{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T07:35:04Z","timestamp":1779348904612,"version":"3.51.4"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319292267","type":"print"},{"value":"9783319292281","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29228-1_11","type":"book-chapter","created":{"date-parts":[[2016,5,3]],"date-time":"2016-05-03T07:41:44Z","timestamp":1462261304000},"page":"117-128","source":"Crossref","is-referenced-by-count":58,"title":["Characterisation of the Idiotypic Immune Network Through Persistent Entropy"],"prefix":"10.1007","author":[{"given":"Matteo","family":"Rucco","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Filippo","family":"Castiglione","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Emanuela","family":"Merelli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marco","family":"Pettini","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,5,4]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.entcs.2014.06.011","volume":"306","author":"J Binchi","year":"2014","unstructured":"Binchi, J., Merelli, E., Rucco, M., Petri, G., Vaccarino, F.: jHoles: A tool for understanding biological complex networks via clique weight rank persistent homology. Elect. Notes Theoret. Comput. Sci. 306, 5\u201318 (2014)","journal-title":"Elect. Notes Theoret. Comput. Sci."},{"issue":"46","key":"11_CR2","doi-asserted-by":"crossref","first-page":"18566","DOI":"10.1073\/pnas.1313480110","volume":"110","author":"J. M. Chan","year":"2013","unstructured":"Chan, J.M., Carlsson, G., Rabadan, R.: Topology of viral evolution. Proc. Natl. Acad. Sci. 110(46), 18566\u201318571 (2013)","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"2","key":"11_CR3","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.patcog.2014.06.023","volume":"48","author":"H Chintakunta","year":"2015","unstructured":"Chintakunta, H., Gentimis, T., Gonzalez-Diaz, R., Jimenez, M.-J., Krim, H.: An entropy-based persistence barcode. Pattern Recogn. 48(2), 391\u2013401 (2015)","journal-title":"Pattern Recogn."},{"issue":"339\u2013358","key":"11_CR4","first-page":"24","volume":"7","author":"V Silva de","year":"2007","unstructured":"de Silva, V., Ghrist, R.: Coverage in sensor networks via persistent homology. Algebraic Geom. Topol. 7(339\u2013358), 24 (2007)","journal-title":"Algebraic Geom. Topol."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Edelsbrunner, H., Harer, J.: Computational Topology: An Introduction. American Mathematical Soc. (2010)","DOI":"10.1090\/mbk\/069"},{"issue":"4","key":"11_CR6","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s00454-002-2885-2","volume":"28","author":"H Edelsbrunner","year":"2002","unstructured":"Edelsbrunner, H., Letscher, D., Zomorodian, A.: Topological persistence and simplification. Discrete Comput. Geom. 28(4), 511\u2013533 (2002)","journal-title":"Discrete Comput. Geom."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Felice, D., Mancini, S., Pettini, M.: Quantifying networks complexity from information geometry viewpoint. arXiv preprint \n                  arXiv:1310.7825\n                  \n                 (2013)","DOI":"10.1063\/1.4870616"},{"issue":"15","key":"11_CR8","doi-asserted-by":"publisher","first-page":"1958","DOI":"10.1016\/j.patrec.2012.03.016","volume":"33","author":"L Han","year":"2012","unstructured":"Han, L., Escolano, F., Hancock, E.R., Wilson, R.C.: Graph characterizations from von neumann entropy. Pattern Recogn. Lett. 33(15), 1958\u20131967 (2012)","journal-title":"Pattern Recogn. Lett."},{"issue":"9","key":"11_CR9","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1002\/eji.1830050912","volume":"5","author":"G. W. Hoffmann","year":"1975","unstructured":"Hoffmann, G.W.: A theory of regulation and self-nonself discrimination in an immune network. Eur. J. Immunol. 5(9), 638\u2013647 (1975)","journal-title":"European Journal of Immunology"},{"issue":"03","key":"11_CR10","doi-asserted-by":"publisher","first-page":"P03034","DOI":"10.1088\/1742-5468\/2009\/03\/P03034","volume":"2009","author":"D Horak","year":"2009","unstructured":"Horak, D., Maleti\u0107, S., Rajkovi\u0107, M.: Persistent homology of complex networks. J. Stat. Mech.: Theory Exp. 2009(03), P03034 (2009)","journal-title":"J. Stat. Mech.: Theory Exp."