{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T17:43:44Z","timestamp":1720201424977},"reference-count":91,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T00:00:00Z","timestamp":1435708800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T00:00:00Z","timestamp":1562198400000},"content-version":"vor","delay-in-days":1464,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"funder":[{"name":"Istituto Nazionale di Alta Matematica"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1016\/j.tcs.2015.02.045","type":"journal-article","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T18:33:03Z","timestamp":1427653983000},"page":"26-48","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Unwinding biological systems"],"prefix":"10.1016","volume":"587","author":[{"given":"Alberto","family":"Casagrande","sequence":"first","affiliation":[]},{"given":"Carla","family":"Piazza","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.tcs.2015.02.045_br0010","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.1038\/nbt1356","article-title":"Executable cell biology","volume":"25","author":"Fisher","year":"2007","journal-title":"Nat. Biotechnol."},{"key":"10.1016\/j.tcs.2015.02.045_br0020","series-title":"Model Checking","author":"Clarke","year":"1999"},{"issue":"1\/2","key":"10.1016\/j.tcs.2015.02.045_br0030","doi-asserted-by":"crossref","first-page":"75","DOI":"10.3233\/JCS-2001-91-204","article-title":"Process algebra and non-interference","volume":"9","author":"Ryan","year":"2001","journal-title":"J. Comput. Secur."},{"key":"10.1016\/j.tcs.2015.02.045_br0040","series-title":"Proc. of 4th Int. Conference on Verification, Model Checking, and Abstract Interpretation","first-page":"223","article-title":"Bisimulation and unwinding for verifying possibilistic security properties","volume":"vol. 2575","author":"Bossi","year":"2003"},{"key":"10.1016\/j.tcs.2015.02.045_br0050","series-title":"17th Int. Conference Computer Aided Verification Proceedings","first-page":"5","article-title":"Algorithmic algebraic model checking I: challenges from systems biology","volume":"vol. 3576","author":"Piazza","year":"2005"},{"issue":"4","key":"10.1016\/j.tcs.2015.02.045_br0060","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/1364644.1364651","article-title":"Using probabilistic model checking in systems biology","volume":"35","author":"Kwiatkowska","year":"2008","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"10.1016\/j.tcs.2015.02.045_br0070","series-title":"Computational Intelligence Methods for Bioinformatics and Biostatistics","first-page":"112","article-title":"On the use of temporal formal logic to model gene regulatory networks","author":"Bernot","year":"2010"},{"issue":"21","key":"10.1016\/j.tcs.2015.02.045_br0080","doi-asserted-by":"crossref","first-page":"2207","DOI":"10.1016\/j.tcs.2010.10.021","article-title":"Dynamically consistent reduction of logical regulatory graphs","volume":"412","author":"Naldi","year":"2011","journal-title":"Theoret. Comput. Sci."},{"issue":"6","key":"10.1016\/j.tcs.2015.02.045_br0090","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1016\/j.automatica.2011.03.010","article-title":"Model decomposition and reduction tools for large-scale networks in systems biology","volume":"47","author":"Anderson","year":"2011","journal-title":"Automatica"},{"issue":"21","key":"10.1016\/j.tcs.2015.02.045_br0100","doi-asserted-by":"crossref","first-page":"2142","DOI":"10.1016\/j.tcs.2011.01.007","article-title":"A semantic equivalence for Bio-PEPA based on discretisation of continuous values","volume":"412","author":"Galpin","year":"2011","journal-title":"Theoret. Comput. Sci."},{"issue":"1","key":"10.1016\/j.tcs.2015.02.045_br0110","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/S0890-5401(03)00067-1","article-title":"Hybrid I\/O automata","volume":"185","author":"Lynch","year":"2003","journal-title":"Inform. and Comput."