Author:
Gong Maoguo,Jiao Licheng,Liu Fang,Ma Wenping
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Hardware and Architecture,Human-Computer Interaction,Information Systems,Software
Reference46 articles.
1. Aickelin U, Cayzer S (2002) The danger theory and its application to artificial immune systems. In: Proceeding of the first international conference on artificial immune systems. University of Kent at Canterbury, England, pp 141–148
2. Bentley, P, Doheon L, Sungwon J (eds) (2008) Proceedings of the seventh international conference on artificial immune systems, ICARIS 2008, Phuket, Thailand, August 10–13. Springer, Lecture Notes in Computer Science, vol 5132
3. Bersini H, Carneiro J (eds) (2006) Proceedings of the third international conference on artificial immune systems, ICARIS 2006, Oeiras, Portugal, September 4–6. Springer, Lecture Notes in Computer Science, vol 4163
4. Burnet FM (1959) The clonal selection theory of acquired immunity. Cambridge University Press, Cambridge
5. Coello CA, Cortes NC (2005) Solving multiobjective optimization problems using an artificial immune system. Genet Program Evolvable Mach 6: 163–190
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献