Uwe Aickelin

According to our database1, Uwe Aickelin authored at least 336 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Retrieving and ranking short medical questions with two stages neural matching model.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
Using simulation to incorporate dynamic criteria into multiple criteria decision-making.
JORS, 2018

2017
CRNN: A Joint Neural Network for Redundancy Detection.
CoRR, 2017

Fuzzy C-means-based scenario bundling for stochastic service network design.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

CRNN: A Joint Neural Network for Redundancy Detection.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Novel similarity measure for interval-valued data based on overlapping ratio.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

THCluster: Herb supplements categorization for precision traditional Chinese medicine.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

2016
Supervised Anomaly Detection in Uncertain Pseudoperiodic Data Streams.
ACM Trans. Internet Techn., 2016

Modelling Office Energy Consumption: An Agent Based Approach.
CoRR, 2016

Simulating user learning in authoritative technology adoption: An agent based model for council-led smart meter deployment planning in the UK.
CoRR, 2016

Indebted households profiling: a knowledge discovery from database approach.
CoRR, 2016

An ensemble of machine learning and anti-learning methods for predicting tumour patient survival rates.
CoRR, 2016

Identifying Candidate Risk Factors for Prescription Drug Side Effects using Causal Contrast Set Mining.
CoRR, 2016

Supervised Adverse Drug Reaction Signalling Framework Imitating Bradford Hill's Causality Considerations.
CoRR, 2016

Refining adverse drug reaction signals by incorporating interaction variables identified using emergent pattern mining.
CoRR, 2016

Exploring Differences in Interpretation of Words Essential in Medical Expert-Patient Communication.
CoRR, 2016

Applying Interval Type-2 Fuzzy Rule Based Classifiers Through a Cluster-Based Class Representation.
CoRR, 2016

Modelling Cyber-Security Experts' Decision Making Processes using Aggregation Operators.
CoRR, 2016

Supervised Anomaly Detection in Uncertain Pseudoperiodic Data Streams.
CoRR, 2016

An Improved System for Sentence-level Novelty Detection in Textual Streams.
CoRR, 2016

Adaptive Data Communication Interface: A User-Centric Visual Data Interpretation Framework.
CoRR, 2016

Juxtaposition of System Dynamics and Agent-based Simulation for a Case Study in Immunosenescence.
CoRR, 2016

Self-Organising Maps in Computer Security.
CoRR, 2016

Measuring Player's Behaviour Change over Time in Public Goods Game.
CoRR, 2016

Optimising Rule-Based Classification in Temporal Data.
CoRR, 2016

Modelling cyber-security experts' decision making processes using aggregation operators.
Computers & Security, 2016

Refining adverse drug reaction signals by incorporating interaction variables identified using emergent pattern mining.
Comp. in Bio. and Med., 2016

Measuring agreement on linguistic expressions in medical treatment scenarios.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Exploring differences in interpretation of words essential in medical expert-patient communication.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

2015
A supervised adverse drug reaction signalling framework imitating Bradford Hill's causality considerations.
Journal of Biomedical Informatics, 2015

Refining Adverse Drug Reactions using Association Rule Mining for Electronic Healthcare Data.
CoRR, 2015

Personalising Mobile Advertising Based on Users Installed Apps.
CoRR, 2015

Incorporating Spontaneous Reporting System Data to Aid Causal Inference in Longitudinal Healthcare Data.
CoRR, 2015

A Data Mining framework to model Consumer Indebtedness with Psychological Factors.
CoRR, 2015

Adaptive Data Communication Interface: A User-Centric Visual Data Interpretation Framework.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Applying Interval Type-2 Fuzzy Rule Based Classifiers Through a Cluster-Based Class Representation.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

Identifying Candidate Risk Factors for Prescription Drug Side Effects Using Causal Contrast Set Mining.
Proceedings of the Health Information Science - 4th International Conference, 2015

An ensemble of machine learning and anti-learning methods for predicting tumour patient survival rates.
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015

2014
A Novel Semisupervised Algorithm for Rare Prescription Side Effect Discovery.
IEEE J. Biomedical and Health Informatics, 2014

