{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:50:27Z","timestamp":1725702627158},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642331602"},{"type":"electronic","value":"9783642331619"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33161-9_78","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T13:57:47Z","timestamp":1348149467000},"page":"526-529","source":"Crossref","is-referenced-by-count":0,"title":["Securing Area with Robots under BML Control"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Remmersmann","sequence":"first","affiliation":[]},{"given":"Ulrich","family":"Schade","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"78_CR1","unstructured":"Heffner, K., Brook, A., de Reus, N., Khimeche, L., Mevassvik, O.M., Pullen, M., Schade, U., Simonsen, J., Gomez-Veiga, R.: NATO MSG-048 C-BML Final Report Summary. In: 2010 Fall Simulation Interoperability Workshop, Orlando, FL (2010)"},{"issue":"4","key":"78_CR2","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.ast.2006.10.007","volume":"11","author":"M.L. Cummings","year":"2007","unstructured":"Cummings, M.L., Mitchell, P.J.: Operator scheduling strategies in supervisory control of multiple UAVs. Aerosp. Sci. Technol.\u00a011(4), 339\u2013348 (2007)","journal-title":"Aerosp. Sci. Technol."},{"key":"78_CR3","unstructured":"Nehme, C., Mekdeci, B., Crandall, J.W., Cumming, M.L.: The Impact of heterogeneity of operator performance in futuristic unmanned vehicle systems. Int. Command Control J.\u00a02(2) (2008)"},{"key":"78_CR4","doi-asserted-by":"crossref","unstructured":"Coppin, G., Legras, F.: Autonomy Spectrum and Performance Perception Issues in Swarm Supervisory Control. Proceedings of the IEEE\u00a0100(3) (2012)","DOI":"10.1109\/JPROC.2011.2174103"},{"key":"78_CR5","first-page":"61","volume-title":"Concepts and Implementations for Innovative Military Communications and Information Technologies","author":"T. Remmersmann","year":"2010","unstructured":"Remmersmann, T., Br\u00fcggemann, B., Frey, M.: Robots to the Ground. In: Concepts and Implementations for Innovative Military Communications and Information Technologies, pp. 61\u201368. Military University of Technology, Warsaw (2010) ISBN 978-83-61486-70-1"},{"issue":"9","key":"78_CR6","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1177\/0278364904045564","volume":"23","author":"B.P. Gerkey","year":"2004","unstructured":"Gerkey, B.P., Matari\u0107, M.J.: A formal analysis and taxonomy of task allocation in multi-robot systems. Intl. J. of Robotics Research\u00a023(9), 939\u2013954 (2004)","journal-title":"Intl. J. of Robotics Research"},{"issue":"7","key":"78_CR7","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/361011.361064","volume":"17","author":"J.L. Bruno","year":"1974","unstructured":"Bruno, J.L., Coffman, E.G., Sethi, R.: Scheduling Independent Tasks To Reduce Mean Finishing Time. Communications of the ACM\u00a017(7), 382\u2013387 (1974)","journal-title":"Communications of the ACM"},{"key":"78_CR8","volume-title":"Adaptation in Natural and Artificial Systems","author":"J.H. Holland","year":"1975","unstructured":"Holland, J.H.: Adaptation in Natural and Artificial Systems. The Univ. of Michigan Press, Ann Arbor (1975)"},{"issue":"4","key":"78_CR9","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1109\/3468.508827","volume":"26","author":"P. Larra\u00f1aga","year":"1996","unstructured":"Larra\u00f1aga, P., Kuijpers, C., Murga, R., Yurramendi, Y.: Learning Bayesian network structures by searching for the best ordering with genetic algorithms. IEEE Transactions on System, Man and Cybernetics\u00a026(4), 487\u2013493 (1996)","journal-title":"IEEE Transactions on System, Man and Cybernetics"}],"container-title":["Communications in Computer and Information Science","Future Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33161-9_78.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:57:35Z","timestamp":1620129455000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33161-9_78"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642331602","9783642331619"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33161-9_78","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}