Guide to Using SIAM'S LaTeX Style

3 downloads 0 Views 193KB Size Report
The signaling games framework would propose that an ancestral sender .... bumblebee (Bombus lucorum, photo by BioLib.cz), carpenter bee (Xylocopa vir- .... D. H. Klatte, G. Schumann, J. D. Boeke, and T. L. Steck, “Skipper, an LTR retro-.
ORIGIN OF BIOMOLECULAR GAMES

Supplemental Material 1: Sender and receiver gene duplication. Sender genes may undergo duplication. Here, the unit of selection is the sender gene, but the selected phenotype is the signal. Likewise, receiver gene duplication could be viewed as involving action duplication and subsequent action neofunctionalization. Different models of gene duplication and acquisition of novel function, can therefore be framed as models of novel signal and action genesis (as in a Polya’s Urn Model for generating synonymous signals in an expanding message alphabet [1]). For example, Ohno’s model of gene duplication involves gene duplication followed by a period of drift in one gene duplicate, which may then eventually acquire a novel function by random mutation, or dysfunctionalization as a pseudogene [2]. This process can be viewed as sender gene duplication followed by signal drift by one gene duplicate, leading to the possible genesis of a novel signal by the sender (gene) duplicate. In contrast, the innovation, amplification, divergence (IAD) model of gene duplication proposes that the ancestral gene is bifunctional with a major function, and a minor side function [3], [4], [5]. In response to an environmental change, the ancestral gene’s amplification is favored in order to increase the minor functional activity, as a gene dosage effect. Then one of the gene duplicates may mutate to increase the activity of the minor function (usually at the expense of the major function). The signaling games framework would propose that an ancestral sender gene sends two signals, a major and a minor signal, each with its own receiver(s). After sender gene amplification, one gene duplicate may mutate so that the minor signal increases in intensity, at the expense of the major signal. There may be some relevance here regarding the evolution of human signals; Gambetta for instance proposes that novel signals originate as signs that are then sequestered for signaling purposes [6], a model consistent with genes that originate from so called ‘junk’ DNA [7], and also the occurence of ohnologs, which are paralogs that arise from whole genome duplications, such as p53/p63/p73 [8] and hemoglobin/myoglobin [9].

1

2

STEVEN E. MASSEY AND BUD MISHRA

Supplemental Material 2: Defining Deception. To understand why such undesirable outcomes arise in the form of deception, we call upon a theory of information-asymmetric signaling games to unify many of the adversarial use cases under a single framework, in particular when adversarial actions may be viewed mathematically as rational (i.e., utility-optimizing agents possessing common knowledge of rationality). The simplest model of signaling games involves two players. They are asymmetric in information and are called S, sender (informed), and R, receiver (uninformed). A key notion in this game is that of type, a random variable whose support is given by T (known to sender S). Also, we use πT (·) to denote probability distribution over T as a prior belief of R about the sender’s type. A round of game proceeds as follows: Player S learns t ∈ T ; S sends to R a signal s ∈ M ; and R takes an action a ∈ A. Their payoff/utility functions are known and depend on the type, signal, and action: ui : T × M × A → R : i ∈ {S, R}.

(1)

In this structure, the players’ behavior strategies can be described by the following two sets of probability distributions: (1) µ(·|t), t ∈ T, on M and (2) α(·|s), s ∈ M, on A. For S, the sender strategy µ is a probability distribution on signals given types; namely, µ(s|t) describes the probability that S with type t sends signal s. For R, the receiver strategy α is a probability distribution on actions given signals; namely, α(a|s) describes the probability that R takes action a following signal s. A pair of strategies µ and α is in Nash equilibrium if (and only if) they are mutually best responses (i.e., if each maximizes the expected utility given the other): X uS (t, s, a)πT (t)µ∗ (s|t)α(a|s) t∈T,s∈M,a∈A

