Skip to main content
eLife logoLink to eLife
. 2013 May 14;2:e00631. doi: 10.7554/eLife.00631

Stability-mediated epistasis constrains the evolution of an influenza protein

Lizhi Ian Gong 1, Marc A Suchard 2, Jesse D Bloom 1,3,*
Editor: Mercedes Pascual4
PMCID: PMC3654441  PMID: 23682315

Abstract

John Maynard Smith compared protein evolution to the game where one word is converted into another a single letter at a time, with the constraint that all intermediates are words: WORD→WORE→GORE→GONE→GENE. In this analogy, epistasis constrains evolution, with some mutations tolerated only after the occurrence of others. To test whether epistasis similarly constrains actual protein evolution, we created all intermediates along a 39-mutation evolutionary trajectory of influenza nucleoprotein, and also introduced each mutation individually into the parent. Several mutations were deleterious to the parent despite becoming fixed during evolution without negative impact. These mutations were destabilizing, and were preceded or accompanied by stabilizing mutations that alleviated their adverse effects. The constrained mutations occurred at sites enriched in T-cell epitopes, suggesting they promote viral immune escape. Our results paint a coherent portrait of epistasis during nucleoprotein evolution, with stabilizing mutations permitting otherwise inaccessible destabilizing mutations which are sometimes of adaptive value.

DOI: http://dx.doi.org/10.7554/eLife.00631.001

Research organism: Viruses

eLife digest

During evolution, the effect of one mutation on a protein can depend on whether another mutation is also present. This phenomenon is similar to the game in which one word is converted to another word, one letter at a time, subject to the rule that all the intermediate steps are also valid words: for example, the word WORD can be converted to the word GENE as follows: WORD→WORE→GORE→GONE→GENE. In this example, the D must be changed to an E before the W is changed to a G, because GORD is not a valid word.

Similarly, during the evolution of a virus, a mutation that helps the virus evade the human immune system might only be tolerated if the virus has acquired another mutation beforehand. This type of mutational interaction would constrain the evolution of the virus, since its capacity to take advantage of the second mutation depends on the first mutation having already occurred.

Gong et al. examined whether such interactions have indeed constrained evolution of the influenza virus. Between 1968 and 2007, the nucleoprotein—which acts as a scaffold for the replication of genetic material—in the human H3N2 influenza virus underwent a series of 39 mutations. To test whether all of these mutations could have been tolerated by the 1968 virus, Gong et al. introduced each one individually into the 1968 nucleoprotein. They found that several mutations greatly reduced the fitness of the 1968 virus when introduced on their own, which strongly suggests that these ‘constrained mutations’ became part of the virus’s genetic makeup as a result of interactions with ‘enabling’ mutations.

The constrained mutations decreased the stability of the nucleoprotein at high temperatures, while the enabling mutations counteracted this effect. It may, therefore, be possible to identify enabling mutations based on their effects on thermal stability. Intriguingly, the constrained mutations helped the virus overcome one form of human immunity to influenza, suggesting that interactions between mutations might limit the rate at which viruses evolve to evade the immune system.

Overall, these results show that interactions among mutations constrain the evolution of the influenza nucleoprotein in a fashion that can be largely understood in terms of protein stability. If the same is true for other proteins and viruses, this work could lead to a deeper understanding of the constraints that govern evolution at the molecular level.

DOI: http://dx.doi.org/10.7554/eLife.00631.002

Introduction

Epistasis can play a key role in evolution, such as by constraining accessible evolutionary pathways (Weinreich et al., 2005; Kryazhimskiy et al., 2011) and increasing the role of contingency in adaptation (Blount et al., 2008; Bridgham et al., 2009). One of the simplest types of epistasis is that which occurs between mutations within a single protein. That such epistasis is common has long been considered self-evident–for example, in their seminal 1965 analysis of protein evolution, Emile Zuckerkandl and Linus Pauling wrote, “Of course … the functional effect of a given single substitution will frequently depend on the presence or absence of a number of other substitutions (Zuckerkandl and Pauling, 1965).” But although numerous laboratory evolution and site-directed mutagenesis experiments have demonstrated that mutations can in principle exhibit strong epistatic interactions (Bershtein et al., 2006; Bloom et al., 2006; Lunzer et al., 2010; Salverda et al., 2011), surprisingly little is known about the actual role of epistasis in natural protein evolution. A few studies have reconstructed naturally occurring mutations involved in antibiotic resistance or steroid-receptor ligand specificity (Wang et al., 2002; Weinreich et al., 2006; Ortlund et al., 2007; Bridgham et al., 2009) and found strong epistatic interactions. However, these studies have focused on small numbers of mutations pre-selected for analysis due to their putative adaptive role, and in most cases the actual temporal order of mutations is unknown.

As a result, many basic questions remain without clear answers: What is the prevalence of epistasis during protein evolution? How does epistasis arise from an evolutionary process that is conceived as proceeding through the incremental accumulation of mutations? And is it possible to coherently understand epistasis in terms of the underlying protein biophysics?

An experimental approach to address these questions is suggested by John Maynard Smith’s classic analogy between protein evolution and the game where the goal is to convert one word into another a single letter at a time passing only through intermediates that are also words (Maynard Smith, 1970):

WORDWOREGOREGONEGENE.

Implicit in this analogy is the idea that epistasis constrains evolution—for example, the original parent sequence does not tolerate three of the four eventual changes, as GORD, WERD and WOND are not words. We sought to similarly test for epistasis in actual protein evolution by reconstructing an extended natural evolutionary trajectory, and then also introducing each mutation individually into the original parent (Figure 1). While this experimental strategy is not guaranteed to find every possible epistatic interaction, it will systematically identify all mutations that have different effects in the original parent and the evolutionary intermediates in which they actually occurred. The experimental strategy in Figure 1 also offers the possibility of determining how epistatically interacting mutations were actually fixed—for example through sequential functional intermediates as posited by Maynard Smith, or by the simultaneous or closely coupled fixation of several individually deleterious mutations (Kimura, 1985; Meer et al., 2010).

Figure 1. Outline of experiment designed to parallel Maynard Smith’s analogy.

Figure 1.

The actual evolutionary trajectory involves the accumulation of mutations, and consists of a series of evolutionary intermediates. We recreate and experimentally assay each of these evolutionary intermediates. We also introduce each mutation individually into the original parent sequence, and experimentally assay these single mutants. If Maynard Smith is correct, each of the naturally occurring evolutionary intermediates should be a functional protein. However, some of the single mutants could exhibit impaired function if there is significant epistasis among mutations along the evolutionary trajectory.

DOI: http://dx.doi.org/10.7554/eLife.00631.003

The experiment outlined in Figure 1 requires a protein for which it is possible both to reconstruct the natural evolution and to assay for the functions that contribute to biological fitness. Human H3N2 influenza A virus is exceptionally suited to the first requirement, as the extensive availability of contemporary and historical sequences enables the detailed reconstruction of evolutionary trajectories. We focused on the 498-residue nucleoprotein (NP). Although NP’s evolution is less rapid and medically infamous than that of its surface counterparts hemagglutinin and neuraminidase, NP still accumulates roughly one amino-acid substitution per year (Rambaut et al., 2008). Crucially for our experiment, NP’s primary function—serving as a scaffold for viral RNA during transcription and genome packaging (Portela and Digard, 2002; Ye et al., 2006)—occurs within the interior of infected cells, and so is probably fairly authentically represented in tissue-culture assays.

NP is also a target of cytotoxic T lymphocytes (CTLs), and so is under continual pressure for change in CTL epitopes (Berkhoff et al., 2004, 2007; Valkenburg et al., 2011)—a pressure partially countered by the fact that some of these epitopes are under functional constraint (Rimmelzwaan, et al., 2004a; Berkhoff et al., 2005, 2006). CTL selection in influenza is thought to be weaker than antibody selection on the viral surface proteins, and so much of NP’s evolution is shaped by stochastic forces such as population bottlenecks and hitchhiking with antigenic mutations in the surface proteins (Rambaut et al., 2008; Bhatt et al., 2011)—stochastic forces that in some cases can also accelerate the fixation CTL escape mutations (Gog et al., 2003). Our experiments do not measure these complexities of immune pressure as they do not include CTL selection, but as described later in this paper, existing data enable us to identify adaptive CTL-escape mutations.

In the work reported here, we use the strategy in Figure 1 to synthesize information about influenza’s natural evolution with our own experiments to examine epistasis in NP evolution. We find that epistasis constrains both the sequence evolution and ongoing adaptation of NP, and that the mechanistic basis for most of this epistasis can be understood in remarkably simple terms.

Results

Several mutations are under strong epistatic constraint

We focused on the evolutionary trajectory separating NPs from two human H3N2 strains isolated 39 years apart, A/Aichi/2/1968 and A/Brisbane/10/2007 (Figure 2). To map this trajectory, we developed a probabilistic technique to estimate the posterior distribution of mutational events (Minin and Suchard, 2008; O’Brien et al., 2009) and, original to this work, their time-orderings along an unknown phylogenetic tree within the BEAST software package (Drummond et al., 2012). Each sample from this posterior distribution represents a mutational path from Aichi/1968 to Brisbane/2007, which in turn can be represented as a directed graph through protein sequence space (Figure 2—figure supplement 1). Summarizing these graph samples effectively integrates over uncertainty in the tree and substitution process, and yields the marginal posterior distribution of the evolutionary trajectory from Aichi/1968 to Brisbane/2007 (Figure 2). The most probable trajectory consists of 39 mutational steps at 33 sites (5 mutations revert; 1 site mutates to two identities). The fact that NP sequences are available for every year since 1968 allows us to reconstruct the trajectory with remarkable precision: there are >1046 possible orderings of 39 mutations, yet we can confidently identify the sequences of 25 of the evolutionary intermediates; the remainder fall along regions of the trajectory where two or more mutations occurred in an unknown order (Figure 2).

Figure 2. Inferred evolutionary trajectory.

(A) Evolutionary trajectory through protein sequence space from Aichi/1968 to Brisbane/2007 NP. Each circle represents a unique inferred sequence, with areas and intensities proportional to the probability that sequence was part of the evolutionary trajectory (Figure 2—figure supplement 1). Mutations for which the parent and descendent are clearly resolved are in black; mutations that occurred in an unknown order are in red. High-confidence evolutionary intermediates have numeric labels. The estimated date of occurrence of each mutation is shown in Figure 2—figure supplement 2. (B) Phylogenetic tree of the human H3N2 NPs from 1968 to 2011 that were used to infer the evolutionary trajectory. The lines of descent connecting Aichi/1968 and Brisbane/2007 to their common ancestor are in black. Data and computer code are provided in Figure 2—source code 1.

DOI: http://dx.doi.org/10.7554/eLife.00631.004

Figure 2—source code 1. The sequence data and source code used to generate the evolutionary trajectory and phylogenetic tree.
This code is in the form of a ZIP file with BEAST input files and Python code. A README file explains the contents.
elife00631s001.zip (1.5MB, zip)
DOI: 10.7554/eLife.00631.005

Figure 2.

Figure 2—figure supplement 1. Construction of the evolutionary trajectory.

Figure 2—figure supplement 1.

We estimated the joint posterior distribution of phylogenetic trees with mutations mapped on the branches in BEAST. Portions of two example trees with mutations are shown at the top. Tracing along the line of descent (shown in red) gives a specific sequence of mutations; we can use these to reconstruct the corresponding path through sequence space (a directed graph through the space of all possible protein sequences), as shown at the bottom of the figure. We summarize samples of individual directed graphs drawn from the posterior distribution, with the posterior probabilities of specific points and connections equaling the fraction of the samples that correspond to directed graphs containing these points and connections. We represent visually the probabilities of the points and connections by varying the areas of the circles/widths of the lines, and their intensities. At bottom right is the result of integrating just the two partial paths shown in this figure. The full evolutionary trajectory in Figure 2 represents the integration of many full paths.
Figure 2—figure supplement 2. Dates at which mutations fixed along the evolutionary trajectory in Figure 2A.

Figure 2—figure supplement 2.

This plot shows the posterior median and 80% Bayesian credible intervals for the dates. In many cases the date intervals for two mutations overlap even though in the evolutionary trajectory one mutation can be placed before another. This is because the dates are correlated in the individual tree-mutation samples drawn from the posterior, so that the difference in times between two mutations tend to be more precisely defined than the absolute date ranges. Two mutations (red) tend to arise on branches going from the common ancestor to Aichi/1968, while the remaining mutations (blue) tend to arise on branches from the common ancestor to Brisbane/2007. The code used to generate this figure is in Figure 2—source code 1.

We created plasmids encoding each of the high-confidence protein intermediates along the trajectory, using the same codons found in the natural sequences but not introducing any of the synonymous mutations that occurred during this timeframe. We used a mini-replicon system to assess the transcriptional activity of each NP in combination with polymerase proteins (PB2, PB1, PA) from the human H3N2 strain A/Nanchang/933/1995 (Figure 3—figure supplement 1). All evolutionary intermediates exhibited high activity (Figure 3A), supporting Maynard Smith’s notion that evolution proceeds through functional sequences.

