References of "2020"
     in
Bookmark and Share    
Full Text
See detailA UNIFORM RESULT FOR THE DIMENSION OF FRACTIONAL BROWNIAN MOTION LEVEL SETS
Daw, Lara UL

in Statistics and Probability Letters (2020)

Let B={Bt:t≥0} be a real-valued fractional Brownian motion of index H∈(0,1). We prove that the macroscopic Hausdorff dimension of the level sets Lx={t∈R+:Bt=x} is, with probability one, equal to 1−H for ... [more ▼]

Let B={Bt:t≥0} be a real-valued fractional Brownian motion of index H∈(0,1). We prove that the macroscopic Hausdorff dimension of the level sets Lx={t∈R+:Bt=x} is, with probability one, equal to 1−H for all x∈R. [less ▲]

Detailed reference viewed: 109 (10 UL)
Full Text
See detailIWalk in Luxembourg: Jewish public history in forgotten places
Bronec, Jakub UL

Scientific Conference (2020, November 06)

The contribution will introduce the process of designing two IWalk tours with bachelor students in Luxembourg. The presentation will contain the digital source criticism and new perspectives of digital ... [more ▼]

The contribution will introduce the process of designing two IWalk tours with bachelor students in Luxembourg. The presentation will contain the digital source criticism and new perspectives of digital hermeneutics related to themes of individual stops. The students were divided into two working groups, with each group assigned to a different area. Group A was in charge of designing a virtual tour in Luxembourg City and group B created one for the town of Esch-sur-Alzette. The participants took pictures of current buildings and locations associated with Jewish war history and compared them with original historical photos taken before and during the war. The students were encouraged to reflect on how the appearance and function of certain buildings had changed over time. Besides critical analysis of all pros and cons, I will introduce MAXQDA, a tool for qualitative data analysis to be an invaluable assistant for easier pre-selection of interviews. From a methodological perspective, we were able to judge the relevance of interviews for our work. Students also learned to link different text passages to each other as well as to other documents, educational websites, images or geographical locations. When several students are working with one data set, it is important to create a clear system of memos, codes and intercoder agreements. For a comparative analysis, students used a unified thematic coding tree they had created themselves. The use of a common code book tree enables them to find thematic intersections in their work. The contribution will also demonstrate the purpose of pre-question and post-questions, which make users consider the content of each IWalk stop. [less ▲]

Detailed reference viewed: 27 (6 UL)
Full Text
Peer Reviewed
See detailSpecifying key-properties to improve the recognition skills of neural networks
Jahic, Benjamin UL; Guelfi, Nicolas UL; Ries, Benoit UL

in Proceedings of the 2020 European Symposium on Software Engineering (2020, November 06)

Software engineers are increasingly asked to build datasets for engineering neural network-based software systems. These datasets are used to train neural networks to recognise data. Traditionally, data ... [more ▼]

Software engineers are increasingly asked to build datasets for engineering neural network-based software systems. These datasets are used to train neural networks to recognise data. Traditionally, data scientists build datasets consisting of random collected or generated data. Their approaches are often costly, inefficient and time-consuming. Software engineers rely on these traditional approaches that do not support precise data selection criteria based on customer’s requirements. In this paper, we introduce an extended software engineering method for dataset augmentation to improve neural networks by satisfying the customer’s requirements. We introduce the notion of key-properties to describe the neural network’s recognition skills. Key-properties are used all along the engineering process for developing the neural network in cooperation with the customer. We propose a rigorous process for augmenting datasets based on the analysis and specification of the key-properties. We conducted an experimentation on a case study on the recognition of the state of a digital meter counter. We demonstrate an informal specification of the neural network’s key-properties and a successful improvement of a neural network’s recognition of the meter counter state. [less ▲]