X



(2)

uS (t, s, a)πT (t)µ(s|t)α(a|s)

t∈T,s∈M,a∈A

and X

uR (t, s, a)πT (t)µ(s|t)α∗ (a|s)

t∈T,s∈M,a∈A

(3)



X

uR (t, s, a)πT (t)µ(s|t)α(a|s)

t∈T,s∈M,a∈A

for any µ, α. It is straightforward to show that such a strategy profile (α∗ , µ∗ ) exists. We conjecture that the natural models for sender-receiver utility functions could be based on functions that combine information rates with distortion, as in rate distortion theory (RDT). For instance, assume that there are certain natural connections between the types and actions, as modeled by the functions fS and fR for the sender and receiver respectively: (4)

fS : T → A;

fR : A → T.

Then the utility functions for each consist of two weighted-additive terms, one measuring the mutual information with respect to the signals and the other measuring the undesirable distortion, where the weights are suitably chosen Lagrange constants uS = I(T, M ) − λS dS (fS (t), a), (5)

&

uR = I(A, M ) − λR dR (t, fR (a)),

where I denotes information and dR , dS denote measures of distortion.

ORIGIN OF BIOMOLECULAR GAMES

This definition also captures the notion of deception as follows. Note that the distribution of signals received by R is given by the probability distribution πM , where X (6) πM (s) = πT (t)µ(s|t), t∈T

and the distribution of actions produced by R is given by the probability distribution πA , where X (7) πA (a) = πM (s)α(a|s). s∈M

Clearly πT and πA are probability distributions on T and A respectively. If π ˆT is the probability distribution on T induced by πA under the function fR , then (8)

π ˆT (·) := πA (fR−1 (·)).

A natural choice of measure for deception is given by the relative entropy between the probability distributions πT and π ˆT :

(9)

Deception := Rel. Entropy(ˆ πT |πT ) X π ˆT (t) . = π ˆT (t) log2 πT (t) t∈T

This definition describes deception from the point of view of the receiver. To get the notion of deception from the point of view of the sender, one needs to play the game several rounds. The equation implies that deception can be both defined as the sending of misleading information, or the witholding of information, both in order to manipulate the receiver. The Shapley value describes the distribution of utility to different players in a cooperative game. In a signaling game where deception occurs the value is skewed towards the sender.

3

4

STEVEN E. MASSEY AND BUD MISHRA

Supplemental Material 3. Table S1: Examples of molecular deception by selfish elements Selfish element DNA transposons

Type of Deception Evidence that the ALP1 gene in plants was a transposon gene that initially evolved as a means of evading transposon silencing Insertion close to ORFs may be a mechanism to evade transposon silencing [10], [11] MITE elements may avoid transposon silencing due to their short length [12] [11], [13] Demethylation provides a mechanism to evade transposon transcriptional silencing [10]. The rice CACTA transposon produces a micro RNA that binds to the mRNA of a DNA methylation silencing gene [14], thus intercepting the host defensive signal. Arabidopsis thaliana Hi encodes VANC, which promotes DNA demethylation [15]. Maize Spm transposon encodes TrpA protein which catalyzes DNA demethylation [16]. Trans-duplication, the acquisition of host gene fragment by a mobile element, may be a mechanism of camouflage to avoid silencing [10]. Examples include Pack-MULE [17], CACTA [18] and helitron-like [19] elements in plants.

