Immunological Computation: Theory and Applications
暂无分享,去创建一个
[1] Nikolay I. Nikolaev,et al. Immune Network Dynamics for Inductive Problem Solving , 1998, PPSN.
[2] P. Marrack,et al. T cell tolerance by clonal elimination in the thymus , 1987, Cell.
[3] Lydia Woods Schindler. Understanding the Immune System , 1991 .
[4] Koji Yamada,et al. Immune algorithm for n-TSP , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).
[5] Gary B. Lamont,et al. A retrovirus inspired algorithm for virus detection & optimization , 2006, GECCO.
[6] Simon M. Garrett. A Paratope Is Not an Epitope: Implications for Immune Network Models and Clonal Selection , 2003, ICARIS.
[7] Andy M. Tyrrell,et al. A hardware immune system for benchmark state machine error detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[8] G. Parisi. A simple model for the immune network. , 1990, Proceedings of the National Academy of Sciences of the United States of America.
[9] Kazuyuki Mori,et al. Adaptive scheduling system inspired by immune system , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).
[10] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[11] Werner Dilger,et al. Properties of the bersini experiment on self-assertion , 2006, GECCO '06.
[12] Stephanie Forrest,et al. Automated response using system-call delays , 2000 .
[13] J. Whitton,et al. An overview of antigen presentation and its central role in the immune response. , 1998, Current topics in microbiology and immunology.
[14] M. Galek,et al. Sztuczne systemy immunologiczne , 2005 .
[15] Fernando José Von Zuben,et al. An Immunological Filter for Spam , 2006, ICARIS.
[16] J Faro,et al. Studies on a recent class of network models of the immune system. , 1993, Journal of theoretical biology.
[17] Paul Helman,et al. Protecting data privacy through hard-to-reverse negative databases , 2007, International Journal of Information Security.
[18] Jonathan Timmis,et al. A Computational Model of Degeneracy in a Lymph Node , 2006, ICARIS.
[19] S. Forrest,et al. Immunology as Information Processing , 2001 .
[20] Christian P. Robert,et al. Monte Carlo Integration , 2010 .
[21] Alan S. Perelson,et al. The immune system, adaptation, and machine learning , 1986 .
[22] Wei Gao,et al. Fast immunized evolutionary programming , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[23] Guan-Chun Luh,et al. Reactive Immune Network Based Mobile Robot Navigation , 2004, ICARIS.
[24] Doheon Lee,et al. Clonal Selection Algorithms for 6-DOF PID Control of Autonomous Underwater Vehicles , 2007, ICARIS.
[25] D. J. Weatherall. Genetic markers in human blood , 1969 .
[26] O C Martin,et al. Memory capacity in large idiotypic networks. , 1995, Bulletin of mathematical biology.
[27] A S Perelson,et al. Pattern formation in one- and two-dimensional shape-space models of the immune system. , 1992, Journal of theoretical biology.
[28] I. Maclennan,et al. T cells in the selection of germinal center B cells. , 1997, Chemical immunology.
[29] Paul Helman,et al. Enhancing Privacy through Negative Representations of Data , 2004 .
[30] Rogério de Lemos,et al. Negative Selection: How to Generate Detectors , 2002 .
[31] Fernando Esponda. Negative Surveys , 2006 .
[32] Surya P. N. Singh,et al. Immunology-directed methods for distributed robotics: a novel immunity-based architecture for robust control and coordination , 2002, SPIE Optics East.
[33] Zhou Ji,et al. Augmented negative selection algorithm with variable-coverage detectors , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[34] Hugues Bersini,et al. Immune Idiotypic Network , 1996 .
[35] Paul Helman,et al. Negative representations of information , 2009, International Journal of Information Security.
[36] Jun Chen,et al. A Population Adaptive Based Immune Algorithm for Solving Multi-objective Optimization Problems , 2006, ICARIS.
[37] F. Varela,et al. Second generation immune networks. , 1991, Immunology today.
[38] Gary B. Lamont,et al. A distributed architecture for a self-adaptive computer virus immune system , 1999 .
[39] Zhou Ji,et al. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.
[40] E. Benjamini,et al. Immunology: A Short Course , 1988 .
[41] Fabio Freschi,et al. Immune Procedure for Optimal Scheduling of Complex Energy Systems , 2006, ICARIS.
[42] Jeffrey O. Kephart,et al. A biologically inspired immune system for computers , 1994 .
[43] M. Ferrarini,et al. Human B cell populations , 1997 .
[44] Zhou Ji,et al. Applicability issues of the real-valued negative selection algorithms , 2006, GECCO '06.
[45] Dipankar Dasgupta,et al. Anomaly detection in multidimensional data using negative selection algorithm , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[46] Fernando Niño,et al. A Framework for Evolving Multi-Shaped Detectors in Negative Selection , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.
