{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T10:40:02Z","timestamp":1746182402346,"version":"3.40.4"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319065687"},{"type":"electronic","value":"9783319065694"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06569-4_28","type":"book-chapter","created":{"date-parts":[[2014,4,11]],"date-time":"2014-04-11T20:16:15Z","timestamp":1397247375000},"page":"377-388","source":"Crossref","is-referenced-by-count":0,"title":["Optimal Path Planning for Information Based Localization"],"prefix":"10.1007","author":[{"given":"Francis","family":"Celeste","sequence":"first","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Dambreville","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Bergman, N.: Recursive bayesian estimation: navigation and tracking applications, Ph.D Thesis (1999)","key":"28_CR1"},{"key":"28_CR2","volume-title":"Dynamic Programming","author":"D. Bertsekas","year":"1968","unstructured":"Bertsekas, D.: Dynamic Programming. Wiley, New York (1968)"},{"unstructured":"de Boer, P., Kroese, D., Mannor, Rubinstein, R.: A tutorial on the cross-entropy method (2003), http:\/\/www.cs.utwente.nl\/~ptdeboer\/ce\/","key":"28_CR3"},{"unstructured":"Coles, S.: Extreme value theory and applications (June 15, 1999)","key":"28_CR4"},{"key":"28_CR5","volume-title":"Detection, Estimation and Modulation Theory","author":"H.L. Van Trees","year":"1968","unstructured":"Van Trees, H.L.: Detection, Estimation and Modulation Theory. Wiley, New York (1968)"},{"issue":"4","key":"28_CR6","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1137\/S0895479895288334","volume":"18","author":"J.P. Le Cadre","year":"1997","unstructured":"Le Cadre, J.P., Tr\u00e9mois, O.: The matrix programming property and its applications. SIAM J. Matrix Anal. Appl.\u00a018(4), 818\u2013826 (1997)","journal-title":"SIAM J. Matrix Anal. Appl."},{"doi-asserted-by":"crossref","unstructured":"LaValle, S.: Planning Algorithms. Cambridge University Press (2006)","key":"28_CR7","DOI":"10.1017\/CBO9780511546877"},{"key":"28_CR8","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1214\/aos\/1176343003","volume":"3","author":"J. Pickands","year":"1975","unstructured":"Pickands, J.: Statistical Inference Using Extreme Order Statistics. Annals of Statistics\u00a03, 119\u2013131 (1975)","journal-title":"Annals of Statistics"},{"doi-asserted-by":"crossref","unstructured":"Rubinstein, R.Y., Kroese, D.: The Cross-Entropy Method: A uniform approach for Combinatorial Optimization, Monte-Carlo Simulation and Machine Learning. Information Science and Statistics (2004)","key":"28_CR9","DOI":"10.1007\/978-1-4757-4321-0_4"},{"doi-asserted-by":"crossref","unstructured":"Paris, S., Le Cadre, J.P.: Trajectory planning for terrain-aided navigation. In: Fusion 2002, vol.\u00a07-11, pp. 1007\u20131014 (2002)","key":"28_CR10","DOI":"10.1109\/ICIF.2002.1020922"},{"unstructured":"Sutton, R., Barto, A.: Reinforcement Learning. An Introduction. A Bradford Book (2000)","key":"28_CR11"},{"issue":"5","key":"28_CR12","doi-asserted-by":"publisher","first-page":"1386","DOI":"10.1109\/78.668800","volume":"46","author":"P. Tichavsky","year":"1998","unstructured":"Tichavsky, P., Muravchik, C., Nehorai, A.: Posterior cram\u00e9r-rao bounds for discrete-time nonlinear filtering. IEEE Transactions on Signal Processing\u00a046(5), 1386\u20131396 (1998)","journal-title":"IEEE Transactions on Signal Processing"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computational Methods for Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06569-4_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T10:21:27Z","timestamp":1746181287000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-06569-4_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319065687","9783319065694"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06569-4_28","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}