20 results on '"Ollinger, N."'
Search Results
2. Bulking I: An abstract theory of bulking
- Author
-
Delorme, M., Mazoyer, J., Ollinger, N., and Theyssier, G.
- Published
- 2011
- Full Text
- View/download PDF
3. Four states are enough!
- Author
-
Ollinger, N. and Richard, G.
- Published
- 2011
- Full Text
- View/download PDF
4. Catalytic space: non-determinism and hierarchy
- Author
-
Buhrman, H., Koucký, M., Loff, B., Speelman, F., Ollinger, N., Vollmer, H., ILLC (FNWI), Quantum Matter and Quantum Information, and Logic and Computation (ILLC, FNWI/FGw)
- Subjects
Discrete mathematics ,000 Computer science, knowledge, general works ,TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES ,Hierarchy (mathematics) ,Computation ,Model of computation ,0102 computer and information sciences ,02 engineering and technology ,Computer Science::Computational Complexity ,Space (mathematics) ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,Set (abstract data type) ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,Theory of computation ,Computer Science ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Auxiliary memory ,Complement (set theory) ,Mathematics - Abstract
Catalytic computation, defined by Buhrman, Cleve, Koucký, Loff and Speelman (STOC 2014), is a space-bounded computation where in addition to our working memory we have an exponentially larger auxiliary memory which is full; the auxiliary memory may be used throughout the computation, but it must be restored to its initial content by the end of the computation. Motivated by the surprising power of this model, we set out to study the non-deterministic version of catalytic computation. We establish that non-deterministic catalytic log-space is contained in ZPP, which is the same bound known for its deterministic counterpart, and we prove that non-deterministic catalytic space is closed under complement (under a standard derandomization assumption). Furthermore, we establish hierarchy theorems for non-deterministic and deterministic catalytic computation.
- Published
- 2016
5. Constrained bipartite vertex cover
- Author
-
Jansen, B.M.P., Ollinger, N., Vollmer, H., and Algorithms, Geometry and Applications
- Subjects
000 Computer science, knowledge, general works ,Computer Science ,Constrained Bipartite Vertex Cover ,Kernel lower bounds - Abstract
The CONSTRAINED BIPARTITE VERTEX COVER problem asks, for a bipartite graph G with partite sets A and B, and integers kA and kB, whether there is a vertex cover for G containing at most kA vertices from A and kB vertices from B. The problem has an easy kernel with 2ka · kb edges and 4kA · kb vertices, based on the fact that every vertex in A of degree more than kB has to be included in the solution, together with every vertex in B of degree more than kA. We show that the number of vertices and edges in this kernel are asymptotically essentially optimal in terms of the product kA· kB. We prove that if there is a polynomial-time algorithm that reduces any instance (G,A,B, kA, kB) of CONSTRAINED BIPARTITE VERTEX COVER to an equivalent instance (G', A', B', k'A, k'B) such that k'A ∈ (kA) O1(kB), k'B ∈ (kB)O(1), and |V(G')| ∈ O((kB · kB)1 -ε), for some ε > 0, then NP ⊆ coNP/poly and the polynomial-time hierarchy collapses. Using a different construction, we prove that if there is a polynomial-time algorithm that reduces any n-vertex instance into an equivalent instance (of a possibly different problem) that can be encoded in O(n2-ε) bits, then NP ⊆ coNP/poly.
