Books

Short works

Books : reviews

Dipankar Dasgupta, ed.
Artificial Immune Systems and Their Applications.
Springer. 1999

(read but not reviewed)

The papers are collected into three Parts: • Introduction • Artificial Immune Systems: Modeling and Simulation • Artificial Immune Systems: Applications

Contents

An overview of Artificial Immune Systems and their applications. 1999
Humans have 1010 homogeneous neurons recognising shapes, 1012 heterogeneous lymphocytes recognising shapes
Hugues Bersini. The endogenous double plasticity of the immune network and the inspiration to be drawn for engineering artifacts. 1999
Immune systems and artifacts are both influenced by "protection" ideas more than they influence each other • parametric plasticity adjusts weights/concentrations; slower structural plasticity adds/removes nodes/links, adjusting network topology • ecosystem is a selfish optimiser, selecting and breeding from strongest members; immune system depends on collective behaviour of entire system, compensates for most unsatisfactory, weakest member by generating new members very different from it • so new nodes are complementary, not similar, to existing nodes
John Stewart, Jorge Carneiro. The central and the peripheral immune systems: what is the relationship?. 1999
Lee A. Segel, Ruth Lev Bar-Or. Immunology viewed as the study of an autonomous decentralized system. 1999
• ... the size of the pharmaceutical industry is witness to imperfections in our immune system.
• At higher pathogen populations, more effector damage to the host should be accepted, in order to be able to enhance the killing of the more threatening pathogens
• ... a major method for assigning credit for a given deed is reinforcing those agents who are in geographical proximity to the location where the deed was done.
• ... it is difficult ... to construct a satisfactory scalar measure of quality in achieving an ensemble of goals.
Debashish Chowdhury. Immune network: an example of a complex adaptive system. 1999
Derek J. Smith, Stephanie Forrest, Alan S. Perelson. Immunological memory is associative. 1999
Wai-Yuan Tan, Zhihua Xiang. Estimating and predicting the number of free HIV and T cells by nonlinear Kalman filter. 1999
Derek J. Smith, Stephanie Forrest, David H. Ackley, Alan S. Perelson. Modeling the effects of prior infection on vaccine efficacy. 1999
John Hunt, Jonathan Timmis, Denise Cooke, Mark Neal, Clive King. Jisys: the development of an Artificial Immune System for real world applications. 1999
Yuji Watanabe, Akio Ishiguro, Yoshiki Uchikawa. Decentralized behaviour arbitration mechanism for autonomous mobile robot using immune network. 1999
Toyoo Fukuda, Kazuyuki Mori, Makoto Tsukiyama. Parallel search for multi-modal function optimization with diversity and learning of immune algorithm. 1999
Kalmanjie KrishnaKumar, James Neidhoefer. Immunized adaptive critic for an autonomous aircraft control application. 1999
Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White. Blueprint for a computer immune system. 1999
Dipankar Dasgupta, Stephanie Forrest. An anomaly detection algorithm inspired by the immune system. 1999
Toyoo Fukuda, Kazuyuki Mori, Makoto Tsukiyama. Immunity-based management system for a semiconductor production line. 1999

Erick Cantu-Paz, James A. Foster, Kalyanmoy Deb, Lawrence Davis, Rajkumar Roy, Una-May O'Reilly, Hans-Georg Beyer, Russell K. Standish, Graham Kendall, Stewart W. Wilson, Mark Harman, Joachim Wegener, Dipankar Dasgupta, Mitch A. Potter, Alan C. Schultz, Kathryn A. Dowsland, Natasha Jonoska, Julian F. Miller, eds.
GECCO 2003 volume 1: Genetic and Evolutionary Computation Conference, Chicago, USA, July 2003.
Springer. 2003

(read but not reviewed)

Contents

Matthew Russell, John A. Clark, Susan Stepney. Using Ants to attack a classical cipher. 2003
full paper

Erick Cantu-Paz, James A. Foster, Kalyanmoy Deb, Lawrence Davis, Rajkumar Roy, Una-May O'Reilly, Hans-Georg Beyer, Russell K. Standish, Graham Kendall, Stewart W. Wilson, Mark Harman, Joachim Wegener, Dipankar Dasgupta, Mitch A. Potter, Alan C. Schultz, Kathryn A. Dowsland, Natasha Jonoska, Julian F. Miller, eds.
GECCO 2003 volume 2: Genetic and Evolutionary Computation Conference, Chicago, USA, July 2003.
Springer. 2003

(read but not reviewed)

Contents

John A. Clark, Jeremy L. Jacob, Susan Stepney. Secret Agents Leave Big Footprints: how to plant a crytographic trapdoor, and why you might not get away with it. 2003
full paper