Minimally perturbing a gene regulatory network to avoid a disease phenotype: the glioma network as a test case
 Guy Karlebach^{1}Email author and
 Ron Shamir^{1}
DOI: 10.1186/17520509415
© Karlebach and Shamir; licensee BioMed Central Ltd. 2010
Received: 3 December 2009
Accepted: 25 February 2010
Published: 25 February 2010
Abstract
Background
Mathematical modeling of biological networks is an essential part of Systems Biology. Developing and using such models in order to understand gene regulatory networks is a major challenge.
Results
We present an algorithm that determines the smallest perturbations required for manipulating the dynamics of a network formulated as a Petri net, in order to cause or avoid a specified phenotype. By modifying McMillan's unfolding algorithm, we handle partial knowledge and reduce computation cost. The methodology is demonstrated on a glioma network. Out of the single gene perturbations, activation of glutathione Stransferase P (GSTP1) gene was by far the most effective in blocking the cancer phenotype. Among pairs of perturbations, NFkB and TGFβ had the largest joint effect, in accordance with their role in the EMT process.
Conclusion
Our method allows perturbation analysis of regulatory networks and can overcome incomplete information. It can help in identifying drug targets and in prioritizing perturbation experiments.
Background
In contrast to the genecentric approach, systems biology [1] emphasizes the importance of the interactions between different genes in determining the phenotype. Instead of asking "what is the role of gene A", the question becomes "what is the role of gene A in system B". The activity (or inactivity) of a gene is therefore not viewed as an isolated event, but assigned a meaning in the context in which it is active. An analogy from the sphere of computer science equates the genome to a database, and the system's dynamic behavior to the execution of a computer program that uses the database [2–4]. This paradigm shift has two major implications for the biomedical community. First, it complicates understanding cellular processes as each component must be considered with respect to its environment. Second, the fact that alternative phenotypes correspond to alternative dynamic behaviors of the system offers considerable advantages, because it is technically easier to influence the dynamics of a cellular network than to modify the information coded in the genome. Combining computational tools, which can help overcome the complexity of biological networks, with wet lab testing can spearhead systemoriented research. In this paper we present a method that was developed with this principle in mind. Focusing on gene regulatory networks, we develop a method to find minimal perturbations that change the network dynamics. By modifying established network analysis algorithms from the field of computer science, we are able to cope with some of the difficulties commonly associated with this objective.
An important tool for network analysis that will be used in this work is network perturbation. A common procedure in model analysis, it refers to applying a modification of the network and observing its resulting dynamic behavior. Knockout, knockdown or overexpression of a gene in the network are examples of possible perturbations. The exact type of perturbation varies with the model and the goals of the modeler. In some cases the motivation is to observe how single entities respond [5, 6], while in others it is to determine network robustness [7] or change in the global state [8, 9]. For example, Sridhar et al. [10] find enzymes whose inactivation eliminates compounds from a metabolic network. The implementation of a perturbation for our purposes is described in the Methods section.
A related concept in theoretical computer science is Minimal Cut Sets[11]. In reliability theory, network elements (e.g. edges) have a failure probability (e.g. an electronic component that has a chance for malfunction). A network is called reliable if a set of paths within it connect a given subset of vertices, and the joint probability of the paths is above a given threshold. A minimal cut set is the smallest set of elements whose removal from the network makes the network unreliable. Network reliability shares some important similarities with the concepts proposed in this work, as we also associate the existence of nonexistence of network elements with probabilities. A main difference between the two approaches is that identification of minimal cuts sets is a method for analyzing a network via its structural properties. In contrast, our analysis will address the network dynamics and hence will be based on the concept of trajectories, as explained below.
Our first modeling choice will be to model the network's regulators as discrete entities, an approach that proved effective in previous genetic regulatory network (GRN) analyses [7, 12–16]. This level of abstraction reduces the need of the modeler to provide fine details [17], while being detailed enough to capture the main features of the GRN dynamics and render them easier to analyze. In addition, the abstraction lends itself to the development of effective methods for incorporating uncertainty in the regulatory functions [18–22]. The global state of a network is defined as a vector whose entries are the local states of all the network's components. The network traverses from a certain global state to another in discrete time steps as a result of the activity of regulation functions. We assume that regulation functions act in an asynchronous manner: that is, that at each time step any regulation function can occur, provided its output changes the global state. A trajectory is a sequence of global states that the network can traverse in sequence.
Given a set of trajectories T and a set of global states S, S is called a phenotype of T if every trajectory in T visits only states of S. Similarly, S is called a prohibited phenotype of T if no trajectory in T reaches any state in S. We say that a network N has a phenotype S (avoids a phenotype S) with respect to a global state g if the set S is a phenotype (prohibited phenotype) of the group of trajectories that the network generates starting from the initial state g. The following question can now be formulated: "How can the network dynamics be manipulated in order to generate or avoid a specific phenotype?" Answering this question has important practical implications, such as promoting the discovery of novel drug targets [23–25] or the design of synthetic biological systems [26, 27]. Therefore, it is desirable to have a systematic way to answer the question for different networks under different conditions.
