The largest database of trusted experimental protocols

2 protocols using anti 2b4

1

Characterization of Antigen-Specific T Cell Responses

Check if the same lab product or an alternative is used in the 5 most similar protocols
Flow cytometry and tetramer were performed as previously described55 (link). Briefly, single cell suspended splenocytes were incubated with gp33-tetramer and np396-tetramer for 15 minutes and gp-66 tetramer for 30 minutes at 37 °C. After the incubation, surface antibodies were added, including anti-CD8 or anti-CD4 along with anti-IL7R, anti-PD-1, anti-CD62L, anti-CD44, anti-KLRG-1, anti-TIM3, anti-Lag-3, and anti-2B4 antibodies (eBioscience) for 30 minutes at 4 °C. For intracellular cytokine stain single suspended splenocytes were incubated with the LCMV specific peptides gp33 and np396 or the MHC-II epitope gp61. After 1 h, Brefeldin A (eBioscience) was added, followed by an additional 5 h incubation at 37 °C. After surface stain with anti-CD8 or anti-CD4 antibodies (eBioscience) cells were fixed with 2% formalin and permeabilized with 0.1% Saponin and stained with anti-IFNγ and anti-TNF antibodies (eBioscience) for 30 min at 4 °C.
+ Open protocol
+ Expand
2

Splenocyte Phenotypic Analysis in Mice

Check if the same lab product or an alternative is used in the 5 most similar protocols
Three days after CLP, mice were sacrificed and spleens were harvested. Splenocytes were stained for CD3 (Biolegend), CD4 (BD), CD8 (Biolegend), CD44 (Biolegend), Thy1.1 (BD), anti-CD25, anti-69, anti-CD62L (all from Biolegend), and anti-BTLA, anti-2B4, anti-PD-1 and anti-Lag-3 (all from eBioscience) for phenotypic analysis. Accucheck Counting beads (Thermo Fisher Scientific) were added before data collecting to calculate the absolute number per spleen. Samples were analyzed on a LSRII flow cytometer (BD) and data were analyzed using FlowJo software (Tree Star, Ashland, OR, USA).
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!