{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:24:09Z","timestamp":1743081849265,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540851936"},{"type":"electronic","value":"9783540851943"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85194-3_4","type":"book-chapter","created":{"date-parts":[[2008,8,19]],"date-time":"2008-08-19T06:21:05Z","timestamp":1219126865000},"page":"8-18","source":"Crossref","is-referenced-by-count":3,"title":["Immune Systems and Computation: An Interdisciplinary Adventure"],"prefix":"10.1007","author":[{"given":"Jon","family":"Timmis","sequence":"first","affiliation":[]},{"given":"Paul","family":"Andrews","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Owens","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Clark","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Andrews, P.S., Timmis, J.: Inspiration for the next generation of artificial immune systems. In: Jacob, et al. (eds.) [19], pp. 126\u2013138","DOI":"10.1007\/11536444_10"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Bersini, H.: Immune system modeling: The OO way. In: Bersini, Carneiro (eds.) [3], pp. 150\u2013163","DOI":"10.1007\/11823940_12"},{"key":"4_CR3","unstructured":"Bersini, H., Carneiro, J. (eds.): ICARIS 2006. LNCS, vol.\u00a04163. Springer, Heidelberg (2006)"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1038\/nri2102","volume":"7","author":"I.R. Cohen","year":"2007","unstructured":"Cohen, I.R.: Real and artificial immune systems: Computing the state of the body. Imm. Rev.\u00a07, 569\u2013574 (2007)","journal-title":"Imm. Rev."},{"volume-title":"Artificial Immune Systems and their Applications","year":"1999","key":"4_CR5","unstructured":"Dasgupta, D. (ed.): Artificial Immune Systems and their Applications. Springer, Heidelberg (1999)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Davoudani, D., Hart, E., Paechter, B.: An immune-inspired approach to speckled computing. In: de Castro, et al. (eds.) [9], pp. 288\u2013299","DOI":"10.1007\/978-3-540-73922-7_25"},{"key":"4_CR7","unstructured":"de Castro, L.N., Von Zuben, F.J.: Artificial immune systems: Part I\u2014basic theory and applications. Technical Report DCA-RT 01\/99, School of Computing and Electrical Engineering, State University of Campinas, Brazil (1999)"},{"key":"4_CR8","unstructured":"de Castro, L.N., Von Zuben, F.J.: Artificial immune systems: Part II\u2014a survey of applications. Technical Report DCA-RT 02\/00, School of Computing and Electrical Engineering, State University of Campinas, Brazil (2000)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Artificial Immune Systems","year":"2007","unstructured":"de Castro, L.N., Von Zuben, F.J., Knidel, H. (eds.): ICARIS 2007. LNCS, vol.\u00a04628. Springer, Heidelberg (2007)"},{"issue":"1","key":"4_CR10","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1111\/j.1600-065X.2007.00499.x","volume":"216","author":"S. Forrest","year":"2007","unstructured":"Forrest, S., Beauchemin, C.: Computer Immunology. Immunol. Rev.\u00a0216(1), 176\u2013197 (2007)","journal-title":"Immunol. Rev."},{"issue":"4","key":"4_CR11","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1109\/TEVC.2006.884042","volume":"11","author":"A. Freitas","year":"2007","unstructured":"Freitas, A., Timmis, J.: Revisiting the foundations of artificial immune systems for data mining. IEEE Trans. Evol. Comp.\u00a011(4), 521\u2013540 (2007)","journal-title":"IEEE Trans. Evol. Comp."},{"issue":"2","key":"4_CR12","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1162\/1063656054088512","volume":"13","author":"S. Garrett","year":"2005","unstructured":"Garrett, S.: How do we evaluate artificial immune systems? Evolutionary Computation\u00a013(2), 145\u2013177 (2005)","journal-title":"Evolutionary Computation"},{"issue":"25","key":"4_CR13","doi-asserted-by":"publisher","first-page":"2340","DOI":"10.1021\/j100540a008","volume":"81","author":"D. Gillespie","year":"1977","unstructured":"Gillespie, D.: Approximate accelerated stochastic simulation of chemically reacting systems. J. Phys. Chem.\u00a081(25), 2340\u20132361 (1977)","journal-title":"J. Phys. Chem."