The application of antigenic search techniques to time series forecasting
暂无分享,去创建一个
Tony White | Ian Nunn | T. White | I. Nunn
[1] Derek J. Smith,et al. The cross-reactive immune response: analysis, modeling, and application to vaccine design , 1997 .
[2] Stephanie Forrest,et al. Operating system stability and security through process homeostasis , 2002 .
[3] Derek J. Smith,et al. Immunological Memory is Associative , 1998 .
[4] Philip K. Chan,et al. Learning rules for time series anomaly detection , 2005 .
[5] Jens Timmer,et al. Handbook of Time Series Analysis , 2006 .
[6] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] Chia-Feng Juang,et al. A hybrid of genetic algorithm and particle swarm optimization for recurrent network design , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[8] Dipankar Dasgupta,et al. Tool Breakage Detection in Milling Operations using a Negative-Selection Algorithm , 1995 .
[9] Dipankar Dasgupta,et al. Novelty detection in time series data using ideas from immunology , 1996 .
[10] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[11] D. S. G. Pollock,et al. A handbook of time-series analysis, signal processing and dynamics , 1999 .
[12] Jerne Nk. Towards a network theory of the immune system. , 1974 .
[13] Jonathan Timmis,et al. Artificial Immune Recognition System (AIRS): An Immune-Inspired Supervised Learning Algorithm , 2004, Genetic Programming and Evolvable Machines.
[14] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[15] G. Weisbuch,et al. Immunology for physicists , 1997 .
[16] Jonathan Timmis,et al. Artificial immune systems - a new computational intelligence paradigm , 2002 .
[17] Leandro Nunes de Castro,et al. Artificial Immune Systems: A New Computational Approach , 2002 .
[18] Mauro Birattari,et al. Swarm Intelligence , 2012, Lecture Notes in Computer Science.
[19] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[20] N K Jerne,et al. Towards a network theory of the immune system. , 1973, Annales d'immunologie.