@article{459,
  abstract     = {The social insects bees, wasps, ants, and termites are species-rich, occur in many habitats, and often constitute a large part of the biomass. Many are also invasive, including species of termites, the red imported fire ant, and the Argentine ant. While invasive social insects have been a problem in Southern Europe for some time, Central Europa was free of invasive ant species until recently because most ants are adapted to warmer climates. Only in the 1990s, did Lasius neglectus, a close relative of the common black garden ant, arrive in Germany. First described in 1990 based on individuals collected in Budapest, the species has since been detected for example in France, Germany, Spain, England, and Kyrgyzstan. The species is spread with soil during construction work or plantings, and L. neglectus therefore is often found in parks and botanical gardens. Another invasive ant now spreading in southern Germany is Formica fuscocinerea, which occurs along rivers, including in the sandy floodplains of the river Isar. As is typical of pioneer species, F. fuscocinerea quickly becomes extremely abundant and therefore causes problems for example on playgrounds in Munich. All invasive ant species are characterized by cooperation across nests, leading to strongly interconnected, very large super-colonies. The resulting dominance results in the extinction of native ant species as well as other arthropod species and thus in the reduction of biodiversity.},
  author       = {Cremer, Sylvia},
  issn         = {2366-2875},
  journal      = {Rundgespräche Forum Ökologie},
  pages        = {105 -- 116},
  publisher    = {Verlag Dr. Friedrich Pfeil},
  title        = {{Invasive Ameisen in Europa: Wie sie sich ausbreiten und die heimische Fauna verändern}},
  volume       = {46},
  year         = {2017},
}

@article{12193,
  abstract     = {DNA methylation regulates eukaryotic gene expression and is extensively reprogrammed during animal development. However, whether developmental methylation reprogramming during the sporophytic life cycle of flowering plants regulates genes is presently unknown. Here we report a distinctive gene-targeted RNA-directed DNA methylation (RdDM) activity in the Arabidopsis thaliana male sexual lineage that regulates gene expression in meiocytes. Loss of sexual-lineage-specific RdDM causes mis-splicing of the MPS1 gene (also known as PRD2), thereby disrupting meiosis. Our results establish a regulatory paradigm in which de novo methylation creates a cell-lineage-specific epigenetic signature that controls gene expression and contributes to cellular function in flowering plants.},
  author       = {Walker, James and Gao, Hongbo and Zhang, Jingyi and Aldridge, Billy and Vickers, Martin and Higgins, James D. and Feng, Xiaoqi},
  issn         = {1546-1718},
  journal      = {Nature Genetics},
  keywords     = {Genetics},
  number       = {1},
  pages        = {130--137},
  publisher    = {Nature Research},
  title        = {{Sexual-lineage-specific DNA methylation regulates meiosis in Arabidopsis}},
  doi          = {10.1038/s41588-017-0008-5},
  volume       = {50},
  year         = {2017},
}

@proceedings{638,
  abstract     = {This book constitutes the refereed proceedings of the 9th InternationalWorkshop on Numerical Software Verification, NSV 2016, held in Toronto, ON, Canada in July 2011 - colocated with CAV 2016, the 28th International Conference on Computer Aided Verification.
The NSV workshop is dedicated to the development of logical and mathematical techniques for the reasoning about programmability and reliability.},
  editor       = {Bogomolov, Sergiy and Martel, Matthieu and Prabhakar, Pavithra},
  issn         = {0302-9743},
  location     = {Toronto, ON, Canada},
  publisher    = {Springer},
  title        = {{Numerical Software Verification}},
  doi          = {10.1007/978-3-319-54292-8},
  volume       = {10152},
  year         = {2017},
}