Retrotransposons

Frameshifting [20] The Evad plant retrotransposon cloaks its RNA with small proteins in order to avoid the RNA interference host defence [21] Evidence of selection for evasion of transcriptional silencing of primate retrotransposons SVA and L1 [22] and for evasion of the fungal repeat induced point mutation anti-TE mechanism by Gypsy-like retrotransposons [23] Plant Cassandra elements use a 5S rRNA sequence fragment as a promoter, tricking RNA polymerase III to transcribe the element [24]. Human Alu SINE elements do something similar, using a promoter derived from 7SL RNA [25] Stop codon readthrough is utilized in retrotransposon expression [26], [27], [28], [29], [30], [31] Frameshifting is utilized in expression of retrotransposons [32](a survey)

Bacterial insertion sequences

Homing endonucleases

Group I introns

Group II introns Inteins

B chromosomes Segregation distorters

Plasmids

60 % of human Alu SINE elements are present in introns [33]. Introns have lower levels of DNA methylation than exons [34], and so in this way Alu elements may avoid transcriptional silencing by DNA methylation Stop codon readthrough [35] Frameshifting [36](a survey) Homing endonucleases hide within Group I introns, which are phenotypically silent [37] Homing endonucleases introduce a double stranded break into the host genome, which is (mis) recognized by the DNA repair system and repaired by recombination, in the process incorporating a copy of the gene [38] Group I introns insert into intronless alleles, and excise themselves without affecting the mRNA. Preferentially target conserved regions of host proteins, decreasing chance of elimination [39], by conflating the identity of the conserved site Double strand break repair recombination machinery sequestered in order to integrate intron cDNA into recipient allele [40] Inteins target conserved protein coding sequences apparently in order to evade host defences [39], commonly in essential proteins [41] B chromosomes mimic sex chromosomes [42] Drosophila melanogaster Segregation Distorter (SD) is a modified form of RanGAP that deceives the intracellular transportation system, mislocalizing into the nucleus [43] where it promotes segregation distortion Maize knob repeat elements induce centromere-like neocentromeres leading to meiotic drive [44] Plasmid encoded antirestriction ArdA proteins mimic DNA in order to inhibit host encoded restriction enzymes [45]

ORIGIN OF BIOMOLECULAR GAMES

Supplemental Material 4: Allelic exclusion, identity and conflict. Allelic exclusion typically involves the assignment of identity, and consequently may become a focal point in genetic conflicts. In trypanosomes, it provides a mechanism to shift expression of antigenic cell surface proteins from time to time [46]. This periodic identity switching is a way of deceiving the host immune system into classifying the parasite as self. Systems for assigning identity at the molecular level, such as the immune system, appear to constitute a form of kin recognition, which proposes that identity tags are used to promote altruistic behavior amongst related individuals [47]. In multicellular organisms this behavior would promote cooperation between cells, and guard against non-self infiltrators. However, cancer cells are technically ‘kin,’ but when detected by the immune system are recognized as non-self. This mechanism would suggest an analogy with human social mechanisms that assign identity to cooperating in-groups, and non-cooperating out-groups. In the Brassicaceae higher plants, allelic exclusion also functions in identity, in the mechanism of self-incompatibility at the S -locus. Self-incompatibility is a mechanism of preventing self-fertilization in hermaphroditic plants. Here, the SP11 allele of dominant S -haplotypes is expressed, while that of recessive S -haplotypes is repressed by a small RNA expressed from the dominant S -haplotype locus, which acts in trans to induce methylation of the recessive S -haplotype locus [48]. This strategy implies that only the SP11 protein encoded by the dominant S haplotype is incorporated into the pollen coat. A corresponding receptor encoded by the same S -haplotype in the pistil results in incompatibility. A dominantrecessive system results in a reduction in the numbers of potential mates that are rejected, compared to a co-dominant system [49], [50]. Genetic conflict would be expected to occur within this system between the sporophyte and gametophyte due to differing reproductive needs [51], and so we hypothesize that some forms of molecular deception should be present.