Figure 3. Three mutations are strongly deleterious when introduced individually into the parent Aichi/1968 NP, despite eventually becoming fixed along the evolutionary trajectory without apparent negative effect.

(A) The transcriptional activity for the high-confidence evolutionary intermediates, quantified using a GFP reporter (Figure 3—figure supplement 1). Activity is scaled so that the parent Aichi/1968 NP has an activity of one. The numeric labels of the evolutionary intermediates match those used in Figure 2A. (B) The change in activity caused by introducing each mutation individually into the parent Aichi/1968 NP. The deleterious effects on activity caused by L259S, R348G, and V280A are not caused by the genetic background of influenza polymerase proteins, as these three mutants are impaired regardless of whether the polymerase proteins are derived from Nanchang/1995, Aichi/1968, or Brisbane/2007 (Figure 3—figure supplement 3). (C) All three of the individual mutations that reduce activity also impair growth, yet there is no defect in the growth of viruses carrying the NPs of the first high-confidence evolutionary intermediates in which these individually deleterious mutations were actually fixed. Viral growth is quantified as described in Figure 3—figure supplement 2. Numerical data are in Figure 3—source data 1–3.

DOI: http://dx.doi.org/10.7554/eLife.00631.008

Figure 3—source data 1. Summary of transcriptional activity data (mean and standard error) for all variants from this study.
The means and standard errors are computed from at least triplicate assays, and are reported standardized so the value for Aichi/1968 NP is at 1. The data are provided in a CSV file.
elife00631s002.csv (1.9KB, csv)
DOI: 10.7554/eLife.00631.009
Figure 3—source data 2. Summary of viral growth data (mean and standard error) for all variants for which this property was measured in this study.
The means and standard errors are computed from at least triplicate assays, and are reported standardized so the value for Aichi/1968 NP is at 1. The data are provided in a CSV file.
elife00631s003.csv (833B, csv)
DOI: 10.7554/eLife.00631.010
Figure 3—source data 3. Transcriptional activity data in the alternative polymerase genetic backgrounds shown in Figure 3—figure supplement 3.
The data are provided in a CSV file.
elife00631s004.csv (708B, csv)
DOI: 10.7554/eLife.00631.011

Figure 3.

Figure 3—figure supplement 1. Schematic of NP transcriptional activity assay.

Figure 3—figure supplement 1.

(A) 293T cells are co-transfected with plasmids encoding PB2, PB1, and PA from Nanchang/1995, an NP variant, and a reporter plasmid expressing a negative-sense influenza viral-RNA encoding GFP. The four influenza proteins (PB2, PB1, PA, and NP) collaborate to transcribe the reporter GFP vRNA into mRNA, which is translated into protein, causing the cells to fluoresce. Activity is quantified by flow cytometry as the mean fluorescence intensity (MFI) above the background of control cells that receive no NP, relative to the activity of three wild-type Aichi/1968 NP replicates. (B) Example flow cytometry plots. (C) Total transcriptional activity as a function of the amount of transfected NP plasmid. The PB2, PB1, PA, and GFP reporter plasmids are transfected at 200 ng each. The NP plasmid was varied from 0 to 300 ng, and the fluorescence was quantified. At low levels of NP plasmid, the signal increases with increasing plasmid concentration, but at high levels the signal is saturated. We performed our assays with 50 ng of NP plasmid, which is near the midpoint of the curve—with this amount of plasmid, the signal changes in a sensitive manner with amount of NP.
Figure 3—figure supplement 2. Schematic of viral growth assay.

Figure 3—figure supplement 2.

(A) Co-cultures of 293T-CMV-Nan95-PB1 and MDCK-SIAT1-CMV-Nan95-PB1 cells were co-transfected with reverse-genetics plasmids encoding PB2/PB1/PA from Nanchang/1995, an NP variant, HA/NA/M/NS from A/WSN/1933, and a reporter plasmid expressing a negative-sense influenza viral-RNA encoding GFP with flanking sequences from PB1. A media change to low-serum media was performed after 20–24 hr, and at 66 hr post-transfection the viral supernatant was harvested. Dilutions of the supernatant were used to infect fresh MDCK-SIAT1-CMV-Nan95-PB1 cells, and 16 hr post-infection, the viral titer was determined by quantifying the fraction of GFP positive cells by flow cytometry using the Poisson formula. The titers are standardized to the average of three Aichi/1968 NP controls. (B) Example flow cytometry plots. The cells are at 105 per well, so the computed titers for these example plots are −105 × ln(1 − 0.0277) = 2809 infectious particles per μl for Aichi/1968, and −105 × ln(1 − 0.0144)/10 = 145 infectious particles per μl for V280A. (C) Viral titers in the supernatant at the indicated times post-transfection for the Aichi/1968 NP. Based on this timecourse, we chose to determine titers for all of the tested variants at 66 hr, when the virus is near but not yet at peak titers. Typically at this time point we would observe titers for the Aichi/1968 NP of around 103 infectious particles per μl; however, titers varied somewhat from day-to-day, which is why the values for each assay were standardized to three Aichi/1968 NP controls run on that same day.
Figure 3—figure supplement 3. Effects of key NP mutations on transcriptional activity in different polymerase genetic background of the viral polymerase genes.

Figure 3—figure supplement 3.

The six indicated NP variants were tested in the transcriptional activity assay with (A) the PB2, PB1, and PA genes derived from Nanchang/1995 as in all of the assays shown in Figure 3; (B) with these polymerase genes derived from Aichi/1968; or (C) with these polymerase genes derived from Brisbane/2007. In the last case (the Brisbane/2007 polymerase genes), the magnitude of the activity reduction is somewhat less, but all three mutants are still clearly impaired. In each plot, the activity is normalized relative to that observed for the parental Aichi/1968 NP in that polymerase background, and so the different panels have y-axis units that cannot be compared across panels. The NP plasmid amount is the same (50 ng) in all three backgrounds, but note that although this makes the readings at the middle of the dose-response curve for the Nanchang/1995 polymerase background (Figure 3—figure supplement 1), this may not be true for the other polymerase backgrounds. As can be seen from the plots, L259S, R384G, and V280A are impaired in all three backgrounds, suggesting that the mutational effects are intrinsic to NP and not due to interactions with polymerase genetic background. Data are in Figure 3—source data 3.

We then introduced each mutation individually into the parent Aichi/1968 NP and measured its effect on activity (Figure 3B). Most single mutants were highly functional, but three (L259S, R384G, V280A) exhibited large decreases in activity. These three mutations are also deleterious in the background of polymerase proteins from Aichi/1968 and Brisbane/2007 (Figure 3—figure supplement 3), suggesting that the deleterious effect is intrinsic to NP itself.

Because RNA transcription is essential for influenza replication, impaired activity should be devastating to viral fitness. To confirm this, we used reverse genetics (Hoffmann et al., 2000) to generate GFP-carrying viruses (Bloom et al., 2010) with the polymerase genes from Nanchang/1995 and the remaining genes from the lab-adapted A/WSN/1933 (H1N1) strain (Figure 3—figure supplement 2). Viruses with the parent (Aichi/1968) or final (Brisbane/2007) NP grew to comparably high titers in tissue culture (Figure 3C), but growth of the three transcriptionally impaired mutants was dramatically lower (>1000-fold lower for L259S and R384G, and >20-fold lower for V280A). However, we observed good growth of the first high-confidence evolutionary intermediates in which these mutations were actually fixed (Figure 3C).

Effects of the epistatically constrained mutations in the evolutionary intermediates in which they occurred

To understand how the three individually deleterious mutations fixed along the line of descent without a substantial fitness cost, we examined the evolutionary trajectory. L259S fixed in an unknown order with another mutation (N334H) in an evolutionary intermediate that we have labeled Step 10 (Figure 4A). L259S is deleterious to activity and growth in both Aichi/1968 and Step 10, while N334H has no major effect in either background (Figure 4A). But N334H rescues the deleterious effect of L259S in both Aichi/1968 and Step 10, indicating that fixation of L259S was enabled by N334H. We cannot determine the order of these two mutations during the evolution of the virus: they could have occurred simultaneously, or one could have preceded the other by a sufficiently small amount of time that no influenza isolates were sequenced in the intervening time period.

Figure 4. Effects of the individually deleterious mutations in the evolutionary intermediates in which they occurred.

Figure 4.

(A) L259S impairs the transcriptional activity and viral growth of both the parent Aichi/1968 and the evolutionary intermediate Step 10, but is rescued by N334H in both backgrounds. N334H alone has little effect on activity or growth in either background. The actual evolutionary trajectory involved the fixation of L259S and N334H in an unknown order. (B) R384G impairs activity and ablates growth of Aichi/1968, but has no effect on activity and a reduced adverse effect on growth in the high-confidence evolutionary intermediate (Step 21) in which it and several other mutations occurred in an unknown order. Addition of E375G to Step 21 with R384G fully rescues viral growth, but E375G alone worsens the impact of R384G. The reversion of L259S that preceded Step 21 plays an important role in enabling R384G, as the evolutionary intermediate without this reversion (Step 20) is more negatively affected by R384G. (C) V280A is deleterious in Aichi/1968 but not in the Step 35 evolutionary intermediate in which it actually occurred. M136I, which precedes V280A, largely rescues its effect.

DOI: http://dx.doi.org/10.7554/eLife.00631.015

The next individually deleterious mutation, R384G, fixed in Step 21 in an unknown order with several other mutations (Figure 4B). Immediately prior to this, the individually deleterious mutation L259S reverted in the transition from Step 20 to Step 21. R384G is deleterious to activity and growth in both Aichi/1968 and Step 20 (Figure 4B). However in Step 21, the deleterious effect on activity disappears while that on growth diminishes, indicating that reversion of L259S alleviates the impact of R384G. The further addition of E375G to Step 21 containing R384G eliminates the remaining growth impairment—but E375G alone fails to rescue R384G in the background of Aichi/1968 (Figure 4B). Note that E375G has also been previously reported to partially compensate for R384G in slightly different genetic backgrounds (Rimmelzwaan et al., 2004a). Fixation of R384G was therefore partially enabled by the preceding reversion of L259S, with further assistance from E375G. S259L clearly preceded R384G, but we are unable to resolve whether the second enabling mutation (E375G) occurred before, after, or simultaneously with R384G.

The final individually deleterious mutation, V280A, fixed in Step 35. Although V280A is deleterious in Aichi/1968, it has no negative impact in Step 35 (Figure 4C). M136I, which immediately preceded V280A in the natural evolution, mostly rescues its deleterious effect in the background of Aichi/1968 (Figure 4C). Therefore, V280A was enabled by mutations (including M136I) that occurred prior to its own fixation.

Most of the mutational effects are mediated by protein stability

What is the mechanistic explanation for these mutational effects? None of the identified epistatically interacting residues are in contact in the monomeric or known oligomeric NP crystal structures (Ye et al., 2006, 2012; Ng et al., 2008), nor are any of them in the protein’s RNA-binding groove (Figure 5 and Figure 5—figure supplement 1). We therefore hypothesized that the individually deleterious mutations might destabilize NP, and that the epistasis might be mediated by counterbalancing stabilizing mutations. This hypothesis is consistent with the fact that N334H rescues L259S, and reversion of L259S in turn partially rescues R384G, despite the lack of physical contact among these residues.

Figure 5. There is no obvious structural basis for the observed epistasis, as none of the epistatically interacting mutations are in contact in the solved crystal structures of NP.

Shown above is one monomer from PDB structure 2IQH; the mutations are also not in contact in any of the known oligomeric structures (Figure 5—figure supplement 1). The sites of the three individually deleterious mutations are in orange, those of the rescuing mutations are in green, and the site of E375G (which can rescue R384G depending on genetic background) is in yellow.

DOI: http://dx.doi.org/10.7554/eLife.00631.016

Figure 5.

Figure 5—figure supplement 1. None of the epistatically interacting mutations are in contact in the known oligomeric structures of NP.

Figure 5—figure supplement 1.

(A) Sites of the mutations (spheres) in the trimeric structure of NP from PDB 2IQH. (B) Sites of the mutations in the dimeric structure from PDB 2Q06. (C) Sites of the mutations in the dimeric structure from PDB 3MIR.

We began by pairing N334H with each of the individually deleterious mutations in the background of the parent Aichi/1968 NP. N334H rescues activity for each of these mutations (Figure 6A). N334H also rescues growth for L259S and V280A, and largely rescues growth for R384G (Figure 6B). To test if this rescue was related to in vivo protein levels, we quantified NP in transfected human cells (Figure 6C,D). The parent Aichi/1968 NP and its N334H mutant were present at comparably high levels, but levels were markedly reduced for variants carrying each of the three individually deleterious mutations. Addition of N334H to these mutants restored wild-type protein levels, indicating that N334H can counteract the decrease in protein levels associated with the individually deleterious mutations.

Figure 6. The epistasis correlates with mutational effects on NP stability.

