An Introduction to Artificial Immune Systems
暂无分享,去创建一个
[1] Jonathan Timmis,et al. Modelling the Tunability of Early T Cell Signalling Events , 2008, ICARIS.
[2] Paul S. Andrews,et al. Alternative Inspiration For Artificial Immune Systems: Exploiting Cohen’s Cognitive Immune Model , 2007 .
[3] Jonathan Timmis,et al. A resource limited artificial immune system for data analysis , 2001, Knowl. Based Syst..
[4] Jonathan Timmis,et al. A Computational Model of Degeneracy in a Lymph Node , 2006, ICARIS.
[5] Julie Greensmith,et al. Dendritic Cells for Anomaly Detection , 2006, 2006 IEEE International Conference on Evolutionary Computation.
[6] Mark James Neal,et al. Meta-stable Memory in an Artificial Immune Network , 2003, ICARIS.
[7] Julie Greensmith,et al. Articulation and Clarification of the Dendritic Cell Algorithm , 2006, ICARIS.
[8] Fabio A. González,et al. A comparative analysis of artificial immune network models , 2005, GECCO '05.
[9] Alex Alves Freitas,et al. WAIRS: improving classification accuracy by weighting attributes in the AIRS classifier , 2007, 2007 IEEE Congress on Evolutionary Computation.
[10] Jonathan Timmis,et al. "Going Back to our Roots": Second Generation Biocomputing , 2005, Int. J. Unconv. Comput..
[11] Julie Greensmith,et al. Two Ways to Grow Tissue for Artificial Immune Systems , 2005, ICARIS.
[12] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[13] Armando M. Leite da Silva,et al. A Gradient-Based Artificial Immune System Applied to Optimal Power Flow Problems , 2007, ICARIS.
[14] Iain Bate,et al. Applying artificial immune systems to real-time embedded systems , 2007, 2007 IEEE Congress on Evolutionary Computation.
[15] Jonathan Timmis,et al. On Immune Inspired Homeostasis for Electronic Systems , 2007, ICARIS.
[16] Julie Greensmith,et al. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.
[17] Jonathan Timmis,et al. Artificial Immune Recognition System (AIRS): An Immune-Inspired Supervised Learning Algorithm , 2004, Genetic Programming and Evolvable Machines.
[18] Jonathan Timmis,et al. Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation , 2003, GECCO.
[19] Hugues Bersini,et al. Immune System Modeling: The OO Way , 2006, ICARIS.
[20] Peter J. Bentley,et al. Immune Memory in the Dynamic Clonal Selection Algorithm , 2002 .
[21] Leandro Nunes de Castro,et al. aiNet: An Artificial Immune Network for Data Analysis , 2002 .
[22] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[23] Jonathan Timmis,et al. Adaptable Lymphocytes for Artificial Immune Systems , 2008, ICARIS.
[24] Alex Alves Freitas,et al. A Danger Theory Inspired Approach to Web Mining , 2003, ICARIS.
[25] Peter Ross,et al. Studies on the Implications of Shape-Space Models for Idiotypic Networks , 2004, ICARIS.
[26] Claudia Eckert,et al. Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.
[27] Jonathan Timmis,et al. Inspiration for the Next Generation of Artificial Immune Systems , 2005, ICARIS.
[28] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[29] Hugues Bersini,et al. Artificial Immune Systems: 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4-6, 2006, Proceedings (Lecture Notes in Computer Science) , 2006 .
[30] Jonathan Timmis,et al. An interdisciplinary perspective on artificial immune systems , 2008, Evol. Intell..
[31] P. Matzinger. The Danger Model: A Renewed Sense of Self , 2002, Science.
[32] Leandro Nunes de Castro,et al. Artificial Immune Systems: A New Computational Approach , 2002 .
[33] G. Weisbuch,et al. Immunology for physicists , 1997 .
[34] Emma Hart,et al. Analysis of a Growth Model for Idiotypic Networks , 2006, ICARIS.
[35] Gérard Weisbuch,et al. Control of the immune response , 1989 .
[36] G. Oster,et al. Theoretical studies of clonal selection: minimal antibody repertoire size and reliability of self-non-self discrimination. , 1979, Journal of theoretical biology.
[37] Rebecca Cann,et al. Going back to our roots , 2003, Nature.
[38] Riccardo Poli,et al. Genetic and Evolutionary Computation , 2006, Intelligenza Artificiale.
[39] Alan S. Perelson,et al. The immune system, adaptation, and machine learning , 1986 .
[40] Simon M. Garrett,et al. How Do We Evaluate Artificial Immune Systems? , 2005, Evolutionary Computation.