@inproceedings{1194,
  abstract     = {Termination is one of the basic liveness properties, and we study the termination problem for probabilistic programs with real-valued variables. Previous works focused on the qualitative problem that asks whether an input program terminates with probability~1 (almost-sure termination). A powerful approach for this qualitative problem is the notion of ranking supermartingales with respect to a given set of invariants. The quantitative problem (probabilistic termination) asks for bounds on the termination probability. A fundamental and conceptual drawback of the existing approaches to address probabilistic termination is that even though the supermartingales consider the probabilistic behavior of the programs, the invariants are obtained completely ignoring the probabilistic aspect. In this work we address the probabilistic termination problem for linear-arithmetic probabilistic programs with nondeterminism. We define the notion of {\em stochastic invariants}, which are constraints along with a probability bound that the constraints hold. We introduce a concept of {\em repulsing supermartingales}. First, we show that repulsing supermartingales can be used to obtain bounds on the probability of the stochastic invariants. Second, we show the effectiveness of repulsing supermartingales in the following three ways: (1)~With a combination of ranking and repulsing supermartingales we can compute lower bounds on the probability of termination; (2)~repulsing supermartingales provide witnesses for refutation of almost-sure termination; and (3)~with a combination of ranking and repulsing supermartingales we can establish persistence properties of probabilistic programs. We also present results on related computational problems and an experimental evaluation of our approach on academic examples. },
  author       = {Chatterjee, Krishnendu and Novotny, Petr and Zikelic, Djordje},
  issn         = {0730-8566},
  location     = {Paris, France},
  number       = {1},
  pages        = {145 -- 160},
  publisher    = {ACM},
  title        = {{Stochastic invariants for probabilistic termination}},
  doi          = {10.1145/3009837.3009873},
  volume       = {52},
  year         = {2017},
}

@inproceedings{637,
  abstract     = {For many cryptographic primitives, it is relatively easy to achieve selective security (where the adversary commits a-priori to some of the choices to be made later in the attack) but appears difficult to achieve the more natural notion of adaptive security (where the adversary can make all choices on the go as the attack progresses). A series of several recent works shows how to cleverly achieve adaptive security in several such scenarios including generalized selective decryption (Panjwani, TCC ’07 and Fuchsbauer et al., CRYPTO ’15), constrained PRFs (Fuchsbauer et al., ASIACRYPT ’14), and Yao garbled circuits (Jafargholi and Wichs, TCC ’16b). Although the above works expressed vague intuition that they share a common technique, the connection was never made precise. In this work we present a new framework that connects all of these works and allows us to present them in a unified and simplified fashion. Moreover, we use the framework to derive a new result for adaptively secure secret sharing over access structures defined via monotone circuits. We envision that further applications will follow in the future. Underlying our framework is the following simple idea. It is well known that selective security, where the adversary commits to n-bits of information about his future choices, automatically implies adaptive security at the cost of amplifying the adversary’s advantage by a factor of up to 2n. However, in some cases the proof of selective security proceeds via a sequence of hybrids, where each pair of adjacent hybrids locally only requires some smaller partial information consisting of m ≪ n bits. The partial information needed might be completely different between different pairs of hybrids, and if we look across all the hybrids we might rely on the entire n-bit commitment. Nevertheless, the above is sufficient to prove adaptive security, at the cost of amplifying the adversary’s advantage by a factor of only 2m ≪ 2n. In all of our examples using the above framework, the different hybrids are captured by some sort of a graph pebbling game and the amount of information that the adversary needs to commit to in each pair of hybrids is bounded by the maximum number of pebbles in play at any point in time. Therefore, coming up with better strategies for proving adaptive security translates to various pebbling strategies for different types of graphs.},
  author       = {Jafargholi, Zahra and Kamath Hosdurg, Chethan and Klein, Karen and Komargodski, Ilan and Pietrzak, Krzysztof Z and Wichs, Daniel},
  editor       = {Katz, Jonathan and Shacham, Hovav},
  isbn         = {978-331963687-0},
  location     = {Santa Barbara, CA, United States},
  pages        = {133 -- 163},
  publisher    = {Springer},
  title        = {{Be adaptive avoid overcommitting}},
  doi          = {10.1007/978-3-319-63688-7_5},
  volume       = {10401},
  year         = {2017},
}

@inproceedings{1001,
  abstract     = {We present a computational approach for designing CurveUps, curvy shells that form from an initially flat state. They consist of small rigid tiles that are tightly held together by two pre-stretched elastic sheets attached to them. Our method allows the realization of smooth, doubly curved surfaces that can be fabricated as a flat piece. Once released, the restoring forces of the pre-stretched sheets support the object to take shape in 3D. CurveUps are structurally stable in their target configuration. The design process starts with a target surface. Our method generates a tile layout in 2D and optimizes the distribution, shape, and attachment areas of the tiles to obtain a configuration that is fabricable and in which the curved up state closely matches the target. Our approach is based on an efficient approximate model and a local optimization strategy for an otherwise intractable nonlinear optimization problem. We demonstrate the effectiveness of our approach for a wide range of shapes, all realized as physical prototypes.},
  author       = {Guseinov, Ruslan and Miguel, Eder and Bickel, Bernd},
  location     = {Los Angeles, CA, United States},
  number       = {4},
  publisher    = {ACM},
  title        = {{CurveUps: Shaping objects from flat plates with tension-actuated curvature}},
  doi          = {10.1145/3072959.3073709},
  volume       = {36},
  year         = {2017},
}

