{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:14:03Z","timestamp":1725459243472},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540648918"},{"type":"electronic","value":"9783540685159"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0040829","type":"book-chapter","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T13:05:14Z","timestamp":1139231114000},"page":"789-798","source":"Crossref","is-referenced-by-count":0,"title":["Using offset invariant crossover as a tool for discovering cycle lengths of a periodic function"],"prefix":"10.1007","author":[{"given":"Clifton","family":"Davis","sequence":"first","affiliation":[]},{"given":"Christoph F.","family":"Eick","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,12,10]]},"reference":[{"key":"76_CR1","first-page":"14","volume-title":"Reducing Bias and Inefficiency in the Selection Algorithm","author":"J. E. Baker","year":"1987","unstructured":"J. E. Baker, \u201cReducing Bias and Inefficiency in the Selection Algorithm,\u201d Proc. of the Second International Conference on Genetic Algorithms, Hillsdale, NJ: Lawrence Erlbaum Ass., p14\u201321, 1987."},{"key":"76_CR2","volume-title":"Elementary Number Theory","author":"D. M. Burton","year":"1989","unstructured":"D. M. Burton, Elementary Number Theory, Second Edition, Dubuque, IA: Wm. C. Brown Pub., 1989.","edition":"Second Edition"},{"unstructured":"C. Hohn and C. R. Reeves, \u201cCrossover Landscape for Onemax\u201d in Proc. of the Second Nordic Workshop on Genetic Algorithms and their Applications, ed. J. T. Alander, Vaasa, Finland: FAIS, p27\u201344, 19926.","key":"76_CR3"},{"key":"76_CR4","first-page":"79","volume-title":"Contemporary Cryptology: The Science of Information Integrity","author":"J. Nechvatal","year":"1992","unstructured":"J. Nechvatal, \u201cPublic Key Cryptography\u201d in Contemporary Cryptology: The Science of Information Integrity, ed. G. J. Simmons, New York, NY: IEEE Press, pl79\u2013288, 1992."},{"key":"76_CR5","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"V21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir and L. Adleman, \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems,\u201d Communications of the ACM, V21, p120\u2013126, Feb., 1978.","journal-title":"Communications of the ACM"},{"key":"76_CR6","first-page":"65","volume-title":"Contemporary Cryptology: The Science of Information Integrity","author":"R. A. Rueppel","year":"1992","unstructured":"R. A. Rueppel, \u201cStream Ciphers,\u201d in Contemporary Cryptology: The Science of Information Integrity, ed. G. J. Simmons, New York, NY:IEEE Press, p65\u2013134, 1992."},{"key":"76_CR7","volume-title":"Numerical Optimization for Computer Models","author":"H. P. Schwefel","year":"1981","unstructured":"H. P. Schwefel, Numerical Optimization for Computer Models, John Wiley, Chichester, UK, 1981."},{"key":"76_CR8","first-page":"77","volume-title":"Delta Coding: An Iterative Search Strategy for Genetic Algorithms","author":"D. Whitley","year":"1991","unstructured":"D. Whitley, K. Mathias, and P. Fitzhorn, \u201cDelta Coding: An Iterative Search Strategy for Genetic Algorithms,\u201d Proc. of the Fourth International Conference on Genetic Algorithms, Los Altos, CA: Morgan Kaufman, p77\u201384, 1991"}],"container-title":["Lecture Notes in Computer Science","Evolutionary Programming VII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0040829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,9]],"date-time":"2019-02-09T13:05:10Z","timestamp":1549717510000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0040829"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648918","9783540685159"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/bfb0040829","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}