5

6

STEVEN E. MASSEY AND BUD MISHRA

Supplemental Material 5. Figure 2 Image information (a) shows images (obtained from Encyclopedia of Life, eol.org, creative commons license CC BY-NC-SA 2.0) of a solitary wasp (Eumenes subpomiformis, photo by Valter Jacinto), social wasp (Vespula vulgaris, photo by Sean McCann), honey bee (Apis mellifera, photo by John Baker), hornet (Vespa crabo, photo by Biopix), bumblebee (Bombus lucorum, photo by BioLib.cz), carpenter bee (Xylocopa virginica, photo by Kent McFarland) and drone fly (Eristalis tenax, photo by Denis Doucet). (b) shows three dimensional Protein Data Bank (PDB) images of Escherichia coli phe-tRNA (3L0U), Streptococcus mutans release factor 1 (1ZBT), E.coli release factor 2 (1GQE), Thermus thermophilus ribosome recycling factor (1EH1), Acinetobacter baumannii elongation factor P (5J3B), TYMV tRNA-like structure (4P5J) and the E.coli 70S ribosome (4V4A).

ORIGIN OF BIOMOLECULAR GAMES

7

Supplemental Material 6: Cancer as a signaling game. Cancers appear to be initiated and maintained by a small population of tumor stem cells [52]. In normal tissue there is a feedback loop where healthy differentiated cells send signals to the stem cells, inhibiting their replication, until there is a need for proliferation and subsequent differentiation [53]. This mechanism represents a signaling convention between the differentiated cells (sender) and stem cells (receiver), justified by common interest between the two. However, mutations can cause the stem cells to escape this feedback loop by altering their response (i.e., action) to the inhibitory signals. In this scenario, the signaling convention is subverted and leads to the (short term) benefit of the stem cells through enhanced replication rates. However, eventually the convention breakdown will lead to punishment of both sender and receiver, through death of the animal. Punishment is a feature of social contracts [54], and likewise the differentiated cells and stem cells can be considered bound by a contract, which entails sanctioning when a player breaks the contract. There are further features of cancer which can be understood in terms of signaling games. Cell apoptosis is a mechanism to destroy aberrant cells and can be regarded as a means to remove a player from a molecular signaling game, if it is likely to break the signaling convention. Cancer cells have acquired the ability to escape this enforced retirement from the game, by a variety of mechanisms [55]. In addition, necroptosis is where an entire region of tissue undergoes programmed cell death, and can be seen as a way of removing cancer cells from the game, but at the cost of the removal of neighboring cells from the game as well, which assumes they are both in direct communication (to be players in a signaling game they must be communicating).

REFERENCES [1] S. B. Z. S. Alexander, J.M., “Non-cooperative games,” Dynamic Games and Applications, vol. 2, pp. 129–145, 2012. [2] S. Ohno, Evolution by gene duplication. New York: Springer, 1970. [3] H. Hendrickson, E. S. Slechta, U. Bergthorsson, D. I. Andersson, and J. R. Roth, “Amplification-mutagenesis: evidence that directed adaptive mutation and general hypermutability result from growth with a selected gene amplification,” PNAS USA, vol. 99, pp. 2164–2169, 2002. [4] M. Pilar Francino, “An adaptive radiation model for the origin of new gene functions,” Nat Genet, vol. 37, pp. 573–578, 2005. [5] C. T. Bergstrom, S. Szamado, and M. Lachmann, “Separating equilibria in continuous signaling games,” Phil Trans R Soc Lond B, vol. 357, pp. 1595–1606, 2002. [6] D. Gambetta, “Deceptive mimicry in humans.,” in Perspective on imitation: from cognitive neuoscience to social science. Vol II (S. Chater and N. Hurley, eds.), pp. 221–241, Cambridge: MIT Press, 2005. [7] A. McLysaght and D. Guerzoni, “New genes from non-coding sequence: the role of de novo protein-coding genes in eukaryotic evolutionary innovation,” Phil Trans R Soc B, vol. 370, p. 20140332, 2015. [8] P. P. Singh, S. Affeldt, I. Cascone, R. Selimoglu, J. Camonis, and H. Isambert, “On the expansion of ”dangerous” gene repertoires by whole-genome duplications in early vertebrates,” Cell, vol. 2, pp. 1387–1398, 2012. [9] J. Storz, “Gene duplication and evolutionary innovations in hemoglobin-oxygen transport,” Physiology, vol. 31, pp. 223–232, 2016. [10] D. Lisch, “Epigenetic regulation of transposon elements in plants,” Ann Rev Plant Biol, vol. 60, pp. 43–66, 2009. [11] D. Lisch and R. K. Slotkin, Strategies for silencing and escape: the ancient struggle between transposable elements and their hosts. Vol. 292, vol. 292. Burlington: Elsevier, international review of cell and molecular biology ed., 2011.