This is quite difficult, even under the simplified discrete model of GRNs: first, model dynamics can be highly complex, and second, experimental methods give only indirect clues about the network design. The second problem makes it difficult to construct models for networks that have not been extensively studied, especially when the number of participating entities is large. As for the complexity of network dynamics, consider the simple example of a network of n genes where each gene is regulated by some of the others. Assuming that a gene can be in one of two states, ON or OFF, the network can assume 2^{n} different global states. For ten genes, this results in over one thousand states. For twenty genes, there will be over a million states. Hence, it is possible that from some initial states the network will traverse an exponential number of states. Even this scenario is a simplification, because it assumes the network is known with perfect accuracy, which is seldom true. We will address these problems in the following sections.
In this study, given some initial states of the system and a desired phenotype, we will determine how a network should be perturbed in order to generate that phenotype, where a perturbation sets the level of one or more entities and thus changes the network's traversals between global states. In order to apply our algorithm efficiently to the Boolean model, we translate the network into a Petri net [28], and utilize McMillan's unfolding algorithm [29] to search the state space of a perturbed network. When the structure of the network is not fully known, we assign probabilities to alternative structures, redefine a phenotype probabilistically, and generalize our method to handle this case. To the best of our knowledge, this is the first method that integrates the trajectories of multiple alternative network structures, an important objective given the quality of current knowledge about biological networks. We demonstrate this methodology on the human glioma GRN.
Results
Algorithm
We first give a description of our algorithm, followed by its implementation using Petri nets. The algorithm takes as input a network model, the network's state graph, a set of initial states A, and a group of states B. It outputs all the minimal perturbations that cause the network to have phenotype B with respect to every state in A.
Given a GRN N, its state graph is a directed graph G(V,E) whose nodes are global states of N. In G there is an edge (a ,b) if and only if there is a regulation function f that can act in state a and lead directly to state b. The label of (a,b) is the function f. Note that several labels are possible on the same edge if it is a self loop. Figure 1 illustrates a simple GRN and its state graph.
We define two operations on a network: An activation of a gene causes the gene to stay fixed on level 1. For example, if we activate gene B in Figure 1C, the network dynamics will lead to the endpoint state 111. Similarly, a repression of a gene causes the gene to stay fixed on level 0. In Figure 1C, repressing gene A will result in cyclic behavior that will lead back to the initial state. Self loops in the state graph are meaningless under these definitions, and therefore are omitted.
The biological means of activation and repression vary depending on the mechanisms of regulation [30–32]. Common examples are knockdown, overexpression, and addition of inhibitors and activators, but less standard examples can be thought of, such as insertion of artificial entities [33] or denovo network design [26].
A network perturbation is a set of operations (activations and/or repressions) on genes. The maximal allowed size k of a perturbation P is assumed to be a small constant. An edge in the state graph contradicts perturbation P if it leads to a state in which an activated gene is at level 0 or a repressed gene is at level 1.
 1.For i = 0,...,k do For every possible perturbation set P of size i, do
 i.
Modify the group A according to P; i.e. set the level of activated genes to 1 and the level of repressed genes to 0.
 ii.
Add a node s and connect it by outgoing unlabeled edges to all the nodes of group A.
 iii.
Add a node t and connect each node of group to it using outgoing unlabeled edges.
 iv.
Create a modified graph G' from G by removing all edges that contradict operations in P.
 v.
If there is no path from s to t, output the set P and stop.
 i.
 2.
If this step is reached, then there is no solution of size ≤k.
If one is interested in all the minimum solutions, then instead of halting after finding the first good perturbation of size i, halt only after enumerating all perturbations of size i. If B is a prohibited phenotype then step 1a(iii) should be changed: the node t should be connected to B instead of .
The running time on a state graph G = (V,E) is O(2^{k}‧n^{k}‧(V+E)), where n is the number of entities in the GRN: the creation of G' and searching for paths in it can be accomplished by a BFS, and the loop occurs O(2^{k}n^{k}) times. Hence this algorithm is practical if we assume that G is not too large. However, since V = 2^{n}, only very modest sized GRNs can be directly solved this way in practice.
To address this complexity problem, we will formulate our problem using Petri nets and present a methodology that copes better with the state explosion problem.
Reddy et al [41] introduced the use of Petri nets in the context of systems biology. Later, Chaouiya et al. [42] suggested a methodology for translating Boolean regulatory networks into Petri nets, which we adopt. Additional examples of modeling GRNs with Petri nets are refs. [43–45]. Translating the network to this framework has the advantage of a rich literature on techniques for analyzing the dynamics of Petri nets. In addition, Petri nets are suitable for describing other types of biological networks, such as GRN models with additional metabolic and signaling layers.
McMillan's unfolding algorithm [46] is a method for dealing with the state explosion problem for Petri nets. A full description of the unfolding algorithm can be found in ref. [47]. Briefly, given an initial state, McMillan's algorithm gradually and implicitly records the states reachable from it by constructing a directed graph called a branching process. A branching process graph begins with places that correspond to the initial marking of the Petri net, and transitions that are added to it can consume from these places and produce new places, thereby representing consumption and production of tokens. A transition can consume only from places that do not belong to conflicting firing sequences, i.e. firing sequences that cannot occur concurrently. Thus, additions of new transitions preserve the acyclic property of the branching process graph, and ensure that it represents only feasible firing sequences (Figure 2B). Refs. [46, 47] provide excellent illustrations of the algorithm's capacity to reduce the search space on larger network instances.