@article{1120,
  abstract     = {The existence of a self-localization transition in the polaron problem has been under an active debate ever since Landau suggested it 83 years ago. Here we reveal the self-localization transition for the rotational analogue of the polaron -- the angulon quasiparticle. We show that, unlike for the polarons, self-localization of angulons occurs at finite impurity-bath coupling already at the mean-field level. The transition is accompanied by the spherical-symmetry breaking of the angulon ground state and a discontinuity in the first derivative of the ground-state energy. Moreover, the type of the symmetry breaking is dictated by the symmetry of the microscopic impurity-bath interaction, which leads to a number of distinct self-localized states. The predicted effects can potentially be addressed in experiments on cold molecules trapped in superfluid helium droplets and ultracold quantum gases, as well as on electronic excitations in solids and Bose-Einstein condensates. },
  author       = {Li, Xiang and Seiringer, Robert and Lemeshko, Mikhail},
  issn         = {2469-9926},
  journal      = {Physical Review A},
  number       = {3},
  publisher    = {American Physical Society},
  title        = {{Angular self-localization of impurities rotating in a bosonic bath}},
  doi          = {10.1103/PhysRevA.95.033608},
  volume       = {95},
  year         = {2017},
}

@inproceedings{911,
  abstract     = {We develop a probabilistic technique for colorizing grayscale natural images. In light of the intrinsic uncertainty of this task, the proposed probabilistic framework has numerous desirable properties. In particular, our model is able to produce multiple plausible and vivid colorizations for a given grayscale image and is one of the first colorization models to provide a proper stochastic sampling scheme. Moreover, our training procedure is supported by a rigorous theoretical framework that does not require any ad hoc heuristics and allows for efficient modeling and learning of the joint pixel color distribution.We demonstrate strong quantitative and qualitative experimental results on the CIFAR-10 dataset and the challenging ILSVRC 2012 dataset.},
  author       = {Royer, Amélie and Kolesnikov, Alexander and Lampert, Christoph},
  location     = {London, United Kingdom},
  pages        = {85.1--85.12},
  publisher    = {BMVA Press},
  title        = {{Probabilistic image colorization}},
  doi          = {10.5244/c.31.85},
  year         = {2017},
}

@inproceedings{647,
  abstract     = {Despite researchers’ efforts in the last couple of decades, reachability analysis is still a challenging problem even for linear hybrid systems. Among the existing approaches, the most practical ones are mainly based on bounded-time reachable set over-approximations. For the purpose of unbounded-time analysis, one important strategy is to abstract the original system and find an invariant for the abstraction. In this paper, we propose an approach to constructing a new kind of abstraction called conic abstraction for affine hybrid systems, and to computing reachable sets based on this abstraction. The essential feature of a conic abstraction is that it partitions the state space of a system into a set of convex polyhedral cones which is derived from a uniform conic partition of the derivative space. Such a set of polyhedral cones is able to cut all trajectories of the system into almost straight segments so that every segment of a reach pipe in a polyhedral cone tends to be straight as well, and hence can be over-approximated tightly by polyhedra using similar techniques as HyTech or PHAVer. In particular, for diagonalizable affine systems, our approach can guarantee to find an invariant for unbounded reachable sets, which is beyond the capability of bounded-time reachability analysis tools. We implemented the approach in a tool and experiments on benchmarks show that our approach is more powerful than SpaceEx and PHAVer in dealing with diagonalizable systems.},
  author       = {Bogomolov, Sergiy and Giacobbe, Mirco and Henzinger, Thomas A and Kong, Hui},
  isbn         = {978-331965764-6},
  location     = {Berlin, Germany},
  pages        = {116 -- 132},
  publisher    = {Springer},
  title        = {{Conic abstractions for hybrid systems}},
  doi          = {10.1007/978-3-319-65765-3_7},
  volume       = {10419 },
  year         = {2017},
}