8

STEVEN E. MASSEY AND BUD MISHRA

[12] C. Feschotte and E. J. Pritham, “DNA transposons and the evolution of eukaryotic genomes,” Ann Rev Genet, vol. 41, pp. 331–368, 2007. [13] B. Yaakov, S. Ben-David, and K. Kashkush, “Genome-wide analysis of stowaway-like MITEs in wheat reveals high sequence conservation, gene association, and genomic diversification,” Plant Physiology, vol. 161, pp. 486–496, 2013. [14] M. Nosaka, J.-I. Itoh, Y. Nagato, A. Ono, and Y. Sato, “Role of transposon-derived small RNAs in the interplay between genomes and parasitic DNA in rice,” PLoS Genetics, vol. 8, p. e1002953, 2012. [15] Y. Fu, A. Kawabe, M. Etcheverry, T. Ito, A. Toyoda, V. Colot, Y. Tartani, and T. Kakutani, “Mobilization of a plant transposon by expression of the transposon-encoded anti-silencing factor.,” EMBO J, vol. 32, pp. 2407–2417, 2013. [16] M. Schlappi, D. Smith, and N. Fedoroff, “TnpA trans-activates methylated maize suppressormutator transposable elements in transgenic tobacco,” Genetics, vol. 133, pp. 1009–1021. [17] N. Jiang, Z. Bao, X. Zhang, S. R. Eddy, and S. R. Wessler, “Pack-MULE transposable elements elements mediate gene evolution in plants,” Nature, vol. 431, pp. 569–573, 2004. [18] S. Kawasaki and E. Nitasaka, “Characterization of Tpn1 family in the Japanese morning glory: En/Spm-related transposable elements capturing host genes,” Plant and Cell Physiology, vol. 45, pp. 933–944, 2004. [19] M. Morgante, S. Brunner, G. Pea, K. Fengler, A. Zuccolo, and A. Rafalski, “Gene duplication and exon shuffling by helitron-like transposons generate intraspecies diversity in maize,” Nature Genet, vol. 37, pp. 997–1002, 2005. [20] T. G. Doak, D. J. Witherspoon, C. L. Jahn, and G. Herrick, “Selection on the genes of Euplotes crassus Tec1 and Tec2 transposons: Evolutionary appearance of a programmed frameshift in a Tec2 gene encoding a tyrosine family site-specific recombinase,” Eukaryote Cell, vol. 2, pp. 95–102, 2003. [21] A. Mari-Ordonez, A. Marchais, M. Etcheverry, A. Martin, V. Colot, and O. Voinnet, “Reconstructing de novo silencing of an active plant retrotransposon,” Nature, vol. 45, pp. 1029– 1041, 2013. [22] F. M. Jacobs, D. Greenberg, N. Nguyen, M. Haeussler, A. D. Ewing, S. Katzman, B. Paten, S. R. Salama, and D. Haussler, “An evolutionary arms race between KRAB zinc-finger genes ZNF 91/93 and SVA/L1 retrotransposons,” Nature, vol. 516, pp. 242–245, 