Every reachable marking has a subset of transitions in the branching process graph that correspond to the firing sequence that generates it. These subsets are called configurations. For a transition t, the set of transitions from which there is a directed path to t is referred to as t's local configuration(denoted [t]), and is associated with a marking. The marking of [t] is the marking obtained by firing all the transitions that belong to [t].
 1.
For every activated entity e in P, set a token in the active place of e.
 2.
For every repressed entity e in P, set a token in the inactive place of e.
 3.
Remove all transitions that have edges outgoing to places contradicting P.
When there are several initial states, a branching process graph is generated for each initial state.
The above algorithm requires full information about the GRN model. Since this is usually not the case, we now address the handling of ambiguities in the GRN logic. Consider a network in which every gene can have several alternative regulation functions, each associated with a probability that it is the true regulation. The events corresponding to the true regulations of different genes are assumed to be independent. Hence, the probability of a trajectory is the product of the probabilities of the regulation functions involved in it. Given a parameter α, 0 ≤ α ≤ 1, the definition of a phenotype can now be extended as follows: A network has a phenotype P with respect to a set of initial states if every subset S of regulation functions that has probability ≥α generates only trajectories that remain in P. Note that if the condition holds for S it will hold also for every S' ⊆ S, which can have higher probability. This definition induces a distribution of all alternative networks into layers. The top layer contains networks with probability ≥α. Sets of networks with lower probabilities belong to lower layers, each layer corresponding to a different probability. The lowest layer has probability α^{N}, where N is the number of entities. Higher layers have lower capacity because there can be less networks with high probability than networks with low probability (as all probabilities must sum to 1). For networks in the top layer we examine every possible trajectory  this follows from the definition of probabilistic phenotype, since the full set of regulation functions of these networks has probability ≥ α. As we descend in the hierarchy, layers have greater capacities and contain networks of lower probabilities. For every such network we examine only trajectories that are generated by strict subsets of their regulation functions, because the full sets of regulation functions of these networks have probability <α. In other words, in lower layers we still follow the dynamics of every network, but to a lesser extent than in higher layers, and so each structure has an influence on the phenotype in proportion to its probability.
Similarly, a network has a prohibited phenotype P with respect to a set of initial states if every subset S of regulation functions that has probability ≥α does not generate any trajectory that leads to P.
A naïve way to test for a probabilistic phenotype would be to repeat the nonprobabilistic algorithm for every set of regulation functions with probability >α. However, the number of such sets grows exponentially with the number of entities that have more than one regulation function. More specifically, assume that there are n genes and every gene has k alternative regulation functions. For each gene, a set can specify one of the k regulation functions or leave that gene unregulated, i.e. not commit to a specific function. This gives rise to (k+1)^{n} alternative sets of regulation functions. If k is constant, the expression is exponential in n. Next we discuss how to modify the unfolding algorithm to test for a probabilistic phenotype.
Since we translate a regulatory network into a Petri net, every transition of a configuration C in the branching process graph corresponds to a regulation function (recall that in the probabilistic setting, one gene may have several regulation functions). Denote by φ(C) the set of regulation functions that are represented by the transitions of C. Note that if C contains a single regulation function for each entity, the size of φ(C) is at most the number of entities in the model. Denote by φ'(C) the subset of φ(C) that contains only regulation functions with probability <1.0. We say that φ'(C) is unambiguous if it does not contain two regulation functions that regulate the same entity.
A key concept in the original unfolding algorithm is a cutoff point; it is a transition t whose local configuration [t] is associated with a marking that is also associated with some other local configuration [t'] that contains fewer transitions. At cutoff points one can prune redundant branches in the constructed branching process graph. Given such a pair of transitions t and t', we modify McMillan's cutoff criterion to handle probabilities by adding another condition that must hold for t to become a cutoff point:
Cutoff criterion 1: φ'([t']) ⊆ φ'([t])
In addition, we make sure that each local configuration is unambiguous by keeping track of the functions that have been utilized in it, and allowing a transition t to fire from C only if φ'(C ∪ {t}) is unambiguous.
Finally, in order to save time and space, we add another cutoff criterion to the algorithm
Cutoff criterion 2:
A transition is a cutoff point if the product of the probabilities of regulation functions that are used in its local configuration is <α.
Note that since we tightened the cutoff criterion, the size of the branching process graph can become larger than in McMillan's algorithm.
 1.
For a phenotype P: If there is a set of regulation functions F with probability ≥α that generates a trajectory that does not remain in P, then such a trajectory will be represented by a configuration C in the branching process graph and φ'(C) ⊆ F.
 2.
For an avoided phenotype P: If there is a set of regulation functions F with probability ≥α that generates a trajectory that leads to P, then such a trajectory will be represented by a configuration C in the branching process graph and φ'(C) ⊆ F.
The proof is provided in the Appendix. Given that the theorem holds, we simply need to construct the branching process graph and test for such a configuration C in order to verify that a phenotype is maintained or avoided.
A Test Case
Shmulevich et al [48] constructed a probabilistic model of a small autonomous subnetwork of genes based on human glioma gene expression data [49] obtained for 588 known genes, in tissue samples with differing levels of glioma severity. The inferred network was used for a Probabilistic Boolean Network (PBN) simulation [50] by Akutsu et al. (The probability of a regulation function is the sum of coefficients of determination (CODs) between expression levels of each of its input genes and the output gene divided by the sum of CODs of the expression level of the output gene and all its potential regulators [48].) In view of its intriguing dynamic behavior and biomedical relevance, we used that network model to test our minimum perturbation set algorithm. After removing a gene that had no regulators, 14 entities remained, each associated with 13 regulation functions. When there is more than one function for an entity, the functions are assigned probabilities that add up to one. Six genes have a single regulation function, seven genes have two alternative regulation functions, and one gene has three possible regulation functions. A description of the logic functions appears in ref. [50]
We defined the prohibited phenotype S of the network as where as the set of global states in which the gene Tie2 for the receptor Tie2[51] and the gene GNB1 for the human Gprotein beta subunit [52] are both expressed (see Figure 4). The set S was selected following reports that vasculogenesis, an important phase in tumor progression, is initiated by a signal to the receptor Tie2 that is propagated through a G protein [53, 54]. Since repression of either Tie2 or GNB1 is a trivial solution, these genes were excluded from the perturbations tested. Similarly, initial states in which both Tie2 and GNB1 are active were excluded from the set of possible initial states, because there is trivially no solution from these states. The parameter α, which determines the least probability of a trajectory that will be explored  and hence the running time of the algorithm, was set to 0.05.

Mice deficient in GSTP are viable, fertile, with life spans essentially similar to animals not deficient in the gene. However, they show an enhanced susceptibility to carcinogeninduced skin papillomas.

The absence of GSTP increases the activity of stress kinases, which results in changes in gene expression that enhance cell proliferation pathways.

Hypermethylation of the GSTP regulatory region is a common somatic alteration identified in human prostate cancer. This alteration results in the loss of GSTP expression and is proposed to occur during pathogenesis of the disease.

In the latter case it was suggested that there could be therapeutic value in restoring GSTP activity, although it has not been tried.
Our results are consistent with these observations. They single out the activation of GSTP as an operation that blocks tumor progression.
In initial states where no size 1 perturbation suffices, GSTP does not participate in a perturbation. This is consistent with the observation that GSTP is often highly expressed in cells that have already turned malignant.
There are four common perturbations of size 2. All of them include repression of natural killer enhancing factor B, accompanied by activation of one of BCL2A, TGFβ, NFκB, or BetaActin. The first two operations are associated with repression tumor cell death, while the latter three are associated with constant induction of cell migration.
The most common perturbations of size 3 are activation of both TGFβ and NFκB or repression of these entities in addition to activation of the entity BCL2A1.
 a.
In the first stage tumor cells migrate and adhere to existing blood vessels. Huber et al. concluded that NFκB, at least in part, substitutes for TGFβ in the process of EMT, which is essential for tumor migration.
 b.
In the second stage of tumor progression, blood vessel cells undergo apoptosis, and the nearby tumor cells undergo necrosis. Breaking celltocell adhesion is thought to be a trigger for the apoptotic process. Disrupting cell migration or preventing apoptosis may halt the regulatory program at the second stage.
 c.
In the final stage, new blood vessels are formed. The initial states that correspond to this stage are included in the prohibited phenotype.
Thus, the combination of antiapoptotic signals in addition to setting of cell migration signals in size 2 and size 3 perturbations may correspond to blocking of apoptosis and disrupting the formation of blood vessels, and halting the regulatory program at the second stage. The most common size 1 perturbation may correspond to prevention of the first stage of tumor progression.
We interpret our findings in light of existing experimental data as follows: GSTP can prevent the initiation of the vasculogenesis program. In later stages it is no longer effective, but other genes can be disrupted in order to halt this program, depending on the stage of vasculogenesis  the later the stage the larger the perturbation that is needed.
All executions were performed on x86 64 bits machines with Pentium IV or Zeon processor and at most 2 GB RAM. Jobs were run in a timesharing environment and therefore the running times are only an upper bound. The program code was written in C. After 12 hours, 70% of the jobs finished. Since the rest of the jobs required more than 24 hours, we used only those 70% that concluded early in our analysis.
Discussion
Systemlevel analysis presents researchers with new challenges and at the same time offers new opportunities for better understanding of the biology. The complexity of reconstructing biological networks and analyzing their dynamics makes computational tools essential for systemlevel approaches [56, 57]
We have described a computational method that determines the minimum size perturbations required for obtaining (or avoiding) a specific phenotype. Because the function of genes depends on the global context in which they are active  the state of the system  the phenotype cannot be represented by the activity or inactivity of a single gene, but rather by the global state of the network. We therefore defined a phenotype based on network dynamics as a set of global states that must be preserved (or avoided), and designed an algorithm that follows this definition. The method was implemented for a probabilistic Boolean model, and was demonstrated on a glioma network.
We showed that two major problems in network analysis, namely state explosion and partial knowledge, can be alleviated by translation to Petri nets and extensions of the unfolding technique. Our method demonstrates the power of computational analysis of the network's dynamics. On the glioma network it singled out one perturbation of size 1 whose effect on the phenotype was strongest. That perturbation has strong support in the literature. In addition, the most prominent perturbations of sizes 2 and 3 can be explained in the context of glioma progression. We expect this method can be used to derive such insights for other networks, because it does not require perfect knowledge and uses the broadly applicable Petri net semantics.
Though the paper focuses on GRNs, the suggested computational method can be applied to signaling or metabolic networks and to networks that integrate several layers, e.g. metabolic and regulatory. Petri nets have been used for modeling all these network types.
Our method has several limitations: Some instances of the problem still require exponential running time, making our method impractical for finding a minimal perturbation for large models. Our method is sensitive to modeling accuracy and depends on the correctness of prior knowledge, albeit in a probabilistic setting. In addition, we assume that the network is asynchronous, while in some cases the order of occurrence of regulation functions may be determined by large rate differences among them.
Improving the algorithm's performance is one of our future goals. The minimal perturbation algorithm can be used in practice only when the size of a perturbation is small; allowing larger perturbations requires new algorithmic ideas. However, to date it is impractical to perturb more than a few entities in the cell, making speedups useful primarily for analyzing larger networks. The case where some of the entities are synchronized and some are not can also be considered (Ref. [37] shows how synchronized networks can be modeled with Petri nets). Finally, the unfolding algorithm may be improved by modifying the cutoff criterion.
Other model checking techniques for Petri nets are described in ref. [58]. Though not directly related to unfolding, they provide alternative attempts to battle the state explosion problem when using the Petri net semantic.
Conclusion
The ability to effectively manipulate a given network's dynamics in order to produce a desired behavior depends both on advances in experimental techniques and on the ability to computationally analyze the network. We presented a computational methodology for determining a minimum size perturbation yielding a desired phenotype that copes with some of the urgent difficulties in modeling. Application of this methodology to ongoing experimental projects and extension of its theoretical foundations are among our future goals.
Appendix
Theorem
Let P be a phenotype (respectively, a prohibited phenotype). If there is a set of regulation functions F with probability ≥α that generates a trajectory that does not remain in P (respectively, that leads to P), such a trajectory will be represented by a configuration C in the branching process graph and φ'(C) ⊆ F.
Proof of the theorem
We prove the theorem for a phenotype. The proof for a prohibited phenotype is symmetric.
Let S be a state that does not belong to the phenotype, and let F be a set of regulation functions with probability ≥α such that F generates some trajectory that reaches S.
The proof is by induction on the number of state traversals (edges) in the state graph that are needed for reaching the state S. For purposes of the proof, we will use the term "infinite branching process graph" for a branching process graph in which cutoff points are not applied, and the term "finite branching process graph" for the branching process graph that is created by the algorithm.
Base
Zero state traversals, i.e. the initial state. The initial state is reachable by every set of regulation functions. In the branching process graph it is represented by the initial marking. The set φ of the initial marking is the empty set, and therefore the theorem holds for the base case.
Assumption
Every state that is reachable by a set of regulation functions with probability ≥α and N1 edge traversals is represented in the branching process graph.
Step
Let π be the path in the state graph that leads to S, and let N be the length (number of state traversals) in π. We want to show that some trajectory leading to S that is generated by a set of regulation functions with probability ≥α is represented in the branching process graph.
Let e be the last edge (state traversal) in π. The resulting path π' = π/{e} ends at some state S' and is of length N1. Since there is a path of length N1 to S' whose functions belong to the set F, by the inductive hypothesis S' is represented by some configuration C' in the branching process graph and φ'(C') ⊆ F.
Let t' be the transition that represents the edge e. We want to show that t' can be added to the branching process graph to yield a configuration C that represents π.
First, all of the input places that t' requires are output places of C', and therefore are not in conflict. Add t' to the branching process graph such that it consumes from these places. Since φ'(C') ∪ {t' }⊆ F, t' will not be set as a cutoff point according to cutoff criterion 2. If t' is not set as a cutoff point due to cutoff criterion 1 either, then we are finished, because we obtained a configuration C that represents S. Therefore assume that t' is set as a cutoff point according to cutoff criterion 1.
In the latter case, [t'] is already represented by some local configuration C''. According to cutoff criterion 1, φ'(C") ⊆ φ'([t']) ⊆ F. if φ(C'') ⊄ F, i.e. there are some regulation functions with probability 1.0 that are used in C'' and not in [t'], then we will build the configuration C for a set F' that has the same probability as F, i.e. probability ≥α. Otherwise, we will build C for the set F. In any case we will have φ'(C') ⊆ F.
Now, note that if [t'] was not set as a cutoff point, then the set of transitions C/[t'] could have been added to [t'] in the branching process graph to yield the configuration C. Intuitively, imagine that the branching process graph is infinite, i.e. cutoff points are not used at all. Since C'' corresponds to the same marking as [t'], transitions that correspond to the transitions of C/[t'] in the original Petri net can be added to C'' in an infinite branching process graph to produce a new configuration C''' that is smaller than C and φ'(C''') ⊆ F. If the new configuration is not represented in the finite branching process graph, then it must also contain a cutoff point t''. We can repeat the same process with the cutoff point t'', until we get a configuration that has the same marking as C, uses only functions of F (or of a set with equal probability), and is represented in the finite branching process graph. We will surely obtain such a configuration because each time that we repeat this process the local configuration that corresponds to the cutoff point becomes smaller, and the minimal size of a configuration is 0.
Declarations
Acknowledgements
We thank Yoel Kloog and Marcelo Ehrlich for helpful discussions and comments. This study was supported in part by the European Community's Seventh Framework Programme under grant agreement n° HEALTHF42007200767 for the APOSYS project. GK is supported by a fellowship from the Edmond J. Safra Bioinformatics Program at Tel Aviv University.
Authors’ Affiliations
References
 Kitano H: Systems biology: a brief overview. Science. 2002, 295: 16621664. 10.1126/science.1069492View ArticlePubMedGoogle Scholar
 Noble D: The music of life: biology beyond the genome. 2006, Oxford: Oxford University PressGoogle Scholar
 Noble D: Claude Bernard, the first systems biologist, and the future of physiology. Exp Physiol. 2008, 93: 1626. 10.1113/expphysiol.2007.038695View ArticlePubMedGoogle Scholar
 Noble D: Genes and causation. Philos Transact A Math Phys Eng Sci. 2008, 366: 30013015. 10.1098/rsta.2008.0086View ArticleGoogle Scholar
 Ihekwaba AE, Broomhead DS, Grimley R, Benson N, White MR, Kell DB: Synergistic control of oscillations in the NFkappaB signalling pathway. Syst Biol. 2005, 152: 153160.View ArticleGoogle Scholar
 Bentele M, Lavrik I, Ulrich M, Stosser S, Heermann DW, Kalthoff H, Krammer PH, Eils R: Mathematical modeling reveals threshold mechanism in CD95induced apoptosis. J Cell Biol. 2004, 166: 839851. 10.1083/jcb.200404158PubMed CentralView ArticlePubMedGoogle Scholar
 Li F, Long T, Lu Y, Ouyang Q, Tang C: The yeast cellcycle network is robustly designed. Proc Natl Acad Sci USA. 2004, 101: 47814786. 10.1073/pnas.0305937101PubMed CentralView ArticlePubMedGoogle Scholar
 Herrgard MJ, Lee BS, Portnoy V, Palsson BO: Integrated analysis of regulatory and metabolic networks reveals novel regulatory mechanisms in Saccharomyces cerevisiae. Genome Res. 2006, 16: 627635. 10.1101/gr.4083206PubMed CentralView ArticlePubMedGoogle Scholar
 Akutsu T, Hayashida M, Ching WK, Ng MK: Control of Boolean networks: hardness results and algorithms for tree structured networks. J Theor Biol. 2007, 244: 670679. 10.1016/j.jtbi.2006.09.023View ArticlePubMedGoogle Scholar
 Sridhar P, Song B, Kahveci T, Ranka S: Mining metabolic networks for optimal drug targets. Pac Symp Biocomput. 2008, 291302.Google Scholar
 Colbourn CJ: The combinatorics of network reliability. 1987, New York: Oxford University PressGoogle Scholar
 Smith J, Theodoris C, Davidson EH: A gene regulatory network subcircuit drives a dynamic pattern of gene expression. Science. 2007, 318: 794797. 10.1126/science.1146524View ArticlePubMedGoogle Scholar
 Davidson EH, Rast JP, Oliveri P, Ransick A, Calestani C, Yuh CH, Minokawa T, Amore G, Hinman V, ArenasMena C, et al.: A genomic regulatory network for development. Science. 2002, 295: 16691678. 10.1126/science.1069883View ArticlePubMedGoogle Scholar
 Kauffman S, Peterson C, Samuelsson B, Troein C: Random Boolean network models and the yeast transcriptional network. Proc Natl Acad Sci USA. 2003, 100: 1479614799. 10.1073/pnas.2036429100PubMed CentralView ArticlePubMedGoogle Scholar
 Biondi EG, Reisinger SJ, Skerker JM, Arif M, Perchuk BS, Ryan KR, Laub MT: Regulation of the bacterial cell cycle by an integrated genetic circuit. Nature. 2006, 444: 899904. 10.1038/nature05321View ArticlePubMedGoogle Scholar
 Covert MW, Palsson BO: Transcriptional regulation in constraintsbased metabolic models of Escherichia coli. J Biol Chem. 2002, 277: 2805828064. 10.1074/jbc.M201691200View ArticlePubMedGoogle Scholar
 Karlebach G, Shamir R: Modelling and analysis of gene regulatory networks. Nat Rev Mol Cell Biol. 2008, 9: 770780. 10.1038/nrm2503View ArticlePubMedGoogle Scholar
 Yeang CH, Ideker T, Jaakkola T: Physical network models. J Comput Biol. 2004, 11: 243262. 10.1089/1066527041410382View ArticlePubMedGoogle Scholar
 Lähdesmäki H, Shmulevich I, YliHarja O: On Learning Gene Regulatory Networks Under the Boolean Network Model. Machine Learning. 2003, 52: 147167. 10.1023/A:1023905711304.View ArticleGoogle Scholar
 GatViks I, Tanay A, Shamir R: Modeling and analysis of heterogeneous regulation in biological networks. J Comput Biol. 2004, 11: 10341049. 10.1089/cmb.2004.11.1034View ArticlePubMedGoogle Scholar
 GatViks I, Tanay A, Raijman D, Shamir R: A probabilistic methodology for integrating knowledge and experiments on biological networks. J Comput Biol. 2006, 13: 165181. 10.1089/cmb.2006.13.165View ArticlePubMedGoogle Scholar
 Friedman N: Inferring cellular networks using probabilistic graphical models. Science. 2004, 303: 799805. 10.1126/science.1094068View ArticlePubMedGoogle Scholar
 Assmus HE, Herwig R, Cho KH, Wolkenhauer O: Dynamics of biological systems: role of systems biology in medical research. Expert Rev Mol Diagn. 2006, 6: 891902. 10.1586/14737159.6.6.891View ArticlePubMedGoogle Scholar
 Gibbs JB: Mechanismbased target identification and drug discovery in cancer research. Science. 2000, 287: 19691973. 10.1126/science.287.5460.1969View ArticlePubMedGoogle Scholar
 Sander C: Genomic medicine and the future of health care. Science. 2000, 287: 19771978. 10.1126/science.287.5460.1977View ArticlePubMedGoogle Scholar
 Andrianantoandro E, Basu S, Karig DK, Weiss R: Synthetic biology: new engineering rules for an emerging discipline. Mol Syst Biol. 2006, 2: 2006 0028Google Scholar
 Basu S, Gerchman Y, Collins CH, Arnold FH, Weiss R: A synthetic multicellular system for programmed pattern formation. Nature. 2005, 434: 11301134. 10.1038/nature03461View ArticlePubMedGoogle Scholar
 Murata T: Petri nets: Properties, analysis and applications. Proceedings of the IEEE. 1989, 77: 541580. 10.1109/5.24143.View ArticleGoogle Scholar
 McMillan KL, Probst DK: A technique of state space search based on unfolding. Formal Methods in System Design. 1995, 6: 4565. 10.1007/BF01384314.View ArticleGoogle Scholar
 Roden DM, George AL: The genetic basis of variability in drug responses. Nat Rev Drug Discov. 2002, 1: 3744. 10.1038/nrd705View ArticlePubMedGoogle Scholar
 Lieberman PM, Berk AJ: The Zta transactivator protein stabilizes TFIID association with promoter DNA by direct proteinprotein interaction. Genes Dev. 1991, 5: 24412454. 10.1101/gad.5.12b.2441View ArticlePubMedGoogle Scholar
 Garg A, Aggarwal BB: Nuclear transcription factorkappaB as a target for cancer drug development. Leukemia. 2002, 16: 10531068. 10.1038/sj.leu.2402482View ArticlePubMedGoogle Scholar
 Nielsen LL, Maneval DC: P53 tumor suppressor gene therapy for cancer. Cancer Gene Ther. 1998, 5: 5263.PubMedGoogle Scholar
 Gilbert D, Heiner M: From Petri Nets to Differential Equations  An Integrative Approach for Biochemical Network Analysis. 2006, Heidelberg: Springer BerlinView ArticleGoogle Scholar
 Kuffner R, Zimmer R, Lengauer T: Pathway analysis in metabolic databases via differential metabolic display (DMD). Bioinformatics. 2000, 16: 825836. 10.1093/bioinformatics/16.9.825View ArticlePubMedGoogle Scholar
 Sackmann A, Heiner M, Koch I: Application of Petri net based analysis techniques to signal transduction pathways. BMC Bioinformatics. 2006, 7: 482 10.1186/147121057482PubMed CentralView ArticlePubMedGoogle Scholar
 Steggles LJ, Banks R, Shaw O, Wipat A: Qualitatively modelling and analysing genetic regulatory networks: a Petri net approach. Bioinformatics. 2007, 23: 336343. 10.1093/bioinformatics/btl596View ArticlePubMedGoogle Scholar
 Koch I, Heiner M: Petri nets. Analysis of Biological networks. Edited by: Junker BH, Schreiber F. 2008, 139180. full_text. [Pan Y, Zomaya AY (Series Editor)]View ArticleGoogle Scholar
 Nagasaki M, Doi A, Matsuo Y, Miyano S: Computational Modeling of Biological Processes with Petri NetBased Architecture. Bioinformatics Technologies. Edited by: Chen YP. 2005, 179243. full_text. Springer Berlin HeidelbergView ArticleGoogle Scholar