},{"key":"4_CR14","volume-title":"Immunology","author":"R.A. Goldsby","year":"2003","unstructured":"Goldsby, R.A., Kindt, T.J., Osborne, B.A., Kuby, J.: Immunology, 5th edn. W. H. Freeman and Company, New York (2003)","edition":"5"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Guzella, T., Mota-Santos, T., Caminhas, W.: Towards a novel immune inspired approach to temporal anomaly detection. In: de Castro, et al. (eds.) [9], pp. 119\u2013130","DOI":"10.1007\/978-3-540-73922-7_11"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/0167-6423(87)90035-9","volume":"8","author":"D. Harel","year":"1987","unstructured":"Harel, D.: Statecharts: a visual formalism for complex systems. Sci. Computer Program\u00a08, 231\u2013274 (1987)","journal-title":"Sci. Computer Program"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Hart, E., Santos, F., Bersini, H.: Topological constraints in the evolution of idiotypic networks. In: de Castro, et al. (eds.) [9], pp. 252\u2013263","DOI":"10.1007\/978-3-540-73922-7_22"},{"issue":"1","key":"4_CR18","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.asoc.2006.12.004","volume":"8","author":"E. Hart","year":"2008","unstructured":"Hart, E., Timmis, J.: Application areas of AIS: The past, the present and the future. Applied Soft Computing\u00a08(1), 191\u2013201 (2008); (in Press, Corrected Proof) (February 12, 2007)","journal-title":"Applied Soft Computing"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","volume-title":"Artificial Immune Systems","year":"2005","unstructured":"Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.): ICARIS 2005. LNCS, vol.\u00a03627. Springer, Heidelberg (2005)"},{"key":"4_CR20","unstructured":"Janeway, C.A., Travers, P., Walport, M., Shlomchik, M.: Immunobiology, 5th edn. Garland Publishing (2001)"},{"key":"4_CR21","first-page":"123","volume-title":"Congress on Evolutionary Computation","author":"Z. Ji","year":"2003","unstructured":"Ji, Z., Dasgupta, D.: Artificial immune system (AIS) research in the last five years. In: Congress on Evolutionary Computation, Canberra, Australia, December 8\u201312, vol.\u00a01, pp. 123\u2013130. IEEE, Los Alamitos (2003)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection - a review. In: Natural Computing (2007) (in print)","DOI":"10.1007\/s11047-006-9026-4"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"McEwan, C., Hart, E., Paechter, B.: Revisiting the central and peripheral immune system. In: de Castro, et al. (eds.) [9], pp. 240\u2013251","DOI":"10.1007\/978-3-540-73922-7_21"},{"key":"4_CR24","first-page":"313","volume-title":"Silico Immuonology, chapter Go Dutch: Exploit Interactions and Environments with Artificial Immune Systems","author":"M. Neal","year":"2007","unstructured":"Neal, M., Trapnel, B.: Silico Immuonology, chapter Go Dutch: Exploit Interactions and Environments with Artificial Immune Systems, pp. 313\u2013330. Springer, Heidelberg (2007)"},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","volume-title":"Artificial Immune Systems","year":"2004","unstructured":"Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.): ICARIS 2004. LNCS, vol.\u00a03239. Springer, Heidelberg (2004)"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Owens, N., Timmis, J., Greensted, A., Tyrrell, A.: On immune inspired homeostasis for electronic systems. In: de Castro, et al. (eds.) [9], pp. 216\u2013227","DOI":"10.1007\/978-3-540-73922-7_19"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of the 7th International Conference on Artificial Immune Systems","author":"N. Owens","year":"2008","unstructured":"Owens, N., Timmis, J., Tyrrell, A., Greensted, A.: Modelling the tunability of early t-cell activation events. In: Proceedings of the 7th International Conference on Artificial Immune Systems. LNCS. Springer, Heidelberg (2008)"},{"key":"4_CR28","series-title":"Lecture Notes in Bioinformatics","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-540-75140-3_13","volume-title":"Computational Methods in Systems Biology","author":"A. Phillips","year":"2007","unstructured":"Phillips, A., Cardelli, L.: Efficient, correct simulation of biological processes in the stochastic pi-calculus. In: Calder, M., Gilmore, S. (eds.) CMSB 2007. LNCS (LNBI), vol.