},{"key":"10.1016\/j.tcs.2015.02.045_br0120","series-title":"IEEE Conference Record of 13th Annual Symposium on Switching and Automata Theory, 1972","first-page":"125","article-title":"The equivalence problem for regular expressions with squaring requires exponential space","author":"Meyer","year":"1972"},{"issue":"1","key":"10.1016\/j.tcs.2015.02.045_br0130","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/0890-5401(90)90025-D","article-title":"CCS expressions, finite state processes, and three problems of equivalence","volume":"86","author":"Kanellakis","year":"1990","journal-title":"Inform. and Comput."},{"issue":"6","key":"10.1016\/j.tcs.2015.02.045_br0140","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1137\/0216062","article-title":"Three partition refinement algorithms","volume":"16","author":"Paige","year":"1987","journal-title":"SIAM J. Comput."},{"issue":"1","key":"10.1016\/j.tcs.2015.02.045_br0150","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.peva.2010.09.002","article-title":"Lumping partially symmetrical stochastic models","volume":"68","author":"Baarir","year":"2011","journal-title":"Perform. Eval."},{"key":"10.1016\/j.tcs.2015.02.045_br0160","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1038\/msb4100179","article-title":"Towards a theory of biological robustness","volume":"3","author":"Kitano","year":"2007","journal-title":"Mol. Syst. Biol."},{"issue":"11","key":"10.1016\/j.tcs.2015.02.045_br0170","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1038\/nrg1471","article-title":"Biological robustness","volume":"5","author":"Kitano","year":"2004","journal-title":"Nat. Rev. Genet."},{"key":"10.1016\/j.tcs.2015.02.045_br0180","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1038\/nrd2195","article-title":"A robustness-based approach to systems-oriented drug design","volume":"5","author":"Kitano","year":"2007","journal-title":"Nat. Rev., Drug Discov."},{"key":"10.1016\/j.tcs.2015.02.045_br0190","series-title":"IEEE Symposium on Security and Privacy","first-page":"11","article-title":"Security policies and security models","author":"Goguen","year":"1982"},{"issue":"1","key":"10.1016\/j.tcs.2015.02.045_br0200","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","article-title":"Language-based information-flow security","volume":"21","author":"Sabelfeld","year":"2003","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1","key":"10.1016\/j.tcs.2015.02.045_br0210","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","article-title":"A taxonomy of security properties for process algebras","volume":"3","author":"Focardi","year":"1995","journal-title":"J. Comput. Secur."},{"key":"10.1016\/j.tcs.2015.02.045_br0220","first-page":"19","article-title":"A CSP formulation of non-interference and unwinding","author":"Ryan","year":"1991","journal-title":"Cipher: IEEE Comput. Soc. Tech. Comm. Newsl. Secur. Priv."},{"issue":"2","key":"10.1016\/j.tcs.2015.02.045_br0230","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-2004-12202","article-title":"A process-algebraic approach for the analysis of probabilistic noninterference","volume":"12","author":"Aldini","year":"2004","journal-title":"J. Comput. Secur."},{"key":"10.1016\/j.tcs.2015.02.045_br0240","series-title":"Parallel Computing Technologies","first-page":"27","article-title":"Static analysis for secrecy and non-interference in networks of processes","volume":"vol. 2127","author":"Bodei","year":"2001"},{"issue":"3","key":"10.1016\/j.tcs.2015.02.045_br0250","doi-asserted-by":"crossref","first-page":"373","DOI":"10.3233\/JCS-2007-15303","article-title":"Compositional information flow security for concurrent programs","volume":"15","author":"Bossi","year":"2007","journal-title":"J. Comput. Secur."