[41] P. Helman,et al. A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[42] Uwe Aickelin,et al. libtissue - implementing innate immunity , 2006, 2006 IEEE International Conference on Evolutionary Computation.
[43] Paul S. Andrews,et al. A Beginners Guide to Artificial Immune Systems , 2007 .
[44] Brian Henderson,et al. A Stochastic Model of the Interleukin (IL)-1 beta Network , 2008, ICARIS.
[45] Fabio A. González,et al. Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.
[46] Kendall Scott,et al. UML distilled - a brief guide to the Standard Object Modeling Language (2. ed.) , 2000, notThenot Addison-Wesley object technology series.
[47] Emma Hart,et al. Not All Balls Are Round: An Investigation of Alternative Recognition-Region Shapes , 2005, ICARIS.
[48] Fernando José Von Zuben,et al. A Hierarchical Immune Network Applied to Gene Expression Data , 2004, ICARIS.
[49] Andrew Hone,et al. Modelling a cytokine network (Special session: Foundations of Artificial Immune Systems) , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.
[50] Stephanie Forrest,et al. Modeling Influenza Viral Dynamics in Tissue , 2006, ICARIS.
[51] Fernando José Von Zuben,et al. Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..
[52] Steven H. Kleinstein,et al. Simulating the immune system , 2000, Comput. Sci. Eng..
[53] Vincenzo Cutello,et al. Exploring the Capability of Immune Algorithms: A Characterization of Hypermutation Operators , 2004, ICARIS.
[54] I. Cohen. Tending Adam's Garden: Evolving the Cognitive Immune Self , 2004 .
[55] Francisco C. Santos,et al. Tolerance vs Intolerance: How Affinity Defines Topology in an Idiotypic Network , 2006, ICARIS.
[56] Alex Alves Freitas,et al. Revisiting the Foundations of Artificial Immune Systems for Data Mining , 2007, IEEE Transactions on Evolutionary Computation.
[57] Jan Feyereisl,et al. Don't Touch Me, I'm Fine: Robot Autonomy Using an Artificial Innate Immune System , 2006, ICARIS.
[58] Jerne Nk. Towards a network theory of the immune system. , 1974 .
[59] Uwe Aickelin,et al. Towards a Conceptual Framework for Innate Immunity , 2005, ICARIS.
[60] D. Harel,et al. Toward rigorous comprehension of biological complexity: modeling, execution, and visualization of thymic T-cell maturation. , 2003, Genome research.
[61] Jonathan Timmis,et al. Empirical Investigation of an Artificial Cytokine Network , 2008, ICARIS.
[62] Vincenzo Cutello,et al. Artificial Immune Systems: Third International Conference, ICARIS 2004, Catania, Sicily, Italy, September 13-16, 2004, Proceedings (Lecture Notes in Computer Science) , 2004 .
[63] Irun R. Cohen,et al. Real and artificial immune systems: computing the state of the body , 2007, Nature Reviews Immunology.
[64] Christian Jacob,et al. Immunity Through Swarms: Agent-Based Simulations of the Human Immune System , 2004, ICARIS.
[65] Jonathan Timmis,et al. Theoretical advances in artificial immune systems , 2008, Theor. Comput. Sci..
[66] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[67] Jonathan Timmis,et al. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[68] Uwe Aickelin,et al. The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.
[69] Alex A. Freitas,et al. A Danger Theory Approach to Web Mining , 2003 .
[70] Simon M. Garrett,et al. Modelling Immune Memory for Prediction and Computation , 2004, ICARIS.
[71] Ben Paechter,et al. Boosting the Immune System , 2008, ICARIS.
[72] Leandro Nunes de Castro,et al. The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .
[73] Susan Stepney,et al. A Generic Framework for Population-Based Algorithms, Implemented on Multiple FPGAs , 2005, ICARIS.
[74] Jonathan Timmis,et al. Artificial immune systems—today and tomorrow , 2007, Natural Computing.
[75] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[76] Walmir M. Caminhas,et al. Regulatory T Cells: Inspiration for Artificial Immune Systems , 2007, ICARIS.
[77] Jonathan Timmis,et al. In Silico Immunology , 2007 .
[78] Vincenzo Cutello,et al. Clonal Selection Algorithms: A Comparative Case Study Using Effective Mutation Potentials , 2005, ICARIS.
[79] Vincenzo Cutello,et al. An immune algorithm with hyper-macromutations for the Dill's 2D hydrophobic-hydrophilic model , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[80] Jonathan Timmis,et al. Application areas of AIS: The past, the present and the future , 2008, Appl. Soft Comput..