Skip to main content
PLOS ONE logoLink to PLOS ONE
. 2014 Aug 29;9(8):e105842. doi: 10.1371/journal.pone.0105842

Control of Asymmetric Hopfield Networks and Application to Cancer Attractors

Anthony Szedlak 1,*, Giovanni Paternostro 2,3, Carlo Piermarocchi 1,3
Editor: Mariko Okada (Hatakeyama)4
PMCID: PMC4149479  PMID: 25170874

Abstract

The asymmetric Hopfield model is used to simulate signaling dynamics in gene regulatory networks. The model allows for a direct mapping of a gene expression pattern into attractor states. We analyze different control strategies aimed at disrupting attractor patterns using selective local fields representing therapeutic interventions. The control strategies are based on the identification of signaling bottlenecks, which are single nodes or strongly connected clusters of nodes that have a large impact on the signaling. We provide a theorem with bounds on the minimum number of nodes that guarantee control of bottlenecks consisting of strongly connected components. The control strategies are applied to the identification of sets of proteins that, when inhibited, selectively disrupt the signaling of cancer cells while preserving the signaling of normal cells. We use an experimentally validated non-specific and an algorithmically-assembled specific B cell gene regulatory network reconstructed from gene expression data to model cancer signaling in lung and B cells, respectively. Among the potential targets identified here are TP53, FOXM1, BCL6 and SRC. This model could help in the rational design of novel robust therapeutic interventions based on our increasing knowledge of complex gene signaling networks.

Introduction

The vision behind systems biology is that complex interactions and emergent properties determine the behavior of biological systems. Many theoretical tools developed in the framework of spin glass models are well suited to describe emergent properties, and their application to large biological networks represents an approach that goes beyond pinpointing the behavior of a few genes or metabolites in a pathway. The Hopfield model [1] is a spin glass model that was introduced to describe neural networks, and that is solvable using mean field theory [2]. The asymmetric case, in which the interaction between the spins can be seen as directed, can also be exacty solved in some limits [3]. The model belongs to the class of attractor neural networks, in which the spins evolve towards stored attractor patterns, and it has been used to model biological processes of high current interest, such as the reprogramming of pluripotent stem cells [4]. Moreover, it has been suggested that a biological system in a chronic or therapy-resistant disease state can be seen as a network that has become trapped in a pathological Hopfield attractor [5]. A similar class of models is represented by Random Boolean Networks [6], which were proposed by Kauffman to describe gene regulation and expression states in cells [7]. Differences and similarities between the Kauffman-type and Hopfield-type random networks have been studied for many years [8][11].

In this paper, we consider an asymmetric Hopfield model built from real (even if incomplete [12], [13]) cellular networks, and we map the spin attractor states to gene expression data from normal and cancer cells. We will focus on the question of controling of a network's final state (after a transient period) using external local fields representing therapeutic interventions. To a major extent, the final determinant of cellular phenotype is the expression and activity pattern of all proteins within the cell, which is related to levels of mRNA transcripts. Microarrays measure genome-wide levels of mRNA expression that therefore can be considered a rough snapshot of the state of the cell. This state is relatively stable, reproducible, unique to cell types, and can differentiate cancer cells from normal cells, as well as differentiate between different types of cancer [14], [15]. In fact, there is evidence that attractors exist in gene expression states, and that these attractors can be reached by different trajectories rather than only by a single transcriptional program [16]. While the dynamical attractors paradigm has been originally proposed in the context of cellular developement, the similarity between cellular ontogenesis, i.e. the developement of different cell types, and oncogenesis, i.e. the process under which normal cells are transformed into cancer cells, has been recently emphasized [17]. The main hypothesis of this paper is that cancer robustness is rooted in the dynamical robustness of signaling in an underlying cellular network. If the cancerous state of rapid, uncontrolled growth is an attractor state of the system [18], a goal of modeling therapeutic control could be to design complex therapeutic interventions based on drug combinations [19] that push the cell out of the cancer attractor basin [20].

Many authors have discussed the control of biological signaling networks using complex external perturbations. Calzolari and coworkers considered the effect of complex external signals on apoptosis signaling [21]. Agoston and coworkers [22] suggested that perturbing a complex biological network with partial inhibition of many targets could be more effective than the complete inhibition of a single target, and explicitly discussed the implications for multi-drug therapies [23]. In the traditional approach to control theory [24], the control of a dynamical system consists in finding the specific input temporal sequence required to drive the system to a desired output. This approach has been discussed in the context of Kauffmann Boolean networks [25] and their attractor states [26]. Several studies have focused on the intrinsic global properties of control and hierarchical organization in biological networks [27], [28]. A recent study has focused on the minimum number of nodes that needs to be addressed to achieve the complete control of a network [29]. This study used a linear control framework, a matching algorithm [30] to find the minimum number of controllers, and a replica method to provide an analytic formulation consistent with the numerical study. Finally, Cornelius et al. [31] discussed how nonlinearity in network signaling allows reprogrammig a system to a desired attractor state even in the presence of contraints in the nodes that can be accessed by external control. This novel concept was explicitly applied to a T-cell survival signaling network to identify potential drug targets in T-LGL leukemia. The approach in the present paper is based on nonlinear signaling rules and takes advantage of some useful properties of the Hopfield formulation. In particular, by considering two attractor states we will show that the network separates into two types of domains which do not interact with each other. Moreover, the Hopfield framework allows for a direct mapping of a gene expression pattern into an attractor state of the signaling dynamics, facilitating the integration of genomic data in the modeling.

The paper is structured as follows. In Mathematical Model we summarize the model and review some of its key properties. Control Strategies describes general strategies aiming at selectively disrupting the signaling only in cells that are near a cancer attractor state. The strategies we have investigated use the concept of bottlenecks, which identify single nodes or strongly connected clusters of nodes that have a large impact on the signaling. In this section we also provide a theorem with bounds on the minimum number of nodes that guarantee control of a bottleneck consisting of a strongly connected component. This theorem is useful for practical applications since it helps to establish whether an exhaustive search for such minimal set of nodes is practical. In Cancer Signaling we apply the methods from Control Strategies to lung and B cell cancers. We use two different networks for this analysis. The first is an experimentally validated and non-specific network (that is, the observed interactions are compiled from many experiments conducted on heterogeneous cell types) obtained from a kinase interactome and phospho-protein database [32] combined with a database of interactions between transcription factors and their target genes [33]. The second network is cell-specific and was obtained using network reconstruction algorithms and transcriptional and post-translational data from mature human B cells [34]. The algorithmically reconstructed network is significantly more dense than the experimental one, and the same control strategies produce different results in the two cases. Finally, we close with Conclusions.

Methods

Mathematical Model

We define the adjacency matrix of a network Inline graphic composed of Inline graphic nodes as

graphic file with name pone.0105842.e003.jpg (1)

where Inline graphic denotes a directed edge from node Inline graphic to node Inline graphic. The set of nodes in the network Inline graphic is indicated by Inline graphic and the set of directed edges is indicated by Inline graphic. (See Table 1 for a list of mathematical symbols used in the text.) The spin of node Inline graphic at time Inline graphic is Inline graphic, and indicates an expresssed Inline graphic or not expressed Inline graphic gene. We encode an arbitrary attractor state Inline graphic with Inline graphic by defining the coupling matrix [1]

Table 1. Reference table for symbols.

Symbol Explanation
Inline graphic Set of nodes and directed edges (network)
Inline graphic Number of nodes
Inline graphic Adjacency matrix
Inline graphic Set of nodes in Inline graphic
Inline graphic Set of edges in Inline graphic
Inline graphic Outdegree/indegree of node Inline graphic
Inline graphic Spin of node Inline graphic, Inline graphic
Inline graphic Inline graphic attractor
Inline graphic Normal/cancer attractor
Inline graphic Coupling matrix
Inline graphic Total field at node Inline graphic
Inline graphic External field applied to node Inline graphic
Inline graphic Temperature
Inline graphic Set of source and effective source nodes
Inline graphic Magnetization along attractor Inline graphic at time Inline graphic
Inline graphic Steady-state magnetization along attractor Inline graphic
Inline graphic Number of attractors in coupling matrix
Inline graphic Set of similarity nodes
Inline graphic Set of differential nodes
Inline graphic Control set of bottleneck Inline graphic
Inline graphic Impact of bottleneck Inline graphic
Inline graphic Cycle cluster
Inline graphic Size Inline graphic bottleneck, where Inline graphic
Inline graphic Set of critical nodes for bottleneck Inline graphic in network Inline graphic
Inline graphic Critical number of nodes in bottleneck Inline graphic in network Inline graphic
Inline graphic Set of externally influenced nodes
Inline graphic Set of intruder connections
Inline graphic Reduced set of critical nodes
Inline graphic Minimum indegree of all nodes in a cycle cluster
Inline graphic Critical efficiency of bottleneck Inline graphic
Inline graphic Optimal efficiency of bottleneck Inline graphic

This table lists all important symbols introduced in the article with a brief explanation of its purpose.

graphic file with name pone.0105842.e017.jpg (2)

The total field at node Inline graphic is then Inline graphic where Inline graphic is the external field applied to node Inline graphic, which will be discussed below. The discrete-time update scheme is defined as

graphic file with name pone.0105842.e074.jpg (3)

where Inline graphic is an effective temperature. For the remainder of the paper, we consider the case of Inline graphic so that Inline graphic, and the spin is chosen randomly from Inline graphic if Inline graphic. For convenience, we take Inline graphic and Inline graphic. Nodes can be updated synchronously, and synchronous updating can lead to limit cycles [9]. Nodes can also be updated separately and in random order (anynchronous updating), which does not result in limit cycles. All results presented in this paper use the synchronous update scheme.

