, Nicholas H, Alison Etheridge, and Anja Sturm. “Coalescence in a Random Background.” <i>Annals of Applied Probability</i>. Institute of Mathematical Statistics, 2004."},"abstract":[{"lang":"eng","text":"We consider a single genetic locus which carries two alleles, labelled P and Q. This locus experiences selection and mutation. It is linked to a second neutral locus with recombination rate r. If r = 0, this reduces to the study of a single selected locus. Assuming a Moran model for the population dynamics, we pass to a diffusion approximation and, assuming that the allele frequencies at the selected locus have reached stationarity, establish the joint generating function for the genealogy of a sample from the population and the frequency of the P allele. In essence this is the joint generating function for a coalescent and the random background in which it evolves. We use this to characterize, for the diffusion approximation, the probability of identity in state at the neutral locus of a sample of two individuals (whose type at the selected locus is known) as solutions to a system of ordinary differential equations. The only subtlety is to find the boundary conditions for this system. Finally, numerical examples are presented that illustrate the accuracy and predictions of the diffusion approximation. In particular, a comparison is made between this approach and one in which the frequencies at the selected locus are estimated by their value in the absence of fluctuations and a classical structured coalescent model is used."}],"_id":"4253","publication_status":"published","quality_controlled":0,"publist_id":"1842","type":"journal_article","title":"Coalescence in a Random Background","date_created":"2018-12-11T12:07:52Z","date_published":"2004-05-01T00:00:00Z","main_file_link":[{"url":"http://www.jstor.org/stable/4140427","open_access":"0"}],"intvolume":"        14","year":"2004","volume":14,"author":[{"first_name":"Nicholas H","id":"4880FE40-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8548-5240","full_name":"Nicholas Barton","last_name":"Barton"},{"full_name":"Etheridge, Alison M","last_name":"Etheridge","first_name":"Alison"},{"last_name":"Sturm","full_name":"Sturm, Anja K","first_name":"Anja"}],"publication":"Annals of Applied Probability","date_updated":"2021-01-12T07:55:38Z","month":"05","extern":1,"issue":"2","page":"754 - 785","status":"public","publisher":"Institute of Mathematical Statistics"},{"date_created":"2018-12-11T12:08:31Z","alternative_title":["LNCS"],"title":"Monitoring Temporal Properties of Continuous Signals","date_published":"2004-12-14T00:00:00Z","oa_version":"None","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","year":"2004","citation":{"mla":"Maler, Oded, and Dejan Nickovic. <i>Monitoring Temporal Properties of Continuous Signals</i>. Springer, 2004, pp. 152–66, doi:<a href=\"https://doi.org/10.1007/978-3-540-30206-3_12\">10.1007/978-3-540-30206-3_12</a>.","short":"O. Maler, D. Nickovic, in:, Springer, 2004, pp. 152–166.","ieee":"O. Maler and D. Nickovic, “Monitoring Temporal Properties of Continuous Signals,” presented at the FORMATS: Formal Modeling and Analysis of Timed Systems, 2004, pp. 152–166.","apa":"Maler, O., &#38; Nickovic, D. (2004). Monitoring Temporal Properties of Continuous Signals (pp. 152–166). Presented at the FORMATS: Formal Modeling and Analysis of Timed Systems, Springer. <a href=\"https://doi.org/10.1007/978-3-540-30206-3_12\">https://doi.org/10.1007/978-3-540-30206-3_12</a>","ama":"Maler O, Nickovic D. Monitoring Temporal Properties of Continuous Signals. In: Springer; 2004:152-166. doi:<a href=\"https://doi.org/10.1007/978-3-540-30206-3_12\">10.1007/978-3-540-30206-3_12</a>","ista":"Maler O, Nickovic D. 2004. Monitoring Temporal Properties of Continuous Signals. FORMATS: Formal Modeling and Analysis of Timed Systems, LNCS, , 152–166.","chicago":"Maler, Oded, and Dejan Nickovic. “Monitoring Temporal Properties of Continuous Signals,” 152–66. Springer, 2004. <a href=\"https://doi.org/10.1007/978-3-540-30206-3_12\">https://doi.org/10.1007/978-3-540-30206-3_12</a>."},"day":"14","language":[{"iso":"eng"}],"_id":"4372","publication_status":"published","quality_controlled":"1","conference":{"name":"FORMATS: Formal Modeling and Analysis of Timed Systems"},"publist_id":"1088","type":"conference","extern":"1","scopus_import":"1","article_processing_charge":"No","status":"public","page":"152 - 166","publisher":"Springer","author":[{"first_name":"Oded","full_name":"Maler, Oded","last_name":"Maler"},{"last_name":"Nickovic","full_name":"Nickovic, Dejan","first_name":"Dejan","id":"41BCEE5C-F248-11E8-B48F-1D18A9856A87"}],"date_updated":"2025-06-26T09:05:17Z","month":"12","doi":"10.1007/978-3-540-30206-3_12","acknowledgement":"This work was partially supported by the EC projects IST-2001-33520 CC (Control and Computation), IST-2001-35302 AMETIST (Advanced Methods for Timed Systems) and IST-2003-507219 PROSYD (Property-Based System Design)."},{"author":[{"last_name":"Jhala","full_name":"Jhala, Ranjit","first_name":"Ranjit"}],"date_updated":"2021-01-12T07:56:52Z","month":"12","article_processing_charge":"No","page":"1 - 165","status":"public","publisher":"University of California, Berkeley","extern":"1","abstract":[{"text":"The enormous cost and ubiquity of software errors necessitates the need for techniques and tools that can precisely analyze large systems and prove that they meet given specifications, or if they don't, return counterexample behaviors showing how the system fails. Recent advances in model checking, decision procedures, program analysis and type systems, and a shift of focus to partial specifications common to several systems (e.g., memory safety and race freedom) have resulted in several practical verification methods. However, these methods are either precise or they are scalable, depending on whether they track the values of variables or only a fixed small set of dataflow facts (e.g., types), and are usually insufficient for precisely verifying large programs.