{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T08:30:26Z","timestamp":1776933026508,"version":"3.51.2"},"publisher-location":"Cham","reference-count":6,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319284743","type":"print"},{"value":"9783319284750","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28475-0_24","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T04:21:01Z","timestamp":1451362861000},"page":"353-368","source":"Crossref","is-referenced-by-count":7,"title":["Computing Partial Recursive Functions by Virus Machines"],"prefix":"10.1007","author":[{"given":"\u00c1lvaro","family":"Romero-Jim\u00e9nez","sequence":"first","affiliation":[]},{"given":"Luis","family":"Valencia-Cabrera","sequence":"additional","affiliation":[]},{"given":"Agust\u00edn","family":"Riscos-N\u00fa\u00f1ez","sequence":"additional","affiliation":[]},{"given":"Mario J.","family":"P\u00e9rez-Jim\u00e9nez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Chen, X., Valencia-Cabrera, L., P\u00e9rez-Jim\u00e9nez, M.J., Wang, B., Zeng, X.: Computing with viruses. Int. J. Bioinspired Comput. (2015, submitted)","DOI":"10.1016\/j.tcs.2015.12.006"},{"key":"24_CR2","volume-title":"Computability and Logic","author":"DE Cohen","year":"1987","unstructured":"Cohen, D.E.: Computability and Logic. Ellis Horwood, Chichester (1987)"},{"key":"24_CR3","volume-title":"An Introduction to Algorithms","author":"TH Cormen","year":"1994","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L.: An Introduction to Algorithms. The MIT Press, Cambridge, Massachussets (1994)"},{"key":"24_CR4","volume-title":"Introduction to Modern Virology","author":"NJ Dimmock","year":"2007","unstructured":"Dimmock, N.J., Easton, A.J., Leppard, K.: Introduction to Modern Virology. Blackwell Publishing, Malden (USA) (2007)"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Romero-Jim\u00e9nez, \u00c1., Valencia-Cabrera, L., P\u00e9rez-Jim\u00e9nez, M.J.: Sequential and parallel generation of diophantine sets by virus machines. J. Comput. Theor. Nanosci. (2015, submitted)","DOI":"10.1007\/978-3-662-49014-3_30"},{"key":"24_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-92910-9","volume-title":"Handbook of Natural Computing","author":"G Rozenberg","year":"2012","unstructured":"Rozenberg, G., B\u00e4ck, T., Kok, J.N.: Handbook of Natural Computing, 1st edn. Springer, Heidelberg (2012)","edition":"1"}],"container-title":["Lecture Notes in Computer Science","Membrane Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28475-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:20:03Z","timestamp":1559370003000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28475-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319284743","9783319284750"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28475-0_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}