-
1
-
-
20544464593
-
Rigorous location of phase transitions in hard optimization problems
-
Achlioptas D, Naor A, Peres Y (2005) Rigorous location of phase transitions in hard optimization problems. Nature 435:759-764
-
(2005)
Nature
, vol.435
, pp. 759-764
-
-
Achlioptas, D.1
Naor, A.2
Peres, Y.3
-
2
-
-
1442290852
-
Negative selection: How to generate detectors
-
In: University of Kent at Canterbury Printing Unit
-
Ayara M, Timmis J, de Lemos R, de Castro LN, Duncan R (2002) Negative selection: How to generate detectors. In: Proceedings of the 1nd International Conference on Artificial Immune Systems (ICARIS), pp 89-98. University of Kent at Canterbury Printing Unit
-
(2002)
Proceedings of the 1nd International Conference on Artificial Immune Systems (ICARIS)
, pp. 89-98
-
-
Ayara, M.1
Timmis, J.2
de Lemos, R.3
de Castro, L.N.4
Duncan, R.5
-
5
-
-
10044219900
-
An improved deterministic local search algorithm for 3-SAT
-
Brueggemann T, Kern W (2004) An improved deterministic local search algorithm for 3-SAT. Theoretical Computer Science 329(1-3):303-313
-
(2004)
Theoretical Computer Science
, vol.329
, Issue.1-3
, pp. 303-313
-
-
Brueggemann, T.1
Kern, W.2
-
6
-
-
0004116989
-
-
2nd edn. MIT Press, Cambridge
-
Cormen TH, Leiserson CE, Rivest RL, Stein C (2002) Introduction to algorithms, 2nd edn. MIT Press, Cambridge
-
(2002)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
10
-
-
84881072062
-
A computing procedure for quantification theory
-
Davis M, Putnam H (1960) A computing procedure for quantification theory. Journal of the ACM (JACM) 7(3):201-215
-
(1960)
Journal of the ACM (JACM)
, vol.7
, Issue.3
, pp. 201-215
-
-
Davis, M.1
Putnam, H.2
-
13
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis, and implications
-
In: IEEE Computer Society Press
-
D'haeseleer P, Forrest S, Helman P (1996) An immunological approach to change detection: Algorithms, analysis, and implications. In: Proceedings of the Symposium on Research in Security and Privacy, pp 110-119. IEEE Computer Society Press
-
(1996)
Proceedings of the Symposium on Research in Security and Privacy
, pp. 110-119
-
-
D'haeseleer, P.1
Forrest, S.2
Helman, P.3
-
15
-
-
33751021639
-
The crossover closure and partial match detection
-
In: Springer-Verlag, NY
-
Esponda F, Forrest S, Helman P (2003) The crossover closure and partial match detection. In: Proceedings of the 2nd international conference on artificial immune systems (ICARIS), Lecture Notes in Computer Science, vol 2787. Springer-Verlag, NY, pp 249-260
-
(2003)
Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS), Lecture Notes in Computer Science
, vol.2787
, pp. 249-260
-
-
Esponda, F.1
Forrest, S.2
Helman, P.3
-
18
-
-
0030107173
-
Hard random 3-SAT problems and the Davis-Putnam procedure
-
Freeman JW (1996) Hard random 3-SAT problems and the Davis-Putnam procedure. Artificial Intelligence 81(1-2):183-198
-
(1996)
Artificial Intelligence
, vol.81
, Issue.1-2
, pp. 183-198
-
-
Freeman, J.W.1
-
19
-
-
35248846129
-
Revisiting the foundations of artificial immune systems: A problem-oriented perspective
-
In: Springer-Verlag, NY
-
Freitas AA, Timmis J (2003) Revisiting the foundations of artificial immune systems: A problem-oriented perspective. In: Proceedings of the 2nd international conference on artificial immune systems (ICARIS), Lecture Notes in Computer Science, vol 2787. Springer-Verlag, NY, pp 229-241
-
(2003)
Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS), Lecture Notes in Computer Science
, vol.2787
, pp. 229-241
-
-
Freitas, A.A.1
Timmis, J.2
-
21
-
-
21244441082
-
A machine learning evaluation of an artificial immune system
-
Glickman M, Balthrop J, Forrest S (2005) A machine learning evaluation of an artificial immune system. Evolutionary Computation 13(2):179-212
-
(2005)
Evolutionary Computation
, vol.13
, Issue.2
, pp. 179-212
-
-
Glickman, M.1
Balthrop, J.2
Forrest, S.3
-
22
-
-
35248820180
-
The effect of binary matching rules in negative selection
-
In: Springer-Verlag, Chicago
-
González F, Dasgupta D, Gómez J (2003) The effect of binary matching rules in negative selection. In: Genetic and evolutionary computation - GECCO. Lecture Notes in Computer Science, vol 2723. Springer-Verlag, Chicago, pp 195-206
-
(2003)
Genetic and Evolutionary Computation - GECCO. Lecture Notes in Computer Science
, vol.2723
, pp. 195-206
-
-
González, F.1
Dasgupta, D.2
Gómez, J.3
-
23
-
-
84937417239
-
A probabilistic 3-SAT algorithm further improved. In: 19th Annual symposium on theoretical aspects of computer science (STACS)
-
Springer-Verlag, NY
-
Hofmeister T, Schöning U, Schuler R, Watanabe O (2002) A probabilistic 3-SAT algorithm further improved. In: 19th Annual symposium on theoretical aspects of computer science (STACS), Lecture Notes in Computer Science, vol 2285. Springer-Verlag, NY, pp 192-202