(A) and (B) N334H rescues activity and mostly rescues viral growth of all three individually deleterious mutations. (C) Western blot showing that the three individually deleterious mutations all reduce NP levels in transfected cells relative to an mCherry control expressed from an IRES in the same plasmid; this effect is counteracted by N334H. (D) Quantification of NP levels from triplicate Western blots (Figure 6—figure supplement 1). (E) The deleterious mutations decrease and N334H increases the stability of NP, as measured by thermal denaturation of purified protein monitored by circular dichroism (Figure 6—figure supplements 2–6 and Figure 6—source data 1). Figure 6—figure supplement 7 shows that M136I, which precedes V280A in the natural evolution, and is modestly stabilizing (Figure 6—figure supplements 4–7), also partially rescues the levels of V280A NP in transfected cells and the activity of all three individually deleterious mutations. Together, the two stabilizing mutations N334H and M136I can rescue the activity of combinations of the individually deleterious mutations (Figure 6—figure supplement 8).

DOI: http://dx.doi.org/10.7554/eLife.00631.018

Figure 6—source data 1. A table of all of the melting temperatures and the changes in stability relative to Aichi/1968, in CSV format.
elife00631s005.csv (1KB, csv)
DOI: 10.7554/eLife.00631.019

Figure 6.

Figure 6—figure supplement 1. The full set of triplicate Western blots used to quantify the NP levels in transfected cells.

Figure 6—figure supplement 1.

NP levels were quantified by transfecting 293T cells with a FLAG-tagged NP on a plasmid also containing a FLAG-tagged mCherry under an IRES element. The mCherry therefore serves as a transfection/loading control. Three triplicate blots each from independent transfections were performed to quantify NP levels. For each blot, the ratio of NP to mCherry was quantified, and is shown below the band. These ratios were then standardized relative to that for the Aichi/1968 NP, and the averages of the triplicates computed. Note that all three blots confirm that L259S, V280A, and R384G are present at reduced levels—and that N334H can rescue this defect.
Figure 6—figure supplement 2. Purification of Aichi/1968 NP with deletion of residues 2–7, mutation R416A, and a C-terminal 6-His tag (expected molecular weight 56.6 kDa).

Figure 6—figure supplement 2.

These modifications were necessary to obtain monomeric RNA-free in NP in a CD-compatible buffer. The other NP variants behaved similarly by the measures in this figure. (A) NP was at high purity after elution off a cobalt column, as judged by SDS-PAGE. (B) NP was further purified over a Superdex 200 size-exclusion column. It eluted at roughly the expected size. (C) After size-exclusion, NP had a 260/280 nm ratio much less than 1, indicating protein largely free of RNA. (D) NP at 20°C exhibits a CD spectrum characteristic of an alpha-helical protein. This spectrum disappears after heating, and does not reappear after cooling back to 20°C (indicating irreversible denaturation). We monitored unfolding at 209 nm (dashed vertical line). All CD was performed at a NP concentration of 5 μM with a cuvette path length of 0.1 cm.
Figure 6—figure supplement 3. Circular dichroism wavelength scans for all variants that were tested (those with thermal melts shown in Figure 6figure supplements 4–6).

Figure 6—figure supplement 3.

All variants exhibit similar CD spectra characteristic of an alpha-helical protein. The magnitude of the spectra are also similar, indicating all protein variants are indeed at roughly the same concentration (which was measured at 5 μM as judged by absorbance at 280 nm).
Figure 6—figure supplement 4. The first 15 thermal denaturation curves.

Figure 6—figure supplement 4.

NP variants were thermally denatured with unfolding monitored by ellipticity at 209 nm, at a scan rate of 2°C per minute. Melting temperatures were obtained from sigmoidal fits over the range 20–60°C.
Figure 6—figure supplement 5. The second 15 thermal denaturation curves.

Figure 6—figure supplement 5.

NP variants were thermally denatured with unfolding monitored by ellipticity at 209 nm, at a scan rate of 2°C per minute. Melting temperatures were obtained from sigmoidal fits over the range 20–60°C.
Figure 6—figure supplement 6. The last 13 thermal denaturation curves.

Figure 6—figure supplement 6.

NP variants were thermally denatured with unfolding monitored by ellipticity at 209 nm, at a scan rate of 2°C per minute. Melting temperatures were obtained from sigmoidal fits over the range 20–60°C.
Figure 6—figure supplement 7. M136I partially rescues the activity of the three individually deleterious mutations, and mostly rescues protein levels for V280A.

Figure 6—figure supplement 7.

M136I preceded V280A in the natural evolution of NP. Note that Figure 6—figure supplements 4–6 shows that M136I is modestly stabilizing. (A) In the activity assay, M136I alone has no effect, but it can partially rescue the activity of all three individually deleterious mutations. (B) Western blots showing the levels of NP protein relative to the mCherry control. M136I is present at wild-type levels, whereas levels of V280A are reduced. Adding M136I to V280A largely rescues the NP levels. Three triplicate Western blots from independent transfections are shown. The numbers below the bands represent the ratio of the NP band intensity to the mCherry band intensity. (C) Quantification of the triplicate Western blots.
Figure 6—figure supplement 8. Activities for NPs with combinations of the stabilizing and destabilizing mutations.

Figure 6—figure supplement 8.

Various combinations of the three epistatically constrained destabilizing mutations (L259S, V280A, R384G) and the stabilizing mutations (N334H, M136I) were introduced into the Aichi/1968 NP and the total transcriptional activity was quantified. The final NP variant at the end of the trajectory contained V280A, R384G, N334H, and M136I—but not L259S, as this mutation reverts before the occurrence of R384G. An NP with just those four mutations exhibits wild-type levels of activity.

To see if these changes in in vivo protein levels correlated with global protein stability, we purified the NP variants with an additional mutation in the tail loop (Ye et al., 2006) that enabled us to obtain monomeric RNA-free protein that exhibited the expected alpha-helical circular-dichroism spectrum (Figure 6—figure supplement 2). All NP variants exhibited similar circular-dichroism spectra (Figure 6—figure supplement 3) and unfolded with a single cooperative transition (Figure 6—figure supplements 4–6), allowing us to determine melting temperatures (Tm) for irreversible thermal denaturation. The three individually deleterious mutations were all destabilizing, with changes in melting temperatures (ΔTm) relative to the parent Aichi/1968 NP that ranged from −3.6°C to −4.9°C. N334H was stabilizing (ΔTm of 4.4°C), and adding N334H to each of the individual destabilized mutants restored their stability to roughly wild-type values (Figure 6E). M136I is also modestly stabilizing, and partially rescues all three individually deleterious mutations (Figure 6—figure supplements 4–7). The final Brisbane/2007 NP contains two of the three identified destabilizing mutations (L259S reverts) and both of the identified stabilizing mutations—combining all four mutations in the parental Aichi/1968 background gives wild-type levels of activity (Figure 6—figure supplement 8).

These results suggest that most of the epistasis that we identified during NP’s evolution is due to counterbalancing stabilizing and destabilizing mutations. To obtain a more complete portrait, we measured the stabilities of all of the resolved evolutionary intermediates (Figure 6—figure supplements 4–6). Figure 7A shows the correlation between activity and stability for all NP variants for which both properties were measured. For variants with melting temperatures exceeding 43°C, activity is independent of stability—changes in stability above this threshold are neutral with respect to activity. But once stability begins to fall below 43°C, there is a rapid decline in activity. A similar pattern is observed in the correlation between stability and viral growth, with growth declining precipitously once stability drops below 43°C (Figure 7B). The exception to this relationship is that variants containing R384G without E375G exhibit reduced growth even when they possess adequate stability and activity (Figures 4B, 7A,B). E375G is modestly destabilizing (ΔTm = −1.0°C), and so epistatically interacts with R384G by a mechanism other than protein stability. E375G and R384G induce opposite charge changes and occur on the same surface of NP (Figure 5 and Figure 7—supplement figure 1)—we hypothesize that maintenance of the electrostatic charge on this surface might be important for NP’s interaction with some partner late in the viral life cycle after RNA transcription is complete.

Figure 7. Most of the epistasis that we identified in NP’s evolution can be explained by counterbalancing stabilizing and destabilizing mutations.

(A) The relationship between NP stability and transcriptional activity for all variants for which both properties were measured. As long as the stability is greater than a threshold around 42°C, changes in stability are neutral with respect to activity. Below this threshold, activity declines sharply with decreasing stability. (B) The relationship between viral growth and NP stability exhibits a similar behavior. The exception is that growth of variants with R384G is fully rescued only by combining a stabilizing mutation with E375G (Figure 4B), an effect that we hypothesize is related to the electrostatic charge on one of NP’s surfaces (Figure 7—figure supplement 1). (C) The dynamics of protein stability during NP evolution. Shown are the measured stabilities for evolutionary intermediates from the trajectory in Figure 2A. The lines along the y-axis at the far left show the stabilities of the five indicated individual point-mutants of the Aichi/1968 NP. Although the destabilizing mutations L259S, R384G, and V280A are deleterious to the Aichi/1968 parent, during evolution they are counterbalanced by stabilizing mutations. In the top panels, selected points are labeled with the NP variant name; the full data plotted in this figure are in Figure 7—source data 1.

DOI: http://dx.doi.org/10.7554/eLife.00631.028

Figure 7—source data 1. The activity, viral growth, and stability data shown in Figure 7.
The data are provided in CSV format.
elife00631s006.csv (1.9KB, csv)
DOI: 10.7554/eLife.00631.029

Figure 7.

Figure 7—figure supplement 1. We hypothesize that E375G helps counteract R348G by maintaining the electrostatic charge on one of NP’s surfaces.

Figure 7—figure supplement 1.

As shown in Figure 4B, the activity of the destabilizing mutation R384G is fully rescued by a stabilizing mutation, such as N334H in Aichi/1968 or reversion of L259S in Step 21. However, full rescue of viral growth also requires E375G. E375G is destabilizing, and alone does not rescue growth or activity of R384G. We hypothesize that rescue of growth of R384G requires two events. The first is counteraction of NP destabilization. The second is some effect specific to E375G that is apparent in growth but not transcriptional activity. E375G (which causes loss of a negative charge) counterbalances the loss of a positive charge due to R384G. The image shows an electrostatic surface (PyMol, PDB 2IQH). R384 and E375 are on the same surface, contributing positive and negative charges. Mutating both to neutral glycine maintains the net charge. Perhaps the charge of this surface is important for interaction with other protein partners late in the life cycle (after RNA transcription), explaining why E375G is important for growth but not activity.

This caveat about R384G and E375G notwithstanding, it is striking that we can explain all of the other observed mutational effects simply in terms of protein stability. Figure 7C shows the trajectory of stability during NP’s evolution. The parent Aichi/1968 is only marginally more stable than the minimal threshold where activity and viral growth begin to suffer. For this reason, the three destabilizing mutations L259S, R384G, and V280A are highly deleterious to Aichi/1968. During NP’s evolution, stability fluctuates as the protein fixes stabilizing and destabilizing mutations. Each of the three destabilizing mutations that we identified as being under epistatic constraint is closely associated with a stabilizing mutation. The stabilizing M136I preceded the destabilizing V280A, and provided a stability cushion to eliminate V280A’s otherwise deleterious effect (Figures 4C, 7C). The stabilizing S259L preceded the destabilizing R384G, and was necessary (in conjunction with E375G) to alleviate R384G’s otherwise deleterious effect (Figures 4B, 7C). The stabilizing N334H occurred in close temporal proximity to the destabilizing L259S and fully counteracts L259S’s otherwise deleterious effect (Figures 4B, 7C)—although in this case there is insufficient natural sequence data to determine which of these mutations occurred first (it is also possible that they occurred simultaneously).

The epistatically constrained mutations contribute to viral immune escape

The aforementioned results illuminate the evolutionary steps that gave rise to the fixation of the individually deleterious destabilizing mutations, but they do not provide any indication of what forces may have driven this fixation. The destabilizing mutations could have been fixed stochastically by genetic drift or hitchhiking, or they could have been directly favored by selection for viral immune escape. As discussed in the Introduction, NP is a target of CTLs, and mutations in CTL epitopes benefit influenza by helping it evade immune memory that accumulates in the human population (Berkhoff et al., 2007; Valkenburg et al., 2011).

We began by searching the literature for experimentally validated human CTL epitopes in NP. All three destabilizing mutations occur in characterized epitopes (DiBrino et al., 1995; Voeten et al., 2000; Rimmelzwaan et al., 2004b; Berkhoff et al., 2007; Assarsson et al., 2008; Alexander et al., 2010; Cheung et al., 2012), and mutations at two of these sites have been shown to reduce CTL recognition (Voeten et al., 2000; Berkhoff et al., 2004; Rimmelzwaan et al., 2004b; Berkhoff et al., 2007; Figure 8—source data 1).

To test if the epistatically constrained mutations are in more epitopes than expected by chance, we considered two approaches to comprehensively identify epitopes in NP: mining of a database of literature-characterized epitopes (Vita et al., 2010), and computational prediction of epitopes from protein sequence (Stranzl et al., 2010). The first approach has the advantage of only identifying experimentally validated epitopes, but the disadvantage that this set of epitopes is subject to unknown biases due to experimental choices about HLA types and viral strains. Computational prediction has the advantage of being unbiased with respect to HLA types and viral strains, but the disadvantage that the predictions may not be accurate.