Detailed reference viewed: 135 (37 UL)
Full Text
Peer Reviewed
See detailEin Blick auf aktuelle Entwicklungen bei Blockchains und deren Auswirkungen auf den Energieverbrauch
Sedlmeir, Johannes; Ulrich Buhl, Hans; Fridgen, Gilbert UL et al

in Informatik-Spektrum (2020)

The enormous power consumption of Bitcoin has led to undifferentiated discussions in science and practice about the sustainability of blockchain and distributed ledger technology in general. However ... [more ▼]

The enormous power consumption of Bitcoin has led to undifferentiated discussions in science and practice about the sustainability of blockchain and distributed ledger technology in general. However, blockchain technology is far from homogeneous—not only with regard to its applications, which now go far beyond cryptocurrencies and have reached businesses and the public sector, but also with regard to its technical characteristics and, in particular, its power consumption. This paper summarizes the status quo of the power consumption of various implementations of blockchain technology, with special emphasis on the recent ‘‘Bitcoin Halving’’ and so-called ‘‘zk-rollups’’. We argue that although Bitcoin and other proof-of-work blockchains do indeed consume a lot of power, alternative blockchain solutions with significantly lower power consumption are already available today, and new promising concepts are being tested that could further reduce in particulary the power consumption of large blockchain networks in the near future. From this we conclude that although the criticism of Bitcoin’s power consumption is legitimate, it should not be used to derive an energy problem of blockchain technology in general. In many cases in which processes can be digitized or improved with the help of more energy-efficient blockchain variants, one can even expect net energy savings. [less ▲]

Detailed reference viewed: 79 (1 UL)
Full Text
See detailInstruction Coverage for Android App Testing and Tuning
Pilgun, Aleksandr UL

Doctoral thesis (2020)

For many people, mobile apps have already become an indispensable part of modern life. Apps entertain, educate, assist us in our daily routines and help us connect with others. However, the advanced ... [more ▼]

For many people, mobile apps have already become an indispensable part of modern life. Apps entertain, educate, assist us in our daily routines and help us connect with others. However, the advanced capabilities of modern devices running the apps and sensitive user data make mobile devices also an attractive attack target. To get access to sensitive data, adversaries tend to conceal malicious functionality in freely distributed legitimately-looking apps. The problem of low-quality and malicious apps, spreading at an enormous scale, is especially relevant for one of the biggest software repositories – Google Play. The Android apps distributed through this platform undergo a validation process by Google. However, that is insufficient to confirm their good nature. To identify dangerous apps, novel frameworks for testing and app analysis are being developed by the Android community. Code coverage is one of the most common metrics for evaluating the effectiveness of these frameworks, and it is used as an internal metric to guide code exploration in some of them. However, when analyzing apps without source code, the Android community relies mostly on method coverage since there are no reliable tools for measuring finer-grained code coverage in 3rd-party Android app testing. Another stumbling block for testing frameworks is the inability to test an app exhaustively. While code coverage measurement can indicate an improvement in testing, it is neither possible to reach 100% coverage nor to identify the maximum reachable coverage value for the app. Despite testing, the app still contains high amounts of not executed code, which makes it impossible to confirm the absence of potentially malicious code in the part of the app that has not been tested. The existing static debloating approaches aim at app size minimization rather than security and simply debloat not reachable code. However, there is currently no approach to debloat apps based on dynamic analysis information, i.e. to cut out not-executed code. In this dissertation, we solve these two problems by, first, proposing an efficient approach and a tool to measure code coverage at the instruction level, and second, a dynamic binary shrinking methodology for deleting not executed code from the app. We support our solutions by the following contributions: - An instrumentation approach to measure code coverage at the instruction level. Our technique instruments smali representation of Android bytecode to allow code coverage measurement at the finest level. - An implementation of the instrumentation approach. ACVTool is a self-contained package containing 4K lines of Python code. It is publicly available and can be integrated into different testing frameworks. - An extensive empirical evaluation that shows the high reliability and versatility of our approach. ACVTool successfully executes on 96.9% of apps from our dataset, introduces a negligible instrumentation time and runtime overheads, and its results are complaint to the results of JaCoCo (source code coverage) and Ella (method coverage) tools. - A detailed study on the influence of code coverage metric granularity on automated testing. We demonstrate the usefulness of ACVTool for automated testing techniques that rely on code coverage data in their operation. - A dynamic debloating approach based on ACVTool instruction coverage. We propose Dynamic Binary Shrinking System, a novel methodology created to shrink 3rd-party Android apps towards observed benign functionality on executed code. - An implementation of the dynamic debloating technique incorporated into the ACVCut tool. The tool demonstrates the viability of the Dynamic Shrinking System on two examples. It allows us to cut out not executed code and, thus, provide 100% instruction coverage on explored app behaviors. [less ▲]

