We present a new approach to the study of the immune system that combines techniques of systems biology with information provided by data-driven prediction methods. To this end, we have extended an agent-based simulator of the immune response, C-ImmSim, such that it represents pathogens, as well as lymphocytes receptors, by means of their amino acid sequences and makes use of bioinformatics methods for T and B cell epitope prediction. This is a key step for the simulation of the immune response, because it determines immunogenicity. The binding of the epitope, which is the immunogenic part of an invading pathogen, together with activation and cooperation from T helper cells, is required to trigger an immune response in the affected host. To determine a pathogen's epitopes, we use existing prediction methods. In addition, we propose a novel method, which uses Miyazawa and Jernigan protein–protein potential measurements, for assessing molecular binding in the context of immune complexes. We benchmark the resulting model by simulating a classical immunization experiment that reproduces the development of immune memory. We also investigate the role of major histocompatibility complex (MHC) haplotype heterozygosity and homozygosity with respect to the influenza virus and show that there is an advantage to heterozygosity. Finally, we investigate the emergence of one or more dominating clones of lymphocytes in the situation of chronic exposure to the same immunogenic molecule and show that high affinity clones proliferate more than any other. These results show that the simulator produces dynamics that are stable and consistent with basic immunological knowledge. We believe that the combination of genomic information and simulation of the dynamics of the immune system, in one single tool, can offer new perspectives for a better understanding of the immune system.
Citation: Rapin N, Lund O, Bernaschi M, Castiglione F (2010) Computational Immunology Meets Bioinformatics: The Use of Prediction Tools for Molecular Binding in the Simulation of the Immune System. PLoS ONE 5(4): e9862. https://doi.org/10.1371/journal.pone.0009862
Editor: Vladimir Brusic, Dana-Farber Cancer Institute, United States of America
Received: December 1, 2009; Accepted: February 19, 2010; Published: April 16, 2010
Copyright: © 2010 Rapin et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Funding: This work was supported by the European Community under the contract FP6-2004-IST-4, No.028069 (ImmunoGrid). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Competing interests: The authors have declared that no competing interests exist.
The immune system, due to its very complex nature, is one of the most challenging topics in biology. Its study often relies on in vivo or in vitro animal models, mathematical models, or computational (in silico) models. Recent advances in the field of bioinformatics have provided a number of techniques for processing and integrating the explosion of data that has been produced during the rise of genomics, which has also improved our ability to predict the molecular specificities of the immune system (for a review see e.g., ). A number of mathematical models based on either differential equations or interacting discrete entities (agents) have also been proposed to describe various aspects of the immune system. However, most of the existing simulation-based approaches resort to oversimplified models of molecular interactions, because detailed quantitative data, needed for a more realistic representation, were not always available.
The goal of the present work is to present a novel approach for the study of the immune system, combining a mesoscopic scale simulator of the immune system  with a set of machine learning techniques for molecular-level predictions of major histocompatibility complex–peptide binding interactions –, linear B cell epitope discovery, as well as a more general protein–protein potential estimation . More specifically, the computational model belongs to an agent-based class, whereas the prediction of epitopes relies on machine learning techniques, such as Neural Networks (NN).
The paper is organized as follows: After an introduction to the fundamental mathematics required for modeling the immune system, we present results of simulations whose aim is to test the correctness the new tool. We concludes the paper with a perspective on the future of this work. Finally, the materials and methods section describes the bioinformatics tools used for predicting the interactions among the entities involved in the immune response, including a description of how they are incorporated into the mesoscopic C-ImmSim simulator.
In silico models of the immune system
The immune system can be viewed as a classic system of coupled components, with birth, death, and interaction elements. The most common modeling approach utilizes systems of either Ordinary or Partial Differential Equations (ODE and PDE, respectively) that directly describe the evolution of global quantities or populations over time . In immunology, these quantities could be, for instance, the total concentration of viral particles or cell counts. ODE- and PDE-based models enable a model to use well-established analytical and numerical techniques, but they potentially oversimplify the system: an entire population of discrete entities is described by a single continuous variable. Mathematical models based on differential equations have proved very useful. The study of the evolution of HIV into AIDS, for instance, has been modeled with the purpose of predicting the effects of specific treatments –, and predicting certain aspects of disease progression –.
Each entity (e.g., a cell) is individually represented by an agent, and the interactions among agents are defined by a set of rules that can have stochastic components. The rules reflect the current knowledge in immunology, but they can also be defined ad hoc to test new hypotheses regarding the operation of the immune system.
One of the first attempts to define a detailed agent-based model of immunological mechanisms was the work of Celada and Seiden , , . Their goal was to capture the dynamics of the immune system, as much as possible, and to perform experiments in silico. Along similar lines, a study of the thymus has been carried out . This approach provided important insights into the regulation of positive and negative selection and into the dynamics of the production of the TCR repertoire in the thymus. More recently, we have developed specialized versions of the Celada-Seiden model to study HIV-1 infection, EBV infection, hypersensitivity reactions, and cancer immunoprevention (described, respectively, in –). Recentely, another implementation of the same model has been used to study cross reactivity and heterologous memory .
C-ImmSim, the simulator that implements our version of the Celada-Seiden model, is a flexible tool that can be used for the study of a number of different immunological processes. The original model used bit strings to represent the receptors of biological entities.
Recently, there has been renewed interest in modeling the immune system by means of agent-based models.
Simmune  aims at being a flexible platform for the simulation of any immunological process. It is more of a modeling technique and a language for the description of models than a specific model. Simmune is based on a particular representation of particle interactions that can be used to create detailed models of the immune system. The particles live on a mesh, and their states are updated at discrete time-steps so that both time and space are discrete. Particles in Simmune can be in different states. Transitions among the states are probabilistic events triggered by the exchange of messenger particles having a limited range. The messenger field intensities are calculated by the integration of reaction-diffusion equations and typically include an activation threshold. A major advantage of Simmune is that it models both direct intercellular interactions (such as those between an antigen and a B cell) and interactions mediated by molecular messengers (such as lymphokines). It also supports spatial compartmentalization and communication conduits.
The Basic Immune Simulator (Bis)  is an agent-based model created to study the interactions among the cells of the innate and adaptive immune systems. Bis simulates basic cell types, mediators, and antibodies, and consists of three virtual spaces representing parenchymal tissue, secondary lymphoid tissue, and the lymphatic/humoral circulation. Bis translates mechanistic cellular and molecular knowledge regarding the innate and adaptive immune response and reproduces the immune system's complex behavioral patterns. It has been used both as an educational tool to demonstrate the emergence of those patterns and as a research tool to systematically identify potential targets for more effective treatment strategies for diseases processes, including hypersensitivity reactions, autoimmunity, and cancer.
Simisys  is a cellular automata-based method that allows the simulation of tens of thousands of cells. Both innate and adaptive components of the immune system are represented. Specifically, macrophages, dendritic cells, neutrophils, natural killer cells, B cells, T helper cells, complement proteins, and pathogenic bacteria are present in the model.