- Published
- 2016
6. Dense subset sum may be the hardest
- Author
-
Austrin, P., Kaski, P., Koivisto, M., Nederlof, J., Ollinger, N., Vollmer, H., Discrete Mathematics, Combinatorial Optimization 1, Ollinger, Nicolas, Vollmer, Heribert, KTH Royal Institute of Technology, Department of Computer Science, Helsinki Institute for Information Technology HIIT, Eindhoven University of Technology, Aalto-yliopisto, and Aalto University
- Subjects
FOS: Computer and information sciences ,Additive combinatorics ,Discrete Mathematics (cs.DM) ,Computer Science - Information Theory ,cs.DM ,0102 computer and information sciences ,02 engineering and technology ,Computational Complexity (cs.CC) ,01 natural sciences ,cs.IT ,Computer Science - Data Structures and Algorithms ,0202 electrical engineering, electronic engineering, information engineering ,Data Structures and Algorithms (cs.DS) ,math.IT ,ta113 ,000 Computer science, knowledge, general works ,cs.CC ,Information Theory (cs.IT) ,Subset Sum ,Computer Science - Computational Complexity ,cs.DS ,Exponential-time algorithm ,010201 computation theory & mathematics ,Computer Science ,Littlewood-offord problem ,020201 artificial intelligence & image processing ,Homomorphic hashing ,Computer Science - Discrete Mathematics - Abstract
The Subset Sum problem asks whether a given set of $n$ positive integers contains a subset of elements that sum up to a given target $t$. It is an outstanding open question whether the $O^*(2^{n/2})$-time algorithm for Subset Sum by Horowitz and Sahni [J. ACM 1974] can be beaten in the worst-case setting by a "truly faster", $O^*(2^{(0.5-\delta)n})$-time algorithm, with some constant $\delta > 0$. Continuing an earlier work [STACS 2015], we study Subset Sum parameterized by the maximum bin size $\beta$, defined as the largest number of subsets of the $n$ input integers that yield the same sum. For every $\epsilon > 0$ we give a truly faster algorithm for instances with $\beta \leq 2^{(0.5-\epsilon)n}$, as well as instances with $\beta \geq 2^{0.661n}$. Consequently, we also obtain a characterization in terms of the popular density parameter $n/\log_2 t$: if all instances of density at least $1.003$ admit a truly faster algorithm, then so does every instance. This goes against the current intuition that instances of density 1 are the hardest, and therefore is a step toward answering the open question in the affirmative. Our results stem from novel combinations of earlier algorithms for Subset Sum and a study of an extremal question in additive combinatorics connected to the problem of Uniquely Decodable Code Pairs in information theory., Comment: 14 pages
- Published
- 2016
7. Subset sum in the absence of concentration
- Author
-
Austrin, P., Kaski, P., Koivisto, M., Nederlof, J., Mayr, E.W., Ollinger, N., Mayr, Ernst W., Ollinger, Nicolas, Department of Computer Science, Aalto-yliopisto, Aalto University, Stochastic Operations Research, Discrete Mathematics, and Combinatorial Optimization 1
- Subjects
000 Computer science, knowledge, general works ,Littlewood--Offord problem ,Computer Science ,exponential-time algorithm ,additive combinatorics ,subset sum ,homomorphic hashing - Abstract
We study the exact time complexity of the Subset Sum problem. Our focus is on instances that lack additive structure in the sense that the sums one can form from the subsets of the given integers are not strongly concentrated on any particular integer value. We present a randomized algorithm that runs in O(2^0.3399nB^4) time on instances with the property that no value can arise as a sum of more than B different subsets of the n given integers. eywords: subset sum, additive combinatorics, exponential-time algorithm, homomorphic hashing, Littlewood--Offord problem
- Published
- 2015
8. Automata on the plane vs particles and collisions
- Author
-
Ollinger, N. and Richard, G.
- Published
- 2009
- Full Text
- View/download PDF
9. The commutation of finite sets: a challenging problem
- Author
-
Choffrut, C., Karhumaki, J., and Ollinger, N.
- Published
- 2002
- Full Text
- View/download PDF
10. On matrix powering in low dimensions
- Author
-
Galby, Esther, Ouaknine, Joël, Worrell, James, Mayr, E, and Ollinger, N
- Subjects
000 Computer science, knowledge, general works ,Computer Science - Abstract
We investigate the Matrix Powering Positivity Problem, PosMatPow: given an m X m square integer matrix M, a linear function f: Z^{m X m} -> Z with integer coefficients, and a positive integer n (encoded in binary), determine whether f(M^n) \geq 0. We show that for fixed dimensions m of 2 and 3, this problem is decidable in polynomial time.
- Published
- 2017
11. A catalog of ∃ℝ-complete decision problems about Nash equilibria in multi-player games
- Author
-
Bilò, Vittorio, Mavronicolas, Marios, Vollmer H., and Ollinger N.
