{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T08:24:47Z","timestamp":1744446287697},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540228073"},{"type":"electronic","value":"9783540311829"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-31182-3_68","type":"book-chapter","created":{"date-parts":[[2006,8,17]],"date-time":"2006-08-17T10:25:25Z","timestamp":1155810325000},"page":"733-738","source":"Crossref","is-referenced-by-count":1,"title":["Evolving Scientific Knowledge"],"prefix":"10.1007","author":[{"given":"J\u00fcrgen","family":"Paetz","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"68_CR1","volume-title":"Data mining: concepts and techniques","author":"J. Han","year":"2000","unstructured":"Han J, Kamber M (2000) Data mining: concepts and techniques. Morgan Kaufmann Publishers, San Francisco"},{"key":"68_CR2","unstructured":"Data Mining, Knowledge Discovery, Genomic Mining, Web Mining http:\/\/www.kdnuggets.com"},{"volume-title":"Survey of text mining: clustering, classification, and retrieval","year":"2004","key":"68_CR3","unstructured":"Berry MW (ed) (2004) Survey of text mining: clustering, classification, and retrieval. Springer, New York"},{"key":"68_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-0089-2","volume-title":"Automated theorem proving: theory and practice","author":"M. Newborn","year":"2001","unstructured":"Newborn M (2001) Automated theorem proving: theory and practice. Springer, New York"},{"key":"68_CR5","volume-title":"Genetic programming on the programming of computers by means of natural selection","author":"J.R. Koza","year":"1992","unstructured":"Koza JR (1992) Genetic programming on the programming of computers by means of natural selection. MIT Press, Cambridge, MA"},{"key":"68_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1023\/A:1015059928466","volume":"1","author":"H.-G. Beyer","year":"2002","unstructured":"Beyer H-G, Schwefel H-P (2002) Evolution strategies. Natural Computing 1:3\u201352","journal-title":"Natural Computing"},{"issue":"1","key":"68_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S0165-0114(03)00111-8","volume":"141","author":"O. Cordon","year":"2004","unstructured":"Cordon O, Gomide F, Herrera F, Hoffmann F, Magdalene L (2004) Ten years of genetic fuzzy systems: current framework and new trends. Fuzzy Sets and Systems 141(1):5\u201331","journal-title":"Fuzzy Sets and Systems"},{"key":"68_CR8","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195131581.001.0001","volume-title":"Swarm intelligence: from natural to artificial systems","author":"E. Bonabeau","year":"1999","unstructured":"Bonabeau E, Dorigo M, Theraulaz G (1999) Swarm intelligence: from natural to artificial systems. Oxford University Press, New York"},{"key":"68_CR9","first-page":"801","volume-title":"Proc. of the Genetic and Evolutionary Computation Conference (GECCO)","author":"E. Cant\u00fa-Paz","year":"2003","unstructured":"Cant\u00fa-Paz E, Goldberg DE (2003) Are multiple runs of genetic algorithms better than one? In: Cant\u00fa-Paz E, Foster JA, Deb K, et al. (eds) Proc. of the Genetic and Evolutionary Computation Conference (GECCO), Chicago, IL, USA, Springer, Berlin, 801\u2013812"},{"key":"68_CR10","volume-title":"Neural networks: a comprehensive foundation","author":"S. Haykin","year":"1999","unstructured":"Haykin S (1999) Neural networks: a comprehensive foundation. 2nd ed., Prentice Hall, Upper Saddle River, NJ","edition":"2nd ed."},{"key":"68_CR11","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L. Zadeh","year":"1965","unstructured":"Zadeh L (1965) Fuzzy sets. Information and control 8:338\u2013353","journal-title":"Information and control"},{"key":"68_CR12","doi-asserted-by":"publisher","first-page":"443","DOI":"10.2307\/2118559","volume":"141","author":"A. Wiles","year":"1995","unstructured":"Wiles A (1995) Modular elliptic curves and Fermat\u2019s Last Theorem. Annals of Mathematics 141:443\u2013551","journal-title":"Annals of Mathematics"},{"key":"68_CR13","doi-asserted-by":"publisher","first-page":"553","DOI":"10.2307\/2118560","volume":"141","author":"R. Taylor","year":"1995","unstructured":"Taylor R, Wiles A (1995) Ring theoretic properties of certain Hecke algebras. Annals of Mathematics 141:553\u2013572","journal-title":"Annals of Mathematics"}],"container-title":["Advances in Soft Computing","Computational Intelligence, Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-31182-3_68.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T13:11:23Z","timestamp":1627737083000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-31182-3_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540228073","9783540311829"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-31182-3_68","relation":{},"subject":[]}}