The Link between r-contiguous Detectors and k-CNF Satisfiability
暂无分享,去创建一个
[1] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1951 .
[2] S T Lhu,et al. Discriminative power of the receptors activated by k-contiguous bits rule , 2000 .
[3] W. Feller,et al. An Introduction to Probability Theory and Its Applications, Vol. 1 , 1967 .
[4] Stephanie Forrest,et al. Coverage and Generalization in an Artificial Immune System , 2002, GECCO.
[5] Jonathan Timmis,et al. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[6] Xiang Zhang,et al. Vector computer 757 , 1986, Journal of Computer Science and Technology.
[7] A. Perelson,et al. Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination. , 1993, Proceedings of the National Academy of Sciences of the United States of America.
[8] Claudia Eckert,et al. On the appropriateness of negative selection defined over Hamming shape-space as a network intrusion detection system , 2005, 2005 IEEE Congress on Evolutionary Computation.
[9] Thomas H. Cormen,et al. Introduction to algorithms [2nd ed.] , 2001 .
[10] Martin Thorsen Ranang. An Artificial Immune System Approach to Preserving Security in Computer Networks , 2002 .
[11] Uwe Schöning. A Probabilistic Algorithm for k-SAT and Constraint Satisfaction Problems , 1999, FOCS.
[12] Rüdiger Reischuk,et al. Einführung in die Komplexitätstheorie , 1990 .
[13] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[14] Jonathan Timmis,et al. Application Areas of AIS: The Past, The Present and The Future , 2005, ICARIS.
[15] Rogério de Lemos,et al. Negative Selection: How to Generate Detectors , 2002 .
[16] Osamu Watanabe,et al. A Probabilistic 3-SAT Algorithm Further Improved , 2002, STACS.
[17] J. A. Robinson,et al. A Machine-Oriented Logic Based on the Resolution Principle , 1965, JACM.
[18] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[19] Slawomir T. Wierzchon,et al. Generating Optimal Repertoire of Antibody Strings in an Artificial Immune System , 2000, Intelligent Information Systems.
[20] Walter Kern,et al. An improved deterministic local search algorithm for 3-SAT , 2004, Theor. Comput. Sci..