389 research outputs found

    Recycling of epidermal growth factor-receptor complexes in A431 cells: identification of dual pathways

    Get PDF
    The intracellular sorting of EGF-receptor complexes (EGF-RC) has been studied in human epidermoid carcinoma A431 cells. Recycling of EGF was found to occur rapidly after internalization at 37 degrees C. The initial rate of EGF recycling was reduced at 18 degrees C. A significant pool of internalized EGF was incapable of recycling at 18 degrees C but began to recycle when cells were warmed to 37 degrees C. The relative rate of EGF outflow at 37 degrees C from cells exposed to an 18 degrees C temperature block was slower (t1/2 approximately 20 min) than the rate from cells not exposed to a temperature block (t1/2 approximately 5-7 min). These data suggest that there might be both short- and long-time cycles of EGF recycling in A431 cells. Examination of the intracellular EGF-RC dissociation and dynamics of short- and long-time recycling indicated that EGF recycled as EGF-RC. Moreover, EGF receptors that were covalently labeled with a photoactivatable derivative of 125I-EGF recycled via the long-time pathway at a rate similar to that of 125I-EGF. Since EGF-RC degradation was also blocked at 18 degrees C, we propose that sorting to the lysosomal and long-time recycling pathway may occur after a highly temperature-sensitive step, presumably in the late endosomes

    Antiapoptotic herpesvirus Bcl-2 homologs escape caspase-mediated conversion to proapoptotic proteins

    Get PDF
    The antiapoptotic Bcl-2 and Bcl-x(L) proteins of mammals are converted into potent proapoptotic factors when they are cleaved by caspases, a family of apoptosis-inducing proteases (E. H.-Y. Cheng, D. G. Kirsch, R. J. Clem, R. Ravi, M. B. Kastan, A. Bedi, K. Ueno, and J. M. Hardwick, Science 278:1966-1968, 1997; R. J. Clem, E. H.-Y. Cheng, C. L. Karp, D. G. Kirsch, K. Ueno, A. Takahashi, M. B. Kastan, D. E. Griffin, W. C. Earnshaw, M. A. Veliuona, and J. M. Hardwick, Proc. Natl. Acad. Sci. USA 95:554-559, 1998). Gamma herpesviruses also encode homologs of the Bcl-2 family. All tested herpesvirus Bcl-2 homologs possess antiapoptotic activity, including the more distantly related homologs encoded by murine gammaherpesvirus 68 (gammaHV68) and bovine herpesvirus 4 (BHV4), as described here. To determine if viral Bcl-2 proteins can be converted into death factors, similar to their cellular counterparts, five herpesvirus Bcl-2 homologs from five different viruses were tested for their susceptibility to caspases. Only the viral Bcl-2 protein encoded by gammaHV68 was susceptible to caspase digestion. However, unlike the caspase cleavage products of cellular Bcl-2, Bcl-x(L), and Bid, which are potent inducers of apoptosis, the cleavage product of gammaHV68 Bcl-2 lacked proapoptotic activity. KSBcl-2, encoded by the Kaposi's sarcoma-associated herpesvirus, was the only viral Bcl-2 homolog that was capable of killing cells when expressed as an N-terminal truncation. However, because KSBcl-2 was not cleavable by caspases, the latent proapoptotic activity of KSBcl-2 apparently cannot be released. The Bcl-2 homologs encoded by herpesvirus saimiri, Epstein-Barr virus, and BHV4 were not cleaved by apoptotic cell extracts and did not possess latent proapoptotic activities. Thus, herpesvirus Bcl-2 homologs escape negative regulation by retaining their antiapoptotic activities and/or failing to be converted into proapoptotic proteins by caspases during programmed cell death

    Tight local approximation results for max-min linear programs

    Full text link
    In a bipartite max-min LP, we are given a bipartite graph \myG = (V \cup I \cup K, E), where each agent vVv \in V is adjacent to exactly one constraint iIi \in I and exactly one objective kKk \in K. Each agent vv controls a variable xvx_v. For each iIi \in I we have a nonnegative linear constraint on the variables of adjacent agents. For each kKk \in K we have a nonnegative linear objective function of the variables of adjacent agents. The task is to maximise the minimum of the objective functions. We study local algorithms where each agent vv must choose xvx_v based on input within its constant-radius neighbourhood in \myG. We show that for every ϵ>0\epsilon>0 there exists a local algorithm achieving the approximation ratio ΔI(11/ΔK)+ϵ{\Delta_I (1 - 1/\Delta_K)} + \epsilon. We also show that this result is the best possible -- no local algorithm can achieve the approximation ratio ΔI(11/ΔK){\Delta_I (1 - 1/\Delta_K)}. Here ΔI\Delta_I is the maximum degree of a vertex iIi \in I, and ΔK\Delta_K is the maximum degree of a vertex kKk \in K. As a methodological contribution, we introduce the technique of graph unfolding for the design of local approximation algorithms.Comment: 16 page

