This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Modular control of Boolean network models

David Murrugarra1    Alan Veliz-Cuba2    Elena Dimitrova3    Claus Kadelka4    Matthew Wheeler5    Reinhard Laubenbacher5
Abstract

The concept of control is crucial for effectively understanding and applying biological network models. Key structural features relate to control functions through gene regulation, signaling, or metabolic mechanisms, and computational models need to encode these. Applications often focus on model-based control, such as in biomedicine or metabolic engineering. In a recent paper, the authors developed a theoretical framework of modularity in Boolean networks, which lead to a canonical semidirect product decomposition of these systems. In this paper, we present an approach to model-based control that exploits this modular structure, as well as the canalizing features of the regulatory mechanisms. We show how to identify control strategies from the individual modules, and we present a criterion based on canalizing features of the regulatory rules to identify modules that do not contribute to network control and can be excluded. For even moderately sized networks, finding global control inputs is computationally challenging. Our modular approach leads to an efficient approach to solving this problem. We apply it to a published Boolean network model of blood cancer large granular lymphocyte (T-LGL) leukemia to identify a minimal control set that achieves a desired control objective.

1Department of Mathematics, University of Kentucky, Lexington, KY 40506, USA

2Department of Mathematics, University of Dayton, Dayton, OH 45469, USA

3Mathematics Department, California Polytechnic State University, San Luis Obispo, CA 93407, USA

4Department of Mathematics, Iowa State University, Ames, IA 50011, USA

5Department of Medicine, University of Florida, Gainesville, FL 32610, USA

Keywords— Boolean networks, modularity, control, canalization, gene regulatory networks.

1 Introduction

With the availability of more experimental data and information about the structure of biological networks, computational modeling can capture increasingly complex features of biological networks [1, 2]. However, the increased size and complexity of dynamic network models also poses challenges in understanding and applying their structure as a tool for model-based control, important for a range of applications [3, 4]. This is our focus here. To narrow the scope of the problems we address we limit ourselves to intracellular networks represented by Boolean network (BN) models. BNs are widely used in molecular systems biology to capture the coarse-grained dynamics of a variety of regulatory networks [5]. They have been shown to provide a good approximation of the dynamics of continuous processes [6].

For the commonly-used modeling framework of ordinary differential equations, there is a well-developed theory of optimal control, which is largely absent from other modeling frameworks, such as Boolean networks or agent-based models, both frequently used in systems biology and biomedicine. Furthermore, control inputs, in many cases, are of a binary nature, such as gene knockouts or the blocking of mechanisms. Existing Boolean network control methods do not scale well. As networks get larger, with hundreds [7] or even thousands of nodes [8], only few computational tools can identify control inputs for achieving preselected objectives, such as moving a network from one phenotype (e.g., cancer) to another (e.g., normal). One approach is to reduce the system in a way that the reduced system maintains relevant dynamical properties such as its attractors [9, 10]. This allows the control methods to be applied to the reduced system, and the same controls can then be used for the original system.

Control targets in Boolean networks have been identified by a variety of approaches: using stable motifs [11, 12], feedback vertex sets [13, 14], trap spaces [15, 16], model checking [17], and other methods [18, 19]. A few further approaches have explicitly used strongly connected components (SCCs) for model analysis by decomposing the wiring diagram or the state space of the network [20, 21]. For example, stable motifs describe a set of network nodes and their corresponding states which are such that the nodes form a minimal SCC (e.g. a feedback loop) and their states form a partial fixed point of the Boolean network [22, 11]. An identification of the stable motifs yields not only an efficient way to derive the network attractors but also control targets. Trap spaces, defined in [23] and related to stable motifs, are subspaces of the entire state space of a Boolean network that the dynamics cannot escape. Trap spaces, which can often be efficiently computed for biological Boolean models, have recently been used to simplify the identification of both network attractors and controls [15, 16]. However, to our knowledge, none of the approaches developed thus far exploit the modular structure exhibited by many biological systems, in order to identify control strategies by focusing on one module at a time, which is the approach used in this paper. This approach can substantially simplify the problem of identifying suitable controls, specifically in networks that consist of multiple decently-sized modules. For example, we showed in [24] that our modular approach can efficiently solve the control identification problem for a 69-node pancreatic cancer model that consists of three modules of size greater than one, plus a number of single-node modules. Some of the existing control methods can often not handle reasonably large models of e.g. 70 nodes, as has been shown in [4, 25]. It is important to note, however, that our control approach does not guarantee finding a control of minimal size or all possible controls that achieve a given objective.

Modularity refers to the division of the system into separate units, or modules, that each have a specific function [26, 27]. Modularity is a fundamental property of biological systems that is essential for the evolution of new functions and the development of robustness [28, 29]. In [24], we developed a mathematical theory of modularity for Boolean network models and showed that one can identify network-level control inputs at the modular level. That is, we obtain global control inputs by identifying them at the local, modular level and assembling them to global control. This enables network control for much larger networks than would otherwise be computationally unfeasible. It is worth noting that, although the ideas and concepts behind our approach to modularity are intuitive and natural, to our knowledge, we developed the first rigorous mathematical theory of modular decomposition of Boolean networks, which we expand to questions related to the identification of biological network controls in this paper.

We further propose to use another property of biological networks, represented through Boolean network models. Almost all Boolean rules that describe the dynamics of over 120 published, expert-curated biological Boolean network models have the property that they exhibit some degree of canalization [30]. A Boolean function is canalizing if it has one or more variables that, when they take on a particular value, they determine the value of the function, irrespective of the values of all the other variables. As an example, any variable in a conjunctive rule (e.g., xyzx\wedge y\wedge z) determines the value of the entire rule, when it takes on the value 0. We derive a criterion for Boolean network models whose Boolean functions are all canalizing, that can be used to exclude certain modules from needing to be considered for the identification of controls.

Our approach to control via modularity is summarized in Figure 1. We decompose the network into its constituent modules, then apply control methods to each module to identify a control target for the entire network. We show that by combining the controls of the modules, we can control the entire network. In the last part of the paper, we present theoretical results that exploit the canalizing properties of the regulatory functions to exclude certain modules from the control search. Finally, we demonstrate our approach by applying it to a published model of the blood cancer large granular lymphocyte (T-LGL) leukemia [31].

Refer to caption
Figure 1: Control via modularity. First, the network is decomposed into its constituent modules: F1,,FmF_{1},\dots,F_{m}. Then, controls μ1,,μm\mu_{1},\dots,\mu_{m} are identified for each module. Combining the controls of the modules μ=(μ1,,μm)\mu=(\mu_{1},\ldots,\mu_{m}) yields a set of controls for the whole network.

2 Background

We first describe Boolean networks and how to decompose a network into modules. In a BN, each gene is represented by a node that can be in one of two states: ON or OFF. Time is discretized as well, and the state of a gene at the next time step is determined by a Boolean function that takes as input the current states of a subset of the nodes in the BN. The dependence of a gene on the state of another gene can be graphically represented by a directed edge, and the wiring diagram contains all such dependencies.

2.1 Boolean Networks

Boolean networks can be seen as discrete dynamical systems. Specifically, consider nn variables x1,,xnx_{1},\dots,x_{n} each of which can take values in 𝔽2:={0,1}\operatorname{\mathbb{F}}_{2}:=\{0,1\}, where 𝔽2\operatorname{\mathbb{F}}_{2} is the field with two elements, 0 and 1, where arithmetic is performed modulo 2. Then, a synchronously updated Boolean network is a function F=(f1,,fn):𝔽2n𝔽2nF=(f_{1},\ldots,f_{n}):\operatorname{\mathbb{F}}_{2}^{n}\to\operatorname{\mathbb{F}}_{2}^{n}, where each coordinate function fif_{i} describes how the future value of variable xix_{i} depends on the present values of all variables. All variables are updated at the same time (synchronously).

Definition 2.1.

The wiring diagram of a Boolean network F=(f1,,fn):𝔽2n𝔽2nF=(f_{1},\ldots,f_{n}):\operatorname{\mathbb{F}}_{2}^{n}\rightarrow\operatorname{\mathbb{F}}_{2}^{n} is the directed graph with vertices x1,,xnx_{1},\ldots,x_{n} and an edge from xix_{i} to xjx_{j} if fjf_{j} depends on xix_{i}. That is, if there exists 𝐱𝔽2n\mathbf{x}\in\operatorname{\mathbb{F}}_{2}^{n} such that fj(𝐱)fj(𝐱+𝐞𝐢),f_{j}(\mathbf{x})\neq f_{j}(\bf x+e_{i}), where 𝐞𝐢\bf e_{i} is the iith unit vector.

Definition 2.2.

The wiring diagram of a Boolean network is strongly connected if every pair of nodes is connected by a directed path. That is, for each pair of nodes xi,xjx_{i},x_{j} in the wiring diagram with xixjx_{i}\neq x_{j} there exists a directed path from xix_{i} to xjx_{j} (and vice versa). In particular, a one-node wiring diagram is strongly connected by definition.

Remark 2.3.

The wiring diagram of any Boolean network is either strongly connected or it is composed of a collection of strongly connected components where connections between different components move in only one direction.

Example 2.4.

Figure 2a shows the wiring diagram of the Boolean network F:𝔽23𝔽23F:\operatorname{\mathbb{F}}_{2}^{3}\rightarrow\operatorname{\mathbb{F}}_{2}^{3} given by

F(x1,x2,x3)=(x2¬x3,x3,¬x1x2).F(x_{1},x_{2},x_{3})=(x_{2}\wedge\neg x_{3},x_{3},\neg x_{1}\wedge x_{2}).

Refer to caption
Figure 2: Wiring diagram and state space of the Boolean network in Example 2.4-2.11. (a) The wiring diagram encodes the dependency between variables. (b) The state space is a directed graph with edges between all states and their images. This graph therefore encodes all possible trajectories.

