| Applications of Artificial Immune Systems (Technical Stream) | |
| Negative Selection Algorithm for Aircraft Fault Detection | p. 1 |
| A Hierarchical Immune Network Applied to Gene Expression Data | p. 14 |
| Artificial Immune Regulation (AIR) for Model-Based Fault Diagnosis | p. 28 |
| Optimal Circuit Design Using Immune Algorithm | p. 42 |
| Conceptual, Formal, and Theoretical Frameworks (Conceptual Stream) | |
| Towards a Conceptual Framework for Artificial Immune Systems | p. 53 |
| Immunologic Responses Manipulation of AIS Agents | p. 65 |
| Optima, Extrema, and Artificial Immune Systems | p. 80 |
| Artificial Immune Systems for Robotics (Technical Stream) | |
| An Immuno Control Framework for Decentralized Mechatronic Control | p. 91 |
| AIS Based Robot Navigation in a Rescue Scenario | p. 106 |
| Reactive Immune Network Based Mobile Robot Navigation | p. 119 |
| Emerging Metaphors (Conceptual Stream) | |
| A Fractal Immune Network | p. 133 |
| Nootropia: A User Profiling Model Based on a Self-Organising Term Network | p. 146 |
| Towards Danger Theory Based Artificial APC Model: Novel Metaphor for Danger Susceptible Data Codons | p. 161 |
| Online Negative Databases | p. 175 |
| Special Session on Immunoinformatics | |
| Definition of MHC Supertypes Through Clustering of MHC Peptide Binding Repertoires | p. 189 |
| BcePred: Prediction of Continuous B-Cell Epitopes in Antigenic Sequences Using Physico-chemical Properties | p. 197 |
| Integration of Immune Models Using Petri Nets | p. 205 |
| MHC Class I Epitope Binding Prediction Trained on Small Data Sets | p. 217 |
| Theoretical and Experimental Studies on Artificial Immune Systems (Technical Stream) | |
| Convergence Analysis of a Multiobjective Artificial Immune System Algorithm | p. 226 |
| A Comparison of Immune and Neural Computing for Two Real-Life Tasks of Pattern Recognition | p. 236 |
| An Artificial Immune System Based Visual Analysis Model and Its Real-Time Terrain Surveillance Application | p. 250 |
| Exploring the Capability of Immune Algorithms: A Characterization of Hypermutation Operators | p. 263 |
| Future Applications (Conceptual Stream) | |
| Exploiting Immunological Properties for Ubiquitous Computing Systems | p. 277 |
| A Robust Immune Based Approach to the Iterated Prisoner's Dilemma | p. 290 |
| Artificial Innate Immune System: An Instant Defence Layer of Embryonics | p. 302 |
| Immune System Approaches to Intrusion Detection - A Review | p. 316 |
| Multimodal Search with Immune Based Genetic Programming | p. 330 |
| Networks (Technical Stream) | |
| An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal, and Memory Detectors | p. 342 |
| Developing Efficient Search Algorithms for P2P Networks Using Proliferation and Mutation | p. 357 |
| Modelling (Conceptual Stream) | |
| A Game-Theoretic Approach to Artificial Immune Networks | p. 372 |
| Modelling Immune Memory for Prediction and Computation | p. 386 |
| Immunity Through Swarms: Agent-Based Simulations of the Human Immune System | p. 400 |
| Distinguishing Properties of Artificial Immune Systems (Conceptual Stream) | |
| Studies on the Implications of Shape-Space Models for Idiotypic Networks | p. 413 |
| Exploiting Parallelism Inherent in AIRS, an Artificial Immune Classifier | p. 427 |
| An Overview of Computational and Theoretical Immunology | p. 439 |
| Author Index | p. 443 |
| Table of Contents provided by Publisher. All Rights Reserved. |