{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:16:12Z","timestamp":1725560172747},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283232"},{"type":"electronic","value":"9783540318538"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11539087_15","type":"book-chapter","created":{"date-parts":[[2010,7,20]],"date-time":"2010-07-20T22:26:10Z","timestamp":1279664770000},"page":"129-138","source":"Crossref","is-referenced-by-count":12,"title":["A Game-Theoretic Approach to Competitive Learning in Self-Organizing Maps"],"prefix":"10.1007","author":[{"given":"Joseph","family":"Herbert","sequence":"first","affiliation":[]},{"given":"JingTao","family":"Yao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Kohonen, T.: Automatic formation of topological maps of patterns in a self-organizing system. In: Proceedings of the Scandinavian Conference on Image Analysis, pp. 214\u2013220 (1981)"},{"issue":"4","key":"15_CR2","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1080\/03081079008935088","volume":"16","author":"T. Huntsberger","year":"1990","unstructured":"Huntsberger, T., Ajjimarangsee, P.: Parallel self-organizing feature maps for unsupervised pattern recognition. International Journal of General Systems\u00a016(4), 357\u2013372 (1990)","journal-title":"International Journal of General Systems"},{"issue":"4","key":"15_CR3","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/0031-3203(93)90110-I","volume":"26","author":"E. Tsao","year":"1993","unstructured":"Tsao, E., Lin, W., Chen, C.: Constraint satisfaction neural networks for image recognition. Pattern Recognition\u00a026(4), 553\u2013567 (1993)","journal-title":"Pattern Recognition"},{"issue":"1-2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/S0020-0255(99)00112-7","volume":"123","author":"S.B. Cho","year":"2000","unstructured":"Cho, S.B.: Ensemble of structure-adaptive self-organizing maps for high performance classification. Inf. Sci.\u00a0123(1-2), 103\u2013114 (2000)","journal-title":"Inf. Sci."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Hung, C., Wermter, S.: A dynamic adaptive self-organising hybrid model for text clustering. In: Proceedings of the Third IEEE International Conference on Data Mining, pp. 75\u201382 (2003)","DOI":"10.1109\/ICDM.2003.1250905"},{"key":"15_CR6","volume-title":"Neural Network Design","author":"M.T. Hagan","year":"1996","unstructured":"Hagan, M.T., Demuth, H.B., Beale, M.H.: Neural Network Design. PWS Publishing Company, Boston (1996)"},{"key":"15_CR7","unstructured":"Brachman, R.J., Anand, T.: The process of knowledge discovery in databases: A human-centered approach. In: Advances in knowledge discovery and data mining, American Association for Artificial Intelligence, pp. 37\u201358 (1996)"},{"key":"15_CR8","unstructured":"Fayyad, U.M., Piatetsky-Shapiro, G., Smyth, P.: From data mining to knowledge discovery: an overview. In: Advances in knowledge discovery and data mining, American Association for Artificial Intelligence, pp. 1\u201334 (1996)"},{"issue":"3","key":"15_CR9","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1109\/72.668890","volume":"9","author":"V. Chandrasekaran","year":"1998","unstructured":"Chandrasekaran, V., Liu, Z.Q.: Topology constraint free fuzzy gated neural networks for pattern recognition. IEEE Transactions on Neural Networks\u00a09(3), 483\u2013502 (1998)","journal-title":"IEEE Transactions on Neural Networks"},{"issue":"3","key":"15_CR10","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1023\/B:APIN.0000043561.99513.69","volume":"21","author":"S. Pal","year":"2004","unstructured":"Pal, S., Dasgupta, B., Mitra, P.: Rough self organizing map. Applied Intelligence\u00a021(3), 289\u2013299 (2004)","journal-title":"Applied Intelligence"},{"key":"15_CR11","unstructured":"Fritzke, B.: Some competitive learning methods. Technical report, Institute for Neural Computation. Ruhr-Universit at Bochum (1997)"},{"issue":"9","key":"15_CR12","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1109\/34.790428","volume":"21","author":"S. Santini","year":"1999","unstructured":"Santini, S., Jain, R.: Similarity measures. IEEE Transactions: Pattern Analysis and Machine Intelligence\u00a021(9), 871\u2013883 (1999)","journal-title":"IEEE Transactions: Pattern Analysis and Machine Intelligence"},{"key":"15_CR13","unstructured":"Kolen, J.F., Pollack, J.B.: Back propagation is sensitive to initial conditions. In: Advances in Neural Information Processing Systems, vol.\u00a03, pp. 860\u2013867 (1991)"},{"key":"15_CR14","volume-title":"Theory of Games and Economic Behavior","author":"J. Neumann von","year":"1944","unstructured":"von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior. Princeton University Press, Princeton (1944)"},{"issue":"2","key":"15_CR15","doi-asserted-by":"publisher","first-page":"155","DOI":"10.2307\/1907266","volume":"18","author":"J. Nash","year":"1950","unstructured":"Nash, J.: The bargaining problem. Econometrica\u00a018(2), 155\u2013162 (1950)","journal-title":"Econometrica"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1086\/261272","volume":"92","author":"A. Roth","year":"1984","unstructured":"Roth, A.: The evolution of the labor market for medical interns and residents: a case study in game theory. Political Economy\u00a092, 991\u20131016 (1984)","journal-title":"Political Economy"},{"issue":"1","key":"15_CR17","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TR.2002.808062","volume":"52","author":"M. Bell","year":"2003","unstructured":"Bell, M.: The use of game theory to measure the vulnerability of stochastic networks. IEEE Transactions on Reliability\u00a052(1), 63\u201368 (2003)","journal-title":"IEEE Transactions on Reliability"},{"key":"15_CR18","first-page":"99","volume":"13","author":"J. Fischer","year":"1993","unstructured":"Fischer, J., Wright, R.N.: An application of game-theoretic techniques to cryptography. Discrete Mathematics and Theoretical Computer Science\u00a013, 99\u2013118 (1993)","journal-title":"Discrete Mathematics and Theoretical Computer Science"},{"key":"15_CR19","unstructured":"Gossner, O.: Repeated games played by cryptographically sophisticated players. Technical report, Catholique de Louvain - Center for Operations Research and Economics (1998)"}],"container-title":["Lecture Notes in Computer Science","Advances in Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11539087_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:14:21Z","timestamp":1605644061000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11539087_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283232","9783540318538"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11539087_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}