    Direct Image to Point Cloud Descriptors Matching for 6-DOF Camera Localization in Dense 3D Point Cloud

    Full text link
    We propose a novel concept to directly match feature descriptors extracted from RGB images, with feature descriptors extracted from 3D point clouds. We use this concept to localize the position and orientation (pose) of the camera of a query image in dense point clouds. We generate a dataset of matching 2D and 3D descriptors, and use it to train a proposed Descriptor-Matcher algorithm. To localize a query image in a point cloud, we extract 2D keypoints and descriptors from the query image. Then the Descriptor-Matcher is used to find the corresponding pairs 2D and 3D keypoints by matching the 2D descriptors with the pre-extracted 3D descriptors of the point cloud. This information is used in a robust pose estimation algorithm to localize the query image in the 3D point cloud. Experiments demonstrate that directly matching 2D and 3D descriptors is not only a viable idea but also achieves competitive accuracy compared to other state-of-the-art approaches for camera pose localization

    The history of degenerate (bipartite) extremal graph problems

    Full text link
    This paper is a survey on Extremal Graph Theory, primarily focusing on the case when one of the excluded graphs is bipartite. On one hand we give an introduction to this field and also describe many important results, methods, problems, and constructions.Comment: 97 pages, 11 figures, many problems. This is the preliminary version of our survey presented in Erdos 100. In this version 2 only a citation was complete

    On the key expansion of D(n, K)-based cryptographical algorithm

    Get PDF
    The family of algebraic graphs D(n, K) defined over finite commutative ring K have been used in different cryptographical algorithms (private and public keys, key exchange protocols). The encryption maps correspond to special walks on this graph. We expand the class of encryption maps via the use of edge transitive automorphism group G(n, K) of D(n, K). The graph D(n, K) and related directed graphs are disconnected. So private keys corresponding to walks preserve each connected component. The group G(n, K) of transformations generated by an expanded set of encryption maps acts transitively on the plainspace. Thus we have a great difference with block ciphers, any plaintexts can be transformed to an arbitrarily chosen ciphertex by an encryption map. The plainspace for the D(n, K) graph based encryption is a free module P over the ring K. The group G(n, K) is a subgroup of Cremona group of all polynomial automorphisms. The maximal degree for a polynomial from G(n, K) is 3. We discuss the Diffie-Hellman algorithm based on the discrete logarithm problem for the group τ-1Gτ, where τ is invertible affine transformation of free module P i.e. polynomial automorphism of degree 1. We consider some relations for the discrete logarithm problem for G(n, K) and public key algorithm based on the D(n, K) graphs

    Asymptotic Limits and Zeros of Chromatic Polynomials and Ground State Entropy of Potts Antiferromagnets

    Full text link
    We study the asymptotic limiting function W(G,q)=limnP(G,q)1/nW({G},q) = \lim_{n \to \infty}P(G,q)^{1/n}, where P(G,q)P(G,q) is the chromatic polynomial for a graph GG with nn vertices. We first discuss a subtlety in the definition of W(G,q)W({G},q) resulting from the fact that at certain special points qsq_s, the following limits do not commute: limnlimqqsP(G,q)1/nlimqqslimnP(G,q)1/n\lim_{n \to \infty} \lim_{q \to q_s} P(G,q)^{1/n} \ne \lim_{q \to q_s} \lim_{n \to \infty} P(G,q)^{1/n}. We then present exact calculations of W(G,q)W({G},q) and determine the corresponding analytic structure in the complex qq plane for a number of families of graphs G{G}, including circuits, wheels, biwheels, bipyramids, and (cyclic and twisted) ladders. We study the zeros of the corresponding chromatic polynomials and prove a theorem that for certain families of graphs, all but a finite number of the zeros lie exactly on a unit circle, whose position depends on the family. Using the connection of P(G,q)P(G,q) with the zero-temperature Potts antiferromagnet, we derive a theorem concerning the maximal finite real point of non-analyticity in W(G,q)W({G},q), denoted qcq_c and apply this theorem to deduce that qc(sq)=3q_c(sq)=3 and qc(hc)=(3+5)/2q_c(hc) = (3+\sqrt{5})/2 for the square and honeycomb lattices. Finally, numerical calculations of W(hc,q)W(hc,q) and W(sq,q)W(sq,q) are presented and compared with series expansions and bounds.Comment: 33 pages, Latex, 5 postscript figures, published version; includes further comments on large-q serie
    corecore