Tolerance vs Intolerance: How Affinity Defines Topology in an Idiotypic Network

  • Emma Hart
  • Hugues Bersini
  • Francisco Santos
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4163)


Idiotypic network models of the immune system have long attracted interest in immunology as they offer a potential explanation for the maintenance of immunological memory. They also give a possible justification for the appearance of tolerance for a certain category of cells while maintaining immunization for the others. In this paper, we provide new evidence that the manner in which affinity is defined in an idiotypic network model imposes a definite topology on the connectivity of the potential idiotypic network that can emerge. The resulting topology is responsible for very different qualitative behaviour of the network. We show that using a 2D shape-space model with affinity based on complementary regions, a cluster-free topology results that clearly divides the space into tolerant and non-tolerant zones in which antigen are maintained or rejected respectively. On the other hand, using a 2D shape-space with an affinity function based on cell similarity, a highly clustered topology emerges in which there is no separation of the space into isolated tolerant and non-tolerant zones. Using a binary shape-space, both similar and complementary affinity measures also result in highly clustered networks. In the networks whose topologies exhibit high clustering, the tolerant and intolerant zones are so intertwined that the networks either reject all antigen or tolerate all antigen.


Potential Site Antibody Cell Shape Space Immune Network Nobel Lecture 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Barabasi, L.A., Albert, A.: Emergence of scaling in random network. Science 286, 509–512 (1999)CrossRefMathSciNetGoogle Scholar
  2. 2.
    Bersini, H.: Self-assertion vs self-recogntion: A tribute to francisco varela. In: Proceedings of ICARIS 2002 (2002)Google Scholar
  3. 3.
    Bersini, H.: Revisiting idiotypic immune networks. In: Banzhaf, W., Ziegler, J., Christaller, T., Dittrich, P., Kim, J.T. (eds.) ECAL 2003. LNCS, vol. 2801, pp. 164–174. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Garret, S.: An epitope is not a paratope: Implications for immune network models and clonal selection. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 217–228. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Hart, E.: Not all balls are round: An investigation of alternative recognition-region shapes. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 29–42. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Hart, E., Ross, P.: The impact of the shape of antibody recognition regions on the emergence of idiotypic networks. International Journal of Unconventional Computing (2005)Google Scholar
  7. 7.
    Jerne, N.: The generative grammar of the immune system. Nobel Lecture, December 8, 1984, Chateau de Bellevue, France (1984)Google Scholar
  8. 8.
    Perelson, A.S.: Immune network theory. Immunological Reviews 10, 5–36 (1989)CrossRefGoogle Scholar
  9. 9.
    Sole, R.V., Pastor-Satorras, R., Smith, E., Kepler, T.: A model of large-scale proteome evolution. Adv. In Complex Systems 5, 43–54 (2002)zbMATHCrossRefGoogle Scholar
  10. 10.
    Timmis, J., Neal, M.: A resource limited artificial immune system for data analysis. Knowledge Based Systems 3-4, 121–130 (2001)CrossRefGoogle Scholar
  11. 11.
    Varela, F., Coutinho, A.: Second generation immune network. Immunology Today 12(5), 159–166 (1991)Google Scholar
  12. 12.
    Varela, F., Coutinho, A., Dupire, B., Vaz, N.: Cognitive Networks: Immune, Neural and Otherwise. Theoretical Immunology, Series on the Science of Complexity 2, 359–375 (1988)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Emma Hart
    • 1
  • Hugues Bersini
    • 2
  • Francisco Santos
    • 2
  1. 1.School of ComputingNapier University 
  2. 2.IRIDIAUniversite de Bruxelles 

Personalised recommendations