Source nodes (nodes with zero indegree) are fixed to their initial states by a small external field so that Inline graphic for all Inline graphic, where Inline graphic is the set of source nodes. However, the source nodes flip if directly targeted by an external field. Biologically, genes at the “top” of a network are assumed to be controlled by elements outside of the network.

In application, two attractors are needed. Define these states as Inline graphic and Inline graphic, the normal state and cancer state, respectively. The magnetization along attractor state Inline graphic is

graphic file with name pone.0105842.e088.jpg (4)

Note that if Inline graphic, Inline graphic. We also define the steady state magnetization along state Inline graphic as

graphic file with name pone.0105842.e092.jpg (5)

There are two ways to model normal and cancer cells. One way is to simply define a different coupling matrix for each attractor state Inline graphic,

graphic file with name pone.0105842.e094.jpg (6)

Alternatively, both attractor states can be encoded in the same coupling matrix,

graphic file with name pone.0105842.e095.jpg (7)

Systems using Eqs. 6 and 7 will be referred to as the one attractor state (Inline graphic) and two attractor state (Inline graphic) systems, respectively. Eqs. 6 and 7 are particular cases of the general Hopfield form [1]

graphic file with name pone.0105842.e098.jpg (8)

where Inline graphic is the number of attractor states, often taken to be large. An interesting property emerges when Inline graphic, however. Consider a simple network composed of two nodes, with only one edge Inline graphic with attractor states Inline graphic and Inline graphic, and Inline graphic. The only nonzero entry of the matrix Inline graphic is

graphic file with name pone.0105842.e106.jpg (9)

Note that if Inline graphic, Inline graphic. In either case, by Eq. 3 we have

graphic file with name pone.0105842.e109.jpg (10)

that is, the spin of node 2 at a given time step will be driven to match the attractor state of node 1 at the previous time step. However, if Inline graphic and Inline graphic, Inline graphic. This gives

graphic file with name pone.0105842.e113.jpg (11)

In this case, node 2 receives no input from node 1. Nodes 1 and 2 have become effectively disconnected.

This motivates new designations for node types. We define similarity nodes as nodes with Inline graphic, and differential nodes as nodes with Inline graphic. We also define the set of similarity nodes Inline graphic and the set of differential nodes Inline graphic. Connections between two similarity nodes or two differential nodes remain in the network, whereas connections that link nodes of different types transmit no signals. The effective deletion of edges between nodes means that the original network fully separates into two subnetworks: one composed entirely of similarity nodes (the similarity network) and another composed entirely of differential nodes (the differential network), each of which can be composed of one or more separate weakly connected components (see Fig. 1). With this separation, new source nodes (effective sources) can be exposed in both the similarity and differential networks. For the remainder of this article, Inline graphic is the set of both source and effective source nodes in a given network.

Figure 1. Network segregation for two attractor states (Inline graphic).

Figure 1

Every edge that connects a similarity node to a differential node or a differential node to a similarity node transmits no signal. This means that the signaling in the right network shown above is identical to that of the left network. Because the goal is to leave normal cells unaltered while damaging cancer cells as much as possible, all similarity nodes can be safely ignored, and searches and simulations only need to be done on the differential subnetwork.

Control Strategies

The strategies presented below focus on selecting the best single nodes or small clusters of nodes to control, ranked by how much they individually change Inline graphic. In application, however, controlling many nodes is necessary to achieve a sufficiently changed Inline graphic. The effects of controlling a set of nodes can be more than the sum of the effects of controlling individual nodes, and predicting the truly optimal set of nodes to target is computationally difficult. Here, we discuss heuristic strategies for controlling large networks where the combinatorial approach is impractical.

For both Inline graphic and Inline graphic, simulating a cancer cell means that Inline graphic, and likewise for normal cells. Although the normal and cancer states are mathematically interchangeable, biologically we seek to decrease Inline graphic as much as possible while leaving Inline graphic. By “network control” we thus mean driving the system away from its initial state of Inline graphic with Inline graphic. Controlling individual nodes is achieved by applying a strong field (stronger than the magnitude of the field due to the node's upstream neighbors) to a set of targeted nodes Inline graphic so that

graphic file with name pone.0105842.e130.jpg (12)

This ensures that the drug field can always overcome the field from neighboring nodes.

In application, similarity nodes are never deliberately directly targeted, since changing their state would adversely affect both normal and cancer cells. Roughly Inline graphic of the nodes in the networks surveyed are similarity nodes, so the search space is reduced. For Inline graphic, the effective edge deletion means that only the differential network in cancer cells needs to be simulated to determine the effectiveness of Inline graphic. For Inline graphic, however, there may be some similarity nodes that receive signals from upstream differential nodes. In this case, the full effect of Inline graphic can be determined only by simulating all differential nodes as well as any similarity nodes downstream of differential nodes. All following discussion assumes that all nodes examined are differential, and therefore targetable, for both Inline graphic and Inline graphic. The existence of similarity nodes for Inline graphic only limits the set of targetable nodes.

Directed acyclic networks

Full control of a directed acyclic network is achieved by forcing Inline graphic for all Inline graphic. This guarantees Inline graphic. Suppose that nodes Inline graphic in an acyclic network have always been fixed away from the cancer state, that is, Inline graphic. For any node Inline graphic to have Inline graphic, it is sufficient to have either Inline graphic or Inline graphic for all Inline graphic, Inline graphic. Because there are no cycles present, all upstream paths of sufficent length terminate at a source. Because the spin of all nodes Inline graphic point away from the cancer attractor state, all nodes downstream must also point away from the cancer attractor state. Thus, for acyclic networks, forcing Inline graphic guarantees Inline graphic. The complications that arise from cycles are discussed in the next subsubsection. However, controlling nodes in Inline graphic may not be the most efficient way to push the system away from the cancer basin of attraction and, depending on the control limitations, it may not be possible. If minimizing the number of controllers is required, searching for the most important bottlenecks is a better strategy.

Consider a directed network Inline graphic and an initially identical copy, Inline graphic If removing node Inline graphic (and all connections to and from Inline graphic) from Inline graphic decreases the indegree of at least one node Inline graphic, Inline graphic, to less than half of its indegree in network Inline graphic, Inline graphic is a size 1 bottleneck. The bottleneck control set of bottleneck Inline graphic, Inline graphic, is defined algorithmically as follows: (1) Begin a set Inline graphic with the current bottleneck Inline graphic so that Inline graphic; (2) Remove bottleneck Inline graphic from network Inline graphic; (3) Append Inline graphic with all nodes Inline graphic with current indegree that is less than half of that from the original network Inline graphic; (4) Remove all nodes Inline graphic from the network Inline graphic. If additional nodes in Inline graphic have their indegree reduced to below half of their indegree in Inline graphic, go to step 3. Otherwise, stop. The impact of the bottleneck i, Inline graphic, is defined as

graphic file with name pone.0105842.e178.jpg (13)

where Inline graphic is the cardinality of the set Inline graphic The impact of a bottleneck is the minimum number of nodes that are guaranteed to switch away from the cancer state when the bottleneck is forced away from the cancer state.

The impact is used to rank the size 1 bottlenecks by importance, with the most important as those with the largest impact. In application, when searching for nodes to control, any size 1 bottleneck Inline graphic that appears in the bottleneck control set of a different size 1 bottleneck Inline graphic can be ignored, since fixing Inline graphic to the normal state fixes Inline graphic to the normal state as well. Note that the definition given above in terms of Inline graphic and Inline graphic avoids miscounting in the impact of a bottleneck.

The network in Fig. 2, for example, has three sources (nodes 1, 2 and 3), but one important bottleneck (node 6). If full damage, i.e. Inline graphic, is required, then control of all source nodes is necessary. If minimizing the number of directly targeted nodes is important and Inline graphic can be tolerated, then control of the bottleneck node 6 is a better choice.

Figure 2. A directed acyclic network.

Figure 2

Controlling all three source nodes (nodes 1, 2 and 3) guarantees full control of the network, but are ineffective when targeted individually. The best single node to control in this network is node 6 because it directly controls all downstream nodes.

