{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T09:09:18Z","timestamp":1695028158118},"reference-count":17,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":5967,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Complexity"],"published-print":{"date-parts":[[1999,5]]},"DOI":"10.1002\/(sici)1099-0526(199905\/06)4:5<29::aid-cplx6>3.0.co;2-m","type":"journal-article","created":{"date-parts":[[2004,11,14]],"date-time":"2004-11-14T14:55:05Z","timestamp":1100444105000},"page":"29-37","source":"Crossref","is-referenced-by-count":6,"title":["Some design principles for immune system recognition"],"prefix":"10.1002","volume":"4","author":[{"given":"Alan S.","family":"Perelson","sequence":"first","affiliation":[]},{"given":"Frederik W.","family":"Wiegel","sequence":"additional","affiliation":[]}],"member":"311","reference":[{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB1","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1103\/RevModPhys.69.1219","volume":"69","author":"Perelson","year":"1997","journal-title":"Rev Mod Phys"},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB2","author":"Forrest","year":"1994","unstructured":"; ; ; Self-Nonself Discrimination in a Computer. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press: Los Alamitos, CA, 1994; 202-212."},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB3","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/BF02458311","volume":"58","author":"Bookstein","year":"1996","journal-title":"Bull Math Biol"},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB4","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1017\/S0140525X98001253","volume":"21","author":"Edelman","year":"1998","journal-title":"Behav Brain Sci"},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB5","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1016\/0022-5193(79)90275-3","volume":"81","author":"Perelson","year":"1979","journal-title":"J Theoret Biol"},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB6","first-page":"127","volume-title":"The Generation of Antibody Diversity","author":"Klinman","year":"1976","unstructured":"; ; ; The Acquisition of the B Cell Specificity Repertoire: The Germ-Line Theory of Predetermined Permutation of Genetic Information, in The Generation of Antibody Diversity. ed. Academic Press: New York, 1976; 127-150."},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB7","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1101\/SQB.1977.041.01.022","volume":"41","author":"Klinman","year":"1977","journal-title":"Cold Spring Harbor Symp Quant Biol"},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB8","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1002\/eji.1830060507","volume":"6","author":"K\u00f6hler","year":"1976","journal-title":"Eur J Immunol"},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB9","author":"Lapedes","unstructured":"; The Geometry of Immunological Shape Space. (submitted for publication)."},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB10","doi-asserted-by":"crossref","first-page":"3180","DOI":"10.1073\/pnas.81.10.3180","volume":"81","author":"McKean","year":"1984","journal-title":"Proc Natl Acad Sci USA"},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB11","first-page":"321","volume-title":"Computations in Shape Space: A New Approach to Immune Network Theory, in Theoretical Immunology, Part Two, SFI Studies in the Sciences of Complexity","author":"Segel","year":"1988","unstructured":"; Computations in Shape Space: A New Approach to Immune Network Theory, in Theoretical Immunology, Part Two, SFI Studies in the Sciences of Complexity. ed. Addison-Wesley: Reading, MA, 1988; 321-343."},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB12","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1006\/jtbi.1997.0495","volume":"189","author":"Smith","year":"1997","journal-title":"J Theoret Biol"},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB13","first-page":"1","volume":"99","author":"Borst","year":"1997","journal-title":"Behring Inst Mitt"},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB14","doi-asserted-by":"crossref","first-page":"2951","DOI":"10.1002\/eji.1830211209","volume":"2","author":"Liu","year":"1991","journal-title":"Eur J Immunol"},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB15","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/0165-2478(88)90178-2","volume":"18","author":"Zhang","year":"1988","journal-title":"Immunol Lett"},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-51673-3","volume-title":"Physical Principles in Chemoreception","author":"Wiegel","year":"1991","unstructured":"Physical Principles in Chemoreception; Springer: Berlin and New York, 1991."},{"key":"10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M-BIB17","doi-asserted-by":"crossref","DOI":"10.1142\/0178","volume-title":"Introduction to Path-Integral Methods in Physics and Polymer Science","author":"Wiegel","year":"1986","unstructured":"Introduction to Path-Integral Methods in Physics and Polymer Science; World Scientific: Singapore, 1986; Chapters I and II."}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2F(SICI)1099-0526(199905%2F06)4:5%3C29::AID-CPLX6%3E3.0.CO;2-M","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/(SICI)1099-0526(199905\/06)4:5%3C29::AID-CPLX6%3E3.0.CO;2-M","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T03:58:07Z","timestamp":1625111887000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/(SICI)1099-0526(199905\/06)4:5<29::AID-CPLX6>3.0.CO;2-M"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,5]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1999,5]]}},"URL":"https:\/\/doi.org\/10.1002\/(sici)1099-0526(199905\/06)4:5<29::aid-cplx6>3.0.co;2-m","relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999,5]]}}}