default search action
5. ICARIS 2006: Oeiras, Portugal
- Hugues Bersini, Jorge Carneiro:
Artificial Immune Systems, 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4-6, 2006, Proceedings. Lecture Notes in Computer Science 4163, Springer 2006, ISBN 3-540-37749-2
Computer Simulation of Classical Immunology
- José Faro, Jaime Combadao, Isabel Gordo:
Did Germinal Centers Evolve Under Differential Effects of Diversity vs Affinity? 1-8 - Thiago S. Guzella, Tomaz A. Mota-Santos, Joaquim Quinteiro Uchôa, Walmir M. Caminhas:
Modelling the Control of an Immune Response Through Cytokine Signalling. 9-22 - Catherine Beauchemin, Stephanie Forrest, Frederick T. Koster:
Modeling Influenza Viral Dynamics in Tissue. 23-36 - Fernão Vístulo de Abreu, E. N. M. Nolte 'Hoen, C. R. Almeida, D. M. Davis:
Cellular Frustration: A New Conceptual Framework for Understanding Cell-Mediated Immune Responses. 37-51 - Christian Jacob, Scott Steil, Karel P. Bergmann:
The Swarming Body: Simulating the Decentralized Defenses of Immunity. 52-65
Computer Simulation of Idiotypic Network
- Emma Hart:
Analysis of a Growth Model for Idiotypic Networks. 66-80 - Holger Schmidtchen, Ulrich Behn:
Randomly Evolving Idiotypic Networks: Analysis of Building Principles. 81-94 - Krzysztof Trojanowski, Marcin Sasin:
The Idiotypic Network with Binary Patterns Matching. 95-108 - Emma Hart, Hugues Bersini, Francisco C. Santos:
Tolerance vs Intolerance: How Affinity Defines Topology in an Idiotypic Network. 109-121
ImmunoInformatics Conceptual Papers
- Thomas Stibor, Jonathan Timmis, Claudia Eckert:
On Permutation Masks in Hamming Negative Selection. 122-135 - Steve Cayzer, Jim Smith:
Gene Libraries: Coverage, Efficiency and Diversity. 136-149 - Hugues Bersini:
Immune System Modeling: The OO Way. 150-163 - Paul S. Andrews, Jon Timmis:
A Computational Model of Degeneracy in a Lymph Node. 164-177 - Werner Dilger:
Structural Properties of Shape-Spaces. 178-192
Pattern Recognition Type of Application
- Gianni Tedesco, Jamie Twycross, Uwe Aickelin:
Integrating Innate and Adaptive Immunity for Intrusion Detection. 193-202 - Xin Wang, Wenjian Luo, Xufa Wang:
A Comparative Study on Self-tolerant Strategies for Hardware Immune Systems. 203-214 - Thomas Stibor, Jonathan Timmis, Claudia Eckert:
On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions. 215-228 - Wenjian Luo, Zeming Zhang, Xufa Wang:
A Heuristic Detector Generation Algorithm for Negative Selection Algorithm with Hamming Distance Partial Matching Rule. 229-243 - Kemal Polat, Sadik Kara, Fatma Latifoglu, Salih Günes:
A Novel Approach to Resource Allocation Mechanism in Artificial Immune Recognition System: Fuzzy Resource Allocation Mechanism and Application to Diagnosis of Atherosclerosis Disease. 244-255 - Utpal Garain, Mangal P. Chakraborty, Dipankar Dasgupta:
Recognition of Handwritten Indic Script Using Clonal Selection Algorithm. 256-266
Optimization Type of Application
- P. Bull, A. Knowles, Gianni Tedesco, Andrew Hone:
Diophantine Benchmarks for the B-Cell Algorithm. 267-279 - Jun Chen, Mahdi Mahfouf:
A Population Adaptive Based Immune Algorithm for Solving Multi-objective Optimization Problems. 280-293 - Guilherme Palermo Coelho, Fernando J. Von Zuben:
omni-aiNet: An Immune-Inspired Approach for Omni Optimization. 294-308 - Enrico Carpaneto, Claudio Cavallero, Fabio Freschi, Maurizio Repetto:
Immune Procedure for Optimal Scheduling of Complex Energy Systems. 309-320 - Vincenzo Cutello, D. Lee, Giuseppe Nicosia, Mario Pavone, I. Prizzi:
Aligning Multiple Protein Sequences by Hybrid Clonal Selection Algorithm with Insert-Remove-Gaps and BlockShuffling Operators. 321-334
Control and Time-Series Type of Application
- Martin Lehmann, Werner Dilger:
Controlling the Heating System of an Intelligent Home with an Artificial Immune System. 335-348 - Mark James Neal, Jan Feyereisl, Rosario Rascunà, Xiaolei Wang:
Don't Touch Me, I'm Fine: Robot Autonomy Using an Artificial Innate Immune System. 349-361 - William O. Wilson, Phil Birkin, Uwe Aickelin:
Price Trackers Inspired by Immune Memory. 362-375 - Rafal Pasek:
Theoretical Basis of Novelty Detection in Time Series Using Negative Selection Algorithms. 376-389
Danger Theory Inspired Application
- Jungwon Kim, Peter J. Bentley, Christian Wallenta, Mohamed Ahmed, Stephen Hailes:
Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. 390-403 - Julie Greensmith, Uwe Aickelin, Jamie Twycross:
Articulation and Clarification of the Dendritic Cell Algorithm. 404-417
Text Mining Application
- Nikolaos Nanas, Anne N. De Roeck, Victoria S. Uren:
Immune-Inspired Adaptive Information Filtering. 418-431 - Krzysztof Ciesielski, Slawomir T. Wierzchon, Mieczyslaw A. Klopotek:
An Immune Network for Contextual Text Data Clustering. 432-445 - George Barreto Bezerra, Tiago V. Barra, Hamilton M. Ferreira, Helder Knidel, Leandro Nunes de Castro, Fernando J. Von Zuben:
An Immunological Filter for Spam. 446-458
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.