Directed cycle-rich networks

Not all networks can be fully controlled at Inline graphic by controlling the source nodes, however. If there is a cycle present, paths of infinite length exist and the final state of the system may depend on the initial state, causing parts of the network to be hysteretic. Controlling only sources in a general directed network thus does not guarantee Inline graphic unless the system begins with Inline graphic.

Define a cycle cluster, Inline graphic, as a strongly connected subnetwork of a network Inline graphic The network in Fig. 3, for example, has one cycle cluster with nodes Inline graphic. If the network begins with Inline graphic, forcing both source nodes away from the cancer state does nothing to the nodes downsteam of node 3 (see Fig. 4). This is because the indegree Inline graphic, and a majority of the nodes connecting to node 4 are in the cancer attractor state. At Inline graphic, cycle clusters with high connectivity tend to block incoming signals from outside of the cluster, resulting in an insurmountable activation barrier.

Figure 3. A network in which nodes 4, 5, 6 and 7 compose a single cycle cluster.

Figure 3

The high connectivity of node 4 prevents any changes made to the spin of nodes 1–3 from propagating downstream. The only way to indirectly control nodes 8–10 is to target nodes inside of the cycle cluster. Targeting node 4, 6 or 7 will cause the entire cycle cluster to flip away from its initial state, guaranteeing control of nodes 4–10 (see Fig. 4).

Figure 4. Cancer magnetization from targeting various nodes in the network shown in Fig. 3, averaged over 10,000 runs.

Figure 4

The averaging removes fluctuations due to the random flipping of nodes with Inline graphic Targeting node 7 results in the quickest stabilization, but targeting any one of nodes 4, 6 or 7 results in the same final magnetization.

The most effective single node to control in this network is any one of nodes 4, 6 or 7. Forcing any of these away from the cancer attractor state will eventually cause the entire cycle cluster to flip away from the cancer state, and all nodes downstream will flip as well, as shown in Fig. 4. The cycle cluster here acts as a sort of large, hysteretic bottleneck. We now generalize the concept of bottlenecks.

Define a size Inline graphic bottleneck in a network Inline graphic to be a cycle cluster Inline graphic with Inline graphic which, when removed from Inline graphic reduces the indegree of at least one node Inline graphic, Inline graphic to less than half of its original indegree. Other than now using the set of nodes Inline graphic rather than a single node set, the above algorithm for finding the bottleneck control set remains unchanged. In Fig. 3, for instance, Inline graphic Inline graphic Inline graphic, and Inline graphic. With this more general definition, we note that controlling any size Inline graphic bottleneck Inline graphic guarantees control of all size 1 bottlenecks Inline graphic in the control set of Inline graphic for all Inline graphic.

For any bottleneck Inline graphic of size Inline graphic in a network Inline graphic, define the set of critical nodes, Inline graphic as the set of nodes Inline graphic of minimum cardinality that, when controlled, guarantees full control of all nodes Inline graphic after a transient period. Also define the critical number of nodes as Inline graphic. Thus, for the network in Fig. 3, Inline graphic, Inline graphic, or Inline graphic, and Inline graphic.

In general, however, more than one node in a cycle cluster may need to be targeted to control the entire cycle cluster. Fig. 5 shows a cycle cluster (composed of nodes 2–10) that cannot be controlled by targeting any single node. The precise value of Inline graphic for a given cycle cluster Inline graphic depends on its topology as well as the edges connecting nodes from outside of Inline graphic to the nodes inside of Inline graphic and finding Inline graphic can be difficult. We present a theorem that puts bounds on Inline graphic to help determine whether a search for Inline graphic is practical.

Figure 5. A network with a cycle cluster Inline graphic, composed of nodes 2–10, that cannot be controlled at Inline graphic by controlling any single node.

Figure 5

Here, the set of externally influenced nodes is Inline graphic, the set of intruder connections is Inline graphic, the reduced set of critical nodes is Inline graphic, the minimum indegree is Inline graphic and the number of nodes in the cycle cluster is Inline graphic By Eq. 18, this gives the bounds of the critical number of nodes to be Inline graphic.

Theorem: Suppose a network Inline graphic contains a cycle cluster Inline graphic Define the set of externally influenced nodes

graphic file with name pone.0105842.e244.jpg (14)

the set of intruder connections

graphic file with name pone.0105842.e245.jpg (15)

and the reduced set of critical nodes

graphic file with name pone.0105842.e246.jpg (16)

If Inline graphic and

graphic file with name pone.0105842.e248.jpg (17)

where Inline graphic is computed ignoring intruder connections, then

graphic file with name pone.0105842.e250.jpg (18)

where

graphic file with name pone.0105842.e251.jpg (19)

Proof: First, prove the lower limit of Eq. 18. Let Inline graphic be a cycle cluster in a network Inline graphic with Inline graphic. (A cycle cluster in a network with Inline graphic will have the same or higher activation barrier for any node in the cluster than the same cycle cluster in a network with Inline graphic. Since we are examining the lower limit of Eq. 18, we consider the case with the lowest activation barrier. Any externally influenced nodes cause Inline graphic to either increase or remain the same.) For any node Inline graphic to be able to flip away from the cancer state (although not necessarily remain there), we must have that Inline graphic for Inline graphic, meaning that at least half of the nodes upstream of Inline graphic must point away from the cancer state. The node Inline graphic requiring the smallest number of upstream nodes to be in the normal state is the node that satisfies Inline graphic Controlling less than Inline graphic nodes will leave all uncontrolled nodes with a field in the cancer direction, and no more flips will occur. Thus,

graphic file with name pone.0105842.e265.jpg (20)

For the upper limit of Eq. 18, consider a complete clique on Inline graphic nodes, Inline graphic (that is, Inline graphic for all Inline graphic, including self loops) in a network Inline graphic First, let there be no connections to any nodes in Inline graphic from outside of Inline graphic so that Inline graphic. For odd Inline graphic forcing Inline graphic nodes away from the cancer state will result in the field

graphic file with name pone.0105842.e276.jpg (21)

for all nodes Inline graphic After one time step, all nodes will flip away from the cancer state. For even Inline graphic forcing Inline graphic nodes away from the cancer state will result in the field

graphic file with name pone.0105842.e280.jpg (22)

for all nodes Inline graphic At the next time step, the unfixed nodes will pick randomly between the normal and cancer state. If at least one of these nodes makes the transition away from the cancer state, the field at all other nodes will point away from the cancer direction. The system will then require one more time step to completely settle to Inline graphic. Thus, we have that for Inline graphic in a network Inline graphic with Inline graphic,

graphic file with name pone.0105842.e286.jpg (23)

Inline graphic with Inline graphic gives the largest activation barrier for any cycle cluster on Inline graphic nodes with Inline graphic to switch away from the cancer attractor state. A general cycle cluster Inline graphic with any topology on Inline graphic nodes with Inline graphic in a network Inline graphic will have Inline graphic for all nodes Inline graphic, and so we have the upper bound

graphic file with name pone.0105842.e297.jpg (24)

thus proving Eq. 18 for the special case of Inline graphic.

Now consider a cycle cluster Inline graphic on Inline graphic nodes in a network Inline graphic with Inline graphic. Suppose all nodes in Inline graphic are fixed away from the cancer state. By Eq. 24, Inline graphic For any node Inline graphic Inline graphic is guaranteed because it has already been directly controlled. Any node Inline graphic has some incoming connections from nodes Inline graphic, and these connections could increase the activation barrier enough such that fixing Inline graphic is not enough to guarantee Inline graphic. To ensure that any node Inline graphic points away from the cancer state, it is sufficient to fix all nodes Inline graphic as well as Inline graphic away from the cancer state. This increases Inline graphic by at most Inline graphic, leaving

graphic file with name pone.0105842.e316.jpg (25)

Inline graphic can never exceed Inline graphic however, because directly controlling every node results in controlling Inline graphic We can thus say that

graphic file with name pone.0105842.e320.jpg (26)

Finally, combining the upper limit in Eq. 26 with the lower limit from Eq. 20 gives Eq. 18. ▪

There can be more than one Inline graphic for a given cycle cluster. Note that the tightest constraints on Inline graphic in Eq. 18 come from using the Inline graphic with the largest overlap with Inline graphic. If finding Inline graphic is too difficult, an overestimate for the upper limit of Inline graphic can be made by assuming that Inline graphic so that

graphic file with name pone.0105842.e328.jpg (27)

The cycle cluster in Fig. 5 has Inline graphic Inline graphic Inline graphic and one of the reduced sets of critical nodes is Inline graphic so Inline graphic It can be shown through an exhaustive search that for this network Inline graphic, and the set of critical nodes is Inline graphic (see Fig. 6). Here, Inline graphic, although this is not always the case. Because the cycle cluster has 9 nodes and Inline graphic, at most Inline graphic simulations are needed to find at least one solution for Inline graphic. However, the maximum number of simulations required to find Inline graphic increases exponentially and for larger networks the problem quickly becomes intractable.

Figure 6. Magnetization for network from Fig. 5, averaged over 10,000 runs.