Detailed reference viewed: 117 (10 UL)
Full Text
See detailUsing multi-member panels to tackle RSD complexities
Hambly, Jessica; Gill, Nick; Vianelli, Lorenzo UL

in Forced Migration Review (2020), (65), 32-35

Detailed reference viewed: 42 (7 UL)
Full Text
Peer Reviewed
See detailAssessing the robustness of decentralized gathering: a multi‐agent approach on micro‐biological systems
Proverbio, Daniele UL; Gallo, Luca; Passalacqua, Barbara et al

in Swarm Intelligence (2020), 14

Adopting a multi-agent systems paradigm, we developed, tested and exploited a computational testbed that simulates gathering features of the social amoeba Dictyostelium discoideum. It features a tailored ... [more ▼]

Adopting a multi-agent systems paradigm, we developed, tested and exploited a computational testbed that simulates gathering features of the social amoeba Dictyostelium discoideum. It features a tailored design and implementation to manage discrete simulations with autonomous agents on a microscopic scale, thus focusing on their social behavior and mutual interactions. Hence, we could assess the behavioral conditions under which decentralized gathering could occur. We investigated the dependence of the model dynamics on the main physical variables, namely density and number of amoebas, gaining indications that the process strongly depends on both. This result integrates previous researches, where density is identified as the sole relevant variable. We determined a high-density and high-numerosity region where assuming a scale-free behavior is safe. We also estimated the systematic uncertainties arising from a number of amoebas off the scale-free region, when coping with limited computational resources. Finally, we probed the robustness of the simulated gathering process against both extrinsic and intrinsic noise sources. [less ▲]

Detailed reference viewed: 125 (5 UL)
Full Text
Peer Reviewed
See detailFamily, Community and Long-Term Socioeconomic Inequality: Evidence from Siblings and Youth Peers
Bingley, Paul; Cappellari, Lorenzo; Tatsiramos, Konstantinos UL

in Economic Journal (2020)

Using administrative data for the population of Danish men and women, we develop an empirical model which accounts for the joint earnings dynamics of siblings and youth community peers. We provide the ... [more ▼]

Using administrative data for the population of Danish men and women, we develop an empirical model which accounts for the joint earnings dynamics of siblings and youth community peers. We provide the first decomposition of the sibling correlation of permanent earnings into family and community effects allowing for life-cycle dynamics, and extend the analysis to consider other outcomes. We find that family is the most important factor influencing sibling correlations of earnings, education and unemployment. Community background matters for shaping the sibling correlation of earnings and unemployment early in the working life, but its importance quickly diminishes. [less ▲]

Detailed reference viewed: 117 (4 UL)
Full Text
See detailAnalysing transnational Events through Web archives
Schafer, Valerie UL

Scientific Conference (2020, November 04)

As a co-PI of the WARCnet project, programme chair of this second WARCnet meeting and head of WG2 dedicated to "Analysing transnational Events", Valérie Schafer will give an overview of the challenges ... [more ▼]

As a co-PI of the WARCnet project, programme chair of this second WARCnet meeting and head of WG2 dedicated to "Analysing transnational Events", Valérie Schafer will give an overview of the challenges, issues, achievements, results, case studies, next steps of WG2 since the launch of the WARCnet project. [less ▲]