2.2 Dynamics of Boolean networks

Another directed graph associated with a BN is the state transition graph, also referred to as the state space. It describes all possible transitions of the BN from one time step to the next. The attractors of a BN are minimal sets of states from which there is no escape as the system evolves. An attractor with a single state is also called a steady state (or fixed point). In mathematical models of intracellular regulatory networks, the attractors of the model are often associated with the possible phenotypes of the cell. This idea can be traced back to Waddington [32] and Kauffman [33]. For example, in a model of cancer cells, the steady states of the model correspond to proliferative, apoptotic, or growth-arrest phenotypes [34]. Mathematically, a phenotype is associated with a group of attractors where a subset of the system’s variables have the same states. These shared states are then used as biomarkers that indicate diverse hallmarks of the system.

There are two ways to describe the dynamics of a Boolean network F:𝔽2n𝔽2nF:\operatorname{\mathbb{F}}_{2}^{n}\to\operatorname{\mathbb{F}}_{2}^{n}, (i) as trajectories for all 2n2^{n} possible initial conditions, or (ii) as a directed graph with nodes in 𝔽2n\operatorname{\mathbb{F}}_{2}^{n}. Although the first description is less compact, it will allow us to formalize the dynamics of coupled networks.

Definition 2.5.

A trajectory of a Boolean network F:𝔽2n𝔽2nF:\operatorname{\mathbb{F}}_{2}^{n}\rightarrow\operatorname{\mathbb{F}}_{2}^{n} is a sequence (x(t))t=0(x(t))_{t=0}^{\infty} of elements of 𝔽2n\operatorname{\mathbb{F}}_{2}^{n} such that x(t+1)=F(x(t))x(t+1)=F(x(t)) for all t0t\geq 0.

Example 2.6.

For the network in the example above, F(x1,x2,x3)=(x2¬x3,x3,¬x1x2)F(x_{1},x_{2},x_{3})=(x_{2}\wedge\neg x_{3},x_{3},\neg x_{1}\wedge x_{2}), there are 23=82^{3}=8 possible initial states giving rise to the following trajectories (commas and parenthesis for states are omitted for brevity).

T1\displaystyle T_{1} =(000,000,000,000,)\displaystyle=(000,000,000,000,\ldots)
T2\displaystyle T_{2} =(001,010,101,010,)\displaystyle=(001,010,101,010,\ldots)
T3\displaystyle T_{3} =(010,101,010,101,)\displaystyle=(010,101,010,101,\ldots)
T4\displaystyle T_{4} =(011,011,011,011,)\displaystyle=(011,011,011,011,\ldots)
T5\displaystyle T_{5} =(100,000,000,000,)\displaystyle=(100,000,000,000,\ldots)
T6\displaystyle T_{6} =(101,010,101,010,)\displaystyle=(101,010,101,010,\ldots)
T7\displaystyle T_{7} =(110,100,000,000,)\displaystyle=(110,100,000,000,\ldots)
T8\displaystyle T_{8} =(111,010,101,010,)\displaystyle=(111,010,101,010,\ldots)

We can see that T3T_{3} and T6T_{6} are periodic trajectories with period 2. Similarly, T1T_{1} and T4T_{4} are periodic with period 1. All other trajectories eventually reach one of these 4 states.

When seen as trajectories, T3T_{3} and T6T_{6} are different, but they can both be encoded by the fact that F(0,1,0)=(1,0,1)F(0,1,0)=(1,0,1) and F(1,0,1)=(0,1,0)F(1,0,1)=(0,1,0). Similarly, T1T_{1} and T4T_{4} can be encoded by the equalities F(0,1,1)=(0,1,1)F(0,1,1)=(0,1,1) and F(0,0,0)=(0,0,0)F(0,0,0)=(0,0,0). This alternative, more compact way of encoding the dynamics of a Boolean network is the standard approach, which we formalize next.

Definition 2.7.

The state space of a (synchronously updated) Boolean network F:𝔽2n𝔽2nF:\operatorname{\mathbb{F}}_{2}^{n}\to\operatorname{\mathbb{F}}_{2}^{n} is a directed graph with vertices in 𝔽2n\operatorname{\mathbb{F}}_{2}^{n} and an edge from xx to yy if F(x)=yF(x)=y.

Example 2.8.

Figure 2b shows the state space of the (synchronously updated) Boolean network from Example 2.4.

From the state space, one can easily obtain all periodic points, which form the attractors of the network.

Definition 2.9.

The set of attractors for a Boolean network is the set 𝒜(F)\mathcal{A}(F) of all minimal nonempty subsets 𝒞𝔽2n\mathcal{C}\subseteq\operatorname{\mathbb{F}}_{2}^{n} satisfying F(𝒞)=𝒞F(\mathcal{C})=\mathcal{C}.

  1. 1.

    The subset 𝒜1(F)𝒜(F)\mathcal{A}^{1}(F)\subset\mathcal{A}(F) of sets of exact size 1 consists of all steady states (also known as fixed points) of FF.

  2. 2.

    The subset 𝒜r(F)𝒜(F)\mathcal{A}^{r}(F)\subset\mathcal{A}(F) of sets of exact size rr consists of all cycles of length rr of FF.

Equivalently, an attractor of length rr is an ordered set with rr elements, 𝒞={c1,,cr}\mathcal{C}=\{c_{1},\ldots,c_{r}\}, such that F(c1)=c2,F(c2)=c3,,F(cr1)=cr,F(cr)=c1F(c_{1})=c_{2},F(c_{2})=c_{3},\ldots,F(c_{r-1})=c_{r},F(c_{r})=c_{1}.

Remark 2.10.

In the case of steady states, the attractor 𝒞={c}\mathcal{C}=\{c\} may be denoted simply by cc.

Example 2.11.

The Boolean network from Example 2.4 has 2 steady states (i.e., attractors of length 1) and one cycle of length 2, which can be easily derived from its state space representation (Figure 2b).

2.3 Modules

In [24], a concept of modularity was introduced for Boolean networks. The decomposition into modules occurs on structural (wiring diagram) level but induces an analogous decomposition of the network dynamics, in the sense that one can recover the dynamics of the entire network from the dynamics of the modules. For this decomposition, a module of a BN is defined as a subnetwork that is itself a BN with external parameters in the subset of variables that specifies a strongly connected component (SCC) in the wiring diagram (see Example 2.12). More precisely, for a Boolean network FF and subset of its variables SS, we define the restriction of FF to SS to be the BN F|S=(fk1,,fkm)F|_{S}=(f_{k_{1}},\ldots,f_{k_{m}}), where xkiSx_{k_{i}}\in S for i=1,,mi=1,\ldots,m. We note that fkif_{k_{i}} might contain inputs that are not part of SS (e.g., when xkix_{k_{i}} is regulated by some variables that are not in SS). Therefore, the BN F|SF|_{S} may contain external parameters (which are themselves fixed and do not possess an update rule). Given a FF with wiring diagram WW, let W1,,WmW_{1},\ldots,W_{m} be the SCCs of WW with pairwise disjoint sets of variables SiS_{i}. The modules of FF are then the restrictions to these sets of variables, F|SiF|_{S_{i}}. Further, the modular structure of FF can be described by a directed acyclic graph Q=(V,E)Q=(V,E) with vertex set V={W1,,Wm}V=\{W_{1},\ldots,W_{m}\} (where we contracted each SCC into a single vertex) and edge set E={(i,j)WiWj}E=\{(i,j)\mid W_{i}\longrightarrow W_{j}\} by setting WiWjW_{i}\longrightarrow W_{j} whenever there exists a node from WiW_{i} to WjW_{j} (we show a modular decomposition of a small BN in Example 2.12).

Example 2.12.

Consider the Boolean network

F(x)=(x2x1,¬x1,x1¬x4,(x1¬x2)(x3x4))F(x)=(x_{2}\wedge x_{1},\neg x_{1},x_{1}\vee\neg x_{4},(x_{1}\wedge\neg x_{2})\vee(x_{3}\wedge x_{4}))

with wiring diagram in Figure 3a. The restriction of this network to S1={x1,x2}S_{1}=\{x_{1},x_{2}\} is the 2-variable network F|S1(x1,x2)=(x2x1,¬x1)F|_{S_{1}}(x_{1},x_{2})=(x_{2}\wedge x_{1},\neg x_{1}), which forms the first module (indicated by the amber box in Figure 3a), while the restriction of FF to S2={x3,x4}S_{2}=\{x_{3},x_{4}\} is the 2-variable network with external parameters x1x_{1} and x2x_{2} F|S2(x3,x4)=(x1¬x4,(x1¬x2)(x3x4)))F|_{S_{2}}(x_{3},x_{4})=(x_{1}\vee\neg x_{4},(x_{1}\wedge\neg x_{2})\vee(x_{3}\wedge x_{4}))), which forms the second module (indicated by the green module in Figure 3a). Note that the module F|S1F|_{S_{1}}, i.e., the restriction of FF to S1S_{1}, is simply the projection of FF onto the variables S1S_{1} because W1W_{1} does not receive feedback from the other component.

The wiring diagram of this network has two strongly connected components W1W_{1} and W2W_{2} with variables S1={x1,x2}S_{1}=\{x_{1},x_{2}\} and S2={x3,x4}S_{2}=\{x_{3},x_{4}\} (Figure 3a), connected according to the directed acyclic graph Q=(V,E)Q=(V,E) with vertex set V={W1,W2}V=\{W_{1},W_{2}\} (where we contracted each SCC into a single vertex) and edge set E={(1,2)W1W2}E=\{(1,2)\mid W_{1}\longrightarrow W_{2}\} (Figure 3b).