@inproceedings{631,
  abstract     = {Template polyhedra generalize intervals and octagons to polyhedra whose facets are orthogonal to a given set of arbitrary directions. They have been employed in the abstract interpretation of programs and, with particular success, in the reachability analysis of hybrid automata. While previously, the choice of directions has been left to the user or a heuristic, we present a method for the automatic discovery of directions that generalize and eliminate spurious counterexamples. We show that for the class of convex hybrid automata, i.e., hybrid automata with (possibly nonlinear) convex constraints on derivatives, such directions always exist and can be found using convex optimization. We embed our method inside a CEGAR loop, thus enabling the time-unbounded reachability analysis of an important and richer class of hybrid automata than was previously possible. We evaluate our method on several benchmarks, demonstrating also its superior efficiency for the special case of linear hybrid automata.},
  author       = {Bogomolov, Sergiy and Frehse, Goran and Giacobbe, Mirco and Henzinger, Thomas A},
  isbn         = {978-366254576-8},
  location     = {Uppsala, Sweden},
  pages        = {589 -- 606},
  publisher    = {Springer},
  title        = {{Counterexample guided refinement of template polyhedra}},
  doi          = {10.1007/978-3-662-54577-5_34},
  volume       = {10205},
  year         = {2017},
}

@article{955,
  abstract     = {Gene expression is controlled by networks of regulatory proteins that interact specifically with external signals and DNA regulatory sequences. These interactions force the network components to co-evolve so as to continually maintain function. Yet, existing models of evolution mostly focus on isolated genetic elements. In contrast, we study the essential process by which regulatory networks grow: the duplication and subsequent specialization of network components. We synthesize a biophysical model of molecular interactions with the evolutionary framework to find the conditions and pathways by which new regulatory functions emerge. We show that specialization of new network components is usually slow, but can be drastically accelerated in the presence of regulatory crosstalk and mutations that promote promiscuous interactions between network components.},
  author       = {Friedlander, Tamar and Prizak, Roshan and Barton, Nicholas H and Tkacik, Gasper},
  issn         = {2041-1723},
  journal      = {Nature Communications},
  number       = {1},
  publisher    = {Nature Publishing Group},
  title        = {{Evolution of new regulatory functions on biophysically realistic fitness landscapes}},
  doi          = {10.1038/s41467-017-00238-8},
  volume       = {8},
  year         = {2017},
}

@article{1144,
  abstract     = {We show that matrix elements of functions of N × N Wigner matrices fluctuate on a scale of order N−1/2 and we identify the limiting fluctuation. Our result holds for any function f of the matrix that has bounded variation thus considerably relaxing the regularity requirement imposed in [7, 11].},
  author       = {Erdös, László and Schröder, Dominik J},
  journal      = {Electronic Communications in Probability},
  publisher    = {Institute of Mathematical Statistics},
  title        = {{Fluctuations of functions of Wigner matrices}},
  doi          = {10.1214/16-ECP38},
  volume       = {21},
  year         = {2017},
}

@article{2016,
  abstract     = {The Ising model is one of the simplest and most famous models of interacting systems. It was originally proposed to model ferromagnetic interactions in statistical physics and is now widely used to model spatial processes in many areas such as ecology, sociology, and genetics, usually without testing its goodness-of-fit. Here, we propose an exact goodness-of-fit test for the finite-lattice Ising model. The theory of Markov bases has been developed in algebraic statistics for exact goodness-of-fit testing using a Monte Carlo approach. However, this beautiful theory has fallen short of its promise for applications, because finding a Markov basis is usually computationally intractable. We develop a Monte Carlo method for exact goodness-of-fit testing for the Ising model which avoids computing a Markov basis and also leads to a better connectivity of the Markov chain and hence to a faster convergence. We show how this method can be applied to analyze the spatial organization of receptors on the cell membrane.},
  author       = {Martin Del Campo Sanchez, Abraham and Cepeda Humerez, Sarah A and Uhler, Caroline},
  issn         = {03036898},
  journal      = {Scandinavian Journal of Statistics},
  number       = {2},
  pages        = {285 -- 306},
  publisher    = {Wiley-Blackwell},
  title        = {{Exact goodness-of-fit testing for the Ising model}},
  doi          = {10.1111/sjos.12251},
  volume       = {44},
  year         = {2017},
}