Figure 6

There is no single node to target that will control the cycle cluster, but fixing nodes 9 and 10 results in full control of the cycle cluster, leaving only node 1 in the cancer state. This means Inline graphic and Inline graphic.

One heuristic strategy for controlling cycle clusters is to look for size Inline graphic bottlenecks inside of Inline graphic Bottlenecks of size Inline graphic and average indegree Inline graphic can contain high impact size Inline graphic bottlenecks, where Inline graphic. Size Inline graphic bottlenecks need to be compared to find the best set of nodes to target to reduce Inline graphic. Simply comparing the impact is insufficent because a cycle cluster with a large impact could also have a large Inline graphic, requiring much more effort than its impact merits. Define the critical efficiency of a bottleneck Inline graphic as

graphic file with name pone.0105842.e353.jpg (28)

If the critical efficiency of a cycle cluster is much smaller than the impacts of size 1 bottlenecks from outside of the cycle cluster, the the cycle cluster can be safely ignored.

For some cycle clusters, however, not all of the nodes need to be controlled in order for a large portion of the nodes in the cycle cluster's control set to flip. Define the optimal efficiency of a bottleneck Inline graphic as

graphic file with name pone.0105842.e355.jpg (29)

where Inline graphic are size 1 bottlenecks and Inline graphic for all Inline graphic Note that for any size 1 bottleneck Inline graphic Inline graphic This quantity thus allows bottlenecks with very different properties (Inline graphic, Inline graphic, or Inline graphic) to be ranked against each other.

All strategies presented above are designed to select the best individual or small group of nodes to target. Significant changes in the biological networks' magnetization require targeting many nodes, however. Brute force searches on the effect of larger combinations of nodes are typically impossible because the required number of simulations scales exponentially with the number of nodes. A crude Monte Carlo search is also numerically expensive, since it is difficult to sample an appreciable portion of the available space. One alternative is to take advantage of the bottlenecks that can be easily found, and rank all size Inline graphic bottlenecks Inline graphic in an ordered list Inline graphic such that

graphic file with name pone.0105842.e367.jpg (30)

where

graphic file with name pone.0105842.e368.jpg (31)

for all Inline graphic and fix the bottlenecks in the list in order. This is called the efficiency-ranked strategy. If all size Inline graphic bottlenecks are ignored, it is called the pure efficiency-ranked strategy, and if size Inline graphic bottlenecks are included it is called the mixed efficiency-ranked strategy.

An effective polynomial-time algorithm for finding the top Inline graphic nodes to fix, which we call the best+1 strategy (equivalent to a greedy algorithm), works as follows: (1) Begin with a seed set of nodes to fix, Inline graphic (2) Test the effect of fixing Inline graphic for all allowed nodes Inline graphic (3) Inline graphic, where Inline graphic is the best node from all Inline graphic sampled; (4) If Inline graphic, go to step (2). Otherwise, stop. The seed set of nodes could be the single highest impact size 1 bottleneck in the network, or it could be the best set of Inline graphic nodes (where Inline graphic) found from a brute force search.

Cancer Signaling

In application to biological systems, we assume that the magnetization of cell type Inline graphic is related to the viability of cell type Inline graphic that is, the fraction of cells of type Inline graphic that survives a drug treatment. It is reasonable to assume that the viability of cell type Inline graphic, Inline graphic, is a monotonically increasing function of Inline graphic. Because the exact relationship is not known, we analyze the effect of external perturbations in terms of the final magnetizations.

We need to use as few controllers as possible to sufficiently reduce Inline graphic while leaving Inline graphic. In practical applications, however, one is limited in the set of druggable targets. All classes of drugs are constrained to act only on a specific set of biological components. For example, one class of drugs that is currently under intense research is protein kinase inhibitors [35]. In this case one has two constraints: the only nodes that can be targeted are those that correspond to kinases, and they can only be inhibited, i.e. turned off. We will use the example of kinase inhibitors to show how control is affected by such types of constraints. In the real systems studied, many differential nodes have only similarity nodes upstream and downstream of them, while the remaining differential nodes form one large cluster. This is not important for Inline graphic, but the effective edge deletion for Inline graphic results in many islets, which are nodes Inline graphic with Inline graphic for all Inline graphic (self-loops allowed). Controlling islets requires targeting each islet individually. For Inline graphic we concentrate on controlling only the largest weakly connected differential subnetwork. All final magnetizations are normalized by the total number of nodes in the full network, even if the simulations are only conducted on small portion of the network.

The data files for all networks and attractors analyzed below can be found in Supporting Information.

Lung Cell Network

The network used to simulate lung cells was built by combining the kinase interactome from PhosphoPOINT [32] with the transcription factor interactome from TRANSFAC [33]. Both of these are general networks that were constructed by compiling many observed pairwise interactions between components, meaning that if Inline graphic, at least one of the proteins encoded by gene Inline graphic has been directly observed interacting with gene Inline graphic in experiments. This bottom-up approach means that some edges may be missing, but those present are reliable. Because of this, the network is sparse (Inline graphic complete, see Table 2), resulting in the formation of many islets for Inline graphic. Note also that this network presents a clear hierarchical structure, characteristic of biological networks [36], [37], with many “sink” nodes [38] that are targets of transcription factors and a relatively large cycle cluster originating from the kinase interactome.

Table 2. General properties of the full networks.

Properties Lung B cell
Nodes 9073 4364
Edges 45635 55144
Sources 129 8
Sinks 8443 1418
Av. outdegree 5.03 12.64
Max outdegree 240 2372
Max indegree 68 196
Self-loops 238 0
Undirected edges 350 23386
Diameter 11 11
Max cycle cluster 401 2886
Av. clustering coeff. [73] 0.0544 0.2315

The network used for the analysis of lung cancer is a generic one obtained combining the data sets in Refs. [32] and [33]. The B cell network is a curated version of the B cell interactome obtained in Ref. [34] using a network reconstruction method and gene expression data from B cells.

It is important to note that this is a non-specific network, whereas real gene regulatory networks can experience a sort of “rewiring” for a single cell type under various internal conditions [39]. In this analysis, we assume that the difference in topology between a normal and a cancer cell's regulatory network is negligible. The methods described here can be applied to more specialized networks for specific cell types and cancer types as these networks become more widely avaliable.

In our signaling model, the IMR-90 cell line [40], [41] was used for the normal attractor state, and the two cancer attractor states examined were from the A549 (adenocarcinoma) [42][46] and NCI-H358 (bronchioalveolar carcinoma) [42], [43] cell lines. Gene expression measurements from all referenced studies for a given cell line were averaged together to create a single attractor. The resulting magnetization curves for A549 and NCI-H358 are very similar, so the following analysis addresses only A549. The full network contains 9073 nodes, but only 1175 of them are differential nodes in the IMR-90/A549 model. In the unconstrained Inline graphic case, all 1175 differential nodes are candidates for targeting. Exhaustively searching for the best pair of nodes to control requires investigating 689725 combinations simulated on the full network of 9073 nodes. However, 1094 of the 1175 nodes are sinks (i.e. nodes Inline graphic with outdegree Inline graphic, ignoring self loops) and therefore have Inline graphic, which can be safely ignored. The search space is thus reduced to 81 nodes, and finding even the best triplet of nodes exhaustively is possible. Including constraints, only 31 nodes are differential kinases with Inline graphic. This reduces the search space at the cost of increasing the minimum achievable Inline graphic.

There is one important cycle cluster in the full network, and it is composed of 401 nodes. This cycle cluster has an impact of 7948 for Inline graphic, giving a critical efficiency of at least Inline graphic, and Inline graphic by Eq. 27. The optimal efficiency for this cycle cluster is Inline graphic, but this is achieved for fixing the first bottleneck in the cluster. Additionally, this node is the highest impact size 1 bottleneck in the full network, and so the mixed efficiency-ranked results are identical to the pure efficiency-ranked results for the unconstrained Inline graphic lung network. The mixed efficiency-ranked strategy was thus ignored in this case.

Fig. 7 shows the results for the unconstrained Inline graphic model of the IMR-90/A549 lung cell network. (All simulations were performed using MATLAB on a desktop computer. Running the simulations to make all curves shown below required approximately 12 hours.) The unconstrained Inline graphic system has the largest search space, so the Monte Carlo strategy performs poorly. The best+1 strategy is the most effective strategy for controlling this network. The seed set of nodes used here was simply the size 1 bottleneck with the largest impact. Note that best+1 works better than effeciency-ranked. This is because best+1 includes the synergistic effects of fixing multiple nodes, while efficiency-ranked assumes that there is no overlap between the set of nodes downstream from multiple bottlenecks. Importantly, however, the efficiency-ranked method works nearly as well as best+1 and much better than Monte Carlo, both of which are more computationally expensive than the efficiency-ranked strategy.

Figure 7. Final cancer magnetizations for an unconstrained search on the lung cell network using p = 1.