Data classification using the Dempster-Shafer method.
J. Exp. Theor. Artif. Intell., 2014

Modelling Electrical Car Diffusion Based on Agents.
CoRR, 2014

Ensemble Learning of Colorectal Cancer Survival Rates.
CoRR, 2014

Attributes for Causal Inference in Longitudinal Observational Databases.
CoRR, 2014

Signalling Paediatric Side Effects using an Ensemble of Simple Study Designs.
CoRR, 2014

A Novel Semi-Supervised Algorithm for Rare Prescription Side Effect Discovery.
CoRR, 2014

Comparison of algorithms that detect drug side effects using electronic healthcare databases.
CoRR, 2014

Tuning a Multiple Classifier System for Side Effect Discovery using Genetic Algorithms.
CoRR, 2014

A Fuzzy Directional Distance Measure.
CoRR, 2014

Analysing Fuzzy Sets Through Combining Measures of Similarity and Distance.
CoRR, 2014

Detecting adverse drug reactions for the drug Simvastatin.
CoRR, 2014

Feature selection in detection of adverse drug reactions from the Health Improvement Network (THIN) database.
CoRR, 2014

Detect Adverse Drug Reactions for Drug Aspirin.
CoRR, 2014

Augmented Neural Networks for Modelling Consumer Indebtness.
CoRR, 2014

Comparison of Distance Metrics for Hierarchical Data in Medical Databases.
CoRR, 2014

Comparing Stochastic Differential Equations and Agent-Based Modelling and Simulation for Early-stage Cancer.
CoRR, 2014

Variability of Behaviour in Electricity Load Profile Clustering; Who Does Things at the Same Time Each Day?
CoRR, 2014

An Approach for Assessing Clustering of Households by Electricity Usage.
CoRR, 2014

Data classification using the Dempster-Shafer method.
CoRR, 2014

Variability of Behaviour in Electricity Load Profile Clustering; Who Does Things at the Same Time Each Day?
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2014

Augmented Neural Networks for modelling consumer indebtness.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Comparison of Distance metrics for hierarchical data in medical databases.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Refining Adverse Drug Reactions Using Association Rule Mining for Electronic Healthcare Data.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Personalising Mobile Advertising Based on Users' Installed Apps.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Incorporating Spontaneous Reporting System Data to Aid Causal Inference in Longitudinal Healthcare Data.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

A Data Mining Framework to Model Consumer Indebtedness with Psychological Factors.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Analysing fuzzy sets through combining measures of similarity and distance.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2014

A fuzzy directional distance measure.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2014

Tuning a multiple classifier system for side effect discovery using genetic algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

2013
Comparison of algorithms that detect drug side effects using electronic healthcare databases.
Soft Comput., 2013

Wavelet feature extraction and genetic algorithm for biomarker detection in colorectal cancer data.
Knowl.-Based Syst., 2013

Towards a More Systematic Approach to Secure Systems Design and Analysis.
IJSSE, 2013

Modelling and Analysing Cargo Screening Processes: A Project Outline
CoRR, 2013

Immune System Approaches to Intrusion Detection - A Review (ICARIS)
CoRR, 2013

Memory Implementations - Current Alternatives
CoRR, 2013

Adaptive Alert Throttling for Intrusion Detection Systems
CoRR, 2013

Dienstplanerstellung in Krankenhaeusern mittels genetischer Algorithmen
CoRR, 2013

Modelling Electricity Consumption in Office Buildings: An Agent Based Approach.
CoRR, 2013

Modelling the Effects of User Learning on Forced Innovation Diffusion.
CoRR, 2013

A Three-Dimensional Model of Residential Energy Consumer Archetypes for Local Energy Policy Design in the UK.
CoRR, 2013

Motif Detection Inspired by Immune Memory (JORS).
CoRR, 2013

Real-world Transfer of Evolved Artificial Immune System Behaviours between Small and Large Scale Robotic Platforms.
CoRR, 2013