Bit string models of immune diversity
A fundamental task of the immune system is to recognize and bind antigens by means of cell receptors. The binding mechanism is based on physical–chemical processes (short-range non-covalent interactions, hydrogen bonding, van der Waals interactions) .
The features that determine the binding among molecules  may be represented by a shape-space. Under the assumption that the shape-space can be described by means of parameters, a point in this -dimensional space specifies the generalized shape of a binding region. Oster and Perelson estimated that in order to be complete, the receptor repertoire should fulfill the following conditions: i) each receptor should recognize a set of related epitopes, each of which differs slightly in shape; ii) the repertoire size should be on the order of 1016 or larger; iii) at least one subset of the repertoire should be distributed randomly throughout the shape-space. Later, Farmer and co-workers  introduced the idea of using binary strings to represent the generalized shape of a receptor. To determine the degree of affinity between bit-strings, it is possible to resort to different string-matching criteria. For instance, by using a key–lock analogy, two binary strings have a high affinity if they complement each other, that is, when the two strings are lined up, every “0” in one string corresponds to a “1” in the other, and conversely. The bit string representation of antigen and cell receptor diversity was then adopted by a number of other authors –, and has been the basis for the description of all molecular interactions in earlier implementations of the Celada-Seiden model.
Previous version of C-ImmSim
The C-ImmSim model of the immune system response has been quite extensively described in , . C-ImmSim was implemented in ANSI C language. In short, it consists of a three-dimensional (3D) stochastic cellular automaton in which the major classes of cells of both the lymphoid (T helper lymphocytes (Th), cytotoxic T lymphocytes (CTL), B lymphocytes, and antibody-producer plasma cells, PLB) and the myeloid lineage (macrophages (M) and dendritic cells (DC)) are represented. All these entities interact with each other according to a set of rules that describe the different phases of the recognition and response processes of the immune system against a pathogen.
C-ImmSim can be classified as a bit-string polyclonal lattice model. Bit-string refers to the way in which the molecules are represented, polyclonal indicates that the lymphocytes have genetic variation in their receptors, and lattice signifies that a discrete lattice is used to represent the space.
The model mainly represents a portion of a tertiary organ such as a lymph node, tonsil, or spleen. Tertiary organs are sites in which antigens are presented to immune cells. C-ImmSim simultaneously simulates three compartments that represent three separate anatomical regions found in mammals: (i) the bone marrow, where hematopoietic stem cells are simulated, which produce new lymphoid and myeloid cells; (ii) the thymus, where naïve T cells are selected to avoid auto-reactivity; and (iii) a tertiary lymphatic organ, such as a lymph node. The tertiary organ is the only compartment that is described geometrically, because it is mapped onto a 3D lattice. All interactions among cells and molecules take place on a lattice-site during each time step. The diffusion of entities at each time step models the physical spreading of molecules in the lymphatic organ.
A set of self peptides is used to define the “self” at the beginning of the simulation. Non-self is defined as everything else. Potential pathogens as well as cell receptors and MHC molecules (the HLA or Human Leukocyte Antigen), are represented as binary strings.
In the model, all cells are considered ‘active’ or ‘resting’. This means that naïve cells are not taken into account. Hence, all cells reaching the tertiary organ (the simulation space) are already mature. T-lymphocytes are exceptions, because they undergo thymic selection before entering circulation. The lymphocytes generated in the bone marrow have a high diversity with respect to their receptors, due to alternative splicing, which is somatic rearrangement of noncontiguous genomic V, J, and C regions, and sometimes hypermutation. We represent this phenomenon by assigning random bit-string receptors to every lymphocyte.
C-ImmSim incorporates the following working hypothesis or theories: i) the diversity of specific elements –; ii) antigen processing and presentation –; iii) MHC restriction ; iv) cell–cell cooperation , ; v) maturation of the response and memory , ; vi) clonal selection by antigen affinity (); vii) thymus education of T lymphocytes (clonal deletion theory, ); viii) hypermutation of antibodies; ix) Hayflick limit (T cell replicative senescence –); x) Ag dose-induced tolerance (anergy) in B cells , .
xi) T cell anergy ;
xii) Matzinger's danger signals ;
xiii) Idiotypic Network theory . Further information can be found in the literature.
In the remainder of this section, we describe some numerical experiments that were designed with the goal of assessing the soundness of the simulator. The average execution time was around three hours on a 2.4 GHz Opteron processor. In terms of memory consumption, the simulation of a 10 microliter volume requires 1 GB of RAM.
In this experiment, we reproduce the typical immunization process by injecting an immunogenic protein at two subsequent instants in time. The actual AA string used as an antigenic molecule is the gag molecule from HIV-1.
The antigen is injected at time zero, then again six months (of simulated time) later. The system develops a typical primary and secondary immune response with a significant increase in memory lymphocytes, as shown in Figure 1. Panel (a) and panel (b) show, respectively, the cell counts of B and T helper lymphocytes in a cubic millimeter. The immunological memory is developed during the first response. Therefore, the second response is much more rapid, as can be seen in the inset plot of panel (c), which shows the time the immune system takes to clear the antigen. The same panel also shows the humoral response in terms of antibody titers (arbitrary scale). In summary, the dynamics are consistent with a realistic immunization process, because they show a faster secondary response due to the development of long-lasting memory.
B cell (panel a) and CD4 T cell (panel b) population during a typical immunization experiment. An immunogenic molecule is injected at time zero and after six months. In both plots, the total number of lymphocytes along with the immune memory compartment are shown. Panel (c) shows that the secondary response eliminates the antigen on a shorter timescale due to the presence of memory cells ready to react.
Immunodominance or affinity maturation
In this experiment, we test the emergence of one or more dominating clones of lymphocytes in the situation of chronic exposure to the same immunogenic molecule. In other words, we check if the system reproduces the phenomenon of affinity maturation. To mimic chronic exposure to a pathogen, we repeatedly inject a certain amount of the HIV/gag protein (for example) throughout the simulation period.
The system responds by mounting a specific immune response from the beginning of exposure. Then, as the simulation proceeds, higher affinity clones overtake the original clones with respect to expression levels, eventually proliferating at higher levels than any other. This is shown in Figure 2, in which the lymphocyte T helper count for the top-ranked clones is shown alongside the specific TCRs. Note, in particular, that the dashed line corresponds to the first emerging clone, and the continuous line shows a later-appearing clone with a better affinity that overcomes the first clone. In the inset plot of the same figure, we show the Simpson index , where and is the count of the clone with specificity . The increase of the index over time indicates the emergence of a dominating clone (i.e., the bigger the value of , the lower the diversity).
Homozygote vs heterozygote
There are reasons to believe that the “time to AIDS” in HIV-infected patients is related to the haplotype homozygosity . Individuals that bear a higher diversity in their MHC have slower progression to AIDS than those with lower diversity. In the analysis carried out by Carrington , individuals carrying heterozygosity for HLA-A, HLA-B, or HLA-C each showed a longer AIDS-free period compared to their homozygote locus counterparts. Here, we simulate the situation and compare the time to clear a given antigen (not specifically the HIV-1) for individuals with full heterozygosity and individuals with homozygosity for their MHC loci. The heterozygote haplotype is a full heterozygote, meaning that we allow all possible loci to be different. The homozygotes bear one A- allele, one B- allele, and one DR- allele. The following set of MHCs have been used, following the article by Hoof et al., in which MHC alleles are ranked based on observed viremia levels in HIV-I-infected patients : homozygote genotype: A0201, B5304, DRB30302; heterozygote genotype: A0201, A0301, B5304,B5309, DRB30302,DRB50202.
The antigen used encompassed all proteins from the Flu influenza A serotype H1N1 (genome id: HU13275) in the flu genome database (www.flugenome.org). For demonstration purposes, we assume that the virus does not mutate. The results of simulations, shown in Figure 3, indeed show that the speed of antigen clearance is faster for simulations with a heterozygote haplotype. It is also worth noting that the immune effort calculated as the number of cells (both CTLs and CD4 T-cells) during the immune response is higher for the homozygote-type, consistent with the fact that the homozygote immune response is poorer and, therefore, allows the virus to grow to higher numbers before it is cleared. The opposite situation holds for the heterozygote immune system, which optimally clears the virus faster and with less effort.
Panel (a) shows the distribution of the time to clear the antigen in five hundred simulations with different random seeds. Panels (b), (c), and (d) show that the immune effort calculated as the maximum number of cells (both CTLs, CD4 T-cells) during the immune response, is higher for the homozygote type.
We have presented an integrated multi-level model that describes the immune system response at the mesoscopic level and, at the same time, takes into account the recognition mechanisms among molecules by means of prediction tools based, in part, on well known techniques for epitope discovery.
We have tested the simulator in typical immunization experiments, in which the immune system develops memory. We have shown that the system develops affinity maturation against “chronic” antigenic peptides, and we have also shown that heterozygosity helps the immune system to cope with the diversity of pathogens. These results show that the simulator produces dynamics that are consistent with previous versions of C-ImmSim. Additionally, the simulation extends those results by using AA strings, adding a considerable quantity of information. This feature precisely describes the added value of a tool of this kind.
The novelty and the power of our approach lie in the use of a combination of two levels of description to study the immune response by means of computer simulation. The first level is a mesoscopic agent-based model representing cooperating cells that mount an immune response. The second level is a set of molecular binding prediction methods that are used to compute the binding affinity of the molecules represented in the agent-based model. The combination of these tools allows us to perform in silico immunization experiments with specific real-world proteins and could help to speed up drug design or clinically oriented research.
The system also provides a framework for testing various prediction methods, because the two levels of description, molecular interactions and cellular interactions, have purposefully been kept separate in the computer code. This implies that a novel method for predicting B cell epitopes could, for example, be easily inserted into the simulator with minimal programming effort, and the consequences could be immediately analyzed by looking at the resulting immune dynamics.
Further work will focus on optimizing the procedures and finding better algorithms for prediction of B cell epitopes. The Miyazawa-Kernigan potential, which we have used to predict the binding affinity between generic AA strings, can also be replaced with a more accurate prediction method, should one become available. The proposed architecture has been developed with consideration for the issue of upgradability and modularity so that new prediction methods can be easily inserted and used.
To conclude, we believe this tool has the potential to “grow” by acquiring precision, becoming a more and more useful prediction tool in immunological research, in which in vivo or in vitro studies of drugs and their effects on the immune response are too difficult or expensive (either in terms of money or time) to carry out. For example, it is possible to investigate why one particular epitope of a given antigen is more immunogenic than another. Does the uptake by the APCs determine this quality due to differences in presentation on MHCs, or to differences in ligation through immuno receptors? It is also possible to combine this kind of analysis with simulations of different types of pathogenic behavior and to study the cross-reactivity in the development of the flu vaccine to select for the best combination of known viral peptides to be used in order to achieve better protection. These are just a few possible works that we are planning to pursue in the near future.
Materials and Methods
At the molecular level, a key step for the simulation of the immune response is the prediction of immunogenicity. Only the immunogenic parts of an invading pathogen will trigger an immune response in the affected host. Those parts are called epitopes and are pathogen-dependent.
In the specific context of the pathogen-induced immune response, one distinguishes between B cell and T cell epitopes. B cell epitopes are recognized by immunoglobulins, also known as antibodies. The immunogenic parts are often located on the surface of pathogenic proteins, because they have to be accessible for binding. The epitopes mostly consist of discontinuous blocks of the antigen sequence, i.e., sequence segments that are distantly separated in the protein sequence and are brought into proximity upon folding into tertiary or quaternary structures. The binding of a B cell epitope to a B cell receptor (BCR, an immunoglobulin covalently attached to the B cell surface) augmented by T helper cell induction triggers the differentiation of naïve B cells into antibody-secreting plasma cells that make up the humoral immune response. T cells can be divided into T helper cells (TH) and cytotoxic T lymphocytes (CTL or TC). T helper cells act as mediators between antigen presenting cells (APC) and plasma cells, and, therefore, assume a central role in the immune response. CTLs kill infected host cells by means of cytotoxic effector molecules that are released upon recognition of a complex on the surface of the infected cells. The complex consists of an epitope and an MHC class I molecule.
CTL epitopes are generated from cytosolic proteins. These peptides result from the antigen processing pathway that involves degradation by the proteasome, transport into the endoplasmic reticulum via the transporter associated with antigen processing (TAP), and presentation by MHC class I molecules. This processing takes place in all cells containing a nucleus. The MHC class II molecules, on the other hand, are produced only by APCs, which include dendritic cells, macrophages, and B cells. Epitope binding to MHC class II molecules are generated from internalized proteins that are degraded in acidified endocytic vesicles.
The immune system recognizes pathogens by means of their epitopes. As such, a protein belonging to a pathogen can be seen as a collection of parts that are either epitopes or non-epitopes. The binding strength of an epitope to a cell's receptor is one of the factors that determines the activation and strength of the immune response. For the last several years, we have developed computational methods that can predict T cell epitopes , ,  or B cell epitopes ,  in protein sequences. Although the neural networks for MHC prediction, developed in , , , seem to outperform other networks and methods , , it should be noted that these methods are not perfect. They cannot always provide the same level of accuracy as experimentally-generated data across all MHC alleles. Moreover, we assume that a peptide bound on the surface of an MHC molecule always triggers the immune system, which is not necessarily the case .
By implementing protein sequence-based representations for both the host and the pathogen, we may obtain a patient-specific genomic model capable of making specific predictions for different host/antigen genotype combinations.
Until now, C-ImmSim worked by using algorithms that represent the biological complexity using bit strings. If protein sequences rather than bit strings are used, different methods, such as Neural Networks, are needed to predict binding. The switch from bits to amino acids (AA) requires new algorithms to compute the affinity among strings. Because C-ImmSim is an agent-based model, every agent (e.g., any cell), along with its interactions, is individually simulated. This level of representation produces millions of bindings in a typical simulation. For this reason, we developed a new, fast Position Specific Scoring Matrix (PSSM)-based method, with minimal sacrifices with respect to the prediction of performance.