Figure 7

The efficiency-ranked strategy outperforms the relatively expensive Monte Carlo strategy. The best+1 strategy works best, although it requires the largest computational time. Note that the mixed efficiency-ranked curve is not shown because it is identical to the pure efficiency-ranked curve. Key for magnetization curves: MC =  Monte Carlo, B+1 =  best+1, ERP =  pure efficiency-ranked, ERM =  mixed efficiency-ranked, EX =  exhausive search.

Fig. 8 shows the results for the unconstrained Inline graphic model of the IMR-90/A549 lung cell network. The search space for Inline graphic is much smaller than that for Inline graphic. The largest weakly connected differential subnetwork contains only 506 nodes (see Table 3), and the remaining differential nodes are islets or are in subnetworks composed of two nodes and are therefore unnecessary to consider. Of these 506 nodes, 450 are sinks. Fig. 9 shows the largest weakly connected component of the differential subnetwork, and the top five bottlenecks in the unconstrained case are shown in red. If limiting the search to differential kinases with Inline graphic and ignoring all sinks, Inline graphic has 19 possible targets. There is only one cycle cluster in the largest differential subnetwork, containing 6 nodes. Like the Inline graphic case, the optimal efficiency occurs when targeting the first node, which is the highest impact size 1 bottleneck. Because the mixed efficiency-ranked strategy gives the same results as the pure efficiency-ranked strategy, only the pure strategy was examined. The Monte Carlo strategy fares better in the unconstrained Inline graphic case because the search space is smaller. Additionally, the efficiency-ranked strategy does worse against the best+1 strategy for Inline graphic than it did for Inline graphic. This is because the effective edge deletion decreases the average indegree of the network and makes nodes easier to control indirectly. When many upstream bottlenecks are controlled, some of the downstream bottlenecks in the efficiency-ranked list can be indirectly controlled. Thus, controlling these nodes directly results in no change in the magnetization. This gives the plateaus shown for fixing nodes 9-10 and 12–15, for example.

Figure 8. Final cancer magnetizations for an unconstrained search on the lung cell network using p = 2.

Figure 8

As in the p = 1 case, the efficiency-ranked strategy outperforms the expensive Monte Carlo search. The plateaus in the efficiency-ranked strategy when fixing 9–10, 12–15, 20–21, etc. nodes are a result of targeting bottlenecks that are already indirectly controlled.

Table 3. Properties of the largest weakly connected differential subnetworks for all cell types.

Lung B
Properties I/A I/H N/D N/F N/L M/D M/F M/L
Nodes 506 667 684 511 841 621 457 742
Edges 846 1227 2855 1717 3962 2525 1501 3401
Sources and effective sources 30 34 12 11 9 9 9 12
Sinks and effective sinks 450 598 286 198 369 275 204 333
Av. outdegree 1.67 1.84 4.17 3.36 4.71 4.07 3.28 4.58
Max outdegree 52 51 155 143 336 138 132 292
Max indegree 8 10 40 29 49 35 27 44
Self-loops 27 31 0 0 0 0 0 0
Undirected edges 0 4 1238 738 1468 1000 596 1214
Diameter 9 9 12 15 12 13 14 12
Max cycle cluster size 6 3 351 280 397 305 199 337
Av. clustering coeff 0.0348 0.0421 0.1878 0.1973 0.2446 0.1751 0.1935 0.2389

I =  IMR-90 (normal), A =  A549 (cancer), H =  NCI-H358 (cancer), N =  Naïve (normal), M =  Memory (normal), D =  DLBCL (cancer), F =  Follicular lymphoma (cancer), L =  EBV-immortalized lymphoblastoma (cancer).

Figure 9. Largest weakly connected differential subnetwork for IMR-90/A549 and p = 2.

Figure 9

Out of the 506 pictured nodes, 450 are sinks and therefore have an impact equal to one. The top five bottlenecks are labeled with their gene names and colored orange.

The only case in which an exhaustive search is possible is for Inline graphic with constraints, which is shown in Fig. 10. Note that the polynomial-time best+1 strategy identifies the same set of nodes as the exponential-time exhaustive search. This is not surprising, however, since the constraints limit the available search space. This means that the Monte Carlo also does well. The efficiency-ranked method performs worst. The efficiency-ranked strategy is designed to be a heuristic strategy that scales gently, however, and is not expected to work well in such a small space when compared with more computationally expensive methods.

Figure 10. Final cancer magnetizations for a constrained search on the lung cell network using p = 2.

Figure 10

This is the only case in which a limited exhaustive search is possible. Interestingly, the exhaustive search locates the same nodes as the best+1 strategy for fixing up to eight nodes. The efficiency-ranked strategy performs poorly compared to the Monte Carlo strategy because the search space is small and a large portion of the available space is sampled by the Monte Carlo search.

B Cell Network

The B cell network was derived from the B cell interactome of Ref. [34]. The reconstruction method used in Ref. [34] removes edges from an initially complete network depending on pairwise gene expression correlation. Additionally, the original B cell network contains many protein-protein interactions (PPIs) as well as transcription factor-gene interactions (TFGIs). TFGIs have definite directionality: a transcription factor encoded by one gene affects the expression level of its target gene(s). PPIs, however, do not have obvious directionality. We first filtered these PPIs by checking if the genes encoding these proteins interacted according to the PhosphoPOINT/TRANSFAC network of the previous section, and if so, kept the edge as directed. If the remaining PPIs are ignored, the results for the B cell are similar to those of the lung cell network. We found more interesting results when keeping the remaining PPIs as undirected, as is discussed below.

Because of the network construction algorithm and the inclusion of many undirected edges, the B cell network is more dense (Inline graphic0.290% complete, see Table 2) than the lung cell network. This higher density leads to many more cycles than the lung cell network, and many of these cycles overlap to form one very large cycle cluster containing Inline graphic66% of nodes in the full network. All gene expression data used for B cell attractors was taken from Ref. [47]. We analyzed two types of normal B cells (naïve and memory) and three types of B cell cancers (diffuse large B-cell lymphoma (DLBCL), follicular lymphoma, and EBV-immortalized lymphoblastoma), giving six combinations in total. We present results for only the naïve/DLBCL combination below, but Tables 3 and 4 list the properties of all normal/cancer combinations. Again, all gene expression measurements for a given cell type were averaged together to produce a single attractor. The full B cell network is composed of 4364 nodes. For Inline graphic, there is one cycle cluster Inline graphic composed of 2886 nodes. This cycle cluster has Inline graphic Inline graphic and Inline graphic Finding Inline graphic was deemed too difficult.

Table 4. Best single genes and their impacts for the Inline graphic = 1 and Inline graphic = 2 models.

Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Gene Inline graphic Gene Inline graphic Gene Inline graphic Gene Inline graphic Gene Inline graphic Gene Inline graphic
I/A I/H
UNC HNF1A 29 OR5I1 35 HNF1A 29 HMX1 41
TMEM37 22 TMEM37 25 MAP3K3 18 PBX1 38
OR5I1 20 HNF1A 23 TP53 18 MYB 25
MAP3K14 19 POSTN 21 RUNX1 17 ITGB2 20
MAP3K3 18 RORA 18 RORA 16 TNFRSF10A 18
CON MAP3K14 19 SRC 15 TTN 16 BMPR1B 18
SRC 14 BMPR1B 7 RIPK3 6 LCK 8
N/D N/F N/L
UNC BCL6 12 NFIC 22 BCL6 12 NCOA1 20 RBL2 11 RBL2 22
MEF2A 5 TGIF1 19 MEF2A 5 NFATC3 15 FOXM1 8 ATF2 12
NCOA1 5 BCL6 14 NCOA1 5 BCL6 11 ATF2 7 NFATC3 11
TGIF1 4 FOXJ2 12 TGIF1 4 CEBPD 8 RXRA 5 RXRA 9
NFATC3 4 NFATC3 12 NFATC3 4 RELA 8 NFATC3 4 PATZ1 8
CON BUB1B 2 CSNK2A2 2 BUB1B 2 WEE1 2 BUB1B 2 PRKCD 2
AAK1 1 AKT1 2 AAK1 1 CSNK2A2 2 AAK1 1 AURKB 2
M/D M/F M/L
UNC BCL6 12 FOXJ2 12 BCL6 12 NCOA1 18 RBL2 11 RBL2 16
MEF2A 5 NFIC 12 MEF2A 5 BCL6 13 FOXM1 8 ATF2 10
NCOA1 5 BCL6 11 NCOA1 5 E2F3 9 ATF2 7 ZNF91 8
NFATC3 4 NCOA1 9 NFATC3 4 RUNX1 9 RXRA 5 STAT6 8
SMAD4 4 MEF2A 8 RELA 4 TFE3 7 TGIF1 4 FOXM1 8
CON AAK1 1 RIPK2 1 AAK1 1 ROCK2 2 AAK1 1 AURKB 2
RIPK2 1 MAST2 1 RIPK2 1 RIPK2 1 SCYL3 1 RIPK2 1

The unconstrained (UNC) and constrained (CON) case are shown. The constrained case refer to target that are kinases and are expressed in the cancer case. I =  IMR-90 (normal), A =  A549 (cancer), H =  NCI-H358 (cancer), N =  Naïve (normal), M =  Memory (normal), D =  DLBCL (cancer), F =  Follicular lymphoma (cancer), L =  EBV-immortalized lymphoblastoma (cancer).