[47] Claudia Eckert,et al. A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.
[48] Riccardo Poli,et al. New ideas in optimization , 1999 .
[49] Alan S. Perelson,et al. Using Genetic Algorithms to Explore Pattern Recognition in the Immune System , 1993, Evolutionary Computation.
[50] Dipankar Dasgupta,et al. Parallel Search for Multi-Modal FunctionOptimization with Diversity and Learningof Immune Algorithm , 1999 .
[51] Leandro Nunes de Castro,et al. A Pruning Self-Organizing Algorithm to Select Centers of Radial Basis Function Neural Networks , 2001 .
[52] Leandro Nunes de Castro,et al. Recent Developments In Biologically Inspired Computing , 2004 .
[53] Jerne Nk. Towards a network theory of the immune system. , 1974 .
[54] Jonathan Timmis,et al. Assessing the performance of two immune inspired algorithms and a hybrid genetic algorithm for function optimisation , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[55] Peter J. Bentley,et al. Immune Memory in the Dynamic Clonal Selection Algorithm , 2002 .
[56] Teuvo Kohonen,et al. Self-Organizing Maps , 2010 .
[57] Stephanie Forrest,et al. Principles of a computer immune system , 1998, NSPW '97.
[58] Naruaki Toma,et al. Immune algorithm with immune network and MHC for adaptive problem solving , 1999, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028).
[59] Bruce C. Trapnell. A Peer-to-Peer Blacklisting Strategy Inspired by Leukocyte-Endothelium Interaction , 2005, ICARIS.
[60] F. Varela,et al. Natural tolerance in a simple immune network. , 1995, Journal of theoretical biology.
[61] Alan S. Perelson,et al. Growth and Recruitment in the Immune Network , 1992 .
[62] Ricardo Tanscheit,et al. An Immune Fault Detection System for Analog Circuits with Automatic Detector Generation , 2006, 2006 IEEE International Conference on Evolutionary Computation.
[63] Adnan Acan. Clonal selection algorithm with operator multiplicity , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[64] Uwe Aickelin,et al. A recommender system based on the immune network , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[65] Derek J. Smith,et al. Immunological Memory is Associative , 1998 .
[66] Mark Burgess. Evaluating cfengine’s immunity model of site maintenance , 2007 .
[67] Gerry V. Dozier,et al. Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers , 2004, GECCO.
[68] F T Vertosick,et al. Immune network theory: a role for parallel distributed processing? , 1989, Immunology.
[69] Matthew M. Williamson,et al. Implementing and Testing a Virus Throttle , 2003, USENIX Security Symposium.
[70] Fabio A. González,et al. A Randomized Real-Valued Negative Selection Algorithm , 2003, ICARIS.
[71] Abder Koukam,et al. A middleware for large scale networks inspired by the immune system , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.
[72] Anna Maria Fanelli,et al. An associative memory based on the immune networks , 1996, Proceedings of International Conference on Neural Networks (ICNN'96).
[73] Hans-Paul Schwefel,et al. Evolution strategies – A comprehensive introduction , 2002, Natural Computing.
[74] Stephanie Forrest,et al. A stochastic model of cytotoxic T cell responses. , 2004, Journal of theoretical biology.
[75] Klaus Rajewsky,et al. Intraclonal generation of antibody mutants in germinal centres , 1991, Nature.
[76] Hajime Igarashi,et al. An Immune-based Algorithm for Topology Optimization , 2006, 2006 IEEE International Conference on Evolutionary Computation.
[77] D. Norman. Learning and Memory , 1982 .
[78] Pauline Hogeweg,et al. Memory but no suppression in low-dimensional symmetric idiotypic networks , 1989, Bulletin of mathematical biology.
[79] Norman Sartorius,et al. Calgary, Alberta, Canada , 2005 .
[80] P E Seiden,et al. A computer model of cellular interactions in the immune system. , 1992, Immunology today.
[81] Senhua Yu,et al. MILA - Multilevel Immune Learning Algorithm , 2003, GECCO.
[82] Jongsoo Lee,et al. GA BASED SIMULATION OF IMMUNE NETWORKS APPLICATIONS IN STRUCTURAL OPTIMIZATION , 1997 .
[83] Fumihito Arai,et al. Control of the distributed autonomous robotic system based on the biologically inspired immunological architecture , 1997, Proceedings of International Conference on Robotics and Automation.
[84] Jonathan Timmis,et al. Immune and Evolutionary Approaches to Software Mutation Testing , 2007, ICARIS.
[85] Yoshiteru Ishida,et al. Immunity-Based Systems , 2004, Advanced Information Processing.
