-
1
-
-
26944451244
-
Application areas of AIS: Past, present and future
-
Proceedings of the 4th International Conference on Artificial Immune Systems ICARIS, Springer-Verlag
-
E. Hart and J. Timmis, "Application areas of AIS: Past, present and future," in Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS), ser. Lecture Notes in Computer Science, vol. 3627. Springer-Verlag, 2005, pp. 483-497.
-
(2005)
ser. Lecture Notes in Computer Science
, vol.3627
, pp. 483-497
-
-
Hart, E.1
Timmis, J.2
-
3
-
-
34547358884
-
-
M. Ayara, J. Timmis, R. de Lemos, L. N. de Castro, and R. Duncan, Negative selection: How to generate detectors, in Proceedings of the 1nd International Conference on Artificial Immune Systems (ICARIS). Unversity of Kent at Canterbury Printing Unit, 2002, pp. 89-98.
-
M. Ayara, J. Timmis, R. de Lemos, L. N. de Castro, and R. Duncan, "Negative selection: How to generate detectors," in Proceedings of the 1nd International Conference on Artificial Immune Systems (ICARIS). Unversity of Kent at Canterbury Printing Unit, 2002, pp. 89-98.
-
-
-
-
4
-
-
34547290312
-
An artificial immune system approach to preserving security in computer networks,
-
Master's thesis, Norges Teknisk-Naturvitenskapelige Universitet
-
M. T. Ranang, "An artificial immune system approach to preserving security in computer networks," Master's thesis, Norges Teknisk-Naturvitenskapelige Universitet, 2002.
-
(2002)
-
-
Ranang, M.T.1
-
5
-
-
0027961889
-
Self-nonself discrimination in a computer
-
IEEE Computer Society Press
-
S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri, "Self-nonself discrimination in a computer," in Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, 1994.
-
(1994)
Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
6
-
-
0027532161
-
Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination
-
J. K. Percus, O. E. Percus, and A. S. Perelson, "Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination," Proceedings of National Academy of Sciences USA, vol. 90, pp. 1691-1695, 1993.
-
(1993)
Proceedings of National Academy of Sciences USA
, vol.90
, pp. 1691-1695
-
-
Percus, J.K.1
Percus, O.E.2
Perelson, A.S.3
-
8
-
-
0742300833
-
Discriminative power of the receptors activated by k-contiguous bits rule
-
S. T. Wierzchoń, "Discriminative power of the receptors activated by k-contiguous bits rule," Journal of Computer Science and Technology, vol. 1, no. 3, pp. 1-13, 2000.
-
(2000)
Journal of Computer Science and Technology
, vol.1
, Issue.3
, pp. 1-13
-
-
Wierzchoń, S.T.1
-
9
-
-
3543128182
-
Coverage and generalization in an artificial immune system
-
New York: Morgan Kaufmann Publishers, 9-13 July
-
J. Balthrop, F. Esponda, S. Forrest, and M. Glickman, "Coverage and generalization in an artificial immune system," in GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference. New York: Morgan Kaufmann Publishers, 9-13 July 2002, pp. 3-10.
-
(2002)
GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference
, pp. 3-10
-
-
Balthrop, J.1
Esponda, F.2
Forrest, S.3
Glickman, M.4
-
10
-
-
27144451393
-
On the appropriateness of negative selection defined over hamming shape-space as a network intrusion detection system
-
IEEE Press
-
T. Stibor, J. Timmis, and C. Eckert, "On the appropriateness of negative selection defined over hamming shape-space as a network intrusion detection system," in Congress On Evolutionary Computation - CEC 2005. IEEE Press, 2005, pp. 995-1002.
-
(2005)
Congress On Evolutionary Computation - CEC 2005
, pp. 995-1002
-
-
Stibor, T.1
Timmis, J.2
Eckert, C.3
-
11
-
-
0004116989
-
-
2nd ed. MIT Press
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 2nd ed. MIT Press, 2002.
-
(2002)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
13
-
-
84918983692
-
A machine-oriented logic based on the resolution principle
-
January
-
J. A. Robinson, "A machine-oriented logic based on the resolution principle," Journal of the Association for Computing Machinery (JACM), vol. 12, no. 1, pp. 23-41, January 1965.
-
(1965)
Journal of the Association for Computing Machinery (JACM)
, vol.12
, Issue.1
, pp. 23-41
-
-
Robinson, J.A.1
-
14
-
-
34547330083
-
-
E. Welzl, Boolean satisfiability -combinatorics and algorithms, 2005, lecture Notes (http://www.inf.ethz.ch/~emo/SmallPieces/ SAT.ps).
-
E. Welzl, "Boolean satisfiability -combinatorics and algorithms," 2005, lecture Notes (http://www.inf.ethz.ch/~emo/SmallPieces/ SAT.ps).
-
-
-
-
15
-
-
10044219900
-
An improved deterministic local search algorithm for 3-SAT
-
T. Brueggemann and W. Kern, "An improved deterministic local search algorithm for 3-SAT," Theoretical Computer Science, vol. 329, no. 1-3, pp. 303-313, 2004.
-
(2004)
Theoretical Computer Science
, vol.329
, Issue.1-3
, pp. 303-313
-
-
Brueggemann, T.1
Kern, W.2
-
16
-
-
84937417239
-
A probabilistic 3-SAT algorithm further improved
-
19th Annual Symposium on Theoretical Aspects of Computer Science STACS, Springer-Verlag
-
T. Hofmeister, U. Schöning, R. Schuler, and O. Watanabe, "A probabilistic 3-SAT algorithm further improved," in 19th Annual Symposium on Theoretical Aspects of Computer Science (STACS), ser. Lecture Notes in Computer Science, vol. 2285. Springer-Verlag, 2002, pp. 192-202.
-
(2002)
ser. Lecture Notes in Computer Science
, vol.2285
, pp. 192-202
-
-
Hofmeister, T.1
Schöning, U.2
Schuler, R.3
Watanabe, O.4
-
17
-
-
0033331493
-
A probabilistic algorithm for k-SAT and constraint satisfaction problems
-
IEEE Press
-
U. Schöning, "A probabilistic algorithm for k-SAT and constraint satisfaction problems," in 40th Annual Symposium on Foundations of Computer Science (FOCS). IEEE Press, 1999, pp. 410-414.
-
(1999)
40th Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 410-414
-
-
Schöning, U.1
-
18
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis, and implications
-
IEEE Computer Society. IEEE Computer Society Press, May
-
P. D'haeseleer, S. Forrest, and P. Helman, "An immunological approach to change detection: algorithms, analysis, and implications," in Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society. IEEE Computer Society Press, May 1996, pp. 110-119.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy
, pp. 110-119
-
-
D'haeseleer, P.1
Forrest, S.2
Helman, P.3
-
19
-
-
84868256861
-
Generating optimal repertoire of antibody strings in an artificial immune system
-
Springer Verlag
-
S. T. Wierzchoń, "Generating optimal repertoire of antibody strings in an artificial immune system," in Intelligent Information Systems. Springer Verlag, 2000, pp. 119-133.
-
(2000)
Intelligent Information Systems
, pp. 119-133
-
-
Wierzchoń, S.T.1
|