{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:57:05Z","timestamp":1725551825862},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308188"},{"type":"electronic","value":"9783540315995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596448_54","type":"book-chapter","created":{"date-parts":[[2006,6,17]],"date-time":"2006-06-17T13:12:37Z","timestamp":1150549957000},"page":"375-380","source":"Crossref","is-referenced-by-count":1,"title":["Transitive Dependence Based Formation of Virtual Organizations"],"prefix":"10.1007","author":[{"given":"Bo","family":"An","sequence":"first","affiliation":[]},{"given":"Chunyan","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Zhiqi","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Daijie","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","unstructured":"Sichman, J.S., Conte, R., Demazeau, Y., Castelfranchi, C.: A social reasoning mechanism based on dependence networks. In: Proc. of the 16th ECAI, pp. 188\u2013192 (1994)"},{"key":"54_CR2","unstructured":"Zlotkin, G., Rosenschein, J.S.: Coalition, cryptography, and stability: Mechanisms for coalition formation in task oriented domains. In: Proc. of AAAI 1994, pp. 432\u2013437 (1994)"},{"key":"54_CR3","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/S0004-3702(00)00068-0","volume":"126","author":"E.A. Hansen","year":"2001","unstructured":"Hansen, E.A., Zilberstein, S.: Monitoring and control of anytime algorithms: A dynamic programming approach. Artificial Intelligence\u00a0126, 139\u2013157 (2001)","journal-title":"Artificial Intelligence"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596448_54.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:56:11Z","timestamp":1619506571000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596448_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308188","9783540315995"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/11596448_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}