\r\n\r\nWe describe a new technique called Lazy Abstraction (LA) which achieves both precision and scalability by localizing the use of precise information. LA automatically builds, explores and refines a single abstract model of the program in a way that different parts of the model exhibit different degrees of precision, namely just enough to verify the desired property. The algorithm automatically mines the information required by partitioning mechanical proofs of unsatisfiability of spurious counterexamples into Craig Interpolants. For multithreaded systems, we give a new technique based on analyzing the behavior of a single thread executing in a context which is an abstraction of the other (arbitrarily many) threads. We define novel context models and show how to automatically infer them and analyze the full system (thread + context) using LA.\r\n\r\nLA is implemented in BLAST. We have run BLAST on Windows and Linux Device Drivers to verify API conformance properties, and have used it to find (or guarantee the absence of) data races in multithreaded Networked Embedded Systems (NESC) applications. BLAST is able to prove the absence of races in several cases where earlier methods, which depend on lock-based synchronization, fail.","lang":"eng"}],"_id":"4424","language":[{"iso":"eng"}],"supervisor":[{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","orcid":"0000-0002-2985-7724","last_name":"Henzinger","full_name":"Henzinger, Thomas A"}],"publication_status":"published","type":"dissertation","publist_id":"307","day":"01","citation":{"mla":"Jhala, Ranjit. <i>Program Verification by Lazy Abstraction</i>. University of California, Berkeley, 2004, pp. 1–165.","ieee":"R. Jhala, “Program verification by lazy abstraction,” University of California, Berkeley, 2004.","short":"R. Jhala, Program Verification by Lazy Abstraction, University of California, Berkeley, 2004.","apa":"Jhala, R. (2004). <i>Program verification by lazy abstraction</i>. University of California, Berkeley.","ama":"Jhala R. Program verification by lazy abstraction. 2004:1-165.","ista":"Jhala R. 2004. Program verification by lazy abstraction. University of California, Berkeley.","chicago":"Jhala, Ranjit. “Program Verification by Lazy Abstraction.” University of California, Berkeley, 2004."},"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","year":"2004","title":"Program verification by lazy abstraction","date_created":"2018-12-11T12:08:47Z","date_published":"2004-12-01T00:00:00Z","oa_version":"None"},{"abstract":[{"lang":"eng","text":"We present a type system for E code, which is an assembly language that manages the release, interaction, and termination of real-time tasks. E code specifies a deadline for each task, and the type system ensures that the deadlines are path-insensitive. We show that typed E programs allow, for given worst-case execution times of tasks, a simple schedulability analysis. Moreover, the real-time programming language Giotto can be compiled into typed E~code. This shows that typed E~code identifies an easily schedulable yet expressive class of real-time programs. We have extended the Giotto compiler to generate typed E code, and enabled the run-time system for E code to perform a type and schedulability check before executing the code."}],"_id":"4445","publist_id":"285","type":"conference","quality_controlled":0,"conference":{"name":"EMSOFT: Embedded Software "},"publication_status":"published","citation":{"short":"T.A. Henzinger, C. Kirsch, in:, ACM, 2004, pp. 104–113.","ieee":"T. A. Henzinger and C. Kirsch, “A typed assembly language for real-time programs,” presented at the EMSOFT: Embedded Software , 2004, pp. 104–113.","mla":"Henzinger, Thomas A., and Christoph Kirsch. <i>A Typed Assembly Language for Real-Time Programs</i>. ACM, 2004, pp. 104–13, doi:<a href=\"https://doi.org/10.1145/1017753.1017774\">10.1145/1017753.1017774</a>.","apa":"Henzinger, T. A., &#38; Kirsch, C. (2004). A typed assembly language for real-time programs (pp. 104–113). Presented at the EMSOFT: Embedded Software , ACM. <a href=\"https://doi.org/10.1145/1017753.1017774\">https://doi.org/10.1145/1017753.1017774</a>","ista":"Henzinger TA, Kirsch C. 2004. A typed assembly language for real-time programs. EMSOFT: Embedded Software , 104–113.","ama":"Henzinger TA, Kirsch C. A typed assembly language for real-time programs. In: ACM; 2004:104-113. doi:<a href=\"https://doi.org/10.1145/1017753.1017774\">10.1145/1017753.1017774</a>","chicago":"Henzinger, Thomas A, and Christoph Kirsch. “A Typed Assembly Language for Real-Time Programs,” 104–13. ACM, 2004. <a href=\"https://doi.org/10.1145/1017753.1017774\">https://doi.org/10.1145/1017753.1017774</a>."},"day":"01","year":"2004","date_published":"2004-09-01T00:00:00Z","date_created":"2018-12-11T12:08:53Z","title":"A typed assembly language for real-time programs","acknowledgement":"This research was supported in part by the AFOSR MURI grant F49620-00-1-0327 and by the NSF grants CCR- 0208875 and CCR-0225610.","doi":"10.1145/1017753.1017774","date_updated":"2021-01-12T07:57:01Z","author":[{"first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724","last_name":"Henzinger","full_name":"Thomas Henzinger"},{"last_name":"Kirsch","full_name":"Kirsch, Christoph M","first_name":"Christoph"}],"month":"09","publisher":"ACM","status":"public","page":"104 - 113","extern":1},{"extern":1,"publisher":"ACM","page":"232 - 244","status":"public","month":"04","date_updated":"2021-01-12T07:57:06Z","author":[{"orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","last_name":"Henzinger","full_name":"Thomas Henzinger"},{"first_name":"Ranjit","full_name":"Jhala, Ranjit","last_name":"Jhala"},{"full_name":"Majumdar, Ritankar S","last_name":"Majumdar","first_name":"Ritankar"},{"full_name":"McMillan, Kenneth L","last_name":"Mcmillan","first_name":"Kenneth"}],"doi":"10.1145/964001.964021","date_published":"2004-04-01T00:00:00Z","date_created":"2018-12-11T12:08:57Z","title":"Abstractions from proofs","year":"2004","day":"01","citation":{"mla":"Henzinger, Thomas A., et al. <i>Abstractions from Proofs</i>. ACM, 2004, pp. 232–44, doi:<a href=\"https://doi.org/10.1145/964001.964021\">10.1145/964001.964021</a>.","ieee":"T. A. Henzinger, R. Jhala, R. Majumdar, and K. Mcmillan, “Abstractions from proofs,” presented at the POPL: Principles of Programming Languages, 2004, pp. 232–244.","short":"T.A. Henzinger, R. Jhala, R. Majumdar, K. Mcmillan, in:, ACM, 2004, pp. 232–244.","apa":"Henzinger, T. A., Jhala, R., Majumdar, R., &#38; Mcmillan, K. (2004). Abstractions from proofs (pp. 232–244). Presented at the POPL: Principles of Programming Languages, ACM. <a href=\"https://doi.org/10.1145/964001.964021\">https://doi.org/10.1145/964001.964021</a>","ama":"Henzinger TA, Jhala R, Majumdar R, Mcmillan K. Abstractions from proofs. In: ACM; 2004:232-244. doi:<a href=\"https://doi.org/10.1145/964001.964021\">10.1145/964001.964021</a>","ista":"Henzinger TA, Jhala R, Majumdar R, Mcmillan K. 2004. Abstractions from proofs. POPL: Principles of Programming Languages, 232–244.","chicago":"Henzinger, Thomas A, Ranjit Jhala, Ritankar Majumdar, and Kenneth Mcmillan. “Abstractions from Proofs,” 232–44. ACM, 2004. <a href=\"https://doi.org/10.1145/964001.964021\">https://doi.org/10.1145/964001.964021</a>."