default search action
Stephanie Forrest
Person information
- affiliation: Arizona State University, Tempe, AZ, USA
- affiliation: Santa Fe Institute, Tempe, AZ, USA
- affiliation (former): University of New Mexico in Albuquerque, USA
- award (2011): ACM - AAAI Allen Newell Award
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Michael Sandborn, Zach Stoebner, Westley Weimer, Stephanie Forrest, Ryan E. Dougherty, Jules White, Kevin Leach:
Reducing Malware Analysis Overhead With Coverings. IEEE Trans. Dependable Secur. Comput. 21(4): 4133-4146 (2024) - [c94]Joseph Renzullo, Westley Weimer, Stephanie Forrest:
Combining Online Learning with Mutation-Based Stochastic Search to Repair Buggy Programs. GECCO Companion 2024: 53-54 - [c93]Ryan Edward Dougherty, Dylan Nathan Green, Hyunmook Kang, Grace Miro Kim, Stephanie Forrest:
A Multi-Objective Genetic Algorithm for Location in Interaction Testing. GECCO Companion 2024: 715-718 - [c92]Kirtus G. Leyba, Steven A. Hofmeyr, Stephanie Forrest, Judy L. Cannon, Melanie E. Moses:
SIMCoV-GPU: Accelerating an Agent-Based Model for Exascale. HPDC 2024: 322-333 - [i23]Joseph Renzullo, Pemma Reiter, Westley Weimer, Stephanie Forrest:
Automated Program Repair: Emerging trends pose and expose problems for benchmarks. CoRR abs/2405.05455 (2024) - [i22]Cole Mathis, Devansh Patel, Westley Weimer, Stephanie Forrest:
Self-Organization in Computation & Chemistry: Return to AlChemy. CoRR abs/2408.12137 (2024) - 2023
- [j46]Joseph Renzullo, Westley Weimer, Stephanie Forrest:
Evolving Software: Combining Online Learning with Mutation-Based Stochastic Search. ACM Trans. Evol. Learn. Optim. 3(4): 13:1-13:32 (2023) - [i21]Jhe-Yu Liou, Stephanie Forrest, Carole-Jean Wu:
GEVO-ML: Optimizing Machine Learning Code with Evolutionary Computation. CoRR abs/2310.10211 (2023) - 2022
- [j45]Cameron Buckner, Risto Miikkulainen, Stephanie Forrest, Silvia Milano, James Zou, Carina Prunk, Christopher Irrgang, I. Glenn Cohen, Hao Su, Robin R. Murphy, Russell H. Taylor, Axel Krieger, Mirko Kovac, Jathan Sadowski, Vidushi Marda:
AI reflections in 2021. Nat. Mach. Intell. 4(1): 5-10 (2022) - [c91]Antonio M. Espinoza, Riley Wood, Stephanie Forrest, Mohit Tiwari:
Back to the future: N-Versioning of Microservices. DSN 2022: 415-427 - [c90]Pemma Reiter, Antonio M. Espinoza, Adam Doupé, Ruoyu Wang, Westley Weimer, Stephanie Forrest:
Improving source-code representations to enhance search-based software repair. GECCO 2022: 1336-1344 - [c89]Madeline Endres, Pemma Reiter, Stephanie Forrest, Westley Weimer:
What Can Program Repair Learn From Code Review? APR@ICSE 2022: 33-37 - [c88]Jhe-Yu Liou, Muaaz Awan, Steven A. Hofmeyr, Stephanie Forrest, Carole-Jean Wu:
Understanding the Power of Evolutionary Computation for GPU Code Optimization. IISWC 2022: 185-198 - [c87]Kirtus G. Leyba, Joshua J. Daymude, Jean-Gabriel Young, M. E. J. Newman, Jennifer Rexford, Stephanie Forrest:
Cutting Through the Noise to Infer Autonomous System Topology. INFOCOM 2022: 1609-1618 - [c86]Kevin Leach, Christopher Steven Timperley, Kevin Angstadt, Anh Nguyen-Tuong, Jason Hiser, Aaron Paulos, Partha P. Pal, Patrick Hurley, Carl Thomas, Jack W. Davidson, Stephanie Forrest, Claire Le Goues, Westley Weimer:
START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report). ISSRE 2022: 73-84 - [c85]Hammad Ahmad, Padraic Cashin, Stephanie Forrest, Westley Weimer:
Digging into Semantics: Where Do Search-Based Software Repair Methods Search? PPSN (2) 2022: 3-18 - [i20]Kirtus G. Leyba, Joshua J. Daymude, Jean-Gabriel Young, M. E. J. Newman, Jennifer Rexford, Stephanie Forrest:
Cutting Through the Noise to Infer Autonomous System Topology. CoRR abs/2201.07328 (2022) - [i19]Pemma Reiter, Hui Jun Tay, Westley Weimer, Adam Doupé, Ruoyu Wang, Stephanie Forrest:
Automatically Mitigating Vulnerabilities in x86 Binary Programs via Partially Recompilable Decompilation. CoRR abs/2202.12336 (2022) - [i18]Jhe-Yu Liou, Muaaz Awan, Steven A. Hofmeyr, Stephanie Forrest, Carole-Jean Wu:
Understanding the Power of Evolutionary Computation for GPU Code Optimization. CoRR abs/2208.12350 (2022) - 2021
- [j44]Risto Miikkulainen, Stephanie Forrest:
A biological perspective on evolutionary computation. Nat. Mach. Intell. 3(1): 9-15 (2021) - [j43]Melanie E. Moses, Steven A. Hofmeyr, Judy L. Cannon, Akil Andrews, Rebekah Gridley, Monica Hinga, Kirtus G. Leyba, Abigail Pribisova, Vanessa Surjadidjaja, Humayra Tasnim, Stephanie Forrest:
Spatially distributed infection increases viral load in a computational model of SARS-CoV-2 lung infection. PLoS Comput. Biol. 17(12) (2021) - [c84]Muhilan Ramamoorthy, Stephanie Forrest, Violet R. Syrotiuk:
MA-ABC: a memetic algorithm optimizing attractiveness, balance, and cost for capacitated Arc routing problems. GECCO 2021: 1043-1051 - [c83]Yu Huang, Hammad Ahmad, Stephanie Forrest, Westley Weimer:
Applying Automated Program Repair to Dataflow Programming Languages. GI@ICSE 2021: 21-22 - [c82]Joseph Renzullo, Westley Weimer, Stephanie Forrest:
Multiplicative Weights Algorithms for Parallel Automated Software Repair. IPDPS 2021: 984-993 - [i17]Mohsen Ahmadi, Kevin Leach, Ryan E. Dougherty, Stephanie Forrest, Westley Weimer:
MIMOSA: Reducing Malware Analysis Overhead with Coverings. CoRR abs/2101.07328 (2021) - [i16]Robert Axelrod, Joshua J. Daymude, Stephanie Forrest:
Preventing Extreme Polarization of Political Attitudes. CoRR abs/2103.06492 (2021) - [i15]Edward C. Schrom II, Ann Kinzig, Stephanie Forrest, Andrea L. Graham, Simon A. Levin, Carl T. Bergstrom, Carlos Castillo-Chavez, James P. Collins, Rob J. De Boer, Adam Doupé, Roya Ensafi, Stuart I. Feldman, Bryan T. Grenfell, J. Alex Halderman, Silvie Huijben, Carlo C. Maley, Melanie E. Moses, Alan S. Perelson, Charles Perrings, Joshua B. Plotkin, Jennifer Rexford, Mohit Tiwari:
Challenges in cybersecurity: Lessons from biological defense systems. CoRR abs/2107.10344 (2021) - 2020
- [j42]Joel Lehman, Jeff Clune, Dusan Misevic, Christoph Adami, Lee Altenberg, Julie Beaulieu, Peter J. Bentley, Samuel Bernard, Guillaume Beslon, David M. Bryson, Nick Cheney, Patryk Chrabaszcz, Antoine Cully, Stéphane Doncieux, Fred C. Dyer, Kai Olav Ellefsen, Robert Feldt, Stephan Fischer, Stephanie Forrest, Antoine Frénoy, Christian Gagné, Léni K. Le Goff, Laura M. Grabowski, Babak Hodjat, Frank Hutter, Laurent Keller, Carole Knibbe, Peter Krcah, Richard E. Lenski, Hod Lipson, Robert MacCurdy, Carlos Maestre, Risto Miikkulainen, Sara Mitri, David E. Moriarty, Jean-Baptiste Mouret, Anh Nguyen, Charles Ofria, Marc Parizeau, David P. Parsons, Robert T. Pennock, William F. Punch, Thomas S. Ray, Marc Schoenauer, Eric Schulte, Karl Sims, Kenneth O. Stanley, François Taddei, Danesh Tarapore, Simon Thibault, Richard A. Watson, Westley Weimer, Jason Yosinski:
The Surprising Creativity of Digital Evolution: A Collection of Anecdotes from the Evolutionary Computation and Artificial Life Research Communities. Artif. Life 26(2): 274-306 (2020) - [j41]Jhe-Yu Liou, Xiaodong Wang, Stephanie Forrest, Carole-Jean Wu:
GEVO: GPU Code Optimization Using Evolutionary Computation. ACM Trans. Archit. Code Optim. 17(4): 33:1-33:28 (2020) - [c81]Yujun Qin, Samuel Gonzalez, Kevin Angstadt, Xiaowei Wang, Stephanie Forrest, Reetuparna Das, Kevin Leach, Westley Weimer:
MARTINI: Memory Access Traces to Detect Attacks. CCSW 2020: 77-90 - [c80]Jhe-Yu Liou, Xiaodong Wang, Stephanie Forrest, Carole-Jean Wu:
GEVO-ML: a proposal for optimizing ML code with evolutionary computation. GECCO Companion 2020: 1849-1856 - [c79]Carianne Martinez, David A. Najera-Flores, Adam R. Brink, D. Dane Quinn, Eleni N. Chatzi, Stephanie Forrest:
Confronting Domain Shift in Trained Neural Networks. Preregister@NeurIPS 2020: 176-192 - [i14]Jhe-Yu Liou, Xiaodong Wang, Stephanie Forrest, Carole-Jean Wu:
GEVO: GPU Code Optimization using Evolutionary Computation. CoRR abs/2004.08140 (2020)
2010 – 2019
- 2019
- [j40]Jonathan Dorn, Jeremy Lacomis, Westley Weimer, Stephanie Forrest:
Automatically Exploring Tradeoffs Between Software Output Fidelity and Energy Costs. IEEE Trans. Software Eng. 45(3): 219-236 (2019) - [c78]Kirtus G. Leyba, Benjamin Edwards, Cynthia Freeman, Jedidiah R. Crandall, Stephanie Forrest:
Borders and gateways: measuring and analyzing national as chokepoints. COMPASS 2019: 184-194 - [c77]Ryan E. Dougherty, Erin Lanus, Charles J. Colbourn, Stephanie Forrest:
Genetic algorithms for affine transformations to existential t-restrictions. GECCO (Companion) 2019: 1707-1708 - [c76]Kevin Leach, Ryan E. Dougherty, Chad Spensky, Stephanie Forrest, Westley Weimer:
Evolutionary computation for improving malware analysis. GI@ICSE 2019: 18-19 - [c75]Jhe-Yu Liou, Stephanie Forrest, Carole-Jean Wu:
Genetic improvement of GPU code. GI@ICSE 2019: 20-27 - [c74]Jessica Jones, Jason D. Hiser, Jack W. Davidson, Stephanie Forrest:
Defeating denial-of-service attacks in a self-managing N-variant system. SEAMS@ICSE 2019: 126-138 - [c73]Padraic Cashin, Carianne Martinez, Westley Weimer, Stephanie Forrest:
Understanding Automatically-Generated Patches Through Symbolic Invariant Differences. ASE 2019: 411-414 - [i13]ThanhVu Nguyen, Westley Weimer, Deepak Kapur, Stephanie Forrest:
Connecting Program Synthesis and Reachability: Automatic Program Repair using Test-Input Generation. CoRR abs/1903.11765 (2019) - [i12]ThanhVu Nguyen, Deepak Kapur, Westley Weimer, Stephanie Forrest:
Using Dynamic Analysis to Generate Disjunctive Invariants. CoRR abs/1904.07463 (2019) - [i11]Benjamin Edwards, Jay Jacobs, Stephanie Forrest:
Risky Business: Assessing Security with External Measurements. CoRR abs/1904.11052 (2019) - 2018
- [c72]Stephanie Forrest:
The biology of software. HPDC 2018: 218 - [c71]Joseph Renzullo, Westley Weimer, Melanie E. Moses, Stephanie Forrest:
Neutrality and epistasis in program space. GI@ICSE 2018: 1-8 - [i10]Joel Lehman, Jeff Clune, Dusan Misevic, Christoph Adami, Lee Altenberg, Julie Beaulieu, Peter J. Bentley, Samuel Bernard, Guillaume Beslon, David M. Bryson, Patryk Chrabaszcz, Nick Cheney, Antoine Cully, Stéphane Doncieux, Fred C. Dyer, Kai Olav Ellefsen, Robert Feldt, Stephan Fischer, Stephanie Forrest, Antoine Frénoy, Christian Gagné, Leni K. Le Goff, Laura M. Grabowski, Babak Hodjat, Frank Hutter, Laurent Keller, Carole Knibbe, Peter Krcah, Richard E. Lenski, Hod Lipson, Robert MacCurdy, Carlos Maestre, Risto Miikkulainen, Sara Mitri, David E. Moriarty, Jean-Baptiste Mouret, Anh Nguyen, Charles Ofria, Marc Parizeau, David P. Parsons, Robert T. Pennock, William F. Punch, Thomas S. Ray, Marc Schoenauer, Eric Schulte, Karl Sims, Kenneth O. Stanley, François Taddei, Danesh Tarapore, Simon Thibault, Westley Weimer, Richard A. Watson, Jason Yosinski:
The Surprising Creativity of Digital Evolution: A Collection of Anecdotes from the Evolutionary Computation and Artificial Life Research Communities. CoRR abs/1803.03453 (2018) - [i9]Justyna Petke, Claire Le Goues, Stephanie Forrest, William B. Langdon:
Genetic Improvement of Software (Dagstuhl Seminar 18052). Dagstuhl Reports 8(1): 158-182 (2018) - 2017
- [j39]Benjamin Edwards, Alexander Furnas, Stephanie Forrest, Robert Axelrod:
Strategic aspects of cyberattack, attribution, and blame. Proc. Natl. Acad. Sci. USA 114(11): 2825-2830 (2017) - [j38]Claire Le Goues, Yuriy Brun, Stephanie Forrest, Westley Weimer:
Clarifications on the Construction and Use of the ManyBugs Benchmark. IEEE Trans. Software Eng. 43(11): 1089-1090 (2017) - [c70]John Ericksen, Melanie E. Moses, Stephanie Forrest:
Automatically evolving a general controller for robot swarms. SSCI 2017: 1-8 - [c69]Drew Levin, Melanie E. Moses, Tatiana Paz Flanagan, Stephanie Forrest, Patrick D. Finley:
Negative selection based anomaly detector for multimodal health data. SSCI 2017: 1-7 - [c68]ThanhVu Nguyen, Westley Weimer, Deepak Kapur, Stephanie Forrest:
Connecting Program Synthesis and Reachability: Automatic Program Repair Using Test-Input Generation. TACAS (1) 2017: 301-318 - 2016
- [j37]Stephanie Forrest, Melanie Mitchell:
Adaptive computation: the multidisciplinary legacy of John H. Holland. Commun. ACM 59(8): 58-63 (2016) - [j36]Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest:
Hype and heavy tails: A closer look at data breaches. J. Cybersecur. 2(1): 3-14 (2016) - [c67]Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, Westley Weimer, Jonathan Burket, Gregory L. Frazier, Tiffany M. Frazier, Bruno Dutertre, Ian A. Mason, Natarajan Shankar, Stephanie Forrest:
Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery. CISRC 2016: 17:1-17:4 - [c66]Westley Weimer, Stephanie Forrest, Miryung Kim, Claire Le Goues, Patrick Hurley:
Trusted Software Repair for System Resiliency. DSN Workshops 2016: 238-241 - [c65]George Stelle, Darko Stefanovic, Stephen L. Olivier, Stephanie Forrest:
Cactus Environment Machine - Shared Environment Call-by-Need. TFP 2016: 24-43 - 2015
- [j35]Claire Le Goues, Neal J. Holtschulte, Edward K. Smith, Yuriy Brun, Premkumar T. Devanbu, Stephanie Forrest, Westley Weimer:
The ManyBugs and IntroClass Benchmarks for Automated Repair of C Programs. IEEE Trans. Software Eng. 41(12): 1236-1256 (2015) - [c64]Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest, Michel van Eeten:
Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls. ACSAC 2015: 391-400 - [c63]Drew Levin, Joshua P. Hecker, Melanie E. Moses, Stephanie Forrest:
Volatility and spatial distribution of resources determine ant foraging strategies. ECAL 2015: 256-263 - [c62]Eric M. Schulte, Westley Weimer, Stephanie Forrest:
Repairing COTS Router Firmware without Access to Source Code or Test Suites: A Case Study in Evolutionary Software Repair. GECCO (Companion) 2015: 847-854 - [c61]Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest:
Hype and Heavy Tails: A Closer Look at Data Breaches. WEIS 2015 - 2014
- [j34]Eric M. Schulte, Zachary P. Fry, Ethan Fast, Westley Weimer, Stephanie Forrest:
Software mutational robustness. Genet. Program. Evolvable Mach. 15(3): 281-312 (2014) - [j33]ThanhVu Nguyen, Deepak Kapur, Westley Weimer, Stephanie Forrest:
DIG: A Dynamic Invariant Generator for Polynomial and Array Invariants. ACM Trans. Softw. Eng. Methodol. 23(4): 30:1-30:30 (2014) - [c60]Eric M. Schulte, Jonathan Dorn, Stephen Harding, Stephanie Forrest, Westley Weimer:
Post-compiler software optimization for reducing energy. ASPLOS 2014: 639-652 - [c59]ThanhVu Nguyen, Deepak Kapur, Westley Weimer, Stephanie Forrest:
Using dynamic analysis to generate disjunctive invariants. ICSE 2014: 608-619 - 2013
- [j32]Michael M. Groat, Benjamin Edwards, James Horey, Wenbo He, Stephanie Forrest:
Application and analysis of multidimensional negative surveys in participatory sensing applications. Pervasive Mob. Comput. 9(3): 372-391 (2013) - [j31]Claire Le Goues, Stephanie Forrest, Westley Weimer:
Current challenges in automatic software repair. Softw. Qual. J. 21(3): 421-443 (2013) - [c58]Eric M. Schulte, Jonathan DiLorenzo, Westley Weimer, Stephanie Forrest:
Automated repair of binary and assembly programs for cooperating embedded devices. ASPLOS 2013: 317-328 - [c57]Westley Weimer, Zachary P. Fry, Stephanie Forrest:
Leveraging program equivalence for adaptive program repair: Models and first results. ASE 2013: 356-366 - [c56]George B. P. Bezerra, Dorian C. Arnold, Stephanie Forrest:
Empirical and theoretical lower bounds on energy consumption for networks on chip. NoCArc@MICRO 2013: 47-50 - [p2]Claire Le Goues, Anh Nguyen-Tuong, Hao Chen, Jack W. Davidson, Stephanie Forrest, Jason Hiser, John C. Knight, Matthew Van Gundy:
Moving Target Defenses in the Helix Self-Regenerative Architecture. Moving Target Defense 2013: 117-149 - 2012
- [j30]Claire Le Goues, ThanhVu Nguyen, Stephanie Forrest, Westley Weimer:
GenProg: A Generic Method for Automatic Software Repair. IEEE Trans. Software Eng. 38(1): 54-72 (2012) - [c55]Claire Le Goues, Westley Weimer, Stephanie Forrest:
Representations and operators for improving evolutionary software repair. GECCO 2012: 959-966 - [c54]Stephanie Forrest, Claire Le Goues:
Evolutionary software repair. GECCO (Companion) 2012: 1345-1348 - [c53]James Horey, Stephanie Forrest, Michael M. Groat:
Reconstructing Spatial Distributions from Anonymized Locations. ICDE Workshops 2012: 243-250 - [c52]Claire Le Goues, Michael Dewey-Vogt, Stephanie Forrest, Westley Weimer:
A systematic study of automated program repair: Fixing 55 out of 105 bugs for $8 each. ICSE 2012: 3-13 - [c51]ThanhVu Nguyen, Deepak Kapur, Westley Weimer, Stephanie Forrest:
Using dynamic analysis to discover polynomial and array invariants. ICSE 2012: 683-693 - [c50]Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, Stephanie Forrest:
Beyond the blacklist: modeling malware spread and the effect of interventions. NSPW 2012: 53-66 - [c49]Michael M. Groat, Benjamin Edwards, James Horey, Wenbo He, Stephanie Forrest:
Enhancing privacy in participatory sensing applications with multidimensional data. PerCom 2012: 144-152 - [e3]Carlos A. Coello Coello, Vincenzo Cutello, Kalyanmoy Deb, Stephanie Forrest, Giuseppe Nicosia, Mario Pavone:
Parallel Problem Solving from Nature - PPSN XII - 12th International Conference, Taormina, Italy, September 1-5, 2012, Proceedings, Part I. Lecture Notes in Computer Science 7491, Springer 2012, ISBN 978-3-642-32936-4 [contents] - [e2]Carlos A. Coello Coello, Vincenzo Cutello, Kalyanmoy Deb, Stephanie Forrest, Giuseppe Nicosia, Mario Pavone:
Parallel Problem Solving from Nature - PPSN XII - 12th International Conference, Taormina, Italy, September 1-5, 2012, Proceedings, Part II. Lecture Notes in Computer Science 7492, Springer 2012, ISBN 978-3-642-32963-0 [contents] - [i8]Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, Stephanie Forrest:
Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions. CoRR abs/1202.3987 (2012) - [i7]Benjamin Edwards, Steven A. Hofmeyr, George Stelle, Stephanie Forrest:
Internet Topology over Time. CoRR abs/1202.3993 (2012) - [i6]Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle:
Modeling Internet-Scale Policies for Cleaning up Malware. CoRR abs/1202.4008 (2012) - [i5]Eric M. Schulte, Zachary P. Fry, Ethan Fast, Stephanie Forrest, Westley Weimer:
Software Mutational Robustness: Bridging The Gap Between Mutation Testing and Evolutionary Biology. CoRR abs/1204.4224 (2012) - 2011
- [c48]Soumya Banerjee, Drew Levin, Melanie E. Moses, Frederick T. Koster, Stephanie Forrest:
The Value of Inflammatory Signals in Adaptive Immune Responses. ICARIS 2011: 1-14 - [c47]Michael M. Groat, Wenbo He, Stephanie Forrest:
KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. INFOCOM 2011: 2024-2032 - [c46]George B. P. Bezerra, Stephanie Forrest, Payman Zarkesh-Ha:
Reducing energy and increasing performance with traffic optimization in many-core systems. SLIP 2011: 1-7 - [c45]Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle:
Modeling Internet-Scale Policies for Cleaning up Malware. WEIS 2011 - [c44]Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle:
Modeling Internet-Scale Policies for Cleaning up Malware. WEIS (Springer Volume) 2011: 149-170 - 2010
- [j29]Westley Weimer, Stephanie Forrest, Claire Le Goues, ThanhVu Nguyen:
Automatic program repair with evolutionary computation. Commun. ACM 53(5): 109-116 (2010) - [c43]Ethan Fast, Claire Le Goues, Stephanie Forrest, Westley Weimer:
Designing better fitness functions for automated program repair. GECCO 2010: 965-972 - [c42]Eric M. Schulte, Stephanie Forrest, Westley Weimer:
Automated program repair through the evolution of assembly code. ASE 2010: 313-316 - [c41]Stephanie Forrest:
The case for evolvable software. OOPSLA 2010: 1 - [c40]Claire Le Goues, Stephanie Forrest, Westley Weimer:
The case for software evolution. FoSER 2010: 205-210 - [c39]George B. P. Bezerra, Stephanie Forrest, Melanie Forrest, Al Davis, Payman Zarkesh-Ha:
Modeling NoC traffic locality and energy consumption with rent's communication probability distribution. SLIP 2010: 3-8 - [c38]Payman Zarkesh-Ha, George B. P. Bezerra, Stephanie Forrest, Melanie E. Moses:
Hybrid network on chip (HNoC): local buses with a global mesh architecture. SLIP 2010: 9-14
2000 – 2009
- 2009
- [j28]Fernando Esponda, Stephanie Forrest, Paul Helman:
Negative representations of information. Int. J. Inf. Sec. 8(5): 331-345 (2009) - [c37]Stephanie Forrest, ThanhVu Nguyen, Westley Weimer, Claire Le Goues:
A genetic programming approach to automated software repair. GECCO 2009: 947-954 - [c36]Westley Weimer, ThanhVu Nguyen, Claire Le Goues, Stephanie Forrest:
Automatically finding patches using genetic programming. ICSE 2009: 364-374 - [c35]ThanhVu Nguyen, Westley Weimer, Claire Le Goues, Stephanie Forrest:
Using Execution Paths to Evolve Software Patches. ICST Workshops 2009: 152-153 - [i4]Josh Karlin, Stephanie Forrest, Jennifer Rexford:
Nation-State Routing: Censorship, Wiretapping, and BGP. CoRR abs/0903.3218 (2009) - 2008
- [j27]Petter Holme, Josh Karlin, Stephanie Forrest:
An Integrated Model of Traffic, Geography and Economy in the Internet. Comput. Commun. Rev. 38(3): 5-16 (2008) - [j26]Josh Karlin, Stephanie Forrest, Jennifer Rexford:
Autonomous security for autonomous systems. Comput. Networks 52(15): 2908-2923 (2008) - [c34]Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji:
The Evolution of System-Call Monitoring. ACSAC 2008: 418-430 - [c33]Eric D. Trias, Jorge A. Navas, Elena S. Ackley, Stephanie Forrest, Manuel V. Hermenegildo:
Negative Ternary Set-Sharing. ICLP 2008: 301-316 - [c32]Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladau, Bilal Shebaro:
The ecology of Malware. NSPW 2008: 99-106 - [i3]Petter Holme, Josh Karlin, Stephanie Forrest:
An integrated model of traffic, geography and economy in the Internet. CoRR abs/0802.3283 (2008) - 2007
- [j25]Kenneth L. Ingham, Anil Somayaji, John Burge, Stephanie Forrest:
Learning DFA representations of HTTP for protecting web applications. Comput. Networks 51(5): 1239-1255 (2007) - [j24]Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest:
Protecting data privacy through hard-to-reverse negative databases. Int. J. Inf. Sec. 6(6): 403-415 (2007) - [c31]James Horey, Michael M. Groat, Stephanie Forrest, Fernando Esponda:
Anonymous Data Collection in Sensor Networks. MobiQuitous 2007: 1-8 - 2006
- [j23]Robert G. Abbott, Stephanie Forrest, Kenneth J. Pienta:
Simulating the Hallmarks of Cancer. Artif. Life 12(4): 617-634 (2006) - [j22]Sabrina L. Spencer, Ryan A. Gerety, Kenneth J. Pienta, Stephanie Forrest:
Modeling Somatic Evolution in Tumorigenesis. PLoS Comput. Biol. 2(8) (2006) - [j21]Hajime Inoue, Darko Stefanovic, Stephanie Forrest:
On the Prediction of Java Object Lifetimes. IEEE Trans. Computers 55(7): 880-892 (2006) - [c30]Catherine Beauchemin, Stephanie Forrest, Frederick T. Koster:
Modeling Influenza Viral Dynamics in Tissue. ICARIS 2006: 23-36 - [c29]Josh Karlin, Stephanie Forrest, Jennifer Rexford:
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes. ICNP 2006: 290-299 - [c28]Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest:
Protecting Data Privacy Through Hard-to-Reverse Negative Databases. ISC 2006: 72-84 - [i2]Petter Holme, Josh Karlin, Stephanie Forrest:
Radial Structure of the Internet. CoRR abs/cs/0608088 (2006) - 2005
- [j20]Matthew R. Glickman, Justin Balthrop, Stephanie Forrest:
A Machine Learning Evaluation of an Artificial Immune System. Evol. Comput. 13(2): 179-212 (2005) - [j19]Fernando Esponda, Elena S. Ackley, Stephanie Forrest, Paul Helman:
On-line Negative Databases. Int. J. Unconv. Comput. 1(3): 201-220 (2005) - [j18]Elena Gabriela Barrantes, David H. Ackley, Stephanie Forrest, Darko Stefanovic:
Randomized instruction set emulation. ACM Trans. Inf. Syst. Secur. 8(1): 3-40 (2005) - [c27]Dennis L. Chao, Justin Balthrop, Stephanie Forrest:
Adaptive radio: achieving consensus using negative preferences. GROUP 2005: 120-123 - [p1]Stephanie Forrest, Justin Balthrop, Matthew R. Glickman, David H. Ackley:
Computation in the Wild. The Internet as a Large-Scale Complex System 2005: 227-250 - 2004
- [j17]Fernando Esponda, Stephanie Forrest, Paul Helman:
A formal framework for positive and negative detection schemes. IEEE Trans. Syst. Man Cybern. Part B 34(1): 357-373 (2004) - [c26]Fernando Esponda, Elena S. Ackley, Stephanie Forrest, Paul Helman:
Online Negative Databases. ICARIS 2004: 175-188 - [i1]Justin Balthrop, Stephanie Forrest, Mark E. J. Newman, Matthew M. Williamson:
Technological networks and the spread of computer viruses. CoRR cs.NI/0407048 (2004) - 2003
- [j16]Dennis L. Chao, Stephanie Forrest:
Information Immune Systems. Genet. Program. Evolvable Mach. 4(4): 311-331 (2003) - [c25]Dennis L. Chao, Miles P. Davenport, Stephanie Forrest, Alan S. Perelson:
Stochastic Stage-structured Modeling of the Adaptive Immune System. CSB 2003: 124-131 - [c24]Fernando Esponda, Stephanie Forrest, Paul Helman:
The Crossover Closure and Partial Match Detection. ICARIS 2003: 249-260 - 2002
- [c23]Justin Balthrop, Stephanie Forrest, Matthew R. Glickman:
Revisiting LISYS: parameters and normal behavior. IEEE Congress on Evolutionary Computation 2002: 1045-1050 - [c22]Justin Balthrop, Fernando Esponda, Stephanie Forrest, Matthew R. Glickman:
Coverage and Generalization in an Artificial Immune System. GECCO 2002: 3-10 - [c21]Hajime Inoue, Stephanie Forrest:
Anomaly intrusion detection in dynamic execution environments. NSPW 2002: 52-60 - 2001
- [j15]Melanie E. Moses, Stephanie Forrest:
Review of The Computational Beauty of Nature by Gary William Flake. Artif. Intell. 128(1-2): 239-242 (2001) - 2000
- [j14]Carlo C. Maley, Stephanie Forrest:
Exploring the Relationship Between Neutral and Selective Mutations in Cancer. Artif. Life 6(4): 325-345 (2000) - [j13]Steven A. Hofmeyr, Stephanie Forrest:
Architecture for an Artificial Immune System. Evol. Comput. 8(4): 443-473 (2000) - [c20]Anil Somayaji, Stephanie Forrest:
Automated Response Using System-Call Delay. USENIX Security Symposium 2000
1990 – 1999
- 1999
- [c19]John H. Holland, Lashon B. Booker, Marco Colombetti, Marco Dorigo, David E. Goldberg, Stephanie Forrest, Rick L. Riolo, Robert E. Smith, Pier Luca Lanzi, Wolfgang Stolzmann, Stewart W. Wilson:
What Is a Learning Classifier System? Learning Classifier Systems 1999: 3-32 - [c18]Christina Warrender, Stephanie Forrest, Barak A. Pearlmutter:
Detecting Intrusions using System Calls: Alternative Data Models. S&P 1999: 133-145 - 1998
- [j12]Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji:
Intrusion Detection Using Sequences of System Calls. J. Comput. Secur. 6(3): 151-180 (1998) - [c17]Mihaela Oprea, Stephanie Forrest:
Simulated evolution of antibody gene libraries under pathogen selection. SMC 1998: 3793-3798 - 1997
- [j11]Peter T. Hraber, Terry Jones, Stephanie Forrest:
The Ecology of Echo. Artif. Life 3(3): 165-190 (1997) - [j10]Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji:
Computer Immunology. Commun. ACM 40(10): 88-96 (1997) - [c16]Stephanie Forrest, Anil Somayaji, David H. Ackley:
Building Diverse Computer Systems. Workshop on Hot Topics in Operating Systems 1997: 67-72 - [c15]Anil Somayaji, Steven A. Hofmeyr, Stephanie Forrest:
Principles of a computer immune system. NSPW 1997: 75-82 - [r1]Stephanie Forrest:
