389 research outputs found
Recycling of epidermal growth factor-receptor complexes in A431 cells: identification of dual pathways
The intracellular sorting of EGF-receptor complexes (EGF-RC) has been studied in human epidermoid carcinoma A431 cells. Recycling of EGF was found to occur rapidly after internalization at 37 degrees C. The initial rate of EGF recycling was reduced at 18 degrees C. A significant pool of internalized EGF was incapable of recycling at 18 degrees C but began to recycle when cells were warmed to 37 degrees C. The relative rate of EGF outflow at 37 degrees C from cells exposed to an 18 degrees C temperature block was slower (t1/2 approximately 20 min) than the rate from cells not exposed to a temperature block (t1/2 approximately 5-7 min). These data suggest that there might be both short- and long-time cycles of EGF recycling in A431 cells. Examination of the intracellular EGF-RC dissociation and dynamics of short- and long-time recycling indicated that EGF recycled as EGF-RC. Moreover, EGF receptors that were covalently labeled with a photoactivatable derivative of 125I-EGF recycled via the long-time pathway at a rate similar to that of 125I-EGF. Since EGF-RC degradation was also blocked at 18 degrees C, we propose that sorting to the lysosomal and long-time recycling pathway may occur after a highly temperature-sensitive step, presumably in the late endosomes
Antiapoptotic herpesvirus Bcl-2 homologs escape caspase-mediated conversion to proapoptotic proteins
The antiapoptotic Bcl-2 and Bcl-x(L) proteins of mammals are converted into potent proapoptotic factors when they are cleaved by caspases, a family of apoptosis-inducing proteases (E. H.-Y. Cheng, D. G. Kirsch, R. J. Clem, R. Ravi, M. B. Kastan, A. Bedi, K. Ueno, and J. M. Hardwick, Science 278:1966-1968, 1997; R. J. Clem, E. H.-Y. Cheng, C. L. Karp, D. G. Kirsch, K. Ueno, A. Takahashi, M. B. Kastan, D. E. Griffin, W. C. Earnshaw, M. A. Veliuona, and J. M. Hardwick, Proc. Natl. Acad. Sci. USA 95:554-559, 1998). Gamma herpesviruses also encode homologs of the Bcl-2 family. All tested herpesvirus Bcl-2 homologs possess antiapoptotic activity, including the more distantly related homologs encoded by murine gammaherpesvirus 68 (gammaHV68) and bovine herpesvirus 4 (BHV4), as described here. To determine if viral Bcl-2 proteins can be converted into death factors, similar to their cellular counterparts, five herpesvirus Bcl-2 homologs from five different viruses were tested for their susceptibility to caspases. Only the viral Bcl-2 protein encoded by gammaHV68 was susceptible to caspase digestion. However, unlike the caspase cleavage products of cellular Bcl-2, Bcl-x(L), and Bid, which are potent inducers of apoptosis, the cleavage product of gammaHV68 Bcl-2 lacked proapoptotic activity. KSBcl-2, encoded by the Kaposi's sarcoma-associated herpesvirus, was the only viral Bcl-2 homolog that was capable of killing cells when expressed as an N-terminal truncation. However, because KSBcl-2 was not cleavable by caspases, the latent proapoptotic activity of KSBcl-2 apparently cannot be released. The Bcl-2 homologs encoded by herpesvirus saimiri, Epstein-Barr virus, and BHV4 were not cleaved by apoptotic cell extracts and did not possess latent proapoptotic activities. Thus, herpesvirus Bcl-2 homologs escape negative regulation by retaining their antiapoptotic activities and/or failing to be converted into proapoptotic proteins by caspases during programmed cell death
Tight local approximation results for max-min linear programs
In a bipartite max-min LP, we are given a bipartite graph \myG = (V \cup I
\cup K, E), where each agent is adjacent to exactly one constraint
and exactly one objective . Each agent controls a
variable . For each we have a nonnegative linear constraint on
the variables of adjacent agents. For each we have a nonnegative
linear objective function of the variables of adjacent agents. The task is to
maximise the minimum of the objective functions. We study local algorithms
where each agent must choose based on input within its
constant-radius neighbourhood in \myG. We show that for every
there exists a local algorithm achieving the approximation ratio . We also show that this result is the best possible
-- no local algorithm can achieve the approximation ratio . Here is the maximum degree of a vertex , and
