
Natural killer (NK) cells are cytotoxic innate lymphocytes that represent the first line of defense against pathogen infections and tumor growth thanks to their ability to kill cancerous or infected cells and release pro-inflammatory cytokines. NK cell activation is regulated by the expression of a wide array of inhibitory receptors for MHC-I molecules and activating receptors, including NKG2D, which recognize self-ligands upregulated on stressed and damaged cells. Even though the expression of NKG2D ligands (NKG2DL) flags the target cells for NK cell-mediated elimination, a persistent interaction of NKG2D with its ligands promotes receptor downregulation, mainly through the internalization and lysosomal degradation of NKG2D/NKG2DL complexes, thus leading to an exhausted phenotype. On both human and murine NK cells, this phenotype is characterized by the down-modulation of the cytolytic machinery and the upregulation of inhibitory receptors.
In this review, we discuss the current knowledge on the contribution of the NKG2D/NKG2DL axis in both NK cell-mediated clearance of infected and transformed cells and in the dysregulation of NK cell activity due to chronic exposure to NKG2DLs during tumorigenesis.
Citation: Caterina Marangio, Rosa Molfetta, Erisa Putro, Alessia Carnevale, Rossella Paolini. Exploring the dynamic of NKG2D/NKG2DL axis: A central regulator of NK cell functions[J]. AIMS Allergy and Immunology, 2025, 9(2): 70-88. doi: 10.3934/Allergy.2025005
[1] | Afeez Abiola Hazzan, Patti Follansbee, Jason Dauenhauer, Alexandra E Completo . Relationship between family caregiver quality of life and the care provided to people living with dementia: protocol for a mixed methods study. AIMS Public Health, 2020, 7(2): 301-305. doi: 10.3934/publichealth.2020025 |
[2] | Laura Gonzalo-Ciria, Marta Pérez De Heredia-Torres, María Isabel Vidal-Sánchez, María José López-de-la-Fuente, Elisa Bullón-Benito, Ana Poveda-García, Mariana Ortiz-Piña, María Cristina Ruiz-Garrós, Ana Gascón-Catalán . Loss of productivity among caregivers of dependent family members. AIMS Public Health, 2025, 12(2): 451-469. doi: 10.3934/publichealth.2025025 |
[3] | Anastasia Stathopoulou, Georgios F. Fragkiadakis . Assessment of psychological distress and quality of life of family caregivers caring for patients with chronic diseases at home. AIMS Public Health, 2023, 10(2): 456-468. doi: 10.3934/publichealth.2023032 |
[4] | Allison B. Reiss, Donna de Levante Raphael, Nathaniel A. Chin, Vivek Sinha . The physician's Alzheimer's disease management guide: Early detection and diagnosis of cognitive impairment, Alzheimer's disease and related dementia. AIMS Public Health, 2022, 9(4): 661-689. doi: 10.3934/publichealth.2022047 |
[5] | Anna Kavga, Ioannis Kalemikerakis, Theocharis Konstantinidis, Ioanna Tsatsou, Petros Galanis, Eugenia Karathanasi, Ourania Govina . Factors associated with social support for family members who care for stroke survivors. AIMS Public Health, 2022, 9(1): 142-154. doi: 10.3934/publichealth.2022011 |
[6] | Susanne Klawetter, Jennifer C. Greenfield, Stephanie Rachel Speer, Kyria Brown, Sunah S. Hwang . An integrative review: maternal engagement in the neonatal intensive care unit and health outcomes for U.S.-born preterm infants and their parents. AIMS Public Health, 2019, 6(2): 160-183. doi: 10.3934/publichealth.2019.2.160 |
[7] | Carla Gonçalves, Helena Moreira, Ricardo Santos . Systematic review of mediterranean diet interventions in menopausal women. AIMS Public Health, 2024, 11(1): 110-129. doi: 10.3934/publichealth.2024005 |
[8] | Sukhbir Singh, Manjunath B Govindagoudar, Dhruva Chaudhry, Pawan Kumar Singh, Madan Gopal Vashist . Assessment of knowledge of COVID-19 among health care workers-a questionnaire-based cross-sectional study in a tertiary care hospital of India. AIMS Public Health, 2021, 8(4): 614-623. doi: 10.3934/publichealth.2021049 |
[9] | Elham Hatef, Zachary Predmore, Elyse C. Lasser, Hadi Kharrazi, Karin Nelson, Idamay Curtis, Stephan Fihn, Jonathan P. Weiner . Integrating social and behavioral determinants of health into patient care and population health at Veterans Health Administration: a conceptual framework and an assessment of available individual and population level data sources and evidence-based measurements. AIMS Public Health, 2019, 6(3): 209-224. doi: 10.3934/publichealth.2019.3.209 |
[10] | Ali Hussain Ansari, Saqib Hussain Ansari, Mubarak Jabeen Salman, Muhammad Usman Hussain Ansari, Rawshan Jabeen . A scoping review on the obstacles faced by beta thalassemia major patients in Pakistan- Matter of policy investment. AIMS Public Health, 2024, 11(4): 1105-1124. doi: 10.3934/publichealth.2024057 |
Natural killer (NK) cells are cytotoxic innate lymphocytes that represent the first line of defense against pathogen infections and tumor growth thanks to their ability to kill cancerous or infected cells and release pro-inflammatory cytokines. NK cell activation is regulated by the expression of a wide array of inhibitory receptors for MHC-I molecules and activating receptors, including NKG2D, which recognize self-ligands upregulated on stressed and damaged cells. Even though the expression of NKG2D ligands (NKG2DL) flags the target cells for NK cell-mediated elimination, a persistent interaction of NKG2D with its ligands promotes receptor downregulation, mainly through the internalization and lysosomal degradation of NKG2D/NKG2DL complexes, thus leading to an exhausted phenotype. On both human and murine NK cells, this phenotype is characterized by the down-modulation of the cytolytic machinery and the upregulation of inhibitory receptors.
In this review, we discuss the current knowledge on the contribution of the NKG2D/NKG2DL axis in both NK cell-mediated clearance of infected and transformed cells and in the dysregulation of NK cell activity due to chronic exposure to NKG2DLs during tumorigenesis.
In the dynamical systems community, networks are largely studied as families of Euclidean edges E:=([0,we])e∈E, with we∈R>0 and E being an index set. The network's structure is often only incorporated by defining a family of dynamical systems Φe:[0,T]×E→S,e∈E, where S models some state-space, T∈R>0, and the systems are coupled by their boundary conditions. Networks typically do not appear explicitly as mathematical objects and are not subject to further study.
In this work, however, we construct networks as metric spaces (N,d), where d is a notion of path distance. We show that sufficiently regular networks (N,d) are Polish metric spaces—a convenient setting for deriving basic measure-theoretic notions underpinning abstract analysis. Although Euclidean calculus does not immediately apply to such networks, we develop, with minimal assumptions, a metric calculus for networks that preserves the properties of the known Euclidean setting.
Using such network calculus we introduce a weak notion of hyperbolic conservation laws, for which our main theorem, Theorem 4.2, states equivalence with an edge-wise system (Φe)e∈E if all Φe are a solution to a hyperbolic conservation law on a Euclidean edge and Kirchhoff's algebraic boundary conditions hold for each t∈[0,T]. The theorem applies, in particular, if a solution to a hyperbolic conservation law admits a quasi-linear form (see Remark 8). Theorem 4.2 therefore implies that an arguably universal calculus for networks exists for which hyperbolic conservation laws can be stated without explicit Kirchhoff-type boundary conditions. Concerning the uniqueness of quasi-linear hyperbolic conservation laws, an Entropy condition is required edge-wise and additional conditions need to be satisfied at the boundaries. A global analysis perspective could help here as well and one could expect to formulate an Entropy condition on the entire network without a specific emphasis on the nodes and boundary conditions.
The results of our work thereby contribute to unifying the study of global objects relevant to dynamical systems, such as time-limiting phenomena or approximations, with the study of physically-plausible transport models in a mostly Euclidean setting. Furthermore, our work derives from the most basic axioms of mathematical analysis, a widely observed and practically essential phenomenon of mathematical physics.
Motivation and related work Networks are essential models in many applications such as information technology, chemistry, power systems, transportation, neuroscience, and social sciences. In light of such broad applicability, a general theory of (dynamical systems on) networks may
● derive system properties from basic axioms, in particular, when they cannot be validated precisely by the experimental method of physics, such as in traffic system modeling,
● provide a setting for describing abstract concepts, such as Kirchhoff's law, and
● make existing mathematical results applicable, e.g., limit theorems from probability or the theory of Lp-spaces.
Rather recently, the study of networks was, therefore, extended by a global—as opposed to edgewise-Euclidean—perspective based on modeling networks as abstract metrizable spaces [12,23,25]. While such network spaces, often also called quantum graphs, have been studied greatly before [1,22,27,31,32,33], novel global phenomena may now be studied from the abstract perspective.
Transport on networks, modeled by coupled Euclidean hyperbolic conservation laws, has been of particular interest to the mathematical, science, and engineering communities [2,3,4,5,9,10,11,13,14,15,16,17,18,19,24,28,29]. Thus, we seek to derive a coupling of hyperbolic conservation laws as a consequence of the network's geometry and an associated abstract calculus characterized by universal properties. With such derivation, Kirchhoff's first law for hyperbolic conservation laws is provable and replaces a set of phenomenological model axioms.