Fig.11 shows the results for the unconstrained Inline graphic case. Again, the pure efficiency-ranked strategy gave the same results as the mixed efficiency-ranked strategy, so only the pure strategy was analyzed. As shown in Fig. 11, the Monte Carlo strategy is out-performed by both the efficiency-ranked and best+1 strategies. The synergistic effects of fixing multiple bottlenecks slowly becomes apparent as the best+1 and efficiency-ranked curves separate.

Figure 11. Final cancer magnetizations for an unconstrained search on the B cell network using p = 1.

Figure 11

The Monte Carlo strategy is ineffective for fixing any number of nodes. The efficiency-ranked and best+1 curves slowly separate because synergistic effects accumulate faster for best+1.

Fig. 12 shows the results for the unconstrained Inline graphic case. The largest weakly connected subnetwork contains one cycle cluster with 351 nodes, with Inline graphic. Although finding a set of critical nodes is difficult, the optimal efficiency for this cycle cluster is 62.2 for fixing 10 bottlenecks in the cycle cluster. This makes targeting the cycle cluster worthwhile. The efficiency of this set of 10 nodes is larger than the efficiencies of the first 10 nodes from the pure efficiency-ranked strategy, so the Inline graphic from the mixed strategy drops earlier than the pure strategy. Both strategies quickly identify a small set of nodes capable of controlling a significant portion of the differential network, however, and the same result is obtained for fixing more than 10 nodes. The best+1 strategy finds a smaller set of nodes that controls a similar fraction of the cycle cluster, and fixing more than 7 nodes results in only incremental decreases in Inline graphic. The Monte Carlo strategy performs poorly, never finding a set of nodes adequate to control a significant fraction of the nodes in the cycle cluster.

Figure 12. Final cancer magnetizations for an unconstrained search on the B cell network using p = 2.

Figure 12

The rather sudden drop in the magnetization between controlling 5 and 10 nodes in the efficiency-ranked strategies comes from flipping a significant portion of a cycle cluster. This is the only network examined in which the mixed efficiency-ranked strategy produces results different from the pure efficiency-ranked strategy.

Conclusions

Signaling models for large and complex biological networks are becoming important tools for designing new therapeutic methods for complex diseases such as cancer. Even if our knowledge of biological networks is incomplete, rapid progress is currently being made using reconstruction methods that use large amounts of publicly available omic data [12], [13]. The Hopfield model we use in our approach allows mapping of gene expression patterns of normal and cancer cells into stored attractor states of the signaling dynamics in directed networks. The role of each node in disrupting the network signaling can therefore be explicitly analyzed to identify isolated genes or sets of strongly connected genes that are selective in their action. We have introduced the concept of size Inline graphic bottlnecks to identify such genes. This concept led to the formulation of several heuristic strategies, such as the efficiency-ranked and best+1 strategy to find nodes that reduce the overlap of the cell network with a cancer attractor. Using this approach, we have located small sets of nodes in lung and B cancer cells which, when forced away from their initial states with local magnetic fields (representing targeted drugs), disrupt the signaling of the cancer cells while leaving normal cells in their original state. For networks with few targetable nodes, exhaustive searches or Monte Carlo searches can locate effective sets of nodes. For larger networks, however, these strategies become too cumbersome and our heuristic strategies represent a feasible alternative. For tree-like networks, the pure efficiency-ranked strategy works well, whereas the mixed efficiency-ranked strategy could be a better choice for networks with high-impact cycle clusters.

We make two important assumptions in applying this analysis to real biological systems. First, we assume that genes are either fully off or fully on, with no intermediate state. Modelling the state of a neuron as “all-or-none” has long been accepted as a reasonable assumption [48], which provided the spin glass framework for the Hopfield model. While similar switch-like behavior in gene regulatory networks has been proposed as an explanation of, for example, segmentation in Drosophila embryos [49], assigning a Boolean value to gene expression may be overly simplistic in many cases. A model which uses spins with more than two projections could prove to be more realistic and predictive. Second, we assume that all nodes update their status with a single timescale and with a single interaction strength. If the signaling timescale Inline graphic for each edge in the biological network is known, simulations could be conducted in which a signal traveling along an edge Inline graphic reaches its target after Inline graphic time steps. This would amount to a synchronous update schedule with a “queue” of signals moving between nodes. Likewise, our model gives equal weight to all edges (aside from edges that are effectively deleted in the Inline graphic case), whereas real gene regulatory networks exhibit a spectrum of interaction strengths. This can easily be integrated with our model by using a weighted, directed adjacency matrix. However, doing this would surely require a change in control strategy.

Despite these issues, our model shows promise. Some of the genes identified in Table 4 are consistent with current clinical and cancer biology knowledge. For instance, in the lung cancer list we found a well known tumor suppressor gene (TP53) [50] that is frequently mutated in many cancer types including lung cancer [51]. Mutations in PBX1 have recently been detected in non-small-cell lung cancer and this gene is now being considered as a target for therapy and prognosis [52]. MAP3K3 and MAP3K14 are in the MAPK/ERK pathway which is a target of many novel therapeutic agents [53], and SRC is a well known oncogene and a candidate target in lung cancer [54]. BCL6 (B-cell lymphoma 6) is the most common oncogene in DLBCL, and it is known that its expression can predict prognosis and response to drug therapy [55][57]. BCL6 is also frequently mutated in follicular lymphoma [58], [59]. Our analysis identified BCL6 as an important drug target for both DLBCL and follicular lymphoma using either naive or memory B-cells as a control for both Inline graphic and Inline graphic. RBL2 disregulation has been recently associated with many types of lymphoma [60][62]. FOXM1 is a potential therapeutic target in mature B cell tumors [63] and ATF2 has been recently found to be highly disregulated in lymphoma [64], [65]. Besides BCL6 discussed above, the N/D list for DLBCL contains genes (MEF2A [66], NCOA1 [67], [68], TGIF1 [69][71], NFATC3 [72]) that are all known to have a functional role in cancer, even if they have not been associated to the specific B-cell cancer types we have considered. Our predictions are for the immortalized cell lines we have selected, some of which are commonly used for in-vitro testing in many laboratories. RNAi and targeted drugs could then be used in these cell lines against the top scoring genes in Table 4 to test the disruption of survival or proliferative capacity. If experimentally validated, our analysis based on attractor states and bottlenecks could be applied to patient-derived cancer cells by integrating in the model patient gene expression data to identify patient-specific targets.

The above unconstrained searches assume that there exists some set of “miracle drugs” which can turn any gene “on” and “off” at will. This limitation can be patially taken into account by using constrained searches that limit the nodes that can be addressed. However, even the constrained search results are unrealistic, since most drugs directly target more than one gene. Inhibitors, for example, could target differential nodes with Inline graphic and Inline graphic, which would damage only normal cells. Additionally, drugs would not be restricted to target only differential nodes, and certain combinations could be toxic to both normal and cancer cells. Few cancer treatments involve the use of a single drug, and the synergistic effects of combining multiple drugs adds yet another level of complication to finding an effective treatment [27]. On the other hand, the intrinsic nonlinearity of a cellular signaling network, with its inherent structure of attractor states, enhances control [31] so that a properly selected set of druggable targets might be sufficient for robust control.

Supporting Information

Table S1

Lung cell network. The column labeled “Source EzID” contains the Entrez IDs of transcription factors and kinases, and “Target EzID” contains the Entrez IDs of the genes targeted by the transcription factor or kinase to its left.

(TXT)

Table S2

IMR-90/A549 attractors for lung cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S3

IMR-90/NCI-H358 attractors for lung cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S4

B cell network. The column labeled “Source EzID” contains the Entrez IDs of transcription factors and kinases, and “Target EzID” contains the Entrez IDs of the genes targeted by the transcription factor or kinase to its left.

(TXT)

Table S5

Memory/DLBCL attractors for B cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S6

Memory/EBV-immortalized lymphoblastoma attractors for B cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S7

Memory/follicular lymphoma attractors for B cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S8

Naïve/DLBCL attractors for B cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S9

Naïve/EBV-immortalized lymphoblastoma attractors for B cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S10

Naïve/follicular lymphoma attractors for B cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Acknowledgments

We thank Andrew Hodges and Jacob Feala for help with biological datasets. Correspondence and requests for materials should be addressed to carlo@pa.msu.edu or szedlak1@msu.edu.

Data Availability

The authors confirm that all data underlying the findings are fully available without restriction. All relevant data are within the paper and its Supporting Information files.

Funding Statement

The authors acknowledge support from the Congressionally Directed Medical Research Program (DOD, http://cdmrp.army.mil) Lung Cancer Research (W81XWH-12-1-0233) and NIH/NCI (Grant 1R41CA174059-01). Salgomed Inc., provided support in the form of salaries for authors G.P. and C.P., but did not have any additional role in the study design, data collection and analysis, decision to publish, or preparation of the manuscript. The specific roles of these authors are articulated in the ‘author contributions’ section.