As it turns out, both approaches give the same result—the three epistatically constrained mutations are significantly enriched in CTL epitopes relative to all sites in NP and to the set of sites that experienced substitutions along the evolutionary trajectory (Figure 8 and Figure 8—figure supplement 2). These three destabilizing mutations are thus disproportionately important for viral immune escape, and may have been favored by selection for this property (a dN/dS test [Murrell et al., 2013] is inconclusive, probably due to lack of sequence data; Figure 8—figure supplement 3 and Figure 8—source code 2). Stability-mediated epistasis therefore constrains the adaptive process of CTL escape as well as the sequence evolution of NP. The destabilizing CTL-escape mutations L259S, R384G, and V280A were inaccessible to NP during much of its evolutionary trajectory, but were fixed after stabilizing mutations made the protein permissive to their occurrence.

Figure 8. The three epistatically constrained destabilizing mutations occur at sites significantly enriched in human CTL epitopes.

Distributions of the numbers of experimentally characterized epitopes per residue for all sites or sites that experienced mutations along the evolutionary trajectory are in blue and red, respectively. Sites 259, 280, and 384 are in significantly more epitopes than three random positions from all sites (p=0.001) or the mutated sites (p=0.004); however, three random positions from the mutated sites are not in significantly more epitopes than three random positions from all sites (p=0.157). Epitopes with experimentally characterized CTL responses were mined from the Immune Epitope Database (Figure 8—source code 1 and Figure 8—figure supplement 1). The primary citation and summary information for epitopes involving sites 259, 280, and 384 are in Figure 8—source data 1. Similar results are obtained if CTL epitopes are instead predicted computationally (Figure 8—figure supplements 1, 2). A dN/dS analysis is inconclusive about whether the three sites are under positive or negative selection, probably due to lack of sequence data (Figure 8—figure supplement 3 and Figure 8—source code 2).

DOI: http://dx.doi.org/10.7554/eLife.00631.031

Figure 8—source data 1. Literature-characterized NP human CTL epitopes that include residues 259, 280, or 384 and contain sequences conserved or nearly conserved in Aichi/1968.
The epitopes are listed in a TXT file.
elife00631s007.txt (1.1KB, txt)
DOI: 10.7554/eLife.00631.032
Figure 8—source code 1. The input data files and the custom Python scripts used to identify human CTL epitopes in NP.
The code and data are provided as a ZIP file, which contains a README text file that describes the contents in more detail.
elife00631s008.zip (673.9KB, zip)
DOI: 10.7554/eLife.00631.033
Figure 8—source code 2. The data and source code used for the dN/dS analysis.
The code and data are provided in a ZIP file; a README file explains the contents.
elife00631s009.zip (484.8KB, zip)
DOI: 10.7554/eLife.00631.034

Figure 8.

Figure 8—figure supplement 1. Distribution of human CTL epitopes along the NP primary sequence.

Figure 8—figure supplement 1.

This plot shows the number of CTL epitopes for each residue in NP. Sites of specific mutations along the evolutionary trajectory are indicated. The top blue bars show the number of experimentally characterized CTL epitopes as mined from the Immune Epitope Database. The bottom red bars show the number of CTL epitopes predicted by NetCTLpan1.1, a computational epitope prediction method, applied to all HLA supertypes. In both cases, the epitope density is scaled to have a minimum of 0 and a maximum of 1.
Figure 8—figure supplement 2. The three epistatically constrained mutations are at sites significantly enriched in CTL epitopes as predicted by a computational epitope prediction program NetCTLpan1.1.

Figure 8—figure supplement 2.

The blue curve shows the distribution of epitopes per site for all sites in NP, while the red curve shows the distribution of epitopes per site for the sites in NP that substituted along the evolutionary trajectory. The sites of the three epistatically constrained mutations (280, 259, and 384) are indicated. These three sites contain significantly more epitopes than would be expected from three randomly chosen positions from all sites (p=0.008) or from the mutated sites (p=0.028). A random selection of three positions from all mutated sites contains significantly more epitopes than a random selection of three positions from all sites (p=0.011).
Figure 8—figure supplement 3. It is largely inconclusive whether the sites of the three epistatically constrained mutations are under positive or negative selection as quantified by dN/dS values.

Figure 8—figure supplement 3.

Human H3N2 influenza NP sequences from 1968 to 2011 were analyzed for positive selection using the dN/dS analysis implemented in FUBAR (Figure 8—source code 2). The plots show the posterior probability that sites are under (A) negative or (B) positive selection. At reasonable levels of significance, we can conclude that site 384 is not under negative selection and is probably under positive selection. For sites 259 and 280, there is not strong evidence for either positive or negative selection. We note that the lack of decisive results may be due largely to insufficient sequence data—although we used hundreds of NP sequences, they are closely related with a trunk-like phylogeny as shown in Figure 4B, which will reduce the power of the test. In addition, we note that mutations which are beneficial to viral CTL escape may still fix slowly (reducing their sites’ dN/dS values) even if they are under positive selection due to the types of epistatic constraint described in this paper.

Discussion

Our results paint a remarkably coherent picture of epistasis in NP evolution. We identified three mutations that are strongly deleterious to the original parent, yet were eventually fixed without adverse effect. All three mutations decrease NP’s thermal stability. This decreased stability reduces in vivo protein levels, in turn reducing total transcriptional activity and viral growth. On the other hand, stabilizing mutations have little effect on protein levels, activity, or growth in the background of the parent NP—presumably because this parent is already sufficiently stable for its cellular environment. However, these stabilizing mutations play a crucial evolutionary role by counteracting the destabilizing mutations and enabling them to fix during evolution.

Of course, we do not wish to caricature protein evolution by suggesting that all epistasis is mediated by stability. In principle, mutations can affect a multitude of properties of NP, including its homo-oligomerization, association with RNA and other proteins, and cellular transport. We do not suggest that these properties are unimportant. In fact, we observe an epistatic interaction between R384G and E375G that likely relates to the electrostatic charge on one of NP’s surfaces. Our assays are also of finite sensitivity, and so may miss small effects that are still significant to natural selection. There is also the potential for epistasis between NP and other viral proteins, although we see no evidence for such epistasis here, since all NP evolutionary intermediates that we tested are functional in a fixed background of other proteins. But doubtless some of these other mechanisms of epistasis would become apparent if we examined even longer evolutionary trajectories. However, the overriding message from our experiments is that stability-mediated epistasis is the dominant constraint on NP evolution.

Epistatically interacting mutations can be fixed in several ways. The mutations can accumulate sequentially without ever passing through a low-fitness intermediate (as in Maynard Smith’s analogy), an initial deleterious mutation can be compensated by a subsequent mutation, or multiple mutations can occur simultaneously. We have identified two instances that clearly conform to Maynard Smith’s paradigm: the stabilizing M136I preceded V280A, and the stabilizing S259L preceded R384G (Figure 4B,C). We also identified two instances where the actual evolutionary path is unclear due to a lack of natural sequence data from the relevant timeframe: N334H/L259S, and E375G/R384G (Figure 4A,B). However, in both cases it is at least possible that evolution conformed to Maynard Smith’s paradigm: no simultaneous mutations or deleterious intermediates need have occurred if N334H preceded L259S, and if E375G preceded R384G (Figure 4A,B).

Previous experimental studies have identified stabilizing mutations as contributing to the evolution of enzyme specificities (Bloom et al., 2006), bacterial (Wang et al., 2002; Bershtein et al., 2006; Weinreich et al., 2006) and viral (Chang and Torbett, 2011) drug resistance, and H5N1 transmissibility (Imai et al., 2012). At a broader level, analyses of large datasets have shown that it is common for mutations to be deleterious to one protein homolog but benign to another (Kondrashov et al., 2002; Baresic et al., 2010). Our work illustrates how the dynamics of stability during evolution might explain these findings. As shown in Figure 7C, most of the intermediates during NP’s evolution are only marginally more stable than the minimal threshold where function begins to suffer. This marginal stability of natural proteins has been noted previously, and been given two distinct explanations. The first explanation holds that evolution actively selects for marginal stability because both insufficient and excess stability are deleterious (DePristo et al., 2005; Tokuriki and Tawfik, 2009). The second explanation holds that evolution only selects against insufficient stability, but that proteins typically are marginally stable because most mutations are destabilizing and so extra stability is rapidly eroded by functionally neutral but destabilizing mutations (Taverna and Goldstein, 2002; Bloom et al., 2007). Our results decisively favor the second explanation for NP, since the evolving protein is usually marginally stable despite the fact that higher stability has no deleterious effect (Figure 7A,B). We therefore suggest the following: functionally neutral but stabilizing mutations occasionally fix by stochastic forces such as genetic drift, population bottlenecks, or hitchhiking. These stabilizing mutations enable NP to tolerate otherwise deleterious destabilizing mutations. Although these destabilizing mutations could in principle also fix by stochastic forces, the three that we have identified are actually adaptive since they contribute to viral immune escape. Stability-mediated epistasis therefore constrains NP’s adaptation as well as its sequence evolution, since the accessibility of immune-escape mutations is dependent on the acquisition of enabling mutations.

It is intriguing to speculate whether similar forms of epistasis might constrain the evolution of other proteins. For example, the antigenic evolution of influenza hemagglutinin is punctuated, with a fairly constant rate of sequence change nonetheless leading to periodic jumps in antigenicity that require reformulation of the annual influenza vaccine (Smith et al., 2004). One explanation that has been posited for this punctuated pattern is that adaptive antigenic change is limited not by the overall rate of substitution, but rather by the waiting time for the protein to accumulate antigenically neutral mutations that can be productively combined with mutations causing large antigenic changes (Koelle et al., 2006; van Nimwegen, 2006). Stability-mediated epistasis of the type that we have observed for NP provides at least one plausible mechanistic explanation for this and other cases of constrained molecular evolution.

Materials and methods

Evolutionary trajectory

Via Markov chain Monte Carlo implemented in BEAST (Drummond et al., 2012), we estimated the joint posterior distribution of phylogenetic trees and mutations along the branches of these trees given 431 date-stamped human H3N2 NP protein sequences from the Influenza Virus Resource. We assumed a Jones—Taylor—Thornton model (Jones et al., 1992) of protein substitution, a strict molecular clock and a relatively uninformative coalescent-based prior on the tree. We inferred the unobserved mutations via a data augmentation procedure that exploits uniformization and is robust to model misspecification (Minin and Suchard, 2008; O’Brien et al., 2009). Figure 2B reports the maximum clade credible tree from the posterior distribution.

Novel to this work, for each posterior sample, we converted the order of mutations along the line of descent from Aichi/1968 and Brisbane/2007 into a directed graph through sequence space (Figure 2—figure supplement 1). Summarizing these graph samples effectively integrates over uncertainty in the tree and substitution process, returning the marginal posterior distribution of the evolutionary trajectory of interest. In our GraphViz visualization, each circle represents a unique inferred sequence. Areas and intensities of circles are proportional to the posterior probability that the true trajectory visited that sequence. Lines correspond to mutations, with thickness and intensity proportional to the posterior probability that specific mutation connected those two sequences. We labeled connections with posterior probability ≥60% in black in Figure 2; mutations lacking high-confidence connections are in red. Likewise, we considered sequences with posterior probability ≥60% as high confidence and assigned them numeric labels. Figure 2—source code 1 contains the relevant computer code.

Transcriptional activity

We reverse-transcribed the Aichi/1968 NP and the Nanchang/1995 PB2, PB1, and PA from viral RNA (BEI Resources NR-9534 and NR-3222), and cloned them into pHW2000 (Hoffmann et al., 2000) (a gift from Y Kawaoka) to create pHWAichi68-NP, pHWNan95-PB2, pHWNan95-PB1, and pHWNan95-PA (Supplementary file 1). Similar plasmids were constructed for the PB2, PB1, and PA of Aichi/1968 and Brisbane/2007 and named pHWAichi68-PB2, pHWAichi68-PB1, pHWAichi68-PA, pHWBR07-PB2, pHWBR07-PB1, and pHWBR07-PA (Supplementary file 1). We used site-directed mutagenesis to create the other NP variants (Supplementary file 2). Note that the final sequence at the end of our trajectory (Step 39) matches the Brisbane/2007 protein sequence, but does not match the nucleotide sequence of this strain as we did not introduce any of the synonymous mutations.

We measured activity using a previously described (Bloom et al., 2010) reporter plasmid encoding a GFP vRNA with termini from the A/WSN/1933 PB1. We co-transfected this reporter into 12-well dishes of 293T cells along with 50 ng of NP plasmid and 200 ng each of pHWNan95-PB2, pHWNan95-PB1, and pHWNan95-PA (Figure 3—figure supplement 1). This amount of NP plasmid is near the midpoint of the dose-response curve (Figure 3—figure supplement 1). After 20 hr, we quantified the GFP mean-fluorescence intensity (MFI) by flow cytometry. We seeded 293T cells at 2 × 105 per well 20–24 hr pre-transfection in D10 (DMEM with 10% heat-inactivated fetal bovine serum, 2 mM L-glutamine, 100 U/ml penicillin, and 100 μg/ml streptomycin). We quantified the activity relative to the average for three replicates of wild-type pHWAichi68-NP. We performed at least three biological replicates for each variant, with each replicate performed on a different day using an independent plasmid mini-prep. Figure 3—source data 1 gives the means and standard errors of the activities for all NP variants.

