The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stephanie Forrest: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Richard K. Belew, Stephanie Forrest
    Learning and Programming in Classifier Systems. [Citation Graph (1, 0)][DBLP]
    Machine Learning, 1988, v:3, n:, pp:193-223 [Journal]
  2. Dennis L. Chao, Miles P. Davenport, Stephanie Forrest, Alan S. Perelson
    Stochastic Stage-structured Modeling of the Adaptive Immune System. [Citation Graph (0, 0)][DBLP]
    CSB, 2003, pp:124-131 [Conf]
  3. Robert E. Smith, Stephanie Forrest, Alan S. Perelson
    Population Diversity in an Immune System Model: Implications for Genetic Search. [Citation Graph (0, 0)][DBLP]
    FOGA, 1992, pp:153-165 [Conf]
  4. Stephanie Forrest, Melanie Mitchell
    Relative Building-Block Fitness and the Building Block Hypothesis. [Citation Graph (0, 0)][DBLP]
    FOGA, 1992, pp:109-126 [Conf]
  5. Justin Balthrop, Fernando Esponda, Stephanie Forrest, Matthew Glickman
    Coverage and Generalization in an Artificial Immune System. [Citation Graph (0, 0)][DBLP]
    GECCO, 2002, pp:3-10 [Conf]
  6. Dennis L. Chao, Justin Balthrop, Stephanie Forrest
    Adaptive radio: achieving consensus using negative preferences. [Citation Graph (0, 0)][DBLP]
    GROUP, 2005, pp:120-123 [Conf]
  7. Stephanie Forrest, Anil Somayaji, David H. Ackley
    Building Diverse Computer Systems. [Citation Graph (0, 0)][DBLP]
    Workshop on Hot Topics in Operating Systems, 1997, pp:67-72 [Conf]
  8. Fernando Esponda, Elena S. Ackley, Stephanie Forrest, Paul Helman
    Online Negative Databases. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2004, pp:175-188 [Conf]
  9. Fernando Esponda, Stephanie Forrest, Paul Helman
    The Crossover Closure and Partial Match Detection. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2003, pp:249-260 [Conf]
  10. Catherine Beauchemin, Stephanie Forrest, Frederick T. Koster
    Modeling Influenza Viral Dynamics in Tissue. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2006, pp:23-36 [Conf]
  11. Stephanie Forrest
    Implementing Semantic Network Structures Using the Classifier System. [Citation Graph (0, 0)][DBLP]
    ICGA, 1985, pp:24-44 [Conf]
  12. Stephanie Forrest, Melanie Mitchell
    The Performance of Genetic Algorithms on Walsh Polynomials: Some Anomalous Results and Their Explanation. [Citation Graph (0, 0)][DBLP]
    ICGA, 1991, pp:182-189 [Conf]
  13. Ron R. Hightower, Stephanie Forrest, Alan S. Perelson
    The Evolution of Emergent Organization in Immune System Gene Libraries. [Citation Graph (0, 0)][DBLP]
    ICGA, 1995, pp:344-350 [Conf]
  14. Terry Jones, Stephanie Forrest
    Fitness Distance Correlation as a Measure of Problem Difficulty for Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    ICGA, 1995, pp:184-192 [Conf]
  15. John H. Miller, Stephanie Forrest
    The Dynamical Behavior of Classifier Systems. [Citation Graph (0, 0)][DBLP]
    ICGA, 1989, pp:304-310 [Conf]
  16. Stephanie Forrest
    The Classifier System: A Computational Model that Supports Machine Intelligence. [Citation Graph (0, 0)][DBLP]
    ICPP, 1986, pp:711-716 [Conf]
  17. Rebecca J. Parsons, Stephanie Forrest, Christian Burks
    Genetic Algorithms for DNA Sequence Assembly. [Citation Graph (0, 0)][DBLP]
    ISMB, 1993, pp:310-318 [Conf]
  18. Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest
    Protecting Data Privacy Through Hard-to-Reverse Negative Databases. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:72-84 [Conf]
  19. John H. Holland, Lashon B. Booker, Marco Colombetti, Marco Dorigo, David E. Goldberg, Stephanie Forrest, Rick L. Riolo, Robert E. Smith, Pier Luca Lanzi, Wolfgang Stolzmann, Stewart W. Wilson
    What Is a Learning Classifier System? [Citation Graph (0, 0)][DBLP]
    Learning Classifier Systems, 1999, pp:3-32 [Conf]
  20. Melanie Mitchell, John H. Holland, Stephanie Forrest
    When will a Genetic Algorithm Outperform Hill Climbing. [Citation Graph (0, 0)][DBLP]
    NIPS, 1993, pp:51-58 [Conf]
  21. Stephanie Forrest, Alan S. Perelson
    Genetic Algorithms and the Immune System. [Citation Graph (0, 0)][DBLP]
    PPSN, 1990, pp:320-325 [Conf]
  22. Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff
    A Sense of Self for Unix Processes. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:120-128 [Conf]
  23. Patrik D'haeseleer, Stephanie Forrest, Paul Helman
    An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:110-119 [Conf]
  24. Christina Warrender, Stephanie Forrest, Barak A. Pearlmutter
    Detecting Intrusions using System Calls: Alternative Data Models. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:133-145 [Conf]
  25. Melanie Moses, Stephanie Forrest
    Review of The Computational Beauty of Nature by Gary William Flake. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 2001, v:128, n:1-2, pp:239-242 [Journal]
  26. Peter T. Hraber, Terry Jones, Stephanie Forrest
    The Ecology of Echo. [Citation Graph (0, 0)][DBLP]
    Artificial Life, 1997, v:3, n:3, pp:165-190 [Journal]
  27. Carlo C. Maley, Stephanie Forrest
    Exploring the Relationship Between Neutral and Selective Mutations in Cancer. [Citation Graph (0, 0)][DBLP]
    Artificial Life, 2000, v:6, n:4, pp:325-345 [Journal]
  28. Melanie Mitchell, Stephanie Forrest
    Genetic Algorithms and Artificial Life. [Citation Graph (0, 0)][DBLP]
    Artificial Life, 1994, v:1, n:3, pp:267-289 [Journal]
  29. Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji
    Computer Immunology. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:10, pp:88-96 [Journal]
  30. Justin Balthrop, Stephanie Forrest, Mark E. J. Newman, Matthew M. Williamson
    Technological networks and the spread of computer viruses [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  31. Stephanie Forrest
    Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:1, pp:77-80 [Journal]
  32. Stephanie Forrest, Robert E. Smith, Brenda Javornik, Alan S. Perelson
    Using Genetic Algorithms to Explore Pattern Recognition in the Immune System. [Citation Graph (0, 0)][DBLP]
    Evolutionary Computation, 1993, v:1, n:3, pp:191-211 [Journal]
  33. Steven A. Hofmeyr, Stephanie Forrest
    Architecture for an Artificial Immune System. [Citation Graph (0, 0)][DBLP]
    Evolutionary Computation, 2000, v:8, n:4, pp:443-473 [Journal]
  34. Matthew Glickman, Justin Balthrop, Stephanie Forrest
    A Machine Learning Evaluation of an Artificial Immune System. [Citation Graph (0, 0)][DBLP]
    Evolutionary Computation, 2005, v:13, n:2, pp:179-212 [Journal]
  35. Robert E. Smith, Stephanie Forrest, Alan S. Perelson
    Searching for Diverse, Cooperative Populations with Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    Evolutionary Computation, 1993, v:1, n:2, pp:127-149 [Journal]
  36. Bruce D'Ambrosio, Michael R. Fehling, Stephanie Forrest, Peter Raulefs, B. Michael Wilber
    Real-Time Process Management for Materials Composition in Chemical Manufacturing. [Citation Graph (0, 0)][DBLP]
    IEEE Expert, 1987, v:2, n:2, pp:80-93 [Journal]
  37. Dennis L. Chao, Stephanie Forrest
    Information Immune Systems. [Citation Graph (0, 0)][DBLP]
    Genetic Programming and Evolvable Machines, 2003, v:4, n:4, pp:311-331 [Journal]
  38. Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji
    Intrusion Detection Using Sequences of System Calls. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1998, v:6, n:3, pp:151-180 [Journal]
  39. Stephanie Forrest, Melanie Mitchell
    What Makes a Problem Hard for a Genetic Algorithm? Some Anomalous Results and Their Explanation. [Citation Graph (0, 0)][DBLP]
    Machine Learning, 1993, v:13, n:, pp:285-319 [Journal]
  40. Rebecca J. Parsons, Stephanie Forrest, Christian Burks
    Genetic Algorithms, Operators, and DNA Fragment Assembly. [Citation Graph (0, 0)][DBLP]
    Machine Learning, 1995, v:21, n:1-2, pp:11-33 [Journal]
  41. Jay S. Lark, Lee D. Erman, Stephanie Forrest, Kim P. Gostelow
    Concepts, Methods, and Languages for Building Timely Intelligent Systems. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 1990, v:2, n:1-2, pp:127-148 [Journal]
  42. Hajime Inoue, Darko Stefanovic, Stephanie Forrest
    On the Prediction of Java Object Lifetimes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:7, pp:880-892 [Journal]
  43. Elena Gabriela Barrantes, David H. Ackley, Stephanie Forrest, Darko Stefanovic
    Randomized instruction set emulation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:3-40 [Journal]
  44. Kenneth L. Ingham, Anil Somayaji, John Burge, Stephanie Forrest
    Learning DFA representations of HTTP for protecting web applications. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:5, pp:1239-1255 [Journal]
  45. Petter Holme, Josh Karlin, Stephanie Forrest
    Radial Structure of the Internet [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  46. The Evolution of System-Call Monitoring. [Citation Graph (, )][DBLP]


  47. A genetic programming approach to automated software repair. [Citation Graph (, )][DBLP]


  48. Designing better fitness functions for automated program repair. [Citation Graph (, )][DBLP]


  49. Negative Ternary Set-Sharing. [Citation Graph (, )][DBLP]


  50. Pretty Good BGP: Improving BGP by Cautiously Adopting Routes. [Citation Graph (, )][DBLP]


  51. Automatically finding patches using genetic programming. [Citation Graph (, )][DBLP]


  52. Automated program repair through the evolution of assembly code. [Citation Graph (, )][DBLP]


  53. Anonymous Data Collection in Sensor Networks. [Citation Graph (, )][DBLP]


  54. Simulating the Hallmarks of Cancer. [Citation Graph (, )][DBLP]


  55. Automatic program repair with evolutionary computation. [Citation Graph (, )][DBLP]


  56. An Integrated Model of Traffic, Geography and Economy in the Internet. [Citation Graph (, )][DBLP]


  57. Autonomous security for autonomous systems. [Citation Graph (, )][DBLP]


  58. An integrated model of traffic, geography and economy in the Internet [Citation Graph (, )][DBLP]


  59. Nation-State Routing: Censorship, Wiretapping, and BGP [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.455secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002