Learn More
The problem of protecting computer systems can be viewed generally as the problem of learning to distinguish self from other. We describe a method for change detection which is based on the generation of T cells in the immune system. Mathematical analysis reveals computational costs of the system, and preliminary experiments illustrate how the method might(More)
The problem of protecting computer systems can be viewed in part as the problem of distinguishing self from other. We describe a method for accomplishing this which is based on the way natural immune systems generate T-cells. The two-phase algorithm rst generates a set of detectors that do not match self. In the second phase, these detectors are used to(More)
PURPOSE Family history is associated with gliomas, but this association has not been established for benign brain tumors. Using information from newly diagnosed primary brain tumor patients, we describe patterns of family cancer histories in patients with benign brain tumors and compare those to patients with gliomas. METHODS Newly diagnosed primary brain(More)
  • 1