Outline In Section 2, we introduce a particularly accessible setting for constructing networks based on graph data and equivalence relations, discuss the (un)suitability of graphs for the purpose of network modeling, rule out pathological examples of networks to develop a notion of regularity, and motivate the notion of path distance.
We continue constructing a Lebesgue-like measure for networks, developing differentiability, derivatives, and integration by parts in Section 3.
We close with motivating a notion of a weak hyperbolic conservation law for networks in Section 4, which lets us derive our main theorem, Theorem 4.2, an analog of Kirchhoff's law for these abstract dynamical systems.
Our initial goal of this work is to introduce a rigorous notion of a network. Networks ought to be the central objects on which the rest of the theory will build. A guiding perspective is taken in classical mechanics, built into many of the mathematical terms used in this section. The decisive impact of this perspective will be demonstrated first.
Due to the widespread use of graphs in discrete mathematical modeling of related real-world phenomena, it is of interest to discuss their relevance to the purpose of network modeling. Classically, only when modeling pairwise relations of elements of a set V called vertices, one resorts to graphs (V,E), with E:K→V×V, where E(k) is called an edge, K is an index set and k∈K. This representation includes multiple edges with the same vertices. Possibly, one assigns a weight W:K→R>0 to each edge to describe additional structure.
Definition 2.1 (Positively weighted graph). A positively weighted graph is a tuple (V,E,W), where V is a set, E:K→V×V is a function from an index set K to the product of V with itself, and W:K→R>0 is a function from K to the positive reals. It is required that E(K)1∪E(K)2=V, * that is, all vertices are connected to an edge.
*The subscript denotes the projection on the respective element of the tuple.
As a network model and for the purpose of modeling in this work, however, graphs will not be sufficient. In mathematical terms, one can find an indication of the unsuitability of graphs in Lemma 2.1.
Lemma 2.1. Every metric, path-connected, finite vertex space has only one vertex.
Proof. A finite metric space (V,d) has the discrete topology as for all x∈V the ball with a radius smaller than
miny∈V∖{x}d(x,y) |
contains only x. If V carries the discrete topology all subsets of V are clopen. If V is additionally path-connected, it is also connected, and thus the only clopen sets are ∅ and V. This implies V={x}.
Lemma 2.1 characterizes the incompatibility of graphs and the continuity of real numbers embedded into much of the mathematical language. This is relevant to practical problems, as continuity is the defining structure in continuum mechanics and is thus an inherent property in modeling network phenomena. In applications, the following, slightly informally stated properties are expected to be fulfilled.
A network ought to be path−connected,admit a compatible notion of distance,be complete,and have reasonable integration. | (2.1) |
Nonetheless, it turns out that one can construct networks that fulfill Property 2.1 from graphs but not as graphs—as will be shown by Definition 2.2 and Theorem 2.1. That is, positively weighted graphs non-uniquely encode the information of a specific network among all networks. Yet additional information is supplied by intervals of real numbers to obtain a general network setting with Property 2.1.
A quite elementary way to construct a network with such properties is as a set of equivalence classes of elements of intervals in R with a notion of path distance. While there are multiple ways to construct such spaces mathematically, even such that do not rely on graphs, the Definition 2.2 networks will be constructed as a set and equipped with a distance function. Some pathological examples of networks will then be ruled out in Definition 2.3, and Property 2.1 proven in Theorem 2.1. This presentation may be relatively accessible for interdisciplinary study, as it requires only a small amount of abstract language. Two examples of street networks are visualized in Figure 1.
A topological construction of networks, on the other hand, is given in [26]. Although the topological setting is arguably elegant, the presented quotient topology in general agrees with the path distance topology only for (in the work termed "combinatorically") locally finite networks (see "middle" of Figure 3). As a benefit of such a setting, it becomes clear that networks are topologically characterized by the universal property of the quotient topology. In this work, it will be shown that the assumption of a countable number of edges can be recovered from the regularity assumptions of Definition 2.3.
To define networks in a concise way, the following tools are introduced. Given a family (I(wj))j∈J of intervals I(wj):=[0,wj]⊆R with wj>0 for all j∈J and J being a non-empty index set. The disjoint union of these intervals is defined as
Un((I(wj))j∈J):={(x,j)∣x∈I(wj),j∈J}, |
and an extended metric on Un((I(wj))j∈J) is defined as
d′:Un((I(wj))j∈J)×Un((I(wj))j∈J)⟶[0,∞],((x,j),(x′,j′))⟼{|x−x′|,if j=j′∞,otherwise. |
Definition 2.2 (Network). Given a positively weighted graph (V,E,W), one can define an equivalence relation∼on the disjoint union Un((I(W(k)))k∈K) by
(x,k)∼(x′,k′):⟺{x=x′andE(k)=E(k′)orx=x′=0andE(k)1=E(k′)1orx=0andx′=W(k′)andE(k)1=E(k′)2orx=W(k)andx′=0andE(k)2=E(k′)1orx=W(k)andx′=W(k′)andE(k)2=E(k′)2. |
A network associated with (V,E,W) is defined as the set N of equivalence classes
N:={[x]∣x∈Un((I(W(k)))k∈K)}, |
where
[x]:={y∈Un((I(W(k)))k∈K)∣y∼x}. |
A network is endowed with a function
d:N×N⟶[0,∞],(x,x′)⟼inf{n∑i=1d′(pi,qi)|n∈N;(pi)i∈N≤n,(qi)i∈N≤n∈Un((I(W(k)))k∈K)x∼p1;x′∼qn;∀i∈N[1,n−1]:qi∼pi+1}. |
Remark 1 (Network). In N, the equivalence classes of the boundaries of intervals are called vertices of the network and denoted with V. The set E is called edges of the network N, where an element is a set that contains the equivalence classes of elements with the same index. The vertices of an edge e∈E are denoted by 0e and we. Note that the distance function d does not regard the orientation of the edges. The edges that contain the vertex v will be denoted with Ev.
Essentially, intervals are "glued" together, and a universal extension from distances along intervals to distances along simple paths is constructed. At this point, paths have not been defined rigorously. In fact, paths will be recovered from the distance function d—which will be shown to be a metric—in the case of regular networks.
A classic example of a network is the Wheatstone network, which originated from electrodynamics [34] and is seminal in the study of transportation systems [7].
Example 2.1 (Wheatstone network). As per Definition 2.2, one can characterize a network by a positively weighted graph (Vwh,Ewh,Wwh), where Vwh:={1,…,6}, Kwh:={1,…,7}, and Ewh:Kwh→Vwh×Vwh, and
Ewh(1):=(1,2),Ewh(2):=(2,3),Ewh(3):=(2,4),Ewh(4):=(3,4),Ewh(5):=(3,5),Ewh(6):=(4,5), andEwh(7):=(5,6). |
The weight function can be picked rather arbitrarily, but an embedding into R2 preserves vertex distances, e.g., for Wwh≡1. The network Nwh characterized by the graph (Vwh,Ewh,Wwh) is called Wheatstone network. See Figure 2 for a visualization of the Wheatstone network.
There are certain networks, depicted in Figure 3, that do not carry the structure required in Property 2.1. These networks turn out to be somewhat pathological and do not lend themselves well to the purpose of modeling real-world networks. However, the following definition describes networks that fulfill all of the requirements of Property 2.1.
Definition 2.3 (Regularity). A network N is called regular if
● it is locally finite, i.e., each vertex is included in at most a finite number of edges,
● there exists a positive lower bound of the edge lengths, and
● it is connected with respect to the topology induced by d.
Regular networks allow the description of Lebesgue integration, continuous functions, and paths. These constructs are essential to the theory and practice of modeling transport phenomena on networks. The following theorem, therefore, describes several mathematical qualities of networks that enable their study.
Theorem 2.1 (Regularity). Regular networks (N,d) are path-connected, complete, locally compact, separable metric spaces with a countable number of edges.
Remark 2 (Regularity). Regularity, therefore, implies that networks are Polish spaces. All networks considered will be regular for the remainder of this work.
Proof.
1. It is shown that d is an extended metric (may take the value ∞) on a regular network.
Identitity of indiscernibles: Let x,y∈N. If x≠y their distance d(x,y) is not smaller than the length of a subinterval of some edge. To see why that is, consider the following cases.
x is a vertex: Either y must be an inner point of one of the finite number of edges connected to x. In this case (in slight abuse of notation) d(x,y)≥min{|x−y|,ε}, where ε is a positive lower bound to the edge lengths. Otherwise, y is contained in an edge not connected to x. In this case d(x,y)≥ε.
x is not a vertex: d(x,y) is larger or equal to the shortest distance of x to the closest vertex (see previous case) or (in slight abuse of notation) d(x,y)=|x−y| if x and y are on the same edge.
If x=y, one has d(x,y)=0 as for p1∼x, q1∼y there is the extended metric distance d′(p1,q1)=0.
Symmetry: By the reversal of finite sequences and commutativity of addition, d is symmetric.
Triangle inequality: Pick sequences (pi,qi)i∈N,(p′i,q′i)i∈N and let x,y,z∈N and for γ>0 (see Definition 2.2) with
(n∑i=1d′(pi,qi))−d(x,y)<γ2and(n∑i=1d′(p′i,q′i))−d(y,z)<γ2,x∼p1,y∼qn,y∼p′1,z∼q′n,and∀i∈N<n:qi∼pi+1,q′i∼p′i+1. |
Such sequences exist by definition of d. By concatenation of the sequences, one has
d(x,z)−d(x,y)−d(y,z)<γ. |
As this holds for all γ>0, the triangle inequality follows.
