skip to main content

Attention:

The NSF Public Access Repository (PAR) system and access will be unavailable from 8:00 PM ET on Friday, March 21 until 8:00 AM ET on Saturday, March 22 due to maintenance. We apologize for the inconvenience.


Search for: All records

Creators/Authors contains: "Dunn, Matthew"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Rokas, A (Ed.)
    Abstract Subtelomeres are dynamic genomic regions shaped by elevated rates of recombination, mutation, and gene birth/death. These processes contribute to formation of lineage-specific gene family expansions that commonly occupy subtelomeres across eukaryotes. Investigating the evolution of subtelomeric gene families is complicated by the presence of repetitive DNA and high sequence similarity among gene family members that prevents accurate assembly from whole genome sequences. Here, we investigated the evolution of the telomere-associated (TLO) gene family in Candida albicans using 189 complete coding sequences retrieved from 23 genetically diverse strains across the species. Tlo genes conformed to the 3 major architectural groups (α/β/γ) previously defined in the genome reference strain but significantly differed in the degree of within-group diversity. One group, Tloβ, was always found at the same chromosome arm with strong sequence similarity among all strains. In contrast, diverse Tloα sequences have proliferated among chromosome arms. Tloγ genes formed 7 primary clades that included each of the previously identified Tloγ genes from the genome reference strain with 3 Tloγ genes always found on the same chromosome arm among strains. Architectural groups displayed regions of high conservation that resolved newly identified functional motifs, providing insight into potential regulatory mechanisms that distinguish groups. Thus, by resolving intraspecies subtelomeric gene variation, it is possible to identify previously unknown gene family complexity that may underpin adaptive functional variation. 
    more » « less
  2. Abstract

    Pseudomonas aeruginosais a Gram-negative bacterium responsible for numerous human infections. Previously, novel antibiotic tolerant variants known as phoenix colonies as well as variants similar to viable but non-culturable (VBNC) colonies were identified in response to high concentrations of aminoglycosides. In this study, the mechanisms behind phoenix colony and VBNC-like colony emergence were further explored using both whole genome sequencing and RNA sequencing. Phoenix colonies were found to have a single nucleotide polymorphism (SNP) in the PA4673 gene, which is predicted to encode a GTP-binding protein. No SNPs were identified within VBNC-like colonies compared to the founder population. RNA sequencing did not detect change in expression of PA4673 but revealed multiple differentially expressed genes that may play a role in phoenix colony emergence. One of these differentially expressed genes, PA3626, encodes for a tRNA pseudouridine synthase which when knocked out led to a complete lack of phoenix colonies. Although not immediately clear whether the identified genes in this study may have interactions which have not yet been recognized, they may contribute to the understanding of how phoenix colonies are able to emerge and survive in the presence of antibiotic exposure.

     
    more » « less
  3. The term "threat intelligence" has swiftly become a staple buzzword in the computer security industry. The entirely reasonable premise is that, by compiling up-to-date information about known threats (i.e., IP addresses, domain names, file hashes, etc.), recipients of such information may be able to better defend their systems from future attacks. Thus, today a wide array of public and commercial sources distribute threat intelligence data feeds to support this purpose. However, our understanding of this data, its characterization and the extent to which it can meaningfully support its intended uses, is still quite limited. In this paper, we address these gaps by formally defining a set of metrics for characterizing threat intelligence data feeds and using these measures to systematically characterize a broad range of public and commercial sources. Further, we ground our quantitative assessments using external measurements to qualitatively investigate issues of coverage and accuracy. Unfortunately, our measurement results suggest that there are significant limitations and challenges in using existing threat intelligence data for its purported goals. 
    more » « less