{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:34:20Z","timestamp":1743125660324,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":7,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048197934"},{"type":"electronic","value":"9789048197941"}],"license":[{"start":{"date-parts":[[2010,8,18]],"date-time":"2010-08-18T00:00:00Z","timestamp":1282089600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,8,18]],"date-time":"2010-08-18T00:00:00Z","timestamp":1282089600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-90-481-9794-1_7","type":"book-chapter","created":{"date-parts":[[2010,9,17]],"date-time":"2010-09-17T21:21:08Z","timestamp":1284758468000},"page":"33-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Network flow approaches for an asset-task assignment problem with execution uncertainty"],"prefix":"10.1007","author":[{"given":"Stelios","family":"Timotheou","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,18]]},"reference":[{"key":"7_CR1_7","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Timotheou, S., Nicholson, D.: Fast distributed near optimum assignment of assets to tasks. The Computer Journal (2010) doi:10.1093\/comjnl\/bxq010.","DOI":"10.1093\/comjnl\/bxq010"},{"key":"7_CR2_7","doi-asserted-by":"crossref","first-page":"2431","DOI":"10.1109\/CDC.1988.194778","volume-title":". In: Proceedings of the 27th IEEE Conference on Decision and Control, Austin, Texas, USA, 7-9 December","author":"S.E. Kolitz","year":"1988","unstructured":"Kolitz, S.E.: Analysis of a maximum marginal return assignment algorithm. In: Proceedings of the 27th IEEE Conference on Decision and Control, Austin, Texas, USA, 7-9 December, IEEE, New York, NY (1988) 2431\u20132436"},{"issue":"6","key":"7_CR3_7","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1287\/opre.1070.0440","volume":"55","author":"R.K. Ahuja","year":"2007","unstructured":"Ahuja, R.K., Kumar, A., Jha, K.C., Orlin, J.B.: Exact and Heuristic Algorithms for the Weapon-Target Assignment Problem. OPERATIONS RESEARCH 55(6) (2007) 1136\u20131146","journal-title":"OPERATIONS RESEARCH"},{"issue":"1","key":"7_CR4_7","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1109\/TSMCB.2003.808174","volume":"33","author":"Z.J. Lee","year":"2003","unstructured":"Lee, Z.J., Su, S.F., Lee, C.Y.: Efficiently solving general weapon-target assignment problem by genetic algorithms with greedy eugenics. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 33(1) (Feb 2003) 113\u2013121","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics"},{"key":"7_CR5_7","volume-title":"Network Flows: Theory, Algorithms, and Applications","author":"R.K. Ahuja","year":"1993","unstructured":"Ahuja, R.K., Magnanti, T.L., Orlin, J.B.: Network Flows: Theory, Algorithms, and Applications. Prentice Hall, United States (1993)"},{"issue":"3","key":"7_CR6_7","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1093\/comjnl\/bxp032","volume":"53","author":"S. Timotheou","year":"2010","unstructured":"Timotheou, S.: The Random Neural Network: A Survey. The Computer Journal 53(3) (2010) 251\u2013267","journal-title":"The Computer Journal"},{"issue":"3","key":"7_CR7_7","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1287\/opre.6.3.346","volume":"6","author":"A. Manne","year":"1958","unstructured":"Manne, A.: A Target-Assignment Problem. Operations Research 6(3) (1958) 346\u2013351","journal-title":"Operations Research"}],"container-title":["Lecture Notes in Electrical Engineering","Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-9794-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T22:46:51Z","timestamp":1675723611000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-9794-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,18]]},"ISBN":["9789048197934","9789048197941"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-9794-1_7","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2010,8,18]]},"assertion":[{"value":"18 August 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}