Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

77
Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science

Transcript of Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Page 1: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Algorithms Exploiting the Chain Structure of Proteins

Itay LotanComputer Science

Page 2: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Proteins 101

Involved in all functions of our body: metabolism, motion, defense, etc.

Michael Levitt

Page 3: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Protein representation

Torsion angle model:

Cα model:

NN

NN

C’

C’

C’

C’

O

O O

O

C

C

C

C

C

C C

C

Resi Resi+1 Resi+2 Resi+3

Page 4: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Structure determination

Bernhard Rupp

X-ray crystallography

Page 5: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Outline

1. Fast energy computation during Monte Carlo simulation

2. Model completion for protein X-ray crystallography

3. Large scale computation of similarity

Exploit specific properties of proteins to perform the computation efficiently

Page 6: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Outline

1. Fast energy computation during Monte Carlo simulation

2. Model completion for protein X-ray crystallography

3. Large scale computation of similarity

Lotan, Schwarzer, Halperin* and Latombe. J. Comput. Bio. 2004 (to appear)

*CS Department, Tel-Aviv University

Page 7: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Monte Carlo simulation (MCS)

Estimate thermodynamic quantities

Search for low-energy conformations and the folded structure

Popular method for sampling the conformation space of proteins:

Page 8: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

MCS: How it works

2. Compute energy E of new conformation3. Accept with probability:

Requires >>106 steps to sample adequately

/( ) min 1, bE k TP accept e

1. Propose random change in conformation

Page 9: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Bonded terms: Bond lengths: Bond angles: Dihedral angles:

Non-bonded terms: Van der Waals: Electrostatic: Heuristic: Go models, HP models, etc.

Energy function

Page 10: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Pair-wise interactions

Cutoff distance (6 - 12Å) Linear number of interactions

contribute to energy (Halperin & Overmars ’98)

Challenge: Find all interacting pairs without enumerating all pairs

Page 11: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Related workComputer Science Bounding volume

hierarchies for collision detection Gotschalk et al. ’96 Larsen et al. ’00 Guibas et al. ’02

Space partition methods for collision detection Faverjon ’84 Halperin & Overmars ’98

Collisions detection for chains Halperin et al. ’97 Guibas et al. ’02

Biology Neighbor lists

Verlet ’67 Brooks et al. ’83

Grid Quentrec & Brot ’73 Hockney et al. ’74 Van Gunsteren et al. ’84

Neighbor lists + grid Yip & Elber ’89 Petrella ’02

Page 12: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Grid method

d: Cutoff distance

ddd

Linear complexity Optimal in worst case

Page 13: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Contributions Efficient maintenance and self-collision

detection for kinematic chains Efficient computation of pair-wise

interactions in MCS of proteins Scheme for caching and reusing partial

energy sums during MCS MCS software*

Much faster than existing algorithm (grid method)

*Download at: http://robotics.stanford.edu/~itayl/mcs

Page 14: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Properties of kinematic chains

Small changes large effects

Page 15: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Properties of kinematic chains

Small changes large effects

Page 16: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Properties of kinematic chains

Small changes large effects Local changes global effects

Page 17: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Properties of kinematic chains

Small changes large effects Local changes global effects Few DoF changes long rigid sub-

chains

Page 18: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Properties of kinematic chains

Small changes large effects Local changes global effects Few DoF changes long rigid sub-

chains

Page 19: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

ChainTree: A tale of two hierarchies Transform hierarchy: approximates

kinematics of protein backbone at successive resolutions

Bounding volume hierarchy: approximates geometry of protein at successive resolutions

Page 20: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Hierarchy of transforms

Page 21: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Hierarchy of transforms

A BC D

E FG H

I

TAB TBC

TAC

THITCD TDE TEF TFG TGH

TCE TEG TGI

TAE TEI

TAI

Page 22: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Hierarchy of bounding volumes

BA HGFEDC

CD EF GHAB

AD EH

AH

Page 23: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

The ChainTree

TAB A

TBC B

TCD C

TDE D

TEF E

TFG F

TGH G

THI H

TAC AB TCE CD TEG EF TGI GH

TAE AD TEI EH

TAI AH

A BC D

E FG H

I

Page 24: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Updating the ChainTree

TAB A

TBC B

TCD C

TDE D

TEF E

TFG F

TGH G

THI H

TAC AB TCE CD TEG EF TGI GH

TAE AD TEI EH

TAI AH

A BC D

E FG H

I

Page 25: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Computing the energy

A B C D E F G H

J K L M

N O

P

Pruning rules:1. Prune search when distance between bounding volumes

is more than cutoff distance2. Do not search inside rigid sub-chains

Recursively search ChainTree for interactions

Page 26: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

A B C D E F G H

J K L M

N O

P

Computing the energy

[P]