2. It is shown that regular networks (N,d) are path-connected. By assumption, regular networks are connected. Regular networks are also locally path-connected by the argument following below. Generally, topological spaces that are connected and locally path-connected are path-connected. All of the above arguments are with respect to the topology induced by the extended metric d.
Let x∈N, then one can pick ε>0 such that Uε(x) contains only elements of N that share an edge with x. This is done such that Uε(x) is only a subset of one edge if x is not a vertex. Otherwise, ε should be picked as a lower bound of the edge lengths. Uε(x) is path-connected as edges are path-connected, and its restriction onto each edge is a subinterval.
3. By the following argument, one can show using the path-connectedness of N that the extended metric d takes only finite values, i.e., that d is a metric.
For x,y∈N pick a path γ:[0,1]→N with γ(0)=x and γ(1)=y. As [0,1] is compact, γ([0,1]) is also compact and in particular bounded. Therefore, d(x,y) is bounded by the same bound.
4. A regular network (N,d) has a countable number of edges.
Let ε>0 be the positive lower bound of the edge lengths and x∈V. The initial goal is to show that for all n∈N0
Aεn:={y∈V∣d(x,y)≤εn} |
is finite. This can be proved by an inductive argument. Clearly, |Aε|=0 and thus assume that Aεn is finite for some n∈N0. The vertices in Aε(n+1)∖Aεn are connected to Aεn by single edges, as per the lower bound of edge lengths ε. However, as Aεn is finite and all v∈Aεn are only connected to a finite number of edges, one has
|Aε(n+1)|≤∑v∈Aεn|Ev|<∞. |
This implies that by the countable union of finite sets, the set of vertices ⋃n∈N0Aεn is finite, and the set of edges is countable.
5. A regular network (N,d) is a complete space, as for all Cauchy sequences (xn)n∈N∈N one can pick N∈N such that (xn+N)n∈N is contained in a finite number of edges, which by restriction, is therefore included in a compact and thus complete subset.
6. A regular network (N,d) is locally compact, as it is complete and neighborhoods contain bounded closed neighborhoods.
7. Generally countable unions of separable spaces are separable. Thus, regular networks are separable as they are countable unions of edges, which are separable.
Lastly, for the following work, a precise notion of a path and its length is useful as it relates d and shortest paths.
Definition 2.4 (Path). A path in a regular network N is a continuous function p:[0,l]→N, where l>0. The length of a path is defined as
ℓ(p):=sup{n−1∑i=1d(p(ti),p(ti+1))|0=t1≤⋯≤tn=l,n∈N}. |
A path p:[0,l]→N is called parameterized by its length if ℓ(p|[0,l′])=l′ for all l′≤l.
Remark 3 (Path). Given an edge ek∈E, in slight abuse of notation ℓ(ek):=W(k) will also be written for any k∈K, where K is the index set of the graph associated with the network. For a path p:[0,l]→N, if p(0)=x and p(l)=y, it is said that x⇝y for p.
Theorem 2.2. In a regular network N, for any x,y∈N, there exists at least one shortest path x⇝y parametrized by its length d(x,y).
Proof. For x,y∈N, set ε:=d(x,y). The lower bound on edge lengths implies that there is a finite number of paths x⇝y in N∩Uε(x) that are parametrized by the length of each edge they can be restricted to. One of such that is shortest exists in this finite set of paths and must have length d(x,y) by definition of d.
One may desire a medium to localize a notion of mass in networks and describe concentrations thereof. This mass may be a homogeneous object, unlike, e.g., a set of distinguished agents. This perspective is particularly meaningful in what one may call "egalitarian systems", as those of infrastructure or platform providers. Mathematical measure theory provides a framework to study such objects and includes a notion of signed, discrete, and continuous media.
There is a unique measure on a network that assigns each edge and subinterval thereof its length. Measures of this type are essential for classical integration and the modeling of densities. As regular networks are metric spaces, one can consider their Borel σ-algebra B(N) as a set of measurable sets. An example of a discrete measure often encountered in practice in the form of data is pictured in Figure 4.
Definition 3.1 (Lebesgue measure). A measure λ is called the Lebesgue measure on a regular network (N,B(N)) if for all U⊆N that are isometrically isomorphic to a possibly degenerate interval, i.e. U≅[0,l], λ|U is the classical Lebesgue measure.
Remark 4 (Isometric isomorphism). Two metric spaces (U,dU),(V,dV) are isometrically isomorphic if there exists a bijective function f:U→V that preserves the metric distance, i.e., for all u1,u2∈U
dU(u1,u2)=dV(f(u1),f(u2)). |
One writes U≅V.
Lemma 3.1. On regular networks, a unique Lebesgue measure exists and is σ-finite.
Proof. For all elements x∈N, one finds a neighborhood Ux of x that is isometrically isomorphic to a possibly degenerate interval. Due to the compactness of single edges and the countability of the edges (see Theorem 2.1), one can find a countable set of elements B⊂N such that
⋃x∈BUx=N. |
Without loss of generality, assume that (Ux)x∈B are disjoint, as otherwise a disjoint cover can be constructed from (Ux)x∈B by subtraction and intersection of sets. Therefore, by σ-additivity every such measure λ must for all A∈B(N) satisfy the equation
λ(A)=λ(⋃x∈BA∩Ux)=∑x∈Bλ(A∩Ux)=∑x∈Bλ|Ux(A∩Ux), |
where λ|Ux is the classical Lebesgue measure on the interval Ux. The right-hand serves as the unique definition of a networks' Lebesgue measure, as for other covers of N one can show equality by refinement of the cover (Ux)x∈B. The Lebesgue measure is clearly σ-finite on regular networks as Ux includes only a vertex and has measure zero, or is included in an edge with a finite length.
The Lebesgue measure can be used to define an integral, called the Lebesgue integral (for the Lebesgue measure). The construction of this integral, a standard procedure, will not be covered. One also obtains Lebesgue densities, which will capture the notion of media defined by locally integrable functions and represent the state space of the dynamical systems studied in Section 4.
Some of the key uses of derivatives of mathematical objects are linear approximation and the representation of (physical) structures through differential equations. It is essential for this work to have a notion of differentiability for networks.
The common Euclidean theory of differentiation does not apply to networks as they are abstract metric spaces with non-oriented edges and vertices as non-trivial boundary. Therefore, it is tough to find a general notion of differentiability. The notions of differentiability differ depending on how much one likes to think of vertices as a boundary. The following definition may be the best choice since it enforces continuity constraints on values a function takes on vertices. Its offer of the existence of continuous differentiability may be essential to many use cases.
Definition 3.2 (Differentiability). A function f:N→R on a regular network is called k-(continuously) differentiable if f∘p is k-times (continuously) differentiable for all isometric paths p:[0,l]→N.
This notion of differentiability requires differentiability along all "structured" paths, yet does not require a notion of orientation, as only for derivatives one needs to pick a (local) orientation. Next to differentiability along edges, the definition turns out to impose an additional constraint of zero-derivatives on all vertices with more than two edges and differentiability across vertices with two edges (see Figure 5).
Differentiable functions are still missing a derivative. For a derivative, one has to pick an orientation for the edges. The orientation of network edges can be adapted to the orientation of a graph's edges that encodes the network, but it does not have to be. A problem that may appear is that there are vertices with two edges for which one picks different orientations. The following global object can solve this problem.
Definition 3.3 (Spatial derivative). An operator D:C1(N)→C(N) is called spatial derivative if it resembles a classical derivative, i.e., if for all open U⊆N for which there is an isometric isomorphism p:(0,l)→U it holds that for all f∈C1(N)
(Df)|U∘p=(f|U∘p)′. |
Remark 5 (Orientation of 1-d components).
1. In the setting of dynamical systems, the notation (⋅)x:=ddx:=D will also be used.
2. Each spatial derivative provides a specific assignment of 0e and we for each edge e∈E, as each edge inherits an orientation that is embedded into the definition. This fact can be characterized by monotonicity of functions: A function f∈C1(N) is said to be strictly monotonous on e if (Df)|e>0. Then the definition
0e:=arg min f|eandwe:=arg max f|e |
does not depend on the choice of f.
3. Given D, one can define the incoming and the outgoing edges of vertex v as
Einv:={e∈E∣we=v}andEoutv:={e∈E∣0e=v}. |
4. A spatial derivative can be computed by a simple reduction to the real-valued case. Indeed, for all e∈E there exists a unique path p parametrized by length 0e⇝we. As p is locally an isometric isomorphism, one has for all x∈e
Df(x)=(f∘p)′(p−1(x)). |
One obtains such a derivative by splitting the network on all vertices with more than two edges and picking an orientation for all parts. The partition's remaining elements are either isometric to intervals, or the original network is (topologically) a sphere. Piecewise derivatives are then compatible as they are zero at vertices with more than two edges, as this is required as per the differentiability of functions.
An analog of the classical product rule and the related integration by parts formula also holds for all spatial derivatives of a regular network. These properties are essential when dealing with certain dynamical systems that describe the transport of media in Section 4.
