{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:24:21Z","timestamp":1725549861819},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290469"},{"type":"electronic","value":"9783540317319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11559221_49","type":"book-chapter","created":{"date-parts":[[2005,10,1]],"date-time":"2005-10-01T02:36:05Z","timestamp":1128134165000},"page":"490-499","source":"Crossref","is-referenced-by-count":3,"title":["Behavior Evaluation with Actions\u2019 Sampling in Multi-agent System"],"prefix":"10.1007","author":[{"given":"Krzysztof","family":"Cetnarowicz","sequence":"first","affiliation":[]},{"given":"Renata","family":"Ci\u0119ciwa","sequence":"additional","affiliation":[]},{"given":"Gabriel","family":"Rojek","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Cetnarowicz, K.: M\u2013agent architecture based method of development of multiagent systems. In: Proc. of the 8th Joint EPS-APS International Conference on Physics Computing, ACC Cyfronet, Krak\u00f3w (1996)","key":"49_CR1"},{"key":"49_CR2","first-page":"579","volume-title":"Advances in Soft Computing","author":"K. Cetnarowicz","year":"2005","unstructured":"Cetnarowicz, K., Nawarecki, E., Rojek, G.: Behavior Based Detection of Unfavorable Events Using the Multiagent System, in Monitoring, Security, and Rescue Techniques in Multiagent Systems. Advances in Soft Computing, pp. 579\u2013588. Springer, Heidelberg (2005)"},{"unstructured":"Cetnarowicz, K., Nawarecki, E., \u017babi\u0144ska, M.: M\u2013agent Architecture and its Application to the Agent Oriented Technology. In: Proc. of the DAIMAS 1997, St. Petersburg (1997)","key":"49_CR3"},{"unstructured":"Cetnarowicz, K., Rojek, G.: Unfavourable Beahvior Detection with the Immunological Approach. In: Proc. of the XXVth International Autumn Colloquium ASIS 2003, MARQ, Ostrava, pp. 41\u201346 (2003)","key":"49_CR4"},{"unstructured":"Cetnarowicz, K., Cieciwa, R., Rojek, G.: Behavior Based Detection of Unfavorable Activities in Multi\u2013Agent Systems. In: MCPL, Conference on Management and Control of Production and Logistics, Santiago - Chile, pp. 325\u2013330 (2004)","key":"49_CR5"},{"key":"49_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/978-3-540-24688-6_79","volume-title":"Computational Science - ICCS 2004","author":"K. Cetnarowicz","year":"2004","unstructured":"Cetnarowicz, K., Rojek, G.: Behavior Based Detection of Unfavorable Resources. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol.\u00a03038, pp. 607\u2013614. Springer, Heidelberg (2004)"},{"issue":"10","key":"49_CR7","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., Hofmeyer, S.A., Somayaji, A.: Computer Immunology. Communications of the ACM\u00a040(10), 88\u201396 (1997)","journal-title":"Communications of the ACM"},{"key":"49_CR8","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1109\/RISP.1994.296580","volume-title":"Proc. of the 1994 IEEE Symposium on Research in Security and Privacy","author":"S. Forrest","year":"1994","unstructured":"Forrest, S., Allen, L., Perelson, A.S., Cherukuri, R.: Self-Nonself Discrimination in a Computer. In: Proc. of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 202\u2013212. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"49_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/11428862_97","volume-title":"Computational Science \u2013 ICCS 2005","author":"G. Rojek","year":"2005","unstructured":"Rojek, G., Ci\u0119ciwa, R., Cetnarowicz, K.: Algorithm of Behavior Evaluation in Multi-agent System. In: Sunderam, V.S., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2005. LNCS, vol.\u00a03516, pp. 711\u2013718. Springer, Heidelberg (2005)"},{"unstructured":"Wierzcho\u0144, S.: Artificial Immune Systems [in polish], Akademicka Oficyna Wydawnicza EXIT, Warszawa (2001)","key":"49_CR10"}],"container-title":["Lecture Notes in Computer Science","Multi-Agent Systems and Applications IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11559221_49.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:11:38Z","timestamp":1619493098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11559221_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540290469","9783540317319"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11559221_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}