Refer to caption
Figure 3: Boolean network decomposition into modules. (a) Wiring diagram of a non-strongly connected Boolean network where the modules are highlighted by amber and green boxes. (b) Directed acyclic graph describing the corresponding connections between the modules.

3 Control via Modularity

In this section, we apply the modular decomposition theory described in the previous section and in [24] to make the control problem of Boolean networks more tractable. We show how the decomposition into modules can be used to obtain controls for each module, which can then be combined to obtain a control for the entire network. In this context, two types of control actions are generally considered: edge controls and node controls. For each type of control, one can consider deletions or constant expressions as defined below. The motivation for considering these control actions is that they represent the common interventions that can be implemented in practice. For instance, edge deletions can be achieved by the use of therapeutic drugs that target specific gene interactions, whereas node deletions represent the blocking of effects of products of genes associated to these nodes; see [35, 36].

Once the modules have been identified, different methods for phenotype control (that is, control of the attractor space) can be used to identify controls in these networks. Some of these methods employ stable motifs [11], feedback vertex sets [13], as well as algebraic approaches [37, 38, 39]. For our examples below, we will use the methods defined in [11, 37, 13] to find controls for the modules.

A Boolean network F=(f1,,fn):𝔽2n𝔽2nF=(f_{1},\ldots,f_{n}):\operatorname{\mathbb{F}}_{2}^{n}\rightarrow\operatorname{\mathbb{F}}_{2}^{n} with control is a Boolean network Fμ:𝔽2n×U𝔽2nF^{\mu}:\mathbb{F}_{2}^{n}\times U\rightarrow\mathbb{F}_{2}^{n}, where UU is a set that denotes all possible controls, defined below. The case of no control coincides with the original Boolean network, that is, Fμ(x,0)=F(x)F^{\mu}(x,0)=F(x). Given a control μU\mu\in U, the dynamics are given by x(t+1)=Fμ(x(t),μ)x(t+1)=F^{\mu}(x(t),\mu). See [37] for additional details and examples of how to encode control edges and nodes in a Boolean network.

Definition 3.1 (Edge Control).

Consider the edge xixjx_{i}\rightarrow x_{j} in the wiring diagram W{W}. The function

Fjμ(x,μi,j):=fj(x1,,(μi,j+1)xi+μi,jai,,xn),F^{\mu}_{j}(x,\mu_{i,j}):=f_{j}(x_{1},\dots,(\mu_{i,j}+1)x_{i}+\mu_{i,j}a_{i},\dots,x_{n}), (1)

where aia_{i} is a constant in 𝔽2\operatorname{\mathbb{F}}_{2}, encodes the control of the edge xixjx_{i}\rightarrow x_{j}, since for each possible value of μi,j𝔽2\mu_{i,j}\in\mathbb{F}_{2} we have the following control settings:

  • If μi,j=0\mu_{i,j}=0, Fjμ(x,0)=fj(x1,,xi,,xn)F^{\mu}_{j}(x,0)=f_{j}(x_{1},\dots,x_{i},\dots,x_{n}). That is, the control is not active.

  • If μi,j=1\mu_{i,j}=1, Fjμ(x,1)=fj(x1,,xi=ai,,xn)F^{\mu}_{j}(x,1)=f_{j}(x_{1},\dots,x_{i}=a_{i},\dots,x_{n}). In this case, the control is active, and the action represents the removal of the edge xixjx_{i}\rightarrow x_{j} when ai=0a_{i}=0, and the constant expression of the edge if ai=1a_{i}=1. We use xiaixjx_{i}\xrightarrow[]{a_{i}}x_{j} to denote that the control is active.

This definition can be easily extended for the control of many edges, so that we obtain Fμ:𝔽2n×𝔽2e𝔽2nF^{\mu}:\mathbb{F}_{2}^{n}\times\mathbb{F}_{2}^{e}\rightarrow\mathbb{F}_{2}^{n}, where ee is the number of edges in the wiring diagram. Each coordinate, μi,j\mu_{i,j}, of μ\mu in Fμ(x,μ)F^{\mu}(x,\mu) encodes the control of an edge xixjx_{i}\rightarrow x_{j}.

Definition 3.2 (Node Control).

Consider the node xix_{i} in the wiring diagram W{W}. The function

Fjμ(x,μi,μi+):=(μi+μi++1)fj(x)+μi+F^{\mu}_{j}(x,\mu^{-}_{i},\mu^{+}_{i}):=(\mu^{-}_{i}+\mu^{+}_{i}+1)f_{j}(x)+\mu^{+}_{i} (2)

encodes the control (knock-out or constant expression) of the node xix_{i}, since for each possible value of (μi,μi+)𝔽22(\mu^{-}_{i},\mu^{+}_{i})\in\mathbb{F}_{2}^{2} we have the following control settings:

  • For μi=0,μi+=0\mu^{-}_{i}=0,\mu^{+}_{i}=0, Fjμ(x,0,0)=fj(x)F^{\mu}_{j}(x,0,0)=f_{j}(x). That is, the control is not active.

  • For μi=1,μi+=0\mu^{-}_{i}=1,\mu^{+}_{i}=0, Fjμ(x,1,0)=0F^{\mu}_{j}(x,1,0)=0. This action represents the knock-out of the node xjx_{j}.

  • For μi=0,μi+=1\mu^{-}_{i}=0,\mu^{+}_{i}=1, Fjμ(x,0,1)=1F^{\mu}_{j}(x,0,1)=1. This action represents the constant expression of the node xjx_{j}.

  • For μi=1,μi+=1\mu^{-}_{i}=1,\mu^{+}_{i}=1, Fjμ(x,1,1)=fj(xt1,,xtm)+1F^{\mu}_{j}(x,1,1)=f_{j}(x_{t_{1}},\dots,x_{t_{m}})+1. This action changes the Boolean function to its negative value. This case is usually not considered in the control search since it is biologically impractical to implement.

We note that the algebraic framework is versatile enough that we can encode any type of control, such as a combination of node and edge control at the same time.

Definition 3.3.

A control μ\mu stabilizes a given Boolean network F:𝔽2n𝔽2nF:\operatorname{\mathbb{F}}_{2}^{n}\rightarrow\operatorname{\mathbb{F}}_{2}^{n} at an attractor 𝒞\mathcal{C} 𝔽2n\subseteq\operatorname{\mathbb{F}}_{2}^{n} when the resulting network after applying μ\mu to FF (denoted here as FμF^{\mu}) has 𝒞\mathcal{C} as its only attractor. Note that μ\mu may contain a combination of one or multiple edge or node controls, as described in Definitions 1 and 3.2.

For a Boolean network FF, we let 𝒜(F)\mathcal{A}(F) denote the set of its attractors. Whenever a Boolean network FF has more than one module we say that it is decomposable into its constituent modules F1,F2,,FmF_{1},F_{2},\ldots,F_{m} (m2m\geq 2), and write F=F1P1F2P2Pm1FmF=F_{1}\rtimes_{P_{1}}F_{2}\rtimes_{P_{2}}\cdots\rtimes_{P_{m-1}}F_{m} where the semi-product operation Pi\rtimes_{P_{i}} indicates the coupling of the subnetworks, as described in [24] (see Example 3.4 for an example of coupling). Furthermore, from the decomposition theory described in [24], the attractors of FF are of the form 𝒞=𝒞1𝒞2𝒞n\mathcal{C}=\mathcal{C}_{1}\oplus\mathcal{C}_{2}\oplus\cdots\oplus\mathcal{C}_{n} where 𝒞i𝒜(Fi)\mathcal{C}_{i}\in\mathcal{A}(F_{i}) is an attractor of the subnetwork, for i=1,,ni=1,\dots,n (one can think of this direct sum operation as concatenating the attractors from the different modules, see Example 3.6 where we show an example of this operation).

Example 3.4.

Consider the Boolean network in Example 2.12,

F(x)=(x2x1,¬x1,x1¬x4,(x1¬x2)(x3x4))F(x)=(x_{2}\wedge x_{1},\neg x_{1},x_{1}\vee\neg x_{4},(x_{1}\wedge\neg x_{2})\vee(x_{3}\wedge x_{4}))

with wiring diagram in Figure 3a. Let F1=F|S1(x1,x2)=(x2x1,¬x1)F_{1}=F|_{S_{1}}(x_{1},x_{2})=(x_{2}\wedge x_{1},\neg x_{1}) be the restriction of FF to S1={x1,x2}S_{1}=\{x_{1},x_{2}\} which forms the first module (indicated by the amber box in Figure 3a) and let F2=F|S2(x3,x4)=(e1¬x4,(e1¬e2)(x3x4)))F_{2}=F|_{S_{2}}(x_{3},x_{4})=(e_{1}\vee\neg x_{4},(e_{1}\wedge\neg e_{2})\vee(x_{3}\wedge x_{4}))) be the restriction of FF to S2={x3,x4}S_{2}=\{x_{3},x_{4}\}, which forms the second module (indicated by the green box in Figure 3a). Here, e1e_{1} and e2e_{2} are external parameters of F|S2F|_{S_{2}} that take the place of x1x_{1} and x2x_{2}, which is indicated by the coupling P={x1e1,x2e2}P=\{x_{1}\to e_{1},x_{2}\to e_{2}\}. FF is thus decomposable into F1F_{1} and F2F_{2} and we have F=F1PF2F=F_{1}\rtimes_{P}F_{2}.

The following theorem takes advantage of the modular structure of the network to find controls one module at a time.

Theorem 3.5.