To assess the predicting power of the matrices, a large set of quantitative peptide MHC binding data were downloaded from the IEDB database . The dataset consists of 6,533 peptides and covers 33 HLA- A and HLA-B human alleles. The PSSMs were calculated as described above, using the original NetMHCpan method trained only on human data. None of the peptides in the evaluation set were included in the training set. For each allele, the predictive performance of the corresponding PSSM was evaluated in terms of the Pearson's correlation between the log-transformed  IC50 value and the summed PSSM prediction score. Although the NetMHCPan method almost systematically outperforms the PSSM, the use of the latter in C-ImmSim is justified by the gain in computational speed.
One of the major requirements for the integration of the prediction methods with an agent-based simulator is the development of tools that calculate the stability of molecular complexes.
Because there is no general method that can be used to predict if, for example, a TCR will interact with any given MHC–peptide complex, we have used the Miyazawa-Jernigan residue–residue potential  to score the strength of the interaction.
In the following sections, we present the implementation and combination of each of these processes. For a better understanding, it is important to consider that each lymphocyte in the simulation bears a receptor (called BCR for B cells, TCR for both THs and CTLs), and APCs contain a definition of HLA class I and II molecules with which they are equipped. Moreover, interactions among cells can be either nonspecific (e.g., macrophages engulfing antigens) or specific. Specific interactions must be accounted for when antibodies meet antigens or when T-cells interact with other cells presenting foreign peptides on their MHC.
An antigen is defined by a part or by the entire proteome, i.e., a set of protein sequences imported via one or more FASTA files (http://www.proteomecommons.org/data/fasta/fasta.jsp).
We make use of the following definitions. Let be the set of AA symbols, that is, . indicates the number of elements in . Let (where ) represent a contiguous stretch of AAs, where indicates the length of the sequence and the AA in the sequence.
In the following, we use to indicate peptides, whereas we use , , and to indicate epitopes for B cells, CTLs, and TH cells, respectively.
Class I epitopes
Class I-type epitopes are linear sequences of 8 to 11 amino acids that are processed from any protein of the pathogen via the process described in section. Each MHC class I molecule, whose total number surpasses the thousands of alleles to date , is characterized by a specific binding motif that is possible to “decode”. For the vast majority, the motif length is nine AAs long (Figure 4). Class I T cell epitope prediction methods rely on machine learning techniques. In previous work, we showed that quantitative NNs, which had been trained to predict binding versus non-binding peptides, are superior to the conventional NNs . Furthermore, quantitative NNs allow the straightforward application of a query by committee (QBC) principle, in which particularly information-rich peptides can be identified and subsequently tested experimentally. Iterative training based on QBC-selected peptides considerably increases the sensitivity without compromising the efficiency of the predictions .
The structure has accession number 1OGA in the Protein Data Bank (www.pbd.org).
Because we want to handle generic proteins, the portions of a protein that trigger an immune response must be identified. To this purpose, we use the binding motif matrices generated from the NN methods described in . In short, we rank a set of one million randomly selected natural peptides from the human genome using the NN method; the top one percent of the peptides flagged as binders are used to generate a binding motif, i.e., a 9 by 20 matrix. The matrix is calculated using sequence weights, and is corrected for low counts , . The average score of the low-scoring binders in the top one percent is set as a threshold value for the matrix. This threshold is then used to discriminate between epitopes and non epitopes as follows.
The propensity is calculated as , where is the probability of finding a given AA at a given position, and is the probability of finding that AA in any protein in general. These propensities are computed for each of the nine positions on a potential epitope, and give the propensity for each of the 20 AAs. Each matrix represents an approximation of the underlying NN, but the matrix representation is computationally much faster than the computation of the NN directly. Each row of the matrix represents a position in the 9-mer, and the columns correspond to the scores for that specific AA (an example is given in Table 2).
For a given 9-mer , , the sum of the values at each position in the scoring matrix gives a score. That is, let with and , be the matrix of a specific class I MHC allele. The score of a generic 9-mer peptide is given by(1)
MHC class I peptide detection
We next describe how the scoring matrices for alleles are used in the simulation. For an antigenic molecule , (we assume ), all possible peptides of the protein are found by taking a sliding window of length 9, that is, all possible 9-mers areFor each 9-mer , eq(1) computes the score of the peptide . Of all possible 9-mers, those for which , where is the allele-specific threshold, are considered epitopes. Hence, the epitope profile is(2)
Note that , that is, can also be zero, meaning that no epitopes are found in the antigen AA sequence. The threshold is computed as follows: for the set of peptides used to compute the matrix for each allele, the matrix predictions for binding affinity are calculated. Next, we extract the 1% strongest binders, i.e., those with a high affinity for the MHC. Some of these 1% have a lower binding affinity than others. We consider the 10 weakest binders of this subset to have a low-end binding affinity, and we average these binding scores to get . We assume that in a random set of peptides, around 1% have a binding affinity below 500 nM for the MHC and are considered binders , . An example is provided in Figure 4.
Class II epitopes
Class II-type epitopes are presented only on the surface of APCs. For MHC class II epitope detection, we resort to the same methodology used for class I. It is known that class II epitopes have lengths that vary by up to 30 AA , . An analysis of all known class II human binders from the EPIMHC database reveals that the average class II epitope is 16 residues in length (note that the total number of epitopes found to bind human MHCs was 2503 as of March 2008) . Still, the binding core of the peptides presented by the MHC can be reduced to a 9-mer with flanking regions of variable length as demonstrated by Nielsen . This means that MHC class II epitope detection can rely on the same principles as class I epitope detection. To this end, in analogy to section, we created a set of matrices, , able to score any given 9-mer for each allele covered by the NN method.
MHC class II peptide prediction
Formally, we compute the score for each possible 9-mer with of the antigen AA string in a manner similar to that described in eq(1). That is, we compute the epitope profile as(3)Then, we compile the potential epitopes (meaning that they will be checked for actual binding with the MHC class II), which are the 9-mers scoring above a certain threshold ,(4)into a list of class II epitopes. We call these AA strings epitopes, indicated by . Note that, once again, . The threshold is computed in the same fashion as .
MHC class II binding prediction is problematic. The 9-mers form only the core of the binding peptide, the variability in alleles is much wider than in class I alleles, and the available prediction methods do not match the prediction capabilities of MHC class I predictors . To remedy these problems, we focused on a limited set of MHC class II alleles for which good predictions exist, and selected those available in the TEPITOPE method .
B cell epitope
The prediction of discontinuous B cell epitopes is still a major challenge in vaccine design, and is difficult for two reasons: first, available data on discontinuous epitopes in different antigens is scarce compared to the available data on linear epitopes; second, few antigens are completely annotated with respect to multiple discontinuous epitopes in a single antigen. The presence of epitopes that are not annotated in the data set increases the difficulties associated with assessing the performance of prediction algorithms.
