[1]
|
Kovach Jr., D.J. (2013) The Computational Theory of Intelligence: Information Entropy. Proceedings of Internation Conference of Nonlinear Analysis and Applied Mathematics, Rodos.
|
[2]
|
Kovach Jr., D.J. (2013) The Computational Theory of Intelligence: Data Aggreagation. Proceedings of Internation Conference of Nonlinear Analysis and Applied Mathematics, Rodos.
|
[3]
|
Floreano, D. and Mattiussi, C. (2008) Bio-Inspired Artificial Intelligence: Theories, Methods, and Technologies. MIT, Print, Cambridge, MA.
|
[4]
|
Strathern, P. (1999) Turing and the Computer. New York: Anchor.
|
[5]
|
Jonoska, N. and Seeman. N.C. (2002) DNA Computing. Berlin: Springer.
|
[6]
|
Hopcroft, J.E. and Ullman, J.D. (1979) Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, Reading.
|
[7]
|
Gusfield, D. (1997) Algorithms on Strings, Trees, and Sequences: Computer Science and Computational Biology. Cambridge UP, Cambridge, England. http://dx.doi.org/10.1017/CBO9780511574931
|
[8]
|
Bard, G.V. (2006) Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric. Proceedings of Proceedings of the Fifth Australasian Symposium on ACSW Frontiers, 69, 117-24.
|
[9]
|
Hamming, R.W. Error Detecting and Error Correcting Codes. Bell System Technical Journal, 29, 147-160.
|
[10]
|
Jaro, M.A. (1995) Probabilistic Linkage of Large Public Health Data Files. Statistics in Medicine, 14, 491-98.
|
[11]
|
Dshalalow, J.H. (2006) Foundations of Real Analysis. Chapman & Hall, London.
|
[12]
|
Srinivasan, R. (2007) Protecting Anti-Virus Software under Viral Attacks. Thesis, Arizona State University, Tempe.
|
[13]
|
(2013) Payload Definition from PC Magazine Encyclopedia. http://www.pcmag.com/encyclopedia/term/48909/payload
|
[14]
|
Belshaw, R., Pereira, V., Katzourakis, A., Talbot, G., Paces, J., Burt, A. and Tristem, M. (2004) Long-Term Reinfection of the Human Genome by Endogenous Retroviruses. Proceedings of the National Academy of Sciences of the United States of America, 101, 4894-4899. http://dx.doi.org/10.1073/pnas.0307800101?
|
[15]
|
Snustad, D.P. and Simmons, M.J. (2012) Principles of Genetics. Wiley, Hoboken.
|
[16]
|
Brenner, S., Stretton, A.O.W. and Kaplan, S. (1965) Genetic Code: The “Nonsense” Triplets for Chain Termination and Their Suppression. Nature, 206, 994-998.
|
[17]
|
(2012) The American Heritage Dictionary. Dell, New York. http://www.merriam-webster.com/help/citing.htm
|
[18]
|
Koshland Jr., D.E. (2009) The Seven Pillars of Life. Science, 295, 2215-2216. http://dx.doi.org/10.1126/science.1068489
|
[19]
|
Neuhauss, S. (2005) Handbook for the Deep Ecologist. iUniverse, Bloomington.
|
[20]
|
DARPA (2013) Cyber Grand Challenge (CGC). RSS. http://www.darpa.mil/cybergrandchallenge/
|
[21]
|
(2013) Defense News & Career Advice Clearance Jobs Defense News & Career Advice. Defense News. http://news.clearancejobs.com/2012/02/28/cybersecurity-spending-rises-across-agency-2013-budget-requests/
|