{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:23:02Z","timestamp":1742995382968,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030630065"},{"type":"electronic","value":"9783030630072"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63007-2_2","type":"book-chapter","created":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:02:39Z","timestamp":1606089759000},"page":"16-26","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Overcoming Local Optima for Determining 2-Optimality Consensus for Collectives"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9327-1288","authenticated-orcid":false,"given":"Dai Tho","family":"Dang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1253-7895","authenticated-orcid":false,"given":"Zygmunt","family":"Mazur","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7851-7323","authenticated-orcid":false,"given":"Dosam","family":"Hwang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,11,23]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1080\/01969720903294593","volume":"40","author":"NT Nguyen","year":"2009","unstructured":"Nguyen, N.T.: Processing inconsistency of knowledge in determining knowledge of a collective. Cybern. Syst. 40, 670\u2013688 (2009)","journal-title":"Cybern. Syst."},{"issue":"4","key":"2_CR2","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TCNS.2015.2468991","volume":"3","author":"S Knorn","year":"2016","unstructured":"Knorn, S., Chen, Z., Member, S., Middleton, R.H.: Overview: collective control of multiagent systems. IEEE Trans. Control Netw. Syst. 3(4), 334\u2013347 (2016)","journal-title":"IEEE Trans. Control Netw. Syst."},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/11758532_31","volume-title":"Computational Science \u2013 ICCS 2006","author":"K Juszczyszyn","year":"2006","unstructured":"Juszczyszyn, K., et al.: Agent-based approach for distributed intrusion detection system design. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2006. LNCS, vol. 3993, pp. 224\u2013231. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11758532_31"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.inffus.2019.05.005","volume":"52","author":"T Wu","year":"2019","unstructured":"Wu, T., Liu, X., Qin, J., Herrera, F.: Consensus evolution networks: a consensus reaching tool for managing consensus thresholds in group decision making. Inf. Fus. 52, 375\u2013388 (2019)","journal-title":"Inf. Fus."},{"key":"2_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-889-0","volume-title":"Advanced Methods for Inconsistent Knowledge Management","author":"NT Nguyen","year":"2008","unstructured":"Nguyen, N.T.: Advanced Methods for Inconsistent Knowledge Management. Springer, London (2008). https:\/\/doi.org\/10.1007\/978-1-84628-889-0"},{"issue":"6","key":"2_CR6","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1080\/01969720802188268","volume":"39","author":"NT Nguyen","year":"2008","unstructured":"Nguyen, N.T.: Inconsistency of knowledge and collective intelligence. Cybern. Syst. 39(6), 542\u2013562 (2008)","journal-title":"Cybern. Syst."},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2018.01.029","volume":"100","author":"A Griva","year":"2018","unstructured":"Griva, A., Bardaki, C., Pramatari, K., Papakiriakopoulos, D.: Retail business analytics: customer visit segmentation using market basket data. Expert Syst. Appl. 100, 1\u201316 (2018)","journal-title":"Expert Syst. Appl."},{"issue":"8","key":"2_CR8","doi-asserted-by":"publisher","first-page":"2339","DOI":"10.1016\/j.automatica.2013.04.033","volume":"49","author":"A Fagiolini","year":"2013","unstructured":"Fagiolini, A., Bicchi, A.: On the robust synthesis of logical consensus algorithms for distributed intrusion detection. Automatica 49(8), 2339\u20132350 (2013)","journal-title":"Automatica"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1016\/j.trpro.2015.09.031","volume":"10","author":"ML Pira","year":"2015","unstructured":"Pira, M.L., Inturri, G., Ignaccolo, M., Pluchino, A.: Analysis of AHP methods and the pairwise majority rule (PMR) for collective preference rankings of sustainable mobility solutions. Transp. Res. Procedia 10, 777\u2013787 (2015)","journal-title":"Transp. Res. Procedia"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.plantsci.2019.04.005","volume":"284","author":"AA Lezzhov","year":"2019","unstructured":"Lezzhov, A.A., Atabekova, A.K., Tolstyko, E.A., Lazareva, E.A.: RNA phloem transport mediated by pre-miRNA and viral tRNA-like structures. Plant Sci. 284, 99\u2013107 (2019)","journal-title":"Plant Sci."},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-319-75417-8_5","volume-title":"Intelligent Information and Database Systems","author":"A Kozierkiewicz","year":"2018","unstructured":"Kozierkiewicz, A., Sitarczyk, M.: Heuristic algorithms for 2-optimality consensus determination. In: Nguyen, N.T., Hoang, D.H., Hong, T.-P., Pham, H., Trawi\u0144ski, B. (eds.) ACIIDS 2018. LNCS (LNAI), vol. 10751, pp. 48\u201358. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75417-8_5"},{"key":"2_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-35854-1","volume-title":"Theoretical Aspects of Local Search","author":"W Michiels","year":"2007","unstructured":"Michiels, W., Aarts, E., Jan, K.: Theoretical Aspects of Local Search. Springer, Berlin (2007). https:\/\/doi.org\/10.1007\/978-3-540-35854-1"},{"key":"2_CR13","volume-title":"Handbook of Constraint Programming","author":"F Rossi","year":"2006","unstructured":"Rossi, F., Beek, P.V., Walsh, T.: Handbook of Constraint Programming. Elsevier, Amsterdam (2006)"},{"key":"2_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-07807-5","volume-title":"How to Solve it: Modern Heuristics","author":"Z Michalewicz","year":"2004","unstructured":"Michalewicz, Z., Fogel, D.B.: How to Solve it: Modern Heuristics. Springer, Berlin (2004). https:\/\/doi.org\/10.1007\/978-3-662-07807-5"},{"issue":"5","key":"2_CR15","doi-asserted-by":"publisher","first-page":"1604","DOI":"10.1007\/s00453-017-0369-2","volume":"80","author":"PS Oliveto","year":"2018","unstructured":"Oliveto, P.S., et al.: How to escape local optima in black box optimisation: When non-elitism outperforms elitism. Algorithmica 80(5), 1604\u20131633 (2018)","journal-title":"Algorithmica"},{"issue":"2","key":"2_CR16","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1080\/01969722.2019.1565117","volume":"50","author":"DT Dang","year":"2019","unstructured":"Dang, D.T., Nguyen, N.T., Hwang, D.: Multi-step consensus: an effective approach for determining consensus in large collectives. Cybern. Syst. 50(2), 208\u2013229 (2019)","journal-title":"Cybern. Syst."},{"issue":"1","key":"2_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/TKDE.2012.250","volume":"26","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., et al.: Consensus-based ranking of multivalued objects: a generalized Borda count approach. IEEE Trans. Knowl. Data Eng. 26(1), 83\u201396 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"8","key":"2_CR18","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/TCBB.2011.23","volume":"8","author":"M Tsai","year":"2011","unstructured":"Tsai, M., Blelloch, G., Ravi, R., Schwartz, R.: A Consensus tree approach for reconstructing human evolutionary history and detecting population substructure. IEEE\/ACM Trans. Comput. Biol. Bioinf. 8(8), 918\u2013928 (2011)","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinf."},{"issue":"1","key":"2_CR19","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/JPROC.2006.887293","volume":"95","author":"BR Olfati-saber","year":"2007","unstructured":"Olfati-saber, B.R., Fax, J.A., Murray, R.M.: Consensus and cooperation in networked multi-agent systems. Proc. IEEE 95(1), 215\u2013233 (2007)","journal-title":"Proc. IEEE"},{"issue":"5","key":"2_CR20","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.eswa.2012.09.006","volume":"40","author":"MN Uddin","year":"2013","unstructured":"Uddin, M.N., Duong, T.H., Nguyen, N.T., Qi, X.M., Jo, G.S.: Semantic similarity measures for enhancing information retrieval in folksonomies. Expert Syst. Appl. 40(5), 1645\u20131653 (2013)","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"2_CR21","doi-asserted-by":"publisher","first-page":"8332","DOI":"10.1109\/JIOT.2019.2917226","volume":"6","author":"M Alaslani","year":"2019","unstructured":"Alaslani, M., Nawab, F., Shihada, B.: Blockchain in IoT systems: End-to-end delay evaluation. IEEE Internet Things J. 6(5), 8332\u20138344 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"2_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3316481","volume":"51","author":"R Zhang","year":"2019","unstructured":"Zhang, R., Xue, R., Liu, L.: Security and privacy on blockchain. ACM Comput. Surv. 51(3), 1\u201334 (2019)","journal-title":"ACM Comput. Surv."},{"key":"2_CR23","volume-title":"Social Choice and Individual Values","author":"KJ Arrow","year":"1963","unstructured":"Arrow, K.J.: Social Choice and Individual Values. Wiley, New York (1963)"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/3-540-44411-4_30","volume-title":"SOFSEM 2000: Theory and Practice of Informatics","author":"NT Nguyen","year":"2000","unstructured":"Nguyen, N.T.: Using consensus methods for solving conflicts of data in distributed systems. In: Hlav\u00e1\u010d, V., Jeffery, K.G., Wiedermann, J. (eds.) SOFSEM 2000. LNCS, vol. 1963, pp. 411\u2013419. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44411-4_30"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Dang, D.T., Nguyen, N.T., Hwang, D.: A new heuristic algorithm for 2-Optimality consensus determination. In: 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), pp. 70\u201375 (2019)","DOI":"10.1109\/SMC.2019.8914394"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63007-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:07:45Z","timestamp":1606090065000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-63007-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030630065","9783030630072"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63007-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"23 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Da Nang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccci.pwr.edu.pl\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}