},"type":"conference","publist_id":"270","conference":{"name":"POPL: Principles of Programming Languages"},"quality_controlled":0,"publication_status":"published","abstract":[{"text":"The success of model checking for large programs depends crucially on the ability to efficiently construct parsimonious abstractions. A predicate abstraction is parsimonious if at each control location, it specifies only relationships between current values of variables, and only those which are required for proving correctness. Previous methods for automatically refining predicate abstractions until sufficient precision is obtained do not systematically construct parsimonious abstractions: predicates usually contain symbolic variables, and are added heuristically and often uniformly to many or all control locations at once. We use Craig interpolation to efficiently construct, from a given abstract error trace which cannot be concretized, a parsominous abstraction that removes the trace. At each location of the trace, we infer the relevant predicates as an interpolant between the two formulas that define the past and the future segment of the trace. Each interpolant is a relationship between current values of program variables, and is relevant only at that particular program location. It can be found by a linear scan of the proof of infeasibility of the trace.We develop our method for programs with arithmetic and pointer expressions, and call-by-value function calls. For function calls, Craig interpolation offers a systematic way of generating relevant predicates that contain only the local variables of the function and the values of the formal parameters when the function was called. We have extended our model checker Blast with predicate discovery by Craig interpolation, and applied it successfully to C programs with more than 130,000 lines of code, which was not possible with approaches that build less parsimonious abstractions.","lang":"eng"}],"_id":"4458"},{"citation":{"short":"T.A. Henzinger, R. Jhala, R. Majumdar, in:, ACM, 2004, pp. 1–13.","ieee":"T. A. Henzinger, R. Jhala, and R. Majumdar, “Race checking by context inference,” presented at the PLDI: Programming Languages Design and Implementation, 2004, pp. 1–13.","mla":"Henzinger, Thomas A., et al. <i>Race Checking by Context Inference</i>. ACM, 2004, pp. 1–13, doi:<a href=\"https://doi.org/10.1145/996841.996844\">10.1145/996841.996844</a>.","apa":"Henzinger, T. A., Jhala, R., &#38; Majumdar, R. (2004). Race checking by context inference (pp. 1–13). Presented at the PLDI: Programming Languages Design and Implementation, ACM. <a href=\"https://doi.org/10.1145/996841.996844\">https://doi.org/10.1145/996841.996844</a>","ista":"Henzinger TA, Jhala R, Majumdar R. 2004. Race checking by context inference. PLDI: Programming Languages Design and Implementation, 1–13.","ama":"Henzinger TA, Jhala R, Majumdar R. Race checking by context inference. In: ACM; 2004:1-13. doi:<a href=\"https://doi.org/10.1145/996841.996844\">10.1145/996841.996844</a>","chicago":"Henzinger, Thomas A, Ranjit Jhala, and Ritankar Majumdar. “Race Checking by Context Inference,” 1–13. ACM, 2004. <a href=\"https://doi.org/10.1145/996841.996844\">https://doi.org/10.1145/996841.996844</a>."},"day":"01","conference":{"name":"PLDI: Programming Languages Design and Implementation"},"publication_status":"published","quality_controlled":0,"type":"conference","publist_id":"271","_id":"4459","abstract":[{"lang":"eng","text":"Software model checking has been successful for sequential programs, where predicate abstraction offers suitable models, and counterexample-guided abstraction refinement permits the automatic inference of models. When checking concurrent programs, we need to abstract threads as well as the contexts in which they execute. Stateless context models, such as predicates on global variables, prove insufficient for showing the absence of race conditions in many examples. We therefore use richer context models, which combine (1) predicates for abstracting data state, (2) control flow quotients for abstracting control state, and (3) counters for abstracting an unbounded number of threads. We infer suitable context models automatically by a combination of counterexample-guided abstraction refinement, bisimulation minimization, circular assume-guarantee reasoning, and parametric reasoning about an unbounded number of threads. This algorithm, called CIRC, has been implemented in BLAST and succeeds in checking many examples of NESC code for data races. In particular, BLAST proves the absence of races in several cases where previous race checkers give false positives."}],"title":"Race checking by context inference","date_created":"2018-12-11T12:08:57Z","date_published":"2004-06-01T00:00:00Z","year":"2004","month":"06","author":[{"full_name":"Thomas Henzinger","last_name":"Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","orcid":"0000−0002−2985−7724"},{"first_name":"Ranjit","last_name":"Jhala","full_name":"Jhala, Ranjit"},{"last_name":"Majumdar","full_name":"Majumdar, Ritankar S","first_name":"Ritankar"}],"date_updated":"2021-01-12T07:57:07Z","doi":"10.1145/996841.996844","extern":1,"page":"1 - 13","status":"public","publisher":"ACM"},{"citation":{"chicago":"Henzinger, Thomas A, Ranjit Jhala, Ritankar Majumdar, and Marco Sanvido. “Extreme Model Checking.” In <i>Verification: Theory and Practice</i>, 2772:332–58. Springer, 2004. <a href=\"https://doi.org/10.1007/978-3-540-39910-0_16\">https://doi.org/10.1007/978-3-540-39910-0_16</a>.","ista":"Henzinger TA, Jhala R, Majumdar R, Sanvido M. 2004.Extreme model checking. In: Verification: Theory and Practice. LNCS, vol. 2772, 332–358.","ama":"Henzinger TA, Jhala R, Majumdar R, Sanvido M. Extreme model checking. In: <i>Verification: Theory and Practice</i>. Vol 2772. Springer; 2004:332-358. doi:<a href=\"https://doi.org/10.1007/978-3-540-39910-0_16\">10.1007/978-3-540-39910-0_16</a>","apa":"Henzinger, T. A., Jhala, R., Majumdar, R., &#38; Sanvido, M. (2004). Extreme model checking. In <i>Verification: Theory and Practice</i> (Vol. 2772, pp. 332–358). Springer. <a href=\"https://doi.org/10.1007/978-3-540-39910-0_16\">https://doi.org/10.1007/978-3-540-39910-0_16</a>","ieee":"T. A. Henzinger, R. Jhala, R. Majumdar, and M. Sanvido, “Extreme model checking,” in <i>Verification: Theory and Practice</i>, vol. 2772, Springer, 2004, pp. 332–358.","short":"T.A. Henzinger, R. Jhala, R. Majumdar, M. Sanvido, in:, Verification: Theory and Practice, Springer, 2004, pp. 332–358.","mla":"Henzinger, Thomas A., et al. “Extreme Model Checking.” <i>Verification: Theory and Practice</i>, vol. 2772, Springer, 2004, pp. 332–58, doi:<a href=\"https://doi.org/10.1007/978-3-540-39910-0_16\">10.1007/978-3-540-39910-0_16</a>."},"day":"24","quality_controlled":0,"publication_status":"published","publist_id":"269","type":"book_chapter","_id":"4461","abstract":[{"lang":"eng","text":"One of the central axioms of extreme programming is the disciplined use of regression testing during stepwise software development. Due to recent progress in software model checking, it has become possible to supplement this process with automatic checks for behavioral safety properties of programs, such as conformance with locking idioms and other programming protocols and patterns. For efficiency reasons, all checks must be incremental, i.e., they must reuse partial results from previous checks in order to avoid all unnecessary repetition of expensive verification tasks. We show that the lazy-abstraction algorithm, and its implementation in Blast, can be extended to support the fully automatic and incremental checking of temporal safety properties during software development."}],"title":"Extreme model checking","alternative_title":["LNCS"],"date_created":"2018-12-11T12:08:58Z","date_published":"2004-02-24T00:00:00Z","year":"2004","intvolume":"      2772","month":"02","author":[{"orcid":"0000−0002−2985−7724","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Thomas Henzinger","last_name":"Henzinger"},{"first_name":"Ranjit","full_name":"Jhala, Ranjit","last_name":"Jhala"},{"full_name":"Majumdar, Ritankar S","last_name":"Majumdar","first_name":"Ritankar"},{"full_name":"Sanvido, Marco A","last_name":"Sanvido","first_name":"Marco"}],"volume":2772,"publication":"Verification: Theory and Practice","date_updated":"2021-01-12T07:57:08Z","doi":"10.1007/978-3-540-39910-0_16","acknowledgement":"This work was supported in part by the NSF grants CCR-9988172, CCR-0085949, and CCR-0234690, the ONR grant N00014-02-1-0671, the DARPA grant F33615-00-C-1693, and the MARCO grant 98-DT-660. ","extern":1,"status":"public","page":"332 - 358","publisher":"Springer"},{"year":"2004","intvolume":"      2993","date_published":"2004-03-12T00:00:00Z","title":"Event-driven programming with logical execution times","alternative_title":["LNCS"],"date_created":"2018-12-11T12:09:18Z","publist_id":"200","type":"conference","conference":{"name":"HSCC: Hybrid Systems - Computation and Control"},"publication_status":"published","quality_controlled":0,"abstract":[{"text":"We present a new high-level programming language, called xGiotto, for programming applications with hard real-time constraints. Like its predecessor, xGiotto is based on the LET (logical execution time) assumption: the programmer specifies when the outputs of a task become available, and the compiler checks if the specification can be implemented on a given platform. However, while the predecessor language xGiotto was purely time-triggered, xGiotto accommodates also asynchronous events. Indeed, through a mechanism called event scoping, events are the main structuring principle of the new language. The xGiotto compiler and run-time system implement event scoping through a tree-based event filter. The compiler also checks programs for determinism (absence of race conditions).","lang":"eng"}],"_id":"4525","day":"12","citation":{"ama":"Ghosal A, Henzinger TA, Kirsch C, Sanvido M. Event-driven programming with logical execution times. In: Vol 2993. Springer; 2004:167-170. doi:<a href=\"https://doi.org/10.1007/978-3-540-24743-2_24\">10.1007/978-3-540-24743-2_24</a>","ista":"Ghosal A, Henzinger TA, Kirsch C, Sanvido M. 2004. Event-driven programming with logical execution times. HSCC: Hybrid Systems - Computation and Control, LNCS, vol. 2993, 167–170.","chicago":"Ghosal, Arkadeb, Thomas A Henzinger, Christoph Kirsch, and Marco Sanvido. “Event-Driven Programming with Logical Execution Times,” 2993:167–70. Springer, 2004. <a href=\"https://doi.org/10.1007/978-3-540-24743-2_24\">https://doi.org/10.1007/978-3-540-24743-2_24</a>.","mla":"Ghosal, Arkadeb, et al. <i>Event-Driven Programming with Logical Execution Times</i>. Vol. 2993, Springer, 2004, pp. 167–70, doi:<a href=\"https://doi.org/10.1007/978-3-540-24743-2_24\">10.1007/978-3-540-24743-2_24</a>.","ieee":"A. Ghosal, T. A. Henzinger, C. Kirsch, and M. Sanvido, “Event-driven programming with logical execution times,” presented at the HSCC: Hybrid Systems - Computation and Control, 2004, vol. 2993, pp. 167–170.","short":"A. Ghosal, T.A. Henzinger, C. Kirsch, M. Sanvido, in:, Springer, 2004, pp. 167–170.","apa":"Ghosal, A., Henzinger, T. A., Kirsch, C., &#38; Sanvido, M. (2004). Event-driven programming with logical execution times (Vol. 2993, pp. 167–170). Presented at the HSCC: Hybrid Systems - Computation and Control, Springer. <a href=\"https://doi.org/10.1007/978-3-540-24743-2_24\">https://doi.org/10.1007/978-3-540-24743-2_24</a>"},"publisher":"Springer","status":"public","page":"167 - 170","extern":1,"acknowledgement":"This research is supported by the AFOSR MURI grant F49620-00-1-0327, the DARPA SEC grant F33615-C-98-3614, the MARCO GSRC grant 98-DT-660, and the NSF grants CCR-0208875 and CCR-0225610.","doi":"10.1007/978-3-540-24743-2_24","month":"03","date_updated":"2021-01-12T07:59:26Z","volume":2993,"author":[{"first_name":"Arkadeb","last_name":"Ghosal","full_name":"Ghosal, Arkadeb"},{"orcid":"0000−0002−2985−7724","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","full_name":"Thomas Henzinger"},{"first_name":"Christoph","last_name":"Kirsch","full_name":"Kirsch, Christoph