Given a decomposable network F=F1PF2F=F_{1}\rtimes_{P}F_{2}, if μ1\mu_{1} is a control that stabilizes F1F_{1} in 𝒞1\mathcal{C}_{1} (whether 𝒞1\mathcal{C}_{1} is an existing attractor of F1F_{1} or a new one, after applying control μ1\mu_{1}) and μ2\mu_{2} is a control that stabilizes F2F_{2} in 𝒞2\mathcal{C}_{2} (whether 𝒞2\mathcal{C}_{2} is an existing attractor of F2F_{2} or a new one, after applying control μ2\mu_{2}), then μ=(μ1,μ2)\mu=(\mu_{1},\mu_{2}) is a control that stabilizes FF in 𝒞=𝒞1𝒞2\mathcal{C}=\mathcal{C}_{1}\oplus\mathcal{C}_{2} provided that at least one of 𝒞1\mathcal{C}_{1} or 𝒞2\mathcal{C}_{2} is a steady state.

Proof.

Let F1μ1F^{\mu_{1}}_{1} be the resulting network after applying the control μ1\mu_{1}. Thus, the dynamics of F1μ1F^{\mu_{1}}_{1} is 𝒞1\mathcal{C}_{1}, that is 𝒜(F1μ1)=𝒞1\mathcal{A}(F^{\mu_{1}}_{1})=\mathcal{C}_{1}. Similarly, the dynamics of F2μ2F^{\mu_{2}}_{2} is 𝒞2\mathcal{C}_{2}. Let F2𝒞1,μ2F^{\mathcal{C}_{1},\mu_{2}}_{2} be the network that results after setting all external parameters of F2F_{2} to the states of 𝒞1\mathcal{C}_{1} and applying the control μ2\mu_{2}. Then, 𝒜(F2𝒞1,μ2)=𝒞2\mathcal{A}(F^{\mathcal{C}_{1},\mu_{2}}_{2})=\mathcal{C}_{2}. Thus,

Fμ=(F1PF2)μ=F1μPF2μ=F1μ1PF2μ2.F^{\mu}=(F_{1}\rtimes_{P}F_{2})^{\mu}=F_{1}^{\mu}\rtimes_{P}F_{2}^{\mu}=F_{1}^{\mu_{1}}\rtimes_{P}F_{2}^{\mu_{2}}.

Therefore,

𝒜(Fμ)=𝒜(F1μ1PF2μ2)=𝒞𝒜(F1μ1)𝒞𝒜(F2𝒞,μ2)=𝒞1𝒜(F2𝒞1,μ2)=𝒞1𝒞2.\mathcal{A}(F^{\mu})=\mathcal{A}(F_{1}^{\mu_{1}}\rtimes_{P}F_{2}^{\mu_{2}})=\bigsqcup_{\mathcal{C}^{\prime}\in\mathcal{A}(F_{1}^{\mu_{1}})}\mathcal{C}^{\prime}\oplus\mathcal{A}(F^{\mathcal{C}^{\prime},\mu_{2}}_{2})=\mathcal{C}_{1}\oplus\mathcal{A}(F^{\mathcal{C}_{1},\mu_{2}}_{2})=\mathcal{C}_{1}\oplus\mathcal{C}_{2}.

For the last equality we used the fact that the product of a steady state and a cycle (or vice versa) will result in only one attractor for the combined network. Notice, however, that multiplying two attractors (of length greater than 1) might result in several attractors for the composed network due to the attractors starting at different states.

It follows that there is only one attractor of FμF^{\mu} and that attractor is 𝒞1𝒞2\mathcal{C}_{1}\oplus\mathcal{C}_{2}. Thus, FF is stabilized by μ=(μ1,μ2)\mu=(\mu_{1},\mu_{2}) and we have 𝒜(Fμ)=𝒞\mathcal{A}(F^{\mu})=\mathcal{C}.

Example 3.6.

Consider the network F(x1,x2,x3,x4)=(x2,x1,x2x4,x3)F(x_{1},x_{2},x_{3},x_{4})=(x_{2},x_{1},x_{2}\wedge x_{4},x_{3}) whose wiring diagram and state space are given in Figure 4, which can be decomposed into F=F1PF2F=F_{1}\rtimes_{P}F_{2}, with F1=F|S1(x1,x2)=(x2,x1)F_{1}=F|_{S_{1}}(x_{1},x_{2})=(x_{2},x_{1}) where S1={x1,x2}S_{1}=\{x_{1},x_{2}\} and F2=F|S2(x3,x4)=(e2x4,x3)F_{2}=F|_{S_{2}}(x_{3},x_{4})=(e_{2}\wedge x_{4},x_{3}) where S2={x3,x4}S_{2}=\{x_{3},x_{4}\} and e2e_{2} is an external parameter. Here the coupling is given by P={x2e2}P=\{x_{2}\to e_{2}\}. Suppose we want to stabilize FF in 0110, which is not an attractor of FF (see Figure 4(c)). The set of attractors of F1F_{1} is given by 𝒜(F1)={00,11,{01,10}}\mathcal{A}(F_{1})=\left\{00,11,\{01,10\}\right\}.

  • Consider the control μ1:(x11x2,x20x1)\mu_{1}:(x_{1}\xrightarrow[]{1}x_{2},x_{2}\xrightarrow[]{0}x_{1}). That is, the control is the combined action of setting the input from x1x_{1} to x2x_{2} to 1 and the input from x2x_{2} to x1x_{1} to 0. The control μ1\mu_{1} stabilizes F1F_{1} at 0101, which is not an original attractor of F1F_{1}. Let 𝒞1={01}𝒜(F1μ1)\mathcal{C}_{1}=\{01\}\in\mathcal{A}(F_{1}^{\mu_{1}}). Let F2𝒞1F^{\mathcal{C}_{1}}_{2} be the network that results after setting all external parameters of F2F_{2} to the states of 𝒞1\mathcal{C}_{1}. Note that the space of attractors for F2𝒞1F_{2}^{\mathcal{C}_{1}} is 𝒜(F2𝒞1)={00,11,{01,10}}\mathcal{A}(F_{2}^{\mathcal{C}_{1}})=\{00,11,\{01,10\}\}.

  • Now consider the control μ2:(x41x3,x30x4)\mu_{2}:(x_{4}\xrightarrow[]{1}x_{3},x_{3}\xrightarrow[]{0}x_{4}). That is, the control is the combined action of setting the input from x4x_{4} to x3x_{3} to 1 and the input from x3x_{3} to x4x_{4} to 0. This control stabilizes F2𝒞1F_{2}^{\mathcal{C}_{1}} at 𝒞2={10}𝒜(F2𝒞1)\mathcal{C}_{2}=\{10\}\in\mathcal{A}(F_{2}^{\mathcal{C}_{1}}), which is not an original attractor of F2𝒞1F_{2}^{\mathcal{C}_{1}}.

  • Finally, the control μ=(μ1,μ2)\mu=(\mu_{1},\mu_{2}) stabilizes FF at 𝒞=𝒞1𝒞2={0110}\mathcal{C}=\mathcal{C}_{1}\oplus\mathcal{C}_{2}=\{0110\} by Theorem 3.5.

Theorem 3.5 shows how the modular structure can be used to identify controls that stabilize the network in any desired state. In particular, we can use the modular structure of a network to find controls that stabilize a network at an existing attractor, which is often the case in biological control applications. We state this fact in the following corollary.

Corollary 3.7.

Given a decomposable network F=F1PF2F=F_{1}\rtimes_{P}F_{2}, let 𝒞=𝒞1𝒞2\mathcal{C}=\mathcal{C}_{1}\oplus\mathcal{C}_{2} be an attractor of FF, where 𝒞1𝒜(F1)\mathcal{C}_{1}\in\mathcal{A}(F_{1}) and 𝒞2𝒜(F2𝒞1)\mathcal{C}_{2}\in\mathcal{A}(F^{\mathcal{C}_{1}}_{2}) and at least 𝒞1\mathcal{C}_{1} or 𝒞2\mathcal{C}_{2} is a steady state. If μ1\mu_{1} is a control that stabilizes F1F_{1} in 𝒞1\mathcal{C}_{1} and μ2\mu_{2} is a control that stabilizes F2𝒞1F^{\mathcal{C}_{1}}_{2} in 𝒞2\mathcal{C}_{2}, then μ=(μ1,μ2)\mu=(\mu_{1},\mu_{2}) is a control that stabilizes FF in 𝒞\mathcal{C}.

Theorem 3.5 uses the modular structure of a Boolean network to identify controls that stabilize the network in any desired attractor. In biological applications, the attractors typically correspond to distinct biological phenotypes (defined more rigorously in the next section) and a common question is how to force a network to always transition to only one of these phenotypes. For example, cancer biologists may use an appropriate Boolean network model with the two phenotypes proliferation and apoptosis to identify drug targets (i.e., edge or node controls), which force the system to always undergo apoptosis. In [24], we applied the approach described in Corollary 3.7 to find an efficient intervention that solves the control problem for the pancreatic cancer model with 69 nodes. In the following example, we illustrate the approach described in Corollary 3.7 using a toy model.

Example 3.8.

Consider again the network F(x1,x2,x3,x4)=(x2,x1,x2x4,x3)=F1PF2F(x_{1},x_{2},x_{3},x_{4})=(x_{2},x_{1},x_{2}\wedge x_{4},x_{3})=F_{1}\rtimes_{P}F_{2} from Example 3.6 with F1=F|S1(x1,x2)=(x2,x1)F_{1}=F|_{S_{1}}(x_{1},x_{2})=(x_{2},x_{1}) where S1={x1,x2}S_{1}=\{x_{1},x_{2}\} and F2=F|S2(x3,x4)=(e2x4,x3)F_{2}=F|_{S_{2}}(x_{3},x_{4})=(e_{2}\wedge x_{4},x_{3}) where S2={x3,x4}S_{2}=\{x_{3},x_{4}\} and e2e_{2} is an external parameter. Here the coupling is given by P={x2e2}P=\{x_{2}\to e_{2}\}. Suppose we want to stabilize FF in 1111, which is one of the attractors of FF (see Figure 4(c)). The set of attractors of F1F_{1} is 𝒜(F1)={00,11,{01,10}}\mathcal{A}(F_{1})=\left\{00,11,\{01,10\}\right\}. Let 𝒞1={11}𝒜(F1)\mathcal{C}_{1}=\{11\}\in\mathcal{A}(F_{1}).

