PBMC's from a donor previously determined to recognize the DRB5*01:01 restricted CMV IE1211–225 epitope (Braendstrup et al. 2014 (link)) was expanded on this epitope. The cells were double-stained with PE-labeled wild-type IE1211–225 -DRB5*01:01 tetramer and APC-labeled mutant peptide-DRB5*01:01 tetramer as previously described (Braendstrup et al. 2013 (link)). The cells were washed and subsequently stained with anti-CD3-Pacific blue and anti-CD4-PerCP antibody (Biolegend, San Diego, USA) for 30 min. The stained cells were analyzed by flow cytometry on a Fortessa (BD Biosciences).
Characterizing Antigen-Specific T Cell Responses
Partial Protocol Preview
This section provides a glimpse into the protocol.
The remaining content is hidden due to licensing restrictions, but the full text is available at the following link:
Access Free Full Text.
Corresponding Organization : Technical University of Denmark
Other organizations : National University of General San Martín, La Jolla Institute For Allergy & Immunology, University of Copenhagen
Protocol cited in 6 other protocols
Variable analysis
- Wild-type IE1211-225 peptide
- P3 variant of the wild-type peptide
- P7 variant of the wild-type peptide
- Tetramer binding to PBMC's from a donor
- PBMC's from a donor previously determined to recognize the DRB5*01:01 restricted CMV IE1211–225 epitope
- Staining with PE-labeled wild-type IE1211–225 -DRB5*01:01 tetramer
- Staining with APC-labeled mutant peptide-DRB5*01:01 tetramer
- Staining with anti-CD3-Pacific blue and anti-CD4-PerCP antibodies
- PBMC's from a donor previously determined to recognize the DRB5*01:01 restricted CMV IE1211–225 epitope
- Not specified
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!