Lemma 3.2 (Product rule). A spatial derivative D:C1(N)→C(N) fulfills the product rule, i.e., for all x∈e∈E and f,g∈C1(N)
D(fg)(x)≡(fg|e)′(x)=f′|e(x)g|e(x)+f|e(x)g′|e(x)≡Df(x)g(x)+f(x)Dg(x). |
Proof. Straightforward.
Theorem 3.1 (Integration by parts). Let D:C1(N)→C(N) be a spatial derivative on a regular network N that is compact. Then, for all f,g∈C1(N)
∫NDfg+fDgdλ=∑e∈E(fg)(we)−(fg)(0e)=∑v∈V(∑e∈Einv(fg)(we)−∑e∈Eoutv(fg)(0e)), |
where 0e,we are the endpoints of edge e the order of which depends on D.
Proof. Let f,g∈C1(N) and D:C1(N)→C(N). One has
∫NDfg+fDgdλ=∑e∈E∫e(fg)′|edλ|e (Lemmas 3.1 and 3.2)=∑e∈E(fg)(we)−(fg)(0e), (fundamental theorem) |
where 0e,we are the endpoints of e, the order of which depends on D. One obtains the second identity in the theorem's statement because each edge is incoming into exactly one vertex and outgoing from exactly one vertex.
Weak solutions to differential equations can be a generalization of the notion of a solution from continuously differentiable functions to Lebesgue densities. In the case of networks, this generalization manifests as both a generalization to a non-Euclidean setting and a generalization to less regular initial data.
In Figure 6, it can be seen that even in "simple" networks, there may not exist a differentiable or even continuous solution to a conservation law. This fact and the possible generalization to less regular initial measures, such as L1loc(N), suggest a weak solution theory for networks. This setting will turn out to yield a coupled system of weak solutions for each edge and thereby recover Kirchhoff's first law from the network's topology.
The following conservation law captures the dynamical systems of Lebesgue densities that will be treated in this work.
Remark 6 (Notation). For functions ρ:[0,T]×N→R and A⊆N, the notation ρ|A:=ρ|(0,T)×A will be used. Note that in the following for functions, unless otherwise specified, (⋅)|⋅ will denote the restriction, (⋅)⋅ a partial derivative, and (⋅)⋅_ the projection onto a factor of the codomain.
For example, for a continuously differentiable function
f:R2→R2,(x,y)↦(a(x,y),b(x,y)) |
it will be written
f2_!=b,f|[0,1]2!=(x∈[0,1]2↦f(x)),andfx!=∂∂xf. |
The time integrals ∫⋅dt considered will be Lebesgue integrals. Further, A∘ will denote the interior of A⊆N.
Definition 4.1 (Conservation laws on networks). The functions
ρ∈C([0,T],L1loc(N))andν∈L∞loc([0,T]×N), |
fulfill a conservation law with a spatial derivative ddx on the regular network N, if for all ϕ∈C∞c([0,T]×N)
∬[0,T]×Nρ(ϕt+νϕx)λ(dx)dt−∫N(ρϕ)(t,⋅)|Tt=0dλ=0. |
It is important to mention that the above solution concept enforces the flow to be zero on vertices included in only one edge. That is, there is no in- or outflow of the network. These edges may be seen as dead-ins or dead-ends. Excluding them is a purely technical feature that offers a slightly more condensed description. Even in this setting, one can always introduce "dummy edges" and not lose generalization.
To validate the introduced solution concept, it should be made sure it is compatible with the classical setting in the sense of Theorem 4.1.
Theorem 4.1 (Classical solutions). In the setting of Definition 4.1, if N has only one edge e and ρ,ν∈C1([0,T]×N), then ρ fulfills a conservation law with ν and ddx if and only if
ρt+(νρ)x≡0and if e does not connect a vertex with itselfν(t,0e)ρ(t,0e)=ν(t,we)ρ(t,we)=0for all t∈[0,T]. |
Proof. Assume ρ fulfills a conservation law with ν and ddx. Let N be a network with only one edge e and ρ,ν∈C1([0,T]×N) and ϕ∈C∞c([0,T]×N), then
0=∬[0,T]×Nρ(ϕt+νϕx)λ(dx)dt−∫N(ρϕ)(t,⋅)|Tt=0dλ=∫N(∫[0,T]ρϕtdt)−(ρϕ)(t,⋅)|Tt=0dλ+∫[0,T]∫Nνρϕxλ(dx)dt (linearity and Fubini)=−∫N∫[0,T]ρtϕdtdλ−∫[0,T](∫N(νρ)xϕdλ)−(νρϕ)(⋅,x)|wex=0edt (classical integration by parts and Theorem 3.1)=−∫[0,T]∫N(ρt+(νρ)x)ϕλ(dx)dt+∫[0,T](νρϕ)(⋅,x)|wex=0edt. (Fubini and linearity) |
The previous equation must hold for all ϕ∈C∞c([0,T]×N); in particular if ϕ is zero at the domain's boundary. Therefore, ρt+(νρ)x must be zero everywhere by the fundamental lemma of the calculus of variations [20,p. 6,Lemma 1.1.1]. If 0e≠we, then through arbitrary localization on the boundaries [0,T]×{0e} and [0,T]×{we} one obtains by
∫[0,T](νρϕ)(⋅,x)|wex=0edt=∫[0,T](νρ)(⋅,we)ϕ(⋅,we)dt−∫[0,T](νρ)(⋅,0e)ϕ(⋅,0e)dt=0 |
and the fundamental lemma of the calculus of variations that
(νρ)(t,0e)=(νρ)(t,we)=0for all t∈[0,T]. |
The opposite direction of the statement is trivial.
One of the central ideas towards simulating and optimizing network flows is their characterization as flows on edges coupled by the conservation of their boundary flow at mutual vertices. This reduces the presented abstract setting to a more classical one that turns out to lend itself well to computation. To this end, Theorem 4.2 can be understood to recover Kirchhoff's first law [21] for conservation laws of Definition 4.1. To get a sense of the meaning of boundary evaluations of L1-functions, the following lemma is derived in preparation of Theorem 4.2.
Lemma 4.1 (Boundary evaluations). Let
● f∈L1([0,T]×(0,w))∩Cu((0,w),L1([0,T])) for some w>0,
● τ∈C∞c([0,T]),
● τγ∈C∞c([0,T]×(0,1γ)) for all γ∈(1w,∞) with
∫(0,w)τγ(⋅,x)dx=τ(⋅) | (4.1) |
and such that there exists M∈R with
∫(0,w)||τγ(⋅,x)||L∞([0,T])dx<M. | (4.2) |
By completeness define f0:=limx→0f(⋅,x)∈L1([0,T]). Then,
∫[0,T]f0(t)τ(t)dt=limγ→∞∬[0,T]×(0,w)f(t,x)τγ(t,x)dxdt. |
Remark 7 (Right-limits for boundary evaluations). Cu denotes uniformly continuous functions. In the following, the limit
f(⋅,0):=limx→0f(⋅,x)∈L1([0,T]) |
will be heavily used in boundary evaluations of functions f that fulfill the regularity assumptions of Lemma 4.1. Note that such limits may differ in network vertices based on the edge in which the limit is considered.
Proof. Let ε>0 and pick α>1w such that for all x<1α
||f0(⋅)−f(⋅,x)||L1([0,T])<ε. |
One has for all γ∈(α,∞)
|∫[0,T]f0(t)τ(t)dt−∬[0,T]×(0,w)f(t,x)τγ(t,x)dxdt|=|∬[0,T]×(0,w)f0(t)τγ(⋅,x)dxdt−∬[0,T]×(0,w)f(t,x)τγ(t,x)dxdt| (assumption, linearity)=|∬[0,T]×(0,w)(f0(t)−f(t,x))τγ(⋅,x)dxdt| (linearity)≤∬(0,w)×[0,T]|(f0(t)−f(t,x))τγ(⋅,x)|dtdx (Fubini's theorem, triangle inequality) =∫(0,1/γ)||f0(⋅)−f(⋅,x)||L1([0,T])||τγ(⋅,x)||L∞([0,T])dx (Hölder's inequality) ≤εM. (assumptions) |
Theorem 4.2 (Kirchhoff's first law). In the setting of Definition 4.1, if for all edges e∈E
(ρν)|e∈Cu(eo,L1([0,T])) | (4.3) |
then ρ fulfills a conservation law with ν and ddx if and only if
ρ is a weak solution on edges,i.e.,for all edges e∈E and for all ϕ∈C∞c([0,T]×e∘)∬[0,T]×eρ(ϕt+νϕx)dλ|edt−∫e(ρϕ)(t,⋅)|Tt=0dλ|e=0,and the flow is conserved at vertices,i.e.,for all vertices v∈V and for almost every t∈[0,T](∑e∈Einv(νρ)|e(t,we))=(∑e∈Eoutv(νρ)|e(t,0e)). |
Proof. The proof is broken down into several steps.
● Let ρ fulfill a conservation law with ν and ddx. Then, by extension of test functions from edges to the network with 0, it is clear that ρ is a weak solution on edges.
