16,286 research outputs found

    Bridge helix bending promotes RNA polymerase II backtracking through a critical and conserved threonine residue.

    Get PDF
    The dynamics of the RNA polymerase II (Pol II) backtracking process is poorly understood. We built a Markov State Model from extensive molecular dynamics simulations to identify metastable intermediate states and the dynamics of backtracking at atomistic detail. Our results reveal that Pol II backtracking occurs in a stepwise mode where two intermediate states are involved. We find that the continuous bending motion of the Bridge helix (BH) serves as a critical checkpoint, using the highly conserved BH residue T831 as a sensing probe for the 3'-terminal base paring of RNA:DNA hybrid. If the base pair is mismatched, BH bending can promote the RNA 3'-end nucleotide into a frayed state that further leads to the backtracked state. These computational observations are validated by site-directed mutagenesis and transcript cleavage assays, and provide insights into the key factors that regulate the preferences of the backward translocation

    Non-catalytic bromination of benzene: a combined computational and experimental study

    Get PDF
    The non-catalytic bromination of benzene is shown experimentally to require high 5-14M concentrations of bromine in order to proceed at ambient temperatures to form predominantly bromobenzene, along with detectable (The non-catalytic bromination of benzene is shown experimentally to require high 5-14M concentrations of bromine in order to proceed at ambient temperatures to form predominantly bromobenzene, along with detectable (The non-catalytic bromination of benzene is shown experimentally to require high 5-14M concentrations of bromine in order to proceed at ambient temperatures to form predominantly bromobenzene, along with detectable

    Finite Countermodel Based Verification for Program Transformation (A Case Study)

    Get PDF
    Both automatic program verification and program transformation are based on program analysis. In the past decade a number of approaches using various automatic general-purpose program transformation techniques (partial deduction, specialization, supercompilation) for verification of unreachability properties of computing systems were introduced and demonstrated. On the other hand, the semantics based unfold-fold program transformation methods pose themselves diverse kinds of reachability tasks and try to solve them, aiming at improving the semantics tree of the program being transformed. That means some general-purpose verification methods may be used for strengthening program transformation techniques. This paper considers the question how finite countermodels for safety verification method might be used in Turchin's supercompilation method. We extract a number of supercompilation sub-algorithms trying to solve reachability problems and demonstrate use of an external countermodel finder for solving some of the problems.Comment: In Proceedings VPT 2015, arXiv:1512.0221

    Recursive Program Optimization Through Inductive Synthesis Proof Transformation

    Get PDF
    The research described in this paper involved developing transformation techniques which increase the efficiency of the noriginal program, the source, by transforming its synthesis proof into one, the target, which yields a computationally more efficient algorithm. We describe a working proof transformation system which, by exploiting the duality between mathematical induction and recursion, employs the novel strategy of optimizing recursive programs by transforming inductive proofs. We compare and contrast this approach with the more traditional approaches to program transformation, and highlight the benefits of proof transformation with regards to search, correctness, automatability and generality

    An asymptotic theory for the re-equilibration of a micellar surfactant solution

    Get PDF
    Micellar surfactant solutions are characterized by a distribution of aggregates comprised predominantly of pre-micellar aggregates (monomers, dimers, trimers, etc.) and a region of proper micelles close to the peak aggregation number, connected by an intermediate region containing a very low concentration of aggregates. Such a distribution gives rise to a distinct two-timescale re-equilibration following a system dilution, known as the 1 and 2 processes, whose dynamics may be described by the Becker–Döring equations. We use a continuum version of these equations to develop a reduced asymptotic description that elucidates the behavior during each of these processes

    Logical Step-Indexed Logical Relations

    Full text link
    Appel and McAllester's "step-indexed" logical relations have proven to be a simple and effective technique for reasoning about programs in languages with semantically interesting types, such as general recursive types and general reference types. However, proofs using step-indexed models typically involve tedious, error-prone, and proof-obscuring step-index arithmetic, so it is important to develop clean, high-level, equational proof principles that avoid mention of step indices. In this paper, we show how to reason about binary step-indexed logical relations in an abstract and elegant way. Specifically, we define a logic LSLR, which is inspired by Plotkin and Abadi's logic for parametricity, but also supports recursively defined relations by means of the modal "later" operator from Appel, Melli\`es, Richards, and Vouillon's "very modal model" paper. We encode in LSLR a logical relation for reasoning relationally about programs in call-by-value System F extended with general recursive types. Using this logical relation, we derive a set of useful rules with which we can prove contextual equivalence and approximation results without counting steps
    corecore