Page 27: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

A B C D E F G H

J K L M

N O

P

Computing the energy

[N]

[P]

Page 28: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

A B C D E F G H

J K L M

N O

P

Computing the energy

[N] [O]

[P]

Page 29: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

A B C D E F G H

J K L M

N O

P

Computing the energy

[N-O][N] [O]

[P]

Page 30: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Computing the energy

[N-O]

[J-K]

[A-C]

[B-C][A-D]

[B-D]

A B C D E F G H

J K L M

N O

P

[J]

[N]

[K]

[C]

[D][C-D]

[O]

[P]

Page 31: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Computing the energy

[P]

[N] [N-O]

[J-K] [K] [K-L][J-M][J-L] [K-M]

[A-G]

[B-G][A-H]

[B-H]

[A-C]

[B-C][A-D]

[B-D]

[C]

[D][C-D]

[A-E]

[B-E][A-F]

[B-F]

[C-E][C-F]

[C-G][C-H][D-G][D-H]

[J]

[A]

[B][A-B]

[D-E][D-F]

[O]

[L] [L-M] [M]

[E]

[F][E-F]

[E-G]

[F-G][E-H]

[F-H]

[H]

[G][H-G]

A B C D E F G H

J K L M

N O

P

Page 32: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Computing the energy

E(O)

A B C D E F G H

J K L M

N O

P

[P]

[N] [N-O]

[J-K] [K] [K-L][J-M][J-L] [K-M]

[A-G]

[B-G][A-H]

[B-H]

[A-C]

[B-C][A-D]

[B-D]

[C]

[D][C-D]

[A-E]

[B-E][A-F]

[B-F]

[C-E][C-F]

[C-G][C-H][D-G][D-H]

[J]

[A]

[B][A-B]

[D-E][D-F]

[O]

[L] [L-M] [M]

[E]

[F][E-F]

[E-G]

[F-G][E-H]

[F-H]

[H]

[G][H-G]

Page 33: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Computing the energy

Only changed interactions are found

Reuse unaffected partial sums

Better performance for

Longer proteins

Fewer simultaneous changes

Page 34: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Updating:

Searching:

Computational complexity

log nO k k

43n worst case bound

Much faster in practice

Page 35: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Test

20

260

140

120

100

80

60

40

280

1CTF 1JB01HTB1LE2

ChainTree

Grid

Tim

e (

in m

Se

c.)

[68 res.] [144 res.] [374 res.] [755 res.]

120

100

80

60

40

20

140

1CTF 1JB01HTB1LE2

ChainTree

Grid

Tim

e (

in m

Se

c.)

[68 res.] [144 res.] [374 res.] [755 res.]

1-DoF change 5-DoF change

Page 36: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Simulation of α-Synuclein

140 res. protein implicated in Parkinson’s disease

Multi-canonical Replica-exchange MC regime

Over 1000 CPU days of simulation Study conformations at room temp. Joint work with Vijay Pande

Page 37: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Outline

1. Fast energy computation during Monte Carlo simulation

2. Model completion for protein X-ray crystallography

3. Large scale computation of similarity

Lotan, van den Bedem*, Deacon* and Latombe, WAFR 2004

van den Bedem*, Lotan, Latombe and Deacon*, submitted to Acta. Cryst. D

* Joint Center for Structural Genomics (JCSG) at SSRL

Page 38: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Protein Structure Initiative

152K sequenced genes (30K/year)

25K determined structures (3.6K/year)

Reduce cost and time to determine protein structure

Develop software to automatically interpret the electron density map (EDM)

Page 39: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

EDM

3-D “image” of atomic structure High value (electron density) at atom

centers Density falls off exponentially away from

center

Page 40: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Automated model building

~90% built at high resolution (2Å) ~66% built at medium to low

resolution (2.5 – 2.8Å) Gaps left at noisy areas in EDM

(blurred density)

Gaps need to be resolved manually

Page 41: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

The Fragment completion problem

Input EDM Partially resolved structure 2 Anchor residues Length of missing fragment

Output A small number of candidate structures

for missing fragment

A robotics inverse kinematics (IK) problem

Page 42: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Related workComputer Science Exact IK solvers

Manocha & Canny ’94 Manocha et al. ’95

Optimization IK solvers Wang & Chen ’91

Redundant manipulators Khatib ’87 Burdick ’89

Motion planning for closed loops Han & Amato ’00 Yakey et al. ’01 Cortes et al. ’02, ’04