● To show that the flow is conserved at vertices let v∈V and ϕ∈C∞c([0,T]×N) such that the support of ϕ is contained in an ε-ball Uε(v) around v at all times, where 2ε is smaller than the smallest edge length, i.e.,
suppϕ⊆[0,T]×Uε(v). |
Note that Uε(v) can be contracted with a continuous bijection cγ:Uε(v)→Uε/γ(v) uniquely, such that,
d(v,cγ(⋅))=d(v,⋅)/γfor allγ≥1andc1=id. |
For all γ≥1 define ϕγ:[0,T]×N→R by
ϕγ(t,x):={ϕ(t,c−1γ(x))ifx∈Uε/γ(v)0otherwise. |
Generally, as ρ fulfills a conservation law with ν and ddx
0=∬[0,T]×Nρϕγtdλdt+∬[0,T]×Nνρϕγxdλdt−∫N(ρϕγ)(t,⋅)|Tt=0dλ. | (4.4) |
● Therefore, by the fact that
suppϕγ⊆[0,T]×Uε/γ(v), |
with n:=|Ev| being the number of edges connected to v, and the latter factor 2 due to possible self-edges, it follows that
∫N(ρϕγ)(t,⋅)|Tt=0dλ≤2||ρ(0,⋅)|suppϕ||L1|maxϕ|εγ2nγ→∞→0. | (4.5) |
By
suppϕγt⊆[0,T]×Uε/γ(v) |
one has
∬[0,T]×Nρϕγtdλdt≤||ρ|suppϕ||L1|maxϕt|εγT2nγ→∞→0. | (4.6) |
● One therefore has
0=limγ→∞∬[0,T]×Nνρϕγxdλdt |
(by Equations (4.4) to (4.6))
=limγ→∞∑e∈Ev∬[0,T]×e∘(νρ)|eϕγx|edλ|edt |
(linearity)
=∫[0,T]ϕ(⋅,v)(∑e∈Einv(νρ)|e(t,we)−∑e∈Eoutv(νρ)|e(t,0e))dt |
(Lemma 4.1, see below argument)
⟹(∑e∈Einv(νρ)|e(t,we))=(∑e∈Eoutv(νρ)|e(t,0e)) for a.e. t∈[0,T]. |
(ϕ(⋅,v) was arbitrary, fundamental lemma c.v. [20,p. 6,Lemma 1.1.1])
To see why Lemma 4.1 is applicable for all e∈Ev, without loss of generalization, assume e∈Eoutv; if 0e=we, the two halves of the edge need to be treated separately. In the notation of Lemma 4.1 let
f!=(νρ)|e,τ!=ϕ(⋅,v),andτγ!=ϕγx|e. |
Then, by Eq (4.3) and the fact that
suppϕγx|e⊆[0,T]×[0,ε/γ), |
it remains to show that Eqs (4.1) and (4.2) hold. By Theorem 3.1 and the definition of ϕγ, Eq (4.1) holds, i.e., for all t∈[0,T]
∫eϕγx|e(t,⋅)dλ|e=ϕ(t,v). |
Again by definition of ϕγ, Eq (4.2) holds, i.e.,
∫e‖ϕγx|e(⋅,x)‖L∞([0,T])λ|e(dx)≤∫(0,ε/γ)γ||ϕx||L∞([0,T]×e)dx=ε||ϕx||L∞([0,T]×e). |
(by ϕγx|e≤γ||ϕx||L∞([0,T]×e))
● The converse statement of this theorem holds by the following argument. Assume that ρ is a weak solution on edges with flow conservation at all vertices. The goal is to show that for all ψ∈C∞c([0,T]×N)
∫[0,T]∫Nρ(ψt+νψx)dλdt−∫N(ρψ)(t,⋅)|Tt=0dλ=0. | (4.7) |
It is equivalent to verify Eq (4.7) for test functions of type ψϕγ, where ϕγ is a localized function, such that,
0≤ϕγ≤1, |
and for a vertex v∈V and ε>0 (as above)
ϕγ(⋅,Uε/2γ(v))≡1andϕγ(⋅,Uε/γ(v)C)≡0. |
This is because ϕγ can be part of a partition of unity such that all other terms are zero by the assumption of ρ being a weak solution on open edges. Therefore, the value of
∬[0,T]×Nρ((ψϕγ)t+ν(ψϕγ)x)dλdt−∫N(ρψϕγ)(t,⋅)|Tt=0dλ |
is constant in γ>1 and converges as γ→∞—by the exact analog derivation as above —to the difference of incoming and outgoing flow, which is zero by assumption.
Remark 8 (Generality of the solution concept). It is essential to note that Theorem 4.2 does not make a statement on the existence or uniqueness of solutions. The solution concept at hand relaxes the widely known setting of the existence of a solution ρ for a given ρ↦˜ν(ρ) to the assumption of the existence of a solution tuple (ν,ρ). In particular, there may be a representation ν≡˜ν(ρ). Therefore, the statement of Theorem 4.2 applies in greater generality, in particular, to hyperbolic conservation laws that admit a quasi-linear form. Generalizations to vector-valued conservation laws modeling multi-commodity flows as well as to balance laws are possible. An introduction to hyperbolic conservation laws can be found in [8].
We see the most promising focus of future work building on the described theory in
● Robust solutions to hyperbolic conservation laws: The fact that regular networks are Polish spaces suggests the application of existing tools from probability to meaningfully model scenarios, e.g., hyperbolic conservation laws with random initial data;
● Convergence of solutions in time: Long-time behavior/stability of physically-plausible hyperbolic conservation laws on networks could be studied for its dependence on the network geometry; and
● Localization in networks: Uncertain measurements of characteristics of hyperbolic conservation laws on networks, which are embedded into a higher-level space, could model real-world localization problems. Such models would include information about the network geometry in the localization problem.
The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.
The authors declare that there is no conflicts of interest.
[1] |
Lanier LL (2008) Evolutionary struggles between NK cells and viruses. Nat Rev Immunol 8: 259-268. https://doi.org/10.1038/nri2276 ![]() |
[2] |
Long EO, Kim HS, Liu D, et al. (2013) Controlling natural killer cell responses: Integration of signals for activation and inhibition. Annu Rev Immunol 31: 227-258. https://doi.org/10.1146/annurev-immunol-020711-075005 ![]() |
[3] |
Chiossone L, Dumas PY, Vienne M, et al. (2018) Natural killer cells and other innate lymphoid cells in cancer. Nat Rev Immunol 18: 671-688. https://doi.org/10.1038/s41577-018-0061-z ![]() |
[4] |
Ljunggren HG, Kärre K (1990) In search of the ‘missing self’: MHC molecules and NK cell recognition. Immunol Today 11: 237-244. https://doi.org/10.1016/0167-5699(90)90097-s ![]() |
[5] |
Guia S, Fenis A, Vivier E, et al. (2018) Activating and inhibitory receptors expressed on innate lymphoid cells. Semin Immunopathol 40: 331-341. https://doi.org/10.1007/s00281-018-0685-x ![]() |
[6] |
Champsaur M, Lanier LL (2010) Effect of NKG2D ligand expression on host immune responses. Immunol Rev 235: 267-285. https://doi.org/10.1111/j.0105-2896.2010.00893.x ![]() |
[7] |
Raulet DH, Gasser S, Gowen BG, et al. (2013) Regulation of ligands for the NKG2D activating receptor. Annu Rev Immunol 31: 413-441. https://doi.org/10.1146/annurev-immunol-032712-095951 ![]() |
[8] |
Cerboni C, Fionda C, Soriani A, et al. (2014) The DNA Damage Response: A common pathway in the regulation of NKG2D and DNAM-1 ligand expression in normal, infected, and cancer cells. Front Immunol 4: 508. https://doi.org/10.3389/fimmu.2013.00508 ![]() |
[9] |
Lanier LL (2015) NKG2D receptor and its ligands in host defense. Cancer Immunol Res 3: 575-582. https://doi.org/10.1158/2326-6066.CIR-15-0098 ![]() |
[10] |
Martinet L, Smyth MJ (2015) Balancing natural killer cell activation through paired receptors. Nat Rev Immunol 15: 243-254. https://doi.org/10.1038/nri3799 ![]() |
[11] |
Zingoni A, Molfetta R, Fionda C, et al. (2018) NKG2D and its ligands: “One for All, All for One”. Front Immunol 9: 476. https://doi.org/10.3389/fimmu.2018.00476 ![]() |
[12] |
Barrow AD, Martin CJ, Colonna M (2019) The natural cytotoxicity receptors in health and disease. Front Immunol 10: 909. https://doi.org/10.3389/fimmu.2019.00909 ![]() |
[13] |
Fuchs A, Colonna M (2006) The role of NK cell recognition of nectin and nectin-like proteins in tumor immunosurveillance. Semin Cancer Biol 16: 359-366. https://doi.org/10.1016/j.semcancer.2006.07.002 ![]() |
[14] | González S, Groh V, Spies T (2006) Immunobiology of human NKG2D and its ligands. Curr Topics Microbiol Immunol 298: 121-138. https://doi.org/10.1007/3-540-27743-9_6 |
[15] |
Fernández-Messina L, Reyburn HT, Valés-Gómez M (2012) Human NKG2D-ligands: Cell biology strategies to ensure immune recognition. Front Immunol 3: 299. https://doi.org/10.3389/fimmu.2012.00299 ![]() |
[16] |
Ullrich E, Koch J, Cerwenka A, et al. (2013) New prospects on the NKG2D/NKG2DL system for oncology. Oncoimmunology 2: e26097. https://doi.org/10.4161/onci.26097 ![]() |
[17] |
Glienke J, Sobanov Y, Brostjan C, et al. (1998) The genomic organization of NKG2C, E, F, and D receptor genes in the human natural killer gene complex. Immunogenetics 48: 163-173. https://doi.org/10.1007/s002510050420 ![]() |