Due to these difficulties, the majority of prediction tools available for B cell epitopes are based on linear prediction methods. These are limited to continuous stretches of protein sequences that may, in the end, be combined to form one or several conformational epitopes.
Most tools available for the prediction of linear B cell epitopes use propensity scale methods. These methods assign a propensity value to each AA in the queried protein sequence based on knowledge of the AAs physical and chemical properties. Propensity scales have been developed based on antigenicity, hydrophilicity, inverted hydrophobicity, accessibility, and secondary structure. As part of the development of a new prediction method for linear B cell epitopes, we tested all such scales for their ability to predict B cell epitopes in an annotated data set taken from Pellequer et al. . It turns out that the propensity scales of Parker (based on hydrophilicity) . and Levitt (based on the secondary structure) show better performance compared to other scales.
For the present work, we decided to use the Parker hydrophilicity method rather than the BepiPred method because the former is simpler and the performance gain using BepiPred is marginal .
B cell epitope detection
To calculate the propensity of an AA , we use the average of the propensities of the AAs in a window ranging from position to . This smoothing window size has been shown to give more accurate B cell epitope predictions  because B cell epitopes are generally larger than a single AA. Let be the antigenic sequence. We compute the score with a smoothing window of seven AA, meaning that we consider three residues on either side of the AA in question. We then create a score profile for the sequence, , , as follows:The profile is used to discriminate between residues that are likely to be part of an epitope and those that are not. We use a minimum score threshold where is 0.7. This value gives the best correlation between predicted and real epitopes in the dataset used in . Finally, we label only contiguous regions of AAs, with profiles above the threshold and lengths that are at least four, as possible B cell epitopes. We call , the B cell epitopes found.
The simulation of the full sequence of system events, from antigenic injection to the immune response, proceeds via antigen recognition by lymphocyte receptors.
The contact potential of Miyazawa and Jernigan
There are no prediction tools available for describing specific binding among BCRs, antigen epitopes, TCRs, and generic MHC-peptides (both class I and class II). Therefore, we had to define, in C-ImmSim, a generic contact potential among AA sequences to be used in those cases.
The work performed by Miyazawa and Jernigan on protein energy potentials  provides us with a method for assessing the chances of direct interactions among proteins in the simulation. The protein–protein potential concept was derived from the analysis of 3D structures in which the relative position of AAs were determined. The contact potential matrix estimated by Miyazawa and Jernigan reflects the entropy between two residues. A low entropy means that the pair of residues has low energy and, therefore, that interaction is possible.
The contact potential defined between two AA strings is, thus, based on the Miyazawa-Jernigan score. In the simulation, this measure is used both when a BCR meets an antigen and when a TCR meets an MHC-peptide complex. For the case of BCR, we use a mean field approach, meaning that we assess the potential of the whole BCR against the B cell epitope.
Let , with , be the matrix found in . If is a BCR and is a B cell epitope, then we use the following formula:(5)
For T-cell recognition, the procedure is different because it requires the definition of a class of specific contact matrices and for class I and class II, respectively.
We precomputed the contact matrices from known protein 3D structures found in the Protein Data Bank (www.pdb.org) taking residues that i) are within a distance of 5 Å and, ii) show contacts between the MHC-epitope complex and the two chains (heavy and light) of a bound TCR. The distance of 5 Å was selected because most crystal structures with experimentally verified B cell epitopes show that the residues on the antibody in contact with an epitope lie within a 5 Å radius. We extend the use of this value to the minimum distance needed between residues for molecular interaction. By using the solved structures, it is possible to determine which residues on a TCR bind to the MHC and peptide, and which should be considered to be in the MHC–peptide complex. The contact matrix derived for class I binding is represented in Figure 5.
Labels on the axis represent positions on the peptide-MHC complex that are in contact with the TCR chains and . The matrix was derived using the structure indexed under the reference 1OGA in the PDB database. Labels on the columns report the position indices for the residues in the two TCR chains as they are numbered in the PDB file (chains E and D respectively). Rows: Labels report the position indices for the MHC residues and the peptide (chains A and C, respectively, in the structure file). A blue dot means that the pair of residues in the row/column are within 5 Å distance, and are considered to be in contact. Otherwise, they are not. In the program, this matrix is coded with ones (blue dot) and zeros (no dot).
Now, in order to determine effective thresholds for the interaction strengths defined above, in eq(5) and eq(6), we observed that, given two randomly chosen AA strings and , ( and also taken at random), the score follows a Gaussian distribution with average and standard deviation . Therefore, we pre-estimated those values of and for a wide range of and , and we defined the normalized score as follows:(Note that is negative.)
The threshold value of determines the number of reactive clones and was estimated to 0.075 so that in a typical immunization experiment, antigen clearance is obtained in a time frame of a few days. We use of eq(7) as the probability to decide if binds .
Putting all parts together: The simulation of immune recognition
The simulation follows the same procedure as in the original bit-string version , with the significant difference being that antigen recognition and binding rely on the epitope prediction methods described above. In the new model, we represent pathogens at the protein level by their AA sequences, which means that we implicitly account for only transcribed DNA. The host's genotype is defined by a set of four MHC class I and class II alleles.
The space volume is populated with an initial number of entities. Lymphocytes are generated with a random AA receptor of length 48 for BCRs and 32 for TCRs.
The sequence of events culminating in the immune response (either humoral, cytotoxic, or both) is described in the following.
- The represented by one or more AA strings is injected;
- the B cell epitopes are probed. Here we use the method described in section;
- for each MHC of class I and II, the T-cell epitopes are found and scored (see section and section);
- Phagocytosis by antigen processing cells;
- M s and DCs perform unspecific phagocytosis of ;
- B cells must recognize, with their B cell receptor BCR, at least one epitope of the . Phagocytosis happens with a probability defined as follows:
- - Given the precomputed B cell epitopes , we calculate, for a B cell receptor BCR, the score by means of the MJ method, and normalize those scores as described in eq(7) to get .
Finally, the probability that a B cell will recognize at least one of the epitopes is calculated as , that is, the probability for the BCR to match at least one epitope of the antigen;
- - Given the precomputed B cell epitopes , we calculate, for a B cell receptor BCR, the score by means of the MJ method, and normalize those scores as described in eq(7) to get .
- Antigen digestion by APCs. Once an APC (M, DC, and B cell) has internalized the antigen, it is processed as follows:
- Because the epitopes have been determined as described in section, we can randomly select. This selection is performed by means of the random wheel selection procedure: draw a number between 0 and 1 with a uniform probability distribution and select if . One epitope , with a probability that is given by the normalized score ;
- Analogously to the endocytotic digestion, endogenous digestion takes place in cells that are infected by a virus. In this case, the epitopes are found by using the method described in section;
Building the MHCI-peptide sequence: each infected cell bears a set of two A and two B alleles.