Viral growth

We grew viruses carrying GFP in the PB1 gene using a modification of a previously described system (Bloom et al., 2010; Figure 3—figure supplement 2). We used lentiviral transduction to create the cell lines 293T-CMV-Nan95-PB1 and MDCK-SIAT1-CMV-Nan95-PB1, which express the coding sequence of the Nanchang/1995 PB1 with the F2 peptide disrupted after its eighth codon (Chen et al., 2001) under control of a CMV promoter. We seeded co-cultures of 2 × 105 293T-CMV-Nan95-PB1 and 2 × 104 MDCK-SIAT1-CMV-Nan95-PB1 cells in D10 media in six-well dishes, and 20–24 hr later transfected with 250 ng each of pHWNan95-PB2, pHH-PB1flank-eGFP (Bloom et al., 2010), pHWNan95-PA, a pHWAichi68-NP variant, pHW184-HA, pHW186-NA, pHW187-M, and pHW188-NS. These last four plasmids (Hoffmann et al., 2000) encode genes from A/WSN/1933 (gifts from Y Kawaoka). After 20–24 hr, we replaced the D10 with influenza growth media (Opti-MEM I with 0.3% BSA, 0.01% heat-inactivated fetal bovine serum, 100 U/ml penicillin, 100 μg/ml streptomycin, and 100 μg/ml calcium chloride). After 66 hr (shortly before peak titers, Figure 3—figure supplement 2), we collected the supernatant and clarified it for 5 min at 2000×g. We infected dilutions of supernatant into 12-well dishes seeded 8 hr earlier at 105 MDCK-SIAT1-CMV-Nan95-PB1/well in influenza growth media, and 16 hr later determined the titer by flow cytometry by using the Poisson equation to estimate the viral titer based on the fraction of GFP positive cells. We performed these titering infections with various volumes of viral supernatant such that the titer could be computed from an infection with between 0.5% and 10% of cells green. Note that these titers reflect the number of particles that are able to productively infect cells and transcribe high levels of GFP from viral RNA—they may not reflect the same titers as would be determined using other approaches such as plaque assays or tissue-culture infectious dose 50% assays. We quantified the titer relative to the average of three replicates of the wild-type pHWAichi68-NP (typically around 103 infectious particles per microliter). We performed at least three biological replicates for each variant, with each replicate performed on a different day using an independent plasmid mini-prep. Figure 3—source data 2 gives the means and standard errors.

NP protein levels

We cloned the NP coding sequence into a mammalian expression plasmid under control of a CMV promoter with a FLAG tag inserted between the N-terminal methionine and the second residue. After the NP stop codon, we added an internal ribosome entry site (IRES) followed by mCherry with a C-terminal FLAG tag. We seeded 293T cells at 2 × 105 per well in D10 in 12-well dishes, and 20–24 hr later transfected with 400 ng of plasmid. After 20 hr, we collected the cells and lysed them on ice in 100 μl of RIPA buffer with one protease-inhibitor tablet (Roche, Basel, Switzerland, 05892791001) per 10 ml. We pelleted debris at 21,000×g for 10 min, and loaded 2.5 μl of clarified supernatant on an SDS-PAGE gel after boiling with a reducing sample-loading buffer. We transferred the protein to a PVDF membrane and stained with a 1:5000 dilution of mouse anti-FLAG (Sigma, St. Louis, MO, F1804) followed by a 1:2500 dilution of Alexa Flour 680-conjugated goat anti-mouse (Invitrogen, Grand Island, NY, A-21058), using Li-Cor Odyssey (Lincoln, NE) blocking buffer (Li-Cor 927-40,000) and performing washes with TBS-T (Pierce, Rockford, IL, 28360). We quantified the ratio of NP to the corresponding mCherry control using a Li-Cor Odyssey Infrared Imaging System, and normalized this ratio to that for wild-type Aichi/1968 NP (Figure 6—figure supplements 1, 7).

Protein stability

In order to obtain non-aggregated RNA-free NP in a CD-compatible buffer, we introduced two previously described (Ye et al., 2006) modifications: deletion of residues 2–7 and R416A. We cloned NP with these modifications and a C-terminal 6-histidine tag into pET28b(+), transformed into BL21 Star DE3 (Invitrogen, Grand Island, NY, C6010-03), and grew 1 L of these bacteria to an OD600 of 0.3–0.6 at 37°C. We then chilled the cultures on ice, reduced the shaker temperature to 20°C and induced with 500 μM IPTG. After overnight growth, we pelleted the cells and lysed them on ice by sonication in 50 ml of 50 mM sodium phosphate pH 8.0, 500 mM sodium chloride, 0.5% Triton X-100, 10 mM imidazole, 1 mM PMSF, 0.1 mg/ml magnesium chloride, 1 mM lysozyme, and 1000 units of benzonase (Sigma, St. Louis, MO, E1014). We clarified the supernatant for 30 min at 10,000×g and 4°C, passed it through a 0.45-μm filter, and purified NP over a cobalt column (Pierce, Rockford, IL, 89969) using the manufacturer’s protocol but eluting with 200 mM imidazole. We concentrated the protein with an Amicon Ultra 30 kDa filter, and dialyzed it against CD buffer (20 mM sodium phosphate pH 7.0 with 300 mM sodium fluoride) in a 20-kDa dialysis device. We further purified the protein over a Superdex 200 GL size-exclusion column. All variants eluted in a single monomeric peak, and all had ratios of absorbance at 260 nm to absorbance at 280 nm of less than 0.65 (Figure 6—figure supplement 2).

We diluted the proteins to 5 μM in CD buffer as determined by the absorbance at 280 nm in a 1 cm quartz cuvette using an extinction coefficient of 0.0566 μM/cm, and acquired CD spectra at 20°C with a Jasco J-815 spectropolarimeter. All variants exhibited similar spectra with typical alpha-helical characteristics (Figure 6—figure supplement 2, 3). We performed thermal melts at a scan rate of 2°C per minute, monitoring ellipticity at 209 nm. All variants unfolded with a single cooperative transition, allowing us to obtain melting temperatures from sigmoidal curve fits (Figure 6—figure supplements 4–6 and Figure 6—source data 1). The melting was irreversible (Figure 6—figure supplement 2), preventing us from calculating equilibrium thermodynamic stabilities.

CTL epitopes

We identified human CTL epitopes of ≤12 residues with at least 89% conservation in Aichi/1968 NP and a verified T-cell response from the Immune Epitope Database (Vita et al., 2010). Figure 8—source data 1 lists primary citations for epitopes involving residues 259, 280, and 384. Figure 8—figure supplement 1 shows the number of epitopes at each position. We computed p-values by randomly drawing three different residues from the set of all sites or all mutated sites, and comparing the number of epitopes for these sites to the number for sites 259, 280, and 384 (Figure 8). p-values represent the fraction of 105 random draws that contained at least as many epitopes as sites 259, 280, and 384. We performed a similar analysis for epitopes predicted by NetCTLpan 1.1 (Stranzl et al., 2010) using the default settings for 9-mer peptides and the HLA supertypes (Figure 8—figure supplement 2). The data and computer code are in Figure 8—source code 1.

The dN/dS comparisons shown in Figure 8—figure supplement 3 were performed with FUBAR (Murrell et al., 2013) using the DataMonkey server. The sequence data, results, and analysis are in Figure 8—source code 2.

Acknowledgements

We thank J Bolduc, B Stoddard, M Daugherty, S Schetterer, and S Ovchinnikov for assistance and advice with protein purification; K Blair and L Warfield for assistance with Western blotting; C Correnti and R Strong for assistance and advice with circular dichroism; T Hertz and A Gartland for advice about identifying CTL epitopes; Y Kawaoka for reverse-genetics plasmids; and the BEI Resources program for viral RNA used to clone genes.

Funding Statement

The funders had no role in study design, data collection and interpretation, or the decision to submit the work for publication.

Funding Information

This paper was supported by the following grants:

  • National Institutes of Health 1 R01 GM102198-01 to Lizhi Ian Gong, Jesse D Bloom.

  • National Institutes of Health 1 R01 GM086887-05 to Marc A Suchard.

Additional information

Competing interests

The authors declare that no competing interests exist.

Author contributions

LIG, Performed the experiments, analyzed the data, and wrote the manuscript.

MAS, Developed the probabilistic techniques and performed the computational work, analyzed the data, and wrote the manuscript.

JDB, Designed the study, performed the computational work, analyzed the data, wrote the manuscript.

Additional files

Supplementary file 1. The full vRNAs in the reverse-genetics plasmids used in this study.

A text file giving the vRNAs inserted between the RNA polymerase I promoter and terminator in the reverse-genetics plasmids pHWAichi68-NP, pHWNan95-PB2, pHWNan95-PB1, pHWNan95-PA, pHWAichi68-PB2, pHWAichi68-PB1, pHWAichi68-PA, pHWBR07-PB2, pHWBR07-PB1, pHWBR07-PA, pHW184-HA, pHW186-NA, pHW187-M, pHW188-NS, and pHH-PB1flank-eGFP.

DOI: http://dx.doi.org/10.7554/eLife.00631.038

elife00631s010.txt (29KB, txt)
DOI: 10.7554/eLife.00631.038
Supplementary file 2. The protein-coding sequences of all NP variants used in this study.

A text file giving the coding sequences for the NP variants used in this study.