@article{1117,
  abstract     = {GABAergic synapses in brain circuits generate inhibitory output signals with submillisecond latency and temporal precision. Whether the molecular identity of the release sensor contributes to these signaling properties remains unclear. Here, we examined the Ca^2+ sensor of exocytosis at GABAergic basket cell (BC) to Purkinje cell (PC) synapses in cerebellum. Immunolabeling suggested that BC terminals selectively expressed synaptotagmin 2 (Syt2), whereas synaptotagmin 1 (Syt1) was enriched in excitatory terminals. Genetic elimination of Syt2 reduced action potential-evoked release to ∼10%, identifying Syt2 as the major Ca^2+ sensor at BC-PC synapses. Differential adenovirus-mediated rescue revealed that Syt2 triggered release with shorter latency and higher temporal precision and mediated faster vesicle pool replenishment than Syt1. Furthermore, deletion of Syt2 severely reduced and delayed disynaptic inhibition following parallel fiber stimulation. Thus, the selective use of Syt2 as release sensor at BC-PC synapses ensures fast and efficient feedforward inhibition in cerebellar microcircuits. #bioimagingfacility-author},
  author       = {Chen, Chong and Arai, Itaru and Satterield, Rachel and Young, Samuel and Jonas, Peter M},
  issn         = {2211-1247},
  journal      = {Cell Reports},
  number       = {3},
  pages        = {723 -- 736},
  publisher    = {Cell Press},
  title        = {{Synaptotagmin 2 is the fast Ca2+ sensor at a central inhibitory synapse}},
  doi          = {10.1016/j.celrep.2016.12.067},
  volume       = {18},
  year         = {2017},
}

@article{749,
  abstract     = {Synaptotagmin 7 (Syt7) is thought to be a Ca2+ sensor that mediates asynchronous transmitter release and facilitation at synapses. However, Syt7 is strongly expressed in fast-spiking, parvalbumin-expressing GABAergic interneurons, and the output synapses of these neurons produce only minimal asynchronous release and show depression rather than facilitation. To resolve this apparent contradiction, we examined the effects of genetic elimination of Syt7 on synaptic transmission at the GABAergic basket cell (BC)-Purkinje cell (PC) synapse in cerebellum. Our results indicate that at the BC-PC synapse, Syt7 contributes to asynchronous release, pool replenishment, and facilitation. In combination, these three effects ensure efficient transmitter release during high-frequency activity and guarantee frequency independence of inhibition. Our results identify a distinct function of Syt7: ensuring the efficiency of high-frequency inhibitory synaptic transmission},
  author       = {Chen, Chong and Satterfield, Rachel and Young, Samuel and Jonas, Peter M},
  issn         = {2211-1247},
  journal      = {Cell Reports},
  number       = {8},
  pages        = {2082 -- 2089},
  publisher    = {Cell Press},
  title        = {{Triple function of Synaptotagmin 7 ensures efficiency of high-frequency transmission at central GABAergic synapses}},
  doi          = {10.1016/j.celrep.2017.10.122},
  volume       = {21},
  year         = {2017},
}

@article{1074,
  abstract     = {Recently it has become feasible to detect long blocks of nearly identical sequence shared between pairs of genomes. These IBD blocks are direct traces of recent coalescence events and, as such, contain ample signal to infer recent demography. Here, we examine sharing of such blocks in two-dimensional populations with local migration. Using a diffusion approximation to trace genetic ancestry, we derive analytical formulae for patterns of isolation by distance of IBD blocks, which can also incorporate recent population density changes. We introduce an inference scheme that uses a composite likelihood approach to fit these formulae. We then extensively evaluate our theory and inference method on a range of scenarios using simulated data. We first validate the diffusion approximation by showing that the theoretical results closely match the simulated block sharing patterns. We then demonstrate that our inference scheme can accurately and robustly infer dispersal rate and effective density, as well as bounds on recent dynamics of population density. To demonstrate an application, we use our estimation scheme to explore the fit of a diffusion model to Eastern European samples in the POPRES data set. We show that ancestry diffusing with a rate of σ ≈ 50–100 km/√gen during the last centuries, combined with accelerating population growth, can explain the observed exponential decay of block sharing with increasing pairwise sample distance.},
  author       = {Ringbauer, Harald and Coop, Graham and Barton, Nicholas H},
  issn         = {0016-6731},
  journal      = {Genetics},
  number       = {3},
  pages        = {1335 -- 1351},
  publisher    = {Genetics Society of America},
  title        = {{Inferring recent demography from isolation by distance of long shared sequence blocks}},
  doi          = {10.1534/genetics.116.196220},
  volume       = {205},
  year         = {2017},
}