Detailed reference viewed: 63 (1 UL)
Full Text
See detail„Der Transport aus Tambow nach Luxemburg wäre über die Frontlinie des Jahres 1944 gar nicht denkbar gewesen“
Ganschow, Inna UL

Article for general public (2020)

Yuri Mizis ist Geschichtsprofessor und Leiter der Abteilung für russische Geschichte an der Staatlichen Universität G.R. Derzhavin Tambow. Zusammen mit Vladimir Diachkov und Vladimir Kanishchev schrieb er ... [more ▼]

Yuri Mizis ist Geschichtsprofessor und Leiter der Abteilung für russische Geschichte an der Staatlichen Universität G.R. Derzhavin Tambow. Zusammen mit Vladimir Diachkov und Vladimir Kanishchev schrieb er die Sammelmonographie „Geschichte und persönliche, soziale und psychologische Aspekte der Beziehungen innerhalb und außerhalb der Kriegsgefangenenlager in Tambow 1943 – 1946“. Jausa, Moskau 2020 (im Druck). [less ▲]

Detailed reference viewed: 25 (0 UL)
Full Text
See detailTen years of re-thinking regions from citizens’ perspectives
Koff, Harlan UL; Maganda, Carmen; De Lombaerde, Philippe et al

in Regions and Cohesion (2020), 10(3), -

This special issue commemorating Regions & Cohesion’s tenth anniversary continues the tradition described herein. Entitled “Re-thinking regions: A citizen perspective,” it has been conceptualized and ... [more ▼]

This special issue commemorating Regions & Cohesion’s tenth anniversary continues the tradition described herein. Entitled “Re-thinking regions: A citizen perspective,” it has been conceptualized and coordinated by the journal’s editors, associate editors, and editorial manager. We thank the contributing authors for accepting the challenge to respond to any of the following provocative questions: What contributed to the perceived decline of regions in global affairs? How can regions recover from this perceived decline? How can supranational, transnational, or sub-national regions respond better to the needs of citizens? How can regions better support the Sustainable Development Goals and the transformative development that they pursue? How can regions promote more sustainable usage of natural resources? What roles can regions play in global affairs in the near- to medium-term future? The articles published here provide a snapshot of the state of regional integration in the world today. These articles also engage the field of regional studies, discuss its strengths and weaknesses, and indicate interesting paths for future scholarship. We thank the authors for these proposed ways forward. [less ▲]

Detailed reference viewed: 46 (5 UL)
Full Text
See detailAuf der Suche nach der letzten Ruhestätte
Ganschow, Inna UL; Karger, Claude

Article for general public (2020)

Inna Ganschow, hofft, gemeinsam mit Tambower Kollegen durch die genauen Sterbelisten der letzten Ruhestätte der Luxemburger, die im Lager umkamen, etwas näher zu kommen. „Sie wurden mit Verstorbenen ... [more ▼]

Inna Ganschow, hofft, gemeinsam mit Tambower Kollegen durch die genauen Sterbelisten der letzten Ruhestätte der Luxemburger, die im Lager umkamen, etwas näher zu kommen. „Sie wurden mit Verstorbenen anderer Nationalitäten zusammen in Massengräbern bestattet”, erklärt die Forscherin, „wo genau, darüber könnte der Abgleich zwischen einer technischen Zeichnung des Lagerfriedhofs, auf der die Orte der Bestattungen chronologisch aufgeführt sind und den chronologischen Sterbelisten der Lagerleitung Aufschluss geben” [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailLes comptes de la baumaîtrie de la ville de Luxembourg (1388-1500). État des lieux et perspectives de recherches
Pauly, Michel UL

in Comptabilité(S). Revue d'histoire des compatbilités (2020), 13

La contribution présente les comptes de la baumaîtrie de la ville de Luxembourg fort bien conservés pour la fin du 14e et le 15e siècle. Un inventaire des volumes conservés aux archives municipales est ... [more ▼]

La contribution présente les comptes de la baumaîtrie de la ville de Luxembourg fort bien conservés pour la fin du 14e et le 15e siècle. Un inventaire des volumes conservés aux archives municipales est suivi d’une description codicologique sommaire avant que ne soit esquissé le rôle du baumâitre, c.-à-d. du receveur central de la ville et celui du clerc-juré dans la confection des livres de compte ainsi que leur appartenance sociale et linguistique. L’article continue par un bilan de l’exploitation historiographique des livres de la baumaîtrie, y compris pour l’histoire de la langue, et par quelques questions de recherche qui mériteraient d’être approfondies. [less ▲]

Detailed reference viewed: 31 (6 UL)
See detailCorona-Zeiten, Corona Räume: Alltägliche Raumkonstruktion vor dem Hintergrund der Eindämmung der Covid-19-Pandemie im Saarland
Mellinger, Lukas UL

E-print/Working paper (2020)

In der Reaktion auf die Ausbreitung der Covid-19-Pandemie kam es weltweit für viele Menschen zum Bruch sozialer und räumlicher Routinen. In Deutschland haben die Landesregierungen die führende Rolle beim ... [more ▼]

In der Reaktion auf die Ausbreitung der Covid-19-Pandemie kam es weltweit für viele Menschen zum Bruch sozialer und räumlicher Routinen. In Deutschland haben die Landesregierungen die führende Rolle beim Versuchübernommen, durch Verfügungen und Verordnungen die weitere Ausbreitung der Pandemie einzu-dämmen. In diesem Kontexthatdie Art und Weise wie Gesetze und Regeln Alltagsräume durchdringen für viele Menschen eine neue (unmittelbar erlebbare) Dimension angenommen. Ziel dieses Beitrags ist es,mit einem Fokus auf die getroffenenMaßnahmen der saarländischen Landesregierung diesbezüglich eine lo-kale Perspektive zu entwickeln. Durch die qualitative Methode der Autofotographie werden dabei individu-elle Sichtweisen auf das zugrundeliegendeWechselspiel von Recht, Raum und Gesellschaft in den Vorder-grund der Analyse gestellt.Durch den Blick auf sozialräumliche Zusammenhänge werden so die Auswirkun-gen der getroffenen Maßnahmen hinterfragt. [less ▲]

Detailed reference viewed: 120 (14 UL)
Full Text
See detailA multifaceted formal analysis of end-to-end encrypted email protocols and cryptographic authentication enhancements
Vazquez Sandoval, Itzel UL

Doctoral thesis (2020)

Largely owing to cryptography, modern messaging tools (e.g., Signal) have reached a considerable degree of sophistication, balancing advanced security features with high usability. This has not been the ... [more ▼]

Largely owing to cryptography, modern messaging tools (e.g., Signal) have reached a considerable degree of sophistication, balancing advanced security features with high usability. This has not been the case for email, which however, remains the most pervasive and interoperable form of digital communication. As sensitive information (e.g., identification documents, bank statements, or the message in the email itself) is frequently exchanged by this means, protecting the privacy of email communications is a justified concern which has been emphasized in the last years. A great deal of effort has gone into the development of tools and techniques for providing email communications with privacy and security, requirements that were not originally considered. Yet, drawbacks across several dimensions hinder the development of a global solution that would strengthen security while maintaining the standard features that we expect from email clients. In this thesis, we present improvements to security in email communications. Relying on formal methods and cryptography, we design and assess security protocols and analysis techniques, and propose enhancements to implemented approaches for end-to-end secure email communication. In the first part, we propose a methodical process relying on code reverse engineering, which we use to abstract the specifications of two end-to-end security protocols from a secure email solution (called pEp); then, we apply symbolic verification techniques to analyze such protocols with respect to privacy and authentication properties. We also introduce a novel formal framework that enables a system's security analysis aimed at detecting flaws caused by possible discrepancies between the user's and the system's assessment of security. Security protocols, along with user perceptions and interaction traces, are modeled as transition systems; socio-technical security properties are defined as formulas in computation tree logic (CTL), which can then be verified by model checking. Finally, we propose a protocol that aims at securing a password-based authentication system designed to detect the leakage of a password database, from a code-corruption attack. In the second part, the insights gained by the analysis in Part I allow us to propose both, theoretical and practical solutions for improving security and usability aspects, primarily of email communication, but from which secure messaging solutions can benefit too. The first enhancement concerns the use of password-authenticated key exchange (PAKE) protocols for entity authentication in peer-to-peer decentralized settings, as a replacement for out-of-band channels; this brings provable security to the so far empirical process, and enables the implementation of further security and usability properties (e.g., forward secrecy, secure secret retrieval). A second idea refers to the protection of weak passwords at rest and in transit, for which we propose a scheme based on the use of a one-time-password; furthermore, we consider potential approaches for improving this scheme. The hereby presented research was conducted as part of an industrial partnership between SnT/University of Luxembourg and pEp Security S.A. [less ▲]

Detailed reference viewed: 217 (15 UL)
Full Text
Peer Reviewed
See detailMitochondrial and Clearance Impairment in p.D620N VPS35 Patient-Derived Neurons
Hanss, Zoé UL; Larsen, Simone UL; Antony, Paul UL et al

in Movement Disorders (2020)

Background: VPS35 is part of the retromer complex and is responsible for the trafficking and recycling of proteins implicated in autophagy and lysosomal degradation, but also takes part in the degradation ... [more ▼]

Background: VPS35 is part of the retromer complex and is responsible for the trafficking and recycling of proteins implicated in autophagy and lysosomal degradation, but also takes part in the degradation of mitochondrial proteins via mitochondria-derived vesicles. The p.D620N mutation of VPS35 causes an autosomal-dominant form of Parkinson’s disease (PD), clinically representing typical PD. Objective: Most of the studies on p.D620N VPS35 were performed on human tumor cell lines, rodent models overexpressing mutant VPS35, or in patient-derived fibroblasts. Here, based on identified target proteins, we investigated the implication of mutant VPS35 in autophagy, lysosomal degradation, and mitochondrial function in induced pluripotent stem cell-derived neurons from a patient harboring the p.D620N mutation. Methods: We reprogrammed fibroblasts from a PD patient carrying the p.D620N mutation in the VPS35 gene and from two healthy donors in induced pluripotent stem cells. These were subsequently differentiated into neuronal precursor cells to finally generate midbrain dopaminergic neurons. Results: We observed a decreased autophagic flux and lysosomal mass associated with an accumulation of α-synuclein in patient-derived neurons compared to controls. Moreover, patient-derived neurons presented a mitochondrial dysfunction with decreased membrane potential, impaired mitochondrial respiration, and increased production of reactive oxygen species associated with a defect in mitochondrial quality control via mitophagy. Conclusion: We describe for the first time the impact of the p.D620N VPS35 mutation on autophago-lysosome pathway and mitochondrial function in stem cell-derived neurons from an affected p.D620N carrier and define neuronal phenotypes for future pharmacological interventions [less ▲]

Detailed reference viewed: 64 (3 UL)
Full Text
See detailScalable Control of Asynchronous Boolean Networks
Su, Cui UL

Doctoral thesis (2020)

Direct cell reprogramming has been garnering attention for its therapeutic potential for treating the most devastating diseases characterised by defective cells or a deficiency of certain cells. It is ... [more ▼]

