skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Zimmerman, Maxwell I"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Cryptic pockets are of growing interest as potential drug targets, particularly to control protein-nucleic acid interactions that often occur via flat surfaces. However, it remains unclear whether cryptic pockets contribute to protein function or if they are merely happenstantial features that can easily be evolved away to achieve drug resistance. Here, we explore whether a cryptic pocket in the Interferon Inhibitory Domain (IID) of viral protein 35 (VP35) of Zaire ebolavirus aids its ability to bind double-stranded RNA (dsRNA). We use simulations and experiments to study the relationship between cryptic pocket opening and dsRNA binding of the IIDs of two other filoviruses, Reston and Marburg. These homologs have nearly identical structures but block different interferon pathways due to different affinities for blunt ends and backbone of the dsRNA. Simulations and thiol-labeling experiments demonstrate that the homologs have varying probabilities of pocket opening. Subsequent dsRNA-binding assays suggest that closed conformations preferentially bind dsRNA blunt ends while open conformations prefer binding the backbone. Point mutations that modulate pocket opening proteins further confirm this preference. These results demonstrate the open cryptic pocket has a function, suggesting cryptic pockets are under selective pressure and may be difficult to evolve away to achieve drug resistance. 
    more » « less
  2. Abstract Understanding the structural determinants of a protein’s biochemical properties, such as activity and stability, is a major challenge in biology and medicine. Comparing computer simulations of protein variants with different biochemical properties is an increasingly powerful means to drive progress. However, success often hinges on dimensionality reduction algorithms for simplifying the complex ensemble of structures each variant adopts. Unfortunately, common algorithms rely on potentially misleading assumptions about what structural features are important, such as emphasizing larger geometric changes over smaller ones. Here we present DiffNets, self-supervised autoencoders that avoid such assumptions, and automatically identify the relevant features, by requiring that the low-dimensional representations they learn are sufficient to predict the biochemical differences between protein variants. For example, DiffNets automatically identify subtle structural signatures that predict the relative stabilities of β-lactamase variants and duty ratios of myosin isoforms. DiffNets should also be applicable to understanding other perturbations, such as ligand binding. 
    more » « less
  3. null (Ed.)
  4. Equilibria, or fixed points, play an important role in dynamical systems across various domains, yet finding them can be computationally challenging. Here, we show how to efficiently compute all equilibrium points of discrete-valued, discrete-time systems on sparse networks. Using graph partitioning, we recursively decompose the original problem into a set of smaller, simpler problems that are easy to compute, and whose solutions combine to yield the full equilibrium set. This makes it possible to find the fixed points of systems on arbitrarily large networks meeting certain criteria. This approach can also be used without computing the full equilibrium set, which may grow very large in some cases. For example, one can use this method to check the existence and total number of equilibria, or to find equilibria that are optimal with respect to a given cost function. We demonstrate the potential capabilities of this approach with examples in two scientific domains: computing the number of fixed points in brain networks and finding the minimal energy conformations of lattice-based protein folding models. 
    more » « less
  5. null (Ed.)
    SARS-CoV-2 has intricate mechanisms for initiating infection, immune evasion/suppression and replication that depend on the structure and dynamics of its constituent proteins. Many protein structures have been solved, but far less is known about their relevant conformational changes. To address this challenge, over a million citizen scientists banded together through the Folding@home distributed computing project to create the first exascale computer and simulate 0.1 seconds of the viral proteome. Our adaptive sampling simulations predict dramatic opening of the apo spike complex, far beyond that seen experimentally, explaining and predicting the existence of ‘cryptic’ epitopes. Different spike variants modulate the probabilities of open versus closed structures, balancing receptor binding and immune evasion. We also discover dramatic conformational changes across the proteome, which reveal over 50 ‘cryptic’ pockets that expand targeting options for the design of antivirals. All data and models are freely available online, providing a quantitative structural atlas. 
    more » « less