{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T04:08:51Z","timestamp":1748923731461,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319335087"},{"type":"electronic","value":"9783319335094"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33509-4_7","type":"book-chapter","created":{"date-parts":[[2016,4,16]],"date-time":"2016-04-16T15:59:57Z","timestamp":1460822397000},"page":"82-87","source":"Crossref","is-referenced-by-count":1,"title":["Multiagent Model for Agile Context Inference Based on Articial Immune Systems and Sparse Distributed Representations"],"prefix":"10.1007","author":[{"given":"Radu-Casian","family":"Mihailescu","sequence":"first","affiliation":[]},{"given":"Paul","family":"Davidsson","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Persson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,17]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6714-3","volume-title":"Sparse Representation, Modeling and Learning in Visual Recognition","author":"H Cheng","year":"2015","unstructured":"Cheng, H.: Sparse Representation, Modeling and Learning in Visual Recognition. Springer, London (2015)"},{"issue":"2","key":"7_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MIS.2008.27","volume":"23","author":"JM Corchado","year":"2008","unstructured":"Corchado, J.M., Bajo, J., Abraham, A.: GerAmi: improving healthcare delivery in geriatric residences. IEEE Intell. Syst. 23(2), 19\u201325 (2008)","journal-title":"IEEE Intell. Syst."},{"issue":"2","key":"7_CR3","doi-asserted-by":"publisher","first-page":"1574","DOI":"10.1016\/j.asoc.2010.08.024","volume":"11","author":"D Dasgupta","year":"2011","unstructured":"Dasgupta, D., Senhua, Y., Nino, F.: Recent advances in artificial immune systems: models and applications. Appl. Soft Comput. 11(2), 1574\u20131587 (2011)","journal-title":"Appl. Soft Comput."},{"key":"7_CR4","series-title":"Law, Governance and Technology Series","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/978-94-007-5583-3_31","volume-title":"Agreement Technologies","author":"P Davidsson","year":"2013","unstructured":"Davidsson, P., Friberger, M.G., Holmgren, J., Jacobsson, A., Persson, J.A.: Agreement technologies for supporting the planning and execution of transports. Agreement Technologies. Law, Governance and Technology Series, vol. 8, pp. 533\u2013547. Springer, The Netherlands (2013)"},{"key":"7_CR5","volume-title":"Artificial Immune Systems: A New Computational Intelligence Approach","author":"L Castro De","year":"2002","unstructured":"De Castro, L., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer Science, London (2002)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"de Paula, F.S., de Castro, L.N., de Geus, P.L.: An intrusion detection system using ideas from the immune system. In: Proceeding of IEEE Congress on Evolutionary Computation (CEC), vol. 1, pp. 1059\u20131066 (2004)","DOI":"10.1109\/CEC.2004.1330979"},{"issue":"1","key":"7_CR7","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"AK Dey","year":"2001","unstructured":"Dey, A.K.: Understanding and using context. Pers. Ubiquitous Comput. 5(1), 4\u20137 (2001)","journal-title":"Pers. Ubiquitous Comput."},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-37087-8_8","volume-title":"Web and Wireless Geographical Information Systems","author":"AS Fonteles","year":"2013","unstructured":"Fonteles, A.S., Neto, B.J.A., Maia, M., Viana, W., Andrade, R.M.C.: An adaptive context acquisition framework to support mobile spatial and context-aware applications. In: Liang, S.H.L., Wang, X., Claramunt, C. (eds.) W2GIS 2013. LNCS, vol. 7820, pp. 100\u2013116. Springer, Heidelberg (2013)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-85072-4_11","volume-title":"Artificial Immune Systems","author":"MFA Gadi","year":"2008","unstructured":"Gadi, M.F.A., Wang, X., do Lago, A.P.: Credit card fraud detection with artificial immune system. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol. 5132, pp. 119\u2013131. Springer, Heidelberg (2008)"},{"issue":"4","key":"7_CR10","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1023\/A:1026195112518","volume":"4","author":"FA Gonz\u00e1lez","year":"2003","unstructured":"Gonz\u00e1lez, F.A., Dasgupta, D.: Anomaly detection using real-valued negative selection. Genet. Program. Evolvable Mach. 4(4), 383\u2013403 (2003)","journal-title":"Genet. Program. Evolvable Mach."},{"issue":"4","key":"7_CR11","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S Hofmeyr","year":"2000","unstructured":"Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. Evol. Comput. 8(4), 443\u2013473 (2000)","journal-title":"Evol. Comput."},{"key":"7_CR12","unstructured":"Kim, J., Bentley, P.J.: An evaluation of negative selection in an artificial immune system for network intrusion detection. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), pp. 1330\u20131337 (2001)"},{"issue":"4","key":"7_CR13","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s11047-006-9026-4","volume":"6","author":"J Kim","year":"2007","unstructured":"Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection - a review. Nat. Comput. 6(4), 413\u2013466 (2007)","journal-title":"Nat. Comput."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Kramer, D., Kocurova, A., Oussena, S., Clark, T., Komisarczuk, P.: An extensible, self contained, layered approach to context acquisition. In: Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2011), pp. 6:1\u20136:7. ACM (2011)","DOI":"10.1145\/2090316.2090322"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-39860-5_3","volume-title":"Agreement Technologies","author":"R-C Mihailescu","year":"2013","unstructured":"Mihailescu, R.-C., Klusch, M., Ossowski, S.: e COOP: privacy-preserving dynamic coalition formation for power regulation in the smart grid. In: Ches\u00f1evar, C.I., Onaindia, E., Ossowski, S., Vouros, G. (eds.) AT 2013. LNCS, vol. 8068, pp. 19\u201331. Springer, Heidelberg (2013)"},{"issue":"2","key":"7_CR16","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/0092-8674(94)90331-X","volume":"76","author":"GJ Nossal","year":"1994","unstructured":"Nossal, G.J.: Negative selection of lymphocytes. Cell 76(2), 229\u2013239 (1994)","journal-title":"Cell"},{"key":"7_CR17","volume-title":"Introduction to Multiagent Systems","author":"M Woolridge","year":"2009","unstructured":"Woolridge, M.: Introduction to Multiagent Systems, 2nd edn. Wiley, New York (2009)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Multi-Agent Systems and Agreement Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33509-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T19:41:19Z","timestamp":1748893279000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-33509-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319335087","9783319335094"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33509-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}