Direct cell reprogramming has been garnering attention for its therapeutic potential for treating the most devastating diseases characterised by defective cells or a deficiency of certain cells. It is capable of reprogramming any kind of abundant cells in the body into the desired cells to restore functions of the diseased organ. It has shown promising benefits for clinical applications, such as cell and tissue engineering, regenerative medicine and drug discovery. A major obstacle in the application of direct cell reprogramming lies in the identification of effective reprogramming factors. Experimental approaches are usually laborious, time-consuming and enormously expensive. Mathematical modelling of biological systems paves the way to study mechanisms of biological processes and identify therapeutic targets with computational reasoning and tools. Among several modelling frameworks, Boolean networks have apparent advantages. They provide a qualitative description of biological systems and thus evade the parametrisation problem, which often occurs in quantitative models. In this thesis, we focus on the identification of reprogramming factors based on asynchronous Boolean networks. This problem is equivalent to the control of asynchronous Boolean networks: finding a subset of nodes, whose perturbations can drive the dynamics of the network from the source state (the initial cell type) to the target attractor (the desired cell type). Before diving into the control problems, we first develop a near-optimal decomposition method and use this method to improve the scalability of the decomposition-based method for attractor detection. The new decomposition-based attractor detection method can identify all the exact attractors of the network efficiently, such that we can select the proper attractors corresponding to the initial cell type and the desired cell type as the source and target attractors and predict the key nodes for the conversion. Depending on whether the source state is given or not, we can have two control problems: source-target control and target control. We develop several methods to solve the two problems using different control strategies. All the methods are implemented in our software CABEAN. Given a control problem, CABEAN can provide a rich set of realistic solutions that manipulate the dynamics in different ways, such that biologists can select suitable ones to validate with biological experiments. We believe our works can contribute to a better understanding of the regulatory mechanisms of biological processes and greatly facilitate the development of direct cell reprogramming. [less ▲]

Detailed reference viewed: 117 (10 UL)
Full Text
Peer Reviewed
See detailRoles of bacteriophages, plasmids and CRISPR immunity in microbial community dynamics revealed using time-series integrated meta-omics
Martinez Arbas, Susana UL; Narayanasamy, Shaman; Herold, Malte et al

in Nature Microbiology (2020)

Viruses and plasmids (invasive mobile genetic elements (iMGEs)) have important roles in shaping microbial communities, but their dynamic interactions with CRISPR-based immunity remain unresolved. We ... [more ▼]

Viruses and plasmids (invasive mobile genetic elements (iMGEs)) have important roles in shaping microbial communities, but their dynamic interactions with CRISPR-based immunity remain unresolved. We analysed generation-resolved iMGE–host dynamics spanning one and a half years in a microbial consortium from a biological wastewater treatment plant using integrated meta-omics. We identified 31 bacterial metagenome-assembled genomes encoding complete CRISPR–Cas systems and their corresponding iMGEs. CRISPR-targeted plasmids outnumbered their bacteriophage counterparts by at least fivefold, highlighting the importance of CRISPR-mediated defence against plasmids. Linear modelling of our time-series data revealed that the variation in plasmid abundance over time explained more of the observed community dynamics than phages. Community-scale CRISPR-based plasmid–host and phage–host interaction networks revealed an increase in CRISPR-mediated interactions coinciding with a decrease in the dominant ‘Candidatus Microthrix parvicella’ population. Protospacers were enriched in sequences targeting genes involved in the transmission of iMGEs. Understanding the factors shaping the fitness of specific populations is necessary to devise control strategies for undesirable species and to predict or explain community-wide phenotypes. [less ▲]

Detailed reference viewed: 130 (8 UL)
Full Text
See detailLinear Z2n-Manifolds and Linear Actions
Bruce, Andrew UL; Ibarguengoytia, Eduardo UL; Poncin, Norbert UL

E-print/Working paper (2020)

Detailed reference viewed: 64 (4 UL)
Full Text
See detailPrimary and Secondary Impacts of COVID-19 on Children and Women in Ghana
Karpati, Julia; Elezaj, Erëblina; Safojan, Romina et al

Report (2020)

Detailed reference viewed: 28 (0 UL)