2014. [23] F. Horns, E. Petit, and M. E. Hood, “Massive expansion of Gypsy-like retrotransposons in Microbotryum fungi,” Genome Biol Evol, vol. 9, pp. 363–371, 2017. [24] R. Kalender, J. Tanskanen, W. Chang, K. Antonius, H. Sela, O. Peleg, and A. H. Schulman, “Cassandra retrotransposons carry independently transcribed 5S RNA,” PNAS USA, vol. 105, pp. 5833–05838, 2008. [25] S. A. Fuhrman, P. L. Deininger, P. LaPorte, T. Friedmann, and E. P. Geiduschek, “Analysis of transcription of the human Alu family ubiquitous repeating element by eukaryotic rna polymerase III,” Nuc Acids Res, vol. 9, pp. 6439–6456, 1981. [26] G. D. Matthews, T. J. D. Goodwin, M. I. Butler, T. A. Berryman, and R. T. M. Poulter, “pcal, a highly unusual Ty1/copia retrotransposon from the pathogenic yeast Candida albicans,” J Bacteriol, vol. 179, pp. 7118–7128, 1997. [27] P. Leng, D. H. Klatte, G. Schumann, J. D. Boeke, and T. L. Steck, “Skipper, an LTR retrotransposon of Dictyostelium,” Nuc Acids Res, vol. 26, pp. 2008–2015, 1998. [28] H. Ohtsubo, N. Kumekawa, and E. Ohtsubo, “RIRE2, a novel gypsy-type retrotransposon from rice,” Gene Genet Syst, vol. 74, pp. 83–91, 1999. [29] H. Abe et al., “Two novel Pao-like retrotransposons (Kamikaze and Yamato) from the silkworm species Bombyx mori and B.mandarina: common structural features of Pao-like elements,” Mol Genet Genomics, vol. 265, pp. 375–385, 2001. [30] E. R. Havecker and D. F. Voytas, “The soybean retroelement SIRE1 uses stop codon suppression to express its envelope-like protein,” EMBO Reports, vol. 4, pp. 274–277, 2003. [31] E. M. Forbes, S. R. Nieduszynska, F. K. Brunton, J. Gibson, L. A. GLover, and I. Stansfield, “Control of gag-pol gene expression in the Candida albicans retrotransposon Tca2,” BMC Molecular Biology, vol. 8, p. 94, 2007. [32] X. Gao, E. R. Havecker, P. V. Baranov, J. F. Atkins, and D. F. Voytas, “Translational recoding signals between gag and pol in diverse LTR retrotransposons,” RNA, vol. 9, pp. 1422–1430, 2003. [33] N. Sela, B. Mersch, N. Gal-Mark, G. Lev-Maor, A. Hotz-Wagenblatt, and G. Ast, “Comparative analysis of transposed element insertion within human and mouse genomes reveals Alu’s,” Genome Biol, vol. 8, p. R127, 2007. [34] R. K. Chodavarapu, S. Feng, Y. V. Bernatavichute, P.-y. Chen, H. Stround, Y. Yu, J. A. Hetzel, F. Kuo, J. Kim, S. J. Cokus, D. Casero, M. Bernal, P. Huijser, A. T. Clark, U. Kramer, S. S.