References

  • 1. Hopfield J (1982) Neural networks and physical systems with emergent collective computational abilities. Proc Nat Acad Sci USA 79: 2554–2558. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 2. Amit D, Gutfreund H, Sompolinsky H (1985) Spin-glass models of neural networks. Phys Rev A 32: 1007. [DOI] [PubMed] [Google Scholar]
  • 3. Derrida B, Gardner E, Zippelius A (1987) An exactly solvable asymmetric neural network model. Europhys Lett) 4: 167. [Google Scholar]
  • 4.Lang AH, Li H, Collins JJ, Mehta P (2012) Epigenetic landscapes explain partially reprogrammed cells and identify key reprogramming genes. ArXiv e-prints: arXiv: 1211.3133v3. [DOI] [PMC free article] [PubMed]
  • 5. Anafi RC, Bates JHT (2010) Balancing robustness against the dangers of multiple attractors in a hopfield-type model of biological attractors. PLoS ONE 5: e14413. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 6. Aldana M, Coppersmith S, Kadanoff L (2003) Boolean dynamics with random couplings. In: Perspectives and Problems in Nonlinear Sciences, Springer pp. 23–89. [Google Scholar]
  • 7. Kauffman S (1969) Metabolic stability and epigenesis in randomly constructed genetic nets. J Theor Biol 22: 437–467. [DOI] [PubMed] [Google Scholar]
  • 8. Amari S, Ando H, Toyoizumi T, Masuda N (2013) State concentration exponent as a measure of quickness in kauffman-type networks. Phys Rev E 87: 022814. [DOI] [PubMed] [Google Scholar]
  • 9. Rohlf T, Bornholdt S (2009) Self-organized criticality and adaptation in discrete dynamical networks. In: Adaptive Networks, Springer pp. 73–106. [Google Scholar]
  • 10. Kürten K (1988) Correspondence between neural threshold networks and kauffman boolean cellular automata. J Phys A 21: L615. [Google Scholar]
  • 11. Kürten K (1988) Critical phenomena in model neural networks. Phys Lett A 129: 157–160. [Google Scholar]
  • 12. De Smet R, Marchal K (2010) Advantages and limitations of current network inference methods. Nature Rev Microbiol 8: 717–729. [DOI] [PubMed] [Google Scholar]
  • 13. Hartemink A (2005) Reverse engineering gene regulatory networks. Nature Biotechnol 23: 554–555. [DOI] [PubMed] [Google Scholar]
  • 14. Bullinger L, Döhner K, Bair E, Fröhling S, Schlenk R, et al. (2004) Use of gene-expression profiling to identify prognostic subclasses in adult acute myeloid leukemia. New Engl J Med 350: 1605–1616. [DOI] [PubMed] [Google Scholar]
  • 15. Eppert K, Takenaka K, Lechman E, Waldron L, Nilsson B, et al. (2011) Stem cell gene expression programs influence clinical outcome in human leukemia. Nature Med 17: 1086–1093. [DOI] [PubMed] [Google Scholar]
  • 16. Huang S, Eichler G, Bar-Yam Y, Ingber D (2005) Cell fates as high-dimensional attractor states of a complex gene regulatory network. Phys Rev Lett 94: 128701. [DOI] [PubMed] [Google Scholar]
  • 17. Sui H, Ernberg I, Kauffman S (2009) Cancer attractors: A systems view of tumors from a gene network dynamics and developmental perspective. Sem Cell Dev Biol 20: 869–876. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 18. Ao P, Galas D, Hood L, Zhu X (2008) Cancer as robust intrinsic state of endogenous molecular-cellular network shaped by evolution. Med Hypotheses 70: 678–684. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 19. Feala J, Cortes J, Duxbury P, Piermarocchi C, McCulloch A, et al. (2010) Systems approaches and algorithms for discovery of combinatorial therapies. Wiley Interdisciplinary Reviews: Systems Biology and Medicine 2: 181–193. [DOI] [PubMed] [Google Scholar]
  • 20. Creixell P, Schoof EM, Erler J, Linding R (2012) Navigating cancer network attractors for tumor-specific therapy. Nature Biotechnol 30: 842–848. [DOI] [PubMed] [Google Scholar]
  • 21. Calzolari D, Paternostro G, Harrington P Jr, Piermarocchi C, Duxbury P (2007) Selective control of the apoptosis signaling network in heterogeneous cell populations. PLoS ONE 2: e547. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 22. Ágoston V, Csermely P, Pongor S (2005) Multiple weak hits confuse complex systems: a transcriptional regulatory network as an example. Phys Rev E 71: 051909. [DOI] [PubMed] [Google Scholar]
  • 23. Csermely P, Ágoston V, Pongor S (2005) The effciency of multi-target drugs: the network approach might help drug design. Trends in Pharmacological Sciences 26: 178–182. [DOI] [PubMed] [Google Scholar]
  • 24.Sontag E (1998) Mathematical control theory: deterministic finite dimensional systems, volume 6. Springer.
  • 25. Akutsu T, Hayashida M, Ching W, Ng M (2007) Control of boolean networks: hardness results and algorithms for tree structured networks. J Theor Biol 244: 670–679. [DOI] [PubMed] [Google Scholar]
  • 26. Choudhary A, Datta A, Bittner M, Dougherty E (2006) Intervention in a family of boolean networks. Bioinformatics 22: 226–232. [DOI] [PubMed] [Google Scholar]
  • 27. Feala J, Cortes J, Duxbury P, McCulloch A, Piermarocchi C, et al. (2012) Statistical properties and robustness of biological controller-target networks. PLoS ONE 7: e29374. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 28. Bhardwaj N, Carson M, Abyzov A, Yan KK, Lu H, et al. (2010) Analysis of combinatorial regulation: scaling of partnerships between regulators with the number of governed targets. PLoS Comp Biol 6: e1000755. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 29. Liu YY, Slotine JJ, Barabási AL (2011) Controllability of complex networks. Nature 473: 167–173. [DOI] [PubMed] [Google Scholar]
  • 30.Plummer MD, Lovász L (1986) Matching theory. Elsevier.
  • 31. Cornelius S, Kath W, Motter A (2013) Realistic control of network dynamics. Nature Commun 4: 1–9. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 32. Yang CY, Chang CH, Yu YL, Lin TCE, Lee SA, et al. (2008) Phosphopoint: a comprehensive human kinase interactome and phospho-protein database. Bioinformatics 24: i14–i20. [DOI] [PubMed] [Google Scholar]
  • 33. Matys V, Fricke E, Geffers R, Gössling E, Haubrock M, et al. (2003) Transfac: transcriptional regulation, from patterns to profiles. Nucleic Acids Res 31: 374–378. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 34. Lefebvre C, Rajbhandari P, Alvarez M, Bandaru P, Lim W, et al. (2010) A human b-cell interactome identifies myb and foxm1 as master regulators of proliferation in germinal centers. Mol Syst Biol 6. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 35. Cohen P (2002) Protein kinases - the major drug targets of the twenty-first century? Nature Rev Drug Discov 1: 309–315. [DOI] [PubMed] [Google Scholar]
  • 36. Ravasz E, Somera A, Mongru D, Oltvai Z, Barabási AL (2002) Hierarchical organization of modularity in metabolic networks. Science 297: 1551–1555. [DOI] [PubMed] [Google Scholar]
  • 37. Girvan M, Newman MEJ (2002) Community structure in social and biological networks. Proc Nat Acad Sci USA 99: 7821–7826. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 38. Shen-Orr S, Milo R, Mangan S, Alon U (2002) Network motifs in the transcriptional regulation network of escherichia coli. Nature Genet 31: 64–68. [DOI] [PubMed] [Google Scholar]
  • 39. Luscombe N, Babu M, Yu H, Snyder M, Teichmann S, et al. (2004) Genomic analysis of regulatory network dynamics reveals large topological changes. Nature 431: 308–312. [DOI] [PubMed] [Google Scholar]
  • 40.Munoz J, Low TY, Kok YJ, Chin A, Frese CK, et al.. (2011) The quantitative proteomes of human-induced pluripotent stem cells and embryonic stem cells. Molecular systems biology 7. [DOI] [PMC free article] [PubMed]
  • 41. Muggerud AA, Edgren H, Wolf M, Kleivi K, Dejeux E, et al. (2009) Data integration from two microarray platforms identifies bi-allelic genetic inactivation of ric8a in a breast cancer cell line. BMC medical genomics 2: 26. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 42. Wagner KW, Punnoose EA, Januario T, Lawrence DA, Pitti RM, et al. (2007) Death-receptor o-glycosylation controls tumor-cell sensitivity to the proapoptotic ligand apo2l/trail. Nature medicine 13: 1070–1077. [DOI] [PubMed] [Google Scholar]
  • 43. Stinson S, Lackner MR, Adai AT, Yu N, Kim HJ, et al. (2011) Trps1 targeting by mir-221/222 promotes the epithelial-to-mesenchymal transition in breast cancer. Science Signaling 4: ra41. [DOI] [PubMed] [Google Scholar]
  • 44. Hussain M, Rao M, Humphries AE, Hong JA, Liu F, et al. (2009) Tobacco smoke induces polycomb-mediated repression of dickkopf-1 in lung cancer cells. Cancer research 69: 3570–3578. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 45. Muzikar KA, Nickols NG, Dervan PB (2009) Repression of dna-binding dependent glucocorticoid receptor-mediated gene expression. Proceedings of the National Academy of Sciences 106: 16598–16603. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 46. Sartor MA, Mahavisno V, Keshamouni VG, Cavalcoli J, Wright Z, et al. (2010) Conceptgen: a gene set enrichment and gene set relation mapping tool. Bioinformatics 26: 456–463. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 47. Compagno M, Lim WK, Grunn A, Nandula SV, Brahmachary M, et al. (2009) Mutations of multiple genes cause deregulation of nf-κb in diffuse large b-cell lymphoma. Nature 459: 717–721. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 48. McCulloch W, Pitts W (1943) A logical calculus of the ideas immanent in nervous activity. The bulletin of mathematical biophysics 5: 115–133. [PubMed] [Google Scholar]
  • 49.Krotov D, Dubuis JO, Gregor T, Bialek W (2014) Morphogenesis at criticality. Proceedings of the National Academy of Sciences. [DOI] [PMC free article] [PubMed]
  • 50. Baker S, Fearon E, Nigro JM, Preisinger A, Jessup J, et al. (1989) Chromosome 17 deletions and p53 gene mutations in colorectal carcinomas. Science 244: 217–221. [DOI] [PubMed] [Google Scholar]
  • 51. Takahashi T, Nau M, Chiba I, Birrer M, Rosenberg R, et al. (1989) p53: a frequent target for genetic abnormalities in lung cancer. Science 246: 491–494. [DOI] [PubMed] [Google Scholar]
  • 52. Mo ML, Chen Z, Zhou HM, Li H, Hirata T, et al. (2013) Detection of e2a-pbx1 fusion transcripts in human non-small-cell lung cancer. J Exp Clin Canc Res 32: 29. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 53. Montagut C, Settleman J (2009) Targeting the raf-mek-erk pathway in cancer therapy. Canc Lett 283: 125–134. [DOI] [PubMed] [Google Scholar]
  • 54. Rothschild S, Gautschi O, Haura E, Johnson F (2010) Src inhibitors in lung cancer: current status and future directions. Clin Lung Canc 11: 238–242. [DOI] [PubMed] [Google Scholar]
  • 55. Hans C, Weisenburger D, Greiner T, Gascoyne R, Delabie J, et al. (2004) Confirmation of the molecular classification of diffuse large b-cell lymphoma by immunohistochemistry using a tissue microarray. Blood 103: 275–282. [DOI] [PubMed] [Google Scholar]
  • 56. Rosenwald A, Wright G, Chan W, Connors JM, Campo E, et al. (2002) The use of molecular profiling to predict survival after chemotherapy for diffuse large-b-cell lymphoma. New Engl J Med 346: 1937–1947. [DOI] [PubMed] [Google Scholar]
  • 57. Winter J, Weller E, Horning S, Krajewska M, Variakojis D, et al. (2006) Prognostic significance of bcl-6 protein expression in dlbcl treated with chop or r-chop: a prospective correlative study. Blood 107: 4207–4213. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 58. Diaz-Alderete A, Doval A, Camacho F, Verde L, Sabin P, et al. (2008) Frequency of bcl2 and bcl6 translocations in follicular lymphoma: relation with histological and clinical features. Leukemia Lymphoma 49: 95–101. [DOI] [PubMed] [Google Scholar]
  • 59. Akasaka T, Lossos I, Levy R (2003) Bcl6 gene translocation in follicular lymphoma: a harbinger of eventual transformation to diffuse aggressive lymphoma. Blood 102: 1443–1448. [DOI] [PubMed] [Google Scholar]
  • 60. Wang L, Pal S, Sif S (2008) Protein arginine methyltransferase 5 suppresses the transcription of the rb family of tumor suppressors in leukemia and lymphoma cells. Mol Cell Biol 28: 6262–6277. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 61. De Falco G, Leucci E, Lenze D, Piccaluga P, Claudio P, et al. (2007) Gene-expression analysis identifies novel rbl2/p130 target genes in endemic burkitt lymphoma cell lines and primary tumors. Blood 110: 1301–1307. [DOI] [PubMed] [Google Scholar]
  • 62. Piccaluga P, De Falco G, Kustagi M, Gazzola A, Agostinelli C, et al. (2011) Gene expression analysis uncovers similarity and differences among burkitt lymphoma subtypes. Blood 117: 3596–3608. [DOI] [PubMed] [Google Scholar]
  • 63. Tompkins V, Han SS, Olivier A, Syrbu S, Bair T, et al. (2013) Identification of candidate b-lymphoma genes by cross-species gene expression profiling. PLoS ONE 8: e76889. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 64. Valdez B, Zander A, Song G, Murray D, Nieto Y, et al. (2014) Synergistic cytotoxicity of gemcitabine, clofarabine and edelfosine in lymphoma cell lines. Blood Canc J 4: e171. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 65. Walczynski J, Lyons S, Jones N, Breitwieser W (2013) Sensitisation of c-myc-induced b-lymphoma cells to apoptosis by atf2. Oncogene 33: 1027–1036. [DOI] [PubMed] [Google Scholar]
  • 66. Bai X, Wu L, Liang T, Liu Z, Li J, et al. (2008) Overexpression of myocyte enhancer factor 2 and histone hyperacetylation in hepatocellular carcinoma. J Canc Res Clinic Oncol 134: 83–91. [DOI] [PubMed] [Google Scholar]
  • 67. Fabris S, Mosca L, Cutrona G, Lionetti M, Agnelli L, et al. (2013) Chromosome 2p gain in monoclonal b-cell lymphocytosis and in early stage chronic lymphocytic leukemia. Am J Hemat 88: 24–31. [DOI] [PubMed] [Google Scholar]
  • 68. Zhang Y, Duan C, Bian C, Xiong Y, Zhang J (2013) Steroid receptor coactivator-1: A versatile regulator and promising therapeutic target for breast cancer. J Steroid Biochem 138: 17. [DOI] [PubMed] [Google Scholar]
  • 69. Hamid R, Brandt S (2009) Transforming growth-interacting factor tgif regulates proliferation and differentiation of human myeloid leukemia cells. Mol Oncol 3: 451–463. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 70. Libório T, Ferreira EN, Aquino Xavier FC, Carraro DM, Kowalski LP, et al. (2013) Tgif1 splicing variant 8 is overexpressed in oral squamous cell carcinoma and is related to pathologic and clinical behavior. Oral Surg Oral Med 116: 614–625. [DOI] [PubMed] [Google Scholar]
  • 71. Bengoechea-Alonso M, Ericsson J (2010) Tumor suppressor fbxw7 regulates tgifβ signaling by targeting tgif1 for degradation. Oncogene 29: 5322–5328. [DOI] [PubMed] [Google Scholar]
  • 72. Glud SZ, Sörensen AB, Andrulis M, Wang B, Kondo E, et al. (2005) A tumor-suppressor function for nfatc3 in t-cell lymphomagenesis by murine leukemia virus. Blood 106: 3546–3552. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 73. Fagiolo G (2007) Clustering in complex directed networks. Phys Rev E 76: 026107. [DOI] [PubMed] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Supplementary Materials