DOI: http://dx.doi.org/10.7554/eLife.00631.039

elife00631s011.txt (114.4KB, txt)
DOI: 10.7554/eLife.00631.039

References

  1. Alexander J, Bilsel P, del Guercio MF, Marinkovic-Petrovic A, Southwood S, Stewart S, et al. 2010. Identification of broad binding class I HLA supertype epitopes to provide universal coverage of influenza A virus. Hum Immunol 71:468–74 doi: 10.1016/j.humimm.2010.02.014 [DOI] [PMC free article] [PubMed] [Google Scholar]
  2. Assarsson E, Bui HH, Sidney J, Zhang Q, Glenn J, Oseroff C, et al. 2008. Immunomic analysis of the repertoire of T-cell specificities for influenza A virus in humans. J Virol 82:12241–51 doi: 10.1128/JVI.01563-08 [DOI] [PMC free article] [PubMed] [Google Scholar]
  3. Baresic A, Hopcroft LE, Rogers HH, Hurst JM, Martin AC. 2010. Compensated pathogenic deviations: analysis of structural effects. J Mol Biol 396:19–30 doi: 10.1016/j.jmb.2009.11.002 [DOI] [PubMed] [Google Scholar]
  4. Berkhoff EG, Boon AC, Nieuwkoop NJ, Fouchier RA, Sintnicolaas K, Osterhaus AD, et al. 2004. A mutation in the HLA-B*2705-restricted NP383-391 epitope affects the human influenza A virus-specific cytotoxic T-lymphocyte response in vitro. J Virol 78:5216–22 doi: 10.1128/JVI.78.10.5216-5222.2004 [DOI] [PMC free article] [PubMed] [Google Scholar]
  5. Berkhoff EG, de Wit E, Geelhoed-Mieras MM, Boon AC, Symons J, Fouchier RA, et al. 2005. Functional constraints of influenza A virus epitopes limit escape from cytotoxic T lymphocytes. J Virol 79:11239–46 doi: 10.1128/JVI.79.17.11239-11246.2005 [DOI] [PMC free article] [PubMed] [Google Scholar]
  6. Berkhoff EG, de Wit E, Geelhoed-Mieras MM, Boon AC, Symons J, Fouchier RA, et al. 2006. Fitness costs limit escape from cytotoxic T lymphocytes by influenza A viruses. Vaccine 24:6594–6 doi: 10.1016/j.vaccine.2006.05.051 [DOI] [PubMed] [Google Scholar]
  7. Berkhoff EG, Geelhoed-Mieras MM, Fouchier RA, Osterhaus AD, Rimmelzwaan GF. 2007. Assessment of the extent of variation in influenza A virus cytotoxic T-lymphocyte epitopes by using virus-specific CD8+ T-cell clones. J Gen Virol 88:530–5 doi: 10.1099/vir.0.82120-0 [DOI] [PubMed] [Google Scholar]
  8. Bershtein S, Segal M, Bekerman R, Tokuriki N, Tawfik DS. 2006. Robustness-epistasis link shapes the fitness landscape of a randomly drifting protein. Nature 444:929–32 doi: 10.1038/nature05385 [DOI] [PubMed] [Google Scholar]
  9. Bhatt S, Holmes EC, Pybus OG. 2011. The genomic rate of molecular adaptation of the human influenza A virus. Mol Biol Evol 28:2443–51 doi: 10.1093/molbev/msr044 [DOI] [PMC free article] [PubMed] [Google Scholar]
  10. Bloom JD, Gong LI, Baltimore D. 2010. Permissive secondary mutations enable the evolution of influenza oseltamivir resistance. Science 328:1272–5 doi: 10.1126/science.1187816 [DOI] [PMC free article] [PubMed] [Google Scholar]
  11. Bloom JD, Labthavikul ST, Otey CR, Arnold FH. 2006. Protein stability promotes evolvability. Proc Natl Acad Sci USA 103:5869–74 doi: 10.1073/pnas.0510098103 [DOI] [PMC free article] [PubMed] [Google Scholar]
  12. Bloom JD, Raval A, Wilke CO. 2007. Thermodynamics of neutral protein evolution. Genetics 175:255–66 doi: 10.1534/genetics.106.061754 [DOI] [PMC free article] [PubMed] [Google Scholar]
  13. Blount ZD, Borland CZ, Lenski RE. 2008. Historical contingency and the evolution of a key innovation in an experimental population of Escherichia coli. Proc Natl Acad Sci USA 105:7899–906 doi: 10.1073/pnas.0803151105 [DOI] [PMC free article] [PubMed] [Google Scholar]
  14. Bridgham JT, Ortlund EA, Thornton JW. 2009. An epistatic ratchet constrains the direction of glucocorticoid receptor evolution. Nature 461:515–9 doi: 10.1038/nature08249 [DOI] [PMC free article] [PubMed] [Google Scholar]
  15. Chang MW, Torbett BE. 2011. Accessory mutations maintain stability in drug-resistant HIV-1 protease. J Mol Biol 410:756–60 doi: 10.1016/j.jmb.2011.03.038 [DOI] [PMC free article] [PubMed] [Google Scholar]
  16. Chen W, Calvo PA, Malide D, Gibbs J, Schubert U, Bacik I, et al. 2001. A novel influenza A virus mitochondrial protein that induces cell death. Nat Med 7:1306–12 doi: 10.1038/nm1201-1306 [DOI] [PubMed] [Google Scholar]
  17. Cheung YK, Cheng SC, Ke Y, Xie Y. 2012. Human immunogenic T cell epitopes in nucleoprotein of human influenza A (H5N1) virus. Hong Kong Med J 18(suppl 2:17–21 [PubMed] [Google Scholar]
  18. DePristo MA, Weinreich DM, Hartl DL. 2005. Missense meanderings in sequence space: a biophysical view of protein evolution. Nat Rev Genet 6:678–87 doi: 10.1038/nrg1672 [DOI] [PubMed] [Google Scholar]
  19. DiBrino M, Parker KC, Margulies DH, Shiloach J, Turner RV, Biddison WE, et al. 1995. Identification of the peptide binding motif for HLA-B44, one of the most common HLA-B alleles in the Caucasian population. Biochemistry 34:10130–8 doi: 10.1021/bi00032a005 [DOI] [PubMed] [Google Scholar]
  20. Drummond AJ, Suchard MA, Xie D, Rambaut A. 2012. Bayesian phylogenetics with BEAUti and the BEAST 1.7. Mol Biol Evol 29:1969–73 doi: 10.1093/molbev/mss075 [DOI] [PMC free article] [PubMed] [Google Scholar]
  21. Gog JR, Rimmelzwaan GF, Osterhaus AD, Grenfell BT. 2003. Population dynamics of rapid fixation in cytotoxic T lymphocyte escape mutants of influenza A. Proc Natl Acad Sci USA 100:11143–7 doi: 10.1073/pnas.1830296100 [DOI] [PMC free article] [PubMed] [Google Scholar]
  22. Hoffmann E, Neumann G, Kawaoka Y, Hobom G, Webster RG. 2000. A DNA transfection system for generation of influenza A virus from eight plasmids. Proc Natl Acad Sci USA 97:6108–13 doi: 10.1073/pnas.100133697 [DOI] [PMC free article] [PubMed] [Google Scholar]
  23. Imai M, Watanabe T, Hatta M, Das SC, Ozawa M, Shinya K, et al. 2012. Experimental adaptation of an influenza H5 HA confers respiratory droplet transmission to a reassortant H5 HA/H1N1 virus in ferrets. Nature 486:420–8 doi: 10.1038/nature10831 [DOI] [PMC free article] [PubMed] [Google Scholar]
  24. Jones DT, Taylor WR, Thornton JM. 1992. The rapid generation of mutation data matrices from protein sequences. Comput Appl Biosci 8:275–82 doi: 10.1093/bioinformatics/8.3.275 [DOI] [PubMed] [Google Scholar]
  25. Kimura M. 1985. The role of compensatory neutral mutations in molecular evolution. J Genet 64:7–19 doi: 10.1007/BF02923549 [DOI] [Google Scholar]
  26. Koelle K, Cobey S, Grenfell B, Pascual M. 2006. Epochal evolution shapes the phylodynamics of interpandemic influenza A (H3N2) in humans. Science 314:1898–903 doi: 10.1126/science.1132745 [DOI] [PubMed] [Google Scholar]
  27. Kondrashov AS, Sunyaev S, Kondrashov FA. 2002. Dobzhansky-Muller incompatibilities in protein evolution. Proc Natl Acad Sci USA 99:14878–83 doi: 10.1073/pnas.232565499 [DOI] [PMC free article] [PubMed] [Google Scholar]
  28. Kryazhimskiy S, Dushoff J, Bazykin GA, Plotkin JB. 2011. Prevalence of epistasis in the evolution of influenza a surface proteins. PLoS Genet 7:e1001301 doi: 10.1371/journal.pgen.1001301 [DOI] [PMC free article] [PubMed] [Google Scholar]
  29. Lunzer M, Golding GB, Dean AM. 2010. Pervasive cryptic epistasis in molecular evolution. PLoS Genet 6:e1001162 doi: 10.1371/journal.pgen.1001162 [DOI] [PMC free article] [PubMed] [Google Scholar]
  30. Maynard Smith J. 1970. Natural selection and the concept of a protein space. Nature 225:563–4 doi: 10.1038/225563a0 [DOI] [PubMed] [Google Scholar]
  31. Meer MV, Kondrashov AS, Artzy-Randrup Y, Kondrashov FA. 2010. Compensatory evolution in mitochondrial tRNAs navigates valleys of low fitness. Nature 464:279–82 doi: 10.1038/nature08691 [DOI] [PubMed] [Google Scholar]
  32. Minin VN, Suchard MA. 2008. Counting labeled transitions in continuous-time Markov models of evolution. J Math Biol 56:391–412 doi: 10.1007/s00285-007-0120-8 [DOI] [PubMed] [Google Scholar]
  33. Murrell B, Moola S, Mabona A, Weighill T, Sheward D, Kosakovsky Pond SL, et al. 2013. FUBAR: a fast, unconstrained bayesian appRoximation for inferring selection. Mol Biol Evol 30:1196–1205 doi: 10.1093/molbev/mst030 [DOI] [PMC free article] [PubMed] [Google Scholar]
  34. Ng AK, Zhang H, Tan K, Li Z, Liu JH, Chan PK, et al. 2008. Structure of the influenza virus A H5N1 nucleoprotein: implications for RNA binding, oligomerization, and vaccine design. FASEB J 22:3638–47 doi: 10.1096/fj.08-112110 [DOI] [PMC free article] [PubMed] [Google Scholar]
  35. O’Brien JD, Minin VN, Suchard MA. 2009. Learning to count: robust estimates for labeled distances between molecular sequences. Mol Biol Evol 26:801–14 doi: 10.1093/molbev/msp003 [DOI] [PMC free article] [PubMed] [Google Scholar]
  36. Ortlund EA, Bridgham JT, Redinbo MR, Thornton JW. 2007. Crystal structure of an ancient protein: evolution by conformational epistasis. Science 317:1544–8 doi: 10.1126/science.1142819 [DOI] [PMC free article] [PubMed] [Google Scholar]
  37. Portela A, Digard P. 2002. The influenza virus nucleoprotein: a multifunctional RNA-binding protein pivotal to virus replication. J Gen Virol 83:723–34 doi: 10.1099/vir.0.18133-0 [DOI] [PubMed] [Google Scholar]
  38. Rambaut A, Pybus OG, Nelson MI, Viboud C, Taubenberger JK, Holmes EC. 2008. The genomic and epidemiological dynamics of human influenza A virus. Nature 453:615–9 doi: 10.1038/nature06945 [DOI] [PMC free article] [PubMed] [Google Scholar]
  39. Rimmelzwaan GF, Berkhoff EG, Nieuwkoop NJ, Fouchier RA, Osterhaus AD. 2004a. Functional compensation of a detrimental amino acid substitution in a cytotoxic-T-lymphocyte epitope of influenza a viruses by comutations. J Virol 78:8946–9 doi: 10.1128/JVI.78.16.8946-8949.2004 [DOI] [PMC free article] [PubMed] [Google Scholar]
  40. Rimmelzwaan GF, Boon AC, Voeten JT, Berkhoff EG, Fouchier RA, Osterhaus AD. 2004b. Sequence variation in the influenza A virus nucleoprotein associated with escape from cytotoxic T lymphocytes. Virus Res 103:97–100 doi: 10.1016/j.virusres.2004.02.020 [DOI] [PubMed] [Google Scholar]
  41. Salverda ML, Dellus E, Gorter FA, Debets AJ, van der Oost J, Hoekstra RF, et al. 2011. Initial mutations direct alternative pathways of protein evolution. PLoS Genet 7:e1001321 doi: 10.1371/journal.pgen.1001321 [DOI] [PMC free article] [PubMed] [Google Scholar]
  42. Smith DJ, Lapedes AS, de Jong JC, Bestebroer TM, Rimmelzwaan GF, Osterhaus AD, et al. 2004. Mapping the antigenic and genetic evolution of influenza virus. Science 305:371–6 doi: 10.1126/science.1097211 [DOI] [PubMed] [Google Scholar]
  43. Stranzl T, Larsen MV, Lundegaard C, Nielsen M. 2010. NetCTLpan: pan-specific MHC class I pathway epitope predictions. Immunogenetics 62:357–68 doi: 10.1007/s00251-010-0441-4 [DOI] [PMC free article] [PubMed] [Google Scholar]
  44. Taverna DM, Goldstein RA. 2002. Why are proteins marginally stable? Proteins 46:105–9 doi: 10.1002/prot.10016 [DOI] [PubMed] [Google Scholar]
  45. Tokuriki N, Tawfik DS. 2009. Stability effects of mutations and protein evolvability. Curr Opin Struct Biol 19:596–604 doi: 10.1016/j.sbi.2009.08.003 [DOI] [PubMed] [Google Scholar]
  46. Valkenburg SA, Rutigliano JA, Ellebedy AH, Doherty PC, Thomas PG, Kedzierska K. 2011. Immunity to seasonal and pandemic influenza A viruses. Microbes Infect 13:489–501 doi: 10.1016/j.micinf.2011.01.007 [DOI] [PMC free article] [PubMed] [Google Scholar]
  47. van Nimwegen E. 2006. Epidemiology. Influenza escapes immunity along neutral networks. Science 314:1884–6 doi: 10.1126/science.1137300 [DOI] [PubMed] [Google Scholar]
  48. Vita R, Zarebski L, Greenbaum JA, Emami H, Hoof I, Salimi N, et al. 2010. The immune epitope database 2.0. Nucleic Acids Res 38:D854–62 doi: 10.1093/nar/gkp1004 [DOI] [PMC free article] [PubMed] [Google Scholar]
  49. Voeten JT, Bestebroer TM, Nieuwkoop NJ, Fouchier RA, Osterhaus AD, Rimmelzwaan GF. 2000. Antigenic drift in the influenza A virus (H3N2) nucleoprotein and escape from recognition by cytotoxic T lymphocytes. J Virol 74:6800–7 doi: 10.1128/JVI.74.15.6800-6807.2000 [DOI] [PMC free article] [PubMed] [Google Scholar]
  50. Wang X, Minasov G, Shoichet BK. 2002. Evolution of an antibiotic resistance enzyme constrained by stability and activity trade-offs. J Mol Biol 320:85–95 doi: 10.1016/S0022-2836(02)00400-X [DOI] [PubMed] [Google Scholar]
  51. Weinreich DM, Delaney NF, Depristo MA, Hartl DL. 2006. Darwinian evolution can follow only very few mutational paths to fitter proteins. Science 312:111–4 doi: 10.1126/science.1123539 [DOI] [PubMed] [Google Scholar]
  52. Weinreich DM, Watson RA, Chao L. 2005. Perspective: sign epistasis and genetic constraint on evolutionary trajectories. Evolution 59:1165–74 doi: 10.1554/04-272 [DOI] [PubMed] [Google Scholar]
  53. Ye Q, Guu TS, Mata DA, Kuo RL, Smith B, Krug RM, et al. 2012. Biochemical and structural evidence in support of a coherent model for the formation of the double-helical influenza A virus ribonucleoprotein. MBio 4:e00467–12 doi: 10.1128/mBio.00467-12 [DOI] [PMC free article] [PubMed] [Google Scholar]
  54. Ye Q, Krug RM, Tao YJ. 2006. The mechanism by which influenza A virus nucleoprotein forms oligomers and binds RNA. Nature 444:1078–82 doi: 10.1038/nature05379 [DOI] [PubMed] [Google Scholar]
  55. Zuckerkandl E, Pauling L. 1965. Evolutionary divergence and convergence in proteins. In: Bryson B, Vogel H, editors. Evolving Genes and Proteins. New York: Academic Press; p. 97–166 [Google Scholar]
eLife. 2013 May 14;2:e00631. doi: 10.7554/eLife.00631.040

Decision letter

Editor: Mercedes Pascual1

eLife posts the editorial decision letter and author response on a selection of the published articles (subject to the approval of the authors). An edited version of the letter sent to the authors after peer review is shown, indicating the substantive concerns or comments; minor concerns are not usually shown. Reviewers have the opportunity to discuss the decision before the letter is sent (see review process). Similarly, the author response typically shows only responses to the major concerns raised by the reviewers.