},{"issue":"21","key":"10.1016\/j.tcs.2015.02.045_br0260","doi-asserted-by":"crossref","first-page":"8645","DOI":"10.1073\/pnas.1015814108","article-title":"Sensitivity, robustness, and identifiability in stochastic chemical kinetics models","volume":"108","author":"Komorowski","year":"2011","journal-title":"Proc. Natl. Acad. Sci. USA"},{"issue":"42","key":"10.1016\/j.tcs.2015.02.045_br0270","doi-asserted-by":"crossref","first-page":"4262","DOI":"10.1016\/j.tcs.2009.06.021","article-title":"Robustness of temporal logic specifications for continuous-time signals","volume":"410","author":"Fainekos","year":"2009","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/j.tcs.2015.02.045_br0280","series-title":"Formal Modeling and Analysis of Timed Systems","first-page":"92","article-title":"Robust satisfaction of temporal logic over real-valued signals","volume":"vol. 6246","author":"Donz\u00e9","year":"2010"},{"issue":"26","key":"10.1016\/j.tcs.2015.02.045_br0290","doi-asserted-by":"crossref","first-page":"2827","DOI":"10.1016\/j.tcs.2010.05.008","article-title":"Continuous valuations of temporal logic specifications with applications to parameter optimization and robustness measures","volume":"412","author":"Rizk","year":"2011","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/j.tcs.2015.02.045_br0300","series-title":"Proc. of 25th Int. Conference on Computer Aided Verification","first-page":"264","article-title":"Efficient robust monitoring for STL","volume":"vol. 8044","author":"Donz\u00e9","year":"2013"},{"key":"10.1016\/j.tcs.2015.02.045_br0310","series-title":"Proc. of 2nd Int. Workshop on Hybrid Systems and Biology","first-page":"20","article-title":"Robustness analysis for value-freezing signal temporal logic","volume":"vol. 125","author":"Brim","year":"2013"},{"key":"10.1016\/j.tcs.2015.02.045_br0320","series-title":"Proc. of 2nd Int. Workshop on Hybrid Systems and Biology","first-page":"3","article-title":"On the robustness of temporal properties for stochastic models","volume":"vol. 125","author":"Bartocci","year":"2013"},{"issue":"1\u20133","key":"10.1016\/j.tcs.2015.02.045_br0330","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/j.tcs.2006.05.021","article-title":"Approximating and computing behavioural distances in probabilistic transition systems","volume":"360","author":"van Breugel","year":"2006","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/j.tcs.2015.02.045_br0340","series-title":"Proc. of the 9th Workshop on Quantitative Aspects of Programming Languages","first-page":"148","article-title":"Computing distances between probabilistic automata","volume":"vol. 52","author":"Tracol","year":"2011"},{"key":"10.1016\/j.tcs.2015.02.045_br0350","series-title":"Proc. of 8th Int. Conference on Formal Modeling and Analysis of Timed Systems","first-page":"213","article-title":"Simulation and bisimulation for probabilistic timed automata","volume":"vol. 6246","author":"Sproston","year":"2010"},{"key":"10.1016\/j.tcs.2015.02.045_br0360","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.tcs.2011.12.059","article-title":"Lumpability abstractions of rule-based systems","volume":"431","author":"Feret","year":"2012","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/j.tcs.2015.02.045_br0370","series-title":"Perspectives of Systems Informatics","first-page":"322","article-title":"Weighted lumpability on Markov chains","volume":"vol. 7162","author":"Sharma","year":"2012"},{"key":"10.1016\/j.tcs.2015.02.045_br0380","series-title":"Proc. Combined 20th Int. Workshop on Expressiveness in Concurrency and 10th Workshop on Structural Operational Semantics","first-page":"32","article-title":"Compositionality of approximate bisimulation for probabilistic systems","volume":"vol. 120","author":"Gebler","year":"2013"},{"key":"10.1016\/j.tcs.2015.02.045_br0390","series-title":"TACAS","first-page":"1","article-title":"On-the-fly