{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:35:45Z","timestamp":1742927745336,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319274775"},{"type":"electronic","value":"9783319274782"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-27478-2_6","type":"book-chapter","created":{"date-parts":[[2016,1,30]],"date-time":"2016-01-30T05:45:54Z","timestamp":1454132754000},"page":"81-96","source":"Crossref","is-referenced-by-count":0,"title":["Computational Creativity for Intelligence Analysis"],"prefix":"10.1007","author":[{"given":"Robert","family":"Forsgren","sequence":"first","affiliation":[]},{"given":"Peter","family":"Hammar","sequence":"additional","affiliation":[]},{"given":"Magnus","family":"J\u00e4ndel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,31]]},"reference":[{"key":"6_CR1","unstructured":"Cole, L.A.: The Anthrax Letters. Skyhorse Publishing (2009)"},{"key":"6_CR2","unstructured":"Colton, S., Wiggins, G.A.: Computational Creativity: The Final Frontier? In: Proceedings 20th European Conference on Artificial Intelligence (2012)"},{"issue":"4","key":"6_CR3","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1609\/aimag.v29i4.2198","volume":"29","author":"M Ehrgott","year":"2009","unstructured":"Ehrgott, M.: Multiobjective Optimization. AI Mag. 29(4), 47\u201357 (2009)","journal-title":"AI Mag."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Gustavi, T., Karasalo, M., M\u00e5rtenson, C.: A tool for generating, structuring, and analyzing multiple hypotheses in intelligence work. In: Intelligence and Security Informatics Conference (EISIC), pp. 23\u201330 (2013)","DOI":"10.1109\/EISIC.2013.11"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"RW Hamming","year":"1950","unstructured":"Hamming, R.W.: Error detecting and error correcting codes. Bell Syst. Tech. J. 29, 147\u2013160 (1950)","journal-title":"Bell Syst. Tech. J."},{"key":"6_CR6","unstructured":"Heuer, R.J.: Psychology of Intelligence Analysis. US Gov. Printing Office (1999)"},{"key":"6_CR7","unstructured":"J\u00e4ndel, M.: Computational creativity in naturalistic decision-making. In: Proceedings of the Fourth International Conference on Computational Creativity, pp. 118\u2013122 (2013)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Ritchey, T.: Wicked Problems\u2014Social Messes: Decision Support Modelling with Morphological Analysis. Springer (2011)","DOI":"10.1007\/978-3-642-19653-9"},{"key":"6_CR9","first-page":"25","volume":"32","author":"LR Varshney","year":"2013","unstructured":"Varshney, L.R.: Surprise in computational creativity and machine science. Decision Analysis Today 32, 25\u201328 (2013)","journal-title":"Decision Analysis Today"},{"issue":"5","key":"6_CR10","doi-asserted-by":"publisher","first-page":"731","DOI":"10.3758\/BF03211316","volume":"25","author":"JT Wixted","year":"1997","unstructured":"Wixted, J.T., Ebbesen, E.B.: Genuine power curves in forgetting: a quantitative analysis of individual subject forgetting functions. Memory Cogn. 25(5), 731\u2013739 (1997)","journal-title":"Memory Cogn."},{"key":"6_CR11","volume-title":"Discovery, Invention, Research Through the Morphological Approach","author":"F Zwicky","year":"1969","unstructured":"Zwicky, F.: Discovery, Invention, Research Through the Morphological Approach. The Macmillan Company, Toronto (1969)"}],"container-title":["Advances in Intelligent Systems and Computing","Knowledge, Information and Creativity Support Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27478-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T08:25:29Z","timestamp":1559377529000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27478-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319274775","9783319274782"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27478-2_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}