  • The edge control μ1:x11x2\mu_{1}:x_{1}\xrightarrow[]{1}x_{2} (that is, the control that constantly expresses the edge from x1x_{1} to x2x_{2}) stabilizes F1F_{1} at 𝒞1={11}\mathcal{C}_{1}=\{11\}. Let F2𝒞1F^{\mathcal{C}_{1}}_{2} be the network that results after setting all external parameters of F2F_{2} to the states of 𝒞1\mathcal{C}_{1}. The space of attractors for F2𝒞1F_{2}^{\mathcal{C}_{1}} is then 𝒜(F2𝒞1)={00,11,{01,10}}\mathcal{A}(F_{2}^{\mathcal{C}_{1}})=\{00,11,\{01,10\}\}. Note that x21x1x_{2}\xrightarrow[]{1}x_{1} would be an alternative control.

  • The edge control μ2:x41x3\mu_{2}:x_{4}\xrightarrow[]{1}x_{3} (that is, the control that constantly expresses the edge from x4x_{4} to x3x_{3}) stabilizes F2𝒞1F_{2}^{\mathcal{C}_{1}} at 𝒞2={11}𝒜(F2𝒞1)\mathcal{C}_{2}=\{11\}\in\mathcal{A}(F_{2}^{\mathcal{C}_{1}}). Again, note that x31x4x_{3}\xrightarrow[]{1}x_{4} would be an alternative control.

  • Now, the control μ=(μ1,μ2)=(x11x2,x41x3)\mu=(\mu_{1},\mu_{2})=(x_{1}\xrightarrow[]{1}x_{2},x_{4}\xrightarrow[]{1}x_{3}) stabilizes FF at 𝒞=𝒞1𝒞2={1111}\mathcal{C}=\mathcal{C}_{1}\oplus\mathcal{C}_{2}=\{1111\} by Corollary 3.7.

Remark 3.9.

In Theorem 3.5, we required one of the stabilized attractors to be a steady state in order to be able to combine the controls from the modules. We can remove this requirement by using the following definition of stabilization for non-autonomous networks (defined in [24]), which will guarantee that 𝒞1\mathcal{C}_{1} and 𝒞2\mathcal{C}_{2} can be combined in a unique way, resulting in a unique attractor of the whole network.

Definition 3.10.

[24] A non-autonomous Boolean network is defined by

y(t+1)=H(g(t),y(t)),y(t+1)=H(g(t),y(t)),

where H:𝔽2m+n𝔽2nH:\operatorname{\mathbb{F}}_{2}^{m+n}\rightarrow\operatorname{\mathbb{F}}_{2}^{n} and (g(t))t=0\left(g(t)\right)_{t=0}^{\infty} is a sequence with elements in 𝔽2m\operatorname{\mathbb{F}}_{2}^{m}. We call this type of network non-autonomous because its dynamics will depend on g(t)g(t). We use HgH^{g} to denote this non-autonomous network.

A state c𝔽2nc\in\operatorname{\mathbb{F}}_{2}^{n} is a steady state of HgH^{g} if H(g(t),c)=cH(g(t),c)=c for all tt. Similarly, an ordered set with rr elements, 𝒞={c1,,cr}\mathcal{C}=\{c_{1},\ldots,c_{r}\}, is an attractor of length rr of HgH^{g} if c2=H(g(1),c1)c_{2}=H(g(1),c_{1}), c3=H(g(2),c2),,cr=H(g(r1),cr1)c_{3}=H(g(2),c_{2}),\ldots,c_{r}=H(g(r-1),c_{r-1}), c1=H(g(r),cr)c_{1}=H(g(r),c_{r}), c2=H(g(r+1),c1),c_{2}=H(g(r+1),c_{1}),\ldots. Note that in general g(t)g(t) is not necessarily of period rr and may even not be periodic.

If H(g(t),y)=G(y)H(g(t),y)=G(y) for some network GG (that is, it does not depend on g(t)g(t)) for all tt, then y(t+1)=H(g(t),y(t))=G(y(t))y(t+1)=H(g(t),y(t))=G(y(t)) and this definition of attractors coincides with the classical definition of attractors for (autonomous) Boolean networks (Definition 2.9).

Definition 3.11.

Consider a controlled non-autonomous network given by y(t+1)=F2(g(t),y(t),μ)y(t+1)=F_{2}(g(t),y(t),\mu), where g(t)g(t) is a trajectory representation of an attractor 𝒞1\mathcal{C}_{1} of an upstream network. We say that a control μ2\mu_{2} stabilizes this network, F2𝒞1F_{2}^{\mathcal{C}_{1}} (as in Definition 3.10), at an attractor 𝒞2\mathcal{C}_{2} when the resulting network after applying μ2\mu_{2} (denoted here as F2𝒞1,μ2F_{2}^{\mathcal{C}_{1},\mu_{2}}) has 𝒞2\mathcal{C}_{2} as its unique attractor. For non-autonomous networks the definition of unique attractor requires that (g(t),y(t))t=0\left(g(t),y(t)\right)_{t=0}^{\infty} has a unique periodic trajectory up to shifting of tt (which is automatically satisfied if 𝒞1\mathcal{C}_{1} or 𝒞2\mathcal{C}_{2} is a steady state).

Refer to caption
Figure 4: Wiring diagram, directed acyclic graph, and state space for the network in Examples 3.6 and 3.8. (a) Wiring diagram where the modules are highlighted by amber and green boxes. (b) Directed acyclic graph describing the corresponding connections between the modules. (c) State space of the network generated with Cyclone [40].

4 Control via Modularity and Canalization

In addition to using the modular structure of the network, we can take advantage of the canalizing structure of the regulatory functions to identify control targets.

We first review some concepts and definitions, and introduce the concept of canalization.

Definition 4.1.

A Boolean function f(x1,,xn)f(x_{1},\ldots,x_{n}) is essential in the variable xix_{i} if there exists an 𝐱{0,1}n\operatorname{\mathbf{x}}\in\{0,1\}^{n} such that

f(𝐱)f(𝐱+𝐞𝐢),f(\operatorname{\mathbf{x}})\neq f(\operatorname{\mathbf{x}}+\,\mathbf{e_{i}}),

where 𝐞𝐢\mathbf{e_{i}} is the iith unit vector. In that case, we also say ff depends on xix_{i}.

Definition 4.2.

A Boolean function f(x1,,xn)f(x_{1},\ldots,x_{n}) is canalizing if there exists a variable xix_{i}, a Boolean function g(x1,,xi1,xi+1,,xn)g(x_{1},\ldots,x_{i-1},x_{i+1},\ldots,x_{n}) and a,b{0, 1}a,\,b\in\{0,\,1\} such that

f(x1,x2,,xn)={b,ifxi=ag(x1,x2,,xi1,xi+1,,xn),ifxiaf(x_{1},x_{2},\ldots,x_{n})=\begin{cases}b,&\ \text{if}\ x_{i}=a\\ g(x_{1},x_{2},\ldots,x_{i-1},x_{i+1},\ldots,x_{n}),&\ \text{if}\ x_{i}\neq a\end{cases}

In that case, we say that xix_{i} canalizes ff (to bb) and call aa the canalizing input (of xix_{i}) and bb the canalized output.

Definition 4.3.

A Boolean function f(x1,,xn)f(x_{1},\ldots,x_{n}) is a nested canalizing function (NCF) with respect to the permutation σ𝒮n\sigma\in\mathcal{S}_{n}, inputs a1,,ana_{1},\ldots,a_{n} and outputs b1,,bnb_{1},\ldots,b_{n}, if

f(x1,,xn)={b1xσ(1)=a1,b2xσ(1)a1,xσ(2)=a2,b3xσ(1)a1,xσ(2)a2,xσ(3)=a3,bnxσ(1)a1,,xσ(n1)an1,xσ(n)=an,1+bnxσ(1)a1,,xσ(n1)an1,xσ(n)an.f(x_{1},\ldots,x_{n})=\left\{\begin{array}[c]{ll}b_{1}&x_{\sigma(1)}=a_{1},\\ b_{2}&x_{\sigma(1)}\neq a_{1},x_{\sigma(2)}=a_{2},\\ b_{3}&x_{\sigma(1)}\neq a_{1},x_{\sigma(2)}\neq a_{2},x_{\sigma(3)}=a_{3},\\ \vdots&\vdots\\ b_{n}&x_{\sigma(1)}\neq a_{1},\ldots,x_{\sigma(n-1)}\neq a_{n-1},x_{\sigma(n)}=a_{n},\\ 1+\,b_{n}&x_{\sigma(1)}\neq a_{1},\ldots,x_{\sigma(n-1)}\neq a_{n-1},x_{\sigma(n)}\neq a_{n}.\end{array}\right.

The last line ensures that ff actually depends on all nn variables.

To account for partial canalization, we also define kk-canalizing functions, which were first introduced in [41].

Definition 4.4.