Thank you for sending your work entitled “Stability-mediated epistasis constrains the evolution of an influenza protein” for consideration at eLife. Your article has been favorably evaluated by a Senior editor and 3 reviewers, one of whom is a member of our Board of Reviewing Editors. The following individuals responsible for the peer review of your submission want to reveal their identity: Mercedes Pascual (Reviewing editor) and Fyodor Kondrashov (peer reviewer). The Reviewing editor and the other reviewers discussed their reviews before we reached this decision, and the Reviewing editor has prepared the follow comments to help you prepare a revised submission.

This work combines computational and experimental methods to demonstrate stability-mediated epistasis in the evolutionary trajectory of the influenza virus. It provides the first experimental exploration of fitness landscapes in actual evolutionary trajectories in sequence space.

The authors experimentally dissect the substitutions that have accrued in a naturally evolving influenza protein to argue that most of epistasis among sites is mediated by stability, and that stabilizing mutations are often pre-requisites for adaptive substitutions, which would otherwise be too destabilizing for a protein to accommodate. Although the referees felt that this was an ambitious and remarkable study in many ways, they also had a number of comments, summarized below, meant to strengthen the evidence and provide additional connections to existing literature and theory.

1) The Introduction and Discussion are written both from the perspective of protein evolution in general terms and evolution of NP in particular. For readers not already familiar with the background on the subject, it would be useful to better place the study in the context of previous work, so that its novelty can be more clearly conveyed. In particular, the authors rely on the concept of substitutions occurring one after another, as envisioned by Maynard Smith. This is well suited for exploring the concept of epistasis but does not capture all possibilities. Specifically, an alternative to sequential fixation of substitutions, compensatory substitutions (including instances when two individually deleterious substitutions are neutral when combined), being fixed at the same time, has been proposed by Kimura (1985, J. Genet 64: 7-19), with some evidence of this particular route of compensatory evolution found in tRNAs (Meer, 2010 Nature 464:279-82). In the authors’ data, two out of the three individual substitutions appear to have been fixed by Kimura’s model rather than Maynard Smith’s. Kimura’s model should be mentioned in the Introduction and also in the part that interprets the evolutionary mechanism at work in the fixation of L259S and R384G. To our knowledge, epistasis of the Kimura type has never been described for proteins, which would make this study even more exciting.

Also, the issue of structural stability as being an important factor in compensatory interactions has been discussed before (see Kondrashov AS, Sunyaev S, Kondrashov FA. Dobzhansky-Muller incompatibilities in protein evolution. Proc Natl Acad Sci U S A. 2002 Nov 12;99(23):14878-83; DePristo MA, Weinreich DM, Hartl DL. Missense meanderings in sequence space: a biophysical view of protein evolution. Nat Rev Genet. 2005 Sep;6(9):678-87; and Tóth-Petróczy A, Tawfik DS. Slow protein evolutionary rates are dictated by surface-core association. Proc Natl Acad Sci U S A. 2011 Jul 5;108(27):11151-6).

2) The study is described as dissecting, within the noise limits of the assays, the full extent of epistasis along the evolutionary trajectory of NP. However, the authors assay each of 39 individual mutational effects in the context of the ancestor strain alone, as well as the specific mutations that help to alleviate three apparently deleterious mutations. Thus, there may be much more epistasis that has been important to the specific evolutionary trajectory that NP has taken than the authors have been able to assay, because the authors reconstruct mutations in the ancestral strain alone. Although we recognize the extent of the experimental work, there seems to be no good reason to distinguish the ancestral strain and look only for epistasis relative to mutational effects on that background. Consideration of a small (5?) additional number of reconstructed mutations in different backgrounds would strengthen the evidence for the authors’ conclusions, if none of these were to prove as destabilizing as the three that are at the center of the argument. We recognize that this additional work may take a considerable time and recommend that the authors consider this extension only if it can be pursued within a relatively short time. Alternatively, we recommend that the authors acknowledge the sources of epistasis that they are not testing for given their experimental design and temper their conclusions accordingly.

3) No direct evidence is presented for positive selection of the three mutations deleterious in the ancestral strain. The authors should consider estimating dN/dS values at these specific sites, to the extent that they have enough data to do so.

4) An alternative hypothesis to explain the experimental observations is that throughout the course of the evolutionary trajectory there is a pattern of destabilizing mutations followed by stabilizing mutations, simply so that NP can maintain a roughly consistent folding energy. If so, the patterns shown in Figure 6E, of the stabilizing mutations that precede each of the three focal deleterious mutations, would not be unique to these three special epistatic mutations, but rather would occur for many pairs of subsequent mutations along the evolutionary trajectory. Additional melting experiments would therefore provide stronger evidence for the conclusion that epistasis permitting adaptive mutations is the primary reason for observing stabilizing/destabilizing pairs.

eLife. 2013 May 14;2:e00631. doi: 10.7554/eLife.00631.041

Author response


During further data analysis and experiments that we performed subsequent to our initial submission, we discovered technical problems with the assay that we used to quantify protein concentrations for our earliest stability measurements.

We have repeated the affected measurements at the proper protein concentration. In our revised manuscript, we have replaced all data from the affected measurements with our new measurements.

We stress that the changes in the measured stabilities are small and do not alter any of our conclusions, but they do slightly alter the numerical values of the stabilities. At the bottom of this letter, after the point-by-point response, we provide a detailed description of the original technical problem and the corrected measurements.

1) The Introduction and Discussion are written both from the perspective of protein evolution in general terms and evolution of NP in particular. For readers not already familiar with the background on the subject, it would be useful to better place the study in the context of previous work, so that its novelty can be more clearly conveyed. In particular, the authors rely on the concept of substitutions occurring one after another, as envisioned by Maynard Smith. This is well suited for exploring the concept of epistasis but does not capture all possibilities. Specifically, an alternative to sequential fixation of substitutions, compensatory substitutions (including instances when two individually deleterious substitutions are neutral when combined), being fixed at the same time, has been proposed by Kimura (1985, J. Genet 64: 7-19), with some evidence of this particular route of compensatory evolution found in tRNAs (Meer, 2010 Nature 464:279-82). In the authors’ data, two out of the three individual substitutions appear to have been fixed by Kimura’s model rather than Maynard Smith’s. Kimura’s model should be mentioned in the Introduction and also in the part that interprets the evolutionary mechanism at work in the fixation of L259S and R384G. To our knowledge, epistasis of the Kimura type has never been described for proteins, which would make this study even more exciting.

This comment is correct in that we over-emphasized the Maynard Smith paradigm (one mutation enabling a second without ever passing through a fitness valley). In several cases, our data are also consistent with two other paradigms: simultaneous mutations, or a deleterious mutation followed by a compensatory change. To address this issue, we have cited the Kimura and Meer papers. We have also revised relevant text, beginning with the Abstract where we replaced the statement “were preceded by stabilizing mutations” with “were preceded or accompanied by stabilizing mutations.” Finally, we have added a paragraph in the Discussion that discusses this issue.

However, we do not agree that our data preferentially support the Kimura’s paradigm over Maynard Smith’s in any of the cases. Figure 2A shows the evolutionary trajectory as it can be reconstructed from available influenza sequences. The regions in red (such as those involving L259S/N334H and R384G/E375G) do not necessarily imply that the mutations occurred simultaneously – they simply indicate that they occurred sufficiently close in time that no viral isolates were sequenced in the intervening time period, making it impossible to determine the actual order.

In the revised manuscript, we specify that for two of the four epistatically interacting mutations, the evidence definitively support Maynard Smith’s paradigm (M136I preceded V280A, and S259L preceded R384G) – but that in the other two cases, we cannot resolve the relative order. However, we note that in both ambiguous cases, our data (Figure 4A,B) show that it is possible to construct an evolutionary path consistent with Maynard Smith’s paradigm in that the mutations could have fixed sequentially without ever causing a measurable decrease in NP function (if N334H preceded L259S in the background of Step 10, and if E375G preceded R384G in the background of Step 21).

Also, the issue of structural stability as being an important factor in compensatory interactions has been discussed before (see Kondrashov AS, Sunyaev S, Kondrashov FA. Dobzhansky-Muller incompatibilities in protein evolution. Proc Natl Acad Sci U S A. 2002 Nov 12;99(23):14878-83; DePristo MA, Weinreich DM, Hartl DL. Missense meanderings in sequence space: a biophysical view of protein evolution. Nat Rev Genet. 2005 Sep;6(9):678-87; and Tóth-Petróczy A, Tawfik DS. Slow protein evolutionary rates are dictated by surface-core association. Proc Natl Acad Sci U S A. 2011 Jul 5;108(27):11151-6).

We thank the reviewers for pointing out these references. We find the comparison with the Kondrashov et al paper to be particularly interesting, since our study is really an investigation of “compensated pathogenic deviations” in Brisbane/2007 NP relative to Aichi/1968 NP. The frequency of individually deleterious mutations that we identify (3 out of 34 unique mutations) is similar to the 10% frequency of compensated pathogenic deviations reported by Kondrashov et al. For reasons of brevity and scope, we have not expanded on this connection in the current manuscript, but it would be interesting to follow up on this connection in the future. For now, we cite the Kondrashov et al paper in the Discussion to briefly touch on the issue.

The DePristo et al paper is now cited in the Discussion. However, we note that there is a clear difference between the view introduced in that paper and what we find for NP. DePristo et al argue that there is selection to keep stability within a narrow margin, with either insufficient or extra stability being deleterious. In contrast, we find no evidence that extra stability is deleterious to NP – as shown in Figure 7A, high stability has no measurable negative effect. We therefore think that our results support only half of the connection posited in the DePristo et al paper.

We have not cited the Toth-Petroczy and Tawfik paper mentioned above, but we have cited another paper by the same senior author (Bershtein et al, Science, 2006) that we believe more directly relates to our manuscript.

2) The study is described as dissecting, within the noise limits of the assays, the full extent of epistasis along the evolutionary trajectory of NP. However, the authors assay each of 39 individual mutational effects in the context of the ancestor strain alone, as well as the specific mutations that help to alleviate three apparently deleterious mutations. Thus, there may be much more epistasis that has been important to the specific evolutionary trajectory that NP has taken than the authors have been able to assay, because the authors reconstruct mutations in the ancestral strain alone. Although we recognize the extent of the experimental work, there seems to be no good reason to distinguish the ancestral strain and look only for epistasis relative to mutational effects on that background. Consideration of a small (5?) additional number of reconstructed mutations in different backgrounds would strengthen the evidence for the authors’ conclusions, if none of these were to prove as destabilizing as the three that are at the center of the argument. We recognize that this additional work may take a considerable time and recommend that the authors consider this extension only if it can be pursued within a relatively short time. Alternatively, we recommend that the authors acknowledge the sources of epistasis that they are not testing for given their experimental design and temper their conclusions accordingly.

This is an important point. Our approach will not find all epistasis – it just finds mutations that are deleterious in the Aichi/1968 NP when the other genes are held constant. There are two ways our approach could “miss” epistasis, neither of which can feasibly be experimentally addressed in a systematic way (we appreciate that the reviewers recognize this, and are simply asking us to respond as best we can). Since we are uncertain which shortcoming is being referenced in the above comment, we discuss both here. We have addressed one with additional experimental data and the other by revising the text.

The first shortcoming is that we are looking at mutations to NP in a fixed background of other influenza genes. It is possible that some NP mutations could be rescued by mutations in other genes, which also evolved between 1968 and 2007.

Experimentally reconstructing all mutations in all viral genes is not feasible. However, several facts indicate that most of the NP epistasis in the timeframe we examined is intra-genic rather then inter-genic. First, all of the naturally occurring NP evolutionary intermediates are functional in a fixed genetic background of other genes. Second, we can explain the epistasis in terms of NP-intrinsic properties (such as stability) that do not involve other viral genes. To more firmly support this case, we have added new data in Figure 3—figure supplement 3 that shows the effects of the three individually deleterious mutations (L259S, R384G, V280A) in three different backgrounds of polymerase genes: Aichi/1968, Nanchang/1995, and Brisbane/2007. As shown in this new figure supplement, the mutations are deleterious in all three backgrounds, supporting the idea that these mutations are constrained by epistasis inherent to NP itself.