[18] |
Basílio-Queirós D, Mischak-Weissinger E (2023) Natural killer cells- from innate cells to the discovery of adaptability. Front Immunol 14: 1172437. https://doi.org/10.3389/fimmu.2023.1172437 ![]() |
[19] |
Huntington ND, Vosshenrich CA, Di Santo JP (2007) Developmental pathways that generate natural-killer-cell diversity in mice and humans. Nat Rev Immunol 7: 703-714. https://doi.org/10.1038/nri2154 ![]() |
[20] |
Zafirova B, Mandarić S, Antulov R, et al. (2009) Altered NK cell development and enhanced NK cell-mediated resistance to mouse cytomegalovirus in NKG2D-deficient mice. Immunity 31: 270-282. https://doi.org/10.1016/j.immuni.2009.06.017 ![]() |
[21] |
Zafirova B, Wensveen FM, Gulin M, et al. (2011) Regulation of immune cell function and differentiation by the NKG2D receptor. Cell Mol Life Sci 68: 3519-3529. https://doi.org/10.1007/s00018-011-0797-0 ![]() |
[22] |
Sheppard S, Triulzi C, Ardolino M, et al. (2013) Characterization of a novel NKG2D and NKp46 double-mutant mouse reveals subtle variations in the NK cell repertoire. Blood 121: 5025-5033. https://doi.org/10.1182/blood-2012-12-471607 ![]() |
[23] |
Guerra N, Tan YX, Joncker NT, et al. (2008) NKG2D-deficient mice are defective in tumor surveillance in models of spontaneous malignancy. Immunity 28: 571-580. https://doi.org/10.1016/j.immuni.2008.02.016 ![]() |
[24] |
Charpak-Amikam Y, Kournos M, Kotzur R, et al. (2024) The activating receptor NKG2D is an anti-fungal pattern recognition receptor. Nat Commun 15: 8664. https://doi.org/10.1038/s41467-024-52913-2 ![]() |
[25] |
Molfetta R, Quatrini L, Zitti B, et al. (2016) Regulation of NKG2D expression and signaling by endocytosis. Trends Immunol 37: 790-802. https://doi.org/10.1016/j.it.2016.08.015 ![]() |
[26] |
Wensveen FM, Jelenčić V, Polić B (2018) NKG2D: A master regulator of immune cell responsiveness. Front Immunol 9: 441. https://doi.org/10.3389/fimmu.2018.00441 ![]() |
[27] |
Garrity D, Call ME, Feng J, et al. (2005) The activating NKG2D receptor assembles in the membrane with two signaling dimers into a hexameric structure. Proc Natl Acad Sci U S A 102: 7641-7646. https://doi.org/10.1073/pnas.0502439102 ![]() |
[28] |
Bauer S, Groh V, Wu J, et al. (1999) Activation of NK cells and T cells by NKG2D, a receptor for stress-inducible MICA. Science 285: 727-729. https://doi.org/10.1126/science.285.5428.727 ![]() |
[29] |
Wu J, Song Y, Bakker AB, et al. (1999) An activating immunoreceptor complex formed by NKG2D and DAP10. Science 285: 730-732. https://doi.org/10.1126/science.285.5428.730 ![]() |
[30] |
Billadeau DD, Upshaw JL, Schoon RA, et al. (2003) NKG2D-DAP10 triggers human NK cell-mediated killing via a Syk-independent regulatory pathway. Nat Immunol 4: 557-564. https://doi.org/10.1038/ni929 ![]() |
[31] |
Upshaw JL, Arneson LN, Schoon RA, et al. (2006) NKG2D-mediated signaling requires a DAP10-bound Grb2-Vav1 intermediate and phosphatidylinositol-3-kinase in human natural killer cells. Nat Immunol 7: 524-532. https://doi.org/10.1038/ni1325 ![]() |
[32] |
Diefenbach A, Tomasello E, Lucas M, et al. (2002) Selective associations with signaling proteins determine stimulatory versus costimulatory activity of NKG2D. Nat Immunol 3: 1142-1149. https://doi.org/10.1038/ni858 ![]() |
[33] |
Gilfillan S, Ho EL, Cella M, et al. (2002) NKG2D recruits two distinct adapters to trigger NK cell activation and costimulation. Nature Immunol 3: 1150-1155. https://doi.org/10.1038/ni857 ![]() |
[34] |
Cella M, Fujikawa K, Tassi I, et al. (2004) Differential requirements for Vav proteins in DAP10- and ITAM-mediated NK cell cytotoxicity. J Exp Med 200: 817-823. https://doi.org/10.1084/jem.20031847 ![]() |
[35] |
Graham DB, Cella M, Giurisato E, et al. (2006) Vav1 controls DAP10-mediated natural cytotoxicity by regulating actin and microtubule dynamics. J Immunol 177: 2349-2355. https://doi.org/10.4049/jimmunol.177.4.2349 ![]() |
[36] |
Vivier E, Tomasello E, Baratin M, et al. (2008) Functions of natural killer cells. Nat Immunol 9: 503-510. https://doi.org/10.1038/ni1582 ![]() |
[37] |
Zompi S, Hamerman JA, Ogasawara K, et al. (2003) NKG2D triggers cytotoxicity in mouse NK cells lacking DAP12 or Syk family kinases. Nat Immunol 4: 565-572. https://doi.org/10.1038/ni930 ![]() |
[38] |
Bryceson YT, March ME, Ljunggren HG, et al. (2006) Synergy among receptors on resting NK cells for the activation of natural cytotoxicity and cytokine secretion. Blood 107: 159-166. https://doi.org/10.1182/blood-2005-04-1351 ![]() |
[39] |
Bryceson YT, Ljunggren HG, Long EO (2009) Minimal requirement for induction of natural cytotoxicity and intersection of activation signals by inhibitory receptors. Blood 114: 2657-2666. https://doi.org/10.1182/blood-2009-01-201632 ![]() |
[40] |
Kim HS, Das A, Gross CC, et al. (2010) Synergistic signals for natural cytotoxicity are required to overcome inhibition by c-Cbl ubiquitin ligase. Immunity 32: 175-186. https://doi.org/10.1016/j.immuni.2010.02.004 ![]() |
[41] |
Ogasawara K, Hamerman JA, Hsin H, et al. (2003) Impairment of NK cell function by NKG2D modulation in NOD mice. Immunity 18: 41-51. https://doi.org/10.1016/s1074-7613(02)00505-8 ![]() |
[42] |
Quatrini L, Molfetta R, Zitti B, et al. (2015) Ubiquitin-dependent endocytosis of NKG2D-DAP10 receptor complexes activates signaling and functions in human NK cells. Sci Signaling 8: ra108. https://doi.org/10.1126/scisignal.aab2724 ![]() |
[43] |
Roda-Navarro P, Reyburn HT (2009) The traffic of the NKG2D/Dap10 receptor complex during natural killer (NK) cell activation. Journal Biol Chem 284: 16463-16472. https://doi.org/10.1074/jbc.M808561200 ![]() |
[44] |
Molfetta R, Quatrini L, Capuano C, et al. (2014) c-Cbl regulates MICA- but not ULBP2-induced NKG2D down-modulation in human NK cells. Eur J Immunol 44: 2761-2770. https://doi.org/10.1002/eji.201444512 ![]() |
[45] |
Oppenheim DE, Roberts SJ, Clarke SL, et al. (2005) Sustained localized expression of ligand for the activating NKG2D receptor impairs natural cytotoxicity in vivo and reduces tumor immunosurveillance. Nat Immunol 6: 928-937. https://doi.org/10.1038/ni1239 ![]() |
[46] |
Coudert JD, Scarpellino L, Gros F, et al. (2008) Sustained NKG2D engagement induces cross-tolerance of multiple distinct NK cell activation pathways. Blood 111: 3571-3578. https://doi.org/10.1182/blood-2007-07-100057 ![]() |
[47] |
Molfetta R, Zingoni A, Santoni A, et al. (2019) Post-translational mechanisms regulating NK cell activating receptors and their ligands in cancer: Potential targets for therapeutic intervention. Front Immunol 10: 2557. https://doi.org/10.3389/fimmu.2019.02557 ![]() |
[48] |
Gasser S, Orsulic S, Brown EJ, et al. (2005) The DNA damage pathway regulates innate immune system ligands of the NKG2D receptor. Nature 436: 1186-1190. https://doi.org/10.1038/nature03884 ![]() |
[49] |
Soriani A, Zingoni A, Cerboni C, et al. (2009) ATM-ATR-dependent up-regulation of DNAM-1 and NKG2D ligands on multiple myeloma cells by therapeutic agents results in enhanced NK-cell susceptibility and is associated with a senescent phenotype. Blood 113: 3503-3511. https://doi.org/10.1182/blood-2008-08-173914 ![]() |
[50] |
Groh V, Bahram S, Bauer S, et al. (1996) Cell stress-regulated human major histocompatibility complex class I gene expressed in gastrointestinal epithelium. Proc Natl Acad Sci U S A 93: 12445-12450. https://doi.org/10.1073/pnas.93.22.12445 ![]() |
[51] |
Li H, Lakshmikanth T, Garofalo C, et al. (2011) Pharmacological activation of p53 triggers anticancer innate immune response through induction of ULBP2. Cell Cycle 10: 3346-3358. https://doi.org/10.4161/cc.10.19.17630 ![]() |