},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Ibekwe, A.M., Ma, J., Crowley D.E., Yang, C.-H., Johnson, A.M., Petrossian, T.C., Lum, P.Y.: Topological data analysis of Escherichia coli O157: H7 and non-O157 survival in soils. Frontiers Cell. Infect. Microbiol. 4 (2014)","DOI":"10.3389\/fcimb.2014.00122"},{"key":"11_CR12","unstructured":"Jankowski, A., Skowron, A.: Practical Issues of Complex Systems Engineering: Wisdom Technology Approach (2014)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Jonsson, J.: Simplicial Complexes of Graphs, vol. 1928. Springer (2008)","DOI":"10.1007\/978-3-540-75859-4"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Merelli, E., Pettini, M., Rasetti, M.: Topology driven modeling: the IS metaphor. Nat. Comput. 1\u201310 (2014)","DOI":"10.1007\/s11047-014-9436-7"},{"key":"11_CR15","unstructured":"Mortveit, H., Reidys, C.: An Introduction to Sequential Dynamical Systems. Springer Science & Business Media (2007)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Ortiz-Arroyo, D., Akbar Hussain, D.M.: An information theory approach to identify sets of key players. In: Intelligence and Security Informatics, pp. 15\u201326. Springer (2008)","DOI":"10.1007\/978-3-540-89900-6_5"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Passerini, F., Severini, S.: The von Neumann entropy of networks. arXiv preprint \n                  arXiv:0812.2597\n                  \n                 (2008)","DOI":"10.2139\/ssrn.1382662"},{"issue":"101","key":"11_CR18","doi-asserted-by":"publisher","first-page":"20140873","DOI":"10.1098\/rsif.2014.0873","volume":"11","author":"G Petri","year":"2014","unstructured":"Petri, G., Expert, P., Turkheimer, F., Carhart-Harris, R., Nutt, D., Hellyer, P.J., Vaccarino, F.: Homological scaffolds of brain functional networks. J. R. Soc. Interface 11(101), 20140873 (2014)","journal-title":"J. R. Soc. Interface"},{"issue":"6","key":"11_CR19","doi-asserted-by":"publisher","first-page":"e66506","DOI":"10.1371\/journal.pone.0066506","volume":"8","author":"G Petri","year":"2013","unstructured":"Petri, G., Scolamiero, M., Donato, I., Vaccarino, F.: Topological strata of weighted complex networks. PloS ONE 8(6), e66506 (2013)","journal-title":"PloS ONE"},{"issue":"14","key":"11_CR20","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1093\/bioinformatics\/btr335","volume":"27","author":"N Rapin","year":"2011","unstructured":"Rapin, N., Lund, O., Castiglione, F.: Immune system simulation online. Bioinformatics 27(14), 2013\u20132014 (2011)","journal-title":"Bioinformatics"},{"key":"11_CR21","unstructured":"Rucco, M., Falsetti, L., Herman, D., Petrossian, T., Merelli, E., Nitti, C., Salvi, A.: Using Topological Data Analysis for diagnosis pulmonary embolism. arXiv preprint \n                  arXiv:1409.5020\n                  \n                 (2014)"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Stein, D.L., Newman, C.M.: Nature versus nurture in complex and not-so-complex systems. In: ISCS 2013: Interdisciplinary Symposium on Complex Systems, pp. 57\u201363. Springer (2014)","DOI":"10.1007\/978-3-642-45438-7_6"},{"issue":"1","key":"11_CR23","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.tcs.2006.06.015","volume":"363","author":"E Tomita","year":"2006","unstructured":"Tomita, E., Tanaka, A., Takahashi, H.: The worst-case time complexity for generating all maximal cliques and computational experiments. Theoret. Comput. Sci. 363(1), 28\u201342 (2006)","journal-title":"Theoret. Comput. Sci."}],"container-title":["Springer Proceedings in Complexity","Proceedings of ECCS 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29228-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T03:04:12Z","timestamp":1559444652000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-29228-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319292267","9783319292281"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29228-1_11","relation":{},"ISSN":["2213-8684","2213-8692"],"issn-type":[{"value":"2213-8684","type":"print"},{"value":"2213-8692","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}