- Subjects
Computation theory ,000 Computer science, knowledge, general works ,Multiplayer games ,Telecommunication networks ,Complexity of equilibria ,Computer games ,Explicit formulation ,0102 computer and information sciences ,02 engineering and technology ,NP Complete ,01 natural sciences ,Decision theory ,Nash equilibria ,Nash equilibrium ,010201 computation theory & mathematics ,Computer Science ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Decision problems ,Computing system ,∃ℝ-completeness ,Complete problems ,Game theory ,Aluminum - Abstract
[Schaefer and Štefankovic, Theory of Computing Systems, 2015] provided an explicit formulation of ∃ℝ as the class capturing the complexity of deciding the Existential Theory of the Reals, and established that deciding, given a 3-player game, whether or not it has a Nash equilibrium with no probability exceeding a given rational is ∃ℝ-complete. Four more decision problems about Nash equilibria for 3-player games were very recently shown ∃ℝ-complete via a chain of individual, problem-specific reductions in [Garg et al., Proceedings of ICALP 2015] determining more such ∃ℝ-complete problems was posed there as an open problem. In this work, we deliver an extensive catalog of ∃ℝ-complete decision problems about Nash equilibria in 3-player games, thus resolving completely the open problem from [Garg et al., Proceedings of ICALP 2015]. Towards this end, we present a single and very simple, unifying reduction from the ∃ℝ-complete decision problem from [Schaefer and Štefankovic, Theory of Computing Systems, 2015] to (almost) all the decision problems about Nash equilibria that were before shown NP-complete for 2-player games in [Bilò and Mavronicolas, Proceedings of SAGT 2012 Conitzer and Sandholm, Games and Economic Behavior, 2008 Gilboa and Zemel, Games and Economic Behavior, 1989]. Encompassed in the catalog are the four decision problems shown ∃ℝ-complete in [Garg et al., Proceedings of ICALP 2015]. © Vittorio Bilò and Marios Mavronicolas licensed under Creative Commons License CC-BY. 47 Sponsors: Conference code: 119274 Cited By :4
- Published
- 2016
12. Packing groups of items into multiple knapsacks
- Author
-
Guochuan Zhang, Lin Chen, Vollmer, H, and Ollinger, N
- Subjects
000 Computer science, knowledge, general works ,021103 operations research ,Bin packing problem ,0211 other engineering and technologies ,Parameterized complexity ,QA75 Electronic computers. Computer science / számítástechnika, számítógéptudomány ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Combinatorics ,Mathematics (miscellaneous) ,010201 computation theory & mathematics ,Knapsack problem ,Bounded function ,Computer Science ,Mathematics - Abstract
We consider a natural generalization of the classical multiple knapsack problem in which instead of packing single items we are packing groups of items. In this problem, we have multiple knapsacks and a set of items partitioned into groups. Each item has an individual weight, while the profit is associated with groups rather than items. The profit of a group can be attained if and only if every item of this group is packed. Such a general model finds applications in various practical problems, e.g., delivering bundles of goods. The tractability of this problem relies heavily on how large a group could be. Deciding if a group of items of total weight 2 could be packed into two knapsacks of unit capacity is already NP -hard and it thus rules out a constant-approximation algorithm for this problem in general. We then focus on the parameterized version where the total weight of items in each group is bounded by a factor δ of the total capacity of all knapsacks. Both approximation and inapproximability results with respect to δ are derived. We also show that, depending on whether the number of knapsacks is a constant or part of the input, the approximation ratio for the problem, as a function on δ, changes substantially, which has a clear difference from the classical multiple knapsack problem.