exact computation of bisimilarity distances","volume":"vol. 7795","author":"Bacci","year":"2013"},{"key":"10.1016\/j.tcs.2015.02.045_br0400","series-title":"Proc. of the 20th Int. Conference on Computational Methods in Systems Biology","first-page":"20","article-title":"Beta binders for biological interactions","author":"Priami","year":"2005"},{"issue":"1","key":"10.1016\/j.tcs.2015.02.045_br0410","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.tcs.2004.03.061","article-title":"Bioambients: an abstraction for biological compartments","volume":"325","author":"Regev","year":"2004","journal-title":"Theoret. Comput. Sci."},{"issue":"1","key":"10.1016\/j.tcs.2015.02.045_br0420","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.tcs.2004.03.065","article-title":"Formal molecular biology","volume":"325","author":"Danos","year":"2004","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/j.tcs.2015.02.045_br0430","series-title":"Computational Methods in Systems Biology","first-page":"257","article-title":"Brane calculi","volume":"vol. 3082","author":"Cardelli","year":"2005"},{"issue":"1\u20132","key":"10.1016\/j.tcs.2015.02.045_br0440","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/j.tcs.2008.04.016","article-title":"Bitonal membrane systems: interactions of biological membranes","volume":"404","author":"Cardelli","year":"2008","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/j.tcs.2015.02.045_br0450","series-title":"Proc. of the 7th Int. Conference Computational Methods in Systems Biology","first-page":"189","article-title":"Equivalence and discretisation in Bio-PEPA","author":"Galpin","year":"2009"},{"key":"10.1016\/j.tcs.2015.02.045_br0460","series-title":"Proc. of the 7th Int. Conference Computational Methods in Systems Biology","first-page":"52","article-title":"Modelling biological clocks with Bio-PEPA: stochasticity and robustness for the Neurospora crassa circadian network","volume":"vol. 5688","author":"Akman","year":"2009"},{"key":"10.1016\/j.tcs.2015.02.045_br0470","series-title":"Proc. 3rd Workshop on Membrane Computing and Biologically Inspired Process Calculi","first-page":"71","article-title":"A compartmental model of the CAMP\/PKA\/MAPK pathway in Bio-PEPA","volume":"vol. 11","author":"Ciocchetta","year":"2009"},{"key":"10.1016\/j.tcs.2015.02.045_br0480","series-title":"Proc. 3rd Workshop from Biology to Concurrency and Back","first-page":"55","article-title":"Investigating modularity in the analysis of process algebra models of biochemical systems","volume":"vol. 19","author":"Ciocchetta","year":"2010"},{"key":"10.1016\/j.tcs.2015.02.045_br0490","series-title":"Proc. 3rd Workshop from Biology to Concurrency and Back","first-page":"1","article-title":"Complementary approaches to understanding the plant circadian clock","volume":"vol. 19","author":"Akman","year":"2010"},{"issue":"33\u201334","key":"10.1016\/j.tcs.2015.02.045_br0500","doi-asserted-by":"crossref","first-page":"3065","DOI":"10.1016\/j.tcs.2009.02.037","article-title":"Bio-PEPA: a framework for the modelling and analysis of biological systems","volume":"410","author":"Ciocchetta","year":"2009","journal-title":"Theoret. Comput. Sci."},{"issue":"1","key":"10.1016\/j.tcs.2015.02.045_br0510","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.entcs.2009.02.010","article-title":"Some investigations concerning the CTMC and the ODE model derived from Bio-PEPA","volume":"229","author":"Ciocchetta","year":"2009","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"10.1016\/j.tcs.2015.02.045_br0520","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1146\/annurev.physiol.63.1.757","article-title":"Genetic and molecular analysis of circadian rhythms in Neurospora","volume":"63","author":"Loros","year":"2001","journal-title":"Annu. Rev. Physiol."},{"key":"10.1016\/j.tcs.2015.02.045_br0530","series-title":"Introduction to Automata Theory, Languages, and Computation","author":"Hopcroft","year":"1979"},{"key":"10.1016\/j.tcs.2015.02.045_br0540","series-title":"Hybrid Systems","first-page":"209","article-title":"Hybrid automata: an algorithmic approach to the specification and verification of hybrid systems","author":"Alur","year":"1993"},{"key":"10.1016\/j.tcs.2015.02.045_br0550","series-title":"Logic in Computer Science, 1996","first-page":"278","article-title":"Eleventh Annual IEEE Symposium on The theory of hybrid automata Proceedings","author":"Henzinger","year":"1996"},{"key":"10.1016\/j.tcs.2015.02.045_br0560","series-title":"Proceedings of the Real-Time: Theory in Practice, REX Workshop","first-page":"447","article-title":"From timed to hybrid systems","author":"Maler","year":"1992"},{"key":"10.1016\/j.tcs.2015.02.045_br0570","series-title":"Proceedings of Int. Conference on Computer Aided Verification","first-page":"95","article-title":"Decidability of hybrid systems with rectangular differential inclusions","volume":"vol. 818","author":"Puri","year":"1994"},{"key":"10.1016\/j.tcs.2015.02.045_br0580","series-title":"Proc. of Int. Conference on Concurrency Theory","first-page":"530","article-title":"State equivalences for rectangular hybrid automata","volume":"vol. 1119","author":"Henzinger","year":"1996"},{"key":"10.1016\/j.tcs.2015.02.045_br0590","series-title":"Proc. of Hybrid Systems: Computation and Control","first-page":"76","article-title":"Verification of polyhedral-invariant hybrid automata using polygonal flow pipe approximations","volume":"vol. 1569","author":"Chutinan","year":"1999"},{"issue":"12","key":"10.1016\/j.tcs.2015.02.045_br0600","doi-asserted-by":"crossref","first-page":"1394","DOI":"10.1016\/j.ic.2008.09.001","article-title":"Inclusion dynamics hybrid automata","volume":"206","author":"Casagrande","year":"2008","journal-title":"Inform. and Comput."},{"key":"10.1016\/j.tcs.2015.02.045_br0610","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1006\/jtbi.1996.0233","article-title":"Pattern formation by lateral inhibition with feedback: a mathematical model of Delta\u2013Notch intercellular signalling","volume":"183","author":"Collier","year":"1996","journal-title":"J. Theoret. Biol."},{"key":"10.1016\/j.tcs.2015.02.045_br0620","series-title":"Proc. of Hybrid Systems: Computation and Control","first-page":"232","article-title":"Lateral inhibition through Delta\u2013Notch signaling: a piecewise affine hybrid model","volume":"vol. 2034","author":"Ghosh","year":"2001"},{"key":"10.1016\/j.tcs.2015.02.045_br0630","series-title":"Proc. of Hybrid Systems: Computation and Control","first-page":"233","article-title":"Automated symbolic reachability analysis; with application to Delta\u2013Notch signaling automata","volume":"vol. 2623","author":"Ghosh","year":"2003"},{"issue":"2","key":"10.1016\/j.tcs.2015.02.045_br0640","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","article-title":"A theory of timed automata","volume":"126","author":"Alur","year":"1994","journal-title":"Theoret. Comput. Sci."},{"key":"10.1016\/j.tcs.2015.02.045_br0650","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/PL00009858","article-title":"O-minimal hybrid systems","volume":"13","author":"Lafferriere","year":"2000","journal-title":"Math. Control Signals Systems"},{"key":"10.1016\/j.tcs.2015.02.045_br0660","series-title":"Proc. of Hybrid Systems: Computation and Control","first-page":"465","article-title":"Series of abstraction for hybrid automata","volume":"vol. 2289","author":"Tiwari","year":"2002"},{"key":"10.1016\/j.tcs.2015.02.045_br0670","series-title":"Hybrid Systems: Computation and Control","first-page":"233","article-title":"Automated symbolic reachability analysis; with application to Delta\u2013Notch signaling automata","author":"Ghosh","year":"2003"},{"issue":"1","key":"10.1016\/j.tcs.2015.02.045_br0680","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1049\/sb:20045019","article-title":"Symbolic reachable set computation of piecewise affine hybrid automata and its application to biological modelling: Delta\u2013Notch protein signalling","volume":"1","author":"Ghosh","year":"2004","journal-title":"Syst. Biol."},{"key":"10.1016\/j.tcs.2015.02.045_br0690","author":"Organization"},{"issue":"1","key":"10.1016\/j.tcs.2015.02.045_br0700","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1353\/bhm.2002.0022","article-title":"Updating the accounts: global mortality of the 1918\u20131920 \u201cSpanish\u201d influenza pandemic","volume":"76","author":"Johnson","year":"2002","journal-title":"Bull. Hist. Med."},{"issue":"1","key":"10.1016\/j.tcs.2015.02.045_br0710","doi-asserted-by":"crossref","first-page":"15","DOI":"10.3201\/eid1209.05-0979","article-title":"1918 influenza: the mother of all pandemics","volume":"12","author":"Taubenberger","year":"2006","journal-title":"Emerg. Infect. Dis."},{"issue":"2","key":"10.1016\/j.tcs.2015.02.045_br0720","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1128\/IAI.13.2.438-447.1976","article-title":"Influenza virus population dynamics in the respiratory tract of experimentally infected mice","volume":"13","author":"Larson","year":"1976","journal-title":"Infect. Immun."},{"issue":"15","key":"10.1016\/j.tcs.2015.02.045_br0730","doi-asserted-by":"crossref","first-page":"7590","DOI":"10.1128\/JVI.01623-05","article-title":"Kinetics of influenza a virus infection in humans","volume":"80","author":"Baccam","year":"2006","journal-title":"J. Virol."},{"issue":"12","key":"10.1016\/j.tcs.2015.02.045_br0740","doi-asserted-by":"crossref","first-page":"e240","DOI":"10.1371\/journal.pcbi.0030240","article-title":"Neuraminidase inhibitor resistance in influenza: assessing the danger of its generation and spread","volume":"3","author":"Handel","year":"2007","journal-title":"PLoS Comput. Biol."},{"issue":"8","key":"10.1016\/j.tcs.2015.02.045_br0750","doi-asserted-by":"crossref","first-page":"3974","DOI":"10.1128\/JVI.02078-09","article-title":"Dynamics of influenza virus infection and pathology","volume":"84","author":"Saenz","year":"2010","journal-title":"J. Virol."},{"issue":"6","key":"10.1016\/j.tcs.2015.02.045_br0760","doi-asserted-by":"crossref","first-page":"e1002588","DOI":"10.1371\/journal.pcbi.1002588","article-title":"Modeling within-host dynamics of influenza virus infection including immune responses","volume":"8","author":"Pawelek","year":"2012","journal-title":"PLoS Comput. Biol."},{"issue":"6","key":"10.1016\/j.tcs.2015.02.045_br0770","doi-asserted-by":"crossref","first-page":"988","DOI":"10.1007\/s11538-012-9777-2","article-title":"Dynamics of influenza virus and human host interactions during infection and replication cycle","volume":"75","author":"Madrahimov","year":"2013","journal-title":"Bull. Math. Biol."},{"issue":"1","key":"10.1016\/j.tcs.2015.02.045_br0780","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1056\/NEJM198401053100104","article-title":"Alpha interferon for induction of remission in hairy-cell leukemia","volume":"310","author":"Quesada","year":"1984","journal-title":"N. Engl. J. Med."},{"issue":"4","key":"10.1016\/j.tcs.2015.02.045_br0790","doi-asserted-by":"crossref","first-page":"312","DOI":"10.7326\/0003-4819-119-4-199308150-00011","article-title":"Effect of alpha-interferon treatment in patients with hepatitis B e antigen-positive chronic hepatitis B: a meta-analysis","volume":"119","author":"Wong","year":"1993","journal-title":"Ann. Intern. Med."