Table S1

Lung cell network. The column labeled “Source EzID” contains the Entrez IDs of transcription factors and kinases, and “Target EzID” contains the Entrez IDs of the genes targeted by the transcription factor or kinase to its left.

(TXT)

Table S2

IMR-90/A549 attractors for lung cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S3

IMR-90/NCI-H358 attractors for lung cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S4

B cell network. The column labeled “Source EzID” contains the Entrez IDs of transcription factors and kinases, and “Target EzID” contains the Entrez IDs of the genes targeted by the transcription factor or kinase to its left.

(TXT)

Table S5

Memory/DLBCL attractors for B cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S6

Memory/EBV-immortalized lymphoblastoma attractors for B cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S7

Memory/follicular lymphoma attractors for B cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S8

Naïve/DLBCL attractors for B cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S9

Naïve/EBV-immortalized lymphoblastoma attractors for B cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Table S10

Naïve/follicular lymphoma attractors for B cell network. The column labeled “EzID” contains the Entrez ID of the genes. The second and third columns are the normal and cancer attractor, respectively.

(TXT)

Data Availability Statement

The authors confirm that all data underlying the findings are fully available without restriction. All relevant data are within the paper and its Supporting Information files.


Articles from PLoS ONE are provided here courtesy of PLOS

RESOURCES