- Published
- 2016
13. Time-Approximation Trade-offs for Inapproximable Problems
- Author
-
Michael Lampis, Vangelis Th. Paschos, Édouard Bonnet, Modèles de calcul, Complexité, Combinatoire (MC2), Laboratoire de l'Informatique du Parallélisme (LIP), École normale supérieure - Lyon (ENS Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Lyon (ENS Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS), Laboratoire d'analyse et modélisation de systèmes pour l'aide à la décision (LAMSADE), Université Paris Dauphine-PSL, Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Centre National de la Recherche Scientifique (CNRS), Department of Computer Science [Beer-Sheva], Ben-Gurion University of the Negev (BGU), Centre National de la Recherche Scientifique (CNRS)-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École normale supérieure - Lyon (ENS Lyon)-Centre National de la Recherche Scientifique (CNRS)-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École normale supérieure - Lyon (ENS Lyon), École normale supérieure de Lyon (ENS de Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure de Lyon (ENS de Lyon)-Université Claude Bernard Lyon 1 (UCBL), Ollinger, N, Vollmer, H, Institute for Computer Science and Control [Budapest] (SZTAKI), and Hungarian Academy of Sciences (MTA)
- Subjects
FOS: Computer and information sciences ,[INFO.INFO-CC]Computer Science [cs]/Computational Complexity [cs.CC] ,Polynomial ,Induced path ,Computer Networks and Communications ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,Vertex cover ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,Computational Complexity (cs.CC) ,Hardness of approximation ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,Exponential algorithms ,Dominating set ,Computer Science - Data Structures and Algorithms ,Polynomial and Subexponential Approximation ,0202 electrical engineering, electronic engineering, information engineering ,Data Structures and Algorithms (cs.DS) ,[INFO]Computer Science [cs] ,Approximation ,Time complexity ,ComputingMilieux_MISCELLANEOUS ,Reduction ,Mathematics ,000 Computer science, knowledge, general works ,Applied Mathematics ,Approximation algorithm ,QA75 Electronic computers. Computer science / számítástechnika, számítógéptudomány ,Set cover problem ,021107 urban & regional planning ,Complexity ,Sub-exponential algorithms ,Approximation algorithms ,Computer Science - Computational Complexity ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,Computer Science ,020201 artificial intelligence & image processing ,Inapproximability - Abstract
In this paper we focus on problems which do not admit a constant-factor approximation in polynomial time and explore how quickly their approximability improves as the allowed running time is gradually increased from polynomial to (sub-)exponential. We tackle a number of problems: For Min Independent Dominating Set, Max Induced Path, Forest and Tree, for any r(n), a simple, known scheme gives an approximation ratio of r in time roughly rn/r. We show that, for most values of r, if this running time could be significantly improved the ETH would fail. For Max Minimal Vertex Cover we give a nontrivial √r-approximation in time 2n/r. We match this with a similarly tight result. We also give a log r-approximation for Min ATSP in time 2n/r and an r-approximation for Max Grundy Coloring in time rn/r. Furthermore, we show that Min Set Cover exhibits a curious behavior in this superpolynomial setting: for any δ > 0 it admits an mδ-approximation, where m is the number of sets, in just quasi-polynomial time. We observe that if such ratios could be achieved in polynomial time, the ETH or the Projection Games Conjecture would fail. © Édouard Bonnet, Michael Lampis and Vangelis Th. Paschos; licensed under Creative Commons License CC-BY.
- Published
- 2015
14. Mycotoxin contamination in moldy slices of bread is mostly limited to the immediate vicinity of the visible infestation.
- Author
-
Ollinger N, Malachova A, Sulyok M, Krska R, and Weghuber J
- Abstract
Bread is an important staple food that is susceptible to spoilage, making it one of the most wasted foods. To determine the safety of partially moldy bread, five types of bread were inoculated with common mold species. After incubation, the metabolite profile was determined in and under the inoculation spot, as well as at a lateral distance of 3 cm from the moldy spot. The result showed that the metabolites were exclusively concentrated in the inoculation area and directly below the inoculation area. The only exception was citrinin, a mycotoxin produced by Penicillia such as Penicillium citrinum , which was detected in almost all tested bread areas when inoculated with the corresponding strains. The results of our study suggest that the removal of moldy parts may be a solution to reduce food waste if the remaining bread is to be used, for example for insect farming to produce animal feed., Competing Interests: The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper., (© 2024 The Author(s).)
- Published
- 2024
- Full Text
- View/download PDF
15. High-Oleic Sunflower Oil as a Potential Substitute for Palm Oil in Sugar Coatings-A Comparative Quality Determination Using Multispectral Imaging and an Electronic Nose.
- Author
-
Ollinger N, Blank-Landeshammer B, Schütz-Kapl L, Rochard A, Pfeifenberger I, Carstensen JM, Müller M, and Weghuber J
- Abstract
Palm oil has a bad reputation due to the exploitation of farmers and the destruction of endangered animal habitats. Therefore, many consumers wish to avoid the use of palm oil. Decorative sugar contains a small amount of palm oil to prevent the sugar from melting on hot bakery products. High-oleic sunflower oil used as a substitute for palm oil was analyzed in this study via multispectral imaging and an electronic nose, two methods suitable for potential large-batch analysis of sugar/oil coatings. Multispectral imaging is a nondestructive method for comparing the wavelength reflections of the surface of a sample. Reference samples enabled the estimation of the quality of unknown samples, which were confirmed via acid value measurements. Additionally, for quality determination, volatile compounds from decorative sugars were measured with an electronic nose. Both applications provide comparable data that provide information about the quality of decorative sugars.