Biology/Crystallography Exact IK solvers

Wedemeyer & Scheraga ’99 Coutsias et al. ’04

Optimization IK solvers Fine et al. ’86 Canutescu & Dunbrack Jr. ’03

Ab-initio loop closure Fiser et al. ’00 Kolodny et al. ’03

Database search loop closure Jones & Thirup ’86 Van Vlijman & Karplus ’97

Semi-automatic tools Jones & Kjeldgaard ’97 Oldfield ’01

Page 43: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Contributions Sampling of gap-closing fragments

biased by the EDM Refinement of fit to density without

breaking closure Fully automatic fragment completion

software for X-ray Crystallography

Novel application of a combination of inverse kinematics techniques

Page 44: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Two-stage IK method

1. Candidate generations: Optimize density fit while closing the gap

2. Refinement: Optimize closed fragments without breaking closure

Page 45: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Stage 1: candidate generation

Generate random conformation Close using Cyclic Coordinate Descent

(CCD) (Wang & Chen ’91, Canutescu & Dunbrack Jr. ’03)

Page 46: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Stage 1: candidate generation

Generate random conformation Close using Cyclic Coordinate Descent

(CCD) (Wang & Chen ’91, Canutescu & Dunbrack ’03)

Page 47: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Stage 1: candidate generation

Generate random conformation Close using Cyclic Coordinate Descent

(CCD) (Wang & Chen ’91, Canutescu & Dunbrack ’03)

Page 48: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Stage 1: candidate generation

Generate random conformation Close using Cyclic Coordinate Descent

(CCD) (Wang & Chen ’91, Canutescu & Dunbrack ’03)

Page 49: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Stage 1: candidate generation

Generate random conformation Close using Cyclic Coordinate Descent

(CCD) (Wang & Chen ’91, Canutescu & Dunbrack ’03)

CCD moves biased toward high-density

Page 50: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Stage 2: refinement

1-D manifold

Target function T (goodness of fit to EDM) Minimize T while retaining closure Closed conformations lie on Self-motion

manifold of lower dimension

Page 51: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Stage 2: null-space minimization

Jacobian: linear relation between joint velocities and end-effector linear and angular velocity .

(6 matrix)x J q q n

Compute minimizing move using:

† T T qq J q x N N

q

null | 0J q J q

qx

N – orthonormal basis of null space

Page 52: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Stage 2: minimization with closure

1. Choose sub-fragment with n > 6 DOFs2. Compute using SVD3. Project onto 4. Move until minimum is reached or

closure is broken

( )T q q null( )Jnull( )J

Escape from local minima using Monte Carlo with simulated annealing

Page 53: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Test: artificial gaps Completed structure (gold standard) Good density (1.6Å res.) Remove fragment and rebuild

Length High (2.0Å) Medium (2.5Å) Low (2.8Å)

4 100% (0.14Å) 100% (0.19Å) 100% (0.32Å)

8 100% (0.18Å) 100% (0.23Å) 100% (0.36Å)

12 91% (0.51Å) 96% (0.41Å) 91% (0.52Å)

15 91% (0.53Å) 88% (0.63Å) 83% (0.76Å)

Produced by H. van den Bedem

Page 54: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Test: true gaps Completed structure (gold standard) O.K. density (2.4Å res.) 6 gaps left by model builder (RESOLVE)

Length Top scorer Lowest error

4 0.44Å 0.40Å

4 0.22Å 0.22Å

5 0.78Å 0.78Å

5 0.36Å 0.36Å

7 0.72Å 0.66Å

10 0.43Å 0.43Å

Produced by H. van den Bedem

Page 55: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Example: TM0423PDB: 1KQ3, 376 res.2.0Å resolution12 residue gapBest: 0.3Å aaRMSD

Page 56: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Example: TM0813

GLU-83

GLY-96

PDB: 1J5X, 342 res.2.8Å resolution12 residue gapBest: 0.6Å aaRMSD

Page 57: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Example: TM0813

GLU-83

GLY-96

PDB: 1J5X, 342 res.2.8Å resolution12 residue gapBest: 0.6Å aaRMSD

Page 58: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Example: TM0813

GLU-83

GLY-96

PDB: 1J5X, 342 res.2.8Å resolution12 residue gapBest 0.6Å aaRMSD

Page 59: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Outline

1. Fast energy computation during Monte Carlo simulation

2. Model completion for protein X-ray crystallography

3. Large scale computation of similarity

Lotan and Schwarzer, J. Comput. Biol. 11(2–3): 299–317, 2004

Page 60: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Large scale similarity Analysis of simulation trajectories

Molecular dynamics simulation Monte Carlo simulation

Clustering of decoy sets (e.g., Shortle et al. ’98)

Stochastic Roadmap Simulation (Apaydin et al. ’03)

Fast similarity measures are needed for analyzing large sets of conformations

Page 61: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Uniform simplification of protein structure for similarity computation

Speed-up existing similarity measures

Method offers trade-off between speed and precision

Efficient computation of nearest neighbors

Contributions

Page 62: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

m-Averaged approximation Cut chain into pieces of length m Replace each sequence of m Cα atoms

by its centroid

3n coordinates 3n/m coordinates

Page 63: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Chains and distances