-
(2002)
Lecture Notes in Computer Science
, vol.2285
, pp. 192-202
-
-
Hofmeister, T.1
Schöning, U.2
Schuler, R.3
Watanabe, O.4
-
24
-
-
0003496659
-
An immunological model of distributed detection and its application to computer security
-
Ph.D. thesis, University of New Mexico, Albuquerque, NM
-
Hofmeyr SA (1999) An immunological model of distributed detection and its application to computer security. Ph.D. thesis, University of New Mexico, Albuquerque, NM
-
(1999)
-
-
Hofmeyr, S.A.1
-
26
-
-
0043080078
-
How good are branching rules in DPLL
-
Ouyang M (1998) How good are branching rules in DPLL. Discrete Applied Mathematics 89(1-3):281-286
-
(1998)
Discrete Applied Mathematics
, vol.89
, Issue.1-3
, pp. 281-286
-
-
Ouyang, M.1
-
27
-
-
0027532161
-
Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination
-
Percus JK, Percus OE, Perelson AS (1993) Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination. Proc Natl Acad Sci USA 90:1691-1695
-
(1993)
Proc Natl Acad Sci USA
, vol.90
, pp. 1691-1695
-
-
Percus, J.K.1
Percus, O.E.2
Perelson, A.S.3
-
28
-
-
34547290312
-
An artificial immune system approach to preserving security in computer networks
-
Master's thesis, Norges Teknisk-Naturvitenskapelige Universitet
-
Ranang MT (2002) An artificial immune system approach to preserving security in computer networks. Master's thesis, Norges Teknisk-Naturvitenskapelige Universitet
-
(2002)
-
-
Ranang, M.T.1
-
30
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
Schölkopf B, Platt JC, Shawe-Taylor J, Smola AJ, Williamson RC (2001) Estimating the support of a high-dimensional distribution. Neural Computation 13(7):1443-1471
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
32
-
-
1442339891
-
Anomaly detection using negative selection based on the r-contiguous matching rule
-
In: Unversity of Kent at Canterbury Printing Unit
-
Singh S (2002) Anomaly detection using negative selection based on the r -contiguous matching rule. In: Proceedings of the 1st international conference on artificial immune systems (ICARIS). Unversity of Kent at Canterbury Printing Unit, pp 99-106
-
(2002)
Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS)
, pp. 99-106
-
-
Singh, S.1
-
34
-
-
33750986457
-
Generalization regions in hamming negative selection
-
In: Springer-Verlag, Germany
-
Stibor T, Timmis J, Eckert C (2006a) Generalization regions in hamming negative selection. In: Intelligent information processing and web mining, advances in soft computing. Springer-Verlag, Germany, pp 447-456
-
(2006)
Intelligent Information Processing and Web Mining, Advances in Soft Computing
, pp. 447-456
-
-
Stibor, T.1
Timmis, J.2
Eckert, C.3
-
35
-
-
34547258581
-
The link between r-contiguous detectors and k-CNF satisfiability
-
In: IEEE Press, New York, USA
-
Stibor T, Timmis J, Eckert C (2006b) The link between r -contiguous detectors and k -CNF satisfiability. In: Proceedings of congress on evolutionary computation (CEC). IEEE Press, New York, USA, pp 491-498
-
(2006)
Proceedings of Congress on Evolutionary Computation (CEC)
, pp. 491-498
-
-
Stibor, T.1
Timmis, J.2
Eckert, C.3
-
38
-
-
35248825596
-
An investigation of the negative selection algorithm for fault detection in refrigeration systems
-
In: Springer-Verlag, NY
-
Taylor DW, Corne DW (2003) An investigation of the negative selection algorithm for fault detection in refrigeration systems. In: Proceedings of the 2nd international conference on artificial immune systems (ICARIS), Lecture Notes in Computer Science, vol 2787. Springer-Verlag, NY, pp 34-45
-
(2003)
Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS), Lecture Notes in Computer Science
, vol.2787
, pp. 34-45
-
-
Taylor, D.W.1
Corne, D.W.2
-
40
-
-
44649136276
-
Boolean satisfiability - Combinatorics and algorithms
-
Welzl E (2005) Boolean satisfiability - combinatorics and algorithms. Lecture Notes. http://www.inf.ethz.ch/~emo/SmallPieces/SAT.ps
-
(2005)
Lecture Notes
-
-
Welzl, E.1
-
41
-
-
84868256861
-
Generating optimal repertoire of antibody strings in an artificial immune system
-
In: Springer Verlag, NY
-
Wierzchoń ST (2000a) Generating optimal repertoire of antibody strings in an artificial immune system. In: Intelligent Information Systems. Springer Verlag, NY, pp 119-133
-
(2000)
Intelligent Information Systems
, pp. 119-133
-
-
Wierzchoń, S.T.1
-
42
-
-
0742300833
-
Discriminative power of the receptors activated by k-contiguous bits rule
-
Wierzchoń ST (2000b) Discriminative power of the receptors activated by k-contiguous bits rule. Journal of Computer Science and Technology 1(3):1-13
-
(2000)
Journal of Computer Science and Technology
, vol.1
, Issue.3
, pp. 1-13
-
-
Wierzchoń, S.T.1
|