Busque entre los 164349 recursos disponibles en el repositorio
Mostrar el registro sencillo del ítem
dc.date.accessioned | 2010-10-05T19:17:59Z | |
dc.date.available | 2010-10-05T03:00:00Z | |
dc.date.issued | 2000 | |
dc.identifier.uri | http://sedici.unlp.edu.ar/handle/10915/9400 | |
dc.description.abstract | The paper provides a brief introduction into a relatively new discipline: artificial immune systems (AIS). These are computer systems exploiting the natural immune system (or NIS for brevity) metaphor: protect an organism against invaders. Hence, a natural field of applications of AIS is computer security. But the notion of invader can be extended further: for instance a fault occurring in a system disturbs patterns of its regular functioning. Thus fault, or anomaly detection is another field of applications. It is convenient to represent the information about normal and abnormal functioning of a system in binary form (e.g. computer programs/viruses are binary files). Now the problem can be stated as follows: given a set of self patterns representing normal behaviour of a system under considerations find a set of detectors (i.e, antibodies, or more precisely, receptors) identifying all non self strings corresponding to abnormal states of the system. A new algorithm for generating antibody strings is presented. Its interesting property is that it allows to find in advance the number of of strings which cannot be detected by an "ideal" receptors repertoire. | en |
dc.language | en | es |
dc.subject | Applications | es |
dc.subject | binary inmune system; schemas; binary receptors; detection probability; lower bounds on failure probability; maximal detectability | en |
dc.title | Discriminative power of the receptors activated by k-contiguous bits rule | en |
dc.type | Articulo | es |
sedici.identifier.uri | http://journal.info.unlp.edu.ar/wp-content/uploads/ipaper.pdf | es |
sedici.identifier.issn | 1666-6038 | es |
sedici.creator.person | Wierzchon, Slawomir T. | es |
sedici.subject.materias | Ciencias Informáticas | es |
sedici.description.fulltext | true | es |
mods.originInfo.place | Facultad de Informática | es |
sedici.subtype | Articulo | es |
sedici.rights.license | Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0) | |
sedici.rights.uri | http://creativecommons.org/licenses/by-nc/3.0/ | |
sedici.description.peerReview | peer-review | es |
sedici2003.identifier | ARG-UNLP-ART-0000006645 | es |
sedici.relation.journalTitle | Journal of Computer Science & Technology | es |
sedici.relation.journalVolumeAndIssue | vol. 1, no. 3 | es |