Search the dblp DataBase
Stephanie Forrest :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Richard K. Belew , Stephanie Forrest Learning and Programming in Classifier Systems. [Citation Graph (1, 0)][DBLP ] Machine Learning, 1988, v:3, n:, pp:193-223 [Journal ] Dennis L. Chao , Miles P. Davenport , Stephanie Forrest , Alan S. Perelson Stochastic Stage-structured Modeling of the Adaptive Immune System. [Citation Graph (0, 0)][DBLP ] CSB, 2003, pp:124-131 [Conf ] Robert E. Smith , Stephanie Forrest , Alan S. Perelson Population Diversity in an Immune System Model: Implications for Genetic Search. [Citation Graph (0, 0)][DBLP ] FOGA, 1992, pp:153-165 [Conf ] Stephanie Forrest , Melanie Mitchell Relative Building-Block Fitness and the Building Block Hypothesis. [Citation Graph (0, 0)][DBLP ] FOGA, 1992, pp:109-126 [Conf ] Justin Balthrop , Fernando Esponda , Stephanie Forrest , Matthew Glickman Coverage and Generalization in an Artificial Immune System. [Citation Graph (0, 0)][DBLP ] GECCO, 2002, pp:3-10 [Conf ] Dennis L. Chao , Justin Balthrop , Stephanie Forrest Adaptive radio: achieving consensus using negative preferences. [Citation Graph (0, 0)][DBLP ] GROUP, 2005, pp:120-123 [Conf ] Stephanie Forrest , Anil Somayaji , David H. Ackley Building Diverse Computer Systems. [Citation Graph (0, 0)][DBLP ] Workshop on Hot Topics in Operating Systems, 1997, pp:67-72 [Conf ] Fernando Esponda , Elena S. Ackley , Stephanie Forrest , Paul Helman Online Negative Databases. [Citation Graph (0, 0)][DBLP ] ICARIS, 2004, pp:175-188 [Conf ] Fernando Esponda , Stephanie Forrest , Paul Helman The Crossover Closure and Partial Match Detection. [Citation Graph (0, 0)][DBLP ] ICARIS, 2003, pp:249-260 [Conf ] Catherine Beauchemin , Stephanie Forrest , Frederick T. Koster Modeling Influenza Viral Dynamics in Tissue. [Citation Graph (0, 0)][DBLP ] ICARIS, 2006, pp:23-36 [Conf ] Stephanie Forrest Implementing Semantic Network Structures Using the Classifier System. [Citation Graph (0, 0)][DBLP ] ICGA, 1985, pp:24-44 [Conf ] Stephanie Forrest , Melanie Mitchell The Performance of Genetic Algorithms on Walsh Polynomials: Some Anomalous Results and Their Explanation. [Citation Graph (0, 0)][DBLP ] ICGA, 1991, pp:182-189 [Conf ] Ron R. Hightower , Stephanie Forrest , Alan S. Perelson The Evolution of Emergent Organization in Immune System Gene Libraries. [Citation Graph (0, 0)][DBLP ] ICGA, 1995, pp:344-350 [Conf ] Terry Jones , Stephanie Forrest Fitness Distance Correlation as a Measure of Problem Difficulty for Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] ICGA, 1995, pp:184-192 [Conf ] John H. Miller , Stephanie Forrest The Dynamical Behavior of Classifier Systems. [Citation Graph (0, 0)][DBLP ] ICGA, 1989, pp:304-310 [Conf ] Stephanie Forrest The Classifier System: A Computational Model that Supports Machine Intelligence. [Citation Graph (0, 0)][DBLP ] ICPP, 1986, pp:711-716 [Conf ] Rebecca J. Parsons , Stephanie Forrest , Christian Burks Genetic Algorithms for DNA Sequence Assembly. [Citation Graph (0, 0)][DBLP ] ISMB, 1993, pp:310-318 [Conf ] Fernando Esponda , Elena S. Ackley , Paul Helman , Haixia Jia , Stephanie Forrest Protecting Data Privacy Through Hard-to-Reverse Negative Databases. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:72-84 [Conf ] John H. Holland , Lashon B. Booker , Marco Colombetti , Marco Dorigo , David E. Goldberg , Stephanie Forrest , Rick L. Riolo , Robert E. Smith , Pier Luca Lanzi , Wolfgang Stolzmann , Stewart W. Wilson What Is a Learning Classifier System? [Citation Graph (0, 0)][DBLP ] Learning Classifier Systems, 1999, pp:3-32 [Conf ] Melanie Mitchell , John H. Holland , Stephanie Forrest When will a Genetic Algorithm Outperform Hill Climbing. [Citation Graph (0, 0)][DBLP ] NIPS, 1993, pp:51-58 [Conf ] Stephanie Forrest , Alan S. Perelson Genetic Algorithms and the Immune System. [Citation Graph (0, 0)][DBLP ] PPSN, 1990, pp:320-325 [Conf ] Stephanie Forrest , Steven A. Hofmeyr , Anil Somayaji , Thomas A. Longstaff A Sense of Self for Unix Processes. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:120-128 [Conf ] Patrik D'haeseleer , Stephanie Forrest , Paul Helman An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:110-119 [Conf ] Christina Warrender , Stephanie Forrest , Barak A. Pearlmutter Detecting Intrusions using System Calls: Alternative Data Models. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1999, pp:133-145 [Conf ] Melanie Moses , Stephanie Forrest Review of The Computational Beauty of Nature by Gary William Flake. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 2001, v:128, n:1-2, pp:239-242 [Journal ] Peter T. Hraber , Terry Jones , Stephanie Forrest The Ecology of Echo. [Citation Graph (0, 0)][DBLP ] Artificial Life, 1997, v:3, n:3, pp:165-190 [Journal ] Carlo C. Maley , Stephanie Forrest Exploring the Relationship Between Neutral and Selective Mutations in Cancer. [Citation Graph (0, 0)][DBLP ] Artificial Life, 2000, v:6, n:4, pp:325-345 [Journal ] Melanie Mitchell , Stephanie Forrest Genetic Algorithms and Artificial Life. [Citation Graph (0, 0)][DBLP ] Artificial Life, 1994, v:1, n:3, pp:267-289 [Journal ] Stephanie Forrest , Steven A. Hofmeyr , Anil Somayaji Computer Immunology. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1997, v:40, n:10, pp:88-96 [Journal ] Justin Balthrop , Stephanie Forrest , Mark E. J. Newman , Matthew M. Williamson Technological networks and the spread of computer viruses [Citation Graph (0, 0)][DBLP ] CoRR, 2004, v:0, n:, pp:- [Journal ] Stephanie Forrest Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:1, pp:77-80 [Journal ] Stephanie Forrest , Robert E. Smith , Brenda Javornik , Alan S. Perelson Using Genetic Algorithms to Explore Pattern Recognition in the Immune System. [Citation Graph (0, 0)][DBLP ] Evolutionary Computation, 1993, v:1, n:3, pp:191-211 [Journal ] Steven A. Hofmeyr , Stephanie Forrest Architecture for an Artificial Immune System. [Citation Graph (0, 0)][DBLP ] Evolutionary Computation, 2000, v:8, n:4, pp:443-473 [Journal ] Matthew Glickman , Justin Balthrop , Stephanie Forrest A Machine Learning Evaluation of an Artificial Immune System. [Citation Graph (0, 0)][DBLP ] Evolutionary Computation, 2005, v:13, n:2, pp:179-212 [Journal ] Robert E. Smith , Stephanie Forrest , Alan S. Perelson Searching for Diverse, Cooperative Populations with Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] Evolutionary Computation, 1993, v:1, n:2, pp:127-149 [Journal ] Bruce D'Ambrosio , Michael R. Fehling , Stephanie Forrest , Peter Raulefs , B. Michael Wilber Real-Time Process Management for Materials Composition in Chemical Manufacturing. [Citation Graph (0, 0)][DBLP ] IEEE Expert, 1987, v:2, n:2, pp:80-93 [Journal ] Dennis L. Chao , Stephanie Forrest Information Immune Systems. [Citation Graph (0, 0)][DBLP ] Genetic Programming and Evolvable Machines, 2003, v:4, n:4, pp:311-331 [Journal ] Steven A. Hofmeyr , Stephanie Forrest , Anil Somayaji Intrusion Detection Using Sequences of System Calls. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1998, v:6, n:3, pp:151-180 [Journal ] Stephanie Forrest , Melanie Mitchell What Makes a Problem Hard for a Genetic Algorithm? Some Anomalous Results and Their Explanation. [Citation Graph (0, 0)][DBLP ] Machine Learning, 1993, v:13, n:, pp:285-319 [Journal ] Rebecca J. Parsons , Stephanie Forrest , Christian Burks Genetic Algorithms, Operators, and DNA Fragment Assembly. [Citation Graph (0, 0)][DBLP ] Machine Learning, 1995, v:21, n:1-2, pp:11-33 [Journal ] Jay S. Lark , Lee D. Erman , Stephanie Forrest , Kim P. Gostelow Concepts, Methods, and Languages for Building Timely Intelligent Systems. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 1990, v:2, n:1-2, pp:127-148 [Journal ] Hajime Inoue , Darko Stefanovic , Stephanie Forrest On the Prediction of Java Object Lifetimes. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2006, v:55, n:7, pp:880-892 [Journal ] Elena Gabriela Barrantes , David H. Ackley , Stephanie Forrest , Darko Stefanovic Randomized instruction set emulation. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:3-40 [Journal ] Kenneth L. Ingham , Anil Somayaji , John Burge , Stephanie Forrest Learning DFA representations of HTTP for protecting web applications. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:5, pp:1239-1255 [Journal ] Petter Holme , Josh Karlin , Stephanie Forrest Radial Structure of the Internet [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] The Evolution of System-Call Monitoring. [Citation Graph (, )][DBLP ] A genetic programming approach to automated software repair. [Citation Graph (, )][DBLP ] Designing better fitness functions for automated program repair. [Citation Graph (, )][DBLP ] Negative Ternary Set-Sharing. [Citation Graph (, )][DBLP ] Pretty Good BGP: Improving BGP by Cautiously Adopting Routes. [Citation Graph (, )][DBLP ] Automatically finding patches using genetic programming. [Citation Graph (, )][DBLP ] Automated program repair through the evolution of assembly code. [Citation Graph (, )][DBLP ] Anonymous Data Collection in Sensor Networks. [Citation Graph (, )][DBLP ] Simulating the Hallmarks of Cancer. [Citation Graph (, )][DBLP ] Automatic program repair with evolutionary computation. [Citation Graph (, )][DBLP ] An Integrated Model of Traffic, Geography and Economy in the Internet. [Citation Graph (, )][DBLP ] Autonomous security for autonomous systems. [Citation Graph (, )][DBLP ] An integrated model of traffic, geography and economy in the Internet [Citation Graph (, )][DBLP ] Nation-State Routing: Censorship, Wiretapping, and BGP [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.455secs