This implies that each protein from the pathogen is processed at most four times during the discovery process for class I epitopes. After processing the antigen protein, each cell presents, on its surface, one randomly chosen epitope with a probability that is proportional to the score of that epitope divided by the sum of scores of all found epitopes. This choice reflects the competition for MHC molecules among the protein fragments produced by the proteasome. Inside a single infected cell, antigen peptides are processed so that they bind one MHC class I molecule. Because we allow cells to display only one MHC peptide molecule per time step on their surface, we have to choose the display protein from within the haplotype (i.e., the four available, two A- and two B- alleles). This is performed by random selection at each time step. The procedure computes the epitope profile as described in eq(2), then normalizes it as follows:(8)The normalized profile is used to select, from the probability distribution , the epitope to be presented on the surface of the cell.
This complex is then used to compute the matching score against the cytotoxic T cell receptor (see section).
- The APC shows the MHCIIpep (the complex formed by an MHC class II and a nine AA-long peptide) on its surface for TH-TCR recognition. This recognition makes use of the score defined in eq(7);
- Humoral response
- Stimulated B cells start cloning and differentiating into long-lived memory cells and antibody-producing plasma cells;
- Plasma cells secrete antibodies;
- Antibodies bind antigens' epitopes;
- - to compute the affinity between antibodies and the antigen, we follow the same procedure as the one applied for antigen recognition by B cells, (section and section);
- - an immunocomplex is formed by the combination of an antibody and an antigen;
- Cytotoxic response;
- For infected cells showing MHCIpep (a complex formed by an MHC class I and a 9-mer) on their surface, recognition of CTLs via their TRC is performed using the Miyazawa-Jernigan potential between the MHCIpep and the TCR. The normalized score (eq(7) in section) is used as the probability of binding;
- Upon successful recognition (i.e., binding), cytotoxic cells kill virus-bearing cells and start cloning.
Thymus education of T lymphocytes
As mentioned, we filter randomly created T cell receptors by means of a procedure that mimics the positive and negative selection of immature thymocytes in the thymus gland. This reflects the clonal deletion theory proposed by Burnet, according to which self-reactive lymphoid cells are destroyed during the development of the immune system to prevent autoimmunity.
In C-ImmSim, the thymus is modeled as a two-layer filter (see Figure 6), and the same procedure for detecting antigen peptides is used to differentiate self peptides from proteins that represent the self. This process allows T-cells to develop self tolerance (in the negative selection) while eliminating useless cells (positive selection). The self is defined by specifying a random set of naturally occurring 9-mers extracted from the human proteome. These peptides are the same as those that have been used to compute the matrices for the different MHC molecules.
T-cells develop self tolerance during negative selection, whereas they are eliminated as useless during positive selection.
In practice, we allow a T cell to enter circulation (i.e., to reach a secondary organ as a mature thymocyte) with a probability given by the product of the probability of being positively selected and the probability of being negatively selected,(9)with(10)where is the Miyazawa-Jernigan contact potential calculated as in eq(7), the only difference being that residues in contact with the MHC and the TCR are taken into account, because there is no peptide attached to the MHC at this stage.
Negative selection is performed according to the following procedure: for each () and for each self AA string (),
- compute the sequence profile of the with respect to the , as described in section and section, according to whether the T is a helper or a cytotoxic T cell;
- randomly choose a peptide and create an string;
- compute the Miyazawa-Jernigan contact potential .
Finally, the probability that a T cell survives negative selection is(11)where the MHC molecule is composed of and the chosen peptide of the . The exponent ThymEff is required because we treat the thymus as if it were composed of ThymEff sub-layers (by simulating multiple encounters with each thymic cell receptor).
Parameters of the model
The simulator accepts, as input, the definition of the antigen AA sequence (in the form of a FASTA file), the matrices defining the binding motifs for the haplotype (four matrices for class I, two HLA-A and two HLA-B, as well as two matrices for class II, as explained in section and section), and other variables that are in part derived from the literature and in part are free parameters used to tune the system. Most of the parameters of this version of C-ImmSim are the same with respect to the previous bit-string version. The parameters are described in http://www.iac.cnr.it/filippo/parameter-page.html. The main difference consists in the fact that, now, all clonotypic receptors, peptides, and epitopes are represented by strings of AAs. Moreover, the definition of the HLAs is now given in terms of affinity matrices rather than in bit-strings..
In the following experiments the self is given as a random set of naturally occurring 9-mers extracted from the human proteome. Since we are not focusing on studying th emergence of autoimmunity diseases, we arbitrarily take = 50 and ThymEff = 5.
As output, the simulator produces a set of files corresponding to population data (both total number of lymphocytes and the division between clonotypes, cytokines, and antibody concentrations per lattice point) plus Logo files  of lymphocytes at certain time steps.
The overall architecture is depicted in Figure 7.
The definition of HLAs is given by means of the precomputed matrices, as described in sections and. Moreover, we select the pathogen as a collection of peptides from a database of FASTA files. The output of the simulator consists of a set of ASCII or binary files describing the state of the system at each time step. From the files, various statistics can be extracted.
Conceived and designed the experiments: NR OL MB FC. Performed the experiments: NR FC. Analyzed the data: NR OL MB FC. Contributed reagents/materials/analysis tools: NR FC. Wrote the paper: NR OL MB FC.
- 1. Lundegaard C, Lund O, Kesmir C, Brunak S, Nielsen M (2007) Modeling the adaptive immune system: predictions and simulations. Bioinformatics 23: 3265–3275.
- 2. Celada F, Seiden PE (1992) A computer model of cellular interactions in the immune system. Immunol Today 13: 56–62.
- 3. Lund O, Nielsen M, Kesmir C, Petersen AG, Lundegaard C, et al. (2004) Definition of supertypes for HLA molecules using clustering of specificity matrices. Immunogenetics 55: 797–810.
- 4. Nielsen M, Lundegaard C, Worning P, Hvid CS, Lamberth K, et al. (2004) Improved prediction of MHC class I and class II epitopes using a novel Gibbs sampling approach. Bioinformatics 20: 1388–1397.
- 5. Nielsen M, Lundegaard C, Blicher T, Lamberth K, Harndahl M, et al. (2007) NetMHCpan, a method for quantitative predictions of peptide binding to any HLA-A and -B locus protein of known sequence. PLoS ONE 2: e796.
- 6. Nielsen M, Lundegaard C, Lund O (2007) Prediction of MHC class II binding affinity using SMM-align, a novel stabilization matrix alignment method. BMC Bioinformatics 8: 238.
- 7. Miyazawa S, Jernigan RL (1999) An empirical energy potential with a reference state for protein fold and sequence recognition. Proteins 36: 357–369.
- 8. Perelson AS, Weisbuch G (1997) Immunology for physicists. Rev Mod Phys 69: 1219–1267.
- 9. Ho DD, Neumann AU, Perelson AS, Chen W, Leonard JM, et al. (1995) Rapid turnover of plasma virions and CD4 lymphocytes in HIV-1 infection. Nature 373: 123–126.
- 10. Wei X, Ghosh SK, Taylor ME, Johnson VA, Emini EA, et al. (1995) Viral dynamics in human immunodeficiency virus type 1 infection. Nature 373: 117–122.
- 11. Wein LM, Zenios SA, Nowak MA (1997) Dynamic multidrug therapies for HIV: a control theoretic approach. J Theor Biol 185: 15–29.
- 12. Perelson AS, Essunger P, Cao Y, Vesanen M, Hurley A, et al. (1997) Decay characteristics of HIV-1-infected compartments during combination therapy. Nature 387: 188–191.
- 13. McLean AR, Nowak MA (1992) Competition between zidovudine-sensitive and zidovudine-resistant strains of HIV. AIDS 6: 71–79.
- 14. Perelson AS, Kirschner DE, De Boer R (1993) Dynamics of HIV infection of CD4+ T cells. Math Biosci 114: 81–125.
- 15. Essunger P, Perelson AS (1994) Modeling hiv infection of cd4+ t-cell subpopulations. J Theor Biol 170: 367–391.
- 16. Mittler JE, Levin BR, Antia R (1996) T-cell homeostasis, competition, and drift: Aids as hiv-accelerated senescence of the immune repertoire. J Acquir Immune Defic Syndr Hum Retrovirol 12: 233–248.
- 17. Nowak MA, Bonhoeffer S, Shaw GM, May RM (1997) Anti-viral drug treatment: dynamics of resistance in free virus and infected cell populations. J Theor Biol 184: 203–217.
- 18. Nowak MA, Lloyd AL, Vasquez GM, Wiltrout TA, Wahl LM, et al. (1997) Viral dynamics of primary viremia and antiretroviral therapy in simian immunodeficiency virus infection. J Virol 71: 7518–7525.
- 19. Stilianakis NI, Boucher CA, De Jong MD, Van Leeuwen R, Schuurman R, et al. (1997) Clinical data sets of human immunodeficiency virus type 1 reverse transcriptase-resistant mutants explained by a mathematical model. J Virol 71: 161–168.
- 20. Bonhoeffer S, May RM, Shaw GM, Nowak MA (1997) Virus dynamics and drug therapy. Proc Natl Acad Sci U S A 94: 6971–6976.
- 21. de Jong MD, de Boer RJ, de Wolf F, Foudraine NA, Boucher CA, et al. (1997) Overshoot of HIV-1 viraemia after early discontinuation of antiretroviral treatment. AIDS 11: F79–84.
- 22. Herz AV, Bonhoeffer S, Anderson RM, May RM, Nowak MA (1996) Viral dynamics in vivo: limitations on estimates of intracellular delay and virus decay. Proc Natl Acad Sci U S A 93: 7247–7251.
- 23. Klenerman P, Phillips RE, Rinaldo CR, Wahl LM, Ogg G, et al. (1996) Cytotoxic t lymphocytes and viral turnover in hiv type 1 infection. Proc Natl Acad Sci U S A 93: 15323–15328.
- 24. Seiden PE, Celada F (1992) A model for simulating cognate recognition and response in the immune system. J Theor Biol 158: 329–357.
- 25. Celada F, Seiden PE (1996) Affinity maturation and hypermutation in a simulation of the humoral immune response. Eur J Immunol 26: 1350–1358.
- 26. Morpurgo D, Serenthà R, Seiden PE, Celada F (1995) Modelling thymic functions in a cellular automaton. Int Immunol 7: 505–516.
- 27. Castiglione F, Poccia F, D'Offizi G, Bernaschi M (2004) Mutation, fitness, viral diversity, and predictive markers of disease progression in a computational model of HIV type 1 infection. AIDS Res Hum Retroviruses 20: 1314–1323.
- 28. Castiglione F, Duca K, Jarrah A, Laubenbacher R, Hochberg D, et al. (2007) Simulating epstein-barr virus infection with C-Immsim. Bioinformatics 23: 1371–1377.
- 29. Santoni D, Pedicini M, Castiglione F (2008) Implementation of a regulatory gene network to simulate the TH1/2 differentiation in an agent-based model of hyper-sensitivity reactions. Bioinformatics 24: 1374–1380.
- 30. Motta S, Castiglione F, Lollini PL, Pappalardo F (2005) Modelling vaccination schedules for a cancer immunoprevention vaccine. Immunome Res 1: 5.
- 31. Cheng Y, Ghersi D, Calcagno C, Selin LK, Puzone R, et al. (2009) A discrete computer model of the immune system reveals competitive interactions between the humoral and cellular branch and between cross-reacting memory and nave responses. Vaccine 27: 833–45.
- 32. Meier-Schellersheim M, Mack G (1999) Simmune, a tool for simulating and analyzing immune system behavior. URL http://www.citebase.org/abstract?id=oai:arXiv.org:cs/9903017.
- 33. Folcik VA, An GC, Orosz CG (2007) The basic immune simulator: an agent-based model to study the interactions between innate and adaptive immunity. Theor Biol Med Model 4: 39.
- 34. Kalita JK, Chandrashekar K, Hans R, Selvam P (2006) Computational modelling and simulation of the immune system. Int J Bioinform Res Appl 2: 63–88.
- 35. Perelson AS, Oster GF (1979) Theoretical studies of clonal selection: minimal antibody repertoire size and reliability of self-non-self discrimination. J Theor Biol 81: 645–670.
- 36. Farmer JD, Packard NH, Perelson AS (1986) The immune system, adaptation, and machine learning. Phys D 2: 187–204.
- 37. De Boer RJ, Perelson AS (1994) T cell repertoires and competitive exclusion. J Theor Biol 169: 375–390.
- 38. Perelson AS (1989) Immune network theory. Immunol Rev 110: 5–36.
- 39. Sulzer B, Perelson AS (1996) Equilibrium binding of multivalent ligands to cells: effects of cell and receptor density. Math Biosci 135: 147–185.
- 40. Bernaschi M, Castiglione F (2001) Evolution of an immune system simulator. Comp Biol Med 31(5): 303–31.
- 41. Hedrick SM, Cohen DI, Nielsen EA, Davis MM (1983) Isolation of cDNA clones encoding T cell specific membrane-associated proteins. Nature 308: 149–153.
- 42. Seidman JG, Leder P (1978) The arrangement and rearrangement of antibody genes. Nature 276: 790–795.
- 43. Tonegawa S (1983) Somatic generation of antibody diversity. Nature 302: 575–581.
- 44. Allen PM (1987) Antigen processing at the molecular level. Immunol Today 8: 270–273.
- 45. Berzofski JA Cruse JM, Lewis RE, editors. (1985) The nature and role of antigen processing in t cell activation, Year in Immunology 1984–1985 18–24.
- 46. Manca F, Kunkl A, Fenoglio D, Fowler A, Sercarz E, et al. (1985) Constraints in T-B cooperation related to epitope topology on E. coli β-galactosidase. I. the fine specificity of T cells dictates the fine specificity of antibodies directed to conformation-dependent determinants. Eur J Immunol 15: 345–350.