@inproceedings{559,
  abstract     = {Proofs of space (PoS) were suggested as more ecological and economical alternative to proofs of work, which are currently used in blockchain designs like Bitcoin. The existing PoS are based on rather sophisticated graph pebbling lower bounds. Much simpler and in several aspects more efficient schemes based on inverting random functions have been suggested, but they don’t give meaningful security guarantees due to existing time-memory trade-offs. In particular, Hellman showed that any permutation over a domain of size N can be inverted in time T by an algorithm that is given S bits of auxiliary information whenever (Formula presented). For functions Hellman gives a weaker attack with S2· T≈ N2 (e.g., S= T≈ N2/3). To prove lower bounds, one considers an adversary who has access to an oracle f: [ N] → [N] and can make T oracle queries. The best known lower bound is S· T∈ Ω(N) and holds for random functions and permutations. We construct functions that provably require more time and/or space to invert. Specifically, for any constant k we construct a function [N] → [N] that cannot be inverted unless Sk· T∈ Ω(Nk) (in particular, S= T≈ (Formula presented). Our construction does not contradict Hellman’s time-memory trade-off, because it cannot be efficiently evaluated in forward direction. However, its entire function table can be computed in time quasilinear in N, which is sufficient for the PoS application. Our simplest construction is built from a random function oracle g: [N] × [N] → [ N] and a random permutation oracle f: [N] → N] and is defined as h(x) = g(x, x′) where f(x) = π(f(x′)) with π being any involution without a fixed point, e.g. flipping all the bits. For this function we prove that any adversary who gets S bits of auxiliary information, makes at most T oracle queries, and inverts h on an ϵ fraction of outputs must satisfy S2· T∈ Ω(ϵ2N2).},
  author       = {Abusalah, Hamza M and Alwen, Joel F and Cohen, Bram and Khilko, Danylo and Pietrzak, Krzysztof Z and Reyzin, Leonid},
  isbn         = {978-331970696-2},
  location     = {Hong Kong, China},
  pages        = {357 -- 379},
  publisher    = {Springer},
  title        = {{Beyond Hellman’s time-memory trade-offs with applications to proofs of space}},
  doi          = {10.1007/978-3-319-70697-9_13},
  volume       = {10625},
  year         = {2017},
}

@article{840,
  abstract     = {Heavy holes confined in quantum dots are predicted to be promising candidates for the realization of spin qubits with long coherence times. Here we focus on such heavy-hole states confined in germanium hut wires. By tuning the growth density of the latter we can realize a T-like structure between two neighboring wires. Such a structure allows the realization of a charge sensor, which is electrostatically and tunnel coupled to a quantum dot, with charge-transfer signals as high as 0.3 e. By integrating the T-like structure into a radiofrequency reflectometry setup, single-shot measurements allowing the extraction of hole tunneling times are performed. The extracted tunneling times of less than 10 μs are attributed to the small effective mass of Ge heavy-hole states and pave the way toward projective spin readout measurements.},
  author       = {Vukusic, Lada and Kukucka, Josip and Watzinger, Hannes and Katsaros, Georgios},
  issn         = {1530-6984},
  journal      = {Nano Letters},
  number       = {9},
  pages        = {5706 -- 5710},
  publisher    = {American Chemical Society},
  title        = {{Fast hole tunneling times in germanium hut wires probed by single-shot reflectometry}},
  doi          = {10.1021/acs.nanolett.7b02627},
  volume       = {17},
  year         = {2017},
}

@article{1010,
  abstract     = {We prove a local law in the bulk of the spectrum for random Gram matrices XX∗, a generalization of sample covariance matrices, where X is a large matrix with independent, centered entries with arbitrary variances. The limiting eigenvalue density that generalizes the Marchenko-Pastur law is determined by solving a system of nonlinear equations. Our entrywise and averaged local laws are on the optimal scale with the optimal error bounds. They hold both in the square case (hard edge) and in the properly rectangular case (soft edge). In the latter case we also establish a macroscopic gap away from zero in the spectrum of XX∗. },
  author       = {Alt, Johannes and Erdös, László and Krüger, Torben H},
  issn         = {1083-6489},
  journal      = {Electronic Journal of Probability},
  publisher    = {Institute of Mathematical Statistics},
  title        = {{Local law for random Gram matrices}},
  doi          = {10.1214/17-EJP42},
  volume       = {22},
  year         = {2017},
}

@article{550,
  abstract     = {For large random matrices X with independent, centered entries but not necessarily identical variances, the eigenvalue density of XX* is well-approximated by a deterministic measure on ℝ. We show that the density of this measure has only square and cubic-root singularities away from zero. We also extend the bulk local law in [5] to the vicinity of these singularities.},
  author       = {Alt, Johannes},
  issn         = {1083-589X},
  journal      = {Electronic Communications in Probability},
  publisher    = {Institute of Mathematical Statistics},
  title        = {{Singularities of the density of states of random Gram matrices}},
  doi          = {10.1214/17-ECP97},
  volume       = {22},
  year         = {2017},
}