},{"key":"10.1016\/j.tcs.2015.02.045_br0800","doi-asserted-by":"crossref","first-page":"S19","DOI":"10.1097\/00002030-199409001-00005","article-title":"Interferons in HIV and related diseases","volume":"8","author":"Lane","year":"1994","journal-title":"AIDS"},{"issue":"7472","key":"10.1016\/j.tcs.2015.02.045_br0810","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1038\/nature12542","article-title":"Human MX2 is an interferon-induced post-entry inhibitor of HIV-1 infection","volume":"502","author":"Goujon","year":"2013","journal-title":"Nature"},{"issue":"11","key":"10.1016\/j.tcs.2015.02.045_br0820","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1051\/medsci\/20132911016","article-title":"Hepatitis C virus: 25 years-old, the end?","volume":"29","author":"Pol","year":"2013","journal-title":"Med. Sci. (Paris)"},{"issue":"3","key":"10.1016\/j.tcs.2015.02.045_br0830","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1002\/ana.410390304","article-title":"Intramuscular interferon beta-1a for disease progression in relapsing multiple sclerosis","volume":"39","author":"Jacobs","year":"1996","journal-title":"Ann. Neurol."},{"issue":"1 Suppl 1","key":"10.1016\/j.tcs.2015.02.045_br0840","first-page":"39","article-title":"Mood and cognitive side effects of interferon-alpha therapy","volume":"25","author":"Valentine","year":"1998","journal-title":"Sem. Oncol."},{"issue":"8","key":"10.1016\/j.tcs.2015.02.045_br0850","doi-asserted-by":"crossref","first-page":"1622","DOI":"10.1212\/WNL.53.8.1622","article-title":"Multiple sclerosis side effects of interferon beta therapy and their management","volume":"53","author":"Walther","year":"1999","journal-title":"Neurology"},{"issue":"S1","key":"10.1016\/j.tcs.2015.02.045_br0860","doi-asserted-by":"crossref","first-page":"S237","DOI":"10.1002\/hep.1840360730","article-title":"Side effects of therapy of hepatitis C and their management","volume":"36","author":"Fried","year":"2002","journal-title":"Hepatology"},{"key":"10.1016\/j.tcs.2015.02.045_br0870","author":"Octave community"},{"key":"10.1016\/j.tcs.2015.02.045_br0880","doi-asserted-by":"crossref","first-page":"S32","DOI":"10.1016\/S0264-410X(00)00275-9","article-title":"Inflammatory responses in influenza a virus infection","volume":"19","author":"Julkunen","year":"2000","journal-title":"Vaccine"},{"key":"10.1016\/j.tcs.2015.02.045_br0890","series-title":"Human Interferon","first-page":"119","article-title":"Tissue culture models of in vivo interferon production and action","author":"Dianzani","year":"1978"},{"key":"10.1016\/j.tcs.2015.02.045_br0900","series-title":"Formal Methods in Macro-Biology","first-page":"63","article-title":"External interactions on hybrid models of biological systems","volume":"vol. 8738","author":"Casagrande","year":"2014"},{"key":"10.1016\/j.tcs.2015.02.045_br0910","doi-asserted-by":"crossref","first-page":"67","DOI":"10.3389\/fgene.2012.00067","article-title":"Biological robustness: paradigms, mechanisms, and systems principles","volume":"3","author":"Whitacre","year":"2012","journal-title":"Front. Genet."}],"container-title":["Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0304397515002212?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0304397515002212?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T08:07:37Z","timestamp":1598861257000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0304397515002212"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":91,"alternative-id":["S0304397515002212"],"URL":"https:\/\/doi.org\/10.1016\/j.tcs.2015.02.045","relation":{},"ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"subject":[],"published":{"date-parts":[[2015,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Unwinding biological systems","name":"articletitle","label":"Article Title"},{"value":"Theoretical Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.tcs.2015.02.045","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}