A Boolean function f(x1,,xn)f(x_{1},\ldots,x_{n}) is kk-canalizing, where 1kn1\leq k\leq n, with respect to the permutation σ𝒮n\sigma\in\mathcal{S}_{n}, inputs a1,,aka_{1},\ldots,a_{k}, and outputs b1,,bkb_{1},\ldots,b_{k} if

f(x1,,xn)={b1xσ(1)=a1,b2xσ(1)a1,xσ(2)=a2,b3xσ(1)a1,xσ(2)a2,xσ(3)=a3,bkxσ(1)a1,,xσ(k1)ak1,xσ(k)=ak,fCbkxσ(1)a1,,xσ(k1)ak1,xσ(k)ak,\begin{array}[]{l}f(x_{1},\ldots,x_{n})=\\ \left\{\begin{array}[c]{ll}b_{1}&x_{\sigma(1)}=a_{1},\\ b_{2}&x_{\sigma(1)}\neq a_{1},x_{\sigma(2)}=a_{2},\\ b_{3}&x_{\sigma(1)}\neq a_{1},x_{\sigma(2)}\neq a_{2},x_{\sigma(3)}=a_{3},\\ \vdots&\vdots\\ b_{k}&x_{\sigma(1)}\neq a_{1},\ldots,x_{\sigma(k-1)}\neq a_{k-1},x_{\sigma(k)}=a_{k},\\ f_{C}\not\equiv b_{k}&x_{\sigma(1)}\neq a_{1},\ldots,x_{\sigma(k-1)}\neq a_{k-1},x_{\sigma(k)}\neq a_{k},\end{array}\right.\end{array}

where fC=fC(xσ(k+1),,xσ(n))f_{C}=f_{C}(x_{\sigma(k+1)},\ldots,x_{\sigma(n)}) is the core function, a Boolean function on nkn-k variables. When fCf_{C} is not canalizing, then the integer kk is the canalizing depth of ff [42]. Note that an nn-canalizing function (i.e., a function where all variables become eventually canalizing) is an NCF.

We restate the following stratification theorem for reference.

Theorem 4.5 ([41]).

Every Boolean function f(x1,,xn)0f(x_{1},\ldots,x_{n})\not\equiv 0 can be uniquely written as

f(x1,,xn)=M1(M2((Mr1(MrpC+1)+1))+1)+q,f(x_{1},\ldots,x_{n})=M_{1}(M_{2}(\cdots(M_{r-1}(M_{r}p_{C}+1)+1)\cdots)+1)+q, (3)

where each Mi=j=1ki(xij+aij)M_{i}=\displaystyle\prod_{j=1}^{k_{i}}(x_{i_{j}}+a_{i_{j}}) is a nonconstant function, called an extended monomial, pCp_{C} is the core polynomial of ff, and k=i=1rkik=\displaystyle\sum_{i=1}^{r}k_{i} is the canalizing depth. Each xix_{i} appears in exactly one of {M1,,Mr,pC}\{M_{1},\ldots,M_{r},p_{C}\}, and the only restrictions are the following “exceptional cases”:

  1. 1.

    If pC1p_{C}\equiv 1 and r1r\neq 1, then kr2k_{r}\geq 2;

  2. 2.

    If pC1p_{C}\equiv 1 and r=1r=1 and k1=1k_{1}=1, then q=0q=0.

When ff is not canalizing (i.e., when k=0k=0), we simply have pC=fp_{C}=f.

Definition 4.6.

Given a Boolean function f(x1,,xn)f(x_{1},\ldots,x_{n}) represented as in Equation 3, we call the extended monomials MiM_{i} the layers of ff and if i<ji<j, we say that MiM_{i} and its variables are more dominant and MjM_{j} and its variables are less dominant. We also define, as in [43], the layer structure as the vector (k1,,kr)(k_{1},\ldots,k_{r}), which describes the number of variables in each layer.

Note that ff is nested canalizing if and only if k1++kr=nk_{1}+\cdots+k_{r}=n.

Remark 4.7.

Here we note the following important properties of layers of canalization.

  1. (a)

    Theorem 4.5 shows that any Boolean function has a unique extended monomial form given by Equation 3, in which the variables are partitioned into different layers based on their dominance. Any variable that is canalizing (independent of the values of other variables) is in the first layer. Any variable that “becomes” canalizing when excluding all variables from the first layer is in the second layer, etc. All remaining variables that never become canalizing are part of the core polynomial. The number of variables that eventually become canalizing is the canalizing depth of the function. NCFs are exactly those functions where all variables become eventually canalizing (note not all variables of an NCF must be in the first layer).

  2. (b)

    While variables in the same layer may have different canalizing input values, they all share the same canalized output value, i.e., they all canalize a function to the same output. On the other hand, the outputs of two consecutive layers are distinct. Therefore, the number of layers of a kk-canalizing function, expressed as in Definition 4.4, is simply one plus the number of changes in the vector of canalized outputs, (b1,b2,,bk)(b_{1},b_{2},\ldots,b_{k}).

Example 4.8.

The Boolean functions

f(x1,x2,x3,x4)=x1(¬x2(x3x4))andg(x1,x2,x3,x4)=x1(¬x2x3x4)f(x_{1},x_{2},x_{3},x_{4})=x_{1}\wedge(\neg x_{2}\vee(x_{3}\wedge x_{4}))\qquad\text{and}\qquad g(x_{1},x_{2},x_{3},x_{4})=x_{1}\wedge(\neg x_{2}\vee x_{3}\vee x_{4})

are nested canalizing. The function ff has layer structure (1,1,2)(1,1,2) because

  • x1x_{1} canalizes ff to 0 if it receives its canalizing input 0;

  • if this is not the case, x2=0x_{2}=0 canalizes ff to 11;

  • x3=0x_{3}=0 or x4=0x_{4}=0 canalizes ff to 0.

On the other hand, gg has layer structure (1,3)(1,3). As for ff, x1=0x_{1}=0 canalizes gg to 0. If this does not happen, any of the following, x2=0,x3=1,x4=1x_{2}=0,x_{3}=1,x_{4}=1, canalizes gg to 11.

While finding the layer structure of a Boolean function is an NP-hard problem, there exist several algorithmic implementations [44].

Next we will define phenotypes. In meaningful biological networks, the attractors correspond to phenotypes. Typically a small subset of all Boolean variables is used to define phenotypes.

Definition 4.9.

Given a Boolean network FF with attractor space 𝒜(F)\mathcal{A}(F) and phenotype-defining variables 𝒫{x1,,xn}\mathcal{P}\subset\{x_{1},\ldots,x_{n}\}, we associate the same phenotype to all attractors 𝒞𝒜(F)\mathcal{C}\in\mathcal{A}(F) that are identical in 𝒫\mathcal{P}. The states in 𝒫\mathcal{P} will be called markers of the phenotype.

Suppose F=F1PF2F=F_{1}\rtimes_{P}F_{2} is a decomposable network, and that there is a phenotype that depends on variables in F2F_{2} only (that is, all markers of the phenotype are part of F2F_{2}), and that we wish to control the phenotype through F2F_{2}. The most straightforward approach is to set the variables that the phenotype depends on to the appropriate values that result in the desired phenotype. However, such intervention may not be experimentally possible. Instead, we can exploit the canalizing properties of the functions corresponding to the nodes connecting the modules F1F_{1} and F2F_{2} to identify control targets.

By Theorem 4.5, the variables of any Boolean update function can be ordered by importance/dominance, based on which layer they appear in, which is why in Definition 4.6 we called variables in lower/upper layers “more/less dominant,” respectively. Thus, once we control a variable in a certain layer (by setting it to its canalizing input value), any further control of variables in less dominant layers will have no effect on the function (and thus on the network). We state this fact in the following lemma.

Lemma 4.10.

Suppose F=F1PF2F=F_{1}\rtimes_{P}F_{2} is a decomposable network. Suppose further that only one node xF2x\in F_{2} with update function fxf_{x} is regulated by nodes in F1F_{1}. If fxf_{x} is canalizing with rr layers, let MM_{\ell} be the most dominant layer of fxf_{x} which contains nodes from F1F_{1}. If all regulators of xx from F1F_{1} appear in the core polynomial, we set =r+1\ell=r+1. Then, setting yF1y\not\in F_{1} to its canalizing value decouples the systems F1F_{1} and F2F_{2}, as long as yy appears in a layer of fxf_{x} that is more dominant than MM_{\ell}.

Proof.

The lemma is a direct consequence of Theorem 4.5. If yy receives its canalizing input and is in a more dominant layer of fxf_{x} than all variables in F1F_{1}, then none of these variables can affect fxf_{x} anymore. Thus, controlling yy to receive its canalizing input eliminates the link between F1F_{1} and F2F_{2}.

The modularity approach in [24] yields an acyclic directed graph after one collapses each module into a single node. This endows a natural partial ordering on the collection modules of a network where one module precedes the next if there is a path for every node in the first module which ends in the second module. While not all modules are comparable, we can speak of chains of modules which consist of subsets of the partial ordering which are totally ordered. Furthermore, one can rank the modules based on the percentile scores (i.e., rank module kk out of mm modules). This type of ranking has been studied in [45], where it was shown that the importance of the modules is strongly correlated with the aggressiveness of mutations occurring within those modules and the effectiveness of interventions.

Theorem 4.11.

Suppose F=F1P1F2P2Pn1FmF=F_{1}\rtimes_{P_{1}}F_{2}\rtimes_{P_{2}}\cdots\rtimes_{P_{n-1}}F_{m} is a decomposable network. If for some i<ji<j,

  1. (i)

    only one node xFjx\in F_{j} with update function fxf_{x} is regulated by nodes in FiF_{i}, and

  2. (ii)

    fxf_{x} is a canalizing function, which possesses none of the variables from FiF_{i} in its most dominant layer, and

  3. (iii)

    the phenotype of interest only depends on variables in FjF_{j} as well as modules FkF_{k}, for which any chain containing FiF_{i} and FkF_{k} also contains Fj.F_{j}.

then the module FiF_{i} can be excluded from the control search by setting any node yFiy\notin F_{i} to its canalizing input, as long as this node appears in a more dominant layer of fxf_{x} than all inputs of fxf_{x} that are part of FiF_{i}.