- Published
- 2024
- Full Text
- View/download PDF
16. A High-Content Screen for the Identification of Plant Extracts with Insulin Secretion-Modulating Activity.
- Author
-
Hager R, Pitsch J, Kerbl-Knapp J, Neuhauser C, Ollinger N, Iken M, Ranner J, Mittermeier-Kleßinger V, Dawid C, Lanzerstorfer P, and Weghuber J
- Abstract
Bioactive plant compounds and extracts are of special interest for the development of pharmaceuticals. Here, we describe the screening of more than 1100 aqueous plant extracts and synthetic reference compounds for their ability to stimulate or inhibit insulin secretion. To quantify insulin secretion in living MIN6 β cells, an insulin- Gaussia luciferase (Ins-GLuc) biosensor was used. Positive hits included extracts from Quillaja saponaria , Anagallis arvensis , Sapindus mukorossi , Gleditsia sinensis and Albizia julibrissin , which were identified as insulin secretion stimulators, whereas extracts of Acacia catechu , Myrtus communis , Actaea spicata L., Vaccinium vitis-idaea and Calendula officinalis were found to exhibit insulin secretion inhibitory properties. Gas chromatography-mass spectrometry (GC-MS) and liquid chromatography-mass spectrometry (LC-MS) were used to characterize several bioactive compounds in the selected plant extracts, and these bioactives were retested for their insulin-modulating properties. Overall, we identified several plant extracts and some of their bioactive compounds that may be used to manipulate pancreatic insulin secretion.
- Published
- 2021
- Full Text
- View/download PDF
17. YidC and SecYEG form a heterotetrameric protein translocation channel.
- Author
-
Sachelaru I, Winter L, Knyazev DG, Zimmermann M, Vogt A, Kuttner R, Ollinger N, Siligan C, Pohl P, and Koch HG
- Subjects
- Escherichia coli chemistry, Models, Molecular, Protein Binding, Protein Conformation, Protein Multimerization, Protein Translocation Systems chemistry, Protein Translocation Systems metabolism, Escherichia coli metabolism, Escherichia coli Proteins chemistry, Escherichia coli Proteins metabolism, Membrane Transport Proteins chemistry, Membrane Transport Proteins metabolism, SEC Translocation Channels chemistry, SEC Translocation Channels metabolism
- Abstract
The heterotrimeric SecYEG complex cooperates with YidC to facilitate membrane protein insertion by an unknown mechanism. Here we show that YidC contacts the interior of the SecY channel resulting in a ligand-activated and voltage-dependent complex with distinct ion channel characteristics. The SecYEG pore diameter decreases from 8 Å to only 5 Å for the YidC-SecYEG pore, indicating a reduction in channel cross-section by YidC intercalation. In the presence of a substrate, YidC relocates to the rim of the pore as indicated by increased pore diameter and loss of YidC crosslinks to the channel interior. Changing the surface charge of the pore by incorporating YidC into the channel wall increases the anion selectivity, and the accompanying change in wall hydrophobicity is liable to alter the partition of helices from the pore into the membrane. This could explain how the exit of transmembrane domains from the SecY channel is facilitated by YidC.