\u00a04695, pp. 184\u2013199. Springer, Heidelberg (2007)"},{"issue":"7","key":"4_CR29","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1093\/comjnl\/38.7.578","volume":"38","author":"C. Priami","year":"1995","unstructured":"Priami, C.: Stochastic \u03c0-calculus. The Computer Journal\u00a038(7), 578\u2013589 (1995)","journal-title":"The Computer Journal"},{"key":"4_CR30","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/S0020-0190(01)00214-9","volume":"80","author":"C. Priami","year":"2001","unstructured":"Priami, C., Regev, A., Shapiro, E.: Application of a stochastic name-passing calculus to representation for biological processes in the stochastic \u03c0-calculus. Information Processing Letters\u00a080, 25\u201331 (2001)","journal-title":"Information Processing Letters"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Regev, A., Silverman, W., Shapiro, E.: Representation and simulation of bio-chemical processes using the pi-calculus process algebra. In: Pacific Symposium on Biocomputing, vol.\u00a06, pp. 459\u2013470 (2001)","DOI":"10.1142\/9789814447362_0045"},{"issue":"3","key":"4_CR32","first-page":"315","volume":"1","author":"S. Stepney","year":"2006","unstructured":"Stepney, S., Smith, R., Timmis, J., Tyrrell, A., Neal, M., Hone, A.: Conceptual frameworks for artificial immune systems. Int. J. Unconventional Computing\u00a01(3), 315\u2013338 (2006)","journal-title":"Int. J. Unconventional Computing"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Stepney, S., Smith, R.E., Timmis, J., Tyrrell, A.M.: Towards a conceptual framework for artificial immune systems. In: Nicosia, et al. (eds.) [25], pp. 53\u201364","DOI":"10.1007\/978-3-540-30220-9_5"},{"issue":"1","key":"4_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11047-006-9029-1","volume":"6","author":"J. Timmis","year":"2007","unstructured":"Timmis, J.: Artificial immune systems: Today and tomorow. Natural Computing\u00a06(1), 1\u201318 (2007)","journal-title":"Natural Computing"},{"issue":"1","key":"4_CR35","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s12065-007-0004-2","volume":"1","author":"J. Timmis","year":"2008","unstructured":"Timmis, J., Andrews, P.S., Owens, N., Clark, E.: An interdisciplinary perpective on artificial immune systems. Evolutionary Intelligence\u00a01(1), 5\u201326 (2008)","journal-title":"Evolutionary Intelligence"},{"key":"4_CR36","series-title":"Lecture Notes in Computer Science","volume-title":"Artificial Immune Systems","year":"2003","unstructured":"Timmis, J., Bentley, P.J., Hart, E. (eds.): ICARIS 2003. LNCS, vol.\u00a02787. Springer, Heidelberg (2003)"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Timmis, J., Bentley, P.J. (eds.): Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS 2002). University of Kent Printing Unit (2002)","DOI":"10.1007\/b12020"},{"key":"4_CR38","doi-asserted-by":"crossref","unstructured":"Timmis, J., Hone, A., Stibor, T., Clark, E.: Theoretical advances in artificial immune systems. Journal of Theoretical Computer Science (in press, 2008) (doi:10.1016\/j.tcs.2008.02.011)","DOI":"10.1016\/j.tcs.2008.02.011"},{"key":"4_CR39","doi-asserted-by":"crossref","unstructured":"Timmis, J., Knight, T.: Data Mining: A Heuristic Approach, chapter Artificial immune systems: Using the immune system as inspiration for data mining, pp. 209\u2013230. Idea Group (2001)","DOI":"10.4018\/978-1-930708-25-9.ch011"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Twycross, J., Aickelin, U.: Towards a conceptual framework for innate immunity. In: Jacob, et al. (eds.) [19], pp. 112\u2013125","DOI":"10.1007\/11536444_9"},{"key":"4_CR41","doi-asserted-by":"crossref","unstructured":"Voigt, D., Wirth, H., Dilger, W.: A computational models for the cognitive immune system theory based on learning classifier systems. In: de Castro, et al. (eds.) [9], pp. 264\u2013275","DOI":"10.1007\/978-3-540-73922-7_23"}],"container-title":["Lecture Notes in Computer Science","Unconventional Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85194-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T15:26:51Z","timestamp":1738337211000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-85194-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540851936","9783540851943"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85194-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}