[86] Ben Paechter,et al. An Immune-Inspired Approach to Speckled Computing , 2007, ICARIS.
[87] David J. C. Mackay,et al. Introduction to Monte Carlo Methods , 1998, Learning in Graphical Models.
[88] Z Dembic,et al. Immune system protects integrity of tissues. , 2000, Molecular immunology.
[89] Dietrich Stauffer,et al. Systematics of the models of immune response and autoimmune disease , 1990 .
[90] Hsiu-Sen Chiang,et al. Internet security: malicious e-mails detection and protection , 2004, Ind. Manag. Data Syst..
[91] Stephanie Forrest,et al. An immunological model of distributed detection and its application to computer security , 1999 .
[92] Andrew M. Tyrrell,et al. Immunotronics: Hardware Fault Tolerance Inspired by the Immune System , 2000, ICES.
[93] Rajeev Motwani,et al. Randomized algorithms , 1996, CSUR.
[94] H. von Boehmer,et al. Self-nonself discrimination by T cells. , 1990, Science.
[95] Krzysztof Ciesielski,et al. An Immune Network for Contextual Text Data Clustering , 2006, ICARIS.
[96] Vincenzo Cutello,et al. Exploring the Capability of Immune Algorithms: A Characterization of Hypermutation Operators , 2004, ICARIS.
[97] Slawomir T. Wierzchon,et al. Discriminative power of the receptors activated by k-contiguous bits rule , 2000 .
[98] Fabio A. González,et al. TECNO-STREAMS: tracking evolving clusters in noisy data streams with a scalable immune system learning model , 2003, Third IEEE International Conference on Data Mining.
[99] Makoto Tsukiyama,et al. Immunity-Based Management System for a Semiconductor Production Line* , 1999 .
[100] Leandro Nunes de Castro,et al. The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .
[101] James C. Neidhoefer,et al. Immunized adaptive critics , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).
[102] J. Hammersley,et al. Monte Carlo Methods , 1966 .
[103] Yoshiki Uchikawa,et al. Evolutionary construction of an immune network-based behavior arbitration mechanism for autonomous mobile robots , 1998 .
[104] Leandro Nunes de Castro. Comparing Immue and Neural Networks , 2002, SBRN.
[105] S. Kauffman,et al. Adaptive Dynamic Networks as Models for the Immune System and Autocatalytic Sets , 1987, Annals of the New York Academy of Sciences.
[106] Jonathan Timmis,et al. A Fractal Immune Network , 2004, ICARIS.
[107] Dipankar Dasgupta. Immunity-Based Intrusion Detection System: A General Framework , 1999 .
[108] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[109] Franco Celada,et al. Modeling immune cognition , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).
[110] D. Dasgupta,et al. Immunity-based systems: a survey , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[111] Abder Koukam,et al. Immune-based middleware for large scale network , 2002, 27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002..
[112] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[113] David W. Corne,et al. An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems , 2003, ICARIS.
[114] Alex A. Freitas,et al. An immunological algorithm for discovering small-disjunct rules in data mining , 2001 .
[115] G. F. Burton,et al. Follicular dendritic cells and presentation of antigen and costimulatory signals to B cells , 1997, Immunological reviews.
[116] Walmir M. Caminhas,et al. A Novel Immune Inspired Approach to Fault Detection , 2007, ICARIS.
[117] Jonathan Timmis,et al. A Markov Chain Model of the B-Cell Algorithm , 2005, ICARIS.
[118] G. Hoffmann. A theory of regulation and self‐nonself discrimination in an immune network , 1975, European journal of immunology.
[119] Stephanie Forrest,et al. Engineering an Immune System 1 , 2001 .
[120] A S Perelson,et al. Localized memories in idiotypic networks. , 1990, Journal of theoretical biology.
[121] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[122] Gianni Tedesco,et al. Diophantine Benchmarks for the B-Cell Algorithm , 2006, ICARIS.
[123] Debashish Chowdhury,et al. Robustness of the network models of immune response , 1990 .
[124] R. O. Canham,et al. A MULTILAYERED IMMUNE SYSTEM FOR HARDWARE FAULT TOLERANCE WITHIN AN EMBRYONIC ARRAY , 2002 .
[125] Alex A. Freitas,et al. A Danger Theory Approach to Web Mining , 2003 .
[126] Melvin Cohn,et al. A Theory of Self-Nonself Discrimination , 1970, Science.
[127] A S Perelson,et al. A Cayley tree immune network model with antibody dynamics. , 1993, Bulletin of mathematical biology.
[128] Ki-Won Yeom,et al. Immune-inspired Algorithm for Anomaly Detection , 2007, Computational Intelligence in Information Assurance and Security.