[52] |
Textor S, Fiegler N, Arnold A, et al. (2011) Human NK cells are alerted to induction of p53 in cancer cells by upregulation of the NKG2D ligands ULBP1 and ULBP2. Cancer Res 71: 5998-6009. https://doi.org/10.1158/0008-5472.CAN-10-3211 ![]() |
[53] |
Moretta L, Biassoni R, Bottino C, et al. (2002) Human NK cells and their receptors. Microbes Infect 4: 1539-1544. https://doi.org/10.1016/s1286-4579(02)00037-0 ![]() |
[54] |
Gleimer M, Parham P (2003) Stress management: MHC class I and class I-like molecules as reporters of cellular stress. Immunity 19: 469-477. https://doi.org/10.1016/s1074-7613(03)00272-3 ![]() |
[55] |
Baychelier F, Vieillard V (2013) The modulation of the cell-cycle: a sentinel to alert the NK cells of dangers. Front Immunol 4: 325. https://doi.org/10.3389/fimmu.2013.00325 ![]() |
[56] |
Parsons MS, Richard J, Lee WS, et al. (2016) NKG2D Acts as a Co-Receptor for Natural Killer Cell-Mediated Anti-HIV-1 Antibody-Dependent Cellular Cytotoxicity. AIDS Res Human Retroviru 32: 1089-1096. https://doi.org/10.1089/AID.2016.0099 ![]() |
[57] |
Ward J, Davis Z, DeHart J, et al. (2009) HIV-1 Vpr triggers natural killer cell-mediated lysis of infected cells through activation of the ATR-mediated DNA damage response. PLoS Pathog 5: e1000613. https://doi.org/10.1371/journal.ppat.1000613 ![]() |
[58] |
Richard J, Sindhu S, Pham TN, et al. (2010) HIV-1 Vpr up-regulates expression of ligands for the activating NKG2D receptor and promotes NK cell-mediated killing. Blood 115: 1354-1363. https://doi.org/10.1182/blood-2009-08-237370 ![]() |
[59] |
Castillo JP, Frame FM, Rogoff HA, et al. (2005) Human cytomegalovirus IE1-72 activates ataxia telangiectasia mutated kinase and a p53/p21-mediated growth arrest response. J Virol 79: 11467-11475. https://doi.org/10.1128/JVI.79.17.11467-11475.2005 ![]() |
[60] |
Xiaofei E, Pickering MT, Debatis M, et al. (2011) An E2F1-mediated DNA damage response contributes to the replication of human cytomegalovirus. PLoS Pathog 7: e1001342. https://doi.org/10.1371/journal.ppat.1001342 ![]() |
[61] |
Pignoloni B, Fionda C, Dell'Oste V, et al. (2016) Distinct roles for human cytomegalovirus immediate early proteins IE1 and IE2 in the transcriptional regulation of MICA and PVR/CD155 expression. J Immunol 197: 4066-4078. https://doi.org/10.4049/jimmunol.1502527 ![]() |
[62] |
Lodoen M, Ogasawara K, Hamerman JA, et al. (2003) NKG2D-mediated natural killer cell protection against cytomegalovirus is impaired by viral gp40 modulation of retinoic acid early inducible 1 gene molecules. J Exp Med 197: 1245-1253. https://doi.org/10.1084/jem.20021973 ![]() |
[63] |
Lodoen MB, Abenes G, Umamoto S, et al. (2004) The cytomegalovirus m155 gene product subverts natural killer cell antiviral protection by disruption of H60-NKG2D interactions. J Exp Med 200: 1075-1081. https://doi.org/10.1084/jem.20040583 ![]() |
[64] |
Krmpotic A, Hasan M, Loewendorf A, et al. (2005) NK cell activation through the NKG2D ligand MULT-1 is selectively prevented by the glycoprotein encoded by mouse cytomegalovirus gene m145. J Exp Med 201: 211-220. https://doi.org/10.1084/jem.20041617 ![]() |
[65] |
Hasan M, Krmpotic A, Ruzsics Z, et al. (2005) Selective down-regulation of the NKG2D ligand H60 by mouse cytomegalovirus m155 glycoprotein. J Virol 79: 2920-2930. https://doi.org/10.1128/jvi.79.5.2920-2930.2005 ![]() |
[66] |
Wilkinson GW, Tomasec P, Stanton RJ, et al. (2008) Modulation of natural killer cells by human cytomegalovirus. J Clin Virol 41: 206-212. https://doi.org/10.1016/j.jcv.2007.10.027 ![]() |
[67] |
Rossini G, Cerboni C, Santoni A, et al. (2012) Interplay between human cytomegalovirus and intrinsic/innate host responses: A complex bidirectional relationship. Mediators Inflammation 2012: 607276. https://doi.org/10.1155/2012/607276 ![]() |
[68] |
Fielding CA, Aicheler R, Stanton RJ, W, et al. (2014) Two novel human cytomegalovirus NK cell evasion functions target MICA for lysosomal degradation. PLoS Pathog 10: e1004058. https://doi.org/10.1371/journal.ppat.1004058 ![]() |
[69] |
Dunn C, Chalupny NJ, Sutherland CL, et al. (2003) Human cytomegalovirus glycoprotein UL16 causes intracellular sequestration of NKG2D ligands, protecting against natural killer cell cytotoxicity. J Exp Med 197: 1427-1439. https://doi.org/10.1084/jem.20022059 ![]() |
[70] |
Welte SA, Sinzger C, Lutz SZ, et al. (2003) Selective intracellular retention of virally induced NKG2D ligands by the human cytomegalovirus UL16 glycoprotein. Eur J Immunol 33: 194-203. https://doi.org/10.1002/immu.200390022 ![]() |
[71] |
Müller S, Zocher G, Steinle A, et al. (2010) Structure of the HCMV UL16-MICB complex elucidates select binding of a viral immunoevasin to diverse NKG2D ligands. PLoS Pathog 6: e1000723. https://doi.org/10.1371/journal.ppat.1000723 ![]() |
[72] |
Ashiru O, Bennett NJ, Boyle LH, et al. (2009) NKG2D ligand MICA is retained in the cis-Golgi apparatus by human cytomegalovirus protein UL142. J Virol 83: 12345-12354. https://doi.org/10.1128/JVI.01175-09 ![]() |
[73] |
Bennett NJ, Ashiru O, Morgan FJ, P, et al. (2010) Intracellular sequestration of the NKG2D ligand ULBP3 by human cytomegalovirus. J Immunol 185: 1093-1102. https://doi.org/10.4049/jimmunol.1000789 ![]() |
[74] |
Cerboni C, Neri F, Casartelli N, et al. (2007) Human immunodeficiency virus 1 Nef protein downmodulates the ligands of the activating receptor NKG2D and inhibits natural killer cell-mediated cytotoxicity. J General Virol 88: 242-250. https://doi.org/10.1099/vir.0.82125-0 ![]() |
[75] |
Thomas M, Boname JM, Field S, et al. (2008) Down-regulation of NKG2D and NKp80 ligands by Kaposi's sarcoma-associated herpesvirus K5 protects against NK cell cytotoxicity. Proc Natl Acad Sci U S A 105: 1656-1661. https://doi.org/10.1073/pnas.0707883105 ![]() |
[76] |
Zdrenghea MT, Telcian AG, Laza-Stanca V, et al. (2012) RSV infection modulates IL-15 production and MICA levels in respiratory epithelial cells. Eur Respiratory J 39: 712-720. https://doi.org/10.1183/09031936.00099811 ![]() |
[77] |
Reilly RB, Ramdour SK, Fuhlbrigge ME, et al. (2024) An altered natural killer cell immunophenotype characterizes clinically severe pediatric RSV infection. Sci Transl Med 16: eado6606. https://doi.org/10.1126/scitranslmed.ado6606 ![]() |
[78] |
Fernández-Soto D, García-Jiménez ÁF, Casasnovas JM, et al. (2024) Elevated levels of cell-free NKG2D-ligands modulate NKG2D surface expression and compromise NK cell function in severe COVID-19 disease. Front Immunol 15: 1273942. https://doi.org/10.3389/fimmu.2024.1273942 ![]() |
[79] |
Azzi T, Lünemann A, Murer A, et al. (2014) Role for early-differentiated natural killer cells in infectious mononucleosis. Blood 124: 2533-2543. https://doi.org/10.1182/blood-2014-01-553024 ![]() |
[80] |
Desimio MG, Covino DA, Cancrini C, et al. (2024) Entry into the lytic cycle exposes EBV-infected cells to NK cell killing via upregulation of the MICB ligand for NKG2D and activation of the CD56bright and NKG2A+KIR+CD56dim subsets. Front Immunol 15: 1467304. https://doi.org/10.3389/fimmu.2024.1467304 ![]() |
[81] |
Pappworth IY, Wang EC, Rowe M (2007) The switch from latent to productive infection in epstein-barr virus-infected B cells is associated with sensitization to NK cell killing. J Virol 81: 474-482. https://doi.org/10.1128/JVI.01777-06 ![]() |
[82] |
Williams LR, Quinn LL, Rowe M, et al. (2015) Induction of the lytic cycle sensitizes epstein-barr virus-infected B cells to NK cell killing that is counteracted by virus-mediated NK cell evasion mechanisms in the late lytic cycle. J Virol 90: 947-958. https://doi.org/10.1128/JVI.01932-15 ![]() |