ORIGIN OF BIOMOLECULAR GAMES

[35]

[36] [37] [38] [39]

[40]

[41] [42]

[43] [44] [45]

[46] [47] [48] [49]

[50] [51] [52] [53] [54]

[55]

9

Merchant, X. Zhang, S. E. Jacobsen, and M. Pellegrini, “Relationship between nucleosome positioning and DNA methylation,” Nature, vol. 466, pp. 388–392, 2010. S. Schmitz-Esser, T. Penz, A. Spang, and M. Horn, “A bacterial genome in transition - an exceptional enrichment of IS elements but lack of evidence for recent transposition in the symbiont Amoebophilus asiaticus,” BMC Evol Biol, vol. 11, p. 270, 2011. M. Chandler and O. Fayet, “Translational frameshifting in the control of transposition in bacteria,” Mol Microbiol, vol. 7, pp. 497–503, 1993. M. Belfort and R. P. Bonocora, “Homing endonucleases: from genetic anomalies to programmable genomic clippers,” Methods Mol Biol, vol. 1123, pp. 1–26, 2014. M. Hafez and G. Hausner, “Homing endonucleases: DNA scissors on a mission,” Genome, vol. 55, pp. 553–569, 2012. K. S. Swithers, A. G. Senejani, G. P. Fournier, and J. P. Gogarten, “Conservation of intron and intein insertion sites: implications for life histories of parasitic genetic elements,” BMC Evol Biol, vol. 9, p. 303, 2009. R. Eskes, L. Liu, H. Ma, M. Y. Chao, L. Dickson, A. M. Lambowitz, and P. S. Perlman, “Multiple homing pathways used by yeast mitochondrial group II introns,” Mol Cell Biol, vol. 20, pp. 8432–8446, 2000. N. H. Shah and T. W. Muir, “Inteins: nature’s gift to protein chemists,” Chem Sci, vol. 5, pp. 446–461, 2014. M. I. Pigozzi and A. J. Solari, “Germ cell restriction and regular transmission of an accessor chromosome that mimics a sex body in the zebra finch, Taeiopygia guttata,” Chromosome Res, vol. 6, pp. 105–113, 1998. A. M. Larracuente and D. C. Presgraves, “The selfish segregation distorter gene complex of Drosophila melanogaster,” Genetics, vol. 192, pp. 33–53, 2012. W. J. Peacock, E. S. Dennis, M. M. Rhoades, and A. J. Pryor, “Highly repeated dna sequence limited to knob heterochromatin in maize,” Proc Natl Acad Sci USA, pp. 4490–4494, 1981. S. A. McMahon, G. A. Roberts, K. A. Johnson, L. P. Cooper, H. Liu, J. H. White, L. G. Carter, B. Sanghvi, M. Oke, M. D. Walkinshaw, G. W. Blakely, J. H. Naismith, and D. T. F. Dryden, “Extensive DNA mimicry by the ArdA anti-restriction protein and its role in the spread of antibiotic resistance,” Nuc Acids Res, vol. 37, pp. 4887–4897, 2009. L. Glover, S. Hutchinson, and S. Alsford, “VEX1 controls the allelic exclusion requirerd for antigenic variation in trypanosomes,” PNAS USA, vol. 113, pp. 7225–7230, 2016. W. Hamilton, “The genetical theory of social behaviour. ii,” J Theor Biol, vol. 7, pp. 17–52, 1964. Y. Tarutani and S. Takayama, “Monoallelic gene expression and its mechanisms,” Curr Opin Plant Biol, vol. 14, pp. 608–613, 2011. V. Llaurens, S. Billiard, V. Castric, and X. Vekemans, “Evolution of dominance in sporophytic self-incompatibility systems: I. genetic load and coevolution of levels of dominance in pollen and pistil,” Evolution, vol. 63, pp. 2427–2437, 2009. D. J. Schoen and J. W. Busch, “The evolution of dominance in sporophytic self-incompatibility systems. II. mate availability and recombination,” Evolution, vol. 63, pp. 2099–2113, 2009. D. Haig and A. Wilczek, “Sexual conflict and the alternation of haploid and diploid generations,” Phil Trans R Soc B, vol. 361, pp. 335–343, 2006. E. Battle and H. Clevers, “Cancer stem cells revisited,” Nat Med, vol. 23, pp. 1124–1134, 2017. T. H. Cheung and T. A. Rando, “Molecular regulation of stem cell quiescence,” Nat Rev Mol Cell Biol, vol. 14, pp. 329–340, 2013. K. Sigmund, C. Hauert, A. Traulsen, and H. De Silva, “Social control and the social contract: the emergence of sanctioning systems for collective action,” Dyn Games Appl, vol. 1, pp. 149–171, 2011. K. Fernando and M. Kurosawa, “Evading apoptosis in cancer,” Trends Cell Biol, vol. 23, pp. 620–633, 2013.