 Sackmann A, Formanowicz D, Formanowicz P, Koch I, Blazewicz J: An analysis of the Petri net based model of the human body iron homeostasis process. Computational Biology and Chemistry. 2007, 31: 110. 10.1016/j.compbiolchem.2006.09.005View ArticlePubMedGoogle Scholar
 Reddy VN, Liebman MN, Mavrovouniotis ML: Qualitative analysis of biochemical reaction systems. Comput Biol Med. 1996, 26: 924. 10.1016/00104825(95)000429View ArticlePubMedGoogle Scholar
 Chaouiya C, Remy E, Ruet P, Thieffry D: Qualitative Modelling in Genetic Networks: From Logical Regulatory Graphs to Standard Petri Nets. Lecture Notes in Computer Science. 2004, 3099: 137156.View ArticleGoogle Scholar
 Grunwald S, Speer A, Ackermann J, Koch I: Petri net modelling of gene regulation of the Duchenne muscular dystrophy. Biosystems. 2008, 92: 189205. 10.1016/j.biosystems.2008.02.005View ArticlePubMedGoogle Scholar
 Kielbassa J, Bortfeldt R, Schuster S, Koch I: Modeling of the U1 snRNP assembly pathway in alternative splicing in human cells using Petri nets. Comput Biol Chem. 2009, 33: 4661. 10.1016/j.compbiolchem.2008.07.022View ArticlePubMedGoogle Scholar
 Matsuno H, Doi A, Nagasaki M, Miyano S: Hybrid Petri net representation of gene regulatory network. Pac Symp Biocomput. 2000, 341352.Google Scholar
 Mcmillan KL: A Technique of StateSpace Search Based on Unfolding. Formal Methods in System Design. 1995, 6: 4565. 10.1007/BF01384314.View ArticleGoogle Scholar
 Esparza J, Romer S, Vogler W: An improvement of McMillan's unfolding algorithm. Formal Methods in System Design. 2002, 20: 285310. 10.1023/A:1014746130920.View ArticleGoogle Scholar
 Shmulevich I, Dougherty ER, Kim S, Zhang W: Probabilistic Boolean Networks: a rulebased uncertainty model for gene regulatory networks. Bioinformatics. 2002, 18: 261274. 10.1093/bioinformatics/18.2.261View ArticlePubMedGoogle Scholar
 Fuller GN, Rhee CH, Hess KR, Caskey LS, Wang R, Bruner JM, Yung WK, Zhang W: Reactivation of insulinlike growth factor binding protein 2 expression in glioblastoma multiforme: a revelation by parallel gene expression profiling. Cancer Res. 1999, 59: 42284232.PubMedGoogle Scholar
 Zhang SQ, Ching WK, Ng MK, Akutsu T: Simulation study in Probabilistic Boolean Network models for genetic regulatory networks. Int J Data Min Bioinform. 2007, 1: 217240. 10.1504/IJDMB.2007.011610View ArticlePubMedGoogle Scholar
 Jones N, Dumont DJ: Tek/Tie2 signaling: new and old partners. Cancer Metastasis Rev. 2000, 19: 1317. 10.1023/A:1026555121511View ArticlePubMedGoogle Scholar
 Downes GB, Gautam N: The G protein subunit gene families. Genomics. 1999, 62: 544552. 10.1006/geno.1999.5992View ArticlePubMedGoogle Scholar
 Feistritzer C, Mosheimer BA, Sturn DH, Bijuklic K, Patsch JR, Wiedermann CJ: Expression and function of the angiopoietin receptor Tie2 in human eosinophils. J Allergy Clin Immunol. 2004, 114: 10771084. 10.1016/j.jaci.2004.06.045View ArticlePubMedGoogle Scholar
 Offermanns S, Mancino V, Revel JP, Simon MI: Vascular system defects and impaired cell chemokinesis as a result of Galpha13 deficiency. Science. 1997, 275: 533536. 10.1126/science.275.5299.533View ArticlePubMedGoogle Scholar
 Tew KD: Redox in redux: Emergent roles for glutathione Stransferase P (GSTP) in regulation of cell signaling and Sglutathionylation. Biochem Pharmacol. 2007, 73: 12571269. 10.1016/j.bcp.2006.09.027View ArticlePubMedGoogle Scholar
 Koch I, Junker BH, Heiner M: Application of Petri net theory for modelling and validation of the sucrose breakdown pathway in the potato tuber. Bioinformatics. 2005, 21: 12191226. 10.1093/bioinformatics/bti145View ArticlePubMedGoogle Scholar
 Matsuno H, Tanaka Y, Aoshima H, Doi A, Matsui M, Miyano S: Biopathways representation and simulation on hybrid functional Petri net. In Silico Biol. 2003, 3: 389404.PubMedGoogle Scholar
 Valmari A: The State Explosion Problem. Lecture Notes on Petri Nets I: Basic Models. Volume 1. Edited by: Goos G, Hartmanis J, van Leeuwen J. 1998, 429529. Berlin: SpringerView ArticleGoogle Scholar
 Shannon P, Markiel A, Ozier O, Baliga NS, Wang JT, Ramage D, Amin N, Schwikowski B, Ideker T: Cytoscape: a software environment for integrated models of biomolecular interaction networks. Genome Res. 2003, 13: 24982504. 10.1101/gr.1239303PubMed CentralView ArticlePubMedGoogle Scholar
Copyright
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.