- Published
- 2017
- Full Text
- View/download PDF
18. The Sodium Glucose Cotransporter SGLT1 Is an Extremely Efficient Facilitator of Passive Water Transport.
- Author
-
Erokhova L, Horner A, Ollinger N, Siligan C, and Pohl P
- Subjects
- Animals, Aquaporin 1 chemistry, Aquaporin 1 genetics, Aquaporin 1 metabolism, Biological Transport physiology, Cell Membrane chemistry, Cell Membrane genetics, Dogs, Glucose chemistry, Glucose metabolism, Humans, Madin Darby Canine Kidney Cells, Sodium chemistry, Sodium metabolism, Sodium-Glucose Transporter 1 chemistry, Sodium-Glucose Transporter 1 genetics, Water chemistry, Cell Membrane metabolism, Cell Membrane Permeability, Sodium-Glucose Transporter 1 metabolism, Water metabolism
- Abstract
The small intestine is void of aquaporins adept at facilitating vectorial water transport, and yet it reabsorbs ∼8 liters of fluid daily. Implications of the sodium glucose cotransporter SGLT1 in either pumping water or passively channeling water contrast with its reported water transporting capacity, which lags behind that of aquaporin-1 by 3 orders of magnitude. Here we overexpressed SGLT1 in MDCK cell monolayers and reconstituted the purified transporter into proteoliposomes. We observed the rate of osmotic proteoliposome deflation by light scattering. Fluorescence correlation spectroscopy served to assess (i) SGLT1 abundance in both vesicles and plasma membranes and (ii) flow-mediated dilution of an aqueous dye adjacent to the cell monolayer. Calculation of the unitary water channel permeability, pf, yielded similar values for cell and proteoliposome experiments. Neither the absence of glucose or Na(+), nor the lack of membrane voltage in vesicles, nor the directionality of water flow grossly altered pf Such weak dependence on protein conformation indicates that a water-impermeable occluded state (glucose and Na(+) in their binding pockets) lasts for only a minor fraction of the transport cycle or, alternatively, that occlusion of the substrate does not render the transporter water-impermeable as was suggested by computational studies of the bacterial homologue vSGLT. Although the similarity between the pf values of SGLT1 and aquaporin-1 makes a transcellular pathway plausible, it renders water pumping physiologically negligible because the passive flux would be orders of magnitude larger., (© 2016 by The American Society for Biochemistry and Molecular Biology, Inc.)
- Published
- 2016
- Full Text
- View/download PDF
19. The mobility of single-file water molecules is governed by the number of H-bonds they may form with channel-lining residues.
- Author
-
Horner A, Zocher F, Preiner J, Ollinger N, Siligan C, Akimov SA, and Pohl P
- Abstract
Channel geometry governs the unitary osmotic water channel permeability, p
f , according to classical hydrodynamics. Yet, pf varies by several orders of magnitude for membrane channels with a constriction zone that is one water molecule in width and four to eight molecules in length. We show that both the pf of those channels and the diffusion coefficient of the single-file waters within them are determined by the number NH of residues in the channel wall that may form a hydrogen bond with the single-file waters. The logarithmic dependence of water diffusivity on NH is in line with the multiplicity of binding options at higher NH densities. We obtained high-precision pf values by (i) having measured the abundance of the reconstituted aquaporins in the vesicular membrane via fluorescence correlation spectroscopy and via high-speed atomic force microscopy, and (ii) having acquired the vesicular water efflux from scattered light intensities via our new adaptation of the Rayleigh-Gans-Debye equation.- Published
- 2015
- Full Text
- View/download PDF
20. The bacterial translocon SecYEG opens upon ribosome binding.
- Author
-
Knyazev DG, Lents A, Krause E, Ollinger N, Siligan C, Papinski D, Winter L, Horner A, and Pohl P
- Subjects
- Escherichia coli Proteins genetics, Ion Channel Gating, Ion Channels genetics, Ion Channels metabolism, Lipid Bilayers metabolism, Membrane Lipids metabolism, Membrane Proteins genetics, Microscopy, Confocal, Multiprotein Complexes genetics, Mutation, Protein Binding, Protein Transport, SEC Translocation Channels, Spectrometry, Fluorescence, Escherichia coli Proteins metabolism, Membrane Proteins metabolism, Multiprotein Complexes metabolism, Ribosomes metabolism
- Abstract
In co-translational translocation, the ribosome funnel and the channel of the protein translocation complex SecYEG are aligned. For the nascent chain to enter the channel immediately after synthesis, a yet unidentified signal triggers displacement of the SecYEG sealing plug from the pore. Here, we show that ribosome binding to the resting SecYEG channel triggers this conformational transition. The purified and reconstituted SecYEG channel opens to form a large ion-conducting channel, which has the conductivity of the plug deletion mutant. The number of ion-conducting channels inserted into the planar bilayer per fusion event roughly equals the number of SecYEG channels counted by fluorescence correlation spectroscopy in a single proteoliposome. Thus, the open probability of the channel must be close to unity. To prevent the otherwise lethal proton leak, a closed post-translational conformation of the SecYEG complex bound to a ribosome must exist.
- Published
- 2013
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.