[129] John A. Stankovic,et al. Distributed Processing , 1978, Computer.
[130] I. Maclennan,et al. Mechanism of antigen-driven selection in germinal centres , 1989, Nature.
[131] Chen Ying,et al. Design and Simulation of a Biological Immune Controller Based on Improved Varela Immune Network Model , 2005, ICARIS.
[132] Dietrich Stauffer,et al. Statistical physics of immune networks , 1992 .
[133] F. Burnet. A modification of jerne's theory of antibody production using the concept of clonal selection , 1976, CA: a cancer journal for clinicians.
[134] Fernando José Von Zuben,et al. Fault Detection Algorithm for Telephone Systems Based on the Danger Theory , 2005, ICARIS.
[135] Stephanie Forrest,et al. Generating biomorphs with an aesthetic immune system , 2002 .
[136] Leandro Nunes de Castro,et al. An Immunological Approach to Initialize Feedforward Neural Network Weights , 2001 .
[137] Zhou Ji,et al. Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.
[138] K. Lafferty,et al. A new analysis of allogeneic interactions. , 1975, The Australian journal of experimental biology and medical science.
[139] Fernando José Von Zuben,et al. Adaptive Radius Immune Algorithm for Data Clustering , 2005, ICARIS.
[140] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[141] Peter J. Bentley,et al. An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .
[142] Hugues Bersini,et al. Hints for Adaptive Problem Solving Gleaned from Immune Networks , 1990, PPSN.
[143] Fabio A. González,et al. Discriminating and visualizing anomalies using negative selection and self-organizing maps , 2005, GECCO '05.
[144] Vincent Rodin,et al. Simulation of thrombin generation during plasmatic coagulation and primary hemostasis , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[145] David H. Ackley,et al. Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).
[146] V. Cutello,et al. Lipschitzian Pattern Search and Immunological Algorithm with Quasi-Newton Method for the Protein Folding Problem: An Innovative Multistage Approach , 2005, WIRN/NAIS.
[147] Rogério de Lemos,et al. Immunising Automated Teller Machines , 2005, ICARIS.
[148] H. Bersini,et al. Frustrated chaos in biological networks. , 1997, Journal of theoretical biology.
[149] Fernando José Von Zuben,et al. Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..
[150] Uwe Aickelin,et al. Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance , 2005, ICARIS.
[151] D. Wong,et al. Negative Selection Algorithm for Aircraft Fault Detection , 2004, ICARIS.
[152] J. Goodlad,et al. Germinal centre cell kinetics , 1998, The Journal of pathology.
[153] Carlos A. Coello Coello,et al. Multiobjective Optimization Using Ideas from the Clonal Selection Principle , 2003, GECCO.
[154] Claudia Eckert,et al. An Investigation of R-Chunk Detector Generation on Higher Alphabets , 2004, GECCO.
[155] Ray Paton. Computing with biological metaphors , 1994 .
[156] Alan S. Perelson,et al. Genetic Algorithms and the Immune System , 1990, PPSN.
[157] Dipankar Dasgupta,et al. Immuno-inspired autonomic system for cyber defense , 2007, Inf. Secur. Tech. Rep..
[158] Fabio A. González,et al. Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.
[159] Angelo Baserga,et al. Clonal Selection Theory , 1960 .
[160] A. Perelson,et al. Size and connectivity as emergent properties of a developing immune network. , 1991, Journal of theoretical biology.
[161] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[162] Werner Dilger,et al. Structural Properties of Shape-Spaces , 2006, ICARIS.
[163] Yoshiteru Ishida,et al. Active Diagnosis by Self-Organization: An Approach by The Immune Network Metaphor , 1997, IJCAI.
[164] Licheng Jiao,et al. Clonal operator and antibody clone algorithms , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[165] Stephanie Forrest,et al. Computer immunology , 1997, CACM.
[166] Simon M. Garrett. Parameter-free, adaptive clonal selection , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[167] J. Doyne Farmer,et al. A Rosetta stone for connectionism , 1990 .
[168] A. Coutinho,et al. Beyond Clonal Selection and Network , 1989, Immunological reviews.
[169] Henry Y. K. Lau,et al. An Immuno Robotic System for Humanitarian Search and Rescue (Application Stream) , 2007, ICARIS.
[170] J J Hopfield,et al. Neural networks and physical systems with emergent collective computational abilities. , 1982, Proceedings of the National Academy of Sciences of the United States of America.
[171] Polly Matzinger,et al. Friendly and dangerous signals: is the tissue in control? , 2007, Nature Immunology.
[172] A. Perelson. Immune Network Theory , 1989, Immunological reviews.
[173] Hugues Bersini,et al. Frustration induced chaos in a system of coupled ODE's , 1995 .