Information Technology Reference
In-Depth Information
Mitsumoto, N., T. Fukuda and T. Idogaki. Self-organizing multiple robotic system. Pro-
ceedings of IEEE International Conference on Robotics and Automation , IEEE, Min-
neapolis, MN, pp. 1614-1619, 1996.
Mori, K., M. Tsukiyama and T. Fukuda. Immune algorithm and its application to factory
load dispatching planning. JAPAN-U.S.A. Symposium on Flexible Automation , Ann
Arbor, MI, pp. 1343-1346, 1994.
Mori, K., M. Tsukiyama and T. Fukuda. Adaptive scheduling system inspired by immune
system. IEEE International Conference on Systems, Man, and Cybernetics , San Diego,
CA, 1998.
Nasraoui, O., C. Cardona, C. Rojas and F. Gonzalez. Mining evolving user profi les in
noisyweb clickstream data with a scalable immune system clustering algorithm.
Comput. Networks , 50(10), 1488-1512, 2006.
Nasraoui, O., F. Gonzalez and D. Dasgupta. h e fuzzy ais: Motivations, basic concepts,
and applications to clustering and web profi ling. IEEE International Conference on
Fuzzy Systems , Hawaii, May 12-17, 2002, pp. 711-717.
Neal, M., J. Hunt and J. Timmis. Augmenting an artifi cial immune network. Proceedings
of International Conference Systems and Man and Cybernetics , San Diego, CA, IEEE,
pp. 3821-3826, 1998.
Ong, Z. X., J. C. Tay and C. K. Kwoh. Applying clonal selection principle to fi nd fl exible
job-shop schedules. h e Proceedings of the Fourth International Conference, ICARIS
2005 on Artifi cial Immune Systems , Banff , Alberta, August 2005.
Ootsuki, T. and T. Sekiguchi. Application of the immune system network concept to
sequentialcontrol. Proceedings of IEEE International Conference on Systems, Man, and
Cybernetics , Tokyo, Japan, Vol. 3, pp. 869-874, 1999.
Perelson, A. S. Immune network theory. Immunol. Rev. , 110(10), 5-36, 1989.
Pinto, J. C. L. and Fernando J. Von Zuben. Fault detection algorithm for telephone systems
based on the danger theory. h e Proceedings of the Fourth International Conference,
ICARIS 2005 on Artifi cial Immune Systems , Banff , Alberta, August 2005.
Secker, A., A. A. Freitas and J. Timmis. A danger theory approach to web mining. h e
Proceedings of the Second International Conference, ICARIS 2003 on Artifi cial Immune
Systems , Edinburgh, September 2003.
SerapiĆ£o, A. B. S., J. Ricardo, P. Mendes and K. Miura. Artifi cial immune systems for clas-
sifi cation of petroleum well drilling operations . h e Proceedings of the 6th International
Conference on Artifi cial Immune Systems (ICARIS) , Brazil, August 26-29, 2007.
Singh, S. P. N. and S. M. h ayer. Immunology directed methods for distributed robotics: A
novel, immunity-based architecture for robust control & coordination. h e Proceed-
ings of SPIE: Mobile Robots XVI , Vol. 4573, November 2001.
Slavov, V. and N. Nikolaev. Immune network dynamics for inductive problem solving. In
A. E. Eiben, T. Back, M. Schoenauer, and H. P. Schwefel (Eds.), Parallel Problem
Solving from Nature , PPSN V, LNCS-1498, Springer, Berlin, pp. 712-721, 1998.
Smith, D. J., S. Forrest and A. S. Perelson. Immunological memory is associative. Artifi cial
Immune Systems and h eir Applications, 1999 , h e International Conference on Multi-
Agent Systems , Workshop Notes, Kyoto, Japan, pp. 62-70, 1996.
Somayaji, A., S. Hofmeyr and S. Forrest. Principles of a computer immune system. 1997
New Security Paradigms Workshop , pp. 75-82, 1998.
Search WWH ::




Custom Search