Proximity along the chain entails spatial proximity

3d l

Far away links along the chain are spatially distant (on average)

ci cj

Page 64: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Similarity measures

2

21

1( , ) min

n

T i ii

cRMS P Q p Tqn

2

2 1

2( , )

( 1)

n iP Qij ij

i j

dRMS P Q d dn n

Page 65: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

1. Decoy sets: conformations from the Park-Levitt set (Park et al, ’97), N =10,000

2. Random sets: conformations generated by the program FOLDTRAJ (Feldman & Hogue, ’00), N = 5000

Evaluation: test sets

8 structurally diverse proteins (54 -76 residues)

Page 66: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Evaluation results: decoy sets

m cRMS dRMS3 0.99 0.96-0.98

4 0.98-0.99 0.94-0.97

6 0.92-0.99 0.78-0.93

9 0.81-0.98 0.65-0.96

12 0.54-0.92 0.52-0.69

9x for cRMS (m = 9) 36x for dRMS (m = 6)

Higher correlation for random sets!

Page 67: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Brute force complexity:

• for all

k Nearest-neighbors problem

Given a set S of conformations of a protein and a query conformation c, find the k conformations in S most similar to c

logN k L

2 logN k L c S

N – size of S L – time to compute similarity

Page 68: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

kd-tree: time per query

Limitations:1. Requires Minkowski metric:2. Less efficient when d>20

Efficient nearest neighbor search

logO kd N

1

1

,d rr

i ii

dist P Q p q

cRMS is not a Minkowski metric

dRMS has dimensionality of ( 1)

2

n n

Reduce dRMS dimensionality using SVD

Page 69: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Reduction using SVD

1. Stack m-averaged distance matrices as vectors

2. Compute the SVD of entire set3. Project onto principle components

dRMS is reduced to 20 dimensions

Complexity of SVD ~ 4n

Page 70: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Testing the method

Use decoy sets (N = 10,000) and random sets (N = 5,000)

m-averaging with (m = 4) Project onto 16 PCs for decoys, 12 PCs

for random sets Find k = 10, 25, 100 NNs for 250

conformations in each set

Page 71: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Results

Decoy sets: ~77% correct Furthest NN off by 10% - 15% (0.7Å – 1.5Å) ~4k approximate NNs contain all true k NNs

Random sets: slightly better results

Use reduction as fast filter

Page 72: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Running Time

N = 100,000, m=4, PC = 16

Find k = 100 for each conformationBrute-force: ~84 hoursBrute-force + m-averaging: ~4.8 hoursBrute-force + m-averaging + SVD: 41 minuteskd-tree + m-averaging + SVD: 19 minutes

kd-tree has more impact for larger sets

Page 73: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Contributions Energy computation in MCS

Efficient maintenance and self-collision detection for kinematic chains

Efficient computation of pair-wise interactions in MCS of proteins

Caching scheme for partial energy sums during MCS MCS software

Model completion in X-ray crystallography sampling of gap-closing fragments biased towards the EDM Refinement of fit to density without breaking closure Fully automatic fragment completion software

Similarity computation for large conformation sets Uniform simplification of protein structure for similarity

computation Speed-up existing similarity measures Method offers trade-off between speed and precision Efficient computation of nearest neighbors

Page 74: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Take-home message

Taking into account physical properties of proteins can lead to efficient algorithms for a wide variety of applications in structural biology

Page 75: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Outlook

Models that simplify the physics and chemistry of proteins

Algorithms that exploit properties of protein models

computer scientistbiophysicist/biochemist

Develop simplified protein models that lend themselves to efficient computations

Page 76: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Acknowledgements Jean-Claude Latombe Vijay Pande Michael Levitt Leo Guibas Axel Brunger, Balaji Prabhakar, Serafim Batzoglou Fabian Schwarzer, Henry van den Bedem, Dan Halperin Carlo Tomasi Daniel Russakoff, Rachel Kolodny Latombe group

Serkan Apaydin, Tim Bretl, Joel Brown, Phil Fong, Mitul Saha, Pekka Isto, Kris Hauser

Pande groupBojan Zagrovic, Stefan Larson, Lillian Chong, Young Min Rhee, Sidney Elmer, Chris Snow, Guha Jayachandran, Eric Sorin, Sung-Joo Lee, Jim Cladwell, Michael Shirts, Nina Singhal, Relly Brandman, Vishal Vaidyanathan, Nick Kelley, Mark Engelhardt

Levitt GroupPatrice Koehl, Tanya Raschke, Erik Lindahl

Page 77: Algorithms Exploiting the Chain Structure of Proteins Itay Lotan Computer Science.

Thank you!