Genetic Algorithms. The Computer Science and Engineering Handbook 1997: 557-571 - 1996
- [j9]Stephanie Forrest:
Genetic Algorithms. ACM Comput. Surv. 28(1): 77-80 (1996) - [c14]Patrik D'haeseleer, Stephanie Forrest, Paul Helman:
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. S&P 1996: 110-119 - [c13]Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff:
A Sense of Self for Unix Processes. S&P 1996: 120-128 - 1995
- [j8]Rebecca J. Parsons, Stephanie Forrest, Christian Burks:
Genetic Algorithms, Operators, and DNA Fragment Assembly. Mach. Learn. 21(1-2): 11-33 (1995) - [c12]Terry Jones, Stephanie Forrest:
Fitness Distance Correlation as a Measure of Problem Difficulty for Genetic Algorithms. ICGA 1995: 184-192 - [c11]Ron R. Hightower, Stephanie Forrest, Alan S. Perelson:
The Evolution of Emergent Organization in Immune System Gene Libraries. ICGA 1995: 344-350 - 1994
- [j7]Melanie Mitchell, Stephanie Forrest:
Genetic Algorithms and Artificial Life. Artif. Life 1(3): 267-289 (1994) - [c10]Stephanie Forrest, Alan S. Perelson, Lawrence Allen, Rajesh Cherukuri:
Self-nonself discrimination in a computer. S&P 1994: 202-212 - 1993
- [j6]Robert E. Smith, Stephanie Forrest, Alan S. Perelson:
Searching for Diverse, Cooperative Populations with Genetic Algorithms. Evol. Comput. 1(2): 127-149 (1993) - [j5]Stephanie Forrest, Robert E. Smith, Brenda Javornik, Alan S. Perelson:
Using Genetic Algorithms to Explore Pattern Recognition in the Immune System. Evol. Comput. 1(3): 191-211 (1993) - [j4]Stephanie Forrest, Melanie Mitchell:
What Makes a Problem Hard for a Genetic Algorithm? Some Anomalous Results and Their Explanation. Mach. Learn. 13: 285-319 (1993) - [c9]Rebecca J. Parsons, Stephanie Forrest, Christian Burks:
Genetic Algorithms for DNA Sequence Assembly. ISMB 1993: 310-318 - [c8]Melanie Mitchell, John H. Holland, Stephanie Forrest:
When will a Genetic Algorithm Outperform Hill Climbing. NIPS 1993: 51-58 - [e1]Stephanie Forrest:
Proceedings of the 5th International Conference on Genetic Algorithms, Urbana-Champaign, IL, USA, June 1993. Morgan Kaufmann 1993, ISBN 1-55860-299-2 [contents] - 1992
- [c7]Stephanie Forrest, Melanie Mitchell:
Relative Building-Block Fitness and the Building Block Hypothesis. FOGA 1992: 109-126 - [c6]Robert E. Smith, Stephanie Forrest, Alan S. Perelson:
Population Diversity in an Immune System Model: Implications for Genetic Search. FOGA 1992: 153-165 - 1991
- [c5]Stephanie Forrest, Melanie Mitchell:
The Performance of Genetic Algorithms on Walsh Polynomials: Some Anomalous Results and Their Explanation. ICGA 1991: 182-189 - 1990
- [j3]Jay S. Lark, Lee D. Erman, Stephanie Forrest, Kim P. Gostelow:
Concepts, Methods, and Languages for Building Timely Intelligent Systems. Real Time Syst. 2(1-2): 127-148 (1990) - [c4]Stephanie Forrest, Alan S. Perelson:
Genetic Algorithms and the Immune System. PPSN 1990: 320-325
1980 – 1989
- 1989
- [c3]John H. Miller, Stephanie Forrest:
The Dynamical Behavior of Classifier Systems. ICGA 1989: 304-310 - 1988
- [j2]Richard K. Belew, Stephanie Forrest:
Learning and Programming in Classifier Systems. Mach. Learn. 3: 193-223 (1988) - 1987
- [j1]Bruce D'Ambrosio, Michael R. Fehling, Stephanie Forrest, Peter Raulefs, B. Michael Wilber:
Real-Time Process Management for Materials Composition in Chemical Manufacturing. IEEE Expert 2(2): 80-93 (1987) - 1986
- [c2]Stephanie Forrest:
The Classifier System: A Computational Model that Supports Machine Intelligence. ICPP 1986: 711-716 - 1985
- [b1]Stephanie Forrest:
A Study of Parallelism in the Classifier System and Its Application to Classification in Kl-One Semantic Networks (Artificial Intelligence, Fine-Grained). University of Michigan, USA, 1985 - [c1]Stephanie Forrest:
Implementing Semantic Network Structures Using the Classifier System. ICGA 1985: 24-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint