Conceptual, Formal, and Theoretical Frameworks.- Fugue: An Interactive Immersive Audiovisualisation and Artwork Using an Artificial Immune System.- Clonal Selection Algorithms: A Comparative Case Study Using Effective Mutation Potentials.- Not All Balls Are Round: An Investigation of Alternative Recognition-Region Shapes.- A Generic Framework for Population-Based Algorithms, Implemented on Multiple FPGAs.- An AIS-Based Dynamic Routing (AISDR) Framework.- Biomolecular Immune-Computer: Theoretical Basis and Experimental Simulator.- What Have Gene Libraries Done for AIS?.- Why the First Glass of Wine Is Better Than the Seventh.- Towards a Conceptual Framework for Innate Immunity.- Inspiration for the Next Generation of Artificial Immune Systems.- Two Ways to Grow Tissue for Artificial Immune Systems.- Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection.- Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance.- Immunoinformatics.- Mathematical Modeling of Immune Suppression.- Evaluating Theories of Immunological Memory Using Large-Scale Simulations.- The Quaternion Model of Artificial Immune Response.- A Comparative Study on Modeling Strategies for Immune System Dynamics Under HIV-1 Infection.- Theoretical and Experimental Studies on Artificial Immune Systems.- Handling Constraints in Global Optimization Using an Artificial Immune System.- Multiobjective Optimization by a Modified Artificial Immune System Algorithm.- A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques.- Immunity from Spam: An Analysis of an Artificial Immune System for Junk Email Detection.- Adaptive Radius Immune Algorithm for Data Clustering.- Quantum-Inspired Immune Clonal Algorithm.- A Markov Chain Model of the B-Cell Algorithm.- Fuzzy Continuous Petri Net-Based Approach for Modeling Helper T Cell Differentiation.- A Peer-to-Peer Blacklisting Strategy Inspired by Leukocyte-Endothelium Interaction.- Self-regulating Method for Model Library Based Artificial Immune Systems.- Polymorphism and Danger Susceptibility of System Call DASTONs.- Applications of Artificial Immune Systems.- General Suppression Control Framework: Application in Self-balancing Robots.- Application of an Artificial Immune System in a Compositional Timbre Design Technique.- Immunising Automated Teller Machines.- Fault Detection Algorithm for Telephone Systems Based on the Danger Theory.- Design and Simulation of a Biological Immune Controller Based on Improved Varela Immune Network Model.- Applying the Clonal Selection Principle to Find Flexible Job-Shop Schedules.- The Medical Applications of Attribute Weighted Artificial Immune System (AWAIS): Diagnosis of Heart and Diabetes Diseases.- Designing Ensembles of Fuzzy Classification Systems: An Immune-Inspired Approach.- Application Areas of AIS: The Past, The Present and The Future.
Artificial Immune Systems: 4th International Conference, ICARIS 2005, Banff, Alberta, Canada, August 14-17, 2005, Proceedings / Edition 1by Christian Jacob, Marcin Pilat, Peter Bentley, Jonathan Timmis
Pub. Date: 09/19/2005
Publisher: Springer Berlin Heidelberg
The two-volume set LNCS 3644 and LNCS 3645 constitute the refereed proceedings of the International Conference on Intelligent Computing, ICIC 2005, held in Hefei, China, in August 2005. The program committee selected 215 carefully revised full papers for presentation in two volumes from over 2000 submissions, based on rigorous peer reviews. The first volume
The two-volume set LNCS 3644 and LNCS 3645 constitute the refereed proceedings of the International Conference on Intelligent Computing, ICIC 2005, held in Hefei, China, in August 2005. The program committee selected 215 carefully revised full papers for presentation in two volumes from over 2000 submissions, based on rigorous peer reviews. The first volume includes all the contributions related with perceptual and pattern recognition, informatics theories and applications computational neuroscience and bioscience, models and methods, and learning systems. The second volume collects the papers related with genomics and proteomics, adaptation and decision making, applications and hardware, and other applications.
- Springer Berlin Heidelberg
- Publication date:
- Lecture Notes in Computer Science / Theoretical Computer Science and General Issues Series , #3627
- Edition description:
- Product dimensions:
- 9.21(w) x 6.14(h) x 1.04(d)
Table of Contents
Most Helpful Customer Reviews
See all customer reviews