- 47. Unanue ER (1984) Antigen-presenting function of the macrophage. Ann Rev Immunol 2: 395–428.
- 48. Haskins K, Kubo R, White J, Pigeon M, Kappler J, et al. (1983) The major histocompatibility complex-restricted antigen receptor on T cells. J Exp Med 157: 1149–1162.
- 49. Howard JC (1985) Immunological help at last. Nature 314: 494–495.
- 50. Lanzavecchia A (1985) Antigen-specific interactions between T and B cells. Nature 314: 537–539.
- 51. Berek C, Ziegner M (1993) The maturation of the immune response. Immunol Today 14: 400–404.
- 52. Celada F (1971) The cellular basis of immunological memory. Prog Allergy 15: 223–267.
- 53. Burnet FM (1959) The Clonal Selection Theory of Acquired Immunity. Cambridge: Cambridge University Press.
- 54. Sprent J, Lo D, Gao EK, Ron Y (1988) T cell selection in the thymus. Immunol Rev 101: 173–190.
- 55. Hayflick L, Moorhead PS (1961) The serial cultivation of human diploid cell strains. Exp Cell Res 25: 585–621.
- 56. Hayflick L (1965) The limited in vitro lifetime of human diploid cell strains. Exp Cell Res 37: 614–636.
- 57. Shay JW, Wright WE (2000) Hayflick, his limit, and cellular ageing. Nat Rev Mol Cell Biol 1: 72–6.
- 58. Effros RB, Pawelec G (1997) Replicative senescence of T cells: does the Hayflick limit lead to immune exhaustion? Immunol Today 18: 450–454.
- 59. Nossal GJ, Pike BL (1980) Clonal anergy: persistence in tolerant mice of antigen-binding B lymphocytes incapable of responding to antigen or mitogen. Proc Natl Acad Sci U S A 77: 1602–1606.
- 60. Whitacre CC, Gienapp IE, Orosz CG, Bitar DM (1991) Oral tolerance in experimental autoimmune encephalomyelitis. III. evidence for clonal anergy. J Immunol 147: 2155–2163.
- 61. Schwartz RH (2003) T cell anergy. Annu Rev Immunol 21: 305–334.
- 62. Matzinger P (1994) Tolerance, danger, and the extended family. Annu Rev Immunol 12: 991–1045.
- 63. Jerne NK (1974) Towards a network theory of the immune system. Ann Immunol (Paris) 125C: 373–389.
- 64. Carrington M, Nelson GW, Martin MP, Kissner T, Vlahov D, et al. (1999) HLA and HIV-1: heterozygote advantage and B*35-Cw*04 disadvantage. Science 283: 1748–1752.
- 65. Hoof I, Peters B, Sidney J, Pedersen LE, Sette A, et al. (2009) NetMHCpan, a method for MHC class I binding prediction beyond humans. Immunogenetics 61: 1–13.
- 66. Larsen JE, Lund O, Nielsen M (2006) Improved method for predicting linear B-cell epitopes. Immunome Res 2:
- 67. Haste Andersen P, Nielsen M, Lund O (2006) Prediction of residues in discontinuous B-cell epitopes using protein 3D structures. Protein Sci 15: 2558–2567.
- 68. Lin HH, Zhang GL, Tongchusak S, Reinherz EL, Brusic V (2008) Evaluation of MHC-II peptide binding prediction servers: applications for vaccine research. BMC Bioinformatics 9: Suppl 12S22.
- 69. Lin HH, Ray S, Tongchusak S, Reinherz EL, Brusic V (2008) Evaluation of MHC class I peptide binding prediction servers: applications for vaccine research. BMC Immunol 9: 8.
- 70. Tang ST, Wang M, Lamberth K, Harndahl M, Dziegiel MH, et al. (2008) Mhc-i-restricted epitopes conserved among variola and other related orthopoxviruses are recognized by t cells 30 years after vaccination. Arch Virol 153: 1833–44.
- 71. Sette A, Sidney J, Bui HH, del Guercio MF, Alexander J, et al. (2005) Characterization of the peptide-binding specificity of mamu-a*11 results in the identification of siv-derived epitopes and interspecies cross-reactivity. Immunogenetics 57: 53–68.
- 72. Nielsen M, Lundegaard C, Worning P, Lauemoller SL, Lamberth K, et al. (2003) Reliable prediction of T-cell epitopes using neural networks with novel sequence representations. Protein Sci 12: 1007–1017.
- 73. Rapin N, Hoof I, Lund O, Nielsen M (2008) MHC motif viewer. Immunogenetics.
- 74. Miyazawa S, Jernigan RL (1996) Residue-residue potentials with a favorable contact pair term and an unfavorable high packing density term, for simulation and threading. J Mol Biol 256: 623–644.
- 75. Buus S, Lauemoller SL, Worning P, Kesmir C, Frimurer T, et al. (2003) Sensitive quantitative predictions of peptide-MHC binding by a ‘Query by Committee’ artificial neural network approach. Tissue Antigens 62: 378–384.
- 76. Altschul SF, Madden TL, Schäffer AA, Zhang J, Zhang Z, et al. (1997) Gapped BLAST and PSI-BLAST: a new generation of protein database search programs. Nucleic Acids Res 25: 3389–402.
- 77. Yewdell JW, Bennink JR (1999) Immunodominance in major histocompatibility complex class I-restricted T lymphocyte responses. Annu Rev Immunol 17: 51–88.
- 78. Reche PA, Zhang H, Glutting JP, Reinherz EL (2005) Epimhc: a curated database of mhc-binding peptides for customized computational vaccinology. Bioinformatics 21: 2140–2141.
- 79. Brusic V, Rudy G, Harrison LC (1994) MHCPEP: a database of MHC-binding peptides. Nucleic Acids Res 22: 3663–3665.
- 80. Nielsen M, Lundegaard C, Blicher T, Peters B, Sette A, et al. (2008) Quantitative predictions of peptide binding to any HLA-DR molecule of known sequence: NetMHCIIpan. PLoS Comput Biol 4: e1000107.
- 81. Bian H, Hammer J (2004) Discovery of promiscuous HLA-II-restricted T cell epitopes with TEPITOPE. Methods 34: 468–75.
- 82. Pellequer JL, Westhof E, Van Regenmortel MH (1993) Correlation between the location of antigenic sites and the prediction of turns in proteins. Immunol Lett 36: 83–99.
- 83. Parker JM, Guo D, Hodges RS (1986) New hydrophilicity scale derived from high-performance liquid chromatography peptide retention data: correlation of predicted surface residues with antigenicity and X-ray-derived accessible sites. Biochemistry 25: 5425–5432.
- 84. Miyazawa S, Jernigan RL (2000) Identifying sequence-structure pairs undetected by sequence alignments. Protein Eng 13: 459–475.
- 85. Schneider TD, Stephens RM (1990) Sequence logos: a new way to display consensus sequences. Nucleic Acids Res 18: 6097–6100.