• Publications
  • Influence
An Indirect Genetic Algorithm for a Nurse Scheduling Problem
This paper describes a Genetic Algorithms (GAs) approach to a manpower-scheduling problem arising at a major UK hospital. Although GAs have been successfully used for similar problems in the past,Expand
  • 350
  • 27
Exploiting problem structure in a genetic algorithm approach to a nurse rostering problem
There is considerable interest in the use of genetic algorithms to solve problems arising in the areas of scheduling and timetabling. However, the classical genetic algorithm paradigm is not wellExpand
  • 200
  • 27
The Danger Theory and Its Application to Artificial Immune Systems
Over the last decade, a new idea challenging the classical self-non-self viewpoint has become popular amongst immunologists. It is called the Danger Theory. In this conceptual paper, we look at thisExpand
  • 250
  • 23
Information fusion for anomaly detection with the dendritic cell algorithm
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this familyExpand
  • 116
  • 18
Tailored RF pulse for magnetization inversion at ultrahigh field.
The radiofrequency (RF) transmit field is severely inhomogeneous at ultrahigh field due to both RF penetration and RF coil design issues. This particularly impairs image quality for sequences thatExpand
  • 100
  • 17
Danger Theory: The Link between AIS and IDS?
We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining theExpand
  • 338
  • 15
Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role ofExpand
  • 262
  • 15
Immune System Approaches to Intrusion Detection - A Review
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection fromExpand
  • 224
  • 12
Articulation and Clarification of the Dendritic Cell Algorithm
The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomalyExpand
  • 104
  • 12
Artificial Immune Systems
The human immune system has numerous properties that make it ripe for exploitation in the computational domain, such as robustness and fault tolerance, and many different algorithms, collectivelyExpand
  • 171
  • 10