Proof.

By Lemma 4.10, setting yy to its canalizing value results in decoupling FiF_{i} and FjF_{j}. FiF_{i} will no longer have any effect on FjF_{j}, and thus, due to condition (iii), on the phenotype of interest. Therefore, FiF_{i} can be removed from the control search.

Refer to caption
Figure 5: Example of a modular directed acylic graph structure to illustrate Condition (iii) in Theorems 4.11 and 4.13. (a) Module FiF_{i} can be removed from the control search as long as conditions (i) and (ii) are satisfied, and the phenotype of interest depends only on any subset of variables that are part of the blue modules. (b) When a node in module FmF_{m} is regulated by a node in module FkF_{k} (indicated by the red edge in the directed acyclic graph), the phenotype may no longer depend on nodes in FmF_{m}, in order for module FiF_{i} to be removable from the control search.

The third condition of this theorem is illustrated in Figure 5.

Remark 4.12.

The method in Theorem 4.11 can be extended to the case when FiF_{i} and FjF_{j} are connected via multiple nodes. In that case, decoupling is achieved through the same procedure presented above, applied to each node in FjF_{j} that is regulated by nodes in FiF_{i}.

Refer to caption
Figure 6: Control via modularity and canalization. Once the network is decomposed into modules F1,,FmF_{1},\ldots,F_{m}, we can override the effect of module FiF_{i} by the using another module (FkF_{k} in this case) whose variables are inputs of fxf_{x} that are located in more dominant layers than the layers containing the variables of FiF_{i}.

Theorem 4.11 is illustrated in Figure 6. Note that node yy can be in FjF_{j} or some other module as in the figure. In this theorem, we assumed that none of the variables of FiF_{i} are in the most dominant layer in the update rules of variables in FjF_{j}. If some variables of FiF_{i} are in the most dominant layer, we can still remove module FiF_{i} from the control search using an edge control, as shown in the following theorem.

Theorem 4.13.

Suppose F=F1P1F2P2Pn1FmF=F_{1}\rtimes_{P_{1}}F_{2}\rtimes_{P_{2}}\cdots\rtimes_{P_{n-1}}F_{m} is a decomposable network. If for some i<ji<j,

  1. (i)

    only one node xFjx\in F_{j} with update function fxf_{x} is regulated by nodes in FiF_{i}, and

  2. (ii)

    fxf_{x} is a canalizing function with some variables from FiF_{i} in its most dominant layer, and

  3. (iii)

    the phenotype of interest only depends on variables in FjF_{j} as well as modules FkF_{k}, for which any chain containing FiF_{i} and FkF_{k} also contains Fj.F_{j}.

then the module FiF_{i} can be excluded from the control search by applying an edge control to any input in the most dominant layer of fxf_{x}.

Proof.

Let yFiy\in F_{i} such that yy appears as a variable in fxf_{x}, and that yy is located in the most dominant layer fxf_{x}. Then, setting yy to its canalizing value results in decoupling the subnetworks FiF_{i} and FjF_{j}. Thus, FiF_{i} will no longer have any effect on FjF_{j} and thus it can be removed from the control search.

Remark 4.14.

The method can be extended to the case when FiF_{i} and FjF_{j} are connected via multiple nodes (that is, condition (i) in Theorem 4.11 and Theorem 4.13 can be relaxed. In that case decoupling is achieved through the same procedure presented above, applied to each node in FjF_{j} with regulators from FiF_{i}.

We further note that condition (ii) in the theorems above is generally very restrictive as only a small proportion of Boolean functions in n>3n>3 variables are canalizing, let alone nested canalizing. However, as shown in [30], most biological Boolean network models are almost entirely governed by nested canalizing functions.

5 An application: Control of a Blood Cancer Boolean Model

To showcase these methods, we will now decompose a published Boolean network model into its modules, and then identify the minimal set of controls for the entire network by exploiting the canalizing structure of the regulatory functions within the modules. The identified set of controls will force the entire system into a desired attractor.

Refer to caption
Figure 7: (a) Wiring diagram of the T-LGL model, published in [31], which describes the mechanisms that regulate apoptosis. The non-trivial modules (i.e., the modules containing multiple nodes) are highlighted by amber, green, and gray boxes. (b) The regulatory inputs of the node DISC. (c) Writing the regulatory function corresponding to node DISC in its extended monomial form (Theorem 4.5) reveals its canalizing structure.

We consider a Boolean network model for the blood cancer large granular lymphocyte (T-LGL) leukemia, which was published in [31]. T-LGL leukemia is a clonal hematological disorder characterized by persistent increases of large granular lymphocytes in the absence of reactive cause [46]. The wiring diagram of this model is depicted in Figure 7a. This network has 16 nodes and three non-trivial modules (i.e., modules containing more than one node, highlighted by the amber, green, and gray boxes in Figure 7a). The control objective here is to identify control targets that lead the system to programmed cell death. In other words, we aim to direct the system into an attractor that has the marker apoptosis ON.

Since the model has three non-trivial modules, the approach described in Section 3 would require us to identify control targets for three modules. However, an exploitation of the canalizing structure and common sense reveals that we do not need to control every module to ensure apoptosis, the desired control objective. First, irrespective of canalization, the module highlighted in gray in Figure 7a does not affect the phenotype apoptosis. Therefore, we can focus on the modules “upstream” of apoptosis (i.e., the amber and green modules in Figure 7a).

In this case, we will apply Theorem 4.13 to identify control targets for this model. We note that the edges from the upstream module (amber box in Figure 7a) to the downstream module (green box in Figure 7a) all end in the node DISC. Therefore, we will investigate the canalizing properties of the regulatory function of DISC (see Figure 7b),

fDISC=Ceramide(FasFLIP¯).f_{DISC}=Ceramide\lor(Fas\land\overline{FLIP}).

Using the approach described in [44], we find that fDISCf_{DISC} has two canalizing layers, L1={Ceramide}L_{1}=\{Ceramide\} and L2={Fas,FLIP}L_{2}=\{Fas,FLIP\}, and extended monomial form (Theorem 4.5) given in Figure 7c).

We note that the only variable in the most dominant canalizing layer, CeramideCeramide, is in the upstream module. Thus, we can decouple the modules via an edge control on the connection between the upstream and downstream modules. That is, the constant expression of the edge from Ceramide to DISC will decouple the two modules and will lead to constant expression of DISC. We can check that this control is effective at stabilizing the system in the desired attractor and the control set obviously has minimal size.

In summary, in this example we used an edge control to decouple the upstream and downstream modules and then identified a control target in the downstream module which contains the markers of the phenotype of interest.

6 Conclusion

Model-based control is a mainstay of industrial engineering, and there is a well-developed mathematical theory of optimal control that can be applied to models consisting of systems of ordinary differential equations. While this model type is also commonly used in biology, for instance in biochemical network modeling or epidemiology and ecology, there are many biological systems that are more suitably modeled in other ways. Boolean network models provide a way to encode regulatory rules in networks that can be used to capture qualitative properties of biological networks, when it is unfeasible or unnecessary to determine kinetic information. While they are intuitive to build, they have the drawback that there is very little mathematical theory available that can be used for model analysis, beyond simulation approaches. And for large networks, simulation quickly becomes ineffective.

The results in this paper, building on those in [24], can be considered as a contribution to a mathematical control theory for Boolean networks, incorporating key features of biological networks. There are many open problems that remain, and we hope that this work will inspire additional developments.

Our concrete contributions here are as follows. The modularization method makes the control search far more efficient and allows us to combine controls at the module level obtained with different control methods. For example, methods based on computational algebra [37, 39] can identify controllers that can create new (desired) steady states, which other methods cannot. Feedback vertex set [14, 13] is a structure-based method that identifies a subset of nodes whose removal makes the graph acyclic. Stable motifs [11] are based on identifying strongly connected subgraphs in the extended graph representation of the Boolean network. Other control methods include [47, 48, 25]. We can use any combination of these methods to identify the controls in each module.

7 Acknowledgments

Author Matthew Wheeler was supported by The American Association of Immunologists through an Intersect Fellowship for Computational Scientists and Immunologists. This work was further supported by the Simons foundation [grant numbers 712537 (to C.K.), 850896 (to D.M.), 516088 (to A.V.)]; the American Mathematical Society and the Simons Foundation [Enhancement Grant for PUI faculty (to A.V.)]; the National Institute of Health [grant number 1 R01 HL169974-01 (to R.L.)]; and the Defense Advanced Research Projects Agency [grant number HR00112220038 (to R.L.)]. The authors also thank the Banff International Research Station for support through its Focused Research Group program during the week of May 29, 2022 (22frg001), which was of great help in framing initial ideas of this paper.