[83] |
Desimio MG, Covino DA, Rivalta B, et al. (2023) The role of NK cells in EBV infection and related diseases: Current Understanding and hints for novel therapies. Cancers 15: 1914. https://doi.org/10.3390/cancers15061914 ![]() |
[84] |
Lenart M, Kluczewska A, Szaflarska A, et al. (2021) Selective downregulation of natural killer activating receptors on NK cells and upregulation of PD-1 expression on T cells in children with severe and/or recurrent Herpes simplex virus infections. Immunobiology 226: 152097. https://doi.org/10.1016/j.imbio.2021.152097 ![]() |
[85] |
Osman MS, van Eeden C, Cohen Tervaert JW (2020) Fatal COVID-19 infections: Is NK cell dysfunction a link with autoimmune HLH?. Autoimmun Rev 19: 102561. https://doi.org/10.1016/j.autrev.2020.102561 ![]() |
[86] |
Song H, Park H, Kim J, et al. (2011) IDO metabolite produced by EBV-transformed B cells inhibits surface expression of NKG2D in NK cells via the c-Jun N-terminal kinase (JNK) pathway. Immunol Lett 136: 187-193. https://doi.org/10.1016/j.imlet.2011.01.009 ![]() |
[87] |
Doubrovina ES, Doubrovin MM, Vider E, et al. (2003) Evasion from NK cell immunity by MHC class I chain-related molecules expressing colon adenocarcinoma. J Immunol 171: 6891-6899. https://doi.org/10.4049/jimmunol.171.12.6891 ![]() |
[88] |
Wiemann K, Mittrücker HW, Feger U, et al. (2005) Systemic NKG2D down-regulation impairs NK and CD8 T cell responses in vivo. J Immunol 175: 720-729. https://doi.org/10.4049/jimmunol.175.2.720 ![]() |
[89] |
Waldhauer I, Steinle A (2006) Proteolytic release of soluble UL16-binding protein 2 from tumor cells. Cancer Res 66: 2520-2526. https://doi.org/10.1158/0008-5472.CAN-05-2520 ![]() |
[90] |
Clayton A, Mitchell JP, Court J, et al. (2008) Human tumor-derived exosomes down-modulate NKG2D expression. J Immunol 180: 7249-7258. https://doi.org/10.4049/jimmunol.180.11.7249 ![]() |
[91] |
Vulpis E, Loconte L, Peri A, et al. (2022) Impact on NK cell functions of acute versus chronic exposure to extracellular vesicle-associated MICA: Dual role in cancer immunosurveillance. J Extracell Vesicles 11: e12176. https://doi.org/10.1002/jev2.12176 ![]() |
[92] |
Mamessier E, Sylvain A, Thibult ML, et al. (2011) Human breast cancer cells enhance self tolerance by promoting evasion from NK cell antitumor immunity. J Clin Invest 121: 3609-3622. https://doi.org/10.1172/JCI45816 ![]() |
[93] | Han B, Mao FY, Zhao YL, et al. (2018) Altered NKp30, NKp46, NKG2D, and DNAM-1 expression on circulating NK cells is associated with tumor progression in human gastric cancer. J Immunol Res 2018: 6248590. https://doi.org/10.1155/2018/6248590 |
[94] |
Marcon F, Zuo J, Pearce H, et al. (2020) NK cells in pancreatic cancer demonstrate impaired cytotoxicity and a regulatory IL-10 phenotype. Oncoimmunology 9: 1845424. https://doi.org/10.1080/2162402X.2020.1845424 ![]() |
[95] |
von Lilienfeld-Toal M, Frank S, Leyendecker C, et al. (2010) Reduced immune effector cell NKG2D expression and increased levels of soluble NKG2D ligands in multiple myeloma may not be causally linked. Cancer Immunol Immunother 59: 829-839. https://doi.org/10.1007/s00262-009-0807-3 ![]() |
[96] |
Hilpert J, Grosse-Hovest L, Grünebach F, et al. (2012) Comprehensive analysis of NKG2D ligand expression and release in leukemia: Implications for NKG2D-mediated NK cell responses. J Immunol 189: 1360-1371. https://doi.org/10.4049/jimmunol.1200796 ![]() |
[97] |
Wiesmayr S, Webber SA, Macedo C, et al. (2012) Decreased NKp46 and NKG2D and elevated PD-1 are associated with altered NK-cell function in pediatric transplant patients with PTLD. Eur J Immunol 42: 541-550. https://doi.org/10.1002/eji.201141832 ![]() |
[98] |
Salih HR, Rammensee HG, Steinle A (2002) Cutting edge: Down-regulation of MICA on human tumors by proteolytic shedding. J Immunol 169: 4098-4102. https://doi.org/10.4049/jimmunol.169.8.4098 ![]() |
[99] |
Cao W, Xi X, Hao Z, et al. (2007) RAET1E2, a soluble isoform of the UL16-binding protein RAET1E produced by tumor cells, inhibits NKG2D-mediated NK cytotoxicity. J Biol Chem 282: 18922-18928. https://doi.org/10.1074/jbc.M702504200 ![]() |
[100] |
Boutet P, Agüera-González S, Atkinson S, et al. (2009) Cutting edge: the metalloproteinase ADAM17/TNF-alpha-converting enzyme regulates proteolytic shedding of the MHC class I-related chain B protein. J Immunol 182: 49-53. https://doi.org/10.4049/jimmunol.182.1.49 ![]() |
[101] |
Ashiru O, Boutet P, Fernández-Messina L, et al. (2010) Natural killer cell cytotoxicity is suppressed by exposure to the human NKG2D ligand MICA*008 that is shed by tumor cells in exosomes. Cancer Res 70: 481-489. https://doi.org/10.1158/0008-5472.CAN-09-1688 ![]() |
[102] | Tamaki S, Kawakami M, Ishitani A, et al. (2010) Soluble MICB serum levels correlate with disease stage and survival rate in patients with oral squamous cell carcinoma. Anticancer Res 30: 4097-4101. |
[103] |
Yamaguchi K, Chikumi H, Shimizu A, et al. (2012) Diagnostic and prognostic impact of serum-soluble UL16-binding protein 2 in lung cancer patients. Cancer Sci 103: 1405-1413. https://doi.org/10.1111/j.1349-7006.2012.02330.x ![]() |
[104] |
Wu BJ, Li WP, Qian C, et al. (2013) Serum soluble MICB (sMICB) correlates with disease progression and survival in melanoma patients. Tumour Biol 34: 565-569. https://doi.org/10.1007/s13277-012-0582-1 ![]() |
[105] |
Fernández-Messina L, Ashiru O, Boutet P, et al. (2010) Differential mechanisms of shedding of the glycosylphosphatidylinositol (GPI)-anchored NKG2D ligands. J Biol Chem 285: 8543-8551. https://doi.org/10.1074/jbc.M109.045906 ![]() |
[106] |
Gill S, Vasey AE, De Souza A, et al. (2012) Rapid development of exhaustion and down-regulation of eomesodermin limit the antitumor activity of adoptively transferred murine natural killer cells. Blood 119: 5758-5768. https://doi.org/10.1182/blood-2012-03-415364 ![]() |
[107] |
Felices M, Lenvik AJ, McElmurry R, et al. (2018) Continuous treatment with IL-15 exhausts human NK cells via a metabolic defect. JCI Insight 3: e96219. https://doi.org/10.1172/jci.insight.96219 ![]() |
[108] |
Myers JA, Schirm D, Bendzick L, et al. (2022) Balanced engagement of activating and inhibitory receptors mitigates human NK cell exhaustion. JCI Insight 7: e150079. https://doi.org/10.1172/jci.insight.150079 ![]() |
[109] |
Alvarez M, Simonetta F, Baker J, et al. (2019) Regulation of murine NK cell exhaustion through the activation of the DNA damage repair pathway. JCI Insight 5: e127729. https://doi.org/10.1172/jci.insight.127729 ![]() |
[110] |
Milito ND, Zingoni A, Stabile H, et al. (2023) NKG2D engagement on human NK cells leads to DNAM-1 hypo-responsiveness through different converging mechanisms. Eur J Immunol 53: 2250198. https://doi.org/10.1002/eji.202250198 ![]() |
[111] |
Hanaoka N, Jabri B, Dai Z, et al. (2010) NKG2D initiates caspase-mediated CD3zeta degradation and lymphocyte receptor impairments associated with human cancer and autoimmune disease. J Immunol 185: 5732-5742. https://doi.org/10.4049/jimmunol.1002092 ![]() |
[112] |
Santiago V, Rezvani K, Sekine T, et al. (2018) Human NK Cells Develop an Exhaustion Phenotype During Polar Degranulation at the Aspergillus fumigatus Hyphal Synapse. Front Immunol 9: 2344. https://doi.org/10.3389/fimmu.2018.02344 ![]() |
[113] |
Bär E, Whitney PG, Moor K, et al. (2014) IL-17 regulates systemic fungal immunity by controlling the functional competence of NK cells. Immunity 40: 117-127. https://doi.org/10.1016/j.immuni.2013.12.002 ![]() |