is the maximum degree of a vertex . As a methodological
contribution, we introduce the technique of graph unfolding for the design of
local approximation algorithms.Comment: 16 page
Direct Image to Point Cloud Descriptors Matching for 6-DOF Camera Localization in Dense 3D Point Cloud
We propose a novel concept to directly match feature descriptors extracted
from RGB images, with feature descriptors extracted from 3D point clouds. We
use this concept to localize the position and orientation (pose) of the camera
of a query image in dense point clouds. We generate a dataset of matching 2D
and 3D descriptors, and use it to train a proposed Descriptor-Matcher
algorithm. To localize a query image in a point cloud, we extract 2D keypoints
and descriptors from the query image. Then the Descriptor-Matcher is used to
find the corresponding pairs 2D and 3D keypoints by matching the 2D descriptors
with the pre-extracted 3D descriptors of the point cloud. This information is
used in a robust pose estimation algorithm to localize the query image in the
3D point cloud. Experiments demonstrate that directly matching 2D and 3D
descriptors is not only a viable idea but also achieves competitive accuracy
compared to other state-of-the-art approaches for camera pose localization
The history of degenerate (bipartite) extremal graph problems
This paper is a survey on Extremal Graph Theory, primarily focusing on the
case when one of the excluded graphs is bipartite. On one hand we give an
introduction to this field and also describe many important results, methods,
problems, and constructions.Comment: 97 pages, 11 figures, many problems. This is the preliminary version
of our survey presented in Erdos 100. In this version 2 only a citation was
complete
On the key expansion of D(n, K)-based cryptographical algorithm
The family of algebraic graphs D(n, K) defined over finite commutative ring K have been used in different cryptographical algorithms (private and public keys, key exchange protocols). The encryption maps correspond to special walks on this graph. We expand the class of encryption maps via the use of edge transitive automorphism group G(n, K) of D(n, K). The graph D(n, K) and related directed graphs are disconnected. So private keys corresponding to walks preserve each connected component. The group G(n, K) of transformations generated by an expanded set of encryption maps acts transitively on the plainspace. Thus we have a great difference with block ciphers, any plaintexts can be transformed to an arbitrarily chosen ciphertex by an encryption map. The plainspace for the D(n, K) graph based encryption is a free module P over the ring K. The group G(n, K) is a subgroup of Cremona group of all polynomial automorphisms. The maximal degree for a polynomial from G(n, K) is 3. We discuss the Diffie-Hellman algorithm based on the discrete logarithm problem for the group τ-1Gτ, where τ is invertible affine transformation of free module P i.e. polynomial automorphism of degree 1. We consider some relations for the discrete logarithm problem for G(n, K) and public key algorithm based on the D(n, K) graphs
Asymptotic Limits and Zeros of Chromatic Polynomials and Ground State Entropy of Potts Antiferromagnets
We study the asymptotic limiting function , where is the chromatic polynomial for a graph
with vertices. We first discuss a subtlety in the definition of
resulting from the fact that at certain special points , the
following limits do not commute: . We then
present exact calculations of and determine the corresponding
analytic structure in the complex plane for a number of families of graphs
, including circuits, wheels, biwheels, bipyramids, and (cyclic and
twisted) ladders. We study the zeros of the corresponding chromatic polynomials
and prove a theorem that for certain families of graphs, all but a finite
number of the zeros lie exactly on a unit circle, whose position depends on the
family. Using the connection of with the zero-temperature Potts
antiferromagnet, we derive a theorem concerning the maximal finite real point
of non-analyticity in , denoted and apply this theorem to
deduce that and for the square and
honeycomb lattices. Finally, numerical calculations of and
are presented and compared with series expansions and bounds.Comment: 33 pages, Latex, 5 postscript figures, published version; includes
further comments on large-q serie
- …