References

  • [1] Boris Aguilar, David L Gibbs, David J Reiss, Mark McConnell, Samuel A Danziger, Andrew Dervan, Matthew Trotter, Douglas Bassett, Robert Hershberg, Alexander V Ratushny, et al. A generalizable data-driven multicellular model of pancreatic ductal adenocarcinoma. GigaScience, 9(7):giaa075, 2020.
  • [2] Daniel Plaugher and David Murrugarra. Modeling the pancreatic cancer microenvironment in search of control targets. Bulletin of Mathematical Biology, 83(11):1–26, 2021.
  • [3] Jordan Rozum and Réka Albert. Leveraging network structure in nonlinear control. NPJ systems biology and applications, 8(1):36, 2022.
  • [4] Daniel Plaugher and David Murrugarra. Phenotype control techniques for boolean gene regulatory networks. Bulletin of Mathematical Biology, 85(10):1–36, 2023.
  • [5] Julian D Schwab, Silke D Kühlwein, Nensi Ikonomi, Michael Kühl, and Hans A Kestler. Concepts in boolean network modeling: What do they all mean? Computational and structural biotechnology journal, 18:571–582, 2020.
  • [6] Alan Veliz-Cuba, Joseph Arthur, Laura Hochstetler, Victoria Klomps, and Erikka Korpi. On the relationship of steady states of continuous and discrete models arising from biology. Bulletin of mathematical biology, 74:2779–2792, 2012.
  • [7] Vidisha Singh, Aurelien Naldi, Sylvain Soliman, and Anna Niarakis. A large-scale boolean model of the rheumatoid arthritis fibroblast-like synoviocytes predicts drug synergies in the arthritic joint. NPJ systems biology and applications, 9, 2023.
  • [8] Sara Sadat Aghamiri, Vidisha Singh, Aurélien Naldi, Tomáš Helikar, Sylvain Soliman, and Anna Niarakis. Automated inference of boolean models from molecular interaction maps using casq. Bioinformatics, 36(16):4473–4482, 2020.
  • [9] A. Veliz-Cuba. Reduction of Boolean network models. Journal of Theoretical Biology, 289:167–172, 2011.
  • [10] Assieh Saadatpour, Réka Albert, and Timothy Reluga. A reduction method for boolean network models proven to conserve attractors. SIAM Journal on Applied Dynamical Systems, 12:1997–2011, 01 2013.
  • [11] Jorge GT Zanudo and Réka Albert. Cell fate reprogramming by control of intracellular network dynamics. PLoS computational biology, 11(4):e1004193, 2015.
  • [12] Jordan C Rozum, Dávid Deritei, Kyu Hyong Park, Jorge Gómez Tejeda Zañudo, and Réka Albert. pystablemotifs: Python library for attractor identification and control in boolean networks. Bioinformatics, 38(5):1465–1466, 2022.
  • [13] Jorge Gomez Tejeda Zañudo, Gang Yang, and Réka Albert. Structure-based control of complex networks with nonlinear dynamics. Proceedings of the National Academy of Sciences, 114(28):7234–7239, 2017.
  • [14] Atsushi Mochizuki, Bernold Fiedler, Gen Kurosawa, and Daisuke Saito. Dynamics and control at feedback vertex sets. ii: A faithful monitor to determine the diversity of molecular activities in regulatory networks. Journal of theoretical biology, 335:130–146, 2013.
  • [15] Laura Cifuentes Fontanals, Elisa Tonello, and Heike Siebert. Control strategy identification via trap spaces in boolean networks. In Computational Methods in Systems Biology: 18th International Conference, CMSB 2020, Konstanz, Germany, September 23–25, 2020, Proceedings 18, pages 159–175. Springer, 2020.
  • [16] Van-Giang Trinh, Kunihiko Hiraishi, and Belaid Benhamou. Computing attractors of large-scale asynchronous boolean networks using minimal trap spaces. In Proceedings of the 13th ACM International conference on bioinformatics, computational biology and health informatics, pages 1–10, 2022.
  • [17] Laura Cifuentes-Fontanals, Elisa Tonello, and Heike Siebert. Control in boolean networks with model checking. Frontiers in Applied Mathematics and Statistics, 8:838546, 2022.
  • [18] Roland Kaminski, Torsten Schaub, Anne Siegel, and Santiago Videla. Minimal intervention strategies in logical signaling networks with asp. Theory and Practice of Logic Programming, 13(4-5):675–690, 2013.
  • [19] Regina Samaga, Axel Von Kamp, and Steffen Klamt. Computing combinatorial intervention strategies and failure modes in signaling networks. Journal of Computational Biology, 17(1):39–53, 2010.
  • [20] Gang Wu, Lisha Zhu, Jennifer E Dent, and Christine Nardini. A comprehensive molecular interaction map for rheumatoid arthritis. PLoS One, 5(4):e10137, 2010.
  • [21] Abdul Salam Jarrah, Reinhard Laubenbacher, and Alan Veliz-Cuba. The dynamics of conjunctive and disjunctive boolean network models. Bulletin of mathematical biology, 72:1425–1447, 2010.
  • [22] Jorge GT Zañudo and Réka Albert. An effective network reduction approach to find the dynamical repertoire of discrete dynamic networks. Chaos: An Interdisciplinary Journal of Nonlinear Science, 23(2), 2013.
  • [23] Hannes Klarner, Alexander Bockmayr, and Heike Siebert. Computing maximal and minimal trap spaces of boolean networks. Natural Computing, 14:535–544, 2015.
  • [24] Claus Kadelka, Matthew Wheeler, Alan Veliz-Cuba, David Murrugarra, and Reinhard Laubenbacher. Modularity of biological systems: a link between structure and function. Journal of the Royal Society Interface, 20(207):20230505, 2023.
  • [25] Enrico Borriello and Bryan C Daniels. The basis of easy controllability in boolean networks. Nature communications, 12(1):1–15, 2021.
  • [26] Nadav Kashtan and Uri Alon. Spontaneous evolution of modularity and network motifs. Proceedings of the National Academy of Sciences, 102(39):13773–13778, 2005.
  • [27] Leland H Hartwell, John J Hopfield, Stanislas Leibler, and Andrew W Murray. From molecular to modular cell biology. Nature, 402(Suppl 6761):C47–C52, 1999.
  • [28] Hiroaki Kitano. Biological robustness. Nature Reviews Genetics, 5(11):826–837, 2004.
  • [29] Dirk M Lorenz, Alice Jeng, and Michael W Deem. The emergence of modularity in biological systems. Physics of life reviews, 8(2):129–160, 2011.
  • [30] Claus Kadelka, Taras-Michael Butrie, Evan Hilton, Jack Kinseth, Addison Schmidt, and Haris Serdarevic. A meta-analysis of boolean network models reveals design principles of gene regulatory networks. Science Advances, 10(2):eadj0822, 2024.
  • [31] Assieh Saadatpour, Rui-Sheng Wang, Aijun Liao, Xin Liu, Thomas P Loughran, István Albert, and Réka Albert. Dynamical and structural analysis of a t cell survival network identifies novel candidate therapeutic targets for large granular lymphocyte leukemia. PLoS Comput Biol, 7(11):e1002267, Nov 2011.
  • [32] Conrad Hal Waddington. The strategy of the genes. Routledge, 2014.
  • [33] S A Kauffman. Metabolic stability and epigenesis in randomly constructed genetic nets. J Theor Biol, 22(3):437–67, Mar 1969.
  • [34] Daniel Plaugher, Boris Aguilar, and David Murrugarra. Uncovering potential interventions for pancreatic cancer patients via mathematical modeling. Journal of theoretical biology, 548:111197, 2022.
  • [35] Minsoo Choi, Jue Shi, Sung Hoon Jung, Xi Chen, and Kwang-Hyun Cho. Attractor landscape analysis reveals feedback loops in the p53 network that control the cellular response to dna damage. Science signaling, 5(251):ra83–ra83, 2012.
  • [36] David J Wooten, Jorge Gómez Tejeda Zañudo, David Murrugarra, Austin M Perry, Anna Dongari-Bagtzoglou, Reinhard Laubenbacher, Clarissa J Nobile, and Réka Albert. Mathematical modeling of the candida albicans yeast to hyphal transition reveals novel control strategies. PLoS computational biology, 17(3):e1008690, 2021.
  • [37] David Murrugarra, Alan Veliz-Cuba, Boris Aguilar, and Reinhard Laubenbacher. Identification of control targets in boolean molecular network models via computational algebra. BMC systems biology, 10:1–11, 2016.
  • [38] D Murrugarra and ES Dimitrova. Molecular network control through boolean canalization. eurasip j. Bioinformatics Syst. Biol, 9, 2015.
  • [39] Luis Sordo Vieira, Reinhard C Laubenbacher, and David Murrugarra. Control of intracellular molecular networks using algebraic methods. Bulletin of mathematical biology, 82(1):2, 2020.
  • [40] Elena S Dimitrova, Adam C Knapp, Brandilyn Stigler, and Michael E Stillman. Cyclone: open-source package for simulation and analysis of finite dynamical systems. Bioinformatics, 39(11):btad634, 10 2023.
  • [41] Qijun He and Matthew Macauley. Stratification and enumeration of boolean functions by canalizing depth. Physica D: Nonlinear Phenomena, 314:1–8, 2016.
  • [42] Lori Layne, Elena S Dimitrova, and Matthew Macauley. Nested canalyzing depth and network stability. Bulletin of Mathematical Biology, 74(2):422–433, 2012.
  • [43] Claus Kadelka, Jack Kuipers, and Reinhard Laubenbacher. The influence of canalization on the robustness of boolean networks. Physica D: Nonlinear Phenomena, 353:39–47, 2017.
  • [44] Elena Dimitrova, Brandilyn Stigler, Claus Kadelka, and David Murrugarra. Revealing the canalizing structure of boolean functions: Algorithms and applications. Automatica, 146:110630, 2022.
  • [45] Daniel Plaugher and David Murrugarra. Pancreatic cancer mutationscape: revealing the link between modular restructuring and intervention efficacy amidst common mutations. bioRxiv, 2024.
  • [46] Anila Rashid, Mohammad Khurshid, and Arsalan Ahmed. T-cell large granular lymphocytic leukemia: 4 cases. Blood research, 49(3):203–205, 2014.
  • [47] Sang-Mok Choo, Byunghyun Ban, Jae Il Joo, and Kwang-Hyun Cho. The phenotype control kernel of a biomolecular regulatory network. BMC systems biology, 12(1):1–15, 2018.
  • [48] Laura Cifuentes-Fontanals, Elisa Tonello, and Heike Siebert. Control in boolean networks with model checking. Frontiers in Applied Mathematics and Statistics, 8, 2022.