M"},{"first_name":"Marco","full_name":"Sanvido, Marco A","last_name":"Sanvido"}]},{"extern":1,"publisher":"IEEE","status":"public","page":"206 - 217","date_updated":"2021-01-12T07:59:40Z","author":[{"orcid":"0000-0002-4561-241X","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","last_name":"Chatterjee","full_name":"Krishnendu Chatterjee"},{"last_name":"De Alfaro","full_name":"de Alfaro, Luca","first_name":"Luca"},{"orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","last_name":"Henzinger","full_name":"Thomas Henzinger"}],"month":"09","doi":"10.1109/QEST.2004.10051","date_published":"2004-09-30T00:00:00Z","date_created":"2018-12-11T12:09:27Z","title":"Trading memory for randomness","year":"2004","day":"30","citation":{"ieee":"K. Chatterjee, L. De Alfaro, and T. A. Henzinger, “Trading memory for randomness,” presented at the QEST: Quantitative Evaluation of Systems, 2004, pp. 206–217.","short":"K. Chatterjee, L. De Alfaro, T.A. Henzinger, in:, IEEE, 2004, pp. 206–217.","mla":"Chatterjee, Krishnendu, et al. <i>Trading Memory for Randomness</i>. IEEE, 2004, pp. 206–17, doi:<a href=\"https://doi.org/10.1109/QEST.2004.10051\">10.1109/QEST.2004.10051</a>.","apa":"Chatterjee, K., De Alfaro, L., &#38; Henzinger, T. A. (2004). Trading memory for randomness (pp. 206–217). Presented at the QEST: Quantitative Evaluation of Systems, IEEE. <a href=\"https://doi.org/10.1109/QEST.2004.10051\">https://doi.org/10.1109/QEST.2004.10051</a>","ista":"Chatterjee K, De Alfaro L, Henzinger TA. 2004. Trading memory for randomness. QEST: Quantitative Evaluation of Systems, 206–217.","ama":"Chatterjee K, De Alfaro L, Henzinger TA. Trading memory for randomness. In: IEEE; 2004:206-217. doi:<a href=\"https://doi.org/10.1109/QEST.2004.10051\">10.1109/QEST.2004.10051</a>","chicago":"Chatterjee, Krishnendu, Luca De Alfaro, and Thomas A Henzinger. “Trading Memory for Randomness,” 206–17. IEEE, 2004. <a href=\"https://doi.org/10.1109/QEST.2004.10051\">https://doi.org/10.1109/QEST.2004.10051</a>."},"_id":"4555","abstract":[{"lang":"eng","text":"Strategies in repeated games can be classified as to whether or not they use memory and/or randomization. We consider Markov decision processes and 2-player graph games, both of the deterministic and probabilistic varieties. We characterize when memory and/or randomization are required for winning with respect to various classes of w-regular objectives, noting particularly when the use of memory can be traded for the use of randomization. In particular, we show that Markov decision processes allow randomized memoryless optimal strategies for all M?ller objectives. Furthermore, we show that 2-player probabilistic graph games allow randomized memoryless strategies for winning with probability 1 those M?ller objectives which are upward-closed. Upward-closure means that if a set α of infinitely repeating vertices is winning, then all supersets of α are also winning."}],"publist_id":"155","type":"conference","conference":{"name":"QEST: Quantitative Evaluation of Systems"},"quality_controlled":0,"publication_status":"published"},{"issue":"2","extern":1,"publisher":"Elsevier","page":"144 - 174","status":"public","date_updated":"2021-01-12T07:59:40Z","publication":"Information and Computation","volume":194,"author":[{"last_name":"Chatterjee","full_name":"Krishnendu Chatterjee","orcid":"0000-0002-4561-241X","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Ma","full_name":"Ma, Di","first_name":"Di"},{"full_name":"Majumdar, Ritankar S","last_name":"Majumdar","first_name":"Ritankar"},{"full_name":"Zhao, Tian","last_name":"Zhao","first_name":"Tian"},{"full_name":"Thomas Henzinger","last_name":"Henzinger","orcid":"0000−0002−2985−7724","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Jens","full_name":"Palsberg, Jens","last_name":"Palsberg"}],"month":"08","doi":"10.1016/j.ic.2004.06.001","date_published":"2004-08-11T00:00:00Z","title":"Stack size analysis for interrupt-driven programs","date_created":"2018-12-11T12:09:28Z","intvolume":"       194","year":"2004","day":"11","citation":{"apa":"Chatterjee, K., Ma, D., Majumdar, R., Zhao, T., Henzinger, T. A., &#38; Palsberg, J. (2004). Stack size analysis for interrupt-driven programs. <i>Information and Computation</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.ic.2004.06.001\">https://doi.org/10.1016/j.ic.2004.06.001</a>","mla":"Chatterjee, Krishnendu, et al. “Stack Size Analysis for Interrupt-Driven Programs.” <i>Information and Computation</i>, vol. 194, no. 2, Elsevier, 2004, pp. 144–74, doi:<a href=\"https://doi.org/10.1016/j.ic.2004.06.001\">10.1016/j.ic.2004.06.001</a>.","short":"K. Chatterjee, D. Ma, R. Majumdar, T. Zhao, T.A. Henzinger, J. Palsberg, Information and Computation 194 (2004) 144–174.","ieee":"K. Chatterjee, D. Ma, R. Majumdar, T. Zhao, T. A. Henzinger, and J. Palsberg, “Stack size analysis for interrupt-driven programs,” <i>Information and Computation</i>, vol. 194, no. 2. Elsevier, pp. 144–174, 2004.","chicago":"Chatterjee, Krishnendu, Di Ma, Ritankar Majumdar, Tian Zhao, Thomas A Henzinger, and Jens Palsberg. “Stack Size Analysis for Interrupt-Driven Programs.” <i>Information and Computation</i>. Elsevier, 2004. <a href=\"https://doi.org/10.1016/j.ic.2004.06.001\">https://doi.org/10.1016/j.ic.2004.06.001</a>.","ama":"Chatterjee K, Ma D, Majumdar R, Zhao T, Henzinger TA, Palsberg J. Stack size analysis for interrupt-driven programs. <i>Information and Computation</i>. 2004;194(2):144-174. doi:<a href=\"https://doi.org/10.1016/j.ic.2004.06.001\">10.1016/j.ic.2004.06.001</a>","ista":"Chatterjee K, Ma D, Majumdar R, Zhao T, Henzinger TA, Palsberg J. 2004. Stack size analysis for interrupt-driven programs. Information and Computation. 194(2), 144–174."},"abstract":[{"lang":"eng","text":"We study the problem of determining stack boundedness and the exact maximum stack size for three classes of interrupt-driven programs. Interrupt-driven programs are used in many real-time applications that require responsive interrupt handling. In order to ensure responsiveness, programmers often enable interrupt processing in the body of lower-priority interrupt handlers. In such programs a programming error can allow interrupt handlers to be interrupted in a cyclic fashion to lead to an unbounded stack, causing the system to crash. For a restricted class of interrupt-driven programs, we show that there is a polynomial-time procedure to check stack boundedness, while determining the exact maximum stack size is PSPACE-complete. For a larger class of programs, the two problems are both PSPACE-complete, and for the largest class of programs we consider, the two problems are PSPACE-hard and can be solved in exponential time. While the complexities are high, our algorithms are exponential only in the number of handlers, and polynomial in the size of the program."}],"_id":"4556","type":"journal_article","publist_id":"156","publication_status":"published","quality_controlled":0},{"day":"01","citation":{"chicago":"Chatterjee, Krishnendu, Marcin Jurdziński, and Thomas A Henzinger. “Quantitative Stochastic Parity Games,” 121–30. SIAM, 2004.","ista":"Chatterjee K, Jurdziński M, Henzinger TA. 2004. Quantitative stochastic parity games. SODA: Symposium on Discrete Algorithms, 121–130.","ama":"Chatterjee K, Jurdziński M, Henzinger TA. Quantitative stochastic parity games. In: SIAM; 2004:121-130.","apa":"Chatterjee, K., Jurdziński, M., &#38; Henzinger, T. A. (2004). Quantitative stochastic parity games (pp. 121–130). Presented at the SODA: Symposium on Discrete Algorithms, SIAM.","ieee":"K. Chatterjee, M. Jurdziński, and T. A. Henzinger, “Quantitative stochastic parity games,” presented at the SODA: Symposium on Discrete Algorithms, 2004, pp. 121–130.","short":"K. Chatterjee, M. Jurdziński, T.A. Henzinger, in:, SIAM, 2004, pp. 121–130.","mla":"Chatterjee, Krishnendu, et al. <i>Quantitative Stochastic Parity Games</i>. SIAM, 2004, pp. 121–30."},"quality_controlled":0,"publication_status":"published","conference":{"name":"SODA: Symposium on Discrete Algorithms"},"type":"conference","publist_id":"153","abstract":[{"lang":"eng","text":"We study perfect-information stochastic parity games. These are two-player nonterminating games which are played on a graph with turn-based probabilistic transitions. A play results in an infinite path and the conflicting goals of the two players are ω-regular path properties, formalized as parity winning conditions. The qualitative solution of such a game amounts to computing the set of vertices from which a player has a strategy to win with probability 1 (or with positive probability). The quantitative solution amounts to computing the value of the game in every vertex, i.e., the highest probability with which a player can guarantee satisfaction of his own objective in a play that starts from the vertex.For the important special case of one-player stochastic parity games (parity Markov decision processes) we give polynomial-time algorithms both for the qualitative and the quantitative solution. The running time of the qualitative solution is O(d · m3/2) for graphs with m edges and d priorities. The quantitative solution is based on a linear-programming formulation.For the two-player case, we establish the existence of optimal pure memoryless strategies. This has several important ramifications. First, it implies that the values of the games are rational. This is in contrast to the concurrent stochastic parity games of de Alfaro et al.; there, values are in general algebraic numbers, optimal strategies do not exist, and ε-optimal strategies have to be mixed and with infinite memory. Second, the existence of optimal pure memoryless strategies together with the polynomial-time solution forone-player case implies that the quantitative two-player stochastic parity game problem is in NP ∩ co-NP. This generalizes a result of Condon for stochastic games with reachability objectives. It also constitutes an exponential improvement over the best previous algorithm, which is based on a doubly exponential procedure of de Alfaro and Majumdar for concurrent stochastic parity games and provides only ε-approximations of the values."}],"_id":"4558","title":"Quantitative stochastic parity games","date_created":"2018-12-11T12:09:28Z","date_published":"2004-01-01T00:00:00Z","year":"2004","month":"01","author":[{"id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","orcid":"0000-0002-4561-241X","full_name":"Krishnendu Chatterjee","last_name":"Chatterjee"},{"first_name":"Marcin","full_name":"Jurdziński, Marcin","last_name":"Jurdziński"},{"last_name":"Henzinger","full_name":"Thomas Henzinger","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724"}],"date_updated":"2021-01-12T07:59:41Z","extern":1,"page":"121 - 130","status":"public","publisher":"SIAM"},{"extern":1,"page":"251 - 255","status":"public","publisher":"IEEE","month":"07","author":[{"first_name":"Dirk","full_name":"Beyer, Dirk","last_name":"Beyer"},{"last_name":"Henzinger","full_name":"Thomas Henzinger","orcid":"0000−0002−2985−7724","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Ranjit","full_name":"Jhala, Ranjit","last_name":"Jhala"},{"full_name":"Majumdar, Ritankar S","last_name":"Majumdar","first_name":"Ritankar"}],"date_updated":"2021-01-12T07:59:50Z","doi":"10.1109/WPC.2004.1311069  ","acknowledgement":"This research was supported in part by the NSF grants CCR-0085949, CCR-0234690, and ITR-0326577.","date_created":"2018-12-11T12:09:34Z","title":"An eclipse plug-in for model checking","date_published":"2004-07-12T00:00:00Z","year":"2004","citation":{"ama":"Beyer D, Henzinger TA, Jhala R, Majumdar R. An eclipse plug-in for model checking. In: IEEE; 2004:251-255. doi:<a href=\"https://doi.org/10.1109/WPC.2004.1311069  \">10.1109/WPC.2004.1311069  </a>","ista":"Beyer D, Henzinger TA, Jhala R, Majumdar R. 2004. An eclipse plug-in for model checking. IWPC: Program Comprehension, 251–255.","chicago":"Beyer, Dirk, Thomas A Henzinger, Ranjit Jhala, and Ritankar Majumdar. “An Eclipse Plug-in for Model Checking,” 251–55. IEEE, 2004. <a href=\"https://doi.org/10.1109/WPC.2004.1311069  \">https://doi.org/10.1109/WPC.2004.1311069  </a>.","mla":"Beyer, Dirk, et al. <i>An Eclipse Plug-in for Model Checking</i>. IEEE, 2004, pp. 251–55, doi:<a href=\"https://doi.org/10.1109/WPC.2004.1311069  \">10.1109/WPC.2004.1311069  </a>.","ieee":"D. Beyer, T. A. Henzinger, R. Jhala, and R. Majumdar, “An eclipse plug-in for model checking,” presented at the IWPC: Program Comprehension, 2004, pp. 251–255.","short":"D. Beyer, T.A. Henzinger, R. Jhala, R. Majumdar, in:, IEEE, 2004, pp. 251–255.","apa":"Beyer, D., Henzinger, T. A., Jhala, R., &#38; Majumdar, R. (2004). An eclipse plug-in for model checking (pp. 251–255). Presented at the IWPC: Program Comprehension, IEEE. <a href=\"https://doi.org/10.1109/WPC.2004.1311069  \">https://doi.org/10.1109/WPC.2004.1311069  </a>"},"day":"12","publication_status":"published","quality_controlled":0,"conference":{"name":"IWPC: Program Comprehension"},"type":"conference","publist_id":"129","_id":"4577","abstract":[{"text":"While model checking has been successful in uncovering subtle bugs in code, its adoption in software engineering practice has been hampered by the absence of a simple interface to the programmer in an integrated development environment. We describe an integration of the software model checker BLAST into the Eclipse development environment. We provide a verification interface for practical solutions for some typical program analysis problems - assertion checking, reachability analysis, dead code analysis, and test generation - directly on the source code. The analysis is completely automatic, and assumes no knowledge of model checking or formal notation. Moreover, the interface supports incremental program verification to support incremental design and evolution of code.","lang":"eng"}]},{"month":"08","author":[{"last_name":"Beyer","full_name":"Beyer, Dirk","first_name":"Dirk"},{"last_name":"Chlipala","full_name":"Chlipala, Adam J","first_name":"Adam"},{"full_name":"Thomas Henzinger","last_name":"Henzinger","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"},{"last_name":"Jhala","full_name":"Jhala, Ranjit","first_name":"Ranjit"},{"first_name":"Ritankar","full_name":"Majumdar, Ritankar S","last_name":"Majumdar"}],"volume":3148,"date_updated":"2021-01-12T07:59:50Z","doi":"10.1007/978-3-540-27864-1_2","acknowledgement":"This research was supported in part by the NSF grants CCR-0085949, CCR-0234690, and ITR-0326577.","extern":1,"status":"public","page":"2 - 18","publisher":"Springer","day":"17","citation":{"ieee":"D. Beyer, A. Chlipala, T. A. Henzinger, R. Jhala, and R. Majumdar, “The BLAST query language for software verification,” presented at the SAS: Static Analysis Symposium, 2004, vol. 3148, pp. 2–18.","short":"D. Beyer, A. Chlipala, T.A. Henzinger, R. Jhala, R. Majumdar, in:, Springer, 2004, pp. 2–18.","mla":"Beyer, Dirk, et al. <i>The BLAST Query Language for Software Verification</i>. Vol. 3148, Springer, 2004, pp. 2–18, doi:<a href=\"https://doi.org/10.1007/978-3-540-27864-1_2\">10.1007/978-3-540-27864-1_2</a>.","apa":"Beyer, D., Chlipala, A., Henzinger, T. A., Jhala, R., &#38; Majumdar, R. (2004). The BLAST query language for software verification (Vol. 3148, pp. 2–18). Presented at the SAS: Static Analysis Symposium, Springer. <a href=\"https://doi.org/10.1007/978-3-540-27864-1_2\">https://doi.org/10.1007/978-3-540-27864-1_2</a>","ista":"Beyer D, Chlipala A, Henzinger TA, Jhala R, Majumdar R. 2004. The BLAST query language for software verification. SAS: Static Analysis Symposium, LNCS, vol. 3148, 2–18.","ama":"Beyer D, Chlipala A, Henzinger TA, Jhala R, Majumdar R. The BLAST query language for software verification. In: Vol 3148. Springer; 2004:2-18. doi:<a href=\"https://doi.org/10.1007/978-3-540-27864-1_2\">10.1007/978-3-540-27864-1_2</a>","chicago":"Beyer, Dirk, Adam Chlipala, Thomas A Henzinger, Ranjit Jhala, and Ritankar Majumdar. “The BLAST Query Language for Software Verification,” 3148:2–18. Springer, 2004. <a href=\"https://doi.org/10.1007/978-3-540-27864-1_2\">https://doi.org/10.1007/978-3-540-27864-1_2</a>."},"conference":{"name":"SAS: Static Analysis Symposium"},"publication_status":"published","quality_controlled":0,"type":"conference","publist_id":"130","abstract":[{"text":"BLAST is an automatic verification tool for checking temporal safety properties of C programs. Blast is based on lazy predicate abstraction driven by interpolation-based predicate discovery. In this paper, we present the Blast specification language. The language specifies program properties at two levels of precision. At the lower level, monitor automata are used to specify temporal safety properties of program executions (traces). At the higher level, relational reachability queries over program locations are used to combine lower-level trace properties. The two-level specification language can be used to break down a verification task into several independent calls of the model-checking engine. In this way, each call to the model checker may have to analyze only part of the program, or part of the specification, and may thus succeed in a reduction of the number of predicates needed for the analysis. In addition, the two-level specification language provides a means for structuring and maintaining specifications. ","lang":"eng"}],"_id":"4578","date_created":"2018-12-11T12:09:34Z","title":"The BLAST query language for software verification","alternative_title":["LNCS"],"date_published":"2004-08-17T00:00:00Z","year":"2004","intvolume":"      3148"},{"date_updated":"2021-01-12T07:59:52Z","author":[{"first_name":"Dirk","last_name":"Beyer","full_name":"Beyer, Dirk"},{"first_name":"Adam","last_name":"Chlipala","full_name":"Chlipala, Adam J"},{"last_name":"Henzinger","full_name":"Thomas Henzinger","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724"},{"first_name":"Ranjit","last_name":"Jhala","full_name":"Jhala, Ranjit"},{"full_name":"Majumdar, Ritankar S","last_name":"Majumdar","first_name":"Ritankar"}],"month":"07","doi":"10.1109/ICSE.2004.1317455","extern":1,"publisher":"IEEE","status":"public","page":"326 - 335","citation":{"ama":"Beyer D, Chlipala A, Henzinger TA, Jhala R, Majumdar R. Generating tests from counterexamples. In: IEEE; 2004:326-335. doi:<a href=\"https://doi.org/10.1109/ICSE.2004.1317455\">10.1109/ICSE.2004.1317455</a>","ista":"Beyer D, Chlipala A, Henzinger TA, Jhala R, Majumdar R. 2004. Generating tests from counterexamples. ICSE: Software Engineering, 326–335.","chicago":"Beyer, Dirk, Adam Chlipala, Thomas A Henzinger, Ranjit Jhala, and Ritankar Majumdar. “Generating Tests from Counterexamples,” 326–35. IEEE, 2004. <a href=\"https://doi.org/10.1109/ICSE.2004.1317455\">https://doi.org/10.1109/ICSE.2004.1317455</a>.","mla":"Beyer, Dirk, et al. <i>Generating Tests from Counterexamples</i>. IEEE, 2004, pp. 326–35, doi:<a href=\"https://doi.org/10.1109/ICSE.2004.1317455\">10.1109/ICSE.2004.1317455</a>.","short":"D. Beyer, A. Chlipala, T.A. Henzinger, R. Jhala, R. Majumdar, in:, IEEE, 2004, pp. 326–335.","ieee":"D. Beyer, A. Chlipala, T. A. Henzinger, R. Jhala, and R. Majumdar, “Generating tests from counterexamples,” presented at the ICSE: Software Engineering, 2004, pp. 326–335.","apa":"Beyer, D., Chlipala, A., Henzinger, T. A., Jhala, R., &#38; Majumdar, R. (2004). Generating tests from counterexamples (pp. 326–335). Presented at the ICSE: Software Engineering, IEEE. <a href=\"https://doi.org/10.1109/ICSE.2004.1317455\">https://doi.org/10.1109/ICSE.2004.1317455</a>"},"day":"26","_id":"4581","abstract":[{"text":"We have extended the software model checker BLAST to automatically generate test suites that guarantee full coverage with respect to a given predicate. More precisely, given a C program and a target predicate p, BLAST determines the set L of program locations which program execution can reach with p true, and automatically generates a set of test vectors that exhibit the truth of p at all locations in L. We have used BLAST to generate test suites and to detect dead code in C programs with up to 30 K lines of code. The analysis and test vector generation is fully automatic (no user intervention) and exact (no false positives).","lang":"eng"}],"publist_id":"128","type":"conference","publication_status":"published","conference":{"name":"ICSE: Software Engineering"},"quality_controlled":0,"date_published":"2004-07-26T00:00:00Z","date_created":"2018-12-11T12:09:35Z","title":"Generating tests from counterexamples","year":"2004"},{"publication":"Annals of Neurology","date_updated":"2021-01-12T06:58:39Z","volume":53,"author":[{"first_name":"Michiel","last_name":"Coesmans","full_name":"Coesmans, Michiel P"},{"full_name":"Sillevis-Smitt, Peter A","last_name":"Sillevis Smitt","first_name":"Peter"},{"last_name":"Linden","full_name":"Linden, David J","first_name":"David"},{"last_name":"Shigemoto","full_name":"Ryuichi Shigemoto","first_name":"Ryuichi","id":"499F3ABC-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-8761-9444"},{"full_name":"Hirano, Tomoo","last_name":"Hirano","first_name":"Tomoo"},{"last_name":"Yamakawa","full_name":"Yamakawa, Yoshinori","first_name":"Yoshinori"},{"first_name":"Adriaan","full_name":"Van Alphen, Adriaan M","last_name":"Van Alphen"},{"last_name":"Luo","full_name":"Luo, Chongde","first_name":"Chongde"},{"last_name":"Van Der Geest","full_name":"Van Der Geest, Jos N","first_name":"Jos"},{"last_name":"Kros","full_name":"Kros, Johan M","first_name":"Johan"},{"first_name":"Carlo","last_name":"Gaillard","full_name":"Gaillard, Carlo A"},{"last_name":"Frens","full_name":"Frens, Maarten A","first_name":"Maarten"},{"full_name":"De Zeeuw, Chris I","last_name":"De Zeeuw","first_name":"Chris"}],"month":"03","doi":"10.1002/ana.10451","issue":"3","extern":1,"publisher":"Wiley-Blackwell","status":"public","page":"325 - 336","citation":{"mla":"Coesmans, Michiel, et al. “Mechanisms Underlying Cerebellar Motor Deficits Due to MGluR1-Autoantibodies.” <i>Annals of Neurology</i>, vol. 53, no. 3, Wiley-Blackwell, 2003, pp. 325–36, doi:<a href=\"https://doi.org/10.1002/ana.10451\">10.1002/ana.10451</a>.","ieee":"M. Coesmans <i>et al.</i>, “Mechanisms underlying cerebellar motor deficits due to mGluR1-autoantibodies,” <i>Annals of Neurology</i>, vol. 53, no. 3. Wiley-Blackwell, pp. 325–336, 2003.","short":"M. Coesmans, P. Sillevis Smitt, D. Linden, R. Shigemoto, T. Hirano, Y. Yamakawa, A. Van Alphen, C. Luo, J. Van Der Geest, J. Kros, C. Gaillard, M. Frens, C. De Zeeuw, Annals of Neurology 53 (2003) 325–336.","apa":"Coesmans, M., Sillevis Smitt, P., Linden, D., Shigemoto, R., Hirano, T., Yamakawa, Y., … De Zeeuw, C. (2003). Mechanisms underlying cerebellar motor deficits due to mGluR1-autoantibodies. <i>Annals of Neurology</i>. Wiley-Blackwell. <a href=\"https://doi.org/10.1002/ana.10451\">https://doi.org/10.1002/ana.10451</a>","ama":"Coesmans M, Sillevis Smitt P, Linden D, et al. Mechanisms underlying cerebellar motor deficits due to mGluR1-autoantibodies. <i>Annals of Neurology</i>. 2003;53(3):325-336. doi:<a href=\"https://doi.org/10.1002/ana.10451\">10.1002/ana.10451</a>","ista":"Coesmans M, Sillevis Smitt P, Linden D, Shigemoto R, Hirano T, Yamakawa Y, Van Alphen A, Luo C, Van Der Geest J, Kros J, Gaillard C, Frens M, De Zeeuw C. 2003. Mechanisms underlying cerebellar motor deficits due to mGluR1-autoantibodies. Annals of Neurology. 53(3), 325–336.","chicago":"Coesmans, Michiel, Peter Sillevis Smitt, David Linden, Ryuichi Shigemoto, Tomoo Hirano, Yoshinori Yamakawa, Adriaan Van Alphen, et al. “Mechanisms Underlying Cerebellar Motor Deficits Due to MGluR1-Autoantibodies.” <i>Annals of Neurology</i>. Wiley-Blackwell, 2003. <a href=\"https://doi.org/10.1002/ana.10451\">https://doi.org/10.1002/ana.10451</a>."},"day":"01","_id":"2623","abstract":[{"text":"Patients with Hodgkin's disease can develop paraneoplastic cerebellar ataxia because of the generation of autoantibodies against mGluR1 (mGluR1-Abs). Yet, the pathophysiological mechanisms underlying their motor coordination deficits remain to be elucidated. Here, we show that application of IgG purified from the patients' serum to cerebellar slices of mice acutely reduces the basal activity of Purkinje cells, whereas application to the flocculus of mice in vivo evokes acute disturbances in the performance of their compensatory eye movements. In addition, the mGluR1-Abs block induction of long-term depression in cultured mouse Purkinje cells, whereas the cerebellar motor learning behavior of the patients is affected in that they show impaired adaptation of their saccadic eye movements. Finally, postmortem analysis of the cerebellum of a paraneoplastic cerebellar ataxia patient showed that the number of Purkinje cells was significantly reduced by approximately two thirds compared with three controls. We conclude that autoantibodies against mGluR1 can cause cerebellar motor coordination deficits caused by a combination of rapid effects on both acute and plastic responses of Purkinje cells and chronic degenerative effects.","lang":"eng"}],"type":"journal_article","publist_id":"4274","publication_status":"published","quality_controlled":0,"date_published":"2003-03-01T00:00:00Z","date_created":"2018-12-11T11:58:44Z","title":"Mechanisms underlying cerebellar motor deficits due to mGluR1-autoantibodies","intvolume":"        53","year":"2003"}]