The second shortcoming involves the approach we used to look for intra-genic epistasis in NP. It is possible that there are mutations that are not deleterious to either Aichi/1968 NP or the evolutionary intermediate in which they occurred (and so do not appear impaired in either Figure 3A or Figure 3B), but are still deleterious in some other NP genetic background. So the reviewers are correct in stating that we have not found all epistasis – we have just devised a systematic test for a specific subset of epistasis. We have revised the text to acknowledge this point. For example, in the Introduction we now say, “While this experimental strategy is not guaranteed to find every possible epistatic interaction along the evolutionary trajectory, it will systematically identify all mutations that have different effects in the original parent and the evolutionary intermediates in which they actually occurred.”

However, we do not feel it is feasible to address this point by further experimentation. First, introducing each mutation in every genetic background would require a massive number of additional experiments. Second, as we proceed along the evolutionary trajectory, the mutations already start to exist in the evolutionary intermediates, so it is not even possible to introduce them. For example, one might ask – do the mutations have the same effect in the final Brisbane/2007 NP as they do in the initial Aichi/1968 NP? However, the mutations are already present in the Brisbane/2007 NP, so it is not possible to introduce them into this background. One could imagine reverting mutations out of the Brisbane/2007 NP, but this is a conceptually different experiment, as it no longer involves introducing mutations in a forward evolutionary direction. However, if any other un-identified epistasis is mediated by stability, then Figure 7C with the new data we have added (described below in response to comment 4) suggests that we found the most individually destabilizing mutations along the trajectory.

The Aichi/1968 parent is one of the least stable naturally occurring sequences, so is sensitive to destabilizing mutations. If we had started with a more stable parent (such as Step 19), then we would have missed many destabilizing mutations since this more stable parent would have tolerated mutations that were deleterious to Aichi/1968 NP.

3) No direct evidence is presented for positive selection of the three mutations deleterious in the ancestral strain. The authors should consider estimating dN/dS values at these specific sites, to the extent that they have enough data to do so.

In response to this comment, we have removed any specific references to “positive selection” and now merely make the well-supported claim that the three destabilizing mutations are enriched in experimentally characterized CTL epitopes and so likely to contribute to viral immune escape.

In our view, dN/dS values represent a statistical test that attempts to detect positive selection under certain assumptions. However, we believe it is preferable to use independent experimental evidence to determine whether a site is of value for immune escape (as we have done) rather than to rely on dN/dS. Typically papers that report methods for detecting positive selection (such as dN/dS) develop a statistical method and then validate it by testing whether it can identify sites with independent evidence for positive selection. We describe extensive experimental evidence culled from many independent citations that the sites in question are located in human CTL epitopes.

In addition, dN/dS tests are based on the idea that positively selected sites should change more rapidly than other sites (hence the elevation of dN over dS). But as we have shown, sites that contribute to CTL escape may be under strong constraint, and so may only be able to change under certain circumstance (in this case when they co-occur with stabilizing mutations), even if a change might be beneficial. This sort of epistasis would depress the rate of substitution at a site, reducing the signal in a dN/dS test even if a site is strongly targeted by CTLs. Nonetheless, we have performed dN/dS tests and added the results in Figure 8—figure supplement 3 and Figure 8—source code 2. The signal is weak, probably because of a lack of data. Although we have many hundreds of NP sequences, they are closely related and are derived from a phylogenetic tree with a trunk-like structure (Figure 2B), which reduces the power of the analysis since the sequences all closely track a single line of descent. The three destabilizing mutations occur at sites for which the posterior probability of positive selection is higher than for the typical site in NP, but for none do the posterior probabilities of positive selection rise to >95%. But conversely, none of the destabilizing mutations occur at sites for which the posterior probability of negative selection is >80%, indicating that these sites are also unlikely to be under strong negative selection. The dN/dS test therefore is inconclusive about whether the sites are under positive or negative selection.

4) An alternative hypothesis to explain the experimental observations is that throughout the course of the evolutionary trajectory there is a pattern of destabilizing mutations followed by stabilizing mutations, simply so that NP can maintain a roughly consistent folding energy. If so, the patterns shown in Figure 6E, of the stabilizing mutations that precede each of the three focal deleterious mutations, would not be unique to these three special epistatic mutations, but rather would occur for many pairs of subsequent mutations along the evolutionary trajectory. Additional melting experiments would therefore provide stronger evidence for the conclusion that epistasis permitting adaptive mutations is the primary reason for observing stabilizing/destabilizing pairs.

Our initial manuscript was overly strong in its statement of the association between the stabilizing/destabilizing mutations and the adaptive mutations. We have revised the text and added experimental data as described below.

Our results show that stabilizing mutations make NP tolerant to destabilizing mutations, and that in many cases these destabilizing mutations contribute to immune escape. However, our results do not imply causality in terms of adaptive mutations being the reason for the stabilizing/destabilizing pairs. Our results do, however, argue against a hypothesis that has often been raised in the literature: too much stability is bad, so selection for constant stability actively favors destabilizing mutations after a stabilizing mutation. The evidence against this hypothesis is Figure 7A, which shows no measurable deleterious impact of extra NP stability – destabilizing a highly stable NP is neutral with respect to function, not beneficial.

We have elaborated on this issue with new experimental data: we have now measured the stabilities of all of the resolved evolutionary intermediates and added them to Figure 7. Previously we had just shown the stabilities of the evolutionary intermediates that immediately preceded or followed L259S, R384G, and V280A.

These new data show that stability indeed fluctuates during NP’s evolution. Although the largest decreases in stability are associated with the three mutations on which we focus (L259S, R384G, and V280A), other slightly destabilizing mutations are also fixed during NP’s evolution. We subscribe to the following interpretation: during its evolution, NP occasionally acquires stabilizing mutations that are neutral with respect to function (at least within the sensitivity of our experiments). Once these stabilizing mutations have occurred, the protein is tolerant to destabilizing mutations. It also remains tolerant to additional stabilizing mutations, but most frequently the next mutation will be destabilizing (it is well known that most random mutations are destabilizing).

Some of these destabilizing mutations are totally neutral, while others are neutral with respect to function but promote immune escape. These destabilizing mutations can fix by stochastic forces (drift, hitchhiking) or selective forces (immune escape). However, a mutation favored by selective forces will fix more frequently than one just driven just by stochastic forces, so the virus often fixes immune-escape mutations once they are accessible, explaining why the destabilizing mutations are enriched in CTL epitopes. After the protein has exhausted the extra stability provided by the original stabilizing mutation, selection disfavors further destabilizing mutations until the protein has again acquired a stabilizing mutation.

The explanation in the previous paragraph is our interpretation, but is too speculative to include directly in the manuscript text. We have included some more conservative mention of this issue in the Discussion. We have also re-written relevant portions of the text to emphasize that all we can conclusively claim is that there is a pattern of stabilizing/destabilizing mutations, and that the three most destabilizing mutations make disproportionate contributions to immune escape. For example, the last sentence of the original abstract read “… with stabilizing mutations permitting subsequent destabilizing but adaptive mutations.” We have changed this to read “… with stabilizing mutations permitting otherwise inaccessible destabilizing mutations which are sometimes of adaptive value.”

Corrections to stability measurements performed at incorrect protein concentration:

During work subsequent to submission of our original manuscript, we discovered that some of our early stability measurements were performed at a protein concentration below 5 μM. We have repeated these measurements and replaced the affected data with our new measurements. We stress that although some of the numbers are slightly different, the changes do not alter any of the conclusions (the destabilizing mutations are still destabilizing and the stabilizing mutations are still stabilizing).

This problem arose because for the first few protein variants that we purified, we quantified concentration using a Bradford assay that appears to have been unreliable. After these first few variants, we switched to quantifying the concentration using the absorbance at 280 nm.

Originally, we had not realized that the Bradford assay concentrations were inaccurate because we analyzed the melting curves in normalized units. However, subsequent to our initial submission, we examined an overlay of all the CD traces and discovered that some traces had smaller magnitudes. We looked back at our notes and realized these were the variants quantified with the Bradford assay. We therefore re-purified these variants and measured their stabilities at the correct concentration as determined by absorbance at 280 nm. For these new measurements, the magnitudes of the CD traces are all similar, indicating the concentrations were accurate. In most cases, the stability measurements at the correct concentrations were higher by a fraction of a degree, suggesting slight concentration dependence to NP’s stability.

In this revised manuscript, we have replaced the old stability measurements with the new and slightly numerically different values. We have also introduced a new figure supplement (Figure 6—figure supplement 3) that shows all CD traces. The melting curves (now Figure 6—figure supplement 4) are shown in non-normalized raw ellipticity, since normalization was disguising the problem of unequal concentrations in our earlier submission.

Below is a figure overlaying of all of the melting curves in non-normalized units. As can be seen from this figure (Author response image 1), the samples in red had lower magnitude in the old measurement set, but now have magnitudes comparable to the rest of the data in the new measurement set.

Author response image 1.

Author response image 1

Associated Data

    This section collects any data citations, data availability statements, or supplementary materials included in this article.

    Supplementary Materials

    Figure 2—source code 1. The sequence data and source code used to generate the evolutionary trajectory and phylogenetic tree.

    This code is in the form of a ZIP file with BEAST input files and Python code. A README file explains the contents.

    DOI: http://dx.doi.org/10.7554/eLife.00631.005

    elife00631s001.zip (1.5MB, zip)
    DOI: 10.7554/eLife.00631.005
    Figure 3—source data 1. Summary of transcriptional activity data (mean and standard error) for all variants from this study.

    The means and standard errors are computed from at least triplicate assays, and are reported standardized so the value for Aichi/1968 NP is at 1. The data are provided in a CSV file.

    DOI: http://dx.doi.org/10.7554/eLife.00631.009

    elife00631s002.csv (1.9KB, csv)
    DOI: 10.7554/eLife.00631.009
    Figure 3—source data 2. Summary of viral growth data (mean and standard error) for all variants for which this property was measured in this study.

    The means and standard errors are computed from at least triplicate assays, and are reported standardized so the value for Aichi/1968 NP is at 1. The data are provided in a CSV file.

    DOI: http://dx.doi.org/10.7554/eLife.00631.010

    elife00631s003.csv (833B, csv)
    DOI: 10.7554/eLife.00631.010
    Figure 3—source data 3. Transcriptional activity data in the alternative polymerase genetic backgrounds shown in Figure 3—figure supplement 3.

    The data are provided in a CSV file.

    DOI: http://dx.doi.org/10.7554/eLife.00631.011

    elife00631s004.csv (708B, csv)
    DOI: 10.7554/eLife.00631.011
    Figure 6—source data 1. A table of all of the melting temperatures and the changes in stability relative to Aichi/1968, in CSV format.

    DOI: http://dx.doi.org/10.7554/eLife.00631.019

    elife00631s005.csv (1KB, csv)
    DOI: 10.7554/eLife.00631.019
    Figure 7—source data 1. The activity, viral growth, and stability data shown in Figure 7.

    The data are provided in CSV format.

    DOI: http://dx.doi.org/10.7554/eLife.00631.029

    elife00631s006.csv (1.9KB, csv)
    DOI: 10.7554/eLife.00631.029
    Figure 8—source data 1. Literature-characterized NP human CTL epitopes that include residues 259, 280, or 384 and contain sequences conserved or nearly conserved in Aichi/1968.

    The epitopes are listed in a TXT file.

    DOI: http://dx.doi.org/10.7554/eLife.00631.032

    elife00631s007.txt (1.1KB, txt)
    DOI: 10.7554/eLife.00631.032
    Figure 8—source code 1. The input data files and the custom Python scripts used to identify human CTL epitopes in NP.

    The code and data are provided as a ZIP file, which contains a README text file that describes the contents in more detail.

    DOI: http://dx.doi.org/10.7554/eLife.00631.033

    elife00631s008.zip (673.9KB, zip)
    DOI: 10.7554/eLife.00631.033
    Figure 8—source code 2. The data and source code used for the dN/dS analysis.

    The code and data are provided in a ZIP file; a README file explains the contents.

    DOI: http://dx.doi.org/10.7554/eLife.00631.034

    elife00631s009.zip (484.8KB, zip)
    DOI: 10.7554/eLife.00631.034
    Supplementary file 1. The full vRNAs in the reverse-genetics plasmids used in this study.

    A text file giving the vRNAs inserted between the RNA polymerase I promoter and terminator in the reverse-genetics plasmids pHWAichi68-NP, pHWNan95-PB2, pHWNan95-PB1, pHWNan95-PA, pHWAichi68-PB2, pHWAichi68-PB1, pHWAichi68-PA, pHWBR07-PB2, pHWBR07-PB1, pHWBR07-PA, pHW184-HA, pHW186-NA, pHW187-M, pHW188-NS, and pHH-PB1flank-eGFP.

    DOI: http://dx.doi.org/10.7554/eLife.00631.038

    elife00631s010.txt (29KB, txt)
    DOI: 10.7554/eLife.00631.038
    Supplementary file 2. The protein-coding sequences of all NP variants used in this study.

    A text file giving the coding sequences for the NP variants used in this study.

    DOI: http://dx.doi.org/10.7554/eLife.00631.039

    elife00631s011.txt (114.4KB, txt)
    DOI: 10.7554/eLife.00631.039

    Articles from eLife are provided here courtesy of eLife Sciences Publications, Ltd

    RESOURCES