Against Spyware Using CAPTCHA in Graphical Password Scheme.
CoRR, 2013

Comparing Decison Support Tools for Cargo Screening Processes.
CoRR, 2013

Evaluating Different Cost-Benefit Analysis Methods for Port Security Operations.
CoRR, 2013

Scenario Analysis, Decision Trees and Simulation for Cost Benefit Analysis of the Cargo Screening Process.
CoRR, 2013

Towards modelling cost and risks of infrequent events in the cargo screening process.
CoRR, 2013

Validation of a Microsimulation of the Port of Dover.
CoRR, 2013

Supervised Learning and Anti-learning of Colorectal Cancer Classes and Survival Rates from Cellular Biology Parameters.
CoRR, 2013

Biomarker Clustering of Colorectal Cancer Data to Complement Clinical Classification.
CoRR, 2013

Extending a Microsimulation of the Port of Dover.
CoRR, 2013

Comparing Data-mining Algorithms Developed for Longitudinal Observational Databases.
CoRR, 2013

Discovering Sequential Patterns in a UK General Practice Database.
CoRR, 2013

Investigating the Detection of Adverse Drug Events in a UK General Practice Electronic Health-Care Database.
CoRR, 2013

Towards a More Systematic Approach to Secure Systems Design and Analysis.
CoRR, 2013

Measuring the Directional Distance Between Fuzzy Sets.
CoRR, 2013

Extending Similarity Measures of Interval Type-2 Fuzzy Sets to General Type-2 Fuzzy Sets.
CoRR, 2013

Modelling Reactive and Proactive Behaviour in Simulation: A Case Study in a University Organisation.
CoRR, 2013

Draw a line on your PDA to authenticate.
CoRR, 2013

Wavelet feature extraction and genetic algorithm for biomarker detection in colorectal cancer data.
CoRR, 2013

Detect adverse drug reactions for drug Atorvastatin.
CoRR, 2013

Detect adverse drug reactions for drug Pioglitazone.
CoRR, 2013

Detect adverse drug reactions for the drug Pravastatin.
CoRR, 2013

Detect adverse drug reactions for drug Alendronate.
CoRR, 2013

Using Clustering to extract Personality Information from socio economic data.
CoRR, 2013

Examining the Classification Accuracy of TSVMs with ?Feature Selection in Comparison with the GLAD Algorithm.
CoRR, 2013

Theoretical formulation and analysis of the deterministic dendritic cell algorithm.
CoRR, 2013

The Dendritic Cell Algorithm for Intrusion Detection.
CoRR, 2013

Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm.
CoRR, 2013

The effect of baroque music on the PassPoints graphical password.
CoRR, 2013

A New Graphical Password Scheme Resistant to Shoulder-Surfing.
CoRR, 2013

An audio CAPTCHA to distinguish humans from computers.
CoRR, 2013

Can background baroque music help to improve the memorability of graphical passwords?
CoRR, 2013

Simulating the Dynamics of T Cell Subsets Throughout the Lifetime.
CoRR, 2013

A Beginners Guide to Systems Simulation in Immunology.
CoRR, 2013

Investigating Mathematical Models of Immuno-Interactions with Early-Stage Cancer under an Agent-Based Modelling Perspective.
CoRR, 2013

Systems Dynamics or Agent-Based Modelling for Immune Simulation?
CoRR, 2013

Investigating Immune System Aging: System Dynamics and Agent-Based Modeling.
CoRR, 2013

Defining a Simulation Strategy for Cancer Immunocompetence.
CoRR, 2013

Privileged Information for Data Clustering.
CoRR, 2013

Creating Personalised Energy Plans. From Groups to Individuals using Fuzzy C Means Clustering.
CoRR, 2013

Finding the creatures of habit; Clustering households based on their flexibility in using electricity.
CoRR, 2013

The Application of a Data Mining Framework to Energy Usage Profiling in Domestic Residences using UK data.
CoRR, 2013

Application of a clustering framework to UK domestic electricity data.
CoRR, 2013

Performance Measurement Under Increasing Environmental Uncertainty In The Context of Interval Type-2 Fuzzy Logic Based Robotic Sailing.
CoRR, 2013

An investigation into the relationship between type-2 FOU size and environmental uncertainty in robotic control.
CoRR, 2013

A Comparison of Non-stationary, Type-2 and Dual Surface Fuzzy Control.
CoRR, 2013

Artificial Immune Systems (INTROS 2).
CoRR, 2013

Variance in System Dynamics and Agent Based Modelling Using the SIR Model of Infectious Disease.
CoRR, 2013

Investigating the effectiveness of Variance Reduction Techniques in Manufacturing, Call Center and Cross-docking Discrete Event Simulation Models.
CoRR, 2013

Investigating mathematical models of immuno-interactions with early-stage cancer under an agent-based modelling perspective.
BMC Bioinformatics, 2013

Theoretical formulation and analysis of the deterministic dendritic cell algorithm.
Biosystems, 2013

Measuring the directional distance between fuzzy sets.
Proceedings of the 13th UK Workshop on Computational Intelligence, 2013

Extending similarity measures of interval type-2 fuzzy sets to general type-2 fuzzy sets.
Proceedings of the FUZZ-IEEE 2013, 2013

Interval type-2 fuzzy logic based robotic sailing.
Proceedings of the FUZZ-IEEE 2013, 2013

On the Role of the AIS Practitioner.
Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, 2013

The use of Agent-based Simulation to Discover Extreme Cases in Immune-Interactions with Early-Stage Cancer Scenarios.
Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, 2013

Attributes for causal inference in electronic healthcare databases.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

2012
Validation of a microsimulation of the Port of Dover.
J. Comput. Science, 2012

Privileged information for data clustering.
Inf. Sci., 2012

Comparing data-mining algorithms developed for longitudinal observational databases.
Proceedings of the 12th UK Workshop on Computational Intelligence, 2012

Supervised learning and anti-learning of colorectal cancer classes and survival rates from cellular biology parameters.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

A Beginner's Guide to Systems Simulation in Immunology.
Proceedings of the Artificial Immune Systems - 11th International Conference, 2012

An investigation into the relationship between type-2 FOU size and environmental uncertainty in robotic control.
Proceedings of the FUZZ-IEEE 2012, 2012

Biomarker Clustering of Colorectal Cancer Data to Complement Clinical Classification.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2012

Variance In System Dynamics And Agent Based Modelling Using The SIR Model Of Infectious Disease.
Proceedings of the 26th European Conference on Modelling and Simulation, 2012

Detect adverse drug reactions for the drug Pravastatin.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

Discovering sequential patterns in a UK general practice database.
Proceedings of 2012 IEEE-EMBS International Conference on Biomedical and Health Informatics, 2012

The Dendritic Cell Algorithm for Intrusion Detection.
Proceedings of the Biologically Inspired Networking and Sensing, 2012

2011
Towards the development of a simulator for investigating the impact of people management practices on retail performance.
J. Simulation, 2011

Motif detection inspired by immune memory.
JORS, 2011

Heuristic optimisation.
JORS, 2011

A First Approach on Modelling Staff Proactiveness in Retail Simulation Models.
J. Artificial Societies and Social Simulation, 2011

Comparing System Dynamics and Agent-Based Simulation for Tumour Growth and its Interactions with Effector Cells
CoRR, 2011

A First Approach on Modelling Staff Proactiveness in Retail Simulation Models
CoRR, 2011

Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm.
Proceedings of the Artificial Immune Systems - 10th International Conference, 2011

Simulating the Dynamics of T Cell Subsets throughout the Lifetime.
Proceedings of the Artificial Immune Systems - 10th International Conference, 2011

Systems Dynamics or Agent-Based Modelling for Immune Simulation?
Proceedings of the Artificial Immune Systems - 10th International Conference, 2011

A comparison of non-stationary, type-2 and dual surface fuzzy control.
Proceedings of the FUZZ-IEEE 2011, 2011

2010
Simulating Customer Experience and Word-Of-Mouth in Retail - A Case Study.
Simulation, 2010

Information fusion in the immune system.
Information Fusion, 2010

Information fusion for anomaly detection with the dendritic cell algorithm.
Information Fusion, 2010

Detecting Anomalous Process Behaviour Using Second Generation Artificial Immune Systems.
IJUC, 2010

Real-world transfer of evolved artificial immune system behaviours between small and large scale robotic platforms.
Evolutionary Intelligence, 2010

The Transfer of Evolved Artificial Immune System Behaviours between Small and Large Scale Robotic Platforms
CoRR, 2010

Detecting Danger: The Dendritic Cell Algorithm
CoRR, 2010

Artificial Immune Systems (2010)
CoRR, 2010

Towards the Development of a Simulator for Investigating the Impact of People Management Practices on Retail Performance
CoRR, 2010

Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
CoRR, 2010

Modelling Reactive and Proactive Behaviour in Simulation
CoRR, 2010

The Use of Probabilistic Systems to Mimic the Behaviour of Idiotypic AIS Robot Controllers
CoRR, 2010

Two-Timescale Learning Using Idiotypic Behaviour Mediation For A Navigating Mobile Robot
CoRR, 2010

Towards a Conceptual Framework for Innate Immunity
CoRR, 2010

ToLeRating UR-STD
CoRR, 2010

The Motif Tracking Algorithm
CoRR, 2010

The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms
CoRR, 2010

The Deterministic Dendritic Cell Algorithm
CoRR, 2010

The Application of a Dendritic Cell Algorithm to a Robotic Classifier
CoRR, 2010

System Dynamics Modelling of the Processes Involving the Maintenance of the Naive T Cell Repertoire
CoRR, 2010

Tailored RF pulse optimization for magnetization inversion at ultra high field
CoRR, 2010

STORM - A Novel Information Fusion and Cluster Interpretation Technique
CoRR, 2010

Real-Time Alert Correlation with Type Graphs
CoRR, 2010

Price Trackers Inspired by Immune Memory
CoRR, 2010

Modelling Immunological Memory
CoRR, 2010

Performance Evaluation of DCA and SRC on a Single Bot Detection
CoRR, 2010

Motif Detection Inspired by Immune Memory
CoRR, 2010

Oil Price Trackers Inspired by Immune Memory
CoRR, 2010

Parcellation of fMRI Datasets with ICA and PLS-A Data Driven Approach
CoRR, 2010

PCA 4 DCA: The Application Of Principal Component Analysis To The Dendritic Cell Algorithm
CoRR, 2010

Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection
CoRR, 2010

Genetic Algorithms for Multiple-Choice Problems
CoRR, 2010

Nurse Rostering with Genetic Algorithms
CoRR, 2010

Behavioural Correlation for Detecting P2P Bots
CoRR, 2010

Experimenting with Innate Immunity
CoRR, 2010

Development of a Cargo Screening Process Simulator: A First Approach
CoRR, 2010

Mimicking the Behaviour of Idiotypic AIS Robot Controllers Using Probabilistic Systems
CoRR, 2010

Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory
CoRR, 2010

Investigating Output Accuracy for a Discrete Event Simulation Model and an Agent Based Simulation Model
CoRR, 2010

Integrating Real-Time Analysis With The Dendritic Cell Algorithm Through Segmentation
CoRR, 2010

Simulating Customer Experience and Word Of Mouth in Retail - A Case Study
CoRR, 2010

Optimisation of a Crossdocking Distribution Centre Simulation Model
CoRR, 2010

Multi-Agent Simulation and Management Practices
CoRR, 2010

Modelling and simulating retail management practices: a first approach
CoRR, 2010

Information Fusion in the Immune System
CoRR, 2010

Integrating Innate and Adaptive Immunity for Intrusion Detection
CoRR, 2010

Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
CoRR, 2010

Exploration Of The Dendritic Cell Algorithm Using The Duration Calculus
CoRR, 2010

libtissue - implementing innate immunity
CoRR, 2010

Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
CoRR, 2010

Detecting Bots Based on Keylogging Activities
CoRR, 2010

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems
CoRR, 2010

Detecting Motifs in System Call Sequences
CoRR, 2010

Dendritic Cells for SYN Scan Detection
CoRR, 2010

Detecting Botnets Through Log Correlation
CoRR, 2010

Dendritic Cells for Anomaly Detection
CoRR, 2010

Dendritic Cells for Real-Time Anomaly Detection
CoRR, 2010

Biological Optimisation for Nurse Scheduling
CoRR, 2010

DCA for Bot Detection
CoRR, 2010

Comparing Simulation Output Accuracy of Discrete Event and Agent Based Models: A Quantitive Approach
CoRR, 2010

Cooperative Automated Worm Response and Detection Immune Algorithm
CoRR, 2010

Cheating for Problem Solving: A Genetic Algorithm with Social Interactions
CoRR, 2010

Two-timescale learning using idiotypic behaviour mediation for a navigating mobile robot.
Appl. Soft Comput., 2010

Investigating immune system aging: system dynamics and agent-based modeling.
Proceedings of the SummerSim '10, 2010

Can Background Baroque Music Help to Improve the Memorability of Graphical Passwords?
Proceedings of the Image Analysis and Recognition, 7th International Conference, 2010

Defining a Simulation Strategy for Cancer Immunocompetence.
Proceedings of the Artificial Immune Systems, 9th International Conference, 2010

A New Graphical Password Scheme Resistant to Shoulder-Surfing.
Proceedings of the 2010 International Conference on CyberWorlds, 2010

The effect of baroque music on the PassPoints graphical password.
Proceedings of the 9th ACM International Conference on Image and Video Retrieval, 2010

Against Spyware Using CAPTCHA in Graphical Password Scheme.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Artificial Dendritic Cells: Multi-faceted Perspectives.
Proceedings of the Human-Centric Information Processing Through Granular Modelling, 2009

An Evolutionary Squeaky Wheel Optimization Approach to Personnel Scheduling.
IEEE Trans. Evolutionary Computation, 2009

A Component-Based Heuristic Search Method with Evolutionary Eliminations for Hospital Personnel Scheduling.
INFORMS Journal on Computing, 2009

Modelling and simulating retail management practices: a first approach.
IJSPM, 2009

Artificial Immune Tissue using Self-Orgamizing Networks
CoRR, 2009

Articulation and Clarification of the Dendritic Cell Algorithm
CoRR, 2009

Artificial Immune Systems
CoRR, 2009

An Immune Inspired Network Intrusion Detection System Utilising Correlation Context
CoRR, 2009

An Immune Inspired Approach to Anomaly Detection
CoRR, 2009

An Idiotypic Immune Network as a Short Term Learning Architecture for Mobile Robots
CoRR, 2009

An Evolutionary Squeaky Wheel Optimisation Approach to Personnel Scheduling
CoRR, 2009

An Agent Based Classification Model
CoRR, 2009

A Component Based Heuristic Search Method with Evolutionary Eliminations
CoRR, 2009

Artificial Dendritic Cells: Multi-faceted Perspectives
CoRR, 2009

Parcellation of fMRI Datasets with ICA and PLS-A Data Driven Approach.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention, 2009

STORM - A Novel Information Fusion and Cluster Interpretation Technique.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2009

Exploration of the Dendritic Cell Algorithm Using the Duration Calculus.
Proceedings of the Artificial Immune Systems, 8th International Conference, 2009

Cheating for problem solving: a genetic algorithm with social interactions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Integrating real-time analysis with the dendritic cell algorithm through segmentation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

The Transfer of Evolved Artificial Immune System Behaviours between Small and Large Scale Robotic Platforms.
Proceedings of the Artifical Evolution, 2009

2008
The DCA: SOMe comparison - A comparative study between two biologically inspired algorithms.
Evolutionary Intelligence, 2008

Special issue on artificial immune systems.
Evolutionary Intelligence, 2008

Data Reduction in Intrusion Alert Correlation
CoRR, 2008

Immune System Approaches to Intrusion Detection - A Review
CoRR, 2008

Explicit Learning: an Effort towards Human Scheduling Algorithms
CoRR, 2008

An Artificial Immune System as a Recommender System for Web Sites
CoRR, 2008

Bayesian Optimisation Algorithm for Nurse Scheduling
CoRR, 2008

Artificial Immune Systems Tutorial
CoRR, 2008

Introduction to Multi-Agent Simulation
CoRR, 2008

A Component Based Heuristic Search method with Adaptive Perturbations for Hospital Personnel Scheduling
CoRR, 2008

The Role of Management Practices in Closing the Productivity Gap
CoRR, 2008

Idiotypic Immune Networks in Mobile Robot Control
CoRR, 2008

An Estimation of Distribution Algorithm for Nurse Scheduling
CoRR, 2008

Rule Generalisation in Intrusion Detection Systems using Snort
CoRR, 2008

A Recommender System based on Idiotypic Artificial Immune Networks
CoRR, 2008

An Indirect Genetic Algorithm for a Nurse Scheduling Problem
CoRR, 2008

Building Better Nurse Scheduling Algorithms
CoRR, 2008

On the Application of Hierarchical Coevolutionary Genetic Algorithms: Recombination and Evaluation Partners
CoRR, 2008

An Indirect Genetic Algorithm for Set Covering Problems
CoRR, 2008

Enhanced Direct and Indirect Genetic Algorithm Approaches for a Mall Layout and Tenant Selection Problem
CoRR, 2008

Danger Theory: The Link between AIS and IDS
CoRR, 2008

The Application of Bayesian Optimization and Classifier Systems in Nurse Scheduling
CoRR, 2008

Improved Squeaky Wheel Optimisation for Driver Scheduling
CoRR, 2008

An Investigation of the Sequential Sampling Method for Crossdocking Simulation Output Variance Reduction
CoRR, 2008

Investigating a Hybrid Metaheuristic For Job Shop Rescheduling
CoRR, 2008

Genetic-Algorithm Seeding Of Idiotypic Networks For Mobile-Robot Navigation
CoRR, 2008

An Agent-Based Simulation of In-Store Customer Experiences
CoRR, 2008

Using Intelligent Agents to Understand Management Practices and Retail Productivity
CoRR, 2008

Understanding Retail Productivity by Simulating Management Practise
CoRR, 2008

A Multi-Agent Simulation of Retail Management Practices
CoRR, 2008

Using Intelligent Agents to understand organisational behaviour
CoRR, 2008

Simulation Optimization of the Crossdock Door Assignment Problem
CoRR, 2008

Dempster-Shafer for Anomaly Detection
CoRR, 2008

Sensing Danger: Innate Immunology for Intrusion Detection
CoRR, 2008

Exploiting problem structure in a genetic algorithm approach to a nurse rostering problem
CoRR, 2008

Artificial Immune Systems (AIS) - A New Paradigm for Heuristic Decision Making
CoRR, 2008

Investigating Artificial Immune Systems For Job Shop Rescheduling In Changing Environments
CoRR, 2008

On Affinity Measures for Artificial Immune System Movie Recommenders
CoRR, 2008

Movie Recommendation Systems Using An Artificial Immune System
CoRR, 2008

Strategic Alert Throttling for Intrusion Detection Systems
CoRR, 2008

A Bayesian Optimisation Algorithm for the Nurse Scheduling Problem
CoRR, 2008

Partnering Strategies for Fitness Evaluation in a Pyramidal Evolutionary Algorithm
CoRR, 2008

The Danger Theory and Its Application to Artificial Immune Systems
CoRR, 2008

A Recommender System based on the Immune Network
CoRR, 2008

On the Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems
CoRR, 2008

A Pyramidal Evolutionary Algorithm with Different Inter-Agent Partnering Strategies for Scheduling Problems
CoRR, 2008

ToLeRating UR-STD.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Real-Time Alert Correlation with Type Graphs.
Proceedings of the Information Systems Security, 4th International Conference, 2008

Genetic-algorithm Seeding of Idiotypic Networks for Mobile-robot Navigation.
Proceedings of the ICINCO 2008, 2008

An Idiotypic Immune Network as a Short-Term Learning Architecture for Mobile Robots.
Proceedings of the Artificial Immune Systems, 7th International Conference, 2008

Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows.
Proceedings of the Artificial Immune Systems, 7th International Conference, 2008

The Deterministic Dendritic Cell Algorithm.
Proceedings of the Artificial Immune Systems, 7th International Conference, 2008

DCA for bot detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

Detecting Bots Based on Keylogging Activities.
Proceedings of the The Third International Conference on Availability, 2008

2007
Idiotypic Immune Networks in Mobile-Robot Control.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2007

Immune system approaches to intrusion detection - a review.
Natural Computing, 2007

An estimation of distribution algorithm with intelligent local search for rule-based nurse rostering.
JORS, 2007

Sensing danger: Innate immunology for intrusion detection.
Inf. Sec. Techn. Report, 2007

Rule generalisation in intrusion detection systems using SNORT.
IJESDF, 2007

An Estimation of Distribution Algorithm with Intelligent Local Search for Rule-based Nurse Rostering
CoRR, 2007

An estimation of distribution algorithm for nurse scheduling.
Annals OR, 2007

Using intelligent agents to understand management practices and retail productivity.
Proceedings of the Winter Simulation Conference, WSC 2007, 2007

Detecting Motifs in System Call Sequences.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

A multi-agent simulation of retail management practices.
Proceedings of the 2007 Summer Computer Simulation Conference, 2007

Motif Detection Inspired by Immune Memory.
Proceedings of the Artificial Immune Systems, 6th International Conference, 2007

Biological Inspiration for Artificial Immune Systems.
Proceedings of the Artificial Immune Systems, 6th International Conference, 2007

The Application of a Dendritic Cell Algorithm to a Robotic Classifier.
Proceedings of the Artificial Immune Systems, 6th International Conference, 2007

Dendritic cells for SYN scan detection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Investigating a Hybrid Metaheuristic for Job Shop Rescheduling.
Proceedings of the Progress in Artificial Life, Third Australian Conference, 2007

2006
BOA for Nurse Scheduling.
Proceedings of the Scalable Optimization via Probabilistic Modeling, 2006

Improved Squeaky Wheel Optimisation for Driver Scheduling.
Proceedings of the Parallel Problem Solving from Nature, 2006

Price Trackers Inspired by Immune Memory.
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006

Integrating Innate and Adaptive Immunity for Intrusion Detection.
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006

Articulation and Clarification of the Dendritic Cell Algorithm.
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006

Anomaly Detection Using the Dempster-Shafer Method.
Proceedings of the 2006 International Conference on Data Mining, 2006

libtissue - implementing innate immunity.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

Dendritic Cells for Anomaly Detection.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

2005
Book Selection.
JORS, 2005

A Recommender System based on Idiotypic Artificial Immune Networks.
J. Math. Model. Algorithms, 2005

Towards a Conceptual Framework for Innate Immunity.
Proceedings of the Artificial Immune Systems: 4th International Conference, 2005

Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance.
Proceedings of the Artificial Immune Systems: 4th International Conference, 2005

Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection.
Proceedings of the Artificial Immune Systems: 4th International Conference, 2005

2004
An indirect Genetic Algorithm for a nurse-scheduling problem.
Computers & OR, 2004

Building Better Nurse Scheduling Algorithms.
Annals OR, 2004

The Application of Bayesian Optimization and Classifier Systems in Nurse Scheduling.
Proceedings of the Parallel Problem Solving from Nature, 2004

Immune System Approaches to Intrusion Detection - A Review.
Proceedings of the Artificial Immune Systems, Third International Conference, 2004

2003
Danger Theory: The Link between AIS and IDS?
Proceedings of the Artificial Immune Systems, Second International Conference, 2003

2002
Enhanced Direct and Indirect Genetic Algorithm Approaches for a Mall Layout and Tenant Selection Problem.
J. Heuristics, 2002

Partnering Strategies For Fitness Evaluation In A Pyramidal Evolutionary Algorithm.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002


  Loading...