{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:52:32Z","timestamp":1725551552384},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540263197"},{"type":"electronic","value":"9783540316732"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11499305_14","type":"book-chapter","created":{"date-parts":[[2010,4,9]],"date-time":"2010-04-09T05:39:11Z","timestamp":1270791551000},"page":"133-142","source":"Crossref","is-referenced-by-count":0,"title":["A New Immunotronic Approach to Hardware Fault Detection Using Symbiotic Evolution"],"prefix":"10.1007","author":[{"given":"Sanghyung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Euntai","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Eunjoo","family":"Song","sequence":"additional","affiliation":[]},{"given":"and Mignon","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"14_CR1","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1162\/evco.1993.1.3.191","volume":"1","author":"S. Forrest","year":"1993","unstructured":"Forrest, S., Javornik, B., Smith, R.E., Perelson, A.S.: Using Genetic Algorithms to Explore Pattern Recognition in the Immune System. Evolutionary Computation\u00a01(3), 191\u2013211 (1993)","journal-title":"Evolutionary Computation"},{"key":"14_CR2","first-page":"262","volume-title":"Artificial Immune System and Their Applications","author":"D. Dasgupta","year":"1998","unstructured":"Dasgupta, D., Forrest, S.: An anomaly detection algorithm inspired by the immune system. In: Dasgupta, D. (ed.) Artificial Immune System and Their Applications, pp. 262\u2013277. Springer, Berlin (1998)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Timmis, J., Neal, M., Hunt, J.: Data analysis using artificial immune systems, cluster analysis and Kohonen networks: some comparisons. In: Proc. of IEEE SMC 1999 Conference, vol.\u00a03(12-15), pp. 922\u2013927 (1999)","DOI":"10.1109\/ICSMC.1999.823351"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Xiao, R., Wang, L., Liu, Y.: A framework of AIS based pattern classification and matching for engineering creative design. In: Proc. of International Conference on Machine Learning and Cybernetics, vol.\u00a03(4-5), pp. 1554\u20131558 (November 2002)","DOI":"10.1109\/ICMLC.2002.1167471"},{"issue":"3","key":"14_CR5","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TEVC.2002.1011538","volume":"6","author":"D.W. Bradley","year":"2002","unstructured":"Bradley, D.W., Tyrrell, A.M.: Immunotronics-Novel Finite-State-Machine Architectures With Built-In Self-Test Using Self-Nonself Differentiation. IEEE Trans. on Evolutionary Computation\u00a06(3), 227\u2013238 (2002)","journal-title":"IEEE Trans. on Evolutionary Computation"},{"issue":"2","key":"14_CR6","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1109\/24.55885","volume":"39","author":"Y. Chen","year":"1990","unstructured":"Chen, Y., Chen, T.: Implementing fault-tolerance via modular redundancy with comparison. IEEE Trans. on Reliability, Volume: 39 Issue\u00a039(2), 217\u2013225 (1990)","journal-title":"IEEE Trans. on Reliability, Volume: 39 Issue"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1109\/12.620481","volume":"46","author":"S. Dutt","year":"1997","unstructured":"Dutt, S., Mahapatra, N.R.: Node-covering, error-correcting codes and multiprocessors with very high average fault tolerance. IEEE Trans. Comput.\u00a046, 997\u20131914 (1997)","journal-title":"IEEE Trans. Comput."},{"key":"14_CR8","volume-title":"Digital Circuit Testing and Testablilty","author":"P.K. Lala","year":"1997","unstructured":"Lala, P.K.: Digital Circuit Testing and Testablilty. Academic, New York (1997)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Forrest, S., Allen, L., Perelson, A.S., Cherukuri, R.: Self-Nonself Discrimination In A Computer. In: Proc. of IEEE Symposium on Research in Security and Privacy, pp. 202\u2013212 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"issue":"1","key":"14_CR10","doi-asserted-by":"crossref","first-page":"7","DOI":"10.5391\/IJFIS.2004.4.1.007","volume":"4","author":"S. Lee","year":"2004","unstructured":"Lee, S., Kim, E., Park, M.: A Biologically Inspired New Hardware Fault Detection: immunotronic and Genetic Algorithm-Based Approach. International Journal of Fuzzy Logic and Intelligent Systems\u00a04(1), 7\u201311 (2004)","journal-title":"International Journal of Fuzzy Logic and Intelligent Systems"},{"key":"14_CR11","volume-title":"Kuby Immunology","author":"R.A. Goldsby","year":"2000","unstructured":"Goldsby, R.A., Kindt, T.J., Osborne, B.A.: Kuby Immunology, 4th edn. W.H Freeman and Company, New York (2000)","edition":"4"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Juang, C., Lin, J., Lin, C.: Genetic Reinforcement Learning through Symbiotic Evolution for Fuzzy Controller Design. IEEE Trans. on Systems, Man And Cybernetics-Part B Cybernetics\u00a030(2) (April 2000)","DOI":"10.1109\/3477.836377"},{"key":"14_CR13","first-page":"11","volume":"22","author":"D.E. Moriarty","year":"1996","unstructured":"Moriarty, D.E., Miikkulanien, R.: Efficient reinforcement learning through symbiotic evolution. Mach. Learn\u00a022, 11\u201332 (1996)","journal-title":"Mach. Learn"},{"issue":"2","key":"14_CR14","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1162\/evco.1993.1.2.127","volume":"1","author":"R.E. Smith","year":"1993","unstructured":"Smith, R.E., Forrest, S., Perelson, A.S.: Searching for diverse, cooperative populations with genetic algorithms. Evol. Comput.\u00a01(2), 127\u2013149 (1993)","journal-title":"Evol. Comput."},{"key":"14_CR15","unstructured":"Yang, S.: Logic Synthesis and Optimization Benchmarks User Guide Version 3.0, Technical Report, Microelectronics Center of North Carolina (1991)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Knowledge Engineering Applications: A Bioinspired Approach"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11499305_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:01:49Z